Volume-1 (Recent Trends in Computer Technology & Communication 2k16" (RTCTC-2k16))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | FoCUS: System to Learn Crawl Web Forum |
Country | : | India |
Authors | : | S.S.Pophale || Andhale Asmita B || Auti Pallavi S || Gaikwad Akshata S || Gavhane Pooja S |
Abstract:FoCUS is Forum Crawler Under Supervision. The main aim of the system is to give only relevant
content from forum and minimize the overhead. In that user can give request to forum and user can exchange
information by using forum. Forum have implicit navigation paths using specific URL type from entry page to
thread page. From observation system reduce forum crawling problem by using URL type recognition problem.
System also use regular expression pattern. FoCUS design for learning ITF regexe explicitly. FoCUS learns EIT
path and ITF regexe from forum. Forum automatically collect index URL, Thread URL and page flipping URL
into training set.
Keywords– Forum crawler, ITF regexe, Page Type, URL Type..
[1] Y. Zhai and B. Liu. Structured Data Extraction from the Web based on Partial Tree Alignment. IEEE Trans.
Knowl. Data Eng., 7(12):314−328, 206.
[2] J.-M. Yang, R. Cai, Y. Wang, J. Zhu, L. Zhang, and W. –Y.Ma. Incorporating Site-Level Knowledge to
Extract Structured Data from Web Forums. In Proc. of 7th WWW, pages 71-190, 209.
[3] X.Y. Song, J. Liu, Y.B. Cao, and C.-Y. Lin. Automatic Extraction of Web Data Records Containing
User-Generated Content. In Proc. of 19th CIKM, pages 39-48, 210.
[4] Z. Bar-Yossef, I. Keidar, and U. Schonfeld. Do not crawl In the DUST: different URLs with similar text. In
Proc. of 3thWWW, pages 111-12, 207.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dynamic Query Forms for Database Queries |
Country | : | India |
Authors | : | Dekshmukh.G || Kolase.A || Koshti.S || Varma. P || G.M.Dahane |
Abstract:Database maintains a large and heterogeneous data, with large number of relations and attributes.
This query form is one of the most widely use user interface for querying database. Traditional predefine query
form are not able to satisfy various ad-hoc for user on those database. It is very difficult to design a set of static
query forms to assure various ad-hoc database questions lying on that complex database. There is a need of
such system which generates query form dynamically according to the users need at run time. Main purpose
on this paper is to generate Random query formulation for database queries, a novel database query from
interface, which is able to dynamically produce query forms, for both relational and non-relational data
Keywords: Database, Random query, Dynamic Query, relational data
[1] Liang Tang, Tao Li, Yexi Jiang, and Zhiyuan Chen Paper: "Dynamic Query Forms for Database
Queries" http://www.adobe.com/products/coldfusion/.
[2] Gopi Krishna Lakkasani Balakrishna Nayudori Paper " Random Query Formulation for Database
Queries " .http://DBPedia.org.
[3] Priyanka P. Nikam Paper "A Review on Dynamic Query Forms for Database Queries"
http://www.ijarccse.com
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of Model Predictive Controller for Level Process |
Country | : | India |
Authors | : | B.V.Anarase || B. J. Parvat |
Abstract:The objective of this study is to investigate the Model predictive control (MPC) strategy, analyze and
compare the control effects with Proportional-Integral-Derivative (PID) control strategy in maintaining a water
level system. An advanced control method, MPC has been widely used and well received in a wide variety of
applications in process control, it utilizes an explicit process model to predict the future response of a process
and solve an optimal control problem with a finite horizon at each sampling instant. In this project, we first
designed and built up a closed-loop water level system. Next, we modeled the system and linerized the model
for simplification in the analysis and design..
1] J.G. Ziegler and Nichols, "Optimal Settings for Automatic Controllers", Trans. ASME, vol. 64 P.P. 759-
768, 1942
[2] K.J. Astrom and T. Hagglund, "Automatic Tuning of PID Controllers", 1st ed. Research Triangle Park,
NC: Instrum.Soc. Amer, 1988
[3] J.Prakash and K.Srinivasan, "Design of nonlinear PID controller and nonlinear model predictive
controller for a continuous stirred tank reactor", ISA transactions, Vol.48, issue 3, July 2009, page no.
