Current Publications

COMPARISON BETWEEN VIOLA-JONES AND KLT ALGORITHMS AND ERROR CORRECTION OF VIOLA-JONES ALGORITHM

Mohammad Ashraful Islam1 Md. Anin Naeem2, Md. Nazmul Hasan2

1 Lecturer, Department of Computer Science and Engineering, Mawlana Bhashani Science & Technology University, Bangladesh

Student, Department of Computer Science and Engineering, Mawlana Bhashani Science & Technology University, Bangladesh

ABSTRACT:
Face detection is the first step of automated face recognition process in all pattern matching or artificial intelligence or robotic vision system. There are many face detection algorithms and they have their own strengths and limitations in terms of speed and accuracy in different situations. Viola-Jones and KLT are two well-known algorithms used for real time face detection and they work differently. Viola-Jones algorithm is much faster even though it is proved to be erroneous in some specific circumstances. KLT is basically used for tracking by points feature in frames. In this paper, we have given an overview of these two algorithms and made comparative analysis amongst them. Later we have proposed a method that improves the accuracy of Viola-Jones algorithm by removing/minimizing false detection.

Keywords: Face Detection, Viola-Jones algorithm, KLT algorithm, Error Correction, Individual detection.

pdf

By | 2017-07-06T07:27:46+00:00 July 6th, 2017|General, Publications|0 Comments

ENCRYPTION OF BIG DATA WITH FLEXIBLE DATA ACCESS IN CLOUD COMPUTING

Shrikant malge1, Snehal D. Chaudhary2, Priyanka Paygude3

2,3Assistant Professor, Department of Information Technology,

Bharati Vidyapeeth College of Engineering, Pune, India

 ABSTRACT:

These days, we survive in large interrelated globe which produces a huge information every day, starting from the logging files of the users of social networks, search engines, e-mail clients to machine generated data as from the real-time monitoring of sensor networks for dams or bridges, and various vehicles such as airplanes, cars or ships. It also comprises private, skilled, communal data and so on. Artificial intelligent as well as inter connection direct to an unpredicted expansion of information. The Web is an input retriever for an information development. The web produced information previously go beyond the presented storage space. As 2011 concern in a region recognized as a big data that has been enlarged aggressively. Since the rising exploit of a big data as well as increasing capacity of big data, therefore protection of big data is measured critical. This complexity rotates into an unease to compact when believing that the data id uploading on to the cloud storage. In this paper we have proposed two different symmetric encryption algorithms such as AES and SERPENT to handle the big data on the cloud storage space with safe data access. Also we have proposed a new policy update method which helps to capable data access control in the dynamic policy update for big data in the cloud storage. In this, same input key is utilized for the both encryption and decryption operation. Here two types of files are handling as an input such as Text file and image file for encryption and decryption. In experimental result, result of both algorithms is shown with the help of graphs with two different parameters such as Time and Number of files. We have also shown the comparative analysis of both algorithms that shows AES encryption algorithm gives superior performance than the serpent encryption algorithm.

Keywords: Access control, protection, Encryption, Decryption, big Data, cloud storage.

pdf

By | 2017-07-06T07:23:53+00:00 July 6th, 2017|General, Publications|0 Comments

FACTOR ANALYSIS SCORES IN MULTIPLE LINEAR REGRESSION MODEL FOR PREDICTION OF FACULTY PERFORMANCE IN HIGHER EDUCATION INSTITUTIONS

Mamatha H.K. 1, Chaithra N2, S Balasubramanian 3

 1Department of Health System Management Studies, Jagadguru Sri Shivarathreeshwara University, Mysuru, India

 2Faculty of Life Sciences, Jagadguru Sri Shivarathreeshwara University, Mysuru, India

3Jagadguru Sri Shivarathreeshwara University, Mysuru, India

ABSTRACT:

Performance evaluation of faculty in higher education institutions is a challenge for education managers considering the diversity of disciplines. Though University Grants Commission (UGC) has given a format based on Academic Performance Indicators (API) many a times education managers face uncertainty in making decisions on the quality of performance as the scores are numerical and do not consider the subjective component involved in teaching learning process. The API format also includes several criteria like teaching, co curricular, research and feedback. The score of faculty across all these criteria indicates their overall performance which is used in decision making with regard to increment, promotion, etc. Measuring performance without considering the variation in each of these criteria may not yield good decisions. Hence, a statistical model which can assess the dependency and independency of the criteria was used to evaluate which of these criteria have maximum influence on the overall performance scores of the faculty.
In this study, multiple linear regression model is used to assess faculty performance wherein the total score of the faculty API score is taken as dependent variable and the teaching learning evaluation, co curricular activities, research and feedback are considered as independent variables. Factor scores obtained by factor analysis were used for multiple linear regression analysis using the SPSS software.

