Version-3 (May-June 2016)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | IMPLEMENTATION OF WINDOW LISTING OPTIMIZATION AND KOREAN SMART SPELLER FOR IN-VEHICLE INFOTAINMENT |
Country | : | India |
Authors | : | Mrs. Sarah Iram L. Indikar || Dr. P.A. Vijaya || Mr. Shivanand Kumbar |
Abstract: The project deals with the implementation of two important features in HMI (Human Machine Interface) for MAN/SCANIA infotainment. The two feature implementations are Window Listing Optimization and Korean Smart Speller. A technique called smart speller is used while entering navigation address details, where the system speller/ keyboard displays only the next available character instead of the entire alphabet set. The available characters are displayed based on a database that is stored in the middleware of navigation. The other characters that are not available are not highlighted on the speller view;thereby it eases the effort of the user in entering characters......
Keyword: HMI, D-Bus, HFP, A2DP,VNC
[1] Vageesh Kumar, White paper, Mind Tree, "Intelligent In-Vehicle Infotainment (IVI)", 2013.
[2] www.harman.com
[3] www.google.com
[4] Technical /Functional specification Project MAN/SCANIA HMI concept 452020_SCANIA_MAN_Technical_Functional _Spec_HMI_7.1_2015-07-31.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Distributed Heterogeneous Big Data Mining Adaptation in the Cloud: a Survey |
Country | : | India |
Authors | : | Jayaraj T || Dr. S. Muruganantham |
Abstract: Big Data Mining in the Cloud is the capability of integrating and extracting useful information from large datasets or streams of data in the on demand computing environment which were not possible before due to its volume, variety, velocity, veracity and value. It includes three important fields such as Cloud, Big Data and Mining and makes Big Data's Knowledge Integration and Extraction from distributed heterogeneous Environment in the Cloud. The Cloud based Hadoop with MapReduce analyses Big Data in the Cloud. This paper presents study of related work and concepts relating to distributed heterogeneous Big Data Mining to the Cloud technology.
Keyword: Big Data, Big Data Mining, Cloud technology, Hadoop with Mapreduce, Distributed Heterogeneous Big Data.
[1]. "Analytics: Real-world use of big data in telecommunications", IBM Report, 2013.
[2]. Labrinidis, Alexandros, and H.V. Jagadish, "Challenges and opportunities with big data", Proceedings of the VLDB Endowment, Vol.5, No.12, pp.2032-2033, 2012.
[3]. Big Data Analytics, Advanced Analytics in Oracle Database, An Oracle White Paper, 2013.
[4]. Big Data Meets Big Data Analytics, www.sas.com/offices, 2012.
[5]. Shvachko, K., Kuang, H., et al, "The Hadoop distributed file system. In Mass Storage Systems and Technologies (MSST)", 2010, IEEE, pp.1-10.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancement in Decision Making with Improved Performance by Multiagent Learning Algorithms |
Country | : | India |
Authors | : | Deepak A. Vidhate || Dr. Parag Kulkarni |
Abstract: The output of the system is a sequence of actions in some applications. There is no such measure as the best action in any in-between state; an action is excellent if it is part of a good policy. A single action is not important; the policy is important that is the sequence of correct actions to reach the goal. In such a case, machine learning program should be able to assess the goodness of policies and learn from past good action sequences to be able to generate a policy.......
Keyword: Joint Rewards, Multiagent, Q Learning, Reinforcement Learning, Strategy Sharing
[1] Adnan M. Al-Khatib "Cooperative Machine Learning Method" World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol.1, No.9, 380-383, 2011.
[2] Babak Nadjar Araabi, Sahar Mastoureshgh, and Majid Nili Ahmadabadi "A Study on Expertise of Agents and Its Effects on Cooperative Q-Learning" IEEE Transactions on Evolutionary Computation, vol:14, pp:23-57, 2010
[3] Liviu Panait Sean Luke "Cooperative Multi-Agent Learning: The State of the Art", published in Journal of Autonomous Agents and Multi-Agent Systems Volume 11 Issue 3, pp. 387 – 434, 05.