273 – 282.
[4] K.Vijayakumar, T. Manigandan, "High Performance Model Predictive Controller for Non-Linear
Temperature Process", European Journal of Scientific Research, ISSN .1450-216X.vol.78 No.1 (2012),
PP. 65-73.
[5] Saeed Tawakoni, Mahdi Tavakoli, " Optimal Tuning of PID Controller for First Order Plus Time Delay
Models Using Dimensional Analysis", The Fourth International Conference on Control and Automation
(ICCA‟ 03), 10-12 June 2003 , Montreal, Canada.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Microcontroller Based Maximum Electricity Demand Controller |
Country | : | India |
Authors | : | M.U.Bhadane || P.R.Rahatal || K.S.Taskar || A.S.Jain |
Abstract:This project is to introduce an idea of a controller which it to be operated as a demand controller by using a microcontroller to save the energy of the device to use it as a further savior of consumption of heat and electricity. This project helps us to reduce the certain amount of uncertainties caused by usage of excess amount of device which makes it very mechanical for any human being to use. This project also helps us to increase the market value of the devices having less electrical and mechanical equipments for the operation to be carried out for the industrial purpose. In thermal over load protection system the if the temperature of the transformer is increased beyond the safe value, the transformer quickly disconnected from the system. It is done by the insertion of the control circuit in the secondary winding. This inserted circuit senses the temperature of the transformer and according to the temperature of the transformer it will work. This control circuit again senses the temperature of the transformer and if these temperature is normal then these circuit will connect the transformer to the system.
[1] International journal of Smart and Adaptive Over current Protection for distributed system with
distributed generation.
[2] International journal of over current relay setting model for effective substation relay coordination.
[3] International journal over current and over voltage protection of permanent magnet brushless DC motor
using wavelet analysis
[4] International journal thermal overload protection of distribution transformer.
[5] Basic electrical engineering: Arvind Mittal
[6] Principles of electronics: v. k. Mehta
[7] The 8051 Microcontroller and Embedded Systems: Muhammad Ali Mazidi
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Interactive Voice Response System for Three Phase Motor Protection, Control & Alert Using GSM Mobile with Android Application |
Country | : | India |
Authors | : | Sushama S. Punde || Deepak S.Handore || Ashwini M.Khadse || Tanmay N.Kapse || Dhanashree S.Wagh |
Abstract:Control system is a system where we can start and shut down the system when we want. That's the main difference between controlled and uncontrolled system. Our project aim is to make system more efficient and reliable. As the name suggest control is for controlling the three phase motor from remote place by using GSM mobile with android application, it will also detect there various fault like over voltage, dry run, sequential phase protection, under voltage etc and ensure that safe operation and provide instant status various way sms on mobile(message status),IVRS, android application etc .we used GSM network because it world-wide and operate our motor also transferring feedback Information through it thus the use of GSM network we don't need to establish extra equipment for networking. For eg. Instead GSM we used zigbee then we have to creating range and more costly, for more safety operation we provide unique identification number system, In agricultural sector we hope our project is become handy and cost effective to operate motor and give it's protection.
[1] V. Bhaskar and T. Gowri Manohar Department of E.E.E.,S.V. university, Tirupati,A.P. India Email:-
Velurubhaskar@ymail.com
[2] R. Jadhav , P .Pandit, S .Pal, V .Risbud Department ECE, "Three Phase Motor Control Using GSM",
International Journal Of Innovative Research in electrical, electronic, instrument and control engineering
,vol.3,issue 5,may 2015.
