Version-1 (May-June 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8 Ver-9
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Gender, academics, Internet usage, Search engines, university teaching. users.
[2] M. Tsvere, S. Swamy, and L.T. Nyaruwata, Perceived competencies of university academics in the use of information and communication technology in university academic business, International Journal of Science and Research, 2(8), 2013, 284-289.
[3] E. Schmidt, and J. Cohen, The new digital age: reshaping the future of people, nations and business (London: John Murray, 2013).
[4] A. Gurumurthy, Gender and ICTs: an overview report (Institute of Development Studies: Bridge, 2004).
[5] S. Downes, The role of educator in a PLE world, Stephen's Web, 2010, http://www.downes.ca/post/54321.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: LAN, GSM, GPRS, Remote Monitoring & Control, Desktop.
[2]. Amol Poman , Mahesh Gundras, Prashant Pujari Department Of Computer Engineering GHRCEM, University of Pune," GSM Based LAN Monitoring System", Amol Poman et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012 ,3848-3851.
[3]. Mamata Bhamare, Tejashree Malshikare, Renuka Salunke, Priyanka Waghmare Department of computer engineering, MIT pune-411038, India, "GSM Based LAN Monitoring and Controlling ", International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.2, Mar-Apr 2012 pp-387-389
[4]. A. R. Al-Ali, Imran A. Zualkernan, Assia Lasfer, Alaa Chreide, and Hadel Abu Ouda," GRPS-Based Distributed Home-Monitoring Using Internet-Based Geographical Information System" , IEEE Transactions on Consumer Electronics,vol.57 ,no 4,November 2011.
[5]. Wente Zeng, Student Member, IEEE, and Mo-Yuen Chow, Fellow, IEEE," Optimal Trade-off Between Performance and Security in Networked Control Systems Based on Co evolutionary Algorithms ", IEEE transactions on industrial electronics, vol. 59, no. 7, July 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mutual Trust to Provide Data Security in Cloud Environment |
Country | : | India |
Authors | : | Srinivas Kolli , Ch.Sravan Kumar , Dr P.Chenna Reddy, |
: | 10.9790/0661-16311618 |
Index Terms: Cloud Computing, Trust ability.
[2]. 104th United States Congress, "Health Insurance Portability and Accountability Act of 1996 (HIPAA)," Online at http://aspe. hhs.gov/admnsimp/pl104191.htm, 1996.
[3]. R. ıdane, "Remote integrity checking," in 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), S. J. L. Strous, Ed., 2003, pp. 1–11..
[4]. B. e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," IEEE Trans. on Knowl. and Data Eng., vol. 20, no. 8, 2008..
[5]. M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," Cryptology ePrint Archive, Report 2008/186, 2008..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A short time agone, social spam and on-line abuse were much non-existent. As email spam filters became simpler, catching over ninety fifth of those messages, spammers have moved to a replacement target – the social net. Over ninetieth of social network users have knowledgeable about social spam in some kind.Those doing the "spamming" is automatic spam-bots, fault accounts, or real individuals.. during this paper we have a tendency to investigate strategies for exploiting such community feedback to mechanically determine prime quality content. As a action at law, we have a tendency to specialise in Yahoo! Answers, an oversized community question/answering portal that\'s significantly made within the quantity and kinds of content and social interactions accessible in it. we have a custom to introduce a general classification framework for merging the proof from totally differential sources of knowledge, which will be tuned automatically for a given social media sort and quality definition. above all, for the community question/answering domain, we have a custom to show that our system is in a position to separate high-quality things from the remainder with accuracy near that of humans
Keywords: social net ,spamming ,fault accounts, social media, passwords ,intruders attacks.
[2]. D. A. Shamma, L. Kennedy, and E. Churchill. Statler: Summarizing media through short-message services. In Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work (CSCW '10), 2010.
[3]. M. Naaman, H. Becker, and L. Gravano. Hip and trendy: Characterizing emerging trends on Twitter. Journal of the American Society for Information Science and Technology,62(5):902{918, 2011.