[4] M.V. Nagendra Prasad & Victor R. Lesser "Learning Situation-Specific Coordination in Cooperative Multi-agent Systems" in Journal of Autonomous Agents and Multi-Agent Systems, Volume 2 Issue 2, pp. 173 – 207, 1999.
[5] Michael Kinney & Costas Tsatsoulis "Learning Communication Strategies in Multiagent Systems", in Journal of Applied Intelligence, Volume 9 Issue 1, pp 71-91, 1998.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Ab-Initio Protein Tertiary Structure Prediction Using Genetic Algorithm |
Country | : | Egypt |
Authors | : | Basem Ameen Moghram || Emad Nabil || Amr Badr |
Abstract: Proteins are vital components of all living cells and play a critical role in almost all biological processes. Protein structure identification is a significant challenging problem in computational biology. The Protein's three-dimensional (i.e., tertiary) molecular structure reflects its proper function. Therefore, the identification of protein structure is a significant step towards understanding the protein's function which is an important role to synthesize new drugs and vaccine design; since many diseases are shown to result from malfunctioning of proteins.......
Keyword: Ab-initio Protein Tertiary Structure Prediction, ECEPP Force Field, Energy Function, Genetic Algorithm, Protein Folding, PTSPGA, Vaccine Design.
[1] H.-J. Bockenhauer and D. Bongartz, Algorithmic Aspects of Bioinformatics. 2007.
[2] C. A. Floudas, "Computational methods in protein structure prediction," Biotechnology and Bioengineering, vol. 97, pp. 207–213, 2007.
[3] L. Bragg, The Development of X-Ray Analysis, 1st Editio. London, U.K: G. Bell, 1975.
[4] T. L. Blundell and L. H. Johnson, Protein Crystallography. New York: Academic Press, 1976.
[5] K. Wüthrich, NMR of Proteins and Nucleic Acids. New York: Wiley, 1986.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Pidf Auto Tuning Control System (Avr) In Power System Stability Analysis |
Country | : | Iraq |
Authors | : | Abdal-Razak Shehab |
Abstract: This work aims to develop a controller based on auto tuning 0f PIDF to simulate an automatic voltage regulator (AVR) in transient stability power system analysis. AVR is an essential part of the synchronous generator and it is responsible for regulating the reactive power and voltage level under normal operating terms at various load levels. The modeled system consisted of theamplifier, exciter, sensor and proportional-integral-derivative-Filter (PIDF) controller. Simulationof the AVR system is carri......
Keyword: Generator Excitation System, Synchronous Machine Model, Automatic Voltage Regulator (AVR), PID and PIDF Controller, Controller Design.
[1]. Anderson, P.M. and Fouad, A. A. - "Power System Control and Stability"- The Iowa State University Press, Ames, Iowa, USA, 1977.
[2]. H. Saadat "Power System Analysis", New York, McGraw-Hill, 1999.
[3]. J. Faiz , Gh.Shahgholian, M.Arezoomand, "Analysis and Simulation ofthe AVR System and Parameters Variation Effects", POWERENG 2007, April 12-14, 2007, Setubal, Portugal.
[4]. A.Visioli, "Tuning of PID controllers with fuzzy logic", IEE Proc. Control Theory Appl., Vol. 148, No. I, pp. 1-8, Jan. 2001.
[5]. T. L. Seng, M. B. Khalid, R. Yusof, "Tuning of a Neuro-Fuzzy Controller by Genetic Algorithm", IEEE Trans. on Systems, Man, and Cybernetics-Part B: Cybernetics, Vol. 29, No. 2, pp. 226-236, Ap. 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study of Hiding Sensitive Data in Data Mining Using Association Rules |
Country | : | India |
Authors | : | Amol L. Deokate || Amruta D. Pawa || Harshal S. Sangle |
Abstract: This paper describes Apriori algorithm for association rules for hiding sensitive data in data mining if Large data contain sensitive information that data must be protected from the unauthorized users. Here, we are going to hide this sensitive information in data mining using association rules, when we are going to apply rules for data that time it will falsely hidden information and fake rules falsely generated. So here, we examine confidentiality issues of a broad category of rules, which are called association rules.......
