Volume-3 (Recent Trends in Computer Technology & Communication 2k16" (RTCTC-2k16))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dynamic Solutions by Optimize Fine-grain Pricing Scheme |
Country | : | India |
Authors | : | Bachate Anuja B. || Borse Varunkumar D. || Bhalerao Shrikrishna R. || Patil Pallavi D. || A. Y. Panpatil |
Abstract: There are various types of pricing scheme in Cloud computing which are pay-as-you-go and subscription spot policy, but it is still suffer from wasteful payment because of coarse-gained pricing scheme. In this paper, we are going to implement an optimized fine-grained pricing scheme for those two strong issues are addressed: (1) The provider and customer gained benefit must contradict mutually (2) VM- maintenance overhead like startup cost is often too huge to be neglected. Not only can we gain a best charge in the suitable price choices that satisfies both customers and providers at the same time, but we also calculate a best-fit billing cycle to increase social welfare (i.e., the total of the charge reductions for every customers and the income gained by means of the provider).
[1] Arun Anandasivam, Stefan Buschek, Raj Kumar Buyyay,"A Heuristic Approach for Capacity Control in
Clouds" IEEE Conference on Commerce and Enterprise Computing, pp.90-97, 2009.
[2] Michael Mattess, Christian Vecchiola, and Rajkumar Buyya," Managing Peak Loads by Leasing Cloud
Infrastructure Services from a Spot Market" 12th IEEE International Conference on High Performance
Computing and Communications, pp.181-189, 2010.
[3] Varun Kamra, Kapil Sonawane, Pankaja Alappanavar," CLOUD COMPUTING AND IT'S PRICING
SCHEMES" ISSN: 0975-3397 Vol. 4 No., pp. 577-581, 04 April 2012.
[4] Bhanu Sharma, Ruppa K. Thulasiram, Parimala Thulasiraman, Saurabh K. Garg," Pricing Cloud
Compute Commodities: A Novel Financial Economic Model"12th IEEE/ACM International Symposium
on Cluster, Cloud and Grid Computing, pp. 451-457,2012
[5] K. L. Giridas, Shajin Nargunam," Optimal Resource Allocation Technique (ORAT) for Green Cloud
Computing" International Journal of Computer Applications Volume 55– No.5, pp.21-26, October 2012.
[6] May Roomi, Shaikha Ebrahim, Sabika Buqrais and Imtiaz Ahmad "Cloud Computing Pricing Models: A
Survey" International Journal of Grid and Distributed Computing Vol.6, No.5, pp.93-106, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Context Based Predictor on Lossless and Lossy Compression |
Country | : | India |
Authors | : | Abhishek D. Nalkande || Yogita V. Mahajan || Pooja N. Apsunde || Shivani S. Patil || P. R. Naoghare |
Abstract:In Android devices, Memory management has become a major concern because it has significant impact on system performance and battery life. Also it is important to efficiently use and manage the internal and external memory space present inside the mobile operating system. So it is essential to make a facility that helps in reducing memory consumption. The proposed Classic Image Compression Algorithm compress the RGB color image using lossless Image Compression Algorithm with the help of predictive coding based on Color Quantization for Android Mobile Devices. Predictive coding is very effective for lossless image compression.
[1]. Jiantao Zhou, Xianming Liu, Oscar C. Au, Yuan Yan Tang." Designing an Efficient Image Encryption-
Then-Compression System via Prediction Error Clustering and Random Permutation" JANUARY
2014.
[2]. Seyun Kim and Nam Ik." Hierarchical Prediction and Context Adaptive Coding for Lossless Color
Image Compression" JANUARY 2014.
[3]. Diego Valsesia and Enrico Magli." A Novel Rate Control Algorithm for Onboard Predictive
Coding of Multispectral and Hyper spectral Images" OCTOBER 2014.
[4]. Kai-jen Cheng and Jeffrey Dill." Lossless to Lossy Dual-Tree BEZW Compression for Hyper
spectral Images" SEPTEMBER 2014.
[5]. Matthew G. Reyes, David L. Neuhoff, and Thrasyvoulos N. Pappas." Lossy Cutset Coding of
Bi-level Images Based on Markov Random Fields" APRIL 2014.