[4]. L. Liu, L. Sun, Y. Rui, Y. Shi, and S. Yang. Web video topic discovery and tracking via bipartite graph reinforcement model. In Proceedings of the 17th International World Wide Web Conference (WWW '08), 2008.
[5]. H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In Proceedings of the19thInternational World Wide Web Conference (WWW '10), 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless Controlling Of Remote Electrical Device Using Android Smartphone |
Country | : | India |
Authors | : | Omar Abdulraheem Mahdi. Bhavya Alankar |
: | 10.9790/0661-16312327 |
Keywords: Smartphone, LED, GPRS, GSM, Arduino.
[2] Vini Madan , S.R.N. Reddy, "GSM-Bluetooth based Remote Monitoring and Control System with automatic Light Controller", International Journal of Computer applications ,46(1), 2012, 20-28.
[3] G. Aranguren, L. Nozal, A. Blazquez, and J. Arias, "Remote control of Sensors and actuators by GSM", IEEE 2002 28th Annual Conference of The Industrial Electronics Society IECON 02, vol. 3, 2002, pp.2306 - 2310.
[4] Arnaud Henry-Labordere, Virtual Roaming Systems for GSM, GPRS and UMTS (John Wiley & Sons Ltd, 2009).
[5] John Boxall, Arduino Workshop: A Hands-On Introduction With 65 Projects (Copy Right Materiel, 2013).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | RFID based protection to newborns in the hospitals |
Country | : | India |
Authors | : | Ahmed Qasim Abd Alhasan . Syed Imtiyaz Hassan |
: | 10.9790/0661-16312832 |
Keywords: RFID, Hospital management, Cradle Swapping, Cradle kidnapping.
[2] Klaus Finkenzeller.(2010), RFID Handbook, Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, 3rd Edition .
[3] Shrikant Tiwari, Aruni Singh and Sanjay Kumar Singh,( 2013), Multimodal Database of Newborns for Biometric Recognition, International Journal of Bio-Science and Bio-Technology, Vol. 5, No. 2, April, 2013.
[4] J. E. Gray, G. Suresh, R. Ursprung, W. H. Edwards, J. Nickerson and P. H.Shinno, (2006), Patient Misidentification in the neonatal intensive care unit: Quantification of risk, Pediatrics, vol. 11, pp. 46–e47.
[5] A. K. Jain, A. Ross and S. Prabhakar, (2004), An introduction to biometric recognition, IEEE Trans. Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4–20.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Driving Simulator |
Country | : | India |
Authors | : | Ambar Yadav. Arti Singh |
: | 10.9790/0661-16313338 |
Abstract: Simulators which are developed by suppliers individually for specific application purpose are known as Driving Simulator. Most of the conventional driving simulators provide some flexibility for constructing new test scenarios, but do not allow users to change system arrangement. Driving simulator structure are rather complex but it provide user friendly environment. This paper describes the concept and main idea of about driving simulator. Some common DS like CAR SIM and Truck SIM and their Mathematical models. What about Virtual Environment in DS and finally the advantages and disadvantages of DS.
Keywords: CAR SIM, TRUCKSIM, DS, Advance driving assistance system
[2] Moore, G. E. (1965).Cramming more components onto integrated circuits. Electron 38, 114-117.
[3] Generating dynamic scenarios in a driving simulator. IEEE Intelligent Systems 21, 28-32.
[4] Godley, S. T., Triggs, T.J., Fildes, B.N. (2002). Driving simulator validation for speed research. Accident Analysis and Prevention 34, 589-600.
[5] Roskam, A.J., Brookhuis, K.A., De Waard, D., Carsten, O.M.J., Read, L., Jamson, S., … Victor, T. (2002). HASTE Deliverable 1: Development of experimental protocol. Retrieved from <http://ec.europa.eu/transport/roadsafety_library/publications/haste_deliverable_1_v1_1.pdf>
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Image Encryption, Channel coding, chaotic theory..
[2] Varsha S. Nemade, R. B.Wagh "Review of different image encryption techniques" National Conference on Emerging Trends in Computer Technology (NCETCT-2012).
