7,507 results
Search Results
2. A Review Paper on DevOps: Beginning and More To Know
- Author
-
Pratibha Jha and Rizwan Khan
- Subjects
Computer science ,business.industry ,0502 economics and business ,05 social sciences ,DevOps ,Software engineering ,business ,050203 business & management - Published
- 2018
- Full Text
- View/download PDF
3. Keyword based Shuffling Algorithm for Question Paper Generator
- Author
-
Seema Gaikwad, Deepali Naglot, Abhilasha Salvi, Pooja Gaikwad, and Shriya Mutyal
- Subjects
Generator (computer programming) ,Shuffling ,Computer science ,business.industry ,business ,Computer hardware - Published
- 2018
- Full Text
- View/download PDF
4. Survey Paper on IoT based Smart Intelligent Toilet using SVM and Regression Algorithms
- Author
-
S Yashaswini, Ashwini K, and K Vasudha
- Subjects
Support vector machine ,Toilet ,Computer science ,business.industry ,Artificial intelligence ,Regression algorithm ,business ,Machine learning ,computer.software_genre ,Internet of Things ,computer - Published
- 2019
- Full Text
- View/download PDF
5. Research paper on IOT based Air and Sound Pollution Monitoring System
- Author
-
Lalit Mohan Joshi
- Subjects
Computer science ,business.industry ,Noise pollution ,020208 electrical & electronic engineering ,0202 electrical engineering, electronic engineering, information engineering ,Systems engineering ,020206 networking & telecommunications ,Monitoring system ,02 engineering and technology ,Internet of Things ,business - Published
- 2017
- Full Text
- View/download PDF
6. Automatic Question Paper Generator System
- Author
-
Hital Gopal Gori, Ashwini Dalvi, and Fenil Kiran Gangar
- Subjects
Information retrieval ,Generator (computer programming) ,Computer science ,business.industry ,Electrical engineering ,business - Published
- 2017
- Full Text
- View/download PDF
7. A Survey Paper on Concept Mining in Text Documents
- Author
-
S. K. Saritha, Dixa Saxena, and K. N. S. S. V. Prasad
- Subjects
Text mining ,Information retrieval ,business.industry ,Computer science ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Concept mining ,02 engineering and technology ,business ,Data science - Published
- 2017
- Full Text
- View/download PDF
8. Review Paper on Hybrid Solar-Wind Power Generator
- Author
-
Shraddha D. Bandawar, Ashwini R. Behade, and Vaibhav J. Babrekar
- Subjects
Solar wind ,Generator (computer programming) ,business.industry ,Computer science ,020209 energy ,0202 electrical engineering, electronic engineering, information engineering ,Electrical engineering ,02 engineering and technology ,business ,Power (physics) - Published
- 2017
- Full Text
- View/download PDF
9. Stock Prediction using Machine Learning a Review Paper
- Author
-
Neeha Khalfay, Vidhi Soni, Nirbhey Singh Pahwa, and Deepali Vora
- Subjects
business.industry ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Artificial intelligence ,021001 nanoscience & nanotechnology ,0210 nano-technology ,Machine learning ,computer.software_genre ,Stock prediction ,business ,computer - Published
- 2017
- Full Text
- View/download PDF
10. Survey paper on Context Sensing and Proximity Sensing for Smartphones
- Author
-
Akshay Jain, Arun Algude, Aditya Chaudhari, and Rupali S. Vairagade
- Subjects
Proximity sensing ,World Wide Web ,business.industry ,Computer science ,Context sensing ,Telecommunications ,business - Published
- 2017
- Full Text
- View/download PDF
11. Review Paper on Multi Notch Multi Polarization Antenna for Recent Wireless Communication
- Author
-
Teena Raikwar, Rahul Hatewar, Swapnil Jain, and Oshee Surbhi Nandi
- Subjects
Reconfigurable antenna ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020208 electrical & electronic engineering ,Evolved antenna ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Polarization (waves) ,law.invention ,GSM ,law ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Communications satellite ,Wireless ,Omnidirectional antenna ,business ,Telecommunications ,Circular polarization ,Computer Science::Information Theory - Abstract
In this paper reviewed and discuss multi notch multi polarization antenna for wireless communication, in past decade large number of research carried out, in the field of multi notch and multi polarization, the various application at specified frequency demanded notch antenna, multiple polarization and switch in polarization is strong needed, circular polarization antenna is versatile used in satellite communication, this paper review various technique to used in the designing of notch antenna, in some application needed antenna which exists linear as well as circular polarization, Over the period of time researchers have continuously contributed to improved the performance of antenna, that should be effective for modern communication. Research and development in this field have been reported by many researchers in the past few decades on the basis of different techniques. This type of antenna needed in, UWB, WLAN, satellite communication, GSM, and GPS. Dual-, triple- and quad-band antennas KeywordsCMRC, DGS
- Published
- 2016
- Full Text
- View/download PDF
12. A Survey Paper on Design and Implementation for Voltage Drop in CMOS Rectifier
- Author
-
Braj Bihari Soni and Himshikha Sharma
- Subjects
business.industry ,Computer science ,020209 energy ,Transistor ,Electrical engineering ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Internal resistance ,law.invention ,PMOS logic ,Rectifier ,CMOS ,law ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Voltage source ,business ,Voltage drop ,NMOS logic ,Hardware_LOGICDESIGN - Abstract
This paper presents the study and survey analysis on different width size of transistor in CMOS rectifier for output voltage drop. The paper gives information about miniaturizing the CMOS rectifier using two PMOS and NMOS configuration. This investigation focuses on the effect of the width-to-length ratio by using 0.35μm technology. Therefore, increase the width size and minimize the internal resistance. The model is operated at a frequency of 50Hz with an AC voltage source. CADENCE software is used for simulation and designing work.