Key words: Faculty performance evaluation, higher education institutions, multiple linear regression analysis.

pdf

By | 2017-07-06T07:15:13+00:00 July 6th, 2017|General, Publications|0 Comments

ONLINE VOTING PORTAL BASED ON AADHAAR CARD VERIFICATION

Ayush Agarwal 1, Rishabh Bajaj 1, Rachit Sharma 1 , Shubham Dubey 1 , Ms. Shrikala Deshmukh 1 , Ms Snehal Chaudhary 1 , Ms Priyanka Paygude 1

 1Department of Information Technology Bharati Vidyapeeth Deemed University, College Of Engineering, Pune, India

 

ABSTRACT:

 Voting is the most important thing which makes India the most democratic country. Voting is done to elect a candidate and make him/her the leader of a specific area which can be even large as a country. People have faith in that candidate, they hope that he will work in the favour of the society. The elected candidate has many powers which are provided to him by the government. These power can be misused too. There are many people who want to be elected for that power. In today’s world security and authenticity is very important aspect and people want that only the most deserving candidate should win. Every single vote is important. All the votes given by the public should be kept private and its authenticity should be maintained throughout the election process. We currently have a voting system which makes a person to physically go to an allotted booth which is given by the election commission of India according to the area in which the person is residing. There is no such procedure which allows us to vote by sitting in our homes. This is the era of internet, if we are having such facility then why not use it. The main problem in this procedure is security and authenticity. This particular paper proposes online voting application that can be operated remotely from your computers, smartphones, tablets, in short from every device which can run internet. By using this application user can vote online. The application provides verification through AADHAAR card for security and authenticity. The principle aim of this paper is actually providing an online voting application to vote and elect the most deserving candidate for a specific area. This application is quite secure and votes are authentic as it is using AADHAAR card for verification.

 Keywords: Voting, AADHAAR card registration, AADHAAR card verification, Election Commission of India.

pdf

By | 2017-07-04T11:02:10+00:00 July 4th, 2017|General, Publications|0 Comments

IMPLEMENTATION TECHNIQUE FOR DATA AND IMAGE THROUGH DATABASE SYNCHRONIZATION BETWEEN LOCAL AND SERVER

Jindal Rajni 1, Singla Abhinash 2

 1 Student, Mtech CSE Department, Bhai Gurdas Institute of Engineering &  Technology, Sangrur

 2 Head  CSE Department, Bhai Gurdas Institute of Engineering &  Technology, Sangrur

ABSTRACT:

The basic objective of this paper is provide an algorithm to solve the problem, when all clients are relying on a single server. Due to planned server downtime or from server failures the database becomes unavailable; all of the remote workers will be disconnected from their data. Data is stored on their system (user system). When the user connected to the internet data automatically sink from their client system to the server in serial order and it also works on file handling. When the system is disconnected from the network all the files (images) uploaded by user, saved on the client machine folder when it is again connected to the server, automatically files (images) transferred from client to server.

Keywords: Plugged off mode, Plugged In mode, Web Functions, Web Services, Data Synchronization

pdf

By | 2017-07-04T10:56:13+00:00 July 4th, 2017|General, Publications|0 Comments

SUPPORTING STUDENTS WITH WRITING DISORDER USING WORD PREDICTION AS A MICROSOFT WORD ADD-IN

Onintra Poobrasert 1, Thaphat Mupattararot 2, Lattapol Sae-aue3

1,2,3  National Electronics and Computer Technology Center,  National Science and Technology Development Agency, Thailand

ABSTRACT:

This study represents an experiment on the efficiency of an assistive technology tool for learning disabilities in writing. The tool used in this study is Thai Word Prediction add-in for Microsoft Word. The hypothesis was to gain results of typing using the add-in better than results of writing without using the add-in. A representative sample included 8 Thai students with learning disabilities in writing from grade 4 to 6. The pre-test and post-test are presented in this study. Moreover, the authors conducted this study with 3 main methods. The first method is to write 2 stories from dictation without using Thai Word Prediction add-in and then compare the results to the typing with the same stories using the add-in. The second method is to compose a story for each 2 given topics by writing without using the add-in and then compare the results to the typing using the add-in. The last method was to compose a story for each 2 given pictures by writing without using the add-in and then typing using the add-in. Results for the first method shows that the scores of correct words from typing using Thai Word Prediction add-in are between 80-100%. Hence, the scores of correct words from writing without using the add-in are between 32-91%. Results for the second method shows that the scores of correct words from typing using the add-in is greater than the scores of correct words from writing without using the add-in for 6 out of 8 students. For the third method, there are 7 out of 8 students have the correct words of typing using the add-in better than writing without using the add-in. Additionally results show that all students could compose stories from given orders longer and more correct using the add-in than the writing without add-in.

