Volume-1 (National Conference on Advances in Engineering, Technology & Management (AETM'16))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Advanced Autonomous Network Reconfiguration System |
Country | : | India |
Authors | : | Abhinish Popli || Geetanjali Rathee || Hemraj Saini |
Abstract: The Multi-hop characteristics of wireless mesh network practices recurrent nodes or link failures triggered by several reasons i.e. vibrant obstacles, channel intrusion, and applications demands. These catastrophes cause severe performance degradations and oblige expensive physical managements for their real-time recovery. In order to overcome these limitations, the aim of this manuscript is to present an Advanced Autonomous Reconfiguration Network System (ARNS) by enabling multi-radio WMNs......
Keywords - WMN, QoS, Multi radio WMN, AARS, Network
[1] F. Kaabi,S. Ghannay, and F. Filali, Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualitative comparison between schemes, International Journal of Wireless and Mobile Networks(IJWMN),vol. 2 (1), 2010.
[2] Kyu-Han Kim, and Kang G. Shin, Self-Reconfigurable Wireless Mesh Networks, IEEE/ACM Transactions on Networking, vol. 19(2), 2011.
[3] Xiaoqin Chen, Haley M. Jones, and Dhammika Jayalath, Channel-Aware Routing in MANETs with Route Handoff, IEEE Transactions on Mobile Computing, vol. 10 (1), 2011.
[4] I. Akyildiz, X. Wang, and W. Wang, Wireless mesh networks: A survey, Computer Network, Vol. 47 (4), 2005, pp 445–487.
[5] A. P. Subramanian, H. Gupta, S. R. Das, and J. Cao, Minimum interference channel assignment in multi-radio wireless mesh networks, IEEE Transactions on Mobile Computing., vol. 7 (12), Dec. 2008, pp 1459–1473.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Soft Architectural Distance (SAD): How Far is the Legacy Architecture from SOA Architecture Principle |
Country | : | India |
Authors | : | Amit Mishra || Pradeep Tomar and Anurag Singh Baghel |
Abstract: It is a well-accepted fact that technology is changing rapidly, hence the need to keep upgraded with latest trends is the key to success. This is especially true for big enterprises where the challenge is not only to keep the enterprise running but also to collaborate with other enterprises doing similar business. So, there is a definite need to transform such legacy applications running in organization. This study