Volume-2 (Recent Trends in Computer Technology & Communication 2k16" (RTCTC-2k16))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Activity Prediction Using Truval Method in Mobile Social Network |
Country | : | India |
Authors | : | Godse Vikas || Suryawanshi Sagar || Nachan Prashant || Mahajan Devyani || Kapade N. V. |
Abstract: Now a day's current trend is online social network turning towards the mobile. Mobile social networks
directly reflect on our real social life, since there are an important source to analyze , understand the underlying
dynamics of an human behaviors like (activities). In this report, we are going to study the problems of the activity
prediction in mobile social networks using trueval method. We presenting a series of observations in two real
mobile social network and then propose a method, ACTPred, based on the dynamic factor-graph model for
modeling and predicting the user activities. An approximate algorithm based on mean field method presented an
efficiently learn the proposed method. We are going to deploy a real system to collect user mobility behaviors ,
validate the proposed method on two combines mobile datasets. Shows that the proposed ACTPred model can be
achieve better performance than baseline methods.
[1] M. Granovetter, "The strength of weak ties, American Journal of Sociology", vol. 78, no. 6, pp. 1360-1380,
1973.
[2] D. Krackhardt, "The strength of strong ties: The importance of philos in networks and organization, in
Networks and Organizations", N. Nohria and R. G. Eccles, Eds. Cambridge, USA: Harvard Business School
Press,1992, pp. 216-239.
[3] J. Neville and D. Jensen, "Iterative classification in relational data, in Proc. AAAI‟00", Austin, USA, 2000,
pp. 13-20.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Reliable Data Transmission to Mobile Cloud Computing From Wireless Sensor Network |
Country | : | India |
Authors | : | Vajpeyi Amey || Wagh Anjali || Patil Payal || A. A. Pundlik |
Abstract:The combination of ubiquitous wireless sensor Network (W.S.N.) and powerful mobile cloud computing M.C.C. is an investigation topic that is fascinating growing attention in both academic and usefulness. In this new example, WSN delivers data to the cloud and moveable users demand data from the cloud. To provision applications involving W.S.N.-M.C.C. combination, which need to dependably offer data that are more useful to the moveable users from W.S.N. to cloud, this paper first recognizes the critical problems that disturb the helpfulness of sensory data and the dependability of W.S.N., then suggests a novel W.S.N.-M.C.C.
[1]. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ``Wireless sensor networks: A survey,''
Computer. Network. vol. 38, no. 4, pp. 393_422, Mar. 2002.
[2]. M. Li and Y. Liu, ``Underground coal mine monitoring with wireless sensor Networks,'' ACM Trans.
Sensor Network. vol. 5, no. 2, Mar. 2009, Art. ID 10.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Privacy-Preserving Data Leak Detection |
Country | : | India |
Authors | : | Nitin Naik || Aniket Nikam || Narendra Patil || K.V.Ugale |
Abstract:Among différent data-leakage examples, man-like mistakes are one of the main causes of data loss. There have existence answers sensing indentent sensitive information for computer leak cause by man like mistake and to make ready for organisations. A common move near by is to screen what is in place for storing and send (power and so on) for made open to sensitive information. Such a move near usually has need of the detecting operation to be guided in secrecy. However, this secretiveness thing need is hard to give what is desired, need to in familiarization, as discovery serve may be put at risk. In this paper, we present a right not to be public keeping harmless data-leak discovery (OLD) answer to get answer to the question under expansion where a special group of sensitive knowledge for computer goes through process of digestion is use in discovery.
[1] J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T.Kohno, "Privacy oracle: A system for
finding application leaks with black box differential testing", in Proc. 15th ACM Conf. Comput.
Commun.
[2] Secur., 2008, pp. 279288
[3] A. Z. Broder, Some applications of Rabins fingerprinting method, in Sequences II. New York, NY, USA:
Springer-Verlag, 1993, pp. 143152.
[4] X. Shu and D. Yao, "Data leak detection as a service", in Proc. 8th Int. Conf. Secur. Privacy Commun.
Netw., 2012, pp. 222240.
[5] A. Z. Broder, M. Charikar, A. M. Frieze, and M. Mitzenmacher," Minwise independent permutations", J.
