Version-1 (Mar-Apr 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
Paper Type | : | Research Paper |
Title | : | Proxy Server FOR Intranet Security |
Country | : | INDIA |
Authors | : | Dr.Premchand.B.Ambhore || Ku.A.D.Wankhade |
: | 10.9790/0661-2002010114 |
Abstract: Taking into consideration, the situations and the security policies of organization, we have decided to implement the hybrid Application Layer Firewall (Proxy Server).we need for firewall and network security is very important with a rapid expansion of the Internet, and more and more use of computer networks throughout the world. Firewalls protect the computer systems connected to the private network or local network against attacks from the Internet. Firewalls are considered to be one of the best and most reliable means of network protection against intruders. Most of the today's firewalls are categorized as router-based, circuit-level, and application level. The goal of this project is to implement the application firewall as the application firewalls provides more security flexibility, scalability and maintainability, which is favorable for corporate security environment. We have decided...........
[1] DOUGLAS E. COMER, DAVID L STEVENS "INTERNETWORKING WITH TCP/IP" VOL. III, PEARSON EDUCATION, 2001
[2] W. Richard Stevens "Unix Network Programming", Prentice-Hall Inc., 2000
[3] Chapman D. Brent and Zwicky Elizabeth D., "Building Internet Firewalls", O'Reilly & Associates, Inc., 1995
[4] Matthew Strebe, Charles Perkins "Firewalls, 24 Seven" 2nd Edition, BPB Publications, 2003
[5] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, "Hypertext Transfer Protocol -- HTTP/1.1" RFC 2616, June 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Label Free Fruit and Pulses Image Retrieval |
Country | : | INDIA |
Authors | : | M. Naga Chandana || K. Divya Rani || S.M. Vineela || M. Sai Triveka |
: | 10.9790/0661-2002011523 |
Abstract: International competition of agricultural products is increasing fierce with the deepening of economic globalization .This rises the need for an automatic food understanding from images which is an interesting challenge for computer vision experts. In this project, we address the study of fruit and pulses image processing from the perspective of computer vision. The proposed local smart grid motif XoR pattern (LSMXoRP) exploits the relation between center pixel with its neighbors using 1×3 grid structure to extract local information structure. Further, it considers relation among neighboring pixels by using a clockwise scan unlike LBP which exploits the relation between center pixel and neighbor pixels only for better feature extraction. The experimental results indicate that performance of proposed LSMXoRP surpasses the existing LBP and LTP methods in terms of recognition rate..
Keywords: Automatic food understanding, Clockwise scan, LBP, Local smart grid motif XoR pattern, Recognition rate..
[1] L. Liu, J.-X. Li, Integrating color into the local features based on the stable color invariant regions for image retrieval, Optik 124 (2013) 2577–2582.
[2] y. Rui, T.S. Huang, Image retrieval, current techniques, promising directions and open issues, J. Vis.Commun. Image Represent. 10 (1999) 39–62.
[3] Y. Liu, D. Zhang, G. Lu, W.-Y. Ma, A survey of content-based image retrieval with high-level semantics, Int. J. Pattern Recognit. 40 (2007) 262–282.
[4] A. W. M. Smeulders, M. Worring, S. Santini, A.Gupta, R.Jain, Content-based image retrieval at the end of the early years, IEEE Trans. Pattern Anal. Mach. Intell. 22 (2000) 1349–1380.
[5] Ojala, T., Matti, P., & Harwood, D. (1996). A comparative study of texture measures with classification based on feature distributions. Pattern Recognition, 29(1),51–59..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The Internet of things is a new concept in the world of technology and communications, where each entity has the ability to send data through communication networks. The modern world of telecommunications technology has shown that in the business world, those who have access to more data and information will control the future. The Internet technology of objects has also been developed due to the same concept.Considering the ever-increasing number of sensors and smart appliances and their connection to the Internet, wewill need standard protocols for the Web that are suitable for limited devices with Internet connectivity. In this regard, it is felt more and more necessary to use a practical and lightweight protocol because of the limitations of the above. The main objective of this article is to evaluate the IOT protocols to provide an efficient protocol for using in constrained nodes.
Keywords: IOT, M2M, HTTP, CoAP
[1] "Overview of the intetnet of things ", ITU, 12 06 2012 ..Available: http://www.itu.int/ITU-T/recommendations/rec.aspx?rec=y.2060.
[2] A. Jara, l. Ladid و A. Skarmeta" ,The internet of everything through IPv6: An analysis of challenges, solutions and opportunities ",.
JoWUA % , 1 از % 24,2013 , s.101,s.103-104,s.111, 2013.
[3] C. Bormann, M. Ersue و A. Keranen" ,RFC 7228- Terminology for constrained-node networks ", 2014 .
[4] Techopedia" ,Lightweight Protocol .",Available: https://www.techopedia.com/definition/8060/lightweight-protocol.