Keyword: Data mining, Association rules, mining methods and algorithms, Support, Confidence.
[1] R. Agrawal, T. Imielinski, and A. Swami, ―Mining Association Rules between Sets of Items in Large Databases,‖ Proc. ACM Conf. Management of Data, pp. 207-216, 1993.
[2] R. Agrawal, H. Mannila, R. Srikant, H. Toivonen, and A.I. Verkamo, ―Fast Discovery of Association Rules,‖Advances in Knowledge Discovery and Data Mining, chapter 12, U.M. Fayyad et al., eds., AAAI/MIT Press, pp. 307-328, 1996.
[3] R. Agrawal and R. Srikant, ―Fast Algorithms for Mining Association Rules,‖ Proc. Conf. Very Large Data Bases, pp. 487- 499, 1994.
[4] R. Agrawal and R. Srikant, ―Privacy-Preserving Data Mining,‖ Proc. ACM Conf. Management of Data, pp. 14-19, 2000.
[5] M. Atallah et al., ―Disclosure Limitation of Sensitive Rules,‖ Proc. IEEE Workshop Knowledge and Data Eng. Exchange, pp. 45-52, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Integrated Governance (i-Gov) Framework for E-governance (IFEG), using ERP in Uttarakhand |
Country | : | India |
Authors | : | Ashish B. Khare || Dr. M. K. Sharma |
Abstract: The proliferation of mobile devices and internet technologies has made web services available to a wide range of population in India. The advent of low price handheld devices and communication technologies has connected people seamlessly without considering the geographical barriers. Taking it as an advantage the government can work more effectively to reach its citizens by providing them better e-services via e-governance. However, many of the public departments had already switched to e-governance module in the state of Uttarakhand, but still there lay a hope to increase the efficiency and reach of these services.......
Keyword: E-governance, Integrated Governance (i-Gov), ERP, SWAN, IFEG
[1] Hafedh Chourabi, Sehl Mellouli, E-government: Integrated Services Framework, The Proceedings of the 12th Annual International Conference on Digital Government Research.
[2] Lam, W. Barriers to e-government integration, the journal of Enterprise Information Management (18:5), 2005, pp. 511 - 530.
[3] UN e-Government Survey 2008, "From e-Government to Connected Governance", 2008, United Nations, New York.
[4] Alexandros Dais, Mara Nikolaidou, Nancy Alexopoulou, Dimosthenis Anagnostopoulos, Electronic Government, Springer Berlin Heidelberg, "Introducing a Public Agency Networking Platform towards supporting Connected Governance", EGOV '08 Proceedings of the 7th international conference on Electronic Government, pages 375-387, Springer-Verlag Berlin, Heidelberg 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Personality Based Dispersed Provable Information Ownership in Multi Distributed Storage |
Country | : | India |
Authors | : | S Supriya || K Anusha |
Abstract: The cloud storage administration has turned into a speedier benefit development by giving its components to customer's information. Security protection and information respectability are the two principle issues confronted by single cloud administration suppliers. Henceforth dispersed cloud environment, multi cloud is utilized. In the current framework, when customer stores his information on multi-cloud servers, the disseminated storing and respectability checking are at danger. Provable information ownership is a technique for guaranteeing the respectability of information away outsourcing......
Keyword: Multi-cloud storage, Cooperative Provable Data Possession, Hash Index Hierarchy
[1]. P. Mell and T. Grance, "Draft nist working definition of cloud computing," Referenced on June. 3rd, 2009.