Comput. Syst. Sci., vol. 60, no. 3, pp. 630659, 2000.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Location Tracking And Positioning In Dtns(Disruption Tolerant Network) |
Country | : | India |
Authors | : | N.B. Upadhyay || S.V. Wagh || N.M.Gandhi || S.R. Kathkade || R.M.Shaikh |
Abstract:As the vast research in the field of technology increases, location dependent applications becomes
highly important as positioning and tracking of mobile devices plays an important role in context aware and
pervasive services. While physical localization and logical localization for satellite has been highly and
extensively researched, networks with fixed reference points like GSM and WiFi are densely deployed and
tracking and positioning techniques in Sparse Disruption Tolerant Networks (DTN) have not been well
researched. In this paper, we propose a cooperative and localized method called Pulse Counting for DTN
localization and a probability based tracking method called Prob Tracking to solve the problem.
[1]. K. Fall, delay-tolerant network architecture for challenged internets," in Proc. ACM Conf. Appl.,
Technol., Architect. Protocols Comput.Commun., 2003, pp. 27–34.
[2]. A. Lindgren, A. Doria, E. Davies, and S. Grasic, "Probabilistic routing protocol for intermittently
connected networks," RFC 6603, Internet Research Task Force, Aug. 2012.
[3]. S. Gaonkar, J. Li, R. R. Choudhury, L. Cox, and A. Schmidt, "Micro-blog: Sharing and querying content
through mobile phones and social participation," in Proc. 6th Int. Conf. Mobile Syst., Appl., Serv., 2008,
pp. 174–186.
[4]. E. D. Kaplan, Understanding GPS Principles and Applications. Norwood, MA, USA: Artech House, Feb.
1996.
[5]. J. Soubielle, I. Fijalkow, P. Duvaut, and A. Bibaut, "GPS positioning in a multipath environment," IEEE
Trans. Signal Processing, vol. 50, no. 1, pp. 141–150, Jan. 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Avoid Duplication in Cloud System with Improved Security AND Reliability |
Country | : | India |
Authors | : | Shweta V. Jondhale || Amita S. Jadhav || Priyanka B. Dhanwate || Rohini. R. Watane |
Abstract:Data duplication is technique has been widely used in a cloud to reduce storage space and upload
bandwidth. This technique is also used for eliminating duplicate copies of data. However, in cloud only one
copy of each file is stored even if each file is owned by a huge number of users. The duplication system
improves storage utilization but it reducing reliability, according to user. Furthermore, in above challenges the
Data duplication is a technique has been widely used in cloud servers that are data storage makes first attempt
for formalize notation of distributed reliable duplication system..
[1]. Mohini Ramesh Vikhe, Prof.Dr.KishorKinage, Prof.Jyoti Malhotra, "Secure De-duplication with Efficient and
Reliable Convergent Key Management",IEEE Transaction, VOL.25, NO. 6, pp. 1615-1625 June 2014.
[2]. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, "A Hybrid cloud approach for secure authorized
de-duplication"IEEE Transaction, VOL:PP NO:99 Year 2014.
[3]. Jidong Xiao, Zhang Xu, HaiHuangy,Haining Wang, "Security Implication of memoryDe-duplication in a Virtualized
Environment", in procYear 2013.
[4]. Zhifeng Xiao and Yang Xiao, "Security and Privacy in Cloud Computing",IEEE Communication Surveys and
Tutorial, VOL. 15, NO. 2, pp. 843-859, Second Quarter 2013.
[5]. Hsiao-Ying Lin and Wen-GueyTzeng, "A Secure Erasure code-based cloud storage system with secure data
forwarding",IEEE Transactions, VOL. 23, NO. 6, pp. 995-1003, JUNE 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Parallel Network File System with Authenticated Key Exchange Protocols |
Country | : | India |
Authors | : | Singh Vivek kumar R. || Ahire Akash R. || Singh Vikas J. || Shaikh Faiz I || P.V.Nagare |
Abstract: We study the problem of key generation for secure many to many communications. The problem is raised by the proliferation of large scale distributed file system supporting parallel access to multiple storage devices. Our work focuses on current Internet standards for such file systems, i.e. the parallel Network File System (pNFS), which makes use of Kerberos to establish parallel session keys between client and storage devices. Our review of the existing Kerberos-based protocol has a number of limitations: (i) a metadata server facilitating key exchange between clients and storage devices has heavy workload which restricts the scalability of the protocol; (ii) the protocol does not provide forward secrecy; (iii) metadata server establish itself all the session keys that are used between the clients and storage devices, and this inherently leads to the key escrow. In this paper, we propose a variety of authenticated key exchange protocols that are designed to address above issues. We show that our protocols are capable of reducing up to approximately 54% of workload of a metadata server and concurrently supporting forward secrecy and escrow-freeness.
