IOSR Journal of Computer Engineering (IOSR-JCE)

International conference on computing and virtualization (ICCCV-17)

Volume 2

Paper Type : Research Paper
Title : Performance Measurement of QOS Parameters of through put enhanced Wireless in Local Loop Architecture
Country : India
Authors : Pranav Panchal || Dr. Rajesh Bansode

Abstract: The number of subscribers in Wireless Networks such as Wireless in Local Loop (WiLL) is increasing thereby it becomes beneficial to use spectrum reusability techniques. To improve the capability of WiLL systems, multihop relaying is used. In the existing WiLL system, number of subscribers that can be simultaneously served is limited, with increase in subscriber density. It is to develop Throughput Enhanced Wireless in Local Loop (TWiLL) architecture that uses multi-hop relaying and shortcut relaying to reuse bandwidth of the system.In the existing WiLL system, the Throughput(30 Mbps) decreases with increase in time, Packet drop(20 kbps) increases with increase in time..........

Keywords - Multi-hop relaying, Single hop relaying, Shortcut relaying, Wireless in Local Loop

[1] V. Mythili, B. S. Manoj, and C. Siva Ram Murthy, "Performance of the Throughput Enhanced Wireless in Local Loop Architecture Using Multi-dimensional Markov Chains," April 2005.
[2] V. MythiliRanganath, B. S. Manoj, and C. Siva Ram Murthy, "On Using Multidimensional Markov Chains for Performance Evaluation of Hybrid Wireless Networks," Dec 2006.
[3] V. MythiliRanganath, B. S. Manoj, and C. Siva Ram Murthy., "A Wireless in Local Loop Architecture Utilizing Directional Multihop Relaying,"Sep 2004.
[4] Ying-Dar Lin and Yu-Ching Hsu, "Multihop Cellular: A New Architecture for Wireless Communications" March 2000.

Paper Type : Research Paper
Title : Cluster Computing Using Raspberry PI
Country : India
Authors : Anuj Shinde || Shashank Pal || Vedant Singhvi || Manish Rana

Abstract: This projectaims on creating a RaspberryPibased cluster computer whichwillbeused for data analytics.People are becoming dependent on computer and their computational power more and more every day. Increasing amount of data is coming into existence each day and power to process this data calls for cluster computer which are a set of computer that operate together, only to be viewed as a single computer, to process and compute data. In this project, we are creating a miniature model of cluster computer which are used on servers such as windows server 2003 or Beowulf cluster using Raspberry Pi which will give us an idea about the working and power of cluster computers............
Keywords: Beowulf cluster, Cluster computer, Raspberry Pi,Data analytics.

[1] High-Performance Computing: Clusters, Constellations, MPPs, and Future Directions Jack Dongarra, Thomas Sterling, Horst Simon, and Eric Strohmaier, IEEE Computing Volume 7 No. 2, March/April 2005
[2] BEOWULF: A PARALLEL WORKSTATION FOR SCIENTIFIC COMPUTATION Donald J. Becker, Thomas Sterling, Daniel Savarese, John E. Dorband, Udaya A. Ranawak, Charles V. Packer, Proceedings, International Conference on Parallel Processing, 2009
[3] " Creating a Raspberry Pi-Based Beowulf Cluster ", Joshua Kiepert, UC Berkeley Technical Report, December, 2013.
[4] CUSTOMER DATA CLUSTERING USING DATA MINING TECHNIQUE,Dr.SankarRajagopal, Second Extreme Linux Topics Workshop,Jun2005.
[5] Cluster Computing and Applications, Mark Baker,Amy Apon,RajkumarBuyya,Hai Jin, Second Extreme Linux Topics Workshop Jun, Monterey CA,2000

Paper Type : Research Paper
Title : Automated Code Generator
Country : India
Authors : Mahenaz Sayyed || NamrataNathani || Yash Chugh || Seema Kolkur

Abstract: Is it possible for a computer program to writeitsown programs? Couldhuman software developersbereplaced one day by the very computers thatthey master? The objective of thispaperis to create an Artificial Intelligence system thatis capable of generating codes for a giventargetproblemstatementspecified by the user. The system makes use of GeneticAlgorithm. It startswith the gene set of all possible instructions of the targetlanguage and absolutely no knowledge of the syntax and semantics. Firstlyitgenerates an initial population of randomsequences of the instruction set................