- Published
- 2016
- Full Text
- View/download PDF
13. Review Paper on Mobile Ad-hoc Networks
- Author
-
Nimesh Modi and Hiral Vegda
- Subjects
business.industry ,Computer science ,010401 analytical chemistry ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,business ,01 natural sciences ,0104 chemical sciences ,Computer network - Published
- 2018
- Full Text
- View/download PDF
14. Survey paper on FIR Filter using Programming Reversible Logic Gate
- Author
-
Nashrah Fatima, Paresh Rawat, and Anjulata Choudhary
- Subjects
Relation (database) ,Finite impulse response ,Computer science ,business.industry ,02 engineering and technology ,Energy consumption ,020202 computer hardware & architecture ,Logic gate ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Overhead (computing) ,Reversible computing ,Electricity ,business ,Algorithm - Abstract
Reversible computing is a version of computing in which the computational system to a degree is reversible. An essential circumstance for reversibility of a computational version is that the relation of the mapping states of transition features to their successors have to always be one-to-one. Reversible logic has emerged as an change design technique to the conventional logic, ensuing in decrease energy consumption and lesser circuit area. In this paper, a review of an efficient architecture of the reversible FIR filter structure is presented. For reaching low electricity, reversible good judgment mode of operation is implemented inside the design. Vicinity overhead is the tradeoff inside the proposed layout. From the synthesis consequences, the proposed low electricity FIR filter architecture offers power saving when as compared to the conventional layout. The vicinity overhead is for the proposed structure.
- Published
- 2016
- Full Text
- View/download PDF
15. Survey Paper of Energy Efficient Data Aggregation Protocol in Wireless Sensor Network
- Author
-
Chanchal Sharma and Vishwajeet Pattanik
- Subjects
Routing protocol ,Computer science ,business.industry ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,010401 analytical chemistry ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,01 natural sciences ,0104 chemical sciences ,Data aggregator ,Key distribution in wireless sensor networks ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,business ,Wireless sensor network ,Efficient energy use ,Computer network - Abstract
A wireless sensor network(WSN) is usually composed of a large collection of small autonomous sensor device that can sense environmental condition about the ambient environment. The main task of wireless sensor node is a communicate together by many wireless strategies. In this communication strategies need fast data access in wireless sensor network(WSN), as resource constrained is a main issue in wireless sensor networks applications. For this solution administered routing protocol. Routing protocol are in charge of discovering and maintaining the route in the network. Routing protocol with low energy consumption play a very important role in prolonging the lifetime of sensor network. Cluster based routing protocols have proven to be effective in network topology management, energy minimization and data aggregation and so on. In this paper we present various clusterbased routing protocols and merits and limitations of protocols.
- Published
- 2016
- Full Text
- View/download PDF
16. A Survey Paper on Implementing MTCMOS Technique in Full Subtractor Circuit
- Author
-
Braj Bihari Soni and Tanvi Nagariya
- Subjects
Reduction (complexity) ,Combinational logic ,Computer science ,business.industry ,Subtractor ,Hardware_INTEGRATEDCIRCUITS ,Subtraction ,Electronic engineering ,Hardware_PERFORMANCEANDRELIABILITY ,Telecommunications ,business ,Hardware_LOGICDESIGN - Abstract
paper presents the study and survey analysis of Full Subtractor circuit on implementing the MTCMOS technique. Full Subtractor is a combinational circuit that performs subtraction and results in difference and borrows outputs. Implementing the MTCMOS technique on this circuit results in reduction of both leakage current and power consumption.
- Published
- 2016
- Full Text
- View/download PDF
17. Survey Paper on Digital Image Sharing by Diverse Image Media
- Author
-
Ashwini Udmale and S. B. Nimbekar
- Subjects
021110 strategic, defence & security studies ,Theoretical computer science ,Multimedia ,Computer science ,business.industry ,0211 other engineering and technologies ,Cryptography ,02 engineering and technology ,computer.software_genre ,Secret sharing ,Image (mathematics) ,Digital image ,Information hiding ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Noise (video) ,business ,computer - Abstract
Conventional cryptography is a method of transforming message into an unreadable format called as cipher text. This cipher text can easily be shared over the network without fear but anyone can get message easily by applying key on cipher text. Sharing and delivering secret images over the network is also known as a visual secret sharing (VSS) scheme. However main drawback of VSS scheme is that it is experience from high transmission risk due to the shares are like noise. As the shares are like noise which in turn lead to cause the attackers attention. To solve this problem mechanism is developed called Natural image based visual secret sharing (NVSS). This paper is motivated by need of novel mechanism to transfer the secret images over network. In proposed work for regeneration of secret image a generated noisy share, natural images and seed (needed for random functions used) are required at the receiving end. Though generated share is noisy and its contents are not recognizable, overall structure may be visible in some cases. So data hiding is should be performed on generated share to hide that structure (texture) in noisy share.
- Published
- 2016
- Full Text
- View/download PDF
18. Survey Paper on Wireless Underground Positioning System
- Author
-
Prachi Ahlawat, Poonam Singh, and Sapna Kataria
- Subjects
Positioning system ,Computer science ,business.industry ,Covert ,Wireless ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Security management ,business ,Telecommunications ,Wireless sensor network ,Network formation - Abstract
This paper discuss the structural design of staff positioning techniques in unsafe places in underground mines, this paper also highlights the gains and weaknesses of wireless sensor network technology and address an economical, continuous monitoring system of covert mine workers security. It can realize the effective management of precise positioning of man and machine. This article presents the composition of system, the enactment and management of network formation. The actual application shows that the ZigBee technology can play an important role in underground personnel information and security management.