[6]. Eugen Wige, Gilbert Yammine, Peter Amon, Andreas Hutter and André Kaup." In-Loop Noise-
Filtered Prediction for High Efficiency Video Coding" JULY 2014.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Approach with Operation Box for the Performance Improvement of the Welding Robot |
Country | : | India |
Authors | : | Dehadray. B || Pawar M || Pandav D || Sayyad H.S || Elza Baby |
Abstract:The robotic welding concept is beginning of the twenty first century because of to reduce the efforts of manual welding & to increase the need of high performance, high production rates, accuracy and Labor cost, automation has been adopted to the welding technology that were once the programmable logic controller (PLC) for large manufacturing plans are often familiar with their function. For small manufactures often did not want to invest in PLC hardware. Now in existing system we perform work of welding Robot with the help of operation box which is in built in robot controller unit this Robot controller can now handle many typical PLC functions, such as start-up and shut down sequence, fault diagnostics and including manual controls such operation box can used for communication from controller to Robot.
[1] Dinesh Kumar.R1, Elangovan.S2, Siva Shanmugam.N3, "Parametric Optimization Of Pulsed – Tig
Welding Process In Butt Joining Of 304l Austenitic Stainless Steel Sheets" IJRET: International Journal
of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
[2] The International Journal of Robotics Research, Analytical Expression for the Inverted Inertia Matrix of
Serial Robots, DOI:10.1177/027836499901800108 1999; 18; 116
[3] GROOVER, MIKELL P., 1939-Industrial Robotics., Ts191.8.G76 1986 629.8‟92 85-18453, ISBN 0-07-
024989-X.
[4] FU, K.S Robotics Control Sensing Vision And Intelligence Tj211.F82 1987 629.8‟92 86-7156, Isbn 0-
07-022625-3
[5] M.P.Groover, M.Weiss, R.N. Nagel and N.G.Odrey, "Industrial Robotics-Technology, Programming and
Application", McGraw Hill, 1986.]
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Rf Based Wireless Notice board |
Country | : | India |
Authors | : | P.S.Sonawane || N.V.Bhamare || S.S.Bothe || S.S.Jadhav |
Abstract:Devices commonly used to display various notices are the notice boards. This is designed to display scrolling messages for notice board. It can be used to display various latest information anywhere such as colleges, shops, railway stations and different types of places. Notice board is all about sticking different type of information. Sticking various notices day-to-day is difficult in our day- to -day life. A person is required separately to take care of this notice board.
1]. International Journal of Electrical, Electronics and Data Communication, ISSN: 2320- notice boards.
Model wireless notice board system with GSM modem.
[2]. International journal of advanced technology in engineering and science, this method can be discarded by
using wireless notice board to display.
Books:
[3]. Let Us C -Fifth Edition: Yashavant P. Kanetkar Principles of electronics: v.k.mehta
[4]. The 8051 Microcontroller and Embedded Systems Using Assembly: Muhammad Ali Mazidi
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Microcontroller Based Visible Light Spectrometer |
Country | : | India |
Authors | : | Keshav Dhikale || Abhijeet Shimpi || Rushikesh Raut || D.A.Ghogare |
Abstract: Visible spectroscopy is working based on the principle of Beer Lambert's Lam. It involves
absorbance is directly proportional to intensity of the color and thickness of the medium.
Visible Light wave length between 400nm to 800nm.
Keywords: Absorbance, Monocrometer, Spectrophotometer, Spectroscopy, Transmittance.
[1] Practical Absorption Spectrometry, Techniques in Visible and Ultraviolet Spectrometry: Volume 3,
Burgess, C.; Knowles, A., Eds.; Chapman and Hall: London, 1984.
[2] Levine, R.L.; Federici, M.M. "Quantification of aromatic Residues in proteins; model compounds for
second derivative Spectroscopy"; Biochemistry, 1982, 21, 2600–2606.
[3] Spectrophotometry and Light Scattering, United States Pharmacopoeia XXII,National Formulary,
XVII,theUnited States Pharmacopoeial Convention, Inc., Rockville, MD, 1990
[4] Maris M.A.; Brown, C.W.; Lavery, D.S. "Nonlinear Multicomponent analysis by Infrared
spectrophotometry"; Anal. Chem., 1983, 55, 1694.