[3] Mrinal K. Manual, GourabD. Banik, DebasishChattopadhyay and DebashisNandi"An Image Encryption Process based on Chaotic Logistic Map " IETE Technical Review Vol 29 ISSUE 5 - SEP- OCT 2012.
[4] Yaobin Mao and Guanrong Chen" Chaos-Based Image Encryption"
[5] Shubo Liu, Jing Sun, ZhengquanXu"An Improved Image Encryption Algorithm Based on Chaotic System" 1100 Journal Of Computer, VOL. 4, NO. 11, November 2009.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Load rebalance, Distributed file system, clouds, Hash table, Algorithms.
[2]. L. M. Ni, C.-W. Xu, and T. B. Gendreau, "A Distributed Drafting Algorithm for Load Balancing," IEEETrans.SoftwareEng., vol. 11, no. 10, pp. 1153–1161, Oct. 1985.
[3]. S. Ghemawat, H. Gobioff, and S.-T. Leung, "The Google File System," in Proc.19thACMSymp.OperatingSystemsPrinciples(SOSP'03), Oct. 2003, pp. 29–43.
[4]. Hadoop Distributed File System, http://hadoop.apache.org/hdfs/.
[5]. G. Copeland, W. Alexander, E. Boughter, and T. Keller, "Data Placement in Bubba," in Proc.ACMSIGMOD'88, June 1988, pp. 99–108.
- Citation
- Abstract
- Reference
- Full PDF
Index terms: Application analysis, Application prediction, Distributed system, Time series ,Time series analysis.
[2] R. M. Rahman,, K. Barker and R. Alhajj, "APredictiveTechniqueforReplicaSelectioninGridEnvironment",Proc. IEEE Seventh Int'l Symp. Cluster Computing and Grid, pp. 163-170, May 2007.
[3] A.L. Chervenak, R. Schuler, M. Ripeanu, M.A. Amer, S. Bharathi, I. Foster, A. Iamnitchi, and C. Kesselman, "The Globus Replica Location Service: Design and Experience," IEEE Trans. Parallel Distributed Systems, vol. 20, no. 9, pp. 1260-1272, Sept. 2009.
[4] H.H.E. AL-Mistarihi and C.H. Yong, "On Fairness, Optimizing Replica Selection in Data Grids," IEEE Trans. Parallel Distributed Systems, vol. 20, no. 8, pp. 1102-1111, Aug. 2009.
[5] M. Devarakonda and R. Iyer, "Predictability of Process Resource Usage: A Measurement- Based Study on Unix," IEEE Trans. Software Eng., vol. 15, no. 2, pp. 1579-1586, http://dx.doi.org/ 10.1109/32.58769, Dec. 1989.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Image editor, gesture recognition, MATLAB, iRobot Create.
[2]. Liming Wang, Jianbosh Shi, Gang Song, I-fan Shen, "Object Detection Combining recognition and Segmentation", Fudan University, Shanghai, PRC, 200433.
[3]. R. Fisher , K Dawson-Howe, A. Fitzgibbon, C.Robertson, E. Trucco, John Wiley, "Dictionary of Computer Vision and Image Processing", 2005.
[4]. H.D. Cheng and X.J. Shi, "A simple and effective histogram equalization approach to image enhancement", Digital Signal Processing 14 (2004) 158–170.
[5]. T. Alan Keahey, Edward L.Robertson, "Techniques for non linear magnification transformations", Department of Computer Science, Indiana University
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Overview of Spectrum Sensing and its Techniques |
Country | : | India |
Authors | : | Munpreet Kaur Raina. Gagangeet Singh Aujla |
: | 10.9790/0661-16316473 |
Index Terms: Cognitive radio, Primary user, Secondary user, Spectrum sensing, Signal processing
techniques..
International Workshop on, pp. 3 –10, 1999.
[2]. Ekram Hossain, Dusit Niyato Zhu Han, "Dynamic Spectrum Access and Management in Cognitive Radio Networks", Cambridge
University Press, 2009.
