International Journal of Engineering Research in Computer Science and Engineering:



ISSN:

2394-2320

Number of Papers:

156

Journal Site:



5G Wireless Mobile Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

MS. S. Pavithra | MS.J.Uma Sawmiya, MS.R.Bavani , MS.Smitha

Abstract

ď5th generation mobile networkĒ or simply 5G isthe forthcoming revolution ofwireless technology.It is beyond the thinking of normal human.With its ultra-high speed ,it changes the usability of a mobile phone.

A Brief Review On The Application Of Swarm Intelligence To Web Information Retrieval

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Ramya C | Dr. Shreedhara K S

Abstract

Web Information Retrieval process has become one of the most focused research paradigms because of large quantity of growing web data as internet is ubiquitous. To this distributed, uncertain and volatile data, accurate and speed access is required. So there is a need to optimize the search process using some efficient approaches. For such novel approach a literature survey is presented on evolutionary bio-inspired Swarm Intelligence techniques to optimize search process in Web Information Retrieval Systems.

A Flexible Approach of Mobile Cloud Computing and Big Data Analytics for Networked Healthcare Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th June 2017

Hemalatha T | K Venkata Chalapathi

Abstract

Now a day’s Mobile devices were rapidly growing as indispensable part in our daily life, facilitating to do various useful tasks. Mobile cloud computing combines mobile with cloud computing to enlarge their capabilities, benefits and reduces their limitations, like battery life less memory and CPU power. Big data analyzing technologies facilitate extracting value from data consisting four Vs: volume, velocity, variety and veracity. This paper focuses networked healthcare as well as the task of mobile cloud computing and big data analytics in its enablement. The inspiration and development of applications over networked healthcare and systems were offered along with the adoption of healthcare cloud. A cloudlet based infrastructure of mobile cloud-computing to be utilized for healthcare. The methods, tools, and applications of big data analytics were focused. Experimental results are considered in the design of networked healthcare systems with big data as well as the technologies of mobile cloud-computing.

A Futuristic Approach for Towerless Mobile Networks Contributing to Digital India

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Jyothi Sulochana | K Hemavathi ,P Kalamani ,Lorate Shiny

Abstract

This project is an attempt to develop the mobile networks to have a wireless voice call happening without the help of the towers. Our main aim is to remove the towers in the communication process. The towers have been hazardous to many birds and animals. This project uses the Raspberry Pi boards with the inbuilt wi-fi on board. The Raspberry Pi with the wi-fi is used for the prototype, which would be used to develop a voice call application which would transfer the voice through the wifi communication. It is proposed to develop this technology to be able to access only till the distance of 30 meters which is the distance limit of the wi-fi communication. It would be possible to move this communication to be expanded by the use of the Wimax technology which would be able to communicate in the range of kilometers. This project uses two Raspberry Pi kits with Wi-fi inbuilt on it and would be able to communicate by developing the voice call application and would be able to use the audio jack on the kit. A hardware implementation would be developed and the results would be analyzed for performance.

A Honeypot based Attack Detection and Prevention System for Smart Cities Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Rohit Kumar | Surbhi Khare, Deepa Kale

Abstract

In today’s world, technology is changing almost every second day. This rapidly changing technology offers lots of benefits but also put some great challenges. Smart city is a concept that merges various Information and Communication Technology (ICT) and Internet of Things(IoT) based service solutions, together. Thus, the concept of smart cities uses all possible technologies in the state-of-the-art form. Hence, there is a need to make sure that the no one could use our networks for their own benefits. Malicious users always wait for the perfect opportunities and attack on the most vulnerable part of the network. A strong defense mechanism is needed to defend against them, otherwise the concept of smart cities would only be a chaos. In this paper, we will explain the different types of possible attacks, analyze them and will propose a mechanism to defend against them, based on Honeypot based services.

A Literature Study on Selenium Webdriver 2.0

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.R. Anitha | 

Abstract

Selenium is a open source automated testing suite for web applications across different web browsers and platforms. It is similar to HP Quick Test Pro but the Selenium focuses on automating web-based applications. The testing is done by using selenium is called selenium testing. This paper studies on selenium Webdriver 2.0 which uses mozilla firefox browser and how it is implemented by using Eclipse IDE. WebDriver calls the Web browser directly and all the test script is executed similarly to make the automation.

A New Optimization Technique for Performance and Energy Preservation In Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Javed Hussain | Durgesh Kumar Mishra

Abstract

The rapid growth of the computational requirement need to develop effective and efficient technologies for serving better. In various research domains in computational cloud the security, resource utilization and energy preservation are the main area of research and development. In this paper we are going to discuss the capability of optimization algorithm for scheduling the resources and allocating the virtual machines for improving the performance and energy efficiency of the computational cloud. Therefore the detailed discussion on the required objectives and the solution formulation is provided. In further the simulation technique of the proposed model and their results are also reported for analysis. According to the gain performance and experimental observations the proposed technique is suitable for both the kinds of resource scheduling and optimization.

A Novel Approach to Student Information Broadcasting via GSM Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Ankit Pande | Mr. ShubhamKakade ,Mr. Kushal V. Kothari, Mr. Akshit Wankhede , Dr.NitaThakre

Abstract

Broadcasting of Student information via GSM Network is a modern approach to send the academic information to the parents in regular manner. This will be helpful for parents to receive on demand service of information regarding daily progress of student like Attendance, exam forms, Examination marks, Event in college, Placement related Info, Fees information etc. As the information world is changing into digital, it is important to transform the information stored in colleges in traditional manner into digital manner. As the information stored into digital manner will be available at 24*7. GSM network is one of the low cost technologies which is helpful to broadcast the information stored in central database in rapidly.

A Proposal for Epidemic Prediction using Deep Learning

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sagar Palao | Abhishek Shahasane,Siddhesh Dighe, Harsh Gupta,Anjali Yeole

Abstract

HealthCare has been a surging need in India. The inception of Smart India, Smart Villages has further emphasized the need of a Smart & Healthy India. However little reflection of such digitally empowered country has been seen in the field of healthcare. This has further increased the importance of the definition of ubiquity of information and computing technology in healthcare that demand constant surveillance and vigilance of healthcare to predict epidemic outbreak and biological attack. The paper’s primary focus is to analyze and determine the spread of diseases and epidemic in cities/villages. And using this analysis to predict where the next outbreak of epidemic will be. This prediction helps the health authorities to take necessary action in terms of assuring that sufficient resources are available to suffice the need and if possible stop the occurrence of such epidemic by taking necessary actions. To achieve this, we use deep neural network as the heart of our prediction. It receives its training from the past experiences of data which we have collected from hospitals and our spread network. Using this training with our dynamic data it makes predictions as well as adaptively learns from the real time data.

A Robust Encryption and Searching System to Share Confidential Data onto the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Thejas S | Dr. G. Raghavendra Rao

Abstract

as cloud computing provides storing and sharing records via a cloud service because of on demand resource access and elasticity. For secure record sharing requires encryption of records before outsourcing. Key management system is one of the important aspects of the system. For sharing large number of documents, each record needs to be encrypted using different keys. Since to decrypt these records requires all keys which is very different task. Hence this approach uses aggregated key system, which aggregates all the keys. Later at the time of decryption of all records it requires one aggregated key. Considering large number of records in the cloud. For the efficient access of these records, it is necessary to search for the records over encrypted file. For this purpose , required to build for the index file. Multi keyword entries searches for the relevance record by matching keywords with the index file

A Secure Parallel Network File System using Protocols

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Digambar Waghole | Jabbar Tamboli, Shrutika Chintal , Supriya Vinode , VaishaliShinde

Abstract

We examine the issue of key foundation for secure numerous correspondences. The issue is enlivened by the multiplication of huge scale dispersed file frameworks supporting parallel access to numerous capacity gadgets. Our work concentrates on the present Internet standard for such file frameworks, i.e. parallel Network File System (pNFS), which makes utilization of Kerberos to establishparallelsessionkeys between clientsandstoragedevices. Our survey of the current Kerberos-based convention demonstrates that it has various impediments: (i) a metadata server encouraging key trade between the customers and the stockpiling gadgets has overwhelming workload that confines the adaptability of the convention; (ii) the convention does not give forward mystery; (iii) the metadata server creates itself all the session keys that are utilized between the customers and capacity gadgets, and this naturally prompts key escrow. In this paper, we propose a mixed bag of confirmed key trade conventions that are intended to address the above issues. We demonstrate that our conventions are fit for decreasing up to give or take 54% of the workload of the metadata server and simultaneously supporting forward mystery and escrow-freeness.

A Smart Automatic Mains Failure Panel with Diesel Generator Control and Wi-Fi

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Abhijith Mohanan. N | Kiranlal. C, Anju, G.R, Krupa Mariam, Jacob, Sharmila

Abstract

This paper focuses on the development of a smart Auto Mains Failure (AMF) panel meant for day to day electrical applications. AMF panel is unavoidable in industries, hospitals, educational industries etc. where generator is compulsory. It acts as the switching mechanism between the generator, load and the main power supply. It ensures consistent power supply to the load. An AMF panel, which can be controlled from a distance using Wi-Fi is presented here. The proposed system displays the generator parameters and indicates the type of fault in the supply mains and saves energy. The hardware model of the system is explained, which can be used for the validation of the results.

A Study in Knowledge Acquisition in AI Systems through Genetic Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Kumar Shekhar Singh | 

Abstract

Knowledge Base in an integral part of any AI system. Knowledge Acquisition refers to purposeful addition or refinements of knowledge structures to a knowledge Base. However knowledge acquisition is a complex and difficult task for AI researchers.Machine learning is the autonomous/mechanical procedure involving computers through which an AI. System itself enriches its knowledge Base.A useful taxonomy for machine learning is one that is based on the behavarioul strategy employed in the learning process. Some important conventional methods depending upon the degree of inference procedure are memorization, Analogy Inductive &Deductive inference.Attempts to develop machine learning systems began in 1950s. These design included self Adaptive system which modified their own structures in an attempt to produce an optional response to some input stimuli.Genetic Algorithms (GA) are based on population genetics. GAs learn through crossovers and mutations to provide optimum results. Higher performing knowledge structures can be mated (cross-over) to give birth to offsprings which possess many of their parent traits. Generations of structures are thus created until an acceptable level of performance has been reached. The following paper presents a study in different aspects of implementation of GAs for knowledge Acquisition in AI systems

A Survey of Recent Approaches for Detection of Alzheimerís Disease

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Arpita Raut | Vipul Dalal

Abstract

Alzheimerís is a progressive and irreversible neurological disease. It is the most common cause of dementia in people of the age group 65 years and above. Detection of Alzheimerís disease in the early stage is very crucial as it can prevent serious damage to the patientís brain. Many different methods have been proposed to detect Alzheimerís disease. In this paper, we have surveyed different techniques and approaches for detection of Alzheimerís disease.

A Survey on Artificial Intelligence In Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

S.Thyanesh Pandi | K.Niranjana, R.Vignesh, R.Abishek, J.Suriya Prabha

Abstract

IOT is the internetworking of ďthingsĒ that collects and exchanges information from the environment. AI, on the other hand, is the engine or the ďbrainĒ that will enable analytics and decision making from the data collected by IoT. In other words, IoT collects the data and AI processes this data in order to make sense of it. The AI and IOT systems are working together in devices like fitness trackers and Google Home. AI can be used to make inferences about this data and summarize it before transmitting it to other devices. This would reduce the flood of data to a manageable level. This would enable the attachment of a larger number of devices to the network. This paper describes the advantages, applications, analysis and result of using Artificial Intelligence in Internet of Things.

A Survey on Electroencephalography (EEG)-Based Brain Computer Interface

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

K.Aparna | R.Chandana Priya

Abstract

In this paper the main objective is to develop a system which allows disabled people to communicate with other persons and helps to interact with external environment and also to establish a communication system which will translate the human intentions reflected by brain signals into analog speech signals those are audible via speakers. Brain‚Äďcomputer interface i.e., (BCI) is a new emerging area is mainly for the patients in the treatment bed. TheBrain Computer Interface will receive brain signals, analyze them, and then translate them into commands those are transfer to output devices which will carry out desired actions. Electroencephalography records the brain‚Äôs electrical activity, obtained by firing of neurons within the brain. If, we find out the difference in those low signal frequencies, those will yields to design a BCI. Based on variation in those frequencies, human thoughts can be recognized as a prototype mechanism.

A Survey on Reversible Image Data Hiding with Contrast Enhancement

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

SK Taj Mahaboob | Shaik Baba Fakruddin

Abstract

The main aim of this paper is to explain different watermarking techniques. In this paper we will give an overview on different types of techniquesused for preparation ofreversible data hiding and explain the significant growth in reversible watermarking and increase of embedding payload in the host image withoutdistortion in many fields. The paper focus on comparative analysis of different watermarking techniques and explaining their significance briefly

A Survey On Secure Connectivity Techniques For Internet Of Things Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Mr. Vikram Neerugatti | Dr. A. Rama Mohan Reddy

Abstract

Internet of things involves network of Nodes (sensors, Actuators, fog, cloud etc). Sensor node is a small in size, computing power and storage capacity is less. Due to this nature of Sensor the security module is not incorporated in it. So IoT Nodes has more scope for the Intruders, to attack the systems by using this weak connection of Nodes. Lot of research work has to do in this area, to establish a secure connectivity among various IoT nodes. While accomplishing the secure connectivity of things in IoT, need to consider all the security parameters like (confidentiality, authentication, integrity, etc.). The existing techniques/ Algorithms for secure connectivity of devices are not developed for nodes that which used in an IoT technology and not deal with all security parameters. This paper addressed the various existing secure connectivity techniques with advantages and disadvantages, that which is used to direct Research towards development of secure connectivity Techniques for IoT nodes.

A Survey on Travel Based Application using Social Media

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Shanker Shalini | Dr.M.Sheerin Banu

Abstract

Big data provides analysis of large amount of dataset and accurate result can be obtained using this dataset analysis. When considering travel application many user opt for static travel planning without any now feature that incorporates in the application. Blindly they agree any travel plan thatís been listed in the application. In this paper various analysis is done and survey is been done to make user friendly travel application so that user can specify their Point Of Interest (POI) and as such planning is done dynamically based on users location with the help of geo-tagging and collaborative filtering. We find here what are all recommendation system that can suitable to incur in the travel application with the help of geo-tagging and location based filtering. Thus to find user friendly travel based application this survey is done.

A survey on Wireless Sensor Network Attacks And Defenses

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Pramod Nath | Pragya Rajput

Abstract

Wireless Sensor Networks (WSN) are combination of several thousand sensor nodes that have several capabilities such as to detect, to sense, to monitor, to process and to compute. WSN have many applications in real time scenarios such as in military, industries, health care and so on. WSN has infrastructure less structure, so the ability to cope with the node failure, fault tolerance and its security attack are the main concern. The sensor nodes are more vulnerable to security threats and attacks because of the harsh and hostile environment. Efficient implementation of different security protocols has huge impact to adverse the potential threat. The main aim of this paper is to present security issues and challenges faced by WSN. This paper explains attacks in WSN, its flaws and their countermeasures that can be used to handle the pitfall.

Aadhaar and Server based Electoral system

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Yugansh Garg | Sakshi Mishra

Abstract

This paper describes an advance Aadhaar and server based electoral system for Indian elections. The voting systems in an easier way that all voter can cast votes via biometric Aadhaar based authentication .It provides a higher security pre-casting which could reduce the chances of temperance as a simultaneous backup is created at State/Central level servers. In this system we renounce the use of traditional voter ID cards and election voter verification list. This method would help us to eliminate invalid votes, ends booth capturing and makes counting easier, faster and accurate

Algorithm for Protection of Key in Private Key Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Neha Tyagi | Ashish Agarwal, Anurag Katiyar, Shubham Garg,Shudhanshu Yadav

Abstract

This paper is in reference with our previous paper entitled ‚ÄúProtection of Key in Private Key Cryptography‚ÄĚ published by ‚ÄúInternational Journal of Advanced Research‚ÄĚ in Feb 2017 edition... In this paper we have tried to devise an algorithm that would protect the key in transmission, as in the era of digitization, threats to information security instigate the concerned people to take proactive measures for communication between two communicating parties. Since our major focus is on the symmetric key cryptography, also called as private key cryptography, we have studied different techniques of securing a private key or shared key or secret key that are used to shield information in such systems. The different statistical data being published so far and recent phishing scam which plays with the information transfer by taking away the user‚Äôs identity highlights the need to make our security measures strong enough to counter such unwanted accesses. After looking into the functioning of widely accepted protocols and thinking of introducing a few changes to enhance their functionality, we here, are going to focus mainly on application of asymmetric key cryptographic algorithm named RSA algorithm. We have already referred to suggestions by means of several research papers being published so far related to our area of interest such as N-Prime RSA, magic rectangle, etc. We have tried to present a method taking one step ahead in the available sketch and without diminishing the basic essence of the algorithm. We also refer to some examples and its application as thought of in its modified form to further support our idea.