Keywords: Learning disabilities, Microsoft word, Word completion, Word prediction, Writing disorder, Single subject research design

 

pdf

By | 2017-07-04T10:50:03+00:00 July 4th, 2017|General, Publications|0 Comments

SURVEY ON DEDUPLICATION TECHNIQUES

Manoj Manjunath1, Mohith.D2, N.V.Swati3, Poornima Sridhar4, Nagarathna .N5

1,2,3,4 Students, 5 Assoc.Professor, Department of Computer Science & Engineering,

B.M.S College of Engineering, Bengaluru, India

ABSTRACT:
The paper gives an account of different image deduplication techniques employed at the client side and the server side. Deduplication is the process of removal of duplicate data. This technique can be used for both text and image data. This technique considerably reduces the data storage and also overhead of huge data transmission. Apart from the conventional methods of deduplication, the use of various perceptual hashing algorithms, their strengths and weaknesses are studied. Perceptual hashing will be used as hashing algorithm in Content Aware Image deduplication. It finds identical images and also differentiates dissimilar images efficiently.

Keywords: Data storage, Data transmission, Deduplication, Content-aware image deduplication, Perceptual hashing.

pdf

By | 2017-07-04T10:45:20+00:00 July 4th, 2017|General, Publications|0 Comments

HIDING MESSAGES INTO MUSICAL NOTES USING MUSICAL CRYPTOGRAPHY

Dhanashree H. Parab, Akshay Nambly, Shraddhali N. Patil and Linda Mary John

Department of Computer Engineering Mumbai University, India

 

ABSTRACT:

The Cryptography is a practice used in hiding the confidential information into a form in which the hidden information is accessed only by the intended person. Traditionally, there are many ways which can be used like Additive cipher, Substitution cipher, Caeser Cipher etc. for encryption and decryption of information. The earlier techniques referred as Ciphers, which are a set of steps (algorithm) for encryption and the corresponding description. The basic elements used were the alphabets. Here in our work, we are looking after hiding the information using musical notes and their frequencies so that they cannot be recognized which is known as Musical Cryptography. The paper focuses on developing a system which encrypts the information into a music and then decrypts it into its text format using the Genetic Algorithm. We create a population, find fitness and perform crossover to get the best output.

Keywords: Cryptography, Musical Cryptography, Ciphers, Encryption, Decryption, Genetic Algorithm, Population, Fitness, Mutation

pdf

By | 2017-07-04T10:41:18+00:00 July 4th, 2017|General, Publications|0 Comments

A SURVEY ON AUTOMATED TOLL SYSTEM USING NUMBER PLATE DETECTION

Roshni W. Kolhe 1 , Rajeev N. Verma 2

 1 Student, 2 Professor Department of Computer Science & Engineering, Nagpur Institute of Technology, Nagpur-441501, India

ABSTRACT:

Number Plate Detection using Image Processing is used for Toll System Management. At Present day Time, efficiency, fuel and pollution are a matter of priority. Image processing technology is used to overcome the important issues of vehicle time consumption and congestion. In this system image of the number plate of vehicle will be captured as an input. Using this image (or video) the number plate is detected and further process continues. Various modules of this system are RTO admin, Super admin, Toll admin, Police admin and the general public. Super admin roll is to register toll centres at various locations using User name and password. These credentials are sent to the toll admin, using which he logs in to the account. Based on vehicle type Toll admin module is used for the calculation purpose of toll deduction. The Regional Transport Authority (RTO) enrols the vehicle information and links it with the vehicle number plate. The number plate is detected and the notification is send to the Police admin module in case of any stolen vehicle passes through the toll collection center. Toll deduction happens through e-wallet assigned to the respective number plate of the vehicle that belongs to the owners’ account. The information of daily toll collection can be obtained and send to the Government for verification purpose.

Keywords: Detection, e-wallet, Congestion, Verification

pdf

By | 2017-05-11T10:13:13+00:00 May 11th, 2017|General, Publications|0 Comments

AN IMAGE COMPRESSION TECHNIQUE USING PIXEL BASED LEVELING

 Mr. S.Vijayanand, Mrs. B. Harichandana, Miss. K. Lavanya

Scholar in the Dept of Computer Science & Technology, S.K.U., Anantapuram

ABSTRACT:
The propose procedure is Pixel Based Leveling (PBL) Technique. PBL is a lossy strategy and appropriate for still pictures. In PBL strategy picture is size is decreased in every level. PBL method is finished with two methodologies. One of the methodologies is leveling and another is leveling with bit cut. We have utilized 8 levels, up to 3 levels picture won’t exasperate and gives more pressure rate. Be that as it may, in level 4 onwards picture is bothered a considerable measure and gives preferred pressure over level 3.In every level unique picture can be recovered with loss of information.
In first phase a sample image is taken and bit slicing technique is applied from bit slice 1 to bit slice 8. On the application of bit slice 1 and bit slice 2 there is no much changes in size and image is disturbed a lot. And on the application of bit slice 3 onwards size of the image is goes on reducing and clarity of image is also increasing In second phase, a bit slice 8 image is taken and leveling technique i.e. only level 1 is applied for further compression. This approach is showing better compression than first approach.