[3] Professional Android TM Application Development (Published by Wiley Publishing, Inc.10475 Cross
point Boulevard Indianapolis, IN 46256) www.wiley.com Copyright © 2009 by Wiley Publishing, Inc.,
Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-34471-2
[4] D. J. Gardner- Bonne au, and H. Blanchard (ed), "Human factors and voice interactive system "(Boston,
USA: Kluwer,2007)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | I2mapreduce: Incremental Map reduce For Mining Big Data |
Country | : | India |
Authors | : | S.S.Pophale || Shubham S. Lenekar || Pooja D. Mache || Pradnya N. Husale || Snehal N.Shinde |
Abstract:Data is continuously arriving by different data generating factors like social network, online shopping, sensors, e-commerce etc. Because of this Big Data the results of data mining applications getting stale and disused over time. Fine-grain Incremental processing is a promising approach to reviving data mining results. I2MAPREDUCE: Fine-Grain Incremental Processing in big data mining a new incremental processing extension to Map Reduce, the most widely used framework for mining big data.
[1] Y. Zhang, S. Chen, Q. Wang, and G. Yu, "i2mapreduce: Incremental MapReduce for mining evolving big
data," CoRR, vol. abs/ 1501.04854, 2015.
[2] J. Dean and S. Ghemawat, "Mapreduce: Simplified data processing on large clusters," in Proc. 6th Conf.
Symp. Opear. Syst. Des. Implementation, 2004, p. 10.
[3] Y. Zhang, Q. Gao, L. Gao, and C. Wang, "imapreduce: A distrib- uted computing framework for iterative
computation," J. Grid Comput., vol. 10, no. 1, pp. 47–68, 2012.
[4] J. Ekanayake, H. Li, B. Zhang, T. Gunarathne, S.-H. Bae, J. Qiu, and G. Fox, "Twister: A runtime for
iterative mapreduce," in Proc. 19th ACM Symp. High Performance Distributed Comput., 2010, pp. 810–
818.
[5] D. Peng and F. Dabek, "Large-scale incremental processing using distributed transactions and
notifications," in Proc. 9th USENIX Conf. Oper. Syst. Des. Implementation, 2010, pp. 1–15.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Best Peer++: A Peer-To-Peer Based Large-Scale Data Processing Platform |
Country | : | India |
Authors | : | Tantak Ashlesha || Sugandhi Renuka || Thorve Rutuja || Mungse Abhilasha || G. M. Dahane |
Abstract:For sharing of information among the participating companies and facilitating collaboration in a certain industry sector where companies share a common interest the corporate network is used. It reduces companies operational costs and increases the revenues. the inter-company data sharing and processing posesunique challenges to such a data management system as like scalability, performance, throughput, and security. In our system we present BestPeer++, a system that provides elastic data sharing services for corporate network applications in the cloud based on BestPeer++ a peer-to-peer (P2P) based data management platform.
[1] K. Aberer, A. Datta, and M. Hauswirth,Route "Maintenance Overheads in DHT Overlays", in 6th
Workshop Distrib. Data Struct., 2004.
[2] Abouzeid, K. Bajda-Pawlikowski, D.J. Abadi, A. Rasin, and A. Silberschatz, "HadoopDB: An
Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads", Proc. VLDB
Endowment, vol. 2, no. 1, pp. 922-933, 2009.
[3] C.Batini, M.Lenzerini, and S. Navathe," A Comparative Analysis of Methodologies for Database Schema
Integration", ACM Computing Surveys, vol. 18, no. 4, pp. 323-364, 1986.
[4] D. Bermbach and S. Tai, "Eventual Consistency: How Soon is Eventual? An Evaluation of Amazon s3s
Consistency Behavior", in Proc. 6th Workshop Middleware Serv. Oriented Comput. (MW4SOC 11), pp.
1:1-1:6, NY, USA, 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Protected and Verifiable Policy Update for Big Data Access Control in the Cloud |
Country | : | |
Authors | : | Vishnu R. Lembhe || Ravi A. Mule || Pratik R.Ponde || Tejas S. Yerguntla || R.G.Raut |
Abstract:In computing environment, the storage of big data is major problem. So to overcome this store the
big data in cloud because it has capabilities of storing largeamount of data and processing a high volume of
user access requests. Cloud computinguse the Attribute Based Encryption (ABE) [3] for providing the end to
end security forbig data in a cloud. Using this ABE policy, updating has been a challenging issue in the
previous implementations, firstly data owners have to retrieve the data and thenre-encrypt the new access policy
and send back to the cloud .Due to this, high communication and computational burden was on the data owners.