Amalgamation of Mind Wandering with Military and Defence

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Priyanka Tripathi | Tanu Varshney, Priyanka Chaudhary , Vimal Singh

Abstract

In this paper we are going to present, how to curb the affect of mind wandering during military training and in the field of defence. Basically, mind wandering software will check the ability to stay focused on the task and make t imely decisions. This paper also discuss about the different types of training that is provided to the soldiers and about the consequences of the mind wanderi ng pills.

An Approach for Managing Different Applications Using Centralized Load Balancer in Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Abhishek | Akash Kumar , Kunal Gautam, Suresh, Mrs Vani.K.A

Abstract

The data centers and end users are distributed across the globe in a large cloud environment. It is a tiresome situation for cloud data centers to serve huge requests coming from these end users. As a consequence, load balancing mechanism is used to distribute the loads efficiently and effectively among different nodes. To achieve high user contentment and high resource employment ratio, load balancers are used. In this paper we have used a ďcentral load balancerĒ to balance the loads among different virtual machines in cloud data centers.

An innovative high-performance e-governance of its citizens to the services of the Center in Rajasthan State

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Praveen Kumar | vijay singh rathore,sharma

Abstract

The growth of the internet is due primarily to the interests of the private sector, but the Government is now one of the revolutions. Governments all over the world are taking important steps to make their services and on the Internet to provide information. A range of e- Government have taken the initiative to improve the efficiency and effectiveness of the Government's internal operations, communications and civil and transactions of individuals and organizations. The Government of the use of information and com munications technology tools to have a significant impact on the development and growth of the country. The importance of the major e-management in the current system is to enable national success and leading countries in this era of the digital economy in the context of government, IT and communications resources, is a concept is called e-governance. The purpose of this paper is to explore the e-Government of Rajasthan is the largest of the National is India. It is a typical task is to explore the integration of e-Government of Rajasthan, still in this article is simply trying to representatives of every aspect of governance in the State of Rajasthan in summary form.

Analysis of Classification Methods for Diagnosis of Pulmonary Nodules in CT Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Capt. Dr. S.Santhosh Baboo | E.Iyyapparaj

Abstract

The main aim of this work is to propose a novel Computer-aided detection (CAD) system based on a Contextual clustering combined with region growing for assisting radiologists in early identification of lung cancer from computed tomography(CT) scans. Instead of using conventional thresholding approach, this proposed work uses Contextual Clustering which yields a more accurate segmentation of the lungs from the chest volume. Following segmentation GLCM features are extracted which are then classified using three different classifiers namely Random forest, SVM and k-NN.

Analysis of Data Using Hadoop and Mapreduce

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Bharti Kalra | Dr. Anuranjan Misra, Dr. D. K. Chauhan

Abstract

We are in the world of technology, where data is moving around all the time. This data is becoming bigdata when it comes in huge volume and data can be structured, unstructured or semi-structured. hadoop is the technology to analysis the big data. The objective of this paper is to analysis the data that is collected from the open source using the hadoop and mapreduce programming model.

Analysis of Priority Scheduling Algorithm on the Basis of FCFS & SJF for Similar Priority Jobs

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Chandra Shekar N | Karthik V

Abstract

Scheduling is one of the most important activities of the process manager which take decision to choose which of the process in the ready queue will be assigned to the CPU. There are different types of scheduling algorithms available for taking decision. One of them is Priority Scheduling Algorithm, which is based on the priority assigned to each process. In priority scheduling the Processes are executed on the basis of priority, the process having highest priority is executed first. In case of similar priority FCFS is used. In this paper, the priority scheduling algorithm is used in such a way that, in case of similar priority SJF algorithm is used instead of FCFS and average waiting time and average turnaround time is calculated. The comparative analysis is performed on the SJF based priority scheduling and FCFS based priority scheduling to compare the average waiting time and average turnaround time

Analysis of Priority Scheduling Algorithm on the Basis of FCFS & SJF for Similar Priority Jobs

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Chandra Shekar N | Karthik V

Abstract

Scheduling is one of the most important activities of the process manager which take decision to choose which of the process in the ready queue will be assigned to the CPU. There are different types of scheduling algorithms available for taking decision. One of them is Priority Scheduling Algorithm, which is based on the priority assigned to each process. In priority scheduling the Processes are executed on the basis of priority, the process having highest priority is executed first. In case of similar priority FCFS is used. In this paper, the priority scheduling algorithm is used in such a way that, in case of similar priority SJF algorithm is used instead of FCFS and average waiting time and average turnaround time is calculated. The comparative analysis is performed on the SJF based priority scheduling and FCFS based priority scheduling to compare the average waiting time and average turnaround time

Analyzing Internet DNS (SEC) Traffic with ?R? For Resolving Platform Optimization

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

J Uma Mahesh | Harekrishna Allu , N Chandrakanth

Abstract

This paper proposes to use data mining methods implemented via R in order to analyze the Domain Name System (DNS) traffic and to develop innovative techniques for balancing the DNS traffic according to Fully Qualified Domain Names (FQDN) rather than according to the Internet Protocol (IP) addresses. With DNS traffic doubling every year and the deployment of its secure extension DNSSEC, DNS resolving platforms require more and more CPU and memory resources. After characterizing the DNS(SEC) traffic thanks to reduction in dimension and clustering methods implemented with R functions and packages, we propose techniques to balance the DNS traffic among the DNS platform servers based on the FQDN. Several methods are considered to build the FQDN-based routing table: K- means clustering algorithm, mixed integer linear programming, and a heuristic scheme. These load balancing approaches are run, and evaluated with R on real DNS traffic data extracted from an operational network of an Internet Service Provider. They result in reducing the platform CPU resources by 30% with a difference of less than 2% CPU between the servers of a platform.

Analyzing Internet DNS (SEC) Traffic with ‚ÄēR‚ÄĖ For Resolving Platform Optimization

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Uma Mahesh | Harekrishna Allu ,N Chandrakanth

Abstract

This paper proposes to use data mining methods implemented via R in order to analyze the Domain Name System (DNS) traffic and to develop innovative techniques for balancing the DNS traffic according to Fully Qualified Domain Names (FQDN) rather than according to the Internet Protocol (IP) addresses. With DNS traffic doubling every year and the deployment of its secure extension DNSSEC, DNS resolving platforms require more and more CPU and memory resources. After characterizing the DNS(SEC) traffic thanks to reduction in dimension and clustering methods implemented with R functions and packages, we propose techniques to balance the DNS traffic among the DNS platform servers based on the FQDN. Several methods are considered to build the FQDN-based routing table: K- means clustering algorithm, mixed integer linear programming, and a heuristic scheme. These load balancing approaches are run, and evaluated with R on real DNS traffic data extracted from an operational network of an Internet Service Provider. They result in reducing the platform CPU resources by 30% with a difference of less than 2% CPU between the servers of a platform.

Applications of Computational Linguistics to Language Studies: An Overview

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sakthi Vel S. | 

Abstract

Computational Linguistics is the scientific study of human languages. It is one of the most relevant interdisciplinary field of Linguistics and Computer science. Intelligent Natural Language Processing (NLP) is based on the science called Computational Linguistics (CL). It is closely connected with General Linguistics and Applied Linguistics. Computational linguistics might be considered as a synonym of automatic processing of natural language, since the main task of computational linguistics is to construct computer programs to process Text/Speech in natural languages [4]. The paper attempts to provide an introductory view about computational linguistics and its various applications to language studies. The paper has three sections. The first section deals with introduction to computational linguistics, its major divisions (applied and theoretical) and some fundamental ideas about the topic. Second section deals with structure of computational linguistics -a tree diagram representation. The third section describes the various applications of computational linguistics in close association with language studies. Finally the paper summed up with conclusion and list of references.

Aushadh Nishtha: A Mobile Based Application to ensure Adherence to Medication in Chronic Non-Communicable Diseases

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Dr. Ankur Joshi | Manu Gupta, Dr.Soumitra Sethia

Abstract

Medication adherence is both vital and difficult to achieve in case of non ‚Äďcommunicable diseases. The challenges arise because of the requirement of behavioural monitoring and continuous scrutiny of the process. This prerequisite to ensure adherence may be addressed by ICT through asynchronous communication via mobile based application. This manuscript describes the conceptual and operation framework of one of the adherence assurance application developed by the authors and investigates further the future prospects of such application.

Automatic Soil Moisture Monitoring System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Khushal G. Katara | Saket C. Joshi,Harsh L. Bhanushali,Bhavishek S. Panikar

Abstract

Irrigation part in farming has always been an important part for farmers. Manual attempts for the irrigation, such as water supply and keeping the records are quite tedious .In order to make it simple and connected to technology, Soil moisture can be detected by soil moisture sensor. This sensor can detect the moisture level of the soil. This can be done automatic with microcontroller, so that whenever moisture level of soil gets low or soil gets dry, Water can be supplied automatically. The android app will store the records and can control the sensor and water pump. This can cut the manual attempts regarding the irrigation and simplify the efforts for farming with technology. Connecting the irrigation with technology makes it to the ‚Äúsmart irrigation‚ÄĚ.

Big Data Analysis On Gene Mutation Detection For Bacterial Diseases

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sharath Kumar S | Sanil A Jain,Veeresh Shenoy S, Vinith G,M Ravi Krishna

Abstract

Big data and analytics is a method of examining a lot of datasets to uncover hidden patterns, market trends, and other useful business information. In a human body, the gene will generate a significant amount of data; the real challenge here is to find, collect, analyze and manage information so that we can avoid the occurrence of the illness and be healthier. Nowadays many people are losing their lives because of bacterial diseases like MRSA, CRE, etc. So we are trying to collect the data sets of a particular disease and analyze it by detecting gene mutation, which helps people to find which gene is the actual cause of the particular disease. Here we will be finding which mutation is responsible for that drug resistance. This drug resistant gene will be found out in a large population. A mutation is the permanent change of the nucleotide sequence of an organism, genetic elements, virus or extrachromosomal DNA. Errors during DNA replication results in the mutation which further undergoes error-prone repair. Through genetic recombination, mutations can involve the duplication of vast sections of DNA

Big Data management in Manufacturing Industries for Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Sabitha M.S | Dr.S.Viayalakshmi ,R.M.Rathikaa Sre

Abstract

In the current scenario, enormous technology improvements are happening in the field of Network communication, cloud computing, Big Data and IoT. Information technology is bringing a new business paradigm by introducing Internet of Technology (IoT). Nowadays adoption of IoT and Cloud computing has become mandatory for the Modern enterprises. The biggest challenge in front of us is handling the IoT generated Big Data. Big Data provides an opportunity to find the insights from the machine generated data that converts the business environments into more agile and it answers the questions which were considered beyond our reach before. This paper focuses on the requirement of IoT and Big Data in the modern enterprises.

Big Data-An Emerging and Innovative Technology: Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Keerthana R | Nandini N,Karthik N S, Divya L ,Mrs Sheela devi

Abstract

This paper is a review of the big data concept, its dimensions, its architecture comparison between the earlier concept and the latest, the storage possible i.e. the databases and origin of big data. The relational database, having rigid schema, has been prevailing since a long time but it is difficult to store the unstructured data in relational database. The unstructured data has mainly text nature or is in the form of logs. Here comes the concept of No SQL databases. Big Data is small data with large data size

Biological Wastewater Treatment Principles

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.P.Sunitha | Prof.D.Usharani, Mr.K.Ravi Kishore, Ms.D.Sucharitha

Abstract

Natural receiving waters including rivers, streams, and tidal areas sustain a background population of microorganisms including bacteria, fungi, and algae. These organisms require energy for respiration and organic carbon food sources in order to synthesize new cells using the following general equation: In the above equation, the microbes occur naturally and consume organic food sources that are naturally present in the water. Some of the carbon matter in the food is biodegraded to release energy that drives the reaction. Energy is released through the biodegradation process by combining part of the organic food source's carbon compounds with oxygen. The by products of this reaction are additional microbial cells and carbon dioxide. Nutrients, primarily nitrogen and phosphorus, complete the reaction and are needed as part of the building blocks used to form new microbial cell tissue. In a clean water environment, the amounts of available organic food supplies are limited. This places a restriction on how fast the above reactions proceeds and also on how many microbes are able to grow. In general, the population of microbes in a clean water environment is restricted to a low background level by the limited amount of organic food that is present. While periodic fluctuations in the food supply may cause brief periods of population swings or declines, the number of microbes in the ecosystem will achieve an equilibrium condition over time that is based on the steady state amount of organic food present. If an artificial organic food supply is allowed to enter the ecosystem, the number of microbes that can be sustained will increase in response to the added food. If the amount of additional food is large, the population of microbes may increase exponentially and will continue to grow up to the point that the amount of food again becomes limiting for the elevated population. Raw sewage contains a high organic carbon content that provides an excellent supply of food for waterborne microbes. If raw sewage is discharged into receiving water, the bacteria population will become elevated in response to the new addition of food. This causes the above biodegradation reaction to proceed rapidly and, in the process, to create larger amounts of new microbes and carbon dioxide. This requires that more oxygen be available for use by the microbes. If sufficient extra food is added by the sewage discharge, the population of microorganisms and the resulting oxygen consumption may proceed so rapidly that all of the receiving water's oxygen is depleted.

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sindhura Rao | Ashwini S,Kusuma Mohanchandra

Abstract

In this paper, we introduce a game in which the player plays chess by using a brain-computer interface (BCI). The BCI analyzes the steady-state visual evoked potential (SSVEP) responses recorded with electroencephalography (EEG) on the player’s scalp. The single three command control game is specifically designed around an SSVEP-BCI and validated in several EEG setups while using a neurosky headset. As a final step in the validation of the game, a random experiment on a broad audience was conducted with the Neurosky headset in a real-world setting.

Brain Tumor Detection using Image Segmentation

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Siddhi N. Nerurkar | 

Abstract

Image segmentation is a process of partitioning a digital image into N regions. In today’s world, Brain tumor detection using image segmentation is fundamental but challenging problem in field of computer vision and image processing due to the diverse image content, image noise, non-uniform object texture and other factors. Accurate detection of size and location of brain tumor plays a vital role in the diagnosis of brain tumor. There are many image segmentation methods available for medical image analysis but the Region based and Clustering techniques are efficient, fast and accurate. This paper presents the two efficient image segmentation algorithms i.e. K-means and region growing techniques for brain MRI images and compare the two algorithms and determine the best one.

Brain Wave Monitoring By Using Open Source Tools

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

A. H. Pudale | Komal Chandiram Jeswani, Priyanka Omprakash Tapadiya, Sonali Madhukar Kadam, Rama Sambhaji Kambl

Abstract

People have no control over their mental state which may change depending on the circumstances. Therefore monitoring these changes is really important in case of a person suffering from depression, or mental disorder. We aim at developing an android application that will monitor the brain waves and provide an appropriate mental condition depending on the values of the waves obtained. We are developing an android application using android studio and interfacing it with arduino board and EEG sensors using bluetooth. Existing system makes use of this technique just for moving objects depending on the value of the waves. Also existing system monitors the mental condition by using facial expressions, heart rate, body temperature and gestures. There does not exists any application which will allow the users to see their mental condition not in the form of just graph but also actual condition after analysing these graph values. In our project we directly attach the sensors to the head so that we get correct brainwaves. So, that we can monitor and provide an appropriate graph and estimated result.

Captcha as a Graphical Password Authentication System (CaRP)

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Archi Gaikwad | Bijal Parekh, Medha Kona , Shweta Bramhane

Abstract

We face many security breaching issues for our desktop applications and online services. Many internet applications commonly use text based passwords for authentication. Text based passwords are prone to many attacks such as online guessing attacks , relay attacks ,shoulder surfing and are usually hard to remember. Graphical password proves to be a much better alternative to overcome these attacks. This paper introduces the use of Captcha as Graphical Password- CaRP to enhance the security at the time of login. CaRP is the combination of both graphical password and captcha technology. This system allows the user to select different visual login schemes. CaRP is one of the reasonable solutions that provides added security

Challenges and Issues in Big Data Era- A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shony KM | Navaneeth Krishnan K,Daniel F Netto

Abstract

Big Data analytics have significant promises in this era of information explosion. Cloud computing, ecommerce , social networking etc. are enhancing importance of big data. However, there are a number of challenges that must be overcome to realize its true potential. Big Data analytic systems use cluster computing infrastructures that are more reliable and available as compare to traditional security analytics technologies. Big data absolutely has the potential to change the way governments, organizations, and academic institutions conduct business and make discoveries, and it is likely to change how everyone lives their day-to-day lives. This will constitute its future scope.