- Published
- 2015
- Full Text
- View/download PDF
19. Review Paper on Comparative Study of Dual Band Microstrip Patch Antenna
- Author
-
Puran Gour, Rajbhushan Rajput, and Rajeev Thakur
- Subjects
Hardware_GENERAL ,Computer science ,business.industry ,Bandwidth (signal processing) ,Electronic engineering ,Microstrip patch antenna ,Dielectric ,Multi-band device ,Telecommunications ,business ,Directivity - Abstract
In this paper we survey a dual band microstrip patch antenna for improvement of bandwidth, gain and directivity. The comparisons of different paper with simulated and validated result are presented. We discussed the different technique used by the author to propose a dual band and also observed what happen if we used different dielectrics materials.
- Published
- 2015
- Full Text
- View/download PDF
20. Survey Paper on Swarm Intelligence
- Author
-
Ashwini K, M Vijaykumar, and S. Keerthi
- Subjects
Computer science ,business.industry ,Ant colony optimization algorithms ,ComputingMethodologies_MISCELLANEOUS ,MathematicsofComputing_NUMERICALANALYSIS ,Particle swarm optimization ,Swarm behaviour ,Artificial intelligence ,Flock ,business ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Swarm intelligence - Abstract
In this paper we are discussing regarding the Swarm Intelligence and there some of the examples. Anything in group is said to a swarm. Intelligent behaviour from a large number of Simple Individuals is called as Swarm Intelligence. It is a collective Behaviour from the local interactions of the individuals with the each other. Individual co-ordinate from the decentralized control and self-organization. We can find swarm in colonies of ants, school of fishes, flocks of birds etc. In this paper we are seeing the examples of Swarm and their behaviour. we also see the various Swarm Intelligence models such as the Ant colony Optimization where is describes about the movement of ants, their behaviour, and how do it overcome the obstacles, in birds we see about the Particle swarm optimization it is based on the swarm intelligence and how the positions has to be placed based on the three principles. Next is the Bee colony optimization that deals with the behaviour of the bees, their interactions, also describes about the Movement and how they work in Swarm. Some of the techniques and algorithms are discussed in this paper.
- Published
- 2015
- Full Text
- View/download PDF
21. Review Paper on Different shaped Microstrip Patch Antenna for Wireless Communication Systems
- Author
-
Madan Sahu, Prateek Wankhade, and Sumit Gupta
- Subjects
business.industry ,Wireless communication systems ,Computer science ,020208 electrical & electronic engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electrical engineering ,020206 networking & telecommunications ,Microstrip patch antenna ,02 engineering and technology ,business ,Telecommunications - Published
- 2016
- Full Text
- View/download PDF
22. A Review Paper on Ad-hoc Routing Protocols AODV FZRP and SLURP
- Author
-
Komal K, Dilshana D, and Meenu M
- Subjects
Ad hoc On-Demand Distance Vector Routing ,Computer science ,business.industry ,Ad hoc routing ,business ,Computer network - Published
- 2016
- Full Text
- View/download PDF
23. A Survey Paper on Voice over Internet Protocol (VOIP)
- Author
-
Urjashee Shaw and Bobby Sharma
- Subjects
Softswitch ,business.product_category ,Computer science ,computer.internet_protocol ,02 engineering and technology ,Mobile communications over IP ,law.invention ,Internet protocol suite ,law ,Internet Protocol ,Next-generation network ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Voice over IP ,business.industry ,Wireless network ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,020206 networking & telecommunications ,IP tunnel ,NAT traversal ,020201 artificial intelligence & image processing ,The Internet ,Communications protocol ,business ,Telecommunications ,computer ,Private network ,Computer network - Abstract
over Internet protocol (VoIP), which is a communication protocol existing over a network. The IP network can makes it possible for users to make telephone calls using the VoIP technology. Use of VoIP and Internet telephony has increased significantly in the recent years. These new phone services are based on the transmission of voice over packet switched IP networks. VoIP can be realized on any data network that uses IP, like the Internet, Intranets and Local Area Networks (LAN). VoIP customers use their Internet connection to connect to the Internet as well as to make phone calls. VoIP is the real-time transfer of voice signals using the Internet Protocol (IP) over the Internet or a private network. In simpler terms, your voice is converted to digital signal by VoIP that travels over the internet. The key factors that entice enterprises to switch to VoIP are its flexibility and cost efficiency. Some security problems may arise due to the widespread deployment of VoIP. Voice over IP (VoIP) has the potential to provide interactive communication services like video and voice conferencing. VoIP helps to transfer data which are difficult to transfer over circuit-switched wired and wireless networks.
