Volume-7 (National Conference on Recent Trends in Computer Science and Information Technology)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Authentication Techniques Help To Improve Security in the Era of Network System: A Study |
Country | : | India |
Authors | : | Mrs. Ruma Rahul Kapre |
Abstract: In the era of today's world as society is moving towards digital information, network security is becoming a central issue. While transferring the data through internet, security plays a crucial role. Security involves authorization of access of information controlled by the network administrator..........
Keywords -Authorization, Authentication Techniques, Network, Network Security, Network Topology, Network Types
[1]. Sumedha Kaushik,Ankur Singhal,"Network Security Using Cryptographic Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 12, December 2012,pg no-105-107
[2]. Simmonds, A; Sandilands, P; van Ekert, L (2004)" Ontology for Network Security Attacks". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285, pp.317–323.
[3]. Nancy katz,david lazer,holly arrow,noshir contractor, network theory and small groups, small group research, vol. 35 no. 3, june 2004 307-332 Doi: 10.1177/1046496404264941
[4]. Nivedita Bisht, Sapna Singh," analytical study of different network topologies", International Research Journal of Engineering and Technology (IRJET) Volume: 02 Issue: 01 | Mar-2015,pgno88-90
[5]. Santanu Santra,Pinaki Pratim Acharjya, "A Study And Analysis on Computer Network Topology For Data Communication", International Journal of Emerging Technology and Advanced Engineering, Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013),pg no 522-525
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Computer Technology and Human Language Communication |
Country | : | India |
Authors | : | Dr. Mamta Muthal |
Abstract: Technology has invaded all areas of human existence and left no field untouched including human communication. The paper attempts to take a bird's eye-view of the how researches in Comutational Linguistics/ Natural Language Processing/ Artificial Intelligence have impacted human communication. Emergence of Emoji is another phenomena whose eruption and evolution is attracting a lot of research. The paper will attempt to acquaint readers with the comcepts of Computational Linguistics and Emoji.
Keywords: Computer Language, Linguistics, Computational Linguistics, Natural Language Processing
[1]. Mallory McKee, Cody Nelson, History of Artificial Intelligence, Alicia Washington, 2012.
[2]. http://www.slideshare.net/pranavgupta21/introduction-to-natural-language-processing-13847262?next_slideshow=2
[3]. http://www.slideshare.net/yogendra48/natural-language-processing
[4]. http://www.slideshare.net/jaganadhg/natural-language-processing-14660849
[5]. https://en.wikipedia.org/wiki/Computational_linguistics
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An overview and comparison of Software Reliability tools |
Country | : | India |
Authors | : | 1Dileep Sadhankar || Dr. Ashish Sasankar |
Abstract: Software Reliability has been regarded as one of the important quality attribute and still there were very few standardized tool had been developed to estimate software reliability in quantitative terms. Software reliability is such a critical factor in deciding the overall quality of software, thus it should be estimated. Here we have surveyed many existing software reliability tools like SMERFS (Software Modeling & Estimation of Reliability Functions for Software), SRMP (Statistical Modeling & Reliability Program), SoftRel, SoRel, SRTPro, MEADeP and SREPT....
Keywords- –Availability, Data analysis, Evaluation, Markov chain, Parameter estimation, Reliability, Software tool.
[1]. ANSI/IEEE, Standard Glossary of Software Engineering Terminology, STD-729–1991
[2]. Lyu, M. and A. Nikora (1992a, July). Casre - a computer-aided software reliability estimation tool. In Proc. of the Fifth Internation al Workshop on Computer-Aided Software Engineering, Montreal, Que., pp. 264–275. IEEE Computer Society
[3]. M.R. Lyu, Handbook of Software Reliability Engineering, IEEE Computer Society, p.71-117, 1996
[4]. B.H.Far, Software Reliability &Quality[Online]. Available:http://people.ucalgary.ca/~far/Lectures/SENG521/PDF/ SENG521-12_handout.pdf
[5]. Allen Nikora, CASRE–A Computer-Aided Software Reliability Estimation Tool, http://www.openchannelfoundation.org/projects/CASRE_3.0.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An innovative solution to avoid problem associated with top down parsing |
Country | : | India |
Authors | : | Mr. Rakesh Yashwant Gedam || Dr. Rakesh Ramteke || Dr. Pravin Gundalwar |
Abstract: Compiler has different phases or passes. Each phase having important significance but parser does very crucial role in compilation process. This paper has discusses basic issues in parsing & generation of parse tree or derivation tree for different token identifier by using lexical analyzer and then pass to parser for further process to get intermediate code generation. This paper explains the types of parsers to generate string of executable code. Each approach having significant benefit and drawback, and also suffer with some bottleneck. This paper focuses on certain problem in top down parsing approach & its efficient solution to generate the machine dependent effective code.