[3]. Tevfik Yucek and Huseyin Arslan (2009), "A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications", IEEE
Communication Surveys & Tutorials, Vol.11, No.1, First Quarter 2009, pp 116-130.
[4]. Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran and Shantidev Mohanty, "A Survey on Spectrum Management in Cognitive
Radio Networks", Georgia Institute of Technology, pp. 1-2.
[5]. Y. Yuan, P. Bahl, R. Chandra, P. A. Chou, J. I. Ferrell, T. Moscibroda, S. Narlanka, and Y. Wu, "Cognitive Radio Networks Over
White Spaces", in Proc. IEEE Int. Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2007, Dublin, Ireland, pp
416-427.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review on Speckle Noise Reduction Techniques |
Country | : | India |
Authors | : | Er. Kritika Bansal. Er. Akwinder kaur |
: | 10.9790/0661-16317477 |
Keywords: Speckle Noise, Ultrasound images, Multiplicative noise.
[2] O.V. Michailovich, A. Tannenbaum, "Despeckling of medical ultrasound images", IEEE Transactions on Ultrasonic's, Ferroelectrics and Frequency Control, pp. 64-78, Jan. 2006.
[3] D.H.H. Santosh, V. N. L. Kumar, D. R. Ramesh, P. S. Prasad, "Efficient Techniques for Denoising of Speckle and Highly Corrupted Impulse Noise Images", IEEE Transactions on Electronics and Computer Technology (ICECT), Vol.3, pp 253-257, 2011.
[4] R. Ahirwar and A. Choubey, "A Novel Wavelet-based Denoising Method of SAR Image Using Interscale Dependency", 2011 International Conference on Computational Intelligence and Communication Systems, Gwalior, India, Oct. 2011.
[5] Inderjeet Singh, Er.Lal Chand "Speckle Noise Reduction based on Discrete Wavelet Transform" International Journal of Computer Trends and Technology IJCTT 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Low selectivity problem using the concept of sampling |
Country | : | India |
Authors | : | Mr. Y. P. Murumakar. Prof. Y.B.Gurav |
: | 10.9790/0661-16317882 |
Index Terms: Protecting privacy; secure communication; online social networking
Evaluation, vol. 63, n o . 3, pp. 241-263, 2006.
[2]. D. Gillman, "A Chernoff Bound for Random Walks on Expander Graphs," SIAM J. Computing, vol. 27, no. 4,pp. 1203-1220, 1998.
[3]. G. Das, N. Koudas, M. Papagelis, and S.Puttaswamy, "Efficient Sampling of Information in Social Networks," Proc. ACM
Workshop Search in Social Media (SSM), 2008.
[4]. L. Katzir, E. Liberty, and O. Somekh,"Estimating Sizes of Social Networks via Biased Sampling," Proc. 20th Int'l Conf. World
Wide Web (WWW), 2011.
[5]. M. Ajtai, J. Komlos, and E. Szemeredi "Deterministic Simulation inLogspace," Proc. 19th Ann. ACM Symp. Theory of Computing
(STOC), 1987.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Association rule mining, rule hiding with minimum side effects, ISL, DSR.
[2] S.L.Wang and A. Jafari. "Hiding informative association rule sets". Expert Systems with Applications 33 (2007) 316-323
[3] Y Saygin, V. S. Verykios, and A. K. Elmagarmid. "Privacy preserving association rule mining". In Proceedings of the 2002 International Workshop on Research Issues in Data Engineering: Engineering Ecommerce E-Business Systems (RIDE 2002).
[4] V.S.Verykios, A.K. Elmagarmid, E.Bertino,Y. Saygin and E. Dasseni, "Association Rule Hiding", Jan 7, 2003.
[5] J.Han, M. Camber, "Data Mining Concepts and Techinques", Morgan Kaufmann Publishers, 2001.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Overview of Localization for Wireless Sensor Networks |
Country | : | India |
Authors | : | Vadivukkarasi. K . R. Kumar |
: | 10.9790/0661-16319199 |
Keywords: Wireless sensor networks, localization, anchor, multi hop, range free and range based.