[5] Practical Absorption Spectrometry, Techniques in Visible and Ultraviolet Spectrometry: Volume 3,
Burgess, C.; Knowles, A., Eds.; Chapman and Hall: London, 1984.
[6] Strong III, F.C. "Correlation of measurements of absorbance in the ultraviolet and Visible regions at
different slit widths"; Anal. Chem., 1976, 48, 2155.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improve Energy-Efficient Real-time Human Mobility State Classification Using Smartphone. |
Country | : | India |
Authors | : | Pooja D. Andhale || Chaitali R. Kakad || Madhuri P. Lokhande || Nikhil V. Kapade |
Abstract: The advantage of using the embedded accelerometer of smartphone for human mobility analysis, with or without location tracking based upon GPS, Wi-Fi is that it is energy-efficient and has high availability. Using an accelerometer for human mobility analysis has its challenges as carrying our smartphones differently as well as the measurements are body placement dependent. And it often relies on an on-demand remote data exchange for processing; which is less energy-efficient and is not real-time. We're presenting a framework based upon an algorithm that reduces the effect of different smartphone on-body placements as well as orientations and allows human movements to be accurately and energy efficiently identified. Focusing the only use of embedded smartphone accelerometer without referencing previous data and accelerometer noise filtering, this method can identify the human mobility state.
[1]. I. Constandache, S. Gaonkar, M. Sayler, R. R. Choudhury, and L. Cox,"EnLoc: Energy -efficient
localization for mobile phones," in Proc. 28th IEEE Int. Conf. Comput. Commun., 2009, pp. 2716–
2720.
[2]. L. Bao, and S. S. Intille, "Activity recognition from user-annotated acceleration data," in Proc. 2nd Int
Conf. Pervasive Comput., 2004, pp. 1–17.
[3]. A. Ofstad, E. Nicholas, R. Szcodronski, and R. R. Choudhury, "AAMPL: Accelerometer aug mented
mobile phone localization," in Proc. 1st Int. Conf. Mobile Entity Localization Tracking GPS-Less
Envir., 2008, pp. 13–18.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fingerprint Image Reconstruction from Minutiae |
Country | : | India |
Authors | : | Pranali S. Patil || Komal Samdadiya || Gauresh R. Suryawanshi || Kishor P. Lokhande || Seema A. Singh |
Abstract:For fingerprint matching the set of Minutiae is considered as the most distinct feature .
Reconstruction techniques illustrates the need for securing fingerprint templates and its interoperability, and
improving fingerprint fusion. Earlier it was considered that only minutiae set are not sufficient for
reconstructing the fingerprint .However, the recent studies have proved that through Minutiae set it is possible
to reconstruct the fingerprint. But still the matching accuracy between the original fingerprint image and its
corresponding reconstructed image has some difference.
[1] C. J. Hill, Risk of masquerade arising from the storage of biometrics, B.S. thesis, Dept. Comput. Sci.,
Austral. Nat. Univ., Canberra, ACT, Australia, 2001.
[2] A. Ross, J. Shah, and A. K. Jain, From template to image: Reconstructing fingerprints from minutiae
points, IEEE Trans. Pattern Anal.Mach. Intell., vol. 29, no. 4, pp. 544560, Apr. 2007.
[3] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, Fingerprint image recon- struction from standard
templates, IEEE Trans. Pattern Anal.Mach. Intell., vol. 29, no. 9, pp. 14891503, Sep. 2007.
[4] J. Feng and A. K. Jain, Fingerprint reconstruction: From minutiae to phase, IEEE Trans. Pattern Anal.
Mach. Intell., vol. 33, no. 2, pp. 209223, Feb. 2011.