Characterisation of Jute, Areca and Glass Reinforced Polymer Composite

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Muhsin M P | Abee Narayan , Arjun Vijaykumar P,Aboobacker Siddiq KV,Channakeshava R

Abstract

Composite material market is exponentially growing and finding its application in almost every walks of life. Here we prepared three composites of different stacking sequences and fibre reinforcement for our experiment. We have used areca, jute and glass fibres for making a composite with epoxy as resin. Our composites had ten layers of fibre of different stacking sequence for every specimen. Hand layup technique was used for preparing the material. Compression moulding was done on the stacked laminates and the final product was measured to be 30x30x3 mm. the composite then was converted different specimens as per ASTM standards. The tensile and flexural test was done for every combination of specimen and in three different combinations jute+glassfibre reinforced matrix was found to have more tensile and flexural properties. Graphical results were obtained for the tests and analysed and final result was drafted.

Classification of Time Series Trajectories Based on Shape Features using SVM

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Gajanan S. Gawde | Jyoti D. Pawar

Abstract

Classification of time series trajectories is a non trivial problem and few researchers have contributed to this field. Time series trajectories such as Character trajectories, ECG trajectories, Stock Exchange Trajectories need to be classified accurately in order to improve the performance of system. The classification of time\ series trajectories is carried out using different techniques such as Neural networks, Support vector machines, Fourier Transforms and Bayesian Network. Most of the existing classification techniques work on simple features such as co-ordinates, distance, and velocity. These techniques are not able to consider shape features of trajectories and classify the test trajectories. Shape of the time series trajectory is an important feature and can be used in the classification method. A support vector machine is better classification technique compared to the existing techniques. In this paper, we have proposed our novel classification method to classify time series trajectories using SVM with shape as the feature vector for classification purpose. Thorough experimental study was carried out on proposed technique with different datasets. Experimental results shows that SVM technique is better compared to Neural Network, Fourier Transform, Bayesian Network. SVM with shape features is efficient compared to SVM without shape features. We have tested SVM with different kernel functions. Our experimental results show that RBF SVM with shape features method is efficient compared with Linear and Non Linear kernels.

Climate Responsive Smart Homes

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ar.Rashmi Tijare | Ar.Nikhil Wasade

Abstract

Home Automation is a multidisciplinary. It involves almost all branches of science & engineering. While learning in the urban context of residential design it was realized that the standard of living in terms of quality has come down. Quality, not in terms of material and standard of living or technology, but in terms of the feature of space. Further exploring this topic lead to, the Automation of Building parts so as to suit climate of the region and act smartly according to climatic situation. The study further extends and develops a series of modifying and adaptive elements for residential spaces that are responsive to the climate, lifestyle and its effect.

Clustering of Labeled And Unlabeled Data By Integrating Pre And Post Clustering Approaches

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr.Asadi Srinivasulu | Dr.Ch.D.V.Subbarao,I. Muralikrishna

Abstract

Clustering is the process of organizing objects into groups whose members are similar in some way or differ significantly from other objects. There are two approaches viz., pre-clustering and post-clustering. Pre-clustering is an unsupervised learning that assigns labels to objects in unlabeled data. The important pre-clustering approaches that we have considered are Dark Block Extraction (DBE), Cluster Count Extraction (CCE) and Co-VAT (Visual Assessment of Cluster Tendency). The present work focuses on pre-clustering approach. The limitations of these pre-clustering algorithms are i) DBE can’t handle the large data ii) CCE suffers because of perplexing iii) Co-VAT works with only rectangular data. Our work proposes Extended Dark Block Extraction (EDBE), Extended Cluster Count Extraction (ECCE) and Extended co-VAT to overcome the above said limitations. The following five steps results after integrating pre and post clustering approaches. They are 1) Extracting a VAT image of an input dissimilarity matrix. 2) Performing image segmentation on the VAT image to obtain a binary image, followed by directional morphological filtering. 3) Applying a distance transform to the filtered binary image and smoothing the pixel values on the main diagonal axis of the image to form a smoothening signal. 4) Applying first-order derivative and fast fourier transformation on smoothened signal for detecting major peaks and valleys. 5) Now post-clustering approach i.e. k-means algorithm is applied to the major peaks and valleys in-order to obtain refined clusters. The proposed algorithms viz., EDBE, ECCE and Extended Co-VAT uses VAT as well as the combination of several image processing techniques are applied on various real world data sets like IRIS, WINE and Image Data sets. These extended approaches use Reordered Dissimilarity Image (RDI) that highlights potential clusters as a set of 'Dark blocks' along the diagonal of the image. The simulation results show that EDBE, ECCE, Extended co-VAT outperform DBE, CCE and co-VAT in terms of time-complexity and accuracy of labeled and unlabeled data.

Collective Activity Recognition Using NaÔve Bayes Classifiers

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Salini. S | Prof.V.S. Mahalle

Abstract

Collective activity recognizing is the action of collecting the individual personís activity and it is distinguished as an atomic activity in isolation. In this paper, our work is based on the object detection and object recognition (ie) tracking is done for a given input video frame. The collective activity computes the class-specific person to person interaction patterns. The multiinteraction response proposed a activity Ė specific pattern for each interaction at the same time Naive bayes classifier is used to track the object and the tracked result is feed back into the recognition part to find category of an object and it is the final result.

Combating Mind Wandering in The Area of Academics

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Tanu Varshney | Priyanka Chaudhary, Priyanka Tripathi , Neha Tyagi

Abstract

This paper presents how the wandering mind is linked to the field of academics. We are also going to talk about how can we interpolate memory test in reducing mind wandering. We also mention here the strategies to train our brain. Here we devise the measures to combat mind wandering during studies i.e. Learning Mental Self-Regulation for improved concentration and arranging factors that you can immediately control your mind. Also we will focus on two applications that can be built to study mind wandering.

Combined Economic Load and Emission Dispatch using Cuckoo Search Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

MCV Suresh | Dr. Shaik Rafi Kiran

Abstract

This paper presents an application of cuckoo search algorithm for multi-objective optimization problem in power system. Considering the environmental impacts that grow from the emissions produced by fossil-fuelled power plant, the economic dispatch that minimizes only the total fuel cost can no longer be considered as single objective. Application of cuckoo Search algorithm in this paper is based on mathematical modelling to solve economic, emission and combined economic and emissions dispatch problems by a single equivalent objective function. cuckoo search algorithm has been applied to two realistic systems at different load condition. Results obtained with proposed method are compared with other techniques presented in literature. Cuckoo Search algorithm is easy to implement and much superior to other algorithms in terms of accuracy and efficiency.

Constant-size cipher text in Cloud computing‚ÄĚ

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Kulkarni O.S | Miss. Jasud D.S,Miss. Gunde P.R,Mr.Chavan A.B,Mr. Patil R.M.

Abstract

Cloud computing refers to the practice of transitioning computer services such as computation or data storage to multiple redundant offsite locations available on the Internet, which allows application software to be operated using internetenabled devices. Clouds can be classified as public, private, and hybrid. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Since the cloud computing environment is distributed and un trusted, data owners have to encrypt outsourced data to enforce confidentiality. To achieve practicable access control of encrypted data in a un trusted environment is an urgent issue that needs to be solved. Attribute-Based Encryption (ABE) is a promising scheme suitable for access control in cloud storage systems. This system proposes a hierarchical attribute-based access control scheme with constant-size cipher text.

Copy- Move Forgery Detection Using Passive Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

U. Neha | K. Priyadharshini, M.Priyanka, K.Kiruthika

Abstract

An extensive growth in digital technology has resulted in tampering of image. Image plays an important role in todayís digital world. Powerful image editing tools has made it difficult to determine whether the image is authentic or forged. The main objective of this paper is to detect the forgery in which a part of the image is copied and pasted on to same image without the information of the original image. First, the forged image is segmented. With the help of SIFT features, key points are extracted. The matching process of these key points detects the copy move region.

Cost Effective Voice Controlled Home Automation Using IoT

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Abdul Aziz Md | K Harshasri, K Shanmukharao

Abstract

The Internet of Things is emerging technology as the third wave in the development of the internet. Internet of Things (IoT) is expected to have massive impact on consumer products, business, wider culture, but these are still early days. It has potential for very wide applicability to almost all verticals and aspects of business, industries, manufacturing, consumer goods, supply chains, etc. IoT as a whole is very broad area. This paper focuses specifically to design a voice controlled home automation system which makes operating electrical appliances in home through android application and set up the controlling actions in the mobile. The Bluetooth technology devices are used for home automation in a cost effective manner.

Credit And Debit Card Transaction Survey Using Map Reduce In Hdfs And Implementing Syferlock To Prevent Fraudulent

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

R.Anbuvizhi | V.Balakumar

Abstract

Big DataĒ is a term that has jumped overnight from its roots. It can be described as an innovative technique and technology to save, distribute, manage, visualize and analyze larger-sized data with extreme velocity and methods to manage unstructured and structure incapable amount of data. Nowadays fraud transactions in real time are increasing, so identifying large-scale patterns across many transactions or detecting anomalous behavior from an individual user can change the fraudulent in online transaction. Thus banks are turning to analytics to predict and prevent fraud in real times. In this project, proposed system deals with Credit and Debit card management to improve its scalability and efficiency in big data environment, it is implemented on (HDFS) Hadoop distributed file system. On the other hand, nowadays fraudulent and web attacker are increased to steel the password. In order to overcome those, proposed system implements SyferLock concept to add more security to Credit card transaction. The changes include a stronger user authentication tool, SyferLock that will require associates to follow a few new steps when logging into the network remotely. SyferLock patented, random number generation authentication solutions provide next generation One-Time Passwords/PINs (OTPs) for secure access to computers, networks and the Internet. SyferLock has engineered an enhanced authentication methodology and system using device-less OTPs that provides users with a simple, more secure way to access information leveraging their existing passwords. It uses a one-time password that expired once used. This added security strengthens the ability to protect the applications and systems.

Crop Field Analyzer

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Athawale Kiran M. | Shikhare Abhilash D., Dhotre Akash S. , Dhawale Sudarshan U

Abstract

A cloud-enabled mobile app plays an essential role in improving farming activities. This paper focuses on using cloud computing and the Wireless Sensors Network (WSNs) technology to enhance the application and its benefits to the field of agriculture. The paper focuses on the Cloud Database as well as Data Mining which gives details of past agriculture work records of farmers. The farmers who have inserted the system and installed the application on their Smartphones can register the application so that they can access as well as upload the data stored on the server and use the system efficiently. Temperature, Humidity and Soil moisture will be the various WSN's used. The main purpose of the sensors are to sense and measure the environmental parameters and data from the fields. The farmer will get the notifications of condition in his field by these sensors. When the water level in the field reduces, the farmer will get notification, so that he can power ON the motor through his Smartphone. The motor will get power OFF automatically when the sufficient water supply is provided in the farm up to the threshold or particular value. The main objective is to minimize the efforts and time of farmer and perform efficient and systematic farming to increase productivity.

Current Status: Comparative Analysis Of Optimization Techniques Used In Steganography Schemes

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Samadrita Guha | Dipti Kapoor Sarmah

Abstract

Steganography has been used immensely in various fields to maintain the confidentiality and integrity of messages transferred via the internet. The need to hide messages has increased with the increase of fraudulent activities in the cyber space. To diminish the number of such cyber crimes a number of optimized and advanced steganographic schemes have been invented by researchers. This paper presents a comparative analysis among the various optimization techniques that have been applied to steganography to achieve better results in terms of quality, capacity and security of stego objects. All the results compared in this paper have been obtained from the application of optimization techniques on gray-scale images and 2- Least Significant Bit (2- LSB) substitution method .Optimization techniques compared in this paper include Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Genetic Algorithm (GA) and also hybrid optimization techniques like PSO-GA, PSO-ACO, GA-ACO. This paper also mentions which optimization technique is best suited for spatial domain image steganography, frequency domain image steganography, watermarking and security against steganalysis techniques based on the studies of research work done previously. The limitations of each optimization technique are provided in this work to help researchers decide which technique to apply in a specific steganography scheme to obtain best results.

Data Gathering and Route Optimization Protocol for Mobile Sink in Wireless Sensor Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th June 2017

B.Bhuvaneshwari | Dr.G.Anna Poorani, V.M.Priyadharshini

Abstract

Wireless sensor networks are the grouping of tiny sensor node collects the information by sensing activeness from the surroundings. The way the sinks are not move freely in the deployed space. The pre-calculated trajectories may not applicable. To avoid this constant sink location updating, by using mobile sinks rather than static for data collection is the proposed system. This project is focusing on moving patterns of the mobile sink to achieve optimized network performance, and also collecting a small area of sensed data in the network.

Data Mining on Privacy Protected Data using Na√Įve Bayes Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Pankaj Jogi | Mr.Shubham Purankar, Ms. SamikshaPinge,Ms. Urvashi Ingale,Ms. Neha Mahalle,Prof.V.S. Mahalle

Abstract

Data mining has become an essential player in determining future business strategies. Data mining helps identifying patterns and trends from large amount of data, which can be used for reducing cost, increasing revenue and many more. With increased use of various data mining technologies and larger storage devices, amount of data collected and stored is significantly increased. This data contains personal information like credit card details, contact and residential information, etc. All these reasons have made it inevitable to concentrate on privacy of the data. In order to alleviate privacyconcerns, a number of techniques have recently been proposed to perform the data mining in privacy preserving way

Decentralized Trust Management and Trust Worthiness of Cloud Environments

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Qhubaib Syed | Syed Afzal Ahmed,Syed Abdul Haq

Abstract

Now days, cloud computing an ever green technology used by all segment of areas. To choose best cloud service providers trust is an important factor in growing cloud computing. The highly dynamic nature of cloud system services throws different challenges on privacy, security and availability. The communication between consumers and trust management system involves sensitive information that makes the privacy is an important factor. Protecting cloud services from malicious users is a difficult problem. During this paper we tend to planned a brand new approach Cloud Armor, a reputation-based trust management framework that has a collection of functionalities to deliver trust as a service (TaaS), which incorporates i) a completely unique protocol to prove the believability of trust feedbacks and preserve users’ privacy, ii) An adaptive and strong believability model for measure the believability of trust feedbacks to shield cloud services from malicious users and to check the trait of cloud services, and iii) an accessibility model to manage the provision of the redistributed implementation of the trust management service. The practicability and edges of our approach are valid by an example and experimental studies employing assortment of real-world trust feedbacks on cloud services

Deep Web and Dark Web

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Chandra Shekar N | Sugali Vijay, M Balachandra Reddy

Abstract

the Deep Web refers to any Internet content that, for various reasons, can’t be or isn’t indexed by search engines like Google. Which includes dynamic web pages, blocked sites (like those that ask you to answer a CAPTCHA to access), unlinked sites, private sites (like those that require login credentials), non HTML/-contextual/-scripted content, and limited-access networks

Design Analysis of Spoke Type BLDC Motor for Spinning Mill Application

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Shamphavi.S | Manimala.R , Prashanthi.R , Kurinjimalar.L

Abstract

To design a motor that would overcome the drawbacks of the conventional spinning motor and to evaluate the characteristics of the chosen motor with the help of software packages from Infolytica. The motor which is currently used is three phase Totally Enclosed Fan Cooled Squirrel Cage Induction Motor (TEFCSCIM).The motor employed in the spinning machine undergoes partial loads during most of its operating hours.It is noted that the motor efficiency and power factor are poor in the case of partial load. Heat, Sound and Slip of the motor are few factors to be considered for the change in design. The objective of this project is to design a Permanent Magnet Brushless Direct Current (PMBLDC) Motor which would eliminate the above complications. Initially the design has to be analytically arrived and the same has to be scrutinized through the software packages from Infolytica.Critical key parameters such as speed, average and cogging torque has to be accounted in the analysis. Generally, the cogging torque increases with increase in average torque and hence there is a need to modify the rotor parameters such that the former remains low for significant increase in the latter. The software analysis and comparison will be followed by the final design of the spinning motor. We concentrate mainly on the effects of temperature. Temperature is of main concern because more cool the motor is, more efficient it is.

Design and Development of RF energy sensing Circuit Using ADS software

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

V. Sai Kiran | P. Vinay Kumar,Yogesh Kumar Choukiker

Abstract

This article mainly focuses on study of RF energy Sensor circuit. We are surrounded with enormous Radio frequency signals, mostly varying in the range of 1 GHz to 3.5 GHz. An RF energy sensing Circuit has been designed, In Advanced Digital Simulation software, to detect the level of signal at a particular frequency and converting RF energy into voltage levels. In order to restrict our circuit to a particular frequency, we have designed a Helical Antenna as a receiver which can send RF power to designed circuit. This antenna is designed with particular dimensions such that it has minimum reflection coefficient at desired frequency, allowing only a particular frequency to reach RF sensing circuit.