Keywords- Intelligence; Genetic Algorithm; Fitness function; Fitness score.

[1] R.K. Bhattacharjya/CE/IITG,'' Introduction To Genetic Algorithms''
[2] S.N.Sivanandam, S.N.Deepa "Principles of Soft Computing" Second Edition, Wiley Publication..
[3] Hyun Soo Park, kyungJoong Kim ''Automatic python programming using stack based genetic programming'',GECCO'12 Companion, July 7-11,2012, Philadelphia, PA, USA. ACM 978-1-4503-1178-6/12/07.
[4] Kevin Igwe and Nelishia Pillay, ''Automatic Programming Using Genetic Programming'', 2013 Third World Congress on Information and Communication Technologies (WICT).
[5] Stuart J. Russell and Peter Norvig, "Artificial Intelligence A Modern Approach '' Second Edition , Pearson Education.

Paper Type : Research Paper
Title : Prediction Algorithm using Lexicons and Heuristics based Sentiment Analysis
Country : India
Authors : Aakash Kamble || Darshan Vakharia || Rachit Verma || Dr. Rajesh Bansode

Abstract: Stock market prediction has been a vital requirement of the investors. Computer science plays an important role in it. Well-organized and EMH had been one of the prominent theory about stock prediction. Collapse of it had resulted in research in the area of prediction of stocks. The idea is taking non quantifiable data such as financial tweets related to a company and predicting its stock with tweets (twitter) sentiment classification. Considering the fact that twitter data have impact on stock market, this is an attempt to figure out relationship between twitter data and stock trend..............

Keywords: Stock Prediction, Sentiment Analysis, Lexicons, Heuristics, Prediction Algorithm

[1] J. Bollen and H. Mao., "Twitter mood as a stock market predictor," IEEE Computer, vol. , no. 44(10):91–94
[2] Anshul Mittal and Arpit Goel Stanford University., "Stock Prediction Using Twitter Sentiment Analysis,"
[3] Anurag Nagar, Michael Hahsler, "Using Text and Data Mining Techniques to extract Stock Market Sentiment from Live News Streams," IPCSIT vol., no. XX (2012) IACSIT Press, Singapore
[4] W.B. Yu, B.R. Lea, and B. Guruswamy, "A Theoretic Framework Integrating Text Mining and Energy Demand Forecasting," International Journal of Electronic Business Management, vol., no. 2011,5(3): 211-224,
[5] J. Bean, "R by example: Mining Twitter for consumer attitudes towards airlines," In Boston Predictive Analytics Meetup Presentation, Feb 2011

Paper Type : Research Paper
Title : Hybrid Cryptosystem Approach for secure communication
Country : India
Authors : Ruchita Patil || Veena Kulkarni

Abstract: Data security is of utmost importance in today's world. Especially when the data is travelling through an insecure communication network. Cryptography addresses the necessary elements for secure communication such as privacy, confidentiality, key exchange, authentication and non-repudiation. There are symmetric key encryption techniques which use only one key for both encryption and decryption of the data. . On the other hand, there are asymmetric key based algorithms which use a pair of keys.............

Keywords:- Encryption, Decryption, Hybrid cryptosystem

[2] Takahiro Fujia, Kiminao kogiso,Kenji Sawada and Seiichi Shin "Security Enhancements of Networked Control Systems Using RSA Public-Key Cryptosystem" IEEE 2015.
[3] M.D. Boomija, S.V. Kasmir Raja "Secure data sharing through Additive Similarity based ElGamal like Encryption" IEEE 2016.
[4] Liang Wang , Yonggui Zhang "ElGamal Algorithm for Encryption of Data Transmission" IEEE 2011.
[5] Ravi Shankar Dhakar, Prashant Sharma, Amit kumar Gupta "Modified RSA Encryption Algorithm (MREA)" IEEE 2012.