Key words: Pixel Based Leveling, Bit slice

pdf

By | 2017-05-11T10:10:40+00:00 May 11th, 2017|General, Publications|0 Comments

ATTRIBUTE BASED ENCRYPTION FOR SECURING AND SEARCHING FOR ENCRYPTED DATA

Mr.Mayur Shivaji Jadhav, Mr.Abhishek Kiran Mhatre, Mr.Rahul Ramesh Pote, Mr.Jay Shivkalyan Todkari, Mrs.Rohini Patil

Department of Computer Engineering TERNA Engineering College Navi Mumbai, India

ABSTRACT:

Cloud storage system allows users to store their data and utilized their data and access it on demand resources available in cloud applications without having the load of local hardware and software management. While usage of cloud computing brings these advantages more pleasing than ever, it also brings more challenging security threats to the outsourced data.
Security and privacy are very important and major issues in cloud computing. Now an until various numbers of methods and techniques has been developed to handle various number of problems that arises, to ensure data integrity, security , privacy but all those techniques leads to their own problems and limitations.
The Attribute based encryption algorithm is used in secure data storage on a cloud. An Attribute is generated and encryption is done on basis on that generated attribute. Asymmetric algorithm is used for public key cryptography. Verification of user is done who has requested the data. Only registered and authorized users with valid attributes provided can access the data. As per the scheme a user can create its own file and store it securely in the cloud.

Keyword: encryption, decryption, Attribute based encryption, searching

pdf

 

By | 2017-05-11T10:07:49+00:00 May 11th, 2017|General, Publications|0 Comments

ENHANCING THE SECURITY OF AUTHENTICATION SYSTEM BASED ON 2L-QR CODE FOR PRIVACY OF DATA

Manasvi Belote and Rahul Kapse

Department of Information Technology University of Mumbai, India

ABSTRACT:

Two level QR code is a novel approach for improving the storage capacity of the QR code and provide document authentication ensuring overall security. QR code which became popular during the recent years due to the wide proliferation of smart phones is an information matrix with large encoding capacity and ease of data recovery. Two level QR code with two storage levels, both private and public was designed for private message sharing and document authentication. The greatest challenge of 2LQR code is that each cell in a 2LQR code could hold only 1 bit data which is comparatively smaller data storage. As a solution for this, is the two level QR code, where each cell in a 2L QR code holds 1 byte of data, which is 8 times more storage capacity than the existing system. This work introduces a new architecture for the QR code, where instead of position tags, random seed which stores random integers are employed, which guarantee that starting from the same seed always results in the same sequence of numbers while encoding and decoding. Use MD5 hashing for document authentication where the document is divided into parts and compute local hash for each part and compare it with QR code.

Keywords: : QR code, two storage levels, private message, document authentication, Pattern Recognition, Content Authentication.

pdf

By | 2017-05-11T10:04:44+00:00 May 11th, 2017|General, Publications|0 Comments

CONTINUOUS MONITORING SYSTEM FOR PROMOTING STUDENT

Rishi Kumar Dubey1 and Umesh Kumar Pandey2

 Research Scholar, Research Supervisor MATS School of IT, MATS University Raipur Chhattisgarh India

ABSTRACT:

Out of many aspects, educational data mining can be used for continuous monitoring of the student. Everyday new pedagogy is proposed to for teaching learning and evaluation process. Success of pedagogy depends on the learning enrichment. Estimation of student skill is one of the complicated tasks. Participative learning is becoming pervasive among modern educators. Student centered, collaborative and participative environment empowers student to be independent and interdependent. Number of activities added into the curricula for this purpose. But question is “how to assess their learning level”. In this paper a model is proposed for continuous monitoring of student in participative learning pedagogy.

Keywords: Educational Data Mining, Performance prediction, Predictive modeling, Continuous monitoring, Participative learning.

pdf

By | 2017-05-11T09:43:08+00:00 May 11th, 2017|General, Publications|0 Comments

A NOVEL MOTION DETECTION METHOD USING BACKGROUND SUBTRACTION MODIFYING TEMPORAL AVERAGING METHOD

Poornima 1, G. Rithin Surya SaiNadh 2

 1 Assistant Professor, Department of Computer Science & Engineering, Mahatma Gandhi Institute of Technology, Hyderabad, India

 2Department of Computer Science & Engineering, Mahatma Gandhi Institute of Technology, Hyderabad, India

ABSTRACT:

The detection of moving objects in an image sequence is very important low-level task for many computer applications now-a-days, such as video surveillance and traffic monitoring. Many of these methods use background subtraction techniques to separate the foreground objects from the background. A mere approach in background subtraction techniques named as Temporal averaging is modified by overcoming some of the drawbacks for detection of moving foreground objects from a nonstationary background.
The traditional temporal averaging method works perfectly in a stationary background and fails for small object detection and nonstationary background. Two types of variants are shown. One is by adaptive threshold and other is by adaptive updating speed by pixel difference. The proposed method is more reliable, less complex and not very expensive to implement. The comparison of results of traditional temporal averaging and proposed method are clearly shown with F-measure analysis.