Keywords:-Parser, Lexical Analyzer, Parse Tree, backtracking, left recursion, left factorization
[1]. Alfred_V._Aho,_Monica_S._Lam,_Ravi_Sethi,_Jeffrey" Compilers Principal , techniques , tools second edition
[2]. E. Borin, C. Wang, Y. Wu, and G. Araujo. Software-based transparent and comprehensive control-flow error detection. In CGO '06.
[3]. Earley, J., "An efficient context-free parsing algorithm," Comm. A CM
[4]. R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. An efficient method of computing static single assignment form. POPL '89
[5]. J. Guo, F. HÃijffner, E. Kenar, R. Niedermeier, and J. Uhlmann. Complexity and exact algorithms for vertex multicut in interval and bounded treewidth graphs. European Journal of Operational Research, 186(2):542 – 553, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud Computing and Security Issues in the Cloud |
Country | : | India |
Authors | : | Madhuri Pramanik || Vishal Dhabalia |
Abstract: Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment remains at the core of interest........
Keywords: SaaS, PaaS, IaaS, DDoS, SCC
[1]. Millard, Christopher (2013). Cloud Computing Law. Oxford University Press. ISBN 978-0-19-967168-7.
[2]. Singh, Jatinder; Powles, Julia; Pasquier, Thomas; Bacon, Jean (July 2015). "Data Flow Management and Compliance in Cloud Computing". IEEE Cloud Computing 2 (4): 24–32. doi:10.1109/MCC.2015.69.
[3]. Armbrust, Michael; Stoica, Ion; Zaharia, Matei; Fox, Armando; Griffith, Rean; Joseph, Anthony D.; Katz, Randy; Konwinski, Andy; Lee, Gunho; Patterson, David; Rabkin, Ariel Hu, Tung-Hui (2015). A Prehistory of the Cloud. MIT Press. ISBN 978-0-262-02951-3.
[4]. Rochwerger, B.; Breitgand, D.; Levy, E.; Galis, A.; Nagin, K.; Llorente, I. M.; Montero, R.; Wolfsthal, Y.; Elmroth, E.; Caceres, J.; Ben-Yehuda, M.; Emmerich, W.; Galan, F. "The Reservoir model and architecture for open federated cloud computing". IBM Journal of Research and Development
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Star Classification using Tree based Data Mining Techniques |
Country | : | India |
Authors | : | Dr. R. A. Ingolikar || S. R. Gedam |
Abstract: Classification of Astronomical Data having large database is a troublesome activity. Data mining decision tree based techniques are applied for classification of star. The objective of the work is to evaluate the effectiveness of random forest on astronomical object classification. Random forest is an ensemble based classifier method where each classifier is decision trees. Results shows that ensemble method performs better as compared to single tree based classifier.
Keywords - Ensemble, Random forest, Decision trees, Classification
[1]. Nong Ye. The Handbook of Data Mining. Lawrence Erlbaum Publishers, 2003.
[2]. J. Han and M. Kamber. Data Mining, Concepts and Techniques. Morgan Kaufmann Publishers, 2001.
[3]. Marios Kampakolou, Roberto Trotta, and Joseph Silk. Monolithic or hierarchical star formation? A new statistical analysis. Monthly Notices of the Royal Astronomical Society, 384(4):1414-1426, 2008.
[4]. Shaukat N. Goderya and Shawn M. Lolling. Morphological classification of galaxies using computer vision and artificial neural network: A computational scheme. Astrophysics and Space Science, 279(4):pp. 377-387, 2005.
[5]. Yogesh Wadadekar. Estimating photometric redshifts using support vector machines. Publications of the Astronomical Society of the Pacific, 117(827):pp. 79-85, 2005.