Paper Type : Research Paper
Title : Multimodal Fusion of Iris & Signature Using WLD Based Feature Extraction
Country : India
Authors : Neelam Thapa || Dr. Vinayak Bharadi

Abstract: The standard method used for authentication is password, which is known to a specific person only. Password alone does not ensure security since an intruder can easily misuse it. Hence to overcome such a scenario; passwords should be replaced with more secure form of authentication which is biometric authentication. Biometric systems fall under unimodal and multimodal categories. Unimodal biometric system has some drawbacks. A Multimodal biometric system (MBS) removes these drawbacks. The proposed system is a MBS which combines two different types of biometric modality i.e. iris (physiological) & signature (behavioral) using a suitable fusion technology...............

Keywords: FAR, FRR, Multimodal, Unimodal, WLD

[1] Anil K. Jain, Arun Ross and SalilPrabhakar, "An Introduction to Biometric Recognition," IEEE transactions on circuits and systems for video technology, vol. 14, no.1, January 2004.
[2] Almas M. N. Siddiqui, RupaliTelgad and Prapti D. Deshmukh, "Multimodal Biometric Systems: Study to Improve Accuracy and Performance," International Journal of Current Engineering and Technology,2014.
[3] Jie Chen, Member, IEEE, Shiguang Shan, Member, IEEE, Chu He, Guoying Zhao,Matti Pietikäinen, Senior Member, IEEE, Xilin Chen, Senior Member, IEEE, Wen Gao, Fellow, IEEE, "WLD: A Robust Local Image Descriptor," IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2009, TPAMI-2008-09-0620
[4] Joel Philip and Dr. Vinayak A. Bharadi, "Signature Verification SaaS Implementation on Microsoft Azure," Procedia Computer Science 79 ( 2016 ) 410 – 418

Paper Type : Research Paper
Title : Spiritual Care Visual Data Analytics for Patient Healing
Country : India
Authors : Ronak Shah || Ritesh Mishra || PrashantRaina || VikasKaul || Ranganathan Balsubramaniam || Dr.S.K.Narayankhedkar || VaishaliKamat

Abstract: Data Analytics is a complicated subject, historically only tackled by well-trained and experienced experts.However as more and more data is being generated and technology is also changing at a very fast rate organizations are looking for data analysts to derive the trends and patterns required for taking decisions for the benefit of organization. For the same purpose we are using a business intelligence tool QLIKVIEW as a front end for displaying the DASHBOARDS.We are getting data from SQL SERVER 2008 through stored procedure. The job for the stored procedure is scheduled on the daily basis and is fetched to the QLIKVIEW MANAGEMENT CONSOLE.............


[1] V.Kavitha, and S.Kannudurai (IJRTE),Health Care AnalyticswithHadoop big data Processing.Kalasalingam Institute of Technology, 2015
[3] PriyankaKetal (IJCSIT), A Survey on Big Data Analytics in Health Care. Hubli: B.V.B.C.ET, 2014.
[4] Qlikview Industry Solution White Paper,Enabling the Information-Driven Healthcare Provider, 2015.

Paper Type : Research Paper
Title : A Classification Framework for Scheduling Algorithms in Wireless Mesh Networks
Country : India
Authors : Mayuri Panchal || Dr. Rajesh Bansode

Abstract: Scheduling MAC-layer transmissions in multi-hop wireless networks is an active area of research. An overview of link scheduling algorithms in Spatial Time Division Access (STDMA) Wireless Mesh Networks is provided. There are several interesting algorithms proposed in the literature in the problem space of scheduling for multi-hop wireless networks, specifically for WiMAX mesh networks, long distance multi-hop Wi-Fi networks, and Vehicular Ad-hoc Networks (VANETs).................

Keywords - Multimedia Access Control, Mobile Adhoc Network, Vehicular Ad-hoc Networks, Wireless Fidelity, Wireless Mesh Network