Keywords: Background Subtraction, Temporal averaging, Motion detection

pdf

By | 2017-05-11T09:36:29+00:00 May 11th, 2017|General, Publications|0 Comments

EFFICIENT DATA LINEAGE WITH AUTOMATIC GUIDELINES IN A SECURE ENVIRONMENT

Mr.Maria Michael Visuwasam1,Prasanth Venugopal2, K.Pragadeesh2 and S.Shasedharan2

 1Assistant Professor, Department of Computer Science and Engineering, Velammal Institute of Technology,Chennai.

2 Student,IV year, Department of Computer Science and Engineering, Velammal Institute of Technology,Chennai.

ABSTRACT:

Today most of the Attackers target social media network this happens in malicious Environment. User doesn’t know if the data we share is misused by the attacker or not. We propose a novel concept named “OTP” based data access, where the data owner can easily identify the malicious user, because users should be validated to receive any data from data owner. All stored data is based on Data Lineage concept. Data Lineage means only a single copy of the data is shared to all users and an audit is maintained. We can avoid Duplications and easily identify data leakage by effectively managing Database memory. An Automated set of guidelines defined by us also ensures that our users don’t post any information that is harmful or reveals any personal information. We have proposed one more concept named de- duplication, it basically finds out duplicate entries where we use MD5 Algorithm (message- digest algorithm).MD5 algorithm basically accepts a message as input and generates a fixed- length output, which is generally less than the length of the input message. The output is called a hash value, a fingerprint, or a message digest. If the message digests match, then we know a duplicate has been uploaded.

Keywords: : Data Lineage, Cloud Computing, De-duplication ,Guidelines ,Privacy

pdf

By | 2017-05-11T09:33:21+00:00 May 11th, 2017|General, Publications|0 Comments

ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER

 Priyanka Sonawane and Archana Augustine

 Department of Information Technology University of Mumbai, India

ABSTRACT:

Web application provides secondary authentication when user forgets their password. For that user have to select the question from pre defined lists of question which includes user long term history question like What is your first school, what is your birth place etc. Answer of such question will not change over a decade. Answer of this question can be easily break by using social networking sites like Facebook as well as answer of this question will also be guess by brute force attack . So to overcome this problem we present Secondary Authentication System based on mobile data of user. Today smart phones come with inbuilt features like GPS. We used the data for calls, SMS history, calendar, application installment and based on this data are have created the question and categorized them as MCQ, blank filling, True/False .To fetch the user mobile activity SVM algorithm is used and to keep the answer of the question secure we have used RSA algorithm.

Keywords: Secondary Authentication, Smart phone data , RSA, Machine learning.

pdf

By | 2017-05-01T06:27:15+00:00 May 1st, 2017|General, Publications|0 Comments

HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION

Ashwini Khillari and Archana Augustine 

Department of Information Technology University of Mumbai, India

ABSTRACT:

Various Cyber criminals are attacking on infrastructure and botnets are common component of those attacks. Botnet is the most widespread and serious threat which occurs commonly in today’s cyber attacks.A botnet is a group of many computers which are affected by some virus and they are remotely controlled by hackers to launch various network attacks, such as Distributed Denial of Service attack, spam, identity theft and information phishing. The defining characteristic of botnets is the use of command and control channels through which they can be updated and directed. Botnet has become a popular and productive tool behind many cyber attacks. Recently malicious botnets evolve into HTTP botnets out of typical IRC botnets. Here, also we have given the comparative study in different types of botnets such as IRC, HTTP, and command and control channel. Data mining is called data or knowledge discovery is the process of analyzing data. Data mining software is for analyzing data. Data mining algorithms allow us to detecting characteristics from large amount of data where the other methods could not apply. Here, a new technique for botnet detection is presented that makes use of pattern-sets generated by the Apriori algorithm and to provide security against such attaks here we are using RSA algorithm. The proposed detection technique is mainly being used for HTTP based botnet and here like other techniques no prior knowledge required of other botnets . Because of various criminal attacks we need botnet detection and hence also we have to provide security against such attacks.