Detection and Diagnosis of Diseases in Cotton Leaf Using Knowledge Based Expert System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Miss.Sonali Borikar | Miss.Pallavi Khedekar,Miss.Darshana Jangam, Miss.Pallavi Paratwar, Mr.Ketan Bodhe

Abstract

The economy of India is based on agriculture as it is the backbone of the rural livelihood security system. The cotton is mostly used by world and grown in more than 100 countries accounting for 40% than any other fiber of the world fiber market. As managing diseases in cotton crop is a challenging task and cotton crop production in India is important.This propose system focuses on maximizing the cotton crop production, this is the main purpose of this project. Sometimes farmers identify diseases by their experiences with the naked eyes and due to incorrect identification, there will be the possibility incorrect control measurement. By using this propose system farmers can identify cotton crop diseases in early stages & also they are known to the particular diseases of cotton crop. The system is specially proposed for the controlling the diseases in cotton plant. Here the system is consisting of the Knowledge Based Expert System and the inference engine. The inference engine applied logical rules to the knowledge base and obtain the result for detection of diseases.

Detection of Clone Attack in Wireless Sensor Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Vishakha Pawar | Seema Hanchate

Abstract

These Recent trends of wireless communication is Wireless sensor network,this is upcoming technology which has enabled the development of network with huge number of tiny, low power, multitasking sensor nodes. As WSN has broadcast approach, there is a need of security Wireless sensor networks (WSNs) are now used as supporting infrastructure in many applications. Secure communication in WSNs is very important because information sent through these networks can be easily captured or replaced or altered. Clone attack is node replication attack. An adversary can steal a node from the network and altered data from stolen node and can reprogram that node to create a clone of a stolen node. To protect network from clone attack is vital in WSN. The main objective of proposed clone detection protocol is to provide strong protection against clone attacks, high detection probability, low storage requirements with enhanced network lifetime by increasing energy efficiency with distributed detection mechanism.

Detection of DOS Attacks through Evidence Collection using Dempster-Shafer Theory

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Shradha S. Ippakayal | Geetanjali S. Dhaygude, Vinaya P. Kalyanshetty, Prof. M.N.Ingole

Abstract

MANETs has been experiencing exponential growth in the past decade. Due to their vulnerability to various attack makes extremely prominent for its distributed and independent nature. Among these various DOS attacks black hole, grey hole, and co-operative black hole attack may collapse the network, and this may become a major threat in MANETs. Here we are using Dempster-Shafer evidence based theory to collect various evidences for various nodes in the network against black hole and grey hole attack. For detecting malicious node we used Direct Trust Value (DTV) to detect a single black hole attack. DTV is calculated for each node that exists in the network and then that value is compared against predetermined threshold, if the calculated value is less then predetermined threshold then the node is malicious node.

Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Abubakar Siddiq Ango | Abdulsalam Waheed Abdulfatah, Idrissa Djibo

Abstract

Tourism has been noted to be one of the important sectors of the Nigerian economy. Tourism is a highly complex activity which requires tools that aid in an effective decision-making to come to terms with the competing economic, social and environmental demands of sustainable development. Geographic Information System (GIS) is one of such tools. GIS being an information system that is capable of answering questions about where facilities and resources are located represents enormous benefits to the tourism sector of any economy. The power of GIS lies not only in the ability to visualize spatial relationships, but also beyond the space to the holistic view of the world with its many interconnected components and complex relationships. The use of GIS technology could assist Bauchi State government as well as the Nigerian government with better planning of tourism infrastructure, location and dissemination of such infrastructure, production of better quality maps showing tourists sites abound in the country because of the dynamic capability of GIS tools to incorporate changes that occur over time to its database. A GIS database for tourism in Bauchi State was created using some selected roads, tourist attractions and facilities with the aid of base maps and GPS. This paper presents the significant role that GIS can play in tourism development in Bauchi State if a complete database for tourism in the State is designed and developed.

Development of Natural Language Interface to Voice Control Smart Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

D.Sucharitha | Dr.M.Humera Khanam, K.Ravi kishore,G.Divya

Abstract

Development of smart home technology changed the human living conditions greatly. In smart home we can control and automate the lighting, heating, ventilation and air conditioning by voice. System can change the state of devices. For remote monitoring of devices we use Wi-Fi of IOT( Internet of Things).In this paper, we provide a natural language interface to control the smart devices, by speaking in the own language. It uses microphone to collect the speech signals and object recognition technology to locate the target object. Finally, SRM (Speech Recognition Module) can communicate with the central control program by socket.

Digital Image Watermarking Using QR Code

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Sumedha Nishane | Prof. V. M. Umale

Abstract

In this science era with the development of technology and internet, the protection and authentication of data is essential. Watermarking techniques provide solution to this problem. QR code being so versatile because of its structural flexibility that it leads to so many diverse field for research such as increasing data capacity, security applications such as different kinds of watermarking . We have used QR code as cover image and as secret image to protect it from other users. This paper is representing a new watermarking technique with QR code to protect the secret image. In the method described here the image is first encrypted in random matrix, then it is invisibly watermarked in cover image and no information about the secret image and cover image is needed for extraction of secret image, so it more secure.

Digitalization of Medical Prescription and Localization of Healthcare Products

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

R. Ganesan | E. Kughan , R. Sanjay, S. Arun Karthikeyan

Abstract

This project enables the doctors to send prescription digitally to the patients who are not able to visit the doctor in person and also allows the patients to check the availability of medical products in nearby pharmacies. The conventional way practised by doctors is to write the prescription using pen and paper and also the patient may not know about the availability of these medical products in nearby pharmacies. The use of pen and paper for medical prescription is not encouraged because the prescription might get damaged, lost over duration of time and no further automations/computations cannot be done that limits the scope of pervasive healthcare system. During emergency situations, the patient might not get the prescribed medical products due to lack of availability in nearby pharmacies which lead to severe health issues. This project digitalizes the prescription given by the doctors and also guides the patients to the nearby pharmacies which contain the required quantity of medicines and other medical products. Due to this digitalization of medical prescription, the patients suffering from severe ailments might not strain themselves to consult the doctor in person. This project also enables the user to check for the availability of the required medical products in the nearby pharmacies using GPS and Google Maps implemented in Android platform. It uses an ranking algorithm to enhance the quantity of information which is fetched from the database and presented to the patient. The ranking also uses a credit-based system, which weightage to rating given in recent years. The uniqueness of the project is to design low cost pervasive healthcare inventory automation system.

Disease Inference System based on Health-Related Question Answer system

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Paresh Karande | Manoj Khairavkar, Vinayak Lokhande, Khemchand Mahajan , Rupali Umbare

Abstract

Health is one of the expanding subjects used for assessing health condition among patients who suffer from specific ailment or diseases. We aims to model the relationship between the Health variables using integrated model of inference system and linear regression. Linguistic data were collected by a guided interview and fed into the deep sparse inference system to yield Health indices. We next propose a novel significant learning plan to surmise the conceivable maladies given the inquiries of wellbeing seekers. The proposed plan is embodied two key parts. The main part mines the discriminant therapeutic marks from crude elements. The second esteems the crude components and their marks as info hubs in one layer and concealed hubs in the consequent layer, individually. In the interim, it takes in the between relations between these two layers by means of pre-preparing with pseudo-marked information. Taking after that, the shrouded hubs serve as crude components for the more unique mark mining. With incremental and option rehashing of these two segments, our plan manufactures a scantily joined profound construction modelling with three shrouded layers.

Disruptive Technologies

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Chandra Shekar N | K Anjali, A Pavithra

Abstract

the term "disruptive technology" as coined by Christensen (1997) refers to a new technology having lower cost and performance measured by traditional criteria, but having higher ancillary performance. Christensen finds that disruptive technologies may enter and expand emerging market niches, improving with time and ultimately attacking established products in their traditional markets. This conception, while useful, is also limiting in several important ways. By emphasizing only "attack from below" Christensen ignores other discontinuous patterns of change, which may be of equal or greater importance (Utterback, 1994; Acee, 2001). Further, the true importance of disruptive technology, even in Christensen's conception of it is not that it may displace established products. Rather, it is a powerful means for enlarging and broadening markets and providing new functionality. In Christensen's theory of disruptive technology the establishment of a new market segment acts to channel the new product to the leading edge of the market or the early adopters. Once the innovation reaches the early to late majority of users it begins to compete with the established product in its traditional market.

Disruptive Technologies

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Chandra Shekar N | K Anjali, A Pavithra

Abstract

the term "disruptive technology" as coined by Christensen (1997) refers to a new technology having lower cost and performance measured by traditional criteria, but having higher ancillary performance. Christensen finds that disruptive technologies may enter and expand emerging market niches, improving with time and ultimately attacking established products in their traditional markets. This conception, while useful, is also limiting in several important ways. By emphasizing only "attack from below" Christensen ignores other discontinuous patterns of change, which may be of equal or greater importance (Utterback, 1994; Acee, 2001). Further, the true importance of disruptive technology, even in Christensen's conception of it is not that it may displace established products. Rather, it is a powerful means for enlarging and broadening markets and providing new functionality. In Christensen's theory of disruptive technology the establishment of a new market segment acts to channel the new product to the leading edge of the market or the early adopters. Once the innovation reaches the early to late majority of users it begins to compete with the established product in its traditional market

DYNAMIC SECURE SYSTEM FOR DETECTING AND ELIMINATING FRAUDULENCE IN CLOUD STORAGE

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Kalaivani A | Ranjith Kumar M , Sabarish M , Sai Kishore R

Abstract

When data is hosted by data owners and made available to clients, security challenges are faced. Thus, we need to audit the data to solve security challenges. Existing remote integrity checking methods can only serve for static archive data. Thus, cannot be applied to the auditing service since the data in the cloud can be dynamically updated. Hence, a dynamic System is desired to ensure that the data are correctly stored in the cloud. In this Paper, we create a monitoring tool that detects fraudulent using link analysis and checks for similar details among multiple databases will be created. As there is no interlinking between different banks database an individual can create many accounts with different identity proofs So that they can do malicious activities in the network. To avoid this we use link analysis for finding similarity link in the entire combined cloud stored database. It uses Joint Threshold Administrative Model (JTAM) for authenticating database storage and handles fault tolerance effectively using the monitoring tool

Economic Load Dispatch Problem With Valve - Point Effect using Cuckoo Search Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

MCV Suresh | M Jyothsna Devi, K Prathibha

Abstract

This paper proposes application of cuckoo search algorithm for solving economic load dispatch problem. cuckoo search algorithm is based on aggressive reproduction strategy of fascinating birds, cuckoos. The proposed approach has been examined and tested with the numerical results of economic load dispatch problems with three and five generating units with valve point loading without considering prohibited operating zones and ramp rate limits. The results of the proposed cuckoo search algorithm are compared with that of other techniques such as lambda iteration, and ABC. For both the cases, the proposed algorithm outperforms the solution reported for the existing algorithms. In addition, the promising results show the robustness, fast convergence and efficiency of the proposed technique

Efficient Bandwidth and Space Utilization Using Object Based Deduplication on the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms. Uzma madeeha |  Smt. Shabana sultana

Abstract

As cloud computing is mostly used domain now a days, keeping the cloud limitations in mind we try to efficiently utilize the cloud resources by applying basic optimization techniques. Since text data occupy very small space compared to images or multimedia files in general, we come up with some space optimizing and de-duplicating schemes. Instead of traditional techniques of block level de-duplication, we implement a technique where the images are divided into blocks and are given unique hash id and stored in ind ex table. Now instead of sending entire object onto cloud for comparison, we send only index table to check for duplicate entries and eliminate them. This way the bandwidth is very efficiently utilized compared to traditional schemes and also optimizes space utilized in cloud storage systems.

Emotion Analysis of Social Media Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sonia Xylina Mashal | Kavita Asnan

Abstract

Emotion analysis in text is a trending field of research that is closely related to Sentiment analysis. With the increase of Internet connectivity, all the human interactions has moved to the social media platforms hence a lot of data can be tapped for research purposes. Emotion analysis is carried to study the writer‚Äôs state of mind. In this paper social media data is classified into five emotion categories (happy, sad, anger, fear and surprise) using supervised machine learning techniques(Na√Įve Bayes and Support Vector Machine).

Energy Saving Strategy in Cognitive Radio Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

S.Swathy | Y.Vanmathi,G.Sindhiya, J. Daphney Joann

Abstract

In recent years, the development of intellectual, adaptive wireless devices termed cognitive radios, composed with the introduction of secondary spectrum licensing, has led to a new hypothesis in transportations: cognitive networks. Cognitive networks are wireless networks that consist of several types of users: often a primary user (the primary license-holder of a spectrum band) and secondary users (cognitive radios). These cognitive users employ their cognitive abilities to communicate without spoiling the primary users. The study of cognitive networks is comparatively new and many queries are yet to be responded. In this article we best part some of the recent information theoretic limits, models, and design of these auspicious networks.

Enhanced Active Feature Selection method for Object Tracking

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Sandeep G.S | Sunitha M R , Niranjan Murthy C

Abstract

The key idea of Adaptive tracking is how to train an online discriminative classifier which can well separate object from its local background. The classifier is incrementally updated using positive and negative samples extracted from the current frame around the detected object location. If the detection is less accurate thereby leading to visual drift. Recently, the multiple instances learning (MIL) based tracker has been proposed to solve these problems to some degree. It puts samples into the positive and negative bags, and then selects some features with an online boosting method via maximizing the bag likelihood function. Finally, the selected features are combined for classification. In MIL tracker, the features are selected by a likelihood function, which can be less informative to tell the target from complex background. Motivated by the active learning method, in this paper we propose an enhanced active feature selection approach which is able to select more informative features than MIL tracker by using the Fisher information criterion to measure the uncertainty of classification model. More specifically, we propose an online boosting feature selection approach via optimizing the Fisher information criterion, which can yield more robust and efficient real-time object tracking performance. Experimental evaluations on challenging sequences demonstrate the efficiency, accuracy and robustness of the proposed tracker in comparison with state-of-the-arts.

Enhanced Multi-Keyword Ranked Search Manipulations via Cloud Virtualization

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

S.Uma Maheswari | p.priya ponnusamy, dr.r.vidhyapriya

Abstract

The enhancement and the fame of cloud computing are increasing nowadays which is driving the data owners to keep their personal and professional data on public cloud servers With the help of data outsourcing the organizations can provide reliable and efficient services to their users. The other advantage of outsourcing the data over cloud servers is for high benefit and lesser cost in managing the data and the data can be accessed from anywhere and at any time. However, for privacy concerns, the data that are highly sensitive should be encrypted before outsourcing. Taking into consideration the huge amount of data users and files that are present in the cloud, it is important that multiple keywords should be allowed in the searching request and retrieve the files relevant to those keywords. There are some methods and solutions offered to provide privacy and security for the data over the cloud server. However, the data that are sensitive should be encrypted and stored before outsourcing. In this paper, a secure scheme called the enhanced multi-keyword ranked search is presented. In the proposed scheme the search takes place as content based search along with ranking. Based on the content, data is searched and retrieved and then the rank is applied. During searching, attacks might be done by SQL injection to dump the database contents by the unauthorized users or attackers. In this project SQL injection is not allowed. The SQL parameterization technique is used to prove that SQL injection is not possible

ESPY: A Work Monitoring Solution by Facility Mapping of Smart Cities

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Tejashree S. Dhengre | Rishika S. Dubey, Gopal R. Mishra,Swapnil M. Meshram

Abstract

As per the concept of Smart City to provide efficient urban mobility and affordable housing facility, a lot of construction work has begun at different geographical points to turn this concept into reality. Work monitoring of Construction Company by higher government authorities is necessary to get work done quickly, get daily updates and prevent corruption. For this work Construction Company has Site supervisors who provide weekly or monthly updates but process is manual and time consuming. Also, with lots of Construction going on, citizens face severe problems which requires immediate attention of officials. To have an easy interface between Site Supervisors and higher officials of government and also between common people and government we aim to create an Android Application named ‚ÄúeSPY‚ÄĚ which will give facility to Site supervisors to daily report the work progress to authority online or offline along with necessary proofs such as geo-tagged image of work done that day, details of expenditure etc. Citizens can use the App to register complaints regarding construction work at any location causing problems. On the other end, a website will be provided to officials for receiving proper report in specific pre-determined format for saving time and quick action. Officials can view received geo-tagged image or can establish a real time video connection to quickly monitor work at various sites. For establishing the connection between Android application and website, WebRTC as technology is used which will provide easy connectivity, less data and efficient offline support

Extending the functionality of Android Clipboard Manager

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Amol D. Gaikwad | Pratik R. Tambekar, Pankaj R. Hatwar,Swapnil R. Ramtekkar

Abstract

Clipboard is a software facility used for short-term data storage and/or data transfer between documents or applications, via Copy and Paste operations. The standard built in clipboard of android operating system store only one item at a time so that it provide speedy access to such content normally android clipboard has disadvantages firstly it store only one item at a time and secondly when you turn off system it clears memory. My goal is to eradicate the problems of standard clipboard of Android OS to developed such App that it contains buffer which is located on System Memory and it is permanent storage need not worry about lost of data. Whatever user copy data that copied is maintained or stored in their respective buffer. When I am going to perform paste operation it will populate all respective copied buffer data you have to just select the desired data that you want to paste it save user time and increase the efficiency.