Keywords: Parallel sessions, authenticated key exchange, network file systems(NFS), forward secrecy, key escrow.
[1] Qi Xie1*, Bin Hu1*, Na Dong1, Duncan S. Wong2., "Anonymous Three-Party Password-Authenticated
Key Exchange Scheme for Telecare Medical Information Systems."
[2] Michel Abdalla, David Pointcheval., "Simple Password-Based Encrypted Key Exchange Protocols.
[3] A.Sai Kumar **P. Subhadra., "User Authentication to Provide Security against Online Guessing
Attacks."
[4] Anupam Datta1, Ante Derek1, John C. Mitchell1, and Bogdan Warinschi2., "Key Exchange Protocols:
Security Definition, Proof Method and Applications ."
[5] R.S.RamPriya, M.A.Maffina., "A Secured and Authenticated Message Passing Interface for Distributed
Clusters."
[6] Feng Hao1 and Peter Ryan2., "J-PAKE: Authenticated Key Exchange Without PKI"
[7] Bruno Blanchet., "Automatically Verified Mechanized Proof of One-Encryption Key Exchange"
[8] Feng Hao1 and Peter Ryan2.,"Password Authenticated Key Exchange by Juggling"
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of Vehicle To Vehicle Data Transmission Application Using Li-Fi Technology |
Country | : | India |
Authors | : | D.V.Charahte || P. R. Wagh || P. V. Avhad || S. V. Mankar || N.S.Mankar |
Abstract:Vehicle to vehicle data transmission, we present initial designs and results of a small-scale prototype
using light fidelity (Li-Fi) technology, a new technology that was developed in the last few years, which still
needs more systematic inquiry on its sustainability for outdoor vehicular networks. Vehicle to vehicle
communication is the most effective solution we have used in order to reduce vehicle's accidents. The propose
use of Li-Fi technology comprises mainly light-emitting diode (LED) bulbs as means of connectivity by sending
data through light spectrum as an optical wireless medium for signal propagation. In fact, the usage of light
emitting diode (LED) eliminates the need of complex wireless networks and protocols. The design system is aim
to ensure a highly-reliable communication between a commercial LED-based transaction light and a receiver
mount on a vehicle.
Keywords: light emitting diode, photodiode, vehicle to vehicle communication, visible light communication.
[1] Kiyoshi MIZUI, Masao NAKAGAWA, "Vehicle-to-Vehicle Multi Target Communication and Ranging
System using Spread Spectrum Technique.
[2] Lina Altoaimy, Imad Mahgoub, and Monika Rathod, "Weighted Localization in Vehicular Ad Hoc
Networks Using Vehicle-to-Vehicle Communication".
[3] Alin-M. Cailean, Barthélemy Cagneau, Luc Chassagne, Suat Topsu, "Design and implementation of a
visible light communications system For vehicle application" , November 2013.
[4] Shubham Chatterjee, Shalabh Agarwal, "Scope and Challenges in Light Fidelity(LiFi) Technology in
Wireless Data Communication", June 2015.
[5] Akshata msonnad, anjana gopan, "Recent advancements in li-fi technology", Dec-2013.
[6] Aman Sodhi, Jeslin Johnson, "Light Fidelity (LI-FI) - The Future of Visible Light Communication",
March-April 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | User Location Provenance Witness And Proxy Generation Framework. |
Country | : | India |
Authors | : | Jadhav Pallavi S. || Khalkar Supriya S. || Randhavane Sonali B. || Joshi Sunil R.|| Singh Seema A. |
Abstract: During the last few years, usage of mobile phones as an authorized work and various institutes use mobile devices as an expert communication. Location based services allow users to provide a physical location provenance proof and privacy protection. Our framework maintains a privacy of data sharing and provides witness proof. It is a significant challenge to generate provenance witness and generate a proxy in one fabric. So far propose system accomplish the framework requirement. We are producing a different framework for location specific secure data sharing, which will afford user location proofs generation and proxy location. It is ready-to- deploy framework for secure, witness-oriented, and provenance preserving location proofs.
[1]. Antorweep Chakravorty, Tomasz Wlodarczyk, Chunming Rong, "Privacy-Preserving P2P Data Sharing
with OneSwarm" SIGCOMM'10, August 30–September 3, 2010.