[1] A. Gore and A. Karandikar, "Link scheduling algorithms for wireless mesh networks," IEEE Communications Society, vol. 13, no. 2, pp. 258-273, Mar. 2010.
[2] D. Chafekar, V. Anilkumar, M. Marathe, S. Parthasarathy and A. Srinivasan, "Capacity of wireless network under SINR Interference Constraints," Springer-Verlag New York, Inc. Secaucus, NJ, USA, vol. 17, no. 7, pp. 1605-1624, Oct. 2011.
[3] V. Gabale, B. Raman, P. Dutta and S. Kalyanraman, "A Classification Framework for scheduling algorithms in Wireless Mesh Networks," IEEE Communications Society, vol. 15, no. 1, pp. 199-222, Mar. 2012.
[4] K.P. Vijayakumar, p. Ganeshkumar and M. Anandraj, " Review on Routing algorithms in Wireless Mesh Networks," International Journal of Computer Science and Telecommunications, vol. 3, no. 5, pp. 87-92, May. 2012.
[5] L. Upadhyay, H. Nagar and D. Rajpoot, "A Classification on Framework for Scheduling algorithm in Wireless Mesh Network," International journal of Exploring Emerging Trends in Engineering (IJEETE), vol. 2, no. 6, pp. 247-251, Dec 2015

Paper Type : Research Paper
Title : Study of Affect Computing Techniques in Human Computer Interface
Country : India
Authors : Dhananjay Theckedath || Dr. R.R Sedamkar

Abstract: Computer systems which are capable of emotion detection via automated devices open up new horizons in Human-Computer Interaction (HCI). Due to the inseparable link between emotions and cognition, the field of Affective Computing aspires to narrow the communicative gap between human beings and computers. This is achieved by developing systems that not only recognize but also respond to the affective states of the user. This paper presents a literature survey on the various Affect detection techniques including Facial expression analysis, Speech analysis, Multi-modality and Gaze detection. The aim of the paper is to obtain a deeper understanding of affective states, which will form the foundation for designing a data-driven Human Computer interface.

[1] Gong Chao ; Beijing Inst. of Technol., Beijing, China. "Human-computer interaction: The usability test methods and design principles in the human-computer interface design." Aug. 2009 283 – 285.
[2] D. Te'eni, J. Carey and P. Zhang, Human Computer Interaction: Developing Effective Organizational Information Systems, John Wiley & Sons, Hoboken (2007).
[3] [3] Erno Mäkinen , Face Analysis Techniques for Human-Computer Interaction, , Academic Dissertation, Department of Computer Sciences, University of Tampere, 2007
[4] Sangeeta Kakoty, Monohar Lal, Shikhar Kr. Sarma "E-learning as a Research Area: An Analytical Approach", International Journal of Advanced Computer Science and Applications, Vol. 2, No. 9, 2011.
[5] Ekman, P., Friesen, W.: "Facial action coding system: A technique for the measurement of facial movement". Consulting Psychologists Press, Palo Alto (1978)

Paper Type : Research Paper
Title : IOT Based Energy Consumption and Security Control In Home Automation System
Country : India
Authors : Ashokkumar Sharma || Shivam Shukla || Prakash Shukla || Agrim Singh || Mrs.Veena Kulkarni

Abstract: IoT based home automation system can be controlled over mobile devices. This system can perform varied functions to be performed at home. This allows accessibility over internet from any corner in the world. The main focus of this project is to minimize the usage of electricity and reduce human efforts.The Home Automation system (HAS) incorporates various aspects of technologies such as wireless networking, communication over cloud.The data to be analyzed is stored onto the cloud. The user can access multiple appliances over the internet as per their convenience. This is a low cost system. This system can control multiple devices.

[1] Ravi Kishore Kodali, Vishal Jain, Suvadeep Bose and Lakshmi Boppana, "IoT Based Smart Security and Home Automation System",Computing, Communication and Automation (ICCCA), 2016 International Conference on pp. 1286 – 1289, April 2016.
[2] VinaySagar K and Kusuma S, "Home Automation Using Internet of Things", International Research Journal of Engineering and Technology, Volume 2, Issue 3 on pp. 1965 – 1970, June 2015.
[3] Stefan Matlak, RazvanBogdan, "Reducing Energy Consumption in Home Automation based on STM32F407 Microcontroller", IEEE, November 2016.
[4] Su ZinZin Win, Zaw Min MinHtun, HlaMyoTun, "Smart Security System For Home Appliances Control Based On Internet Of Things" IJSTR, Volume-5, Issue 6, June 2016.