Extraction Of Object In Multiviews Based On LDA Approach

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Geeravani | Dr. P.Mohanaiah

Abstract

Linear Discriminant Analysis (LDA) is most commonly used as dimensionality reduction technique in the pre-processing step for pattern-classification and machine learning applications. The goal is to project a dataset onto a lower-dimensional space with good class-separability in order avoid over fitting (‚Äēcurse of dimensionality‚ÄĖ) and also reduce computational costs. Ronald A. Fisher formulated the Linear Discriminant in 1936, and it also has some practical uses as classifier. The original Linear discriminant was described for a 2-class problem, and it was then later generalized as ‚Äēmulti-class Linear Discriminant Analysis‚ÄĖ or ‚ÄēMultiple Discriminant Analysis‚ÄĖ by C. R. Rao in 1948 The general LDA approach is very similar to a Principal Component Analysis (for more information about the PCA, see the previous article, but in addition to finding the component axes that maximize the variance of our data (PCA), we are additionally interested in the axes that maximize the separation between multiple classes (LDA). So, in a nutshell, often the goal of an LDA is to project a feature space (a dataset n-dimensional samples) onto a smaller subspace kk (where k‚ȧn‚ąí1k‚ȧn‚ąí1) while maintaining the class-discriminatory information. In general, dimensionality reduction does not only help reducing computational costs for a given classification task, but it can also be helpful to avoid over fitting by minimizing the error in parameter estimation (‚Äēcurse of dimensionality‚ÄĖ).

Forest Monitoring System Using Wireless Sensor Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

G.Aaroma | B.Clinton David, S.T.Priyanka, P.T.Subasini

Abstract

The Wireless Sensor Network is used in the field of automation, home appliances and security. The proposed system enables the integrated use of Mercury Tilt Sensor, vibration sensor, temperature and humidity sensor, pressure sensor and CO gas sensor incorporated into trees for the sensing of events in the natural environment. The wireless RF module enables the communication between the cluster node, the node and the control centre. This helps monitoring and detection of tree theft and disasters like forest fire protecting the natural environment. This article presents the interface and network topology of the wireless sensor network and their advantages.

Fuzzy Opinion Mining for Product Recommender System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Aarti Bandodker | 

Abstract

Over the last few years, opinions are voiced in the form of blogs, tweets, social media and review over the web. These opinions do matter, as, we always consider other persons view in our decision making process. Proposed fuzzy technique finds out how positively or negatively the masses have responded to the launched product, based on voiced opinions. Using a supervised rule based technique, fuzzy values are assigned to opinions, to know the measure of its positivity or negativity. Steps involve, first mining the opinion about the product from ecommerce sites. Then extraction of the opinion phrases as per pre-defined phrase patterns. Next, assigning of fuzzy weights to the opinion words using SentiWordNet and measuring the strength of opinion phrases. And, finally summarization of people’s views to yield product recommendation. Proposed fuzzy technique is an enhancement over the existing opinion mining techniques which does binary polarity determination.

Garbage Collection System Using IOT

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Samir Atkar | Abhishek Aryan, Pallavi Bhoyar,Ashiya Malak,Prof. S. K. Narad

Abstract

The method of connecting the objects or things through wireless connectivity, Internet called Internet of Things. Nowadays a variety of tasks are based on IOT. Cities in the world are becoming smarter by implementing the things around using IOT. This is a new trend in technology. One of the objectives of smart cities is keeping the environment clean and neat. This aim is not fulfilled without the garbage bin management system. Hence the paper ‚ÄúIOT Based Intelligent Bin for Smart Cities‚ÄĚ has been developed. Bin management is one of the major applications of IOT. Here sensors are connected to the all the bins at different areas. It senses the level of garbage in bin. When it reaches threshold a message is sent via GSM to the concerned person to clean it as soon as possible.

GOOGLE GLASS

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Bandla Gokul | Kajal

Abstract

Project Glass is a research and development program by Google to develop an augmented reality Head-Mounted Display (HMD). The intended purpose of Project Glass products would be the hands-free displaying of information currently available to most smart phone users, and allowing for interaction with the Internet via natural language voice commands. These glasses will have the combined features of virtual reality and augmented reality. Google glasses are basically wearable computers that will use the same Android software that powers Android smart phones and tablets.Google Glass is as futuristic a gadget we’ve seen in recent times. A useful technology for all kinds of people including handicapped/disabled.

Guaranteed Event Delivery For Publish/Subscribe Services

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Lajitha H | Ratheesh S

Abstract

The publish/subscribe(pub/sub) is a widespread communication paradigm, which has been paid more attention in distributed applications such as online gaming, social networking , business intelligence because it offers the time, space and synchronization decoupling properties. These applications are typically characterized by a large number of participants which are communicate by exchanging messages on a wide area network (WAN), such as the Internet. However, while this kind of paradigm fits the generic asynchrony and scalability requirements of large scale complex critical infrastructures (LCCIs), it completely or partially lacks the support of quality-of-service (QoS) guarantees. The maximum flow path is needed to achieve maximum data rate/ packet delivery for multicasting to several sinks. The proposed system uses a techniques network coding in a maximum flow network. And also uses a mechanism to choose gossip partners during the recovery phase of the protocol.

High Resolutions of Medical Images using Enhancement Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Prof.Karimella Vikram | Dr, K.Madhushdhan

Abstract

The objective of this paper is to estimate a high resolution medical image from a single noisy low resolution image with the help of given database ofhigh and low resolution image patch pairs. Initially a total variation (TV)method which helps in removing noise effectively while preserving edgeinformation is adopted. Further de-noising and super resolution is performedon every image patch. For each TV denoised low-resolution patch, its high-resolution version is estimated based on finding a nonnegative sparse linearrepresentation of the TV denoised patch over the low-resolution patches fromthe database, where the coefficients of the representation strongly depend onthe similarity between the TV denoised patch and the sample patches in thedatabase. The problem of finding the nonnegative sparse linear representationis modeled as a nonnegative quadratic programming problem. The proposedmethod is especially useful for the case of noise-corrupted and low-resolutionimage.

Host-Based Intrusion Detection System Using Analytics

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

G.Yedukondalu | Dr.J.Anand Chandulal, Dr.M. Srinivasa Rao

Abstract

File signatures are computed to improve the efficiency and effectiveness of the Intrusion Detection System. File Signatures are generated using Hashing Method and Superimposed Coding technique. This paper discusses the techniques that works fast and efficiently in detecting the malicious users. DARPA data set is used to apply these techniques to find out the intruders through IDS. The performance of the similarity search algorithm is efficient since all the signatures are in the binary format and computations are done by low level logical operations[1]. Clustering and Similarity search techniques are applied to increase the efficiency of the Host-Based Intrusion Detection System

Hypothetical Analysis about computational feasibility of Time Travel

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Viplove Divyasheesh | Anil Pandey, Abhishek Dixit

Abstract

Time Travelling has always been considered a fantasy never fulfilled .There have been many assumptions regarding how to fold the fabric of space time to let light reach from point A to Point B without travelling the entire length, and this all has been seen from the scientific point of view . But no one has put forward an apt representation as to can us or can we not produce Time travel computationally? The feasibility of this problem is aptly and properly analyzed in this paper and we have tried t o reach a final consensus if time travel is computationally feasible at all or not?

Image Steganography Using Variable-Rate LSB Approach

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Hemshikha Joshi | Rahul Agarwal

Abstract

Steganography is the art of hiding facts where communication is taking place, by hiding information in another information. The purpose of Steganography is to maintain secret communication between two parties. Many different file format carrier can be used, but the digital image are the most popular bacause of their frequency on the internet. In this paper a new algorithm is described for hiding a secret image in the least significant bits of a cover image. Least Significant-Bit (LSB) based approach is most popular steganographic techniques in spatial domain due to its simplicity and hiding capacity. This method supports both type of images colour and gray scale image. How many LSB hides the secret information is decided by the exclusive-or (XOR) operation of a pixelís neighbour. Here result is sensitive to the smothness of the neighbour pixel.

Impact of Social Networking Sites on Educational Institutes - A Case Study on RGUKT

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Satyanandaram Nandigam | Dasari Narendra

Abstract

The usages of social networking sites in educational institutes are increasing rapidly. Although they are providing many reliable services which make our communication so simple, they are also doing more harm than good. This communication is not only changing how we communicate with others but also replacing the traditional methods of communication. Many people spend their time in social networking sites to communicate with others rather than a traditional way of communication. A survey conducted on 4000 students of Rajiv Gandhi University of Knowledge Technologies (RGUKT) had proved it.

Implementation and Analysis of pCell Data Center In Ethernet Technology

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shreshtha Raizada | Srishti,Budhaditya Bhattacharyya

Abstract

In this paper we present the implementation of the idea behind the pCell data center that receives and execute multiple requests at a single time unlike the conventional technology which is 1:1. The pCell is a radio based technology which is said to be impossible to implement in laboratory environment. Thus we have collaborated the essence of the pCell technology to its ancestor Distributed Input Distributed Output (DIDO) to architect a data center for an Ethernet based network. The aim is to conclude that working principle of the pCell data center can be recreated in laboratory environment. First we describe the architecture and then we present the experimental results which conclude the working of the created data center.

Implementation Of Efficient Privacy Preserving Classification Techniques With Outsource Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Avinash Thube | Aniket Patil, Vinayak Shinde, Chetan Mohite

Abstract

Back-propagation Neural Network is one of the important machines learning technique for classification Accuracy of any machine learning technique is improved with volume of datasets. Recent developments in computer networks provide such environment that multiple users connect with each other. This scenario leads in development of machine learning technique with collaborative or joint participation of these multiple users. In collaborative learning multiple parties participate jointly in learning where data is shared by users may contain sensitive information such as corporate data, health care data and personal data. There are chances of data leakage by any corrupt party or intruders. Users are concern about privacy of their datasets due to this main hurdle in collaborative machine learning technique many users are not interested to participate. In this project we are giving solution to privacy of individual userís data by converting data in the form of cipher texts where users can use these cipher texts directly in the learning process. A machine learning system working on cipher texts needs various computations. Recent development in cloud computing provides good computing environment where we are utilizing these computations. In this way a system will be developed with neural network machine learning technique working on cipher text and utilizing cloud computing services.

Integrative Detection of Open Drainage, Garbage & Drainage over Flow and Current Leakage Using Zigbee Technology

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Rathna Priya. K | Rajapandiyan. V, Ramprakash. G , Saravana Perumal. R , Shankara Narayanan. S

Abstract

Open sewage and a faulty overhead line falling on the ground during rainy season is a serious but unattended problem. This may cause death if people near that area fail to notice it. Garbage and drainage overflow cause growth of insects and bad odour which leads to the spread of diseases. This project aims for solving all of the above mentioned problems through the following solutions. Garbage and drainage system is monitored using wireless sensor network and if it is open or if it gets full, then alert signal is sent to the corresponding department about the same. Also, during rainy season, if overhead line gets cut and falls down in logging water, then using sensors in a water resistant setup, it is intimated to the EB department. Another module near the transformer receives this alert signal and send message to the department using GSM communication. Thus by proper monitoring and taking necessary control action, life can be saved from danger.

IoT based Smart Parking System: A Literature Review

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Achyutha Hosahalli | Rahul Hiware

Abstract

With number of vehicles increasing day by day and parking places not increasing proportionately, find ing parking areas with free parking slots has become time consuming and cumbersome. There have been many solutions to address this problem with each one adopting a different technology and methodology. This paper presents an overview of such different methodologies using Internet of Things which help people in having a better and smart parking system.

IoT-Based Advanced Garbage Bin System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Pushpak Jayale | Sahil Kalode, Amit Bhatti,Shubhank Bhatiya

Abstract

In many application fields such as home automation, industry automation and healthcare Wireless Sensor Network application have been developed to smartly solve management problems. In this paper, we are presenting a smart solution over the old garbage management system using IoT-enabled Technology. This is a dynamic solution which increases the productivity of the public garbage system. Our system consists of various sensors which make garbage management more reliable, scalable and efficient. An android application with user-friendly GUI is provided to the garbage collectors to get notified about garbage bin. Fire sensor, methane sensor and ultrasonic sensor make garbage bin a future of a smart city.

ITBUZZ.CO A collaborative Academic Portal

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Dr D S Adane | Nayan Goenka, Sneha Virwani, Pooja Kulwal

Abstract

ITBUZZ.CO is an attempt to bridge the gap between academic and social life. ITBUZZ.CO thus is an academic social networking portal with an advanced and comprehensive feature list to compete some of the hit social networking websites of our age. ITBUZZ.CO is a secured online portal which grants access to only those personnel which are verified by the Department of IT, RCOEM. ITBUZZ.CO is a one stop communication channel for everyone in IT Department to share resources, knowledge have a healthy discussion for various topics, ,manage departmental activities, maintain personal profile and communicate freely through the website itself. ITBUZZ.CO is a portal which boasts a continuous, reliable and cross device network. ITBUZZ.CO has an extensive outreach to all the internet users through devices and platforms of their choice, may it be through desktops or laptops, mobile devices on Android, IOS or Windows phone/tablets.

Light weight Secured Protocol for Internet of Things (IOT) Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms. Divya T | Dr. Vidya Raj C

Abstract

The Internet of Things (IOT) is an ecosystem of connected physical objects that are accessible through the internet based on interoperable information and communication technology. In the secure communication areas, key exchange protocol is an important cryptographic technique. When two users would like to exchange a message, the transmitted message is encrypted by a session key. This session key is exchanged between two ends of the corresponding connection with the help of trusted third party protocol. This type of protocol protects message delivered between two authorized users. Even this inefficiency, unreliability, inflexibility problems of the existing protocols. Therefore, in this paper, secure multi key exchange protocol based on trusted third party is to provide users with a efficiency and secure protocol which employs Elliptic Curve Cryptography (ECC) and two dimensional operation. These protocols achieve fully mutual authentication between user and trusted server.

Low cost Integrated Communication Technologies for Controlling Home Appliances from Anywhere - An Outcome of IoT

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Satyanandaram Nandigam | Anil Kumar Reddy G, Dasari Narendra, Gousulu K

Abstract

Now a days entire world is moving towards the exiting new technology that is Internet of Things. Many of the organizations and industries are continuously trying to convert the theoretical aspects into practical implementations. But the implementations are very complicated and highly expensive. Automating home appliances remained like a dream for a common person. As a step towards low cost solutions for this problem we had implemented the central control system with the help of WiFi, Bluetooth and Internet technologies to provide remote access from smart phone or personal computer. The status of all switches is synchronized in centralized control system.

Methods of Identification of Leaders and Followers in Online Social Networks - A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Rajeshri Puranik | Sharad Pokley

Abstract

Now a day's Social Network has a great influence on our lives. Directed links in social media could represent anything from intimate friendships to common interests, or even a passion for breaking news or celebrity gossip. Such directed links determine the flow of information and hence indicate a user‚Äôs influence on others‚ÄĒa concept that is crucial in sociology and viral marketing. Identifying leaders and followers in online social networks is important for various applications in many domains such as advertisement, community health campaigns, administrative science, and even politics. Here we study the role of actors and a set of relations between actors i.e. leaders and followers, and there relations. For our study purpose we have selected two well-known popular SNS(Social Networking Sites) face book and twitter. Also discussed different methods, (LUCI Model, Leader Rank Approach, Binary Approach , Integrated Text Mining Model , Content based Metrics and Social Network Metrics Based Approach) for the identification of leaders and followers

Methods to Improve Genuine Ratings of Products in E-Commerce Sites

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

P.M.D.Ali Khan | K.Manoj Kumar

Abstract

Various customer surveys of item square measure as of now offered on the web. Customer surveys contain well off and profitable learning for both firms and clients. Nonetheless, the audits are frequently confused, bringing about challenges in information route and learning securing. This article proposes an item feature positioning structure, which naturally distinguishes the imperative parts of item from on-line customer surveys, going for raising the ease of use of the different audits. The imperative item angles square measure known bolstered 2 perceptions: 1) the key viewpoints square measure commonly remarked on by an outsized scope of shoppers and 2) customer conclusions on the essential perspectives enormously impact their general suppositions on the stock. Especially, given the purchaser audits of an item, we tend to first set up item angles by a shallow reliance program and check customer feelings on these viewpoints by means of a notion classifier. We tend to then build up a probabilistic feature positioning principle to induce the significance of aspects by in the meantime considering aspect recurrence and along these lines the impact of customer sentiments given to each angle over their general suppositions. The trial comes about on an audit corpus of twenty one stylish items in eight spaces exhibit the adequacy of the anticipated approach. Additionally, we have a tendency to apply item feature positioning to 2 certifiable applications, i.e., archive level assessment characterization and extractive survey account, and finish imperative execution upgrades, that show the limit of item aspect positioning in encouraging true applications.