[5] S. Li and A. C. Kot, An improved scheme for full fingerprint reconstruction, IEEE Trans. Inf. Forensics
Security, vol. 7, no. 6, pp. 19061912, Dec. 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless based DC motor speed control using Zigbee |
Country | : | India |
Authors | : | Parthsarthi || M. B. Patel || S. J. Bora || B. U. Parihar |
Abstract: Every system is automated in order to face new challenges in the present day situation. Automated systems have less manual operations, so that the flexibility, reliabilities are high and accurate. Hence every field prefers automated control systems. Especially in the field of electronics automated systems are doing better performance. Nowadays, there are lots of good-quality motor speed controls on the market. However, their costs are relatively high. A speed control with both low cost and good performance will be highly marketable, especially for small mobility applications. On the other hand, the wireless connectivity has a nature of low cost and less environmental limitations. Combining these ideas together, we came up with this paper.
[1] "Study on Zigbee technology" (ICECT) 2011 3rd international conference on (volume 6) page 296-301.
[2] .NALIN KANT MOHANTY, RANGANATH MUTHU "Microcontroller based PWM controlled motor
drive" Serbian journal of electrical engineering vol.7, No.2, November 2010 (195-204)
[3] SETHU PRIYAN, SELVARAJ.A, SURENDER.S (IJAREEIE)" wireless technology and Zigbee unit"
vol.3, Special Issue 2, April 2014.
[4] JITENDAR SINGH CAHUHAN, GYAN PRABHAKAR, SUNIL SEMWAL, ATUL KUMAR PANDEY
"wireless personal area network & speed control dc motor unit" International journal of computer science
(0975-8887) volume 69-no 23, May 2013. http://www.ti.com/product/max232.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Novel Approach for Codeword Substitution Using Encrypted H.264/AVC Video Streams for Data Hiding |
Country | : | India |
Authors | : | Nikita Ramdas Bodke || Sandip Nathu Kapse || Jayashri Shantaram Khule || Premlata Uttam Shinde |
Abstract: Digital videos are very most popular because of their frequency on their internet and to strictly preserve the size of file There are different types of techniques present for hiding secure data in videos. Digital video necessary to be stored in encrypted format. The purpose of content notation and or tampering these it is necessary to perform data hiding in these encrypted video. The data embedding in video following three parts that is H264 /AVC, video encryption, data insertion, data extraction. The working of the system have three stages, first the analyzing of H.264/AVC video the codewords of intraprediction modes, the codewords of motion vector differences, and the codewords of residual coefficients are encrypted with stream cipher. second data hider may embed additional data in the encrypted domain with codeword substitution technique, and also does not knowing the original video data.
[1] W. J. Lu, A. Varna, and M. Wu, "Secure video processing: Problems and challenges," in Proc. IEEE Int. Conf. Acoust., Speech,
Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
[2] B. Zhao, W. D. Kou, and H. Li, "Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,"
Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010.
[3] P. J. Zheng and J. W. Huang, "Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image
watermarking," inProc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
[4] W. Puech, M. Chaumont, and O. Strauss, "A reversible data hiding method for encrypted images," Proc. SPIE, vol. 6819 pp.
68191E-1–68191E-9, Jan. 2008.
[5] X. P. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process.Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Facilitating document annotation using content value and query value |
Country | : | India |
Authors | : | Vaishnavi Mhaske || Gauri Kale || Rashmi Dashpute || Ashwini Yeole |
Abstract: Document annotation is the task of adding metadata information in the document which is useful
for information extraction. In many applications domain textual data contains significant amount of structured
information which is in unstructured text. So that it is always difficult to find relevant information. This paper
proposes, an adaptive technique that facilitates the generation of structured metadata by identifying documents
containing information of interest. Such information is further useful for querying the database. This paper
proposes survey on Collaborative Adaptive Data sharing platform (CADS) for document annotation and use of
query workload to direct the annotation process. A key novelty of CADS is that it learns with time the most
important data attributes of the application, and uses this knowledge to guide the data insertion and querying.
Keywords – Annotation, CADS, Key-pair value, Metadata, Unstructured data.
[1] Eduardo J. Ruiz, Vagelis Hristidis, and Panagiotis G. Ipeirotis,"Facilitating Document Annotation Using Content and Querying
Value", IEEE TRANSACTIONS, VOL. 26, NO. 2, FEBRUARY 2014.
[2] R. Fagin, A. Lotem, and M. Naor, "Optimal aggregation algorithms for middleware," J. Comput. Syst. Sci., vol. 66, pp. 614–656,
June 2003.