Paper Type : Research Paper
Title : Prevention of Attack in WSN using Certificate Revocation
Country : India
Authors : U. L. Prajapati || Dr. R.R. Sedemkar

Abstract: Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes communication behavior into account to calculate sensor nodes' trust value, which is not enough for trust evaluation due to the widespread malicious attacks. According to the number of packets received by sensor nodes, direct trust and recommendation trust are selectively calculated. Then, communication trust, energy trust and data trust are considered during the calculation of direct trust..............

Keywords:- Wireless sensor networks, Energy efficient, Trust model, Certificate Revocation.

[1] J. Jiang, G. Han, F. Wang, L. Shu and M. Guizani, "An Efficient Distributed Trust Model for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 1228- 1237, May 2015.
[2] S.J. IndhuLekha, R. Kathiroli, "Trust Based Certificate Revocation of Malicious Nodes in MANET", 2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014.
[3] Nirwan Ansari, Jie Yang, and Nei Kato, Wei Liu, Hiroki Nishiyama, "Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks", IEEE transactions on parallel and distributed systems, vol. 24, no. 2, February 2013
[4] Y. Lu, K. Lin and K. Li, "Trust Evaluation Model against Insider Attack in Wireless Sensor Networks," in IEEE Second International Conference on Cloud and Green Computing (IEEE Computer Society), pp.319-326, Dalian, China, 2012.
[5] R. Venkataraman,M.PushpalathaT,RamaRao,"Regression-based mobile adhoc networks", IETInf.Secur. 2012, vol.6, Iss.3, pp.131-140.

Paper Type : Research Paper
Title : Trust Based Secure Optimal Route Selection and Enhancing QoS in Mobile Ad-Hoc Networks Using AOMDV-SAPTV and DE-Algorithm
Country : India
Authors : Gautam M. Borkar || Anjali R. Mahajan || Prashant Jawade

Abstract: A mobile adhoc network is infrastructure-free and self configured network connected without wire. As it is infrastructure-free and no centralized control, such type of network are suitable only for conditional inter communication link. So initially maintaining Quality of Service and security aware routing is a difficult task. The main purpose of QoS aware routing is to find an optimal secure route from source to destination which will satisfy two or more QoS constrain. In this paper, we propose a net based multicasting routing scheme..............

Keywords: Mobile adhoc network (MANET); Multicasting routing scheme MRS; Quality of Service ; Secure closest spot trust certification protocol (SCSTC); Dolphin Echolocation Algorithm (DEA).

[1] Attar A., Tang H., Vasilakos A. V., Yu F. R., & Leung V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 12(100), 3172–3186.
[2] Cordasco J. & Wetzel S. (2008). Cryptographic versus trust based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140.
[3] Azedine B., El-Khatiba K., Xua L., & Korbab L. (2005). An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Computer Communications, 28(10), 1193–1203.
[4] Li Wenjia, & Joshi Anupam. (2008). Security issues in mobile ad hoc networks—A survey (pp. 1–23). Baltimore County: Department of Computer Science and Electrical Engineering, University of Maryland.
[5] Yang Hao, Haiyun Luo, Fan Ye, Songwu Lu, & Zhang Lixia. (2004). Security in mobile ad hoc networks: Challenges and solutions. Wireless Communications, IEEE, 11(1), 38–47.

Paper Type : Research Paper
Title : Power Line Interference Removal from ECG Signal using Adaptive Filter
Country : India
Authors : Benazeer Khan || Yogesh Watile

Abstract: Power line interference is a challenging problem given that the frequency of the time-varying power line signal lies within the frequency range of the ECG signal. Some technical difficulties that involved are low sampling frequency at which the ECG signals are obtained and the low computational resources available at the level of the apparatus. In this paper, adaptive filter to eliminate the power line interference from ECG signal by the use of adaptive LMS algorithm and low pass filter is presented. Most of the energy in the ECG signal is concentrated near the low frequency range..............