Methods to Improve Genuine Ratings of Products in E-Commerce Sites

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

P.M.D.Ali Khan  | S.Mohammad Rafi, K.Manoj Kumar

Abstract

Various customer surveys of item square measure as of now offered on the web. Customer surveys contain well off and profitable learning for both firms and clients. Nonetheless, the audits are frequently confused, bringing about challenges in information route and learning securing. This article proposes an item feature positioning structure, which naturally distinguishes the imperative parts of item from on-line customer surveys, going for raising the ease of use of the different audits. The imperative item angles square measure known bolstered 2 perceptions: 1) the key viewpoints square measure commonly remarked on by an outsized scope of shoppers and 2) customer conclusions on the essential perspectives enormously impact their general suppositions on the stock. Especially, given the purchaser audits of an item, we tend to first set up item angles by a shallow reliance program and check customer feelings on these viewpoints by means of a notion classifier. We tend to then build up a probabilistic feature positioning principle to induce the significance of aspects by in the meantime considering aspect recurrence and along these lines the impact of customer sentiments given to each angle over their general suppositions. The trial comes about on an audit corpus of twenty one stylish items in eight spaces exhibit the adequacy of the anticipated approach. Additionally, we have a tendency to apply item feature positioning to 2 certifiable applications, i.e., archive level assessment characterization and extractive survey account, and finish imperative execution upgrades, that show the limit of item aspect positioning in encouraging true applications.

Mobile Applications In Context of Big Data A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

K Harshitha | N A Poojitha , Chaithra A , Bhavya C P , Mrs Sheela devi

Abstract

A large scale research initiative aimed at generating innovations around handheld devices based research as well as community based evaluation of related mobile applications. Big data refers to huge amount of digital information collected from multiple and different sources. Since a key point of big data is to access data from multiple and different domains, security will play a very important role in big data research and technology. Due to increase the challenges in mobile data or mobile data challenge (MDC), Big data is required for analysis and curation of mobile data. The rapid expansion of mobile technology has introduced a versatile global infrastructure that internally generate vast amount of data like user identification, location, device name and externally generate data related to mobile apps like number of mobile applications, number of downloaded applications, number of failure applications, number of popular applications etc. This paper presents a survey of the mobile applications (apps) in the context of Big data.

Multilevel Authentication System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Nichita Silva Lobo | Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares

Abstract

Textual are the most simple to use and implement. They are the most common method used for authentication but are also vulnerable to spyware key, loggers, eves dropping and dictionary attacks. To address this problem and make the system more secure this paper proposes three different levels of authentication namely textual passwords, pair-based password and graphical password. Combining all the three level this paper focuses on providing the user with stronger security and a user friendly interface.

Network Data Collection and Analysis

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Er. Zainab Mirza | Pragya Mishra, Taher Shabbiri, Asmabee Khan

Abstract

In this paper, we try to implement Hadoop for storing and retrieving different parameters of network log data for analysis. This paper also consists of technologies such as shell script, Hive, PHP in accordance with other web technologies to get a better performance with Hadoop for managing Network traffic.

New Approach for Parallel Graph Computation Using Partition Aware Engine

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Prashant Patne | Vivek Takawale , Akash Tilak ,Chandan Tiwari

Abstract

Graph partition quality affects the whole working of parallel graph computation systems. The quality of a graph partition is calculated by the equity factor and edge cut ratio. A balanced graph partition with small edge cut ratio is generally preferred since it reduces the costly network conversation cost. However, according to an empirical study on Graph, the achievement over well partitioned graph might be even two times worse than simple random partitions. This is because these systems only enhance for the easy partition strategies and cannot efficiently handle the increasing workload of local message transmission when a high quality graph partition is used. In this paper, we propose a novel partition aware graph estimation engine named PAGE, which qualify a new message processor and a dynamic concurrency control model. The new message processor simultaneously processes local and remote messages in a unified way. The dynamic model adaptively adjusts the compatibility of the processor based on the online statistics. The experimental evaluation demonstrates the prestige of PAGE over the graph partitions with various qualities.

News Feed Recommendation & Diversification for Mobile User

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Miss.Vanita M.Gaikwad | Prof.Yogita S.Pagar

Abstract

A location-aware news feed (LANF) system generates news feeds for a mobile user supported their abstraction preference (i.e., their current location and future locations) and non-spatial preference (i.e., their interest). Existing LANF systems merely send the foremost relevant geo-tagged messages to their users. unfortunately, the key limitation of such associate existing approach is that, a news feed might contain messages related to identical location (i.e., point-of-interest) or identical class of locations (e.g., food, diversion or sport). We argue that diversity may be an important feature for location-aware news feeds as a result of it helps users discover new places and activities. In this paper, we propose News-Feed; a replacement LANF system allows a user to specify the minimum variety of message classes (h) for the messages in a very news feed. In News-Feed, our objective is to with efficiency schedule news feeds for a mobile user at their current and expected locations, such (i) every news feed contains messages happiness to a minimum of h completely different classes, and (ii) their total connectedness to the user is maximized. To attain this objective, we formulate the matter into 2 components, namely, a choice drawback and an improvement drawback. For the choice drawback, we offer a definite answer by modeling it as a most flow drawback and proving its correctness. The improvement drawback is resolved by our projected three-stage heuristic formula. we conduct a user study and experiments to estimating the performance of NewsFeed employing a real information set crawled from Experimental results show that our projected three-stage heuristic planning formula outperforms the brute-force optimum formula by a minimum of associate order of magnitude in terms of period of time and also the relative error incurred by the heuristic formula is below 125th. News-Feed with the placement prediction methodology effectively improves the connectedness, diversity, and potency of reports feeds.

NLP based intelligent conversational agents to Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.G.Divya | Dr.M.Humera Khanam, Mr.K.Ravi Kishore, Ms.D.Sucharitha

Abstract

Internet of Things is an emerging and significant technology shaping the future that connects things or physical devices with internet. It allows intersection of various technologies to make it more intelligent and efficient. In this paper we focus on integrating intelligent conversational agents or chat bots with IoT. Literature survey presents various features, underlying technologies, applications and challenges of IoT. Greater numbers of intelligent conversational agents are being adopted due to major progress in development of frame works and platforms. This paper explains specific integration of intelligent conversational agents in IoT. We analyzed loopholes of existing IoT systems and present ways to tackle them by incorporating intelligent conversational agents. Architecture has been proposed in this paper for implementing system platforms and frameworks for both commercial and open source. We have identified newer challenges that takes place in future and took forward directions with this integration, all of these directions have been addressed

Online Exam Management System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

M.Mani Mohan Reddy | Mahendhra Sahani, Dr.Lakshmi

Abstract

Online Exam Management System is an online examination system aimed to help the academicians to conduct and evaluate the exam in Quick and effective manner. The key objective of this system is to offer user friendly environment to students and mainly to the faculty by reducing the time for evaluation. The main concept of this work is to develop a software that provides a framework to conduct online exam for students on any theme. This software affords 3 levels of user the role and purpose of the user are given as follows: 1. Admin, who is the super admin of the project who accomplish all the components and has full accurse of the project. 2. Teacher, who is responsible for accretion the questions and answer, evaluation, generating report about the specific exam. 3. Student will be attending the exam 4. Full security will be provided regarding exam and about details of examination. Exam can be accompanied for huge number of students. Evaluation can be carried out in less time publishing results in accurate and easy manner. We puton all arithmetic metrics to engender report based on the pre- request of the user.

Online Food Orderring System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Miss. Dake.S.R | Miss.Gajare.P.V, Miss.Kavathekar.S.S., Miss.Pawar.S.R, Prof. M.N.Jadhav

Abstract

The purpose of this project is to develop a computerized and mobilized food ordering system that can be used to revolutionize the traditional ordering system that currently implemented in majority of the food and beverage industry. The traditional system that using by most of the food and beverage industry is the traditional manual ordering system which means all works and procedures is recorded through manpower manual work and it consist of a huge amount of paper work that is not effective and efficiency. This cause the business to encounter trouble which regarding human error due to the huge amount of manpower manual work that operating in each business routine. Thus, this computerized and mobilized food ordering system is designed to assist the business routine in term of having better management as well as easier to handle daily business operation. This system is designed for small medium enterprise food and beverage industry. The chosen methodology for this project is throwaway prototyping methodology. This is because majority of the targeted user do not have the experience in using computerized system in food ordering procedure as they implement traditional ordering system previously. Therefore, this methodology enables developer to communicate with target user through using the prototyping, which can let target user to review, evaluate, visualize and learn about the system before the actual implementation of the final system. Furthermore, the system is a cross platform system which involve desktop based and mobile phone based which is in Android operating system. It is also the highlighted feature of the system which does not limited the ordering procedures to desktop based as portable and mobility is the current trend. Besides that, with this feature it also provide a degree of level of self service for targeted users’ consumers, as they canplace order themselves through using the mobile application.

Optimized Component Development Life Cycle for Optimal Component-Based Software Development

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Gaurav Kumar | 

Abstract

The traditional software development approaches are not optimal for developing the complex software system using the reusable software components as compared to the Component-based software development approaches, because traditional approach almost try to attempt to develop the system through scratch. That is why, component-based software development (CBSD) continues to be a key area of research in the systems development and software engineering fields as it focuses on the integration of pre-fabricated software components to build systems characterized by increased portability and flexibility. The main objective of CBSD is to build systems by assembling pre-existing software components. The existing CBSD life cycles have not discussed the optimal selection of components when there is unclear and ambiguous user requirement. Majority of the existing CBSD life cycles are based on two processes, one of which deals with the development life cycle of component for reuse and the other deals with the development life cycle of Component-Based system as whole. This paper discusses a single and an optimized component development life cycle which deals with the development of optimal Component-Based systems by selecting optimized components when there is unclear, ambiguous and more general user requirements and there is no specific user requirement and this proposed development life cycle performs testing both at component level and system level and that too by not having two separate life cycles.

Phishing Websites Detection Based On Web Source Code And Url In The Webpage

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Aarthi.R | Keerthana.N.D

Abstract

Major security issues for banking and financial institutions are Phishing. Phishing is a webpage attack, it pretends a customer web services using tactics and mimics from unauthorized persons or organization. It is an illegitimate act to steals user personal information such as bank details, social security numbers and credit card details, by showcasing itself as a truthful object, in the public network. When users provide confidential information, they are not aware of the fact that the websites they are using are phishing websites. This paper presents a technique for detecting phishing website attacks and also spotting phishing websites by combines source code and URL in the webpage.

Polarity based Analytics from Social Media to Mitigate Adverse Drug Reactions

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

S.Kavishree | Dr.P.Shanmugapriya,R.Saravanan

Abstract

In the recent years, social media have been emerged as major platforms for sharing information in the medical field, business, education etc. The existing system will generate a warning for adverse drugs reactions based on the negative comments from forums. The use of Latent Dirichlet Allocation modelling(LDA) in the existing system makes the data labelling process time-consuming and the polarity analysis is not done. But the proposed system uses Twitter to get the information and process on it. The information from the Twitter is extracted using Twitter API. Pre-processed tweets are stored in the database and those tweets are identified and classified whether it is based on drugs related tweets and diseases related tweets using Support Vector Machine classification(SVM). The user keywords can be predicted whether it is the best suggestion using polarity. Polarity detection is done by the keywords. Based on the number of positive tweets and the number of negative tweets it analyzes the best medicine. This system is very useful for the users to gain knowledge of the medicine

Portable Wi-Fi Calling And Interactive Voice Response System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ruchi W. Kasare | Pooja K. Muneshwar,Nikhil D. Tembhekar,Prof. V. P. Yadav,Prof. J. V. Shriral

Abstract

Implementation of a VoIP telephony system using an IP Telephony solution in the organization as IVR. A new technology VoIP or Internet Telephony means that your voice is carried over the IP network, otherwise known as the Internet. Voice which is an analog signal, is converted to digital data, which is then disassembled and transmitted through the Internet or Internet to be recovered back to an analog signal an the other using an IP Telephony solution which is an Linux base system. This service can be properly managed and deployed over a network with less stress and expenses. The system main server also has integrated in its other communication services such as voicemail, mobile calling on Wi-Fi network without using any cellular network connection and has many advance features.

Privacy Ensured Contemplate With SVM and Role Based Classification with Collaborative Tagging

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

A Divya | S Madhu Sudhanan, M Poornima

Abstract

Tagging system is one of the most diffused and popular services available online. This system allows users to add free text labels generally referred as tags to the Internet resources for example web pages, images, video, music and even blogs. Web metadata have a potential to improve search, retrieval and to protect end user from possible harmful content. The Organization updates their Company portal with public sharing data along with Sensitive data. The query is processed based on the User Profile Analysis. In actual system provide taxonomy of tagging system and system web technologies help to specify labels and rate for that labels which assess the trustworthiness of resources to enforce web access personalization. To enhance the efficiency of tag suppression the privacy ensured skim with Support Vector Machine along with Privacy Enhancing Technology is implemented. SVM is used for extraction of data and obscure delicate data. PET is achieved by using the technique Tag Suppression which has the role of providing the privacy for information. Web user will search using a keyword. The keyword may be the location, feedback or cost to analyze the data. The authentication of the portal is done by the management. Management classified as two roles they are Department Head Role and Admin. Department Head Role is to update their part of portal and retrieve only the corresponding data. Final authentication and approval is done by the admin. Through the analysis efficiency guarantees of proposed scheme is achieved.

Privacy Preserving Association Rules Mining In Horizontally Distributed Databases

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Nikhil Puri | Swapnil Patke, Vishwajeet Godage, Yogesh Sherkar, Asst.prof.Sunil Kale

Abstract

This paper presents secure mining of association rules in horizontally distributed databases by proposing a protocol. This protocol is made up of the Fast Distributed Mining (FDM) algorithm which is consist of unsecured version of the Apriori algorithm. Our protocol made up of two novel secure multi-party algorithms ó one that calculates the unions of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. The main merit of our protocol is to provide privacy with respect to the protocol. It is also useful in terms of simplicity and is also significantly more efficient in terms of communication rounds, communication cost and computational cost.

Privacy Preserving on Fast Classification of Time Series Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Md Abdul Aziz | .K.Indu, O.Kavitha

Abstract

Now a days, data is growing rapidly in different fields like trade reports, social networks, hospital etc and all these data maintained in cloud. To extract the data from cloud, we can use data mining concepts. Classifying these data, the time series data has become a topic of great interest in data mining. In case only one person is dealing with the data there are many algorithms to classify. In this paper, we are classifying the data when it is with two or more persons and no one wants to share their data, even though we can do classification of the data securely. There are two basic data partitioning models, they are horizontal partitioning and vertical partitioning. We are proposing novel time series classification algorithm for classification of vertically partitioned data. Our approach is on distance based novel classification of the time series data. To classify securely we use the concept of secure multi-party computation protocols. By using secure multiparty computation protocols, we are proposing secure square root sum and secure sum protocols for classifying data securely. In these two approaches secure square root sum gives the best result.

Procreation of Hierarchical Routing Using AODV

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Shiva Mehta | Kamaljeet Mangat,Himanshu Jindal

Abstract

The Wireless Sensor Networks are used today to monitor hostile environments where the reach of human is not possible. For monitoring purposes in WSN, sensors are used that has capabilities of sensing, processing data and revelating the processed data to other sensors or surface station. To sense data in routing, data agglomeration and energy efficient protocols are designed for WSN as energy consumption is a serious issue in this network and thus after sensing data routing this data to destination is the main motive during the network. Hierarchical routing comes into existence that proves to be promising approach for point to point routing with a very small state of routing. Here in this paper, AODV routing is simulated for hierarchical routing in order to demonstrate its further use for realistic applications and WSNís setting. In this paper, the energy is very less consumed while having countable sets of sensors nearby for revelating data. At the end of the simulation, energy is saved and the connection with shortest distance comes out to be a lucrative result. In this paper, the state of art of AODV is presented by taking into deliberation of the topology changes during the energy depletion and node failure.