- Published
- 2016
- Full Text
- View/download PDF
24. Survey Paper on Encryption, Authentication and Auditing Services for better Cloud Security
- Author
-
Aishwarya Gupta and Vishwajeet Pattanaik
- Subjects
Authentication ,Cloud computing security ,business.industry ,Computer science ,Internet privacy ,Interoperability ,Vulnerability ,Client-side encryption ,Cloud computing ,Audit ,Encryption ,Computer security ,computer.software_genre ,Information security audit ,The Internet ,business ,computer ,Cloud storage - Abstract
Data Storage Security is matter of concern especially in the field of Cloud Computing where large amount of data is being stored on daily basis over the internet. But the real world is facing some or other challenging issues regarding the same. An ubiquitous and an on-demand access with an interoperable network of your various computing resources and sharing necessary information is the need of this Internet dependent Earth, which has led the generation of Cloud and the virtual world related to it. As the number of users and data over the net are getting increased second by second there is a need of system or method which could hold this with all its privacy, integrity and confidentiality. But the vulnerabilities over Cloud data are weakening the expected progress of the field. Many complex encryption and decryption techniques are being introduced but the new risks get generated. The organisation at every level is concerned with privacy of the data and various attacks which don’t enable them to use the Cloud’s benefits and its susceptibility over the data holds the technology to grow. Some trustworthy and dependable Cloud storage will be a good option with the specific authentication as well as proper agreements and auditing protocols defines earlier itself will motivate the people to be secure and tension free while storing the data over the Cloud. General Terms Cloud Computing, Data storage security.
- Published
- 2016
- Full Text
- View/download PDF
25. A Survey Paper on Image Classification and Methods of Image Mining
- Author
-
Sri Khetwat Saritha and Sandeep Pandey
- Subjects
Automatic image annotation ,Contextual image classification ,business.industry ,Computer science ,Pattern recognition ,Data mining ,Artificial intelligence ,computer.software_genre ,business ,computer ,Image (mathematics) - Published
- 2017
- Full Text
- View/download PDF
26. Review Paper on Wormhole Attack
- Author
-
Garima Kadian and Dinesh Singh
- Subjects
Computer science ,Wireless network ,business.industry ,Data_MISCELLANEOUS ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wormhole attack ,Cryptography ,ComputerSystemsOrganization_PROCESSORARCHITECTURES ,Computer security ,computer.software_genre ,Hardware_INTEGRATEDCIRCUITS ,Data mining ,business ,computer - Abstract
A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this paper we review WSN concept and Wormhole Attack. Then we discuss classification of wormhole Attack and also mention few of the initiatives to detect the Wormhole Attack.
- Published
- 2015
- Full Text
- View/download PDF
27. A Survey Paper on Fraud Analysis and Report Visualization in Card System
- Author
-
Deepak Kumar Niware and Shipra Rathore
- Subjects
Artificial neural network ,business.industry ,Computer science ,computer.software_genre ,Visualization ,Product (business) ,Credit card ,ComputingMethodologies_PATTERNRECOGNITION ,The Internet ,Data mining ,Hidden Markov model ,business ,Cluster analysis ,computer - Abstract
Due to rapid growth of internet, online shopping for products is an essential part of everyone’s daily life most of the time credit card is used to pay online for products. It is an easy way to shopping, people can get your desired product on your computer screen or on smart phone. For online purchase use of credit card increases dramatically but still there is some loop holes in system of online shopping which causes online frauds or credit card frauds. There are many techniques like ANIDS Distributed Data mining WSDL, Parallel granular neural networks, Hidden Markov Model, Clustering and Bayes classification, Cost model are used. These techniques use data mining to detect frauds by the use of datasets like KDD99, KDD cup, NSL KDD. In this paper a study on different techniques and evaluate each technique on the best parameters.
- Published
- 2015
- Full Text
- View/download PDF
28. A Review Paper on Digital Watermarking and its Techniques
- Author
-
Parth Bhatt and Ruchika Patel
- Subjects
Multimedia ,Computer science ,business.industry ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Subject (documents) ,Certification ,computer.software_genre ,Field (computer science) ,Image (mathematics) ,Transmission (telecommunications) ,The Internet ,business ,computer ,Digital watermarking - Abstract
In today’s Era, message transmissions over the internet have protection problems of the digital data. Hence, protection of secret messages during transmission becomes a difficult subject. Digital watermarking is provide protection of digital information or identifying information against illegitimate exploitations and allocations. watermarking is a technology to guarantee and make possible data certification, security and copyright defense of the information. The intend of watermarking is to consist of hidden data in multimedia information to ensure security examination. It would be then probable to progress the surrounded message, even if the information was distorted by one or more non-dangerous attacks. In this paper, we present the various types of watermarking techniques and application region where water making technique required. Also a survey on the some new work is done in image watermarking field.
- Published
- 2015
- Full Text
- View/download PDF
29. Review Paper: A Comparative Study on Partitioning Techniques of Clustering Algorithms
- Author
-
Rohit Srivastava and Gopi Gandhi
- Subjects
Fuzzy clustering ,Computer science ,business.industry ,Document classification ,Correlation clustering ,Machine learning ,computer.software_genre ,Field (computer science) ,Data set ,Set (abstract data type) ,ComputingMethodologies_PATTERNRECOGNITION ,Text mining ,Pattern recognition (psychology) ,Artificial intelligence ,Data mining ,Cluster analysis ,business ,computer - Abstract
plays a vital role in research area in the field of data mining. Clustering is a process of partitioning a set of data in a meaningful sub classes called clusters. It helps users to understand the natural grouping or cluster from the data set. It is unsupervised classification that means it has no predefined classes. This paper presents a study of various partitioning techniques of clustering algorithms and their relative study by reflecting their advantages individually. Applications of cluster analysis are Economic Science, Document classification, Pattern Recognition, Image Processing, text mining. No single algorithm is efficient enough to crack problems from different fields. Hence, in this study some algorithms are presented which can be used according to one's requirement. In this paper, various well known partitioning based methods - k-means, k-medoids and Clarans - are compared. The study given here explores the behaviour of these three methods.