Keywords: Adaptive Filter, Biomedical Signals, LMS Algorithm

[1] Alireza K. Ziarani, et al, "A Nonlinear Adaptive Method of Elimination of Power Line Interference in ECG Signals," in IEEE Transaction on Biomedical Engineering, vol. 49, no. 6, June 2002, pp. 540 – 547.
[2] Mireya Fernandez Chimeno, Ramon Pallàs-Areny, "A Comprehensive Model for Power Line Interference in Biopotential Measurements", in IEEE Transactions On Instrumentation And Measurement, Vol. 49, No. 3, June 2000, pp 535 – 540.
[3] Sachin singh, Dr K. L. Yadav, "Performance Evaluation Of Different Adaptive Filters For ECG Signal Processing", in International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, pp 1880-1883.
[4] S. M. M. Martens, et al, "An Improved Adaptive Power Line Interference Canceller for Electrocardiography," in IEEE Transaction on Biomedical Engineering, vol. 53, no. 11, Nov. 2006, pp. 2220 - 2231.
[5] H. N Bharath, et al, "A New LMS based Adaptive Interference Canceller for ECG Power Line Removal," in International Conference on Biomedical Engineering, 2012.

Paper Type : Research Paper
Title : Automation in Farming Industry
Country : India
Authors : Kaushal Mania || Bhavesh Jadav || Akash Pujari || Anand Khandare

Abstract: 21St Century is the era of technological advancements. Automation is taking over the work that is rudimentary. Farmers uses error prone method to catalogue their goods, they use pen and paper to keep track of their produces, and here human error is bound to happen.With the help of this project we tend to automate the cataloguing process for farmers. This recedes chances of error in cataloguing. With the use of this project there will be a reduction in cases of hoarding. This project uses database to store this information which can be viewed by general masses thereby increasing transparency between farmers and customers. This project will use open source technology such as Raspberry.............

Keywords: Transparency, Automated, Manually, Information, MiddleMan

[1] D. Nayak, "Are Hoarders the Real Cause of Inflation in India? – The Short Answer", WSJ, 2014. [Online]. Available: [Accessed: 22- Oct- 2016]
[2] "Government of India must stop hoarding food",, 2014.
[3] B. Nimsiriwangso, S. Kummool, A. Julsereewong, and P. Ukakimaparn, "Automatic weighing machine for improving competitiveness of Thai SMEs in seafood cold storage business," 2015 IEEE/SICE International Symposium on System Integration (SII), Dec. 2015.
[4] L. Bai, C. Zhang, J. Hu, and Z. Liu, "An improved DEA approach and its application on fresh farm produce logistics performance measurement," 2009 Second International Workshop on Computer Science and Engineering, 2009.
[5] J. Stables, "The best smart scale: Our top Wi-Fi connected body fat analyzers," Wareable, 2016. [Online]. Available:

Paper Type : Research Paper
Title : Data Preprocessing, Sentiment Analysis & NER On Twitter Data
Country : India
Authors : Mr.SanketPatil || Prof.VarshaWangikar || Prof. K. Jayamalini

Abstract: The world today has become more advanced where people talk, chat and comment their viewswithout their physical appearance just by dealing with words and not expressions. For instance, Twitter is being used my many people to raise their voice against a particular issue, now the job of finding out and segregating the tone of the comments as positive, negative or neutral is a difficult but crucial task. This information can be used by someone who is a manufacturer of a particular product to know about the impact of his product or Quality of service in the market. It might also be used by a celebrity to how common people react to a particular issue raised by him............

Keywords: CRF, NER, Sentiment Analysis, Social media, twitter

[1]. VarshaSahayak,VijayaShete , ApashabiPathan,, International Journal of Innovative Research in Advanced Engineering (IJIRAE)Issue 1, Volume 2 (January 2015)
[2]. Apoorv Agarwal, BoyiXie ,Ilia Vovsha ,Owen Rambow, Rebecca Passonneau,, Sentiment Analysis of Twitter Data
[3]. MandefroLegesseKejela,DejeneEjiguDedefa,NamedEntity Recognition for Afan Oromo Lap Lambert Academic PublishingGmbH KG, 2012
[4]. Alec Go,, Twitter Sentiment Analysis, CS224N - Final Project Report, June 6, 2009.
[5]. Charles A. Sutton ,Efficient Training Methods for Conditional Random Fields 2008.