Soto overcome this problem of existing system here proposed a new system that dynamicallyupdates a policy for
big data in the cloud. Data owners have to just check whether cipher text has been updated correctly or not.
[1] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control
of encrypted data, in CCS06. ACM, 2006, pp. 8998.
[2] A. Sahai, H. Seyalioglu, and B. Waters, Dynamic credentials and ciphertext delegation for attribute-based
encryption, in CRYPTO12. Springer, 2012, pp. 199217.
[3] A. B. Lewko and B. Waters, "Decentralizing attribute-based encryption,"
in EUROCRYPT'11. Springer, 2011, pp. 568–588.
[4] T. Jung, X.-Y.Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-authorities," in
INFOCOM'13. IEEE, 2013, pp. 2625–2633.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | New Approach for ID-Based Data Sharing Mechanism with Forward Security |
Country | : | India |
Authors | : | Are Akshay sunil || Davange Mayuri Bhausaheb || Dhage Diksha Nivrutti || Kalwane Ganesh Kaduba M/S. Kale M.N |
Abstract:With the advancement in the cloud computing data sharing has never been easier, as well as An array of benefits to both the society and individuals provided by the shared data accurate analysis. When there is data sharing with a large number of participants on cloud several issues might considered, these issues may include efficiency, data integrity and also privacy of data owner by the system constructor To construct ananonymous as well as authentic data sharing system to the constructer is promised by the ring signature. Data owners data can be anonymously authenticate by itself, this data can be put into the cloud for storage or for analysis purpose allowed by it. Certificate verification process in the traditional public key infrastructure setting is more costly process. This process may turn to a bottleneck instead for this solution to be scalable. The need for certificate verification process eliminated by the ID-based) group(ring) signature.
[1]. Xinyi Huang, Joseph K. Liu+, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou, "Cost-
Effective Authentic and Anonymous Data Sharing with Forward Security", IEEE TRANSACTIONS
ON COMPUTERS VOL: 64 NO: 6 YEAR 2015
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Continuous Biometric Verification to Protect Interactive Login Sessions for Secure Internet Services |
Country | : | India |
Authors | : | Waghmare. S. D || More. A. B || Jahaurkar. S. A || Kasture. S.V || Dahane. G.M. |
Abstract:Nowadays, it becomes serious concern to provide more security to web services. So, secure user authentication is the fundamental task in security systems. Traditionally, most of the systems are based on pairs of username and password which verifies the identity of user only at login phase. Once the user is identified with username and password, no checks are performed further during working sessions We explore the continuous user verification for the secure internet services using biometrics in the session management No checks are performed during working sessions, which are terminated by an explicit logout or expire after an idle activity period of the user However a single verification step is still deemed sufficient, and the identity of a user is considered immutable during the entire session.
[1]. CASHMA-"Context Aware Security by Hierarchical Multilevel Architectures", MIUR FIRB, 2005.
[2]. Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, PaoloLollini, Angelo Marguglio, Andrea
Bondavalli,, "Continuous and
[3]. Transparent user identity verification for secure internet services", IEEE Transactions on Dependable
and Secure Computing MAY/JUNE 2015.
[4]. L . Hong, A. Jain, and S. Pankanti, "Can Multibiometrics Improve Performance?" Proc. Workshop on
Automatic Identification Advances Technologies (Auto ID '99) Summit, pp. 59-64, 1999.
[5]. [4] L. Montecchi, P. Lollini, A. Bondavalli, and E. La Mattina,"Quantitative Security Evaluation of a
Multi-Biometric Authentication System", Proc. Int'l Conf. Computer Safety, Reliability and security, pp.
209-221, 2012.
[6]. S. Kumar, T. Sim, R. Janakiraman, and S. Zhang, "Using Continuous Biometric Verification to Protect
Interactive Login Sessions" Proc. 21st Ann. Computer Security Applications Conf. (ACSAC '05), pp.