[2]. G. Ateniese, R. DiPietro, L. V. Mancini, G. Tsudik, "Scalable and Efficient Provable Data Possession", SecureComm 2008, 2008.
[3]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,D. Song, "Provable Data Possession at Untrusted Stores", CCS'07, pp.598-609, 2007.
[4]. C. C. Erway, A. Kupcu, C. Papamanthou, R. Tamassia, "DynamicProvable Data Possession", CCS'09, pp. 213-222, 2009.
[5]. F. Seb´e, J. Domingo-Ferrer, A. Mart´ınez-Ballest´e, Y. Deswarte, J.Quisquater, "Efficient Remote Data Integrity checking in Critical InformationInfrastructures", IEEE Transactions on Knowledge and DataEngineering, 20(8), pp. 1-6, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Improved Image Encryption-Compression System for Error Clustering and Random Permutation |
Country | : | India |
Authors | : | Chevula Rajesh || Jajula Hari Babu |
Abstract: Image encryption must be led before image pressure. In this paper we concentrate how to plan a couple of image encryption and pressure calculations such that packing encoded images can at present be proficiently performed. In this paper, we presented a profoundly proficient image encryption-then pressure (ETC) framework. The proposed image encryption plan worked in the forecast blunder area can give a sensibly abnormal state of security.......
Keyword: Encryption, Compression, Random Permutation. Image Encryption.
[1]. A. Kumar and A. Makur, ―Distributed source coding based encryption and lossless compression of gray scale and color images,‖ in Proc. MMSP, 2008, pp. 760–764.
[2]. D. Schonberg, S. C. Draper, and K. Ramchandran, ―On blind compression of encrypted correlated data approaching the source entropy rate,‖ in Proc. 43rd Annu. Allerton Conf., 2005, pp. 1–3.
[3]. Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, ―Generating private recommendations efficiently using homomorphic encryption and data packing,‖ IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1053– 1066, Jun. 2012
[4]. T. Bianchi, A. Piva, and M. Barni, ―On the implementation of the discrete Fourier transform in the encrypted domain,‖ IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86–97, Mar. 2009.
[5]. X. Zhang, ―Lossy compression and iterative recobstruction for encrypted image,‖ IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53–58 Mar. 2011
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Effect of Different Mobility Patterns on AODV and OLSR using Different TCP variants |
Country | : | India |
Authors | : | Karamjeet Kaur || Pawan Luthra |
Abstract: In this paper the effect of TCP variant (new reno, tahoe and Sack) is analyzed by using karan's and nagle theorem by moving nodes at different mobility models on OLSR and AODV protocol. In this nagle theorem is set to per-send and karan's theorem is enabled. This effect is analyzed by using GSM silence suppression and without using GSM silence suppression........
Keyword: MANET, AODV, OLSR, OPNET
[1]. Kuldeep Vats et al, "Simulation and performance Analysis of OLSR, GRP, DSR Routing Protocol using OPNET" IJETED Volume 2, Issue 2, March 2012.
[2]. T. Kunz and E. Cheng, "On-demand multicasting in ad-hoc networks: Comparing AODV and ODMRP,"pp. 453-454, 2002
[3]. C. Perkins, E. Belding-Royer, S. Das, quet,"Ad hoc On- Demand Distance Vector (AODV) Routing", RFC 3561, July 2003.
[4]. J. Haerri, F. Filali, and C. Bonnet, \Performance comparison of AODV and OLSR in VANETs urban environments under realistic
[5]. mobility patterns," pp. 14{17, 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Prevent and Isolate Black Hole Attack in Manet Using Alarm Packets |
Country | : | India |
Authors | : | Sushmita Mahajan || Sanjeev Dhiman |
Abstract: A mobile ad hoc network can be described as a wireless network which is a collection of heterogeneous mobile devices and is self-organizing, self-configuring. The security in MANET is a highly preferred research area these days because it is susceptible to various attacks like black hole attack which we are discussing in this paper. Due to black hole attack network performance degraded. In this paper we will propose new technique based upon alarm message to isolate and prevention of black hole attack........