Keywords: HTTP botnet, botnet detection, Apriori Algorithm with actual time duration, cyber attack.

pdf

By | 2017-05-01T06:21:13+00:00 May 1st, 2017|General, Publications|0 Comments

A FRAMEWORK FOR SENTIMENT ANALYSIS FROM TEXT IN ONLINE SOCIAL NETWORKS

Sonam S. Chavan  and Rahul Kapse

Department of Information Technology, PHCET University of Mumbai, India

ABSTRACT:

Online social networks are so popular nowadays that they are a major component of an individual’s social interaction. They are also emotionally rich environment where people share their emotions, feelings or sentiments and thoughts. Sentiments spread between people in direct contact, but it is unclear whether massive online social networks also contribute to this spread. Here, we elaborate a new framework for characterizing sentimental interactions in social networks. The goal is to extract the sentimental content of text in online networks. The framework includes a model for data collection, Database schema, Data processing and sentiment analysis. The informal language of online social network is main point to consider before performing any sentiment analysis techniques. This is the main reason framework includes the development of special lexicons. In general, we present a new perspective for studying sentiment analysis or expression in online social network where it deals with the nature of these sites and the nature of the language used.

Keywords: SentiWordNet, Stopwords, Online Social Networks, Emotions, Sentiment Analysis.

pdf

By | 2017-03-26T07:26:53+00:00 March 26th, 2017|Publications|0 Comments

3D PASSWORD SECURITY WITH RUBIX

Ms.Divya Suresh Patil1, Ms.Sneha Dinkar Kamble2, Ms.Siddhika Mahadeo Khot3, Mr.Aditya Kishor Swar4

 1Department of Computer Engineering TERNA Engineering college Navi Mumbai, India

ABSTRACT:

Today’s World, with increasing focus over concerns of security and privacy, authentication mechanisms have taken a big leap from traditional password based systems to the newer OTP and biometric systems. But these systems require an extra framework to make the security effective. Therefore we present idea of 3D password systems as they are more secure and customizable authentication. Once System is implemented and you log in to a secure site, the GUI of 3D password opens up. In addition, the user can simply put textual passwords. Once he goes through the first authentication, a 3D object “A RUBIX CUBE “will open on the screen. The user will interact with 3d object “Rubix cube” by scrambling it with different moves of sequences which will create the password. The combinations of two authentication system are supposed to replace the textual passwords as they provide full cover from key logging attacks. The proposed system aims to build a 3D password based authentication mechanism to build a secure access protocol.

Keywords: key logging attacks, Rubix cube, scrambling.

pdf

By | 2017-03-24T10:22:56+00:00 March 24th, 2017|Publications|0 Comments

INTELLIGENT PARKING SOLUTION USING RASPBERRY PI WITH AWS IOT: A SURVEY

Srishtishree J 1, Soma Mahanty 2, Sushmitha M V 3, Shwetha 4, Pallavi G B 5

1,2,3,4 Students, 5Asst.Professor, Department of Computer Science & Engineering,

B.M.S College of Engineering, Bengaluru, India

ABSTRACT:

Internet of Things is one of the emerging technology in recent time. IoT – and the machine-to-machine (M2M) technology behind it – are bringing a kind of “super visibility” to nearly every industry.The vast network of devices connected to the Internet, including smart phones and tablets and almost anything with a sensor on it can collect and exchange data. This technology is beneficial to solve our day-to-day problems with the development of Smart City Solutions. In India, with the increasing number of vehicles on road, one such problem is finding a parking space in the metropolitan cities. A lot of work has been carried out in solving parking problems by applying latest technologies. In this paper we have made a detailed survey on how these problems are caused and solved using technologies like IoT, Cloud Computing and Android application. Thus giving a Smart Solutions. These parking solution will guide road users to the nearest available parking space and can significantly slow down traffic volumes within cities and thus also reduce traffic-related CO2 emissions. Additionally, they make an important contribution to greater driver comfort and improved overall urban quality of life.

Keywords: Internet of Things (IoT), Android Applications, Cloud Computing, Raspberry Pi, Smart Parking System.

pdf

By | 2017-02-23T06:54:49+00:00 February 23rd, 2017|Publications|0 Comments

COMPARISON OF OCTAGON-CELL NETWORK WITH OTHER INTERCONNECTED NETWORK TOPOLOGIES AND ITS APPLICATIONS

Sanjukta Mohanty 1 , Dr. Prafulla Kr. Behera 2

1Department of Mathematics, North Orissa University, Srirama chandra vihar, Takatpur, Baripada, Mayurbhanj, India.

2Department of Computer Science and Applications, Utkal University, Vani Vihar, Bhubaneswar, India

ABSTRACT:
In an Interconnected network topology, the source node first makes a connection with the destination node before sending a packet. The physical or logical arrangement of links in a network is called topology. In this paper an efficient topology octagon-cell network is presented and we have shown the octagon-cell network by means of an undirected Graph G =(V, E), where V is the set of nodes in the graph (hosts in the network) & E is the set of edges in the graph (links in the network). In this paper we have discussed the applications of octagoncell network and compared the node degree, diameter, number of links and bisection width of the octagon-cell network with other interconnected network topologies.
Keywords: Octagon-cell, Interconnection topology, Routing, Network services, Multiprocessor network.