Paper Type : Research Paper
Title : Machine Learning: Challenges, Opportunities and Applications
Country : India
Authors : Anand Khandare || Saurabh Indoria || Kalindi Awasthi || Shubham Chhaparia

Abstract: With the enhancement in the technology sector, Machine Learning is evolving on its own, due to key role it can play in providing potential solutions to the various sectors like data mining, image processing, language processing . In this paper, we discuss the various domains wherein the machine learning provides a broader scope for efficient solutions. This paper has four sections (i) Introduction (ii) Data sets (iii) Machine learning models (iv) Challenges (v) scope (vi)applications of machine learning.

Keywords: Dataset, Machine Learning, training.

[1]. T. Joachims. Text categorization with support vector machines: Learning with many relevant features. In Proceedings of the 10th European Conference on Machine Learning, pages 137{142, Heidelberg, Germany, 1998.
[2]. T.M. Mitchell. Machine learning. McGraw-Hill, 1997.
[3]. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 829–837
[4]. Schafer, J. Ben, Joseph, A. Konstan, John Riedl, "E-commerce Recommendation Applications", Data Mining and Knowledge Discover, 2001, pp.115-153.
[5]. Wikipedia, N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014.

Paper Type : Research Paper
Title : Robust Inline Data Reduction Technique in Multi-tenant Storage
Country : India
Authors : Mr. Ankur Sinha || Mr. Anand Khandare

Abstract: Data deduplication has gained increasing popularity as a space-reduction approach in backup storage systems. One of the main challenges for centralized data deduplication is the scalability of fingerprint-index search. In existing system, deduplication mainly focuses on backup system. In this paper, we propose a system that effectively exploits similarity and locality of data blocks to achieve high duplicate elimination and well balanced load at low RAM overhead in a runtime storage environment. The main idea is to employ an algorithm by considering random data chunks which are similar with adjacent data chunk, and eliminate duplicate chunks from the storage system, and then further enhance the resemblance detection efficiency. This would further help us to enhance the data delivery capabilities in cloud storage system with reduced latency and high throughput.

Keywords: Data Chunks, Data Deduplication, Cloud Storage.

[1] S. Quinlan and S. Dorward, "Venti: a new approach to archival storage", Proceedings of the FAST 2002 Conference on File and Storage Technologies, (2002).
[2] A. Muthitacharoen, B. Chen and D. Mazieres, "A low-bandwidth network file system", ACM SIGOPS Operating Systems Review, vol. 35, no. 5, (2001), pp. 174-187.
[3] M. Ajtai, R. Burns, R. Fagin, D. D. E. Long and L. Stockmeyer, "Compactly encoding unstructured inputs with differential compression", Journal of the Association for Computing Machinery, vol. 49, no. 3, (2002), pp. 318-367.
[4] F. Douglis and A. Iyengar, "Application-specific delta-encoding via resemblance detection", Proceedings of the USENIX Annual Technical Conference, (2003), pp. 1-23.
[5] P. Kulkarni, F. Douglis, J. LaVoie and J. Tracey, "Redundancy elimination within large collections of files", Proceedings of the annual conference on USENIX Annual Technical Conference, USENIX Association, (2004).

Paper Type : Research Paper
Title : Aashvast Seva: A Portal to Connect Vagrant to Employer
Country : India
Authors : Pratiksha Singh || Shaheen Sayyed || Tanvi Sanzgiri || Tanya Talwar || Anand Khandare

Abstract: The issue poverty and illiteracy is very paramount in India. With an intention to provide a work for Unskilled and unemployed people especially beggars and support their children's for seeking education we are aiming to develop a web portal for employment of unskilled people .There are various scheme approached and initiated by the government of India to solve this issues , among those one is Deen Dayal Upadhyaya Gram Jyoti Yojana where the project engage rural youth specially BPL in gainful employment Through skill training programs. This proposal is meant for providing one solution to help the zero income segment of population that is beggars, unskilled people.

Keywords: Rural area, zero income, unskilled, illiterate, monitoring, manpower, BPL (Below Poverty Line).

[1]. Wikipedia
[2]. Saeed Shadlou ,Chai kinn Pong ,Sanath Sukurmaran Taylor University (2011), Content management System International journal of Web & Semantic Technology (IJ West) Vol.2,No.2
[3]. R guruprasad and Rajan Moodithaya, Management Information System for the Director's Office

[5]. › India

IOSR Journals are published both in online and print versions.