441-450, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Applying Cipher Technique Using Key-Aggregate Searchable Method For Multi Data Sharing Via Cloud Storage |
Country | : | India |
Authors | : | Pawar .S.S. || Rayate .M.H. || Ghuge.P.R || Sonawane .A. S || A. A. Pundlik |
Abstract:In cloud storage data sharing is the most valuable activity to perform necessary actions. In this article, we show how to share data with others in cloud database in an efficient, reliable, secure and scalable manner. We explain new public-key cryptography for efficient allocation of decryption rights for any set of cipher texts is possible that generate static-size encryption. The innovation is that one can collectively gather any set of secret keys makes them as compact as a single key, but surrounding the power of all the keys being collective at surrounding.
[1] Baojiang Cui, Zheli Liu and Lingyu Wang, "Key-Aggregate Searchable Encryption (KASE) for Group
Data Sharing via Cloud Storage ", Proc. IEEE Press, pp.year 2015.
[2] S. Yu, C. Wang, K. Ren, and W. Lou, " Achieving Secure, Scalable, and Fine-Grained Data Access
Control in Cloud Computing ", Proc. IEEE INFOCOM, pp. 534-542, 2010.
[3] R. Lu, X. Lin, X. Liang, and X. Shen, " Secure Provenance: The Essential of Bread and Butter of Data
Forensics in Cloud Computing ", Proc. ACM Symp. Information, Computer and Comm. Security, pp.
282-292, 2010.
[4] X. Song, D.Wagner, A. Perrig. "Practical techniques for searches on encrypted data ", IEEE Symposium
on Security and Privacy, IEEE Press, pp. 44C55, 2000.
[5] D. Boneh, C. G, R. Ostrovsky, G. Persiano. "` Public Key Encryption with Keyword Search ",
EUROCRYPT 2004, pp. 506C522, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Target Opinion Words Based On the Word Alignment Model for Online Reviews |
Country | : | India |
Authors | : | P.S. Hire || S.A. Gangurde || S.A. Darade || B.J.Patil |
Abstract:The important tasks of opinion mining is Mining opinion targets and words from the online reviews. The main component is to detect opinion relations between words. We study a novel approach, which looks for opinion relations in the form of alignment process. After that graph-based algorithm is study. And at the last, a candidate who has higher confidence those is extracted. As compared with other methods, this model is making the task of opinion relations, for large-span relations also. As Compared with the syntax method, the word alignment model is looks for negative effects of when we are looking for online texts. We can say that this model obtains better precision, As Compared to the traditional unsupervised alignment model. When we search for candidate confidence, we get to know that higher-degree vertices in the graph-based algorithm are decreasing the probability of the generation of error.
[1] M. Hu and B. Liu, "Mining and summarizing customer reviews," in Proc. 10th ACM SIGKDD Int. Conf.
Knowl. Discovery Data Mining, Seattle, WA, USA, 2004, pp. 168–177.
[2] F. Li, S. J. Pan, O. Jin, Q. Yang, and X. Zhu, "Cross-domain co extraction of sentiment and topic
lexicons," in Proc. 50th Annu. Meeting Assoc. Comput. Linguistics, Jeju, Korea, 2012, pp. 410419.
[3] L. Zhang, B. Liu, S. H. Lim, and E. O'Brien-Strain, "Extracting and ranking product features in opinion
documents," in Proc. 23th Int. Conf. Comput. Linguistics, Beijing, China, 2010, pp. 1462–1470.
[4] M. Hu and B. Liu, "Mining opinion features in customer reviews," in Proc. 19th Nat. Conf. Artif.Intell.,
San Jose, CA, USA, 2004, pp. 755–760.
[5] G. Qiu, B. Liu, J. Bu, and C. Che, "Expanding domain sentiment lexicon through double propagation," in
Proc. 21st Int. Jont Conf. Artif. Intell., Pasadena, CA, USA, 2009, pp. 1199–1204.