- Published
- 2014
- Full Text
- View/download PDF
30. Review Paper on Agent Oriented Traffic Coordination
- Author
-
Shashank Sahu and Ankit Kumar Sharma
- Subjects
business.industry ,Computer science ,Traffic conflict ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Traffic simulation ,020206 networking & telecommunications ,Floating car data ,02 engineering and technology ,Vehicle Information and Communication System ,Traffic flow ,Network traffic control ,Traffic congestion ,Urbanization ,0202 electrical engineering, electronic engineering, information engineering ,Control area ,020201 artificial intelligence & image processing ,Traffic shaping ,business ,Computer network - Abstract
of Agents in the domain of managing traffic and its real time demand of coordination and cooperation is proven quite promising. Agent oriented traffic coordination helps in improving traffic management and in achieving efficiency of vehicle movement. Today with rapid urbanization and increasing number of vehicles traffic congestion has emerged out as a serious bottleneck. Automated vehicle decision models that are capable of taking self-decision finding a better path for the movement of traffic flow in control area are developed and more work is going on this field. These automated vehicles are able to communicate and coordinate with each other's thereby maintaining proper coordination among neighboring vehicles. Every neighbor knows its current location and its group member's. This paper presents several traffic coordination, communication and controlling strategies and methods for controlling them. Use of agents in traffic simulation, helps in reducing traffic congestion and delay. Lack of communication and controlling mechanism decreases traffic speed and average target destination time.
- Published
- 2016
- Full Text
- View/download PDF
31. A Research Paper on Steganography in IPV6
- Author
-
Sumit Sharma, Amit Kr. Yadav, and Lalit Mohan Joshi
- Subjects
Password ,Steganography ,Network packet ,business.industry ,Computer science ,Covert channel ,Data_CODINGANDINFORMATIONTHEORY ,Information security ,Encryption ,Computer security ,computer.software_genre ,IPv6 ,law.invention ,law ,Channel (programming) ,Internet Protocol ,business ,computer ,Computer network - Abstract
Steganography is the process to hide a secret message such that it is very difficult to detect the presence of secret message presence. On other way, the existence of secret message is hidden. A covert channel may refer to the actual medium that is used to communicate the information such as a message, image as well as file. This project uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages can be passed from one party to another. A fully functional computer program was designed and written that transparently embeds messages into the source address fields of packets and across IPv6 networks, embedded messages are by these packets. This demonstrates the covert channel possibility within a default Internet protocol. For a malicious purpose such as stealing encryption passwords as well as keys or other secrets from remote hosts in a sequence not easily detectable this channel is used, but it may be used for a noble cause such as secretly passing messages under the watchful eyes of an oppressive regime. The covert channel demonstration in itself the overall information security of society is increased by bringing awareness to the existence of such a steganographic medium.
- Published
- 2015
- Full Text
- View/download PDF
32. A Survey Paper on Particle Swarm Optimization based Routing Protocols in Mobile Ad-Hoc Networks
- Author
-
Shruti Dixit and Rakesh Singhai
- Subjects
Routing protocol ,Adaptive quality of service multi-hop routing ,Link-state routing protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Particle swarm optimization ,Swarm behaviour ,Mobile ad hoc network ,Artificial intelligence ,business ,Swarm intelligence - Abstract
Swarm Intelligence is an artificial intelligence discipline which is concerned with the design of intelligent multi-agent systems by taking inspiration from the collective behaviours of social insects and other animal societies. They are characterized by a decentralized way of working that mimics the behaviour of the swarm. Swarm Intelligence is a successful paradigm for the algorithm with complex problems. The purpose of the research is to apply swarm intelligence on routing algorithms used in MANET. Swarm intelligence based routing algorithm will more promising for specific nature of adhoc networks and will outperform in real scenarios/constraints/environmental conditions and will tune and simulate to get an efficient and effective routing protocol for MANET.
- Published
- 2015
- Full Text
- View/download PDF
33. Review Paper on Fast DHT Algorithm using Vedic Mathematics
- Author
-
Shirali Parsai, Swapnil Jain, and Jyoti Dangi
- Subjects
Computer science ,business.industry ,Artificial intelligence ,business - Published
- 2015
- Full Text
- View/download PDF
34. A Survey Paper on E-Blood Bank and an Idea to use on Smartphone
- Author
-
Satish Niloor, A. S. Shinde, and Tushar Pandit
- Subjects
Scope (project management) ,Computer science ,business.industry ,Component (UML) ,Web application ,Computer security ,computer.software_genre ,business ,computer ,Blood bank - Abstract
is an important aspect for all living things. It proves to be a lifesaving component in case of emergency requirement. There are number of web based blood banks which are available for communication between blood bank and hospitals. None of the online blood bank offers the direct contact between donor and blood bank. This is the major drawback of the existing system. Existing systems are time consuming; require more man power and it is costly. This paper introduces comparison between existing system and improved system. The new idea will improve the existing system and it will move from conventional desktop system to mobile system. This paper introduces new features of improved system over existing system in many aspects. In this paper firstly we are going to explain merits and demerits of existing system. Also this paper will provide brief introduction about improved system and its features and Scope.