Keyword: MANET, Black hole attack, alarm nodes, fake packets
[1]. Latha Tamilselvan and V Sankaranarayanan "Prevention of Co-operative Black Hole Attack in MANET", JOURNAL OF NETWORKS, VOL. 3, NO. 5, MAY 2008.
[2]. Mohammad Al-Shurman and Seong-Moo Yoo "Black Hole Attack in Mobile Ad Hoc Networks", ACMSE‟04, April 2-3, 2004.
[3]. Priyanka Goyal, Vinti Parmar and Rahul Rishi "MANET: Vulnerabilities, Challenges, Attacks, Application", IJCEM International Journal of Computational Engineering &Management, Vol. 11, January 2011.
[4]. Durgesh Wadbude and Vineet Richariya "An Efficient Secure AODV Routing Protocol in MANET", International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 4, April 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With Compression Based Technique |
Country | : | India |
Authors | : | Ram Krishna Singh || Bhavya Alankar |
Abstract: Cryptography, Steganography and Watermarking are three rudimentary techniques which will avail us to secure data from unauthorized access. Steganography is one of the best techniques to obnubilate message from unauthorized users. It is utilized to obnubilate data through sundry medium like audio, video, Text and image. In our research work, we fixate on text Steganography through html web pages to obnubilate data behind it. Because html pages are facilely transferable that contains secret data behind it. There are sundry methods of web pages predicated Steganography........
Keyword: Compression Ratio, Embedding Technique, Encryption, Huffman Algorithm, Steganography.
[1] Petitcolas, Fabien AP, Ross J. Anderson, and Markus G. Kuhn. "Information hiding-a survey." Proceedings of the IEEE 87.7 (1999): 1062-1078.
[2] Dhanani, Chintan. "HTML Steganography using Relative links & Multi web-page Embedment." International Journal of Engineering Development and Research. Vol. 2. No. 2 (June 2014). IJEDR, 2014.
[3] Dhawase, Dhammjyoti V., and Sachin Chavan. "WEBPAGE INFORMATION HIDING USING PAGE CONTENTS."
[4] Yang, Yujun, and Yimei Yang. "An efficient webpage information hiding method based on tag attributes." Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference on. Vol. 3. IEEE, 2010.
[5] Huang, Huajun, Shaohong Zhong, and Xingming Sun. "Steganalysis of information hidden in webpage based on higher-order statistics." Electronic Commerce and Security, 2008 International Symposium on. IEEE, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Future of Air Traffic Management Networks Using Fiber and Vsat Technologies |
Country | : | Sudan |
Authors | : | Awad Hassan Himeda || Dr. Amin Babiker A/Nabi mustafa |
Abstract: As air traffic increases, routes get more diverse and light and ultra-light aircraft are becoming most popular. The main issues regarding classic radio communications are delay , availability and reliability of network infrastructure. Thispaper addresses the questions that why a new ATC network generation based on higher speed VoIP (Voice over Internet Protocol) technology has some essential comparative advantages over VSAT link used for Applications.The main benefit of this network is toenhance availability and solving the problems of delay, packet loss and bad quality of voice and data.........
[1]. Daugherty B.; Metz C.," Multiprotocol label Switching and IP, Part1: MPLS VPNs over IP Tunnels". IEEE Internet Computing.
[2]. Singh k, mishrask, misra r, gujral rb, gupta rk misra uk ayyagari a, basnet r mohantybn, "strengthening postgraduate medical education in peripheral medical colleges through telemedicine",telemed j e health 2004;10:S 55-6.
[3]. Ghein, Luc De., 2007., MPLS Fundamentals.
[4]. http://www.networktutorials.info/isdn_lines.html accessed on 14th January 2008
[5]. http://www.wpro.who.int/internet/files/
[6]. pub/297/part4.pdf accessed on 15th January2008.