pdf

By | 2017-02-20T06:48:38+00:00 February 20th, 2017|Publications|0 Comments

DoS ATTACK DETECTION SYSTEM BASED ON MULTIVARIATE CORRELATION ANALYSIS

Ms. Supriya S. Thakare, Ms. Parminder Kaur

  Department of Computer Science and  Engineering  MGM’s JNEC, Aurangabad

ABSTRACT:

In today’s world the number of online applications are increasing. With the increasing number of online applications the threat to the security of these applications is also increasing. The increasing number of cyber attacks have challenged the security of these online applications. DoS is one such type of cyber-attack which aims at making the website and the resources of the server unavailable to the intended users. In this paper we propose an anomaly based detection for both known and unknown attacks. We propose an MCA based system for accurate traffic characterization by extracting the geometrical correlation between network traffic. We also propose a triangle area based technique which enhances and speedup the MCA process. For evaluating the system KDD Cup 99 dataset is used. KDD Cup 99 dataset has 41 features out of which 10 features with maximum statistical variance are selected.

Keywords: Denial-of-Service attack, network traffic characterization, multivariate correlation , triangle area.

pdf

By | 2017-02-08T05:19:37+00:00 February 8th, 2017|Publications|0 Comments

REVIE OF ACADEMIC PERFORMANCE USING SOFT COMPUTING TECHNIQUES

Dr. Ramjeet Singh Yadav

Department of Computer Science and Engineering, Ashoka Institute of Technology and Management, Engineering Chauraha, Paharia, Sarnath, Varanasi-221007, UP, India

ABSTRACT:

This review paper gives as details and overall review of methodologies and present scenario related to student’s academic performance evaluation for the development of better understanding. The present paper elaborates several aspects of students performance evaluation (prediction of student performance, modeling student performance from available data and grouping student on need base criteria). Apart from this, selected methods used for student’s academic performance evaluation and soft computing techniques have been described.

Keywords: Academic Performance, Fuzzy Logic, Neural Network, Probabilistic Neural Network, Soft Computing.

pdf

By | 2017-01-25T10:10:10+00:00 January 25th, 2017|Publications|0 Comments

HYBRID APROACH FOR WEB PAGE CLASSIFICATION BASED ON FIREFLY AND ANT COLONY OPTIMIZATION

Poonam Asawara, Dr Amit Shrivastava and Dr Manish Manoria

Department of Computer Science and Engineering SIRTS Bhopal, India

ABSTRACT:

The rapid development of the internet and web publishing techniques create numerous information sources published as HTML pages on World Wide Web. WWW is now a popular medium by which people all around the world can spread and gather the information of all kinds. But web pages of various sites that are generated dynamically contain undesired information also. This information is called noisy or irrelevant content. The need for innovative and effective technologies to help find and use the useful information and knowledge from a large variety of data sources is continually increasing. Web information has become increasingly diverse. In order to utilize the Web information better, people pursue the latest technology, which can effectively organize and use online information. Classification is one of the vital and important data mining techniques that grouped various items in a collection to predefined classes or groups. The main goal of classification is to exactly predict the target class for each case in the data. Web Page Classification is technique of data mining to discover classification of web pages. The information providers on the web will be interested in techniques that could improve the effectiveness of the web search engine. In this paper, the relationships among the techniques used in data mining are studied. A study of web usage is also done on optimization of this web classification.

Keywords: Random Forest Classifier, Ant Colony Optimization, Firefly, Web Page Classification.

pdf

By | 2017-01-25T10:07:47+00:00 January 25th, 2017|Publications|0 Comments

EXPLORING THE MAJOR RESEARCH AREAS AND FUTURE OF IoT (INTERNET OF THINGS)

D.Nagajyothi, Ch.Vijaya Lakshmi and G.Kavita                

Department of CSE, CBIT, Telangana, India

ABSTRACT:

IoT (Internet of things) is one of the omnipresent terms being heard throughout the world. IoT unifies the complete world using common infrastructure helping the human kind to connect and control various things or objects and get to know the status of the objects. IoT is still partially seen as reality, but still there are vast research areas and challenges to make it completely real. IoT could make a close connection between the man and machines, the cyber world and the real world using the various devices like sensors, actuators and other electronic devices. Because of this every industry is able to create various models in business, create new services to the customers which are decreasing the cost to a very low level. Thus to develop more of IoT, further availability of knowledge based data, common hardware is needed which can lead to create innovative products. This needs a combination of technologies or concepts like cloud computing, Big data, Future internet. Though IoT is able to offer great future some of the issues need to be overcome by the industries such as short fall of interoperable infrastructure, privacy and security, IoT management for the growing complexities.This paper thus provides the outlines of the IoT, the basic requirements, some of the IoT applications, the various research areas for IoT and finally the impact of IoT on the society with future vision and scope of IoT.