- Published
- 2015
- Full Text
- View/download PDF
35. Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper
- Author
-
Arpita B. Modh
- Subjects
Association rule learning ,business.industry ,Computer science ,Data stream mining ,Homomorphic encryption ,Cryptography ,computer.software_genre ,Partition (database) ,Paillier cryptosystem ,Information sensitivity ,Data mining ,business ,computer ,Right to privacy - Abstract
Data mining is used to extract interested pattern or knowledge from large amount of data using many data mining technique. However it may also display sensitive information about individuals compromising the individual right to privacy When a collection of data is split among various parties. Now Each and Every party would wants to keep its sensitive information private during the mining process. Privacy preserving data mining is to develop data mining method without increases the risk of misuse of data. The main aim of privacy preserving data mining is to find the global mining results by preserving the individual sites private data/information. The various methods such as randomization, perturbation, heuristic and cryptography techniques. To Find privacy pre serving association rule mining in horizontally and vertically partitioned databases. In this paper, the analysis of different methods for PPARM is performed and their results are compared. Horizontally Partitioned databases, algorithm that combines advantage of both RSA public key cryptosystem and Homomorphic encryption scheme and algorithm that uses Paillier cryptosystem to compute global supports are used. This paper reviews the wide methods used for mining association rules over horizontally distributed dataset while preserving privacy.
- Published
- 2015
- Full Text
- View/download PDF
36. Detection of Suspicious URL in Social Networking Site Twitter: Survey Paper
- Author
-
Sandeep Kadam, Jyoti D. Halwar, and Vrushali Desale
- Subjects
World Wide Web ,business.industry ,Computer science ,Internet privacy ,business - Abstract
Twitter is very popular social networking site used by billions of people to share the information with each other. To communicate with each other over the long distance. But it also attracts the attackers in carrying out different attacks or get the information being shared by the twitter users. Twitter users can send the messages to each other in the form of tweets, that tweets have the size limitation of maximum 140 characters. So to share the web pages URL shorting is used. Attackers send the suspicious URLs in tweets and move the users to malicious pages. This paper presents a survey of different methods used to detect the suspicious URL (sites) in twitter stream. This paper also presents a WARNING BIRD APPLICATION. It is a near real time system to detect the suspicious URLs by classifying them.
- Published
- 2015
- Full Text
- View/download PDF
37. A Survey Paper on Trajectory Pattern Mining for Pattern Matching Query
- Author
-
S. M. Shinde and S. R. Ghule
- Subjects
Transportation planning ,business.industry ,Computer science ,computer.software_genre ,Machine learning ,Graph ,Data set ,Location-based service ,Trajectory pattern ,Graph (abstract data type) ,Data mining ,Artificial intelligence ,Pattern matching ,Sequential Pattern Mining ,business ,computer - Abstract
amount information of moving objects on road network is being collected with the help of various recent technologies. The tracking of these moving objects on road networks is becoming important because of it's application in various areas. Classification has been used for classifying various kinds of data sets like graph, text documents. However, there is a lack of study on data like trajectories on road networks. Data mining techniques, especially, sequential pattern mining can be used to extract frequent spatio-temporal patterns. Again it needs to confine the length of sequential patterns to ensure high efficiency. After extracting frequent sequential patterns in trajectories, classification can be applied to classify patterns which provide useful information in applications such as city and transportation planning, road construction, design, and maintenance, marketing sector. In this paper, whole pattern matching query concept is adopted after the classification to find total traffic volume on given trajectory edge. At the same time, user can find number of vehicles moving in one as well as in both directions on that particular trajectory. Keywordssequential patterns, frequent pattern based classification, location based services, pattern matching.
- Published
- 2014
- Full Text
- View/download PDF
38. Survey Paper of Encrypted Data Hiding using Skin Tone Detection
- Author
-
Sachin Patel, Rekha D. Kalambe, and Rakesh Pandit
- Subjects
Biometrics ,Steganography ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data security ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,Encryption ,computer.software_genre ,Information hiding ,Key (cryptography) ,Computer vision ,Artificial intelligence ,Data mining ,business ,computer - Abstract
Steganography is the skill of hiding the existence of data in other transmission medium to attain secret communication. It does not restore cryptography but quite boost the security using its abstruse features. In this paper we have surveyed on a Steganography and cryptography techniques which provide highly secure skin tone data hiding. Biometric characteristic used to apply steganography is skin tone region of images. Here important data is implanted within skin region of image which will give an outstanding secure location for data hiding. For this skin tone detection is need to be performed. Different steps of data hiding can be applied by cropping an image interactively. Cropping of an image improved security than hiding data without cropping the whole image, so cropped region works as a key at decoding region. Cryptography algorithm is used to convert the secret messages to an unreadable form before embedding; which provides a strong backbone for data security. This survey paper focuses on illuminating the technique to secure data or message with authenticity and non repudiation. So with this object oriented steganogaphy we track skin tone objects in image with the higher security and satisfactory PSNR .Modern steganography’s goal is to keep its mere presence undetectable.
- Published
- 2013
- Full Text
- View/download PDF
39. Chaotic Time Series Prediction for Rock-Paper-Scissors using Adaptive Social Behaviour Optimization (ASBO)
- Author
-
S. Rajarajeshwari, Raveena Kumar, and Sandhya Sankaranarayanan
- Subjects
Set (abstract data type) ,Nonlinear system ,Sequence ,Series (mathematics) ,Computer science ,business.industry ,Mutation (genetic algorithm) ,Chaotic ,Observable ,Artificial intelligence ,Time series ,Dynamical system ,business - Abstract
Time series prediction involves analyzing a set of data from past and current occurrences in order to predict the future set of data. In dynamic systems, chaotic behaviour is intrinsically observable and the resulting chaotic time series have nonlinear characteristics. Nevertheless, such data can be optimized to make sense out of the chaos. Multiple algorithms exist to this end, which have various applications. In this paper, this phenomenon is illustrated by making use of the well-known game rock-paper-scissors(R-P-S) played between two agents, one real and one adaptive. It is possible to identify and predict patterns in the choices made by the real agent during the course of play by analyzing the sequence of chaotic data using the Adaptive Social Behaviour Optimization (ASBO) algorithm. This optimization method makes use of a self-adaptive mutation strategy which takes into consideration dynamic factors such as leadership, confidence and competition, which are all functions of time.