[3] S.R. Jeffery, M.J. Franklin, and A.Y. Halevy, "Pay-as-You-Go User Feedback for Dataspace Systems," Proc. ACM SIGMOD Int'l
Conf. Management Data, 2008.
[4] J.M. Ponte and W.B. Croft, "A Language Modeling Approach to Information Retrieval," Proc. 21st Ann. Int'l ACM SIGIR Conf.
Research and Development in Information Retrieval (SIGIR '98), pp. 275-281,
[5] R.T. Clemen and R.L. Winkler, "Unanimity and Compromise among Probability Forecasters," Management Science, vol. 36, pp.
767-779,
[6] C.D. Manning, P. Raghavan, and H. Schu¨ tze, Introduction to Information Retrieval, first ed. Cambridge Univ.
[7] M. Franklin, A. Halevy, and D. Maier, "From Databases to Dataspaces: A New Abstraction for Information Management,"
SIGMOD Record, vol. 34, pp. 27-33,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Steganography Based on Low Power Linear Feedback Shift Register's |
Country | : | India |
Authors | : | Rehna Abdul Salam || Elza Baby |
Abstract: The linear feedback shift register is a core component in many electronics applications. A design
modeled around LFSR often has both speed and area advantages over a functionality equivalent design that
does not use LFSR's. But it is having a drawback in the area of power consumption. This is overcame in this
project by adding clock-gating and then the power efficient LFSR is applied in a steganographic circuit.
Steganography is a very relevant field now as the need to protect information is very important. Steganography
is the art and science of hiding information by embedding messages within a cover. It hides the presence of
messages and creates a covert channel.
[1] M Walter Aloisi and Rosario Mita "Gated Clock Design Of Linear Feedback Shift Registers" IEE transactions on circuits and
systems-II:Express briefs,vol.55,june 2008
[2] Saeed Mahmoudpour and Sattar Mirzakuchakki "Hardware Architecture For A Message Hiding Algorithm With Novel
Randomizers" International journal of computer applications Vol.37, no.7,january 2012.
[3] R. Jain, "The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation
and Modeling:". New York: Wiley, 1991.
[4] R. David,"Random Testing of Digital Circuits. Theory and Application."New York: Marcel Dekker, 1998[9]
[5] S. Sannella ."Security Requirements for Cryptographic Modules" U.S. Department of Commerce, National Institute of Standard
and Technology, 2001, FIPS PUB 140-2.
[6] L.Wang and E. J. McCluskey, "Circuits for pseudoexhaustive test patterngeneration," IEEE Trans. Comput.-Aided Des., vol. 7, no.
10, pp.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mobile Ad-hoc Network Using P-Encryption Scheme |
Country | : | India |
Authors | : | Shraddha R. Satpute || Archita B. Deore || Pradnya R.Nandwalkar || Sagar B.Kothale || Kavita S.Kumavat |
Abstract:As MANET edge closer toward wide-spread deployment, security issues have become a central
concern and are increasingly important. Various security mechanisms have been proposed, widely used, and
proven to be effective in wired networks, but no single mechanism provides all the services required in a
MANET. Due to certain characteristics of MANETs, some security mechanisms are not applicable to this
environment. These certain characteristics of ad hoc networks include: lack of a network infrastructure and
online administration, the dynamics of the network topology and node membership, the potential attacks from
inside the network. an important issue in Mobile Ad Hoc Networks (MANETs) is Energy saving. the energy
consumption can be reduced by network coding in MANETs by using less transmissions. However ,there are
other sources of energy consumption, e.g., data encryption/decryption. To point this issue energy saving
encryption scheme called Enhanced P-Coding is proposed for MANETs , by exploiting networking coding
technique.
[1] P. Zhang, Y. Jiang, C. Lin, Y. Fan, and X. Shen, ''P-coding: Secure Network Coding Against Eavesdropping Attacks,'' in Proc.
IEEE INFOCOM, Mar. 2010, pp. 1-9.
[2] S. Singh, C. Raghavendra, and J. Stepanek, ''Power-Aware Broadcasting in Mobile Ad Hoc Networks,'' in Proc. IEEE PIMRC,
1999, pp. 1-10.