[2]. R. Burne, et. al, "A Self-Organizing, Cooperative UGS Network for Target Tracking," in the Proceedings of the SHE Conferenc Unattended Ground Sensor Technologies mid Applications II, Orlando Florida, April 2000.
[3]. N. Bulusu, J. Heidemann, and D. Estrin, "GPS-less Low-cost Outdoor Localization for Very Small Devices," ZEEE Personal Corizmruiicatiuns, 7(5):2&34, October 2000.
[4]. S. Capkun, M. Hamdi, and J.-P. Hubaux, "GPS-free Positioning in Mobile Adhoc Networks," in Hawaii International Conference on System Sciences (HICSS-34), pages 3481-3490, Maui, Hawaii, January 2001.
[5]. L. Doherty, K. Pister, and L. El Ghaoui, "Convex Position Estimation in Wireless Sensor Networks," in the Proceedings of lEEE Conference on Computer communication (iNFOCOM), Anchorage, Alaska, April 2001,
- Citation
- Abstract
- Reference
- Full PDF
Keyword: Semantic Web, Ontology, Pulverization and amalgamation.
[2] Martin Hitz, Behzad Montazeri ―Measuring Coupling and Cohesion in Object-Oriented Systems‖.
[3] Timothy A. Budd ―An Introduction to object-oriented Programming‖.
[4] Shymam R.Chidamber, Chris F.Kemerer ―Towards a metric Suite for Object-oriented Design‖.
[5] Johann Eder, Gerti Kappel, Michael Sc hrefl ―Coupling and Cohesion in Object-Oriented Systems‖.
- Citation
- Abstract
- Reference
- Full PDF
Index terms: Multimedia mining, Video data mining, Semantic content, Domain ontology, Bayesian network classifier.
[1]. L.S. Davis, S. Fejes, D. Harwood, Y. Yacoob, I. Haratoglu, and M.J. Black, "Visual Surveillance of Human Activity," Proc. Third Asian Conf. Computer Vision (ACCV), vol. 2, pp. 267-274, 1998.
[2]. M. Petkovic and W. Jonker, "Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events," Proc. IEEE Int'l Workshop Detection and Recognition of Events in Video, pp. 75-82, 2001. 60 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 1, JANUARY 2013
[3]. L.S. Davis, S. Fejes, D. Harwood, Y. Yacoob, I. Haratoglu, and M.J. Black, "Visual Surveillance of Human Activity," Proc. Third Asian Conf. Computer Vision (ACCV), vol. 2, pp. 267-274, 1998.
[4]. G.G. Medioni, I. Cohen, F. Bre´mond, S. Hongeng, and R. Nevatia, "Event Detection and Analysis from Video Streams," IEEE Trans. Pattern Analysis Machine Intelligence, vol. 23, no. 8, pp. 873-889, Aug. 2001.
[5]. S. Hongeng, R. Nevatia, and F. Bre´mond, "Video-Based Event Recognition: Activity Representation and Probabilistic Recognition Methods," Computer Vision and Image Understanding, vol. 96, no. 2, pp. 129-162, 2004
- Citation
- Abstract
- Reference
- Full PDF
Key words: Nanotechnology, Quantum Dot Cellular Automata (QCA), F-shaped XOR gate, Half-adder, Half-subtractor
[2] S. Timarchi, K. Navi, IEEE Trans. On Instrumentation and Measurement, Vol. 58 Issue: 9, PP-2959-2968 2009.
[3] W. Wang, K. Walus, G.A. Jullien, Quantum-Dot Cellular Automata Adders, Proceedings of third IEEE Conference Nanotechnology. 461–464, 2003.
[4] Sen. Wang, Li. Cai, Novel exclusive-OR gate and full adder implementation using quantum cellular automata, Solid-state phenomenon. 565–569, 2007.
[5] V. Vankamamidi, M. Ottavi, F. Lombardi, Two-dimensional schemes for clocking/timing of QCA circuits, IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems 27 (1), 34–44, 2008.