[5] "HTTP Tutorial .",Available: http://www.tutorialspoint.com/http/http_overview.htm..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Overview of Virtual Reality |
Country | : | Saudi Arabia |
Authors | : | Dr. AdilJamilZaru || Dr. Mohammad Alamgeer |
: | 10.9790/0661-2002013035 |
Abstract: In today's world we are surrounded by a wonderful array of technologies. We have assimilated many of these technologies into our everyday lives. Increasingly, these different technologies are becoming integrated to provide new capabilities and services. And most frequently a computer is the heart of this integration. This is the case with Virtual Reality - a so-called technology which actually is a very sophisticated integration of a number of technologies.Virtual Reality (VR), sometimes called Virtual Environments (VE) has drawn much attention in the last few years. Extensive media coverage causes this interest to grow rapidly. Very few people, however, really know what VR is, what its basic principles and its open problems are. In this paper aoverview of virtual reality is presented, basic terminology and classes of VR systems are listed, followed by applications of this technology in science, work, and entertainment........
[1]. M. Akamatsu et al.: Multimodal Mouse: A Mouse-Type Device with Tactile andForce Display. Presence, Vol. 3, No. 1, pp. 73-80 (1994)
[2]. R. L. Anderson: A Real Experiment in Virtual Environments: A Virtual BattingCage. Presence, Vol. 2, No. 1, pp. 16-33 (1993)
[3]. Ascension: Ascension trackers technical data. http://www.world.std.com/~ascen
[4]. Ascension: Ascension trackers technical data.ftp://ftp.std.com/ftp/vendors/Ascension/tecpaper.ps (1995)
[5]. P. Astheimer: Acoustic Simulation for Visualization and Virtual Reality.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In present industry, communication is the key element to progress. Passing on information, to the right person, and in the right manner is very important, not just on a corporate level, but also on a personal level. The world is moving towards digitization, so are the means of communication. Phone calls, emails, text messages etc. have become an integral part of message conveyance in this tech-savvy world. In order to serve the purpose of effective communication between two parties without hindrances, many applications have come to picture, which acts as a mediator and help in effectively carrying messages in form of text, or speech signals over miles of networks. Most of these applications find the use of functions such as articulatory and acoustic-based speech recognition, conversion from speech signals to text, and from text to synthetic speech signals, language translation amongst various others. In this review paper, we'll be observing different techniques and algorithms that are applied to achieve the mentioned functionalities
Keywords: Speech to Text, Text to speech, Speech recognition, communication, Machine translation
[1]. Suman K. Saksamudre, P.P. Shrishrimal, R.R. Deshmukh, A Review on Different Approaches for Speech Recognition System, International Journal of Computer Applications (0975 8887) Volume 115 No. 22, April 2015.
[2]. Pratik K. Kurzekar, Ratnadeep R. Deshmukh, Vishal B. Waghmare, Pukhraj P. Shrishrimal, A Comparative Study of Feature Extraction Techniques for Speech Recognition System, International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 12, December 2014.
[3]. Ms. Anuja Jadhav, Prof. Arvind Patil, Real Time Speech to Text Con- verter for Mobile Users, National Conference on Innovative Paradigms in Engineering Technology (NCIPET-2012) Proceedings published by International Journal of Computer Applications (IJCA)
[4]. Sunanda Mendiratta, Dr. Neelam Turk, Dr. Dipali Bansal, Speech Recognition by Cuckoo Search Optimization based Artificial Neural Network Classifier, 2015 International Conference on Soft Computing Techniques and Implementations- (ICSCTI) Department of ECE, FET, MRIU, Faridabad, India, Oct 8-10, 2015.
[5]. Suhas R. Mache, Manasi R. Baheti, C. Namrata Mahender, Review on Text-To-Speech Synthesizer, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 8, August 2015.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Three-dimensional models are commonly used to describe the display requirements of 3D virtual objects in complex scenes. For the triangular grid model of complex objects, its huge amount of data to the storage, transmission and rendering, etc. has brought great difficulties. On the basis of summarizing the existing algorithms, this paper presents a general triangular simplification algorithm for polygon regions. The algorithm is applied to the triangular plane on a plane, and the two vertices are formed by using the coordinates of the known triangular plane in the space to form the data record, compare and delete the same coordinate record, and use the remaining data to record the polygon. The triangulation of the polygon is re-divided, and a new simplified model is formed to improve the performance of the algorithm effectively. The experimental results show that the algorithm is effective and feasible by using the triangulation model, indicating that the algorithm is practical and effective.
Keywords: Three - dimensional model; Triangle; Model optimization; Polygon division algorithm; Data record
[1] Peng Yanjun, Shi Jiaoying. based on the shear-warp splatting algorithm of boundary body element. Computer engineering and application, 2002, 38 (13) : 13-16.
[2] Shi Guigang,Chen Xiaojun.The research and implementation of 3d modeling of virtual campus in cyberspace [J]. Journal of engineering, 2008 (2) : 83-88.