- Published
- 2013
- Full Text
- View/download PDF
40. A Novel Paper Currency Recognition using Fourier Mellin Transform, Hidden Markov Model and Support Vector Machine
- Author
-
Abbas Yaseri and Seyed Mahmoud Anisheh
- Subjects
Computer science ,business.industry ,Feature vector ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Markov process ,Pattern recognition ,Translation (geometry) ,Support vector machine ,symbols.namesake ,Computer Science::Computer Vision and Pattern Recognition ,symbols ,Feature (machine learning) ,Artificial intelligence ,Invariant (mathematics) ,Hidden Markov model ,business ,Rotation (mathematics) - Abstract
A paper currency recognition system has a wide range of applications such as self receiver machines for automated teller machines and automatic good-selling machines. In this paper a new paper currency recognition system based on Fourier-Mellin transform, Markovian characteristics and Support Vector Machine (SVM) is presented. In the first, a pre-processing algorithm by Fourier-Mellin transform is performed. The key feature of Fourier-Mellin transform is that it is invariant in rotation, translation and scale of the input image. Then, obtained image is segmented and markovian characteristics of each segment have been utilized to construct a feature vectors. These vectors are then fed into SVM classifier for paper currency recognition. In order to evaluate the effectiveness of the system several experiments are carried out. Experimental result indicates that the proposed method achieved high accuracy rate in paper currency recognition.
- Published
- 2013
- Full Text
- View/download PDF
41. A Research Paper: Comparison of LEACH and EEP Protocol
- Author
-
Sunil Kumar, Manish Chandra, and Saurabh Gupta
- Subjects
Base station ,Operations research ,Computer science ,business.industry ,Node (networking) ,Wireless ,Mobile ad hoc network ,business ,EEP protocol ,Protocol (object-oriented programming) ,Energy (signal processing) ,Computer network ,Efficient energy use - Abstract
A mobile ad hoc network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network without the aid of any established infrastructure or centralized administration such as a base station. It is composed of tiny wireless sensor nodes which are mobile and dynamic nature. Due to mobility, when nodes re communicate to each other, they easily loss their energy or we can say the network life time will reduce by time. To maintain the energy efficiency of any node or network, some protocols are developed. The size of network depends on the total number of nodes in network. When size of network expands it means numbers of nodes are increases. This paper presents how life time of network can be increased by increasing number of nodes using EEP protocol. This work presents the improvement over LEACH protocol.
- Published
- 2015
- Full Text
- View/download PDF
42. Recognition of Indian Paper Currency based on LBP
- Author
-
Amandeep Kaur, Vipan Vipan, and Bhawani Sharma
- Subjects
Artificial neural network ,business.industry ,Currency ,Computer science ,media_common.quotation_subject ,Quality (business) ,Artificial intelligence ,Simplicity ,Machine learning ,computer.software_genre ,business ,computer ,media_common - Abstract
The importance of automatic methods has increased greatly for paper currency recognition due to the development of modern banking services like automated teller machine (ATM) and automatic goods seller machines. For a machine, it is a challenge to recognize paper currency whether it is of 10, 20, 50, 100, 500 or 1000. Various method or algorithm has been applied to overcome this challenge and in most of systems neural network is used. For this, LBP algorithm is proposed in this paper. The proposed method has advantages of simplicity and high speed. The experimental results show that this method has a high recognition rate. The recognition ratio can achieve 100% in case of good quality images.
- Published
- 2012
- Full Text
- View/download PDF
43. An Improved Function Optimization Problem (IFOP) of Evolutionary Programming Algorithm A Survival Paper
- Author
-
S. Saravanan and R. Karthick
- Subjects
Mathematical optimization ,Mutation operator ,Truncation selection ,Computer science ,Function optimization ,business.industry ,Survival of the fittest ,Tournament selection ,Ranking ,Fitness proportionate selection ,Key (cryptography) ,Artificial intelligence ,business ,Algorithm ,Selection (genetic algorithm) ,Evolutionary programming - Abstract
Algorithms are based on some influential principles like Survival of the Fittest and with some natural phenomena in Genetic Inheritance. The key for searching the solution in improved function optimization problems are based only on Selection and Mutation operators. This paper reflects on Survival selection schemes specifically like Truncate Selection, Proportionate Selection, Tournament Selection and Ranking Based Selection. In this paper we calculate the best fittest value among the populations which is generated.
- Published
- 2012
- Full Text
- View/download PDF
44. A Review Paper on Semiconductors using Big Data
- Author
-
Yash Shukla
- Subjects
Computer science ,business.industry ,Big data ,business ,Data science - Published
- 2018
- Full Text
- View/download PDF
45. A Review Paper: Question and Answering System
- Author
-
Himanshu Goyal and Atul Srivastava
- Subjects
Information retrieval ,business.industry ,Computer science ,Order (business) ,Process (engineering) ,Ontology ,The Internet ,Bootstrapping (linguistics) ,Ontology (information science) ,business ,Domain (software engineering) - Abstract
It is examined that the power of ontology based for open and closed domain question and its answering systems in this paper. In the order of obtaining an optimal database for this system, it has studied the method for linking the different phrases of different web links. The tagged corpus is built from an Internet in the bootstrapping process by providing some of the handcrafted examples of each question and their types. And then the patterns are automatically extracted from the returned documents and formatted answers are provided according to the entities and keywords provided. The precision of each entity has been calculated, and the each question type’s average. This ontology is then applied to find the answers of new questions which are about to ask.