Proxy Oriented Identity-Based Data Uploading and Remote Data Integrity Checking in Public Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

M. Damodhar | S.Poojitha

Abstract

Now a day‚Äôs a number of clients were liked to store their data in public cloud along with the fast development of cloud computing. Novel security problems need to be resolved in order to facilitate processing of data for numerous clients over public cloud. Whenever a client is limited to access PCS (Public Cloud Services), he will hand over its proxy for his data process later upload them. Furthermore, remote checking of data integrity is an important security problem in public cloud. It provides the customers for checking that whether their data that is outsourced are kept undamaged without the requirement of downloading entire data. From the security problems, we propose an enhanced proxy-oriented data uploading and a model for remote data integrity checking over identity-based public-key cryptography: proxy-oriented identity-based data uploading and remote data integrity checking on public cloud. We provide a formal definition, system model as well as a model for security. Later, a concrete P-IDURIC protocol is designed with the help of bilinear pairings. The projected P-IDURIC protocol provides enhanced security based on hardness of the computational Diffie‚ÄďHellman problem. Furthermore the protocol is efficient and flexible. Depends on the actual client‚Äôs authorization, the projected P-IDURIC protocol will realize delegated remote data integrity checking, private remote data integrity checking, and public remote data integrity checking

Raster Format Mapping onto Adobe Reader for Visually Impaired

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Gururaj K S | 

Abstract

Texts are scripts provided by the language to convey information. The main idea of this paper is to provide a means for people with vision disabilities to listen to the text of an image by converting text into speech. This process uses text-to-speech, the generation of synthesized speech from text. Image containing the text is pre-processed that prepares the text for recognition. Text recognizer needs to localize the text in image accurately. Separation of text from each other is done by segmentation. Segmentation is followed by the extraction of character, resizing them and storing them in a PDF document. Frequency speech synthesizer provides the speech by performing natural language processing and digital signal processing of the text.

Recommendation Engine in E-Commerce

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd June 2017

Shrinivas S Hegde | Soumya Lakshmi G, Vellaki Kiran Kumar, Neelu L, Pramodchakravarthy Patil

Abstract

Recommender systems areimportant for businesses because they can help companies offer product recommendations to customers. There are many acknowledged consumer-oriented recommender systems, particularly in e-commerce. A client-product matrix is built which matches company clients to internal company products. Pairing of clients and products is based on coclustering principles and reveals potential future purchases. Compared to other consumer-oriented recommendation systems, this approach takes into account the need for interpretability. The recipient of the generated recommendations are sales and marketing teams; hence, a detailed reasoning will be done in straightforward English that considers multiple aspects regarding why a client may be a suitable match for the particular offering.

Redefining Smart Cities for a Sustainable Future

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Prof Rashmi Dande | 

Abstract

Every city has its own history, culture and identity. There is no doubt that we need to nurture, preserve and renew the urban fabric with changing times. However, there is also a need to build new cities. A city is an economy of agglomeration; it provides various advantages and opportunities. India’s economy is expanding rapidly. By 2030 it is expected to have grown by five times, During the same period, the country’s labour force is expected to grow by 270 million workers, with urban jobs accounting for 70% of that growth. Today, India is less than 30 per cent urban and the quality of life in its cities is chronically low. However, with 2/3rds of GDP already generated in India’s cities and rural to urban migration patterns accelerating, the country faces a critical challenge: managing this rapid urbanization in a way that enhances the livability of India’s urban spaces. The wave of urbanization that is sweeping across India represents one of the country's greatest opportunities as well as one of its most serious challenges. India struggles with a number of significant barriers that continue to hamper the development of urban infrastructure: complex leadership structures, land valuation challenges, capability gaps, and funding shortfalls are all part of the urban challenge that is effectively holding India back from a new round of dramatic economic growth. India also needs to address the current problems of developing good infrastructure, solid waste disposal, flood management, storm water and sewerage system etc. resulting in urban decay, traffic gridlock and there by a deteriorating quality of life for many of its citizens. With the mess that most Indian megacities are in, it is inevitable not only to drastically take steps to rehabilitate infrastructure in existing cities but build new cities to accommodate this burst in urban population. In many cases, if not all, retrofitting old cities with improved infrastructure and playing the 'catching-up' game is a more expensive and difficult-to-implement agenda. It is logical and quicker to build entire new smart cities from scratch instead. But is India and its inhabitants ready to accept these smart cities, do we have that infrastructure and technology that will help to work for these smart cities. The answers to all these questions are unknown. This research paper mainly focuses on these issues of smart cities and also raises a question whether India should opt for Smart cities or Sustainable cities

Resolve the Classification Problem over Encrypted data Using K-Nearest Neighbour

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

C Deepika | S Deepak, Jestina Thomas, Akansha Singh

Abstract

Data mining is widely used in numerous areas such as banking, medicine, scientific research and various other government applications. Data Classification is most extensively used task in data mining applications. The rise of various issues in privacy has led to several solutions to this problem. However, with the increased fame of cloud computing, users can now outsource their data onto the cloud in an encrypted form, as well as perform the required mining tasks on the cloud. Since the data is in an encrypted form on the cloud, existing privacy-preserving classification techniques are not suitable. In this paper, we focus on a viable technique to perform data classification using k-NN classifier over the encrypted data and secure the confidentiality of data, privacy of the userís input query and also hide the data access patterns. We also analyze the efficiency of the proposed protocol empirically.

Resource Requirements In Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sudha Pelluri | Ramachandram Sirandas

Abstract

Resource providers on Cloud offer heterogeneous resources such as compute units and storage in Virtual Machine instances (VM). Cloud providers expect users to request for resources. In this process, overestimation of resources by cloud users lead to unused resources. The cumulative unutilized resources for each job of the user, amount to unnecessary expenditure for users and wasted resources for providers. Large scale data centers that provide reliable high performance computational and storage services for Cloud providers, face problems of increased energy consumption and CO2 emission as a consequence of huge resource wastage. Therefore, for environmental and financial reasons it is imperative to reduce unnecessary resource reservation. This can be done by using resource prediction technique that ensures resource allocation only as much as is necessary for the customer. Currently, there are no suitable prediction techniques for Cloud resource usage because of absence of pattern, trend and seasonality in users’ resource usage [2].The proposed prediction approach applies Enhanced Instance Based Learning and is tested using Google Cluster Trace Data [1] . The contribution of this work to existing body of work on cloud resource management by effective resource prediction approaches are discussed.

Review An Efficient Approch To The Green Computing For Load Balancing

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ruchika Wankhede | A.H.Gade

Abstract

Cloud computing is an expanding area and most discussible in the field of research, industry and development today, which involves virtualization, distributed computing, internet, and software and web services. While a large body of work now a days has recently focused on reducing energy expenses of data center’s, there exists no prior work on investigating the trade-off between minimizing energy expenditure of data center’s and increase the processing speed for various Internet and cloud computing services that they may offer. This paper presents an approach for scheduling algorithms that can maintain the load balancing. In this research work we have developed power optimization algorithm which over comes the limitations of the previous algorithm & it helps in optimization of the energy consumption along with the operation of load balancing in data centre.We implements strategy known as Round Robin (RR) scheduling algorithms which will give better result than existing one.

Review on Black hole Attack Detection in Wireless MANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Kishor A. Dongarwar | Mr. Nitesh Ghodichor

Abstract

In wireless mobile ad-hoc network nodes are communicating with each other with the help of wireless link. In MANET (Mobile Ad-hoc Network) due the absence of centralize monitoring the network is vulnerable by various types of attacks. In this type of network a node establishes communication is on trust base. As due to their feature of open medium, dynamically changing topology of network, absence of central monitoring security is the significant challenge for these networks. In MANET an intermediate node involved for promoting a packet to the destination node, this intermediate node may act in malicious manner and drops all the packets instead of forwarding to an appropriate node. Such a malicious behavior of a node is called as black hole attack. In this paper we study one routing protocol i.e. Ad-hoc On-demand Distance Vector(AODV) protocol and analyze in detail one type of attack the ‚Äúblack hole‚ÄĚ attack and discuss different solutions for the black hole problem in wireless mobile ad-hoc network.

Review over Probabilistic Routing Algorithm in MANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Dr. Vikash K Singh | Devendra Singh Kushwaha, Shaibya Singh, Sonal Sharma

Abstract

The nature of the universal computing has made it necessary to adopt wireless network as the interconnection method: it is not possible for the ubiquitous devices to get wired network link whenever and wherever they need to connect with other ubiquitous devices. The Mobile Ad Hoc Network is the wireless networks that have attracted most close attention from many researchers. A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. People and vehicles can thus be internetworked in areas without a preexisting communication infrastructure. In the mobile ad hoc network, nodes can directly communicate with all the other nodes within their radio ranges; whereas nodes that not in the direct communication range use intermediate nodes to communicate with each other. In these two situations, all the nodes that have participated in the communication automatically form a wireless network, therefore this kind of wireless network can be viewed as mobile ad hoc network. Network wide broadcasting in Mobile Ad Hoc Network provides important control and route establishment functionality for a number of unicast and multicast protocols. . Broadcasting in MANET poses more challenges than in wired networks due to node mobility and scarce system resources. Broadcasting is categorized into deterministic and probabilistic schemes .In this paper give a bird's eye view over probabilistic approach for routing ,besides the basic probability scheme also includes their recent advancements .This review paper identify which protocol gives better performance in terms of reach ability, saved rebroadcast and average latency in rebroadcasting a route request message.

Review Paper on Intelligent Toll Tax System for the Smart Cities

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr.K.D.Bodhe | Mr.A.S.Sambare, Mr.N.V.Aote, Mr.H.V.Taiwade,Ms. E.M.Choudhari

Abstract

Now a day’s with the rapidly growth in technologies and innovations, world moving towards digitalization. In smart cities traffic management issues is most important. For the smooth traffic management, the cashless concept should be implementing especially on toll tax offices. Most of the toll tax offices are now working manually. On National Highways, millions of vehicles are travelling in a day. Each vehicle required at least 5 minutes for the paying the toll tax, which causes unnecessary delay to reach at workstation, traffic jams, accidents etc. The manual process for paying toll tax is leading to the corruption also. In this review paper, by studying the different techniques for the toll tax ticketing in the world, we have an algorithm for the toll tax payment by using the Internet of Things. In conclusion we discussed the major drawbacks of current existing systems and its possible solutions also.

Role of Information Communication Technology (ICT) in the Development of Smart City.

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Avinash P. Ingle | Mrs. Pallavi M. Chaudhari, Mrs.Archana V. Potanurwar

Abstract

By 2030, the world's population is projected to be 8.5 billion and increase to 9.7 billion by 2050 and 11.2 billion by 2100. Half of humanity today lives in cities. Many cities are experiencing exponential growth as people move from rural areas in search of better jobs and education. Consequently, cities' services and infrastructures are being stretched to their limits in terms of scalability, environment, and security as they adapt to support this population growth. Visionaries and planners are thus seeking a sustainable, post-carbon economy to improve energy efficiency and minimize carbon-emission levels. Along with cities' growth, innovative solutions are crucial for improving productivity (increasing operational efficiencies) and reducing.

Save Water, Save Earth Using Automated Agricultural Irrigation Method

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th June 2017

Miss. Rashmi S Hiremath | Dr. S. R. Biradar

Abstract

Agricultural Irrigation is very essential for the production of crops. It is one of the important factors for the human to survive in his life. Irrigation is the method to plant the crops by water. Many methods of irrigation have been developed and arebeing practiced; but the selection of proper method of irrigation helps to improve the yield of the crops at an economical price thereby increasing the country’s economy and development. Automated Irrigation is a modern technique, which saves 95% of the water and improves the production of crop. This paper proposes the different methods of automated agricultural operations, pros and cons of different methods, comparison between the traditional methods and modernautomated irrigation methods.

Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms R Lavanya | Ms A Jayashree,Ms B Nivetha

Abstract

general-order transmit antenna selection to enhance the secrecy performance of multiple-input-multiple-output multieavesdropper channels with outdated channel state information (CSI) at the transmitter. To evaluate the effect of the outdated CSI on the secure transmission of the system, we investigate the secrecy performance for two practical scenarios, i.e., Scenarios I and II, where the eavesdropper's CSI is not available at the transmitter and is available at the transmitter, respectively. For Scenario I, we derive exact and asymptotic closed-form expressions for the secrecy outage probability in Nakagami-m fading channels. In addition, we also derive the probability of nonzero secrecy capacity and the őĶ-outage secrecy capacity, respectively. Simple asymptotic expressions for the secrecy outage probability reveal that the secrecy diversity order is reduced when the CSI is outdated at the transmitter, and it is independent of the number of antennas at each eavesdropper NE, the fading parameter of the eavesdropper's channel mE, and the number of eavesdroppers M. For Scenario II, we make a comprehensive analysis of the average secrecy capacity obtained by the system. Specifically, new closed-form expressions for the exact and asymptotic average secrecy capacity are derived, which are valid for general systems with an arbitrary number of antennas, number of eavesdroppers, and fading severity parameters. Resorting to these results, we also determine a high signal-to-noise ratio power offset to explicitly quantify the impact of the main channel and the eavesdropper's channel on the average secrecy capacity.

Secured Multimedia Processing in Big data Using DataCloud and Mapreduce Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Varnachithra.A | Sahishna Krishna R.G, Neethy C Nair, Navya Anna Moncy, Navin K.S

Abstract

Big Data is a data analysis methodology enabled by recent advances in technologies and architectures. The scalability issue of big data leads towards cloud computing which offers the promise of big data implementation to small and medium sized businesses. Our paper proposes Big Data processing in cloud through a programming paradigm known as MapReduce. We also propose a novel architecture for the future Internet based on information-centric networking which is called Community Oriented DataClouds where users under common interest are brought together into a community. As a sample application of the mentioned concept, we perform multimedia processing and storage in a private cloud. After data processing, clustering is done and encryption is performed on it. For data encryption and decryption we use blowfish algorithm that supports for all file formats. Integrating all the multimedia processing under a single application and storing it in DataClouds or cloud communities make this a different approach.

Secured Transfer of IoT Data Using Attribute Based Encryption

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Pradyoth Hegde | Dr. Yuvaraju B N

Abstract

In the present technologies It is considered as one of the key area of growth. IoT is growing its popularity and market everyday exponentially. Iota is spreading from small to large applications in all fields like Smart Cities, Smart Grids, and Smart Transportation. As the usability of the it is growing, security of the data has become one of the major areas of concern. In this project, we apply the attribute based encryption concept to encrypt the data. Also we make use of cloud technology to store the data. Here since we store the data in encrypted format, it is very difficult to understand the data. The key is stored in the key server and is given only to the authorized users. Thus this project ensures the security of the sensor data.

Security Based Pattern Classifiers

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Mr. Zaid Alam Khan | Mr. MD Azher, Mr. Kante Surya, Chandra Rao,Ms. Neelu l

Abstract

Security is usually defined as opposing oneself from harmful attacks. Security is a part of everyoneís life. People wants to be safe and secure all the time but one never knows when his/her system can be attacked by malicious intruders. However upgrading ones security at the highest level possible is a necessary task. Pattern classification systems are commonly used in adversarial applications, such as biometric authentication, network intrusion detection, and spam filtering. It is to be noted that in these three areas data can be purposely manipulated or modified by humans to undermine their operation. These scenarios are not considered by classical design methods. Pattern classification systems may exhibit vulnerabilities, and when exploited may severely affect performance. Extension of pattern classification theory and design methods to real time applications is thus a very relevant research direction which has not yet been pursued in a systematic way and proper way. This paper introduces one of the main open issues: establishing a security system as a real time application which can be used in several organisations such as hospitals, banking system, libraries etc. Reports shows that security evaluation can provide a more complete understanding of the classifierís behaviour and lead to better design choices.

Selective Scheduling Algorithms of RTOS A Study of Task Based Scheduling

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Minal V. Domke | Nikita R. Hatwar,Nikita R. Hatwar, Priyanka V. Thakare

Abstract

In this paper, study of the classic real-time scheduling algorithms is done. Many papers have been published in the field of real-time scheduling. The problem of scheduling is studied from the viewpoint of the characteristics peculiar to the program functions that need guaranteed service. The quality of real-time scheduling algorithm has a direct impact on real-time system's working. After studied popular scheduling algorithms mainly EDF and RM for periodic tasks with hard deadlines tried to describe performance parameters use to compare the performances of the various algorithms. Observation is that the choice of a scheduling algorithm is important in designing a real-time system .Conclusion by discussing the results of the survey and suggests future research directions in the field of RTOS.