[2]. Antorweep Chakravorty, Tomasz Wlodarczyk, Chunming Rong, "Privacy Preserving Data Analytics for
Smart Homes" Department of Computer & Electrical Engineering, 2013.
[3]. Larry A. Dunning, Member, IEEE, and RayKresman, "Privacy Preserving Data Sharing With
Anonymous ID Assignment" Department of Computer Science, Bowling Green State University, 2013.
[4]. Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang, "Privacy Preserving Mining of Association Rules From Outsourced Transaction Databases" University of
British Columbia, Vancouver, Canada, 2013.
[5]. Stanislav Mamonov &Raquel Benbunan-Fich, " Factors Affecting Perceptions of Privacy Breach among
Smartphone Application Users" 2014 47th Hawaii International Conference on System Science.
[6]. Adrian Z.Y. Tan, Wen Yong Chua &Klarissa T.T. Chang, "Location Based Services and Information
Privacy Concerns among Literate and Semi-Literate Users", 2014 47th Hawaii International Conference
on System Science.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Content-Based Image Retrieval Using Features Extracted From Block Truncation Coding |
Country | : | India |
Authors | : | Sanket Shinde || Manish Badgujar || Ashish Vishwakarma || Pravin Avhad || Prof. R. M. Shaikh |
Abstract:In our paper the technique accustomed Content primarily based Image Retrieval (CBIR) by
victimization the ODBTC for generation of pictures. During this formula actual image can get regenerate in
RGB (Red, Green, and Blue) format and its applicable icon image format. There are 2 image options are
planned to associate index image, color co-occurrence feature and Bit Pattern Image, those are inherit from
ODBTC formula encoded knowledge stream with none coding method. BPF and CCF are merely inherit from 2
ODBTC quantizer additionally icon. Planned technique is better-quality techniques to dam truncation
cryptography image retrievals theme and any earlier ways, furthermore because it proves to facilitate ODBTC
structure isn't solely applicable for image firmness, since its straight forwardness; aside from it propose
untroubled and economical descriptor to index pictures in CBIR structure.
[1] ZHOU Yiming, "Fast Fractal Image Encoding Using an Improved Search Scheme", TSINGHUA
SCIENCE AND TECHNOLOGY ISSN 1007-0214 15/19 pp602-606 Volume 12, Number 5, October
2007.
[2] LI Xiaowen, ZHANG Milin, WANG Zhihua, Amine Bermak, "Smart Image Sensor with Integrated Low
Complexity Image Processing for Wireless Endoscope Capsules", TSINGHUA SCIENCE AND
TECHNOLOGY ISSNll1007-0214ll06/18llpp586-592 Volume 14, Number 5, October 2009.
[3] Manimala Singha, K.Hemachandran, "Content Based Image Retrieval using Color and Texture", An
International Journal (SIPIJ) Vol.3, No.1, February 2012.
[4] P.Jayaprabha and Rm. Somasundaram," Content Based Image Retrieval Methods Using Graphical Image
Retrieval Algorithm (GIRA)", COMPUTER SCIENCE AND APPLICATION, VOL. 1, NO. 1,
JANUARY, 2012.
[5] Jianji Wang, Student Member, IEEE, and Nanning Zheng, Fellow, IEEE,"A Novel Fractal Image
Compression Scheme with Block Classification and Sorting Based on Pearson's Correlation Coefficient",
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 9, SEPTEMBER 2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Advanced Security System Using Bluetooth |
Country | : | India |
Authors | : | Jadhav . S. N. || Lokhnade .B.V. || Pawar. D. S. || Somwanshi.S. R |
Abstract:Security is a prime concern in our day to day life. Everyone wants to be as secure as
possible and also want to keep their valuables very safe. Access control forms a very integral part of the
system. Over here we have made a very unique kind of security system comprising of a Bluetooth based
embedded hardware and an android based software.
Keywords: Bluetooth, ISM Band, Microcontroller, Personal Area Network [PSN], Security System, UHF Radio
Wave
[1] C.S.R.Prabhu & A .Pratap Reddy, "Bluetooth technology and its applications".
[2] Enthil Kumar's & Padmavathy.N, "Android Based Security and Remote Surveilance Systems
",Department of Electrical and Electronics Engineering, G.K.M College of Engineering.