- Published
- 2013
- Full Text
- View/download PDF
46. A Review Paper on Facial Detection Technique using Pixel and Color Segmentation
- Author
-
A. J. Patil and Chandrshekar S. Patil
- Subjects
Identification (information) ,Pixel ,Biometrics ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Segmentation ,Computer vision ,Artificial intelligence ,business ,Face detection ,Facial recognition system ,Field (computer science) - Abstract
In this paper a review is being carried out in the field of facial recognition and automatic human face detection. It has become a very popular tool in wide spaces of applications including the criminal investigation department in the forensic sciences along with the presentation of a biometric tool for the users to provide their unique identity. The databases for the face detection are a more genuine and easily accessible tool in carrying out the identification aspect when we don’t have enough evidences for the finger prints collection. A review has been made in this field while considering the pixel operation and color segmentation based approach.
- Published
- 2013
- Full Text
- View/download PDF
47. Digital Slate : Replacing the Paper Notepad
- Author
-
Kumar Anik and Abhishek Sharma
- Subjects
ARM architecture ,Operations research ,Computer science ,business.industry ,Embedded system ,business ,Social significance - Abstract
"Save paper, save trees" is a hot agenda in today's world. This paper presents an ingenuous approach to achieve the motto, by proposing a software-only design, through modeling a paper notepad digitally. It describes the financial and social significance of this model underlining its implementation. The paper also briefs about the underlying hardware selected for the design implementation. The hardware utilizes ARM processor and is quite portable. Its known as Mini2440 FriendlyARM. Throughout the paper, optimization (power, memory etc.) has been primarily focused yielding to a recommendable solution.
- Published
- 2010
- Full Text
- View/download PDF
48. Implementation Paper on Visual Education using Data Mining and Innovative Visualization on Cloud
- Author
-
Suraj Gaikwad, Anirban Dutta, and Kunal Pokale
- Subjects
Preference learning ,business.industry ,Computer science ,media_common.quotation_subject ,Kinesthetic learning ,computer.software_genre ,Visualization ,Information visualization ,Visual memory ,Reading comprehension ,Human–computer interaction ,Reading (process) ,Data mining ,business ,Visual learning ,computer ,media_common - Abstract
Kinesthetic, Auditory, Reading / Writing Preference Learning and Visual Learning are the 4 categories of learning types as per the widely used Fleming VAK / VARK model. Visual Learning represents concepts visually. By representing the information visually students are able to concentrate on meaning, acknowledge and group similar ideas easily making better use of visual memory. Visual learning improves student performance in the areas of Retention, Reading Comprehension, Student Achievement and Critical Learning skills. this system focuses on semi-automatically converting textual learning resources related to important world events into visual information. Few examples include Terrorist Activities in India, 26/11 Mumbai bomb blasts and Earth Quakes in India. This systems scrapes the unstructured text from textual learning resources, applies natural language processing to extract named entities in the text, uses location api's and innovative visualizations (e.g. Google Maps) to visualize the world event information in an intuitive manner. Human intervention is needed in case of incomplete information in the learning resource and verification of generated information. This system makes it easy to identify human intervention need via data health reports. General Terms Fleming VAK / VARK model, Visual Learning Data mining, NLP(Natural Language Processing), visualization, cloud.
- Published
- 2015
- Full Text
- View/download PDF
49. Survey Paper on Hadoop- using a Biometric Technique "Iris Recognition"
- Author
-
Yogesh Wagh, Silkesha Thigale, and Umesh S. Soni
- Subjects
Biometrics ,Multimedia ,Computer science ,business.industry ,Computer vision ,Artificial intelligence ,computer.software_genre ,business ,computer - Published
- 2015
- Full Text
- View/download PDF
50. A Survey Paper on Semiconductor Technology based Dual Modulus Prescaler
- Author
-
Nikhil R. Shimpi and Shilpa P. Kodgire
- Subjects
Very-large-scale integration ,Dual-modulus prescaler ,business.industry ,Semiconductor technology ,Computer science ,Operating frequency ,Electrical engineering ,NAND gate ,Hardware_PERFORMANCEANDRELIABILITY ,Integrated circuit ,NAND logic ,law.invention ,Frequency divider ,CMOS ,law ,Hardware_INTEGRATEDCIRCUITS ,Inverter ,Telecommunications ,business ,NMOS logic ,Flip-flop ,Hardware_LOGICDESIGN - Abstract
CMOS refers to both a particular style of digital circuit design and the family of processes used to implement that circuitry on an integrated circuit (chips). Due to the low power dissipation by the MOS devices, the use of them is quite prominent in the VLSI. Semiconductor technology based Dual Modulus Prescaler is to be fabricated in 90 nm technology. It basically comprises of 2 blocks for controlling the pulses generated at the output i.e. 256 or 257. The synchronous divide-by-4/5 divider uses symmetric fashion D flip-flops to achieve more than 10 GHz maximum operating frequency. Also the technology that has been used for construction of the D flip flop is of most basic components i.e. the nMOS gates and the inverters. Here, the inverters are constructed by using the NAND gates. This has simply done by shorting the two terminals of the NAND gate and making it as an inverter. The same can be done by using nor or any other gate too. The use of this design will make the consumption of the power in microwatt as the source couple logic used in the previous design concepts has power consumption in mW [1]. This modules output is to be carried out by using the Micro wind software 3.1. The prescaler will require upto 1.2-V supply. The prescaler’s estimated operating frequency is upto 17 GHz.
- Published
- 2013
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.