Self Destructing Data System For Distributed Object Based Active Storage Framework

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mrs. Bharati A. Raut | Mr. Nitin S. Thakre,Mrs. Rupali A. Fulse

Abstract

With the development of Cloud computing and popularization of mobile Internet, Cloud services are becoming more and more important for people’s life. People are more or less requested to submit or post some personal private information to the Cloud by the Internet. When people do this, they subjectively hope service providers will provide security policy to protect their data from leaking, so other people will not invade their privacy. As people rely more and more on the Internet and Cloud technology, security of their privacy takes more and more risks. As all the concept and researches have been evolved on the self destructing data system on the cloud computing, this paper is all about the web site security. That means the same concept of self destructing data system is used and applied on the web site, as web site users are tremendously in large numbers than the cloud users.

Sentiment Analysis of movie Reviews using Twitter data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Enimai V | Gokulavani S, Niveditha J P,Varshini R, Sheik Abdullah A

Abstract

Sentiment Analysis is the process of determining whether a piece of writing is positive, negative or neutral. It’s also known as opinion mining, deriving the opinion or attitude of a speaker .It is used to identify the mood emotional tone of the speaker. Sentiment analysis is extremely useful in social media monitoring as it allows us to gain the idea of the public. The problem is hard to find the motive of the sentence. The data source is twitter using twitter API. The techniques used are term frequency(TF), inverse document frequency(IDF) and Support vector machine(SVM) which is used to seperate the positive, negative and neutral.

Sentiment Analysis On Unstructured Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Apurva Joshi | Kalyani Birgade, Pallavi Petkar ,Mrunali Sathone

Abstract

An enormous growth of the WWW has been instrumental in spreading social networks. Due to many-fold increase in internet users taking to online reviews and opinions, the communication, sharing and collaboration through social networks have gained importance. The rapid growth in web-based activities has led to generation of huge amount of unstructured data which accounts for over 80% of the information. Exploiting big data alternatives in storing, processing, archiving and analyzing this data becomes increasingly necessary. Unstructured data refers to information that either does not have predefined data model or is not organized in a predefined manner. Unstructured data is being constantly generated via call center logs, emails, documents on the web, blogs, tweets, customer comments, customer reviews and so on. While the amount of data is increasing rapidly, the ability to summarize, understand and make sense of such data for making better decision remain challenging. So thus there is a need of sentiment analysis on unstructured data. In this paper we are describing what is sentiment analysis and methodology of analyzing on unstructured data .We have done analysis on various data sets from twitter , blogs and movielen.com site using r statistical language and output are visualized in the form of word cloud and histogram.We have created GUI’s for analysis of this datasets by which users can easily analyze the data.

Smart ATM Security System

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Krushna Mantri | Alok Anshu, Abhishek Kr. Abhi , Nikhil R. Shimpi

Abstract

the idea of Designing and implementing a security based ATM theft project is born with the observation in our real life incidents happening in around us. This project deals with prevention of ATM theft robbery, so to overcome the drawback founded in exciting technology in our society. Whenever robbery occurs, vibration sensor is used, which senses vibration produced from ATM machine. Once the vibration is sensed the beep sound will occur from the buzzer. And also if ATM system got fire then fire sensor is used to sense the fire, once the fire sensor senses fire then Buzzer starts to beep. RTC is used to capture the robber occurrence time and send the robbery occurrence time with the message to the nearby police station and corresponding bank through GSM.

Smart Bus

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Bindhu.R | Hema.R , T.K Pradeep Kumar , Lorate Shiny

Abstract

This is an automated system which will be fitted in the Bus for cleaning the dust particle from environment.The proposed technique is intended to facilitate the user to clean the dust particle through vacuum cleaner. In this system Microcontroller is the main unit, which controls the whole process. We are going to use AVR family microcontroller (ATMEGA 8/ ATMEGA 16). Vacuum Cleaner is used for cleaning the dust particle from road, which is connected with microcontroller. There is a container for containing the dust particle. We are going to use IR sensor for detecting the quantity of dust particle in container. IR sensor will be fitted on the top of container. When the container will be filled with dust container, then the sensor will detect it and send information to microcontroller. The sensor will be connected with Microcontroller .There will be one alert system for giving alert when the sensor will detect the quantity of dust. There will be one manual switch, which will be used for opening and closing of the container. Motors will be fitted on the top of container for opening and closing container.solar panels are placed on roof of the bus for power supply

Smart phone application for Hazard Reporting

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shivani Rewatkar | Pooja Dube,Yugandhara Pannase, Divya Ghodmare,Akhil Suryawanshi

Abstract

Now a day’s Android plays an import role in our lives. A new area where mobile is useful for gathering hazardous locations, of public area, information as they are not readily accessible at any point. Thus, using cloud, we will try to make all the information related to the hazardous areas available on the Android Application to the various organization like Police, Municipal Corporation, News Papers, etc. during their investigation which would speed-up the entire process of tracking down the hazardous problems. A mobile application is made available to the common people in order to update the hazardous problems by capturing the image and the location of the area and is sent to the server and the responsible authority is informed. Then the respective authority is responsible for allocating the problems to their respective employees and then it is solved by these employees. The notification of the problem solving is sent to the mobile of the user and authorities. The System generates the ratings Negative and Positive to the work solved within days on basis of work solved between 3 days it will rate Positive or Negative. Using this system, we can keep records of the ratio of complaints registered and issues which are unsolved

Social Network Analysis

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

G Purushotham | E Teja

Abstract

Social Network Analysis is a fascinating multi-disciplinary endeavor that uses techniques from complex network analysis and graph theory to study the system of relations between a set of actors. Actors are discrete individuals, or collective social units. A social network is a finite set of actors and the relationships defined on them. Such networks are studied using metrics and techniques stemming from complex network analysis, typically involving estimating diameter, cores, groups, degree distribution of nodes, centrality measures (e.g., eigenval centrality, Google page-rank), clustering coefficient and navigability.

Stock Prediction Using Clustering And Regression Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shalini Lotlikar | Megha Ainapurkar

Abstract

A stock market is the aggregation of buyers and sellers. A stock exchange is a place where, or an organization through which, individuals and organizations can trade stocks. In the financial market the decision on when buying or selling stocks is important in order to achieve profit. There are several techniques that can be used to help investors in order to make a decision for financial gain .The data set is taken from yahoo finance and preprocessing is performed on it. Clustering and regression are two techniques of data mining used here .For prediction of future stock price multiple regression technique is used which helps the buyers and sellers to choose their companies for stock.This paper has introduced the k means algorithm after which multiple regression is applied to predict the stock.

Survey on Classification of Time Series Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Penugonda Ravikumar | Devanga Ampabathini Susmitha

Abstract

Classification of time series data is one of the popular fields nowadays. Many algorithms exist to get accurate and faster result which speeds up the computation. Nowadays E-Commerce sites are providing many user convenient options like recommendations for the products that they are purchasing which are playing key role in attracting the users to visit their sites. All these are happening based on the classification of data. Home automation is one of the evolving technologies in which data storage is important. It will be convenient if we are able to compare test data with limited trained data by preserving accuracy. Some data such as national security, personal information, bank details must be very confidential which has to be stored very securely. These all comes under time series data and data such as images, weather reports, speeches, and satellites data can be converted into time series data. Classification of normal data can be done by normal methods like nearest neighbor but to classify Time Series data by taking all these above features into consideration is difficult because time series data has to convert into structured format and it has to be sort and compare according to time Some existing algorithms are quite good in classifying Time Series data by satisfying some of these features. There are many algorithms which can classify data of different types quite accurately. But all algorithms might not satisfy all factors. So based on type of data we have to choose appropriate algorithm.

Survey on MRI Image Segmentation Techniques for Brain Tumor Detection

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

AmitojKaur | 

Abstract

This survey focuses on techniques available for MRI image segmentation for brain tumor detection using computer assisted image processing algorithms. The need of automated and or semi-automated tumor detection is highly regarded and required as the technology is progressing and the cases of brain tumors and edema are rising. The current technologies and available methods are reviewed in this paper.

Synthesizing Face Video of a Target Subject

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Preetam S. Varude | Sujata S. Agrawal

Abstract

Synthesizing a face video of a target subject that nothing but the mimicry of the expressions of a source subject in the input video is facial expression retargeting in video. Facial expression retargeting has applications areas like dummy pictures. In retargeting problem, it uses the facial expression video of one subject as input to synthesize new facial expressions of another subject, therefore it is more reasonable to include the facial expression of different subjects in the training and test datasets. That is, two datasets should not contain the expressions of the same subject for the application. This paper includes required results of different facial expression retargeting techniques.

Test Case Selection Using Nature Inspired Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th June 2017

Hemalatha T | S Rohini, D Vivekananda Reddy

Abstract

In software development life cycle (SDLC), testing phase is the most important phase. Without testing we can‚Äôt give quality software or risk free software to the client. Software testing process typically consumes at least 50% of the total cost involved in software development. In regression testing there evolves the number of test cases. Due to some constraints, it is impractical to test all of them. Therefore to overcome this problem, testing is done using selected test cases to reduce the testing effort and get the desired result accurately. In this paper, the algorithms which are discussed imitate the processes running in nature. And due to this these process are named as ‚ÄúNature Inspired Algorithms‚ÄĚ. The algorithms inspired from human body and its working and the algorithms inspired from the working of groups of social agents like ants, bees, and insects are the two classes of solving such Problems. This emerging new era is highly unexplored young for the research. The Algorithm proposed here uses swarm based intelligence technique on Maximum coverage to select the best of breed test case to evaluate any errors in the development cycle therefore the BCO produce optimal no. of test cases solving optimization problem.

Text Based Emotion Detection Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Akshaya Chandorkar | Asha Bharambe

Abstract

Emotion can be expressed by different forms such as written text, speech or video. With the growth of social networking, textual data has proven to be the main tool of the interaction. Emotion Detection in text documents is essentially a content-based classification problem which has evolved from the domains like Natural Language Processing as well as Machine Learning. Computational analysis of emotions has been considered a challenging and interesting task. However, there are few prior works who work with textual input to analyse these emotions. This paper explains different techniques of emotion detection, challenges faced and various applications of emotion detection. Also, it presents the implementation of the system.

The Next evolution of the Internet... ?Internet of Things?

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Dr. Vikash K Singh | Devendra Singh Kushwaha, Shaibya Singh, Sonal Sharma

Abstract

In recent years, the term ďInternet of ThingsĒ has spread rapidly weíre entering a new era of computing technology that many are calling the Internet of Things (IoT). Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent systems call it what you want, but itís happening, and its potential is huge. We see the IoT as billions of smart, connected ďthingsĒ (a sort of ďuniversal global neural networkĒ in the cloud) that will encompass every aspect of our lives, and its foundation is the intelligence that embedded processing provides. The IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can ďcommand and controlĒ things to make our lives much easier and saferand to reduce our impact on the environment. The creativity of this new era is boundless, with amazing potential to improve our lives. Now consider that IoT represents the next evolution of the Internet, taking a huge leap in its ability to gather, analyze, and distribute data that we can turn into information, knowledge, and, ultimately, wisdom. In this context, IoT becomes immensely important.

Trust based Novel Secure Data Sharing Policy Framework for Social Networking

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd June 2017

Varun M Deshpande | Dr Mydhili K. Nair

Abstract

The advent of social networking and e-commerce empowered by cloud computing has created a paradigm shift in how people around the world communicate and do business. Amount of data being generated and information being shared by users is growing exponentially each hour. People around the world, have openly embraced the era of information technology, and almost unknowingly, it has become part and parcel of their daily life. However, the multitude of facilities provided by companies such as Facebook, Google, Amazon come with few potential concerns. Digital privacy of users and data security are at top of this list. Each company publish their own data policy and hence user generated data driven advertisements need to be analyzed carefully and holistic privacy preserving regulations enforced. We highlight results obtained from an online survey conducted to get an end-user perspective to these concerns on their digital identity. A compulsive effort is required to setup open standards based policy framework to achieve privacy preserving social networking and secure opt out mechanism needs to be offered to the users who do not wish to share their personal details with 3 rd party. We describe a trust based novel secure data sharing framework for implementing open standards on data security and privacy. This would be one step towards providing trustable software solutions for secure cloud based services.

Vehicle Tracking System

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Meghana H M | Dr. M Siddappa

Abstract

An efficient vehicle tracking system is designedand implemented for tracking the movement of any equipped vehicle from any location at any time. The proposed system made good use of a popular technology. a Smartphone application. This will be easy to make and inexpensive compared to others. The designed in-vehicle device works using Global Positioning System (GPS) and Location Based Services (LBS) technology that is one of the most common ways for vehicle tracking. The device is embedded inside a vehicle whose position is to be determined and tracked in real-time. The vehicle tracking system uses the GPS module to get geographic coordinates at regular time intervals. The GSM/GPRS module is used to transmit and update the vehicle location to a database. A Smartphone application is also developed for continuously monitoring the vehicle location. The Google Maps API is used to display the vehicle on the map in the Smartphone application. Thus, users will be able to continuously monitor a moving vehicle on demand using the Smartphone application and determine the estimated distance and time for the vehicle to arrive at a given destination. In order to show the feasibility and effectiveness of the system, this paper presents experimental results of the vehicle tracking system and some experiences on practical implementations.Keyword-5G,super speed,WCSM.

Video Enhancement in Video Surveillance System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Saylee Betawar | Shubham Amale,Nikita Harode,Rakshat Jaiswal

Abstract

Digital video has become an integral part of everyday life. It is well -known that video enhancement as an active topic in computer vision has received much attention in recent years. The aim is to improve the visual appearance of the video or to provide a ‚Äúbetter‚ÄĚ transform representation for future automated video processing such as analysis, detection and segmentation. Moreover, it helps analyses background information that is essential to understand object behaviour without requiring expensive human visual inspection. Therefore, in this paper, we aim at a novel approach to an algorithm for video enhancement.

Video Mining using Query by Example

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Rosebud Valadares | 

Abstract

When technology advances and data explodes, development takes place. As the industry grasps every opportunity to shift its strategy towards satisfying the consumer, the consumer‚Äôs demand further increases. Today, people have advanced from using black and white text, to the more effective and appealing realm of multimedia. With this, the consumer demand has evolved from text-based retrieval to content-based retrieval. In this paper, Video Mining is carried out using content-based retrieval. The content-based Video Mining system aims to effectively retrieve videos using the Query by Example approach wherein search is made based on a query video. The system has two components ‚Äď a video feature repository and a Match-Retrieve module. On accepting a query video, it is first segmented and its color, audio and meta-data features extracted. These features are used to perform the required video mining based on similarity to the contents of the video feature repository

Wavelet based Compression of Hyper Spectral Image cube using Tensor Decomposition

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th May 2017

Varsha Ajith | D.K.Budhwant

Abstract

As the dimensionality of remotely sensed Hyper spectral images are increasing, compression is required to transmit and archive Hyper spectral data. In this paper, an adept method for Hyper spectral image compression is presented to effectively reduce the volume of Hyper spectral data. The objective of proposed method is to apply classical compression method where low frequency information is reserved and high frequency information is discarded, based on Discrete Wavelet Transform. The core idea of our proposed method is to apply tucker decomposition on the wavelet coefficient, exploit both the spectral and the spectral information in the images. Moreover, it also evaluates the compression ratios for biorthogonal wavelet family The obtained result shows better performance on Bior1.1 and Bior1.3 wavelets.

Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Avinash Singh | Ram Singar Verma

Abstract

A wormhole assault is especially hurtful against steering in sensor systems where an assailant gets bundles at one area in the system, passages and afterward replays them at another remote area in the system. A wormhole assault can be effortlessly propelled by an aggressor without bargaining any sensor hubs. Since a large portion of the steering conventions don't have systems to shield the system against wormhole assaults, the course demand can be burrowed to the objective region by the aggressor through wormholes. Along these lines, the sensor hubs in the objective zone construct the course through the assailant. Afterward, the assailant can alter the information, messages, or specifically forward information messages to disturb the elements of the sensor arrange. In this work we show another approach to identify wormhole assaults in MANET. Our location is basic and productive. We require neither GPS gadget, nor clock synchronization which are the fundamental restrictions of the other existing arrangements. Also, our recognition can be effortlessly actualized convention or in any neighbor revelation convention for MANET. We don't present any new messages. Along these lines, the overhead of the arrangement is restricted to the additional data (timestamps) attached to the Hello messages.