[3] Ming Yan and Hao Shi, "Smart Living Using Bluetooth-Based Android SMARTPHONE" , College of
Engineering and Science, Victoria University, Melbourne, Australia, International journal.[2]
[4] Sayyed Hussain Raza, Naqvi Sayyed Muhammad, Tahir Raza Muhammad Umer, Rahmed Khan, "Home
Automation via Bluetooth (using android platform)"
[5] Josh Potts and Somsak Sukittanon "Exploiting Bluetooth on Android Mobile Devices for Home Security
Application." University of Tennessee at Martin Department of Engineering Martin, TN USA.[4].
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Micro Controller Based Ph Meter using magnetic stirrer |
Country | : | India |
Authors | : | A.V.Gangurde || SmitaS.Pagar || Ashish V. Kadam || Roshan S. Ghodke |
Abstract:A pH Meter is an electronic device which is used for measuring the pH. The pH is either the
concentration of Hydrogen ions in an aqueous solution or the active number of Hydrogen ions in an aqueous
solution. The pH scale canmeasure that how acidic or basic a solution is. The pH scale has range of from 0 to
14. A pH 7 of solution is neutral;A pH less than 7 of the solution is acidic. A pH greater than 7 of solution is
basic. pH is defined as the negative logarithm of the hydrogen ion concentration [2].Using digital pH meter we
get the numerical value of pH with more accuracy where as in conventional methods we get only indication that
the solution is alkaline or base. As it gives the exact number of pH so it is easy to maintain the solution at
neutral level. Also it gives the accuracy up to 0.01 %. In thisworkweused a magneticstirrer or mixer
whichisemployed forrotatingthe magneticfieldfor stirring the solution whilesensing the hydrogen ion
concentration.
Keywords: Hydrogen ions, Magnetic stirrer, pH Sensor, pH, pH meter
[1]. PK Glasoe, FA Long - The Journal of Physical Chemistry, 1960 - ACS Publication all-about-ph.com/phmeter-
calibration.html Development of the Beckman pH Meter". National Historic Chemical
Landmarks.AmericanChemical Society. Retrieved March 25, 2013
[2]. P Pillay, R Krishnan - Industry Applications, IEEE Transactions …, 1989 - ieeexplore.ieee.org Arthur
Rosinger (June 6, 1944). "Magnetic Stirrer".United States Patent Office.Retrieved 16 February 2013.
[3]. Arnold Thackray and Minor Myers, Jr. ; foreword by James D. Watson. (2000). Arnold O. Beckman :
one hundred years of excellence. Philadelphia, Pa.: Chemical Heritage Foundation.ISBN 978-0-941901-
23-9.
[4]. Ohio Electric Motors. DC Series Motors: High Starting Torque but No Load Operation Ill-Advised. Ohio
Electric Motors, 2011. Archived 20 July 2011 at WebCi
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Integration of Two Pokayoke's for O-ring Detection & Nozzle Projection |
Country | : | India |
Authors | : | Sagar H. Atram || Ganesh G. Gaikwad || Tejas S. Joshi || A.R.Kaushik |
Abstract:The injector is likely to be said as an heart of any engine which contributes in injecting fuel with
desired specification. The injector manufacturing involves various discrete processes. Within view to recent
customer complaints of o-ring missing and inaccurate nozzle projection possessing an error percentage of two
percent for which the traditional manufacturing processes misses the mark/comes to grief thereby in order to
prevail over these drawbacks system integration is proposed, wherein o-ring detection and nozzle projection is
done in one process cycle, which not only detects o-ring but also computes exact nozzle projection of required
specification with respect to thresholds preset. The system integration minimizes human errors if any as it does
not allow any bypass of faulty product.
[1] Diesel Fuel Injection published by Robert Bosch GmbH, 1994.
[2] T. Karkoszka , J. Honorowicz, Kaizen philosophy a manner of continuous improvement of processes and
products, AMME, VOLUME 35,ISSUE 2,August-2009.
[3] Gratiela Dana BOCA, North University Baia Mare, "Kaizen Method in Production Management",
International Scientific Conference YOUNG SCIENTISTS 2011.
[4] M. Dudek-Burlikowska, D. Szewieczek, "The Poka-Yoke method as an improving quality tool of
operations in the process", AMME, VOLUME 36, ISSUE 1, September-2009.
[5] Aguinaldo dos Santos and James Powell, "Potential of Poka-yoke Devices to Reduce Variability in
Construction," Potential of Poka-Yoke Devices to Reduce Variability in Construction Proceedings.