[3] Duckham M,Kulik L,Galton A.Efficient generation of simple polygons for characterizing the shape of a set of point in the plane,Pattern Recognit.2008,41(10):3224-3236.
[4] zhou Peide.computational geometry [M]. Beijing: tsinghua university press, 2000:32-40.
[5] Dai Rong,Xie Tiebang,Chang Suping.Vertical scanning white light interference in three-dimensional surface topography measurement system [J]. Optics, 2006, 32 (4) : 545-547..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Green Information and Communication Technology (ICT) is the study and practice of using computing resources efficiently to achieve economic viability and improved system performance and use while abiding by ethical and social responsibilities. Green ICT frameworks are useful in measuring and evaluating different organizations' Green ICT efforts. Some frameworks make it easier to interpret and measure green ICT than others, while some do not offer guidance on which metrics to use. Features of Green ICT frameworks have not been studied and documented adequately. Furthermore, existing green ICT frameworks are all static, and have one major limitation, that is the inability to address and integrate external factors in evaluating the implementation of Green ICT. Innovations, market trends, and regulatory bodies represent external factors. The purpose of this study is to interrogate...........
Keywords: ICT, Green ICT, Innovation, Market Trends and Regulatory Bodies
[1]. Bordens, K. S., & Abbott, B. B. (2011). Research Design and Methods A Process Approach. New York: McGraw-Hill.
[2]. Council of European Professional Informatics Societies (CEPIS). (2012). Energy Efficient Enterprise in Europe Green ICT Awareness in Organisations. Retrieved Augast 23, 2013, from http://cepis.org: http://cepis.org/media/GreenICTSurveyReport_v1.20131.pdf
[3]. Curtis, D., & Lingarchani, A. (2011). Green ICT System Architecture Frameworks. In B. Unhelkar, Handbook of Research on Green ICT: Technology, Business and Social Perspectives (pp. 446-457). New York: IGI Global.
[4]. Dawson, C. (2009). Introduction to Research Methods. Oxford : How To Content.
[5]. Denscombe, M. (2007). The Good Research Guide for small-scale social research projects. Berkshire: Open University Press.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A processor is an electronic circuit which helps us to gain our desired output based on given instructions by performing some arithmetic, logical operations and it also controls the input and output operations. The performance of a system depends on the throughput of the cpu. Scheduling algorithms are the conditions which are imposed on cpu in order to use it in an efficient manner. In SSAM mainly focused on reducing the AWT and context switches by combining the concepts of FCFS, SJF and RR and multi-level queue scheduling...
Keywords:AWT-Average waiting time, ATAT-Average turnaround time, SSAM-Synergy of scheduling algorithms using multiple queues
[1]. Silberschatz, A., Peterson, J. L., and Galvin, P.B.Operating System Concepts, Addison Wesley, 7th Edition, 2006.
[2]. Andrew S. Tanenbaum , and Albert S. Woodfhull , Operating Systems Design and Implementation, Second Edition,2005
[3]. William Stallings, Operating Systems Internal and Design Principles, 5th Edition ,2006
[4]. Alban Karapici ,Enri Feka ,Igli Tafa ,Alban Allkoçi : "The simulation of round robin and priority scheduling algorithm"-07113570
[5]. Neeraj Kumar Rajput ,Ashwani Kumar :"A Task set Based Adaptive Round-robin scheduling algorithm for improving performance"-07155018.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper draws out the plan designs as per the different administrations associated with web banking. The Pattern arranged Software Architecture involves the example which kills the trouble of reusability in a specific setting. The examples are to be planned utilizing BPM (Business process Model) for compelling cross cutting on process level. For carrying out the above said BPM, we have taken the Internet banking to execute the example into it. The Analysis and distinguishing proof of different cycles in Internet Banking have been done, for recognizing the powerful cross cutting highlights. With this the example has been planned, as the reusability part to be utilized by the Software Architect. They assist us with settling repeating issues valuably and in view of demonstrated arrangements. They support us in understanding the design of a given programming framework. When the model is finished, we observed one to be more example Account.
Keywords: Abstract Factory Pattern, Software Architecture pattern, Business Process Model crosscutting
[1]. Patterns for E-commerce applications Gustavo Rossi *, Fernando Lyardet *, Daniel Schwabe 2001.
[2]. Identifying, Assigning, and Quantifying Crosscutting Concerns , Marc Eaddy, Alfred Aho Department of Computer Science.2006
[3]. Mining browsing and purchasing behaviors of web users. Yue-shi lee, show-jane yen, chia-1llji wang. 2010 IEEE.
[4]. Patterns for Internet shops,Eduardo B. Fernandez, Yi Liu, and RouYi Pan,Dept. of Computer Science and Engineering.2001
[5]. Towards process patterns for a component retrieval system integrating the user profile hassania ouchetto, ounsa roudies.2009 IEEE.