Keywords: sensors, smart devices, big data, embedded systems, SOA, IoT security

pdf

By | 2017-01-25T10:05:27+00:00 January 25th, 2017|Publications|0 Comments

RULE BASED IDENTIFICATION OF SANDHI’S AND ITS APPLICATION TO WORD FORMATIONS

Suresh Kumar Sanampudi 1 , D. Ramesh 2

1Department of Information Technology, JNTUHCEJ, India

2Department of Computer Science Engineering, JNTUHCEJ, India

ABSTRACT:
The word “Sandhi” means relation/bonding between two entities. This word is commonly used in the grammar of Indian languages. Sandhi in Indian languages literally means putting together or combining (of sounds), it denotes all combinatory sound changes effected (Spontaneously) for ease of pronunciation. Sandhi formation is treated as a computational linguistic aspect that joins two or more words to coin a new word. This paper provides a framework that derive rule based identification of word formation Sandhi in Telugu language. These rules are used in word formation in Telugu. It would involve studying the rules, features, structures and the syntax phenomena. The work aim at obtaining the improved level of performance in identification of words along with their Sandhi names. The Experimentation is done on the data prepared by us and is tested to find the level of accuracy with which, the words are generated. The results were found to have 97.5% of accuracy in word generation.

Keywords: Sandhi Analyzer, Natural Language Processing, Rule based Systems

pdf

By | 2016-12-28T06:03:46+00:00 December 28th, 2016|Publications|0 Comments

FIT-O-METER: A MOBILE HEALTH ASSISTANT

Ashwini U. Joshi, Aishwarya J. Malpani, Bhagyashree S. Modi , Satish Kumbhar

Department of Computer Engineering and Information Technology, College of Engineering, Pune

 Pune – Maharashtra – 411005

ABSTRACT:

In today’s stagnant and stressful life, people tend to ignore taking care of their personal health and fitness. Hence, there is a need to develop a system which assists the people in maintaining a healthy lifestyle by keeping a track of their daily routine. This paper presents an android application (Fit-O-Meter) which uses recently available advances in the smart phones such as accelerometer, digital compass and gyroscope to record daily activities like walking, running, riding a bicycle or travelling in a vehicle and determine calories burned during these activities. Based on an individual’s parameters like height, weight, sleep, lifestyle, daily calories need and daily calories burnt, it recommends a daily diet plan along with health tips and acts as a Health Recommender System (HRS).

Keywords: Accelerometer, Android, Calories, Fit-O-Meter, Health Recommender System

pdf

By | 2016-12-13T04:40:50+00:00 December 13th, 2016|General, Publications|0 Comments

A SURVEY ON VARIOUS FACTORS DETERMINES THE ENERGY EFFICIENCY IN WIRELESS SENSOR NETWORK USING DATA COMPRESSION TECHNIQUES

Syed Abdul Raheem 1 and Dr.M.Prabhakar 2

 1Research scholar, REVA University, Bangalore,  India

 2 Research Supervisor, Dept. of Computing Science, REVA University, Bangalore,India

ABSTRACT:

Data compression in Wireless sensor network is the process of representing the data in compact form. It includes the data encoding and decoding of it at sink for recovery by compact the data. An increasing the usages of WSN, the limitations which restrict the lifetime of network, energy efficiency, data accuracy, latency are also arising. It is observed that the utilization of energy in transmission is more than processing the data in WSN. So, many approaches are proposed to deal with the problem of power consumption, used while transmission. In this survey explain a various efficient data compression algorithm which apt to be used on available many commercial nodes of a wireless sensor network. Data compression methods are used to minimize the number of bits to be transmitted by the transmission module will significantly minimize the energy requirement and maximize the life expectancy of the sensor node.

Keywords: Data Compression Techniques, Wireless Sensor Network, Clustering, Energy Efficiency.

pdf

By | 2016-11-26T04:52:57+00:00 November 26th, 2016|Publications|0 Comments

THE LINGUISTIC EVALUATION ON THE RESOURCES AND MORPHOLOGY DRIVEN SYSTEM– A CASE STUDY ON HINDI, BENGALI AND TELUGU

MUDDULURU AVINASH, M. ANUSHA and CH.V.SWARNA KUMARI

Narayana Engineering College, Nellore, AP, India

ABSTRACT:

The rapid growth of affective texts in the Web 2.0 and multilingualism in search engines motivate us to prepare the emotion/affect data for three Indian languages (Hindi, Bengali and Telugu). This paper reports the development of the WordNet Affects and SemEval 2007 affect sensing corpora in three target Indian languages from the available English sources that were provided in the Affective Text shared task on the SemEval 2007 workshop. The linguistic evaluation on the developed resources proposed various morals from the perspective of affect and the target languages. Two emotion analysis systems, a baseline system followed by a morphology driven system have been developed and the evaluation results of the systems produce satisfactory results in comparison with the English.

Keyword– Web2.0, Hindi, Bengali, Telgu, SemEval 2007

pdf

By | 2016-11-09T10:45:12+00:00 November 9th, 2016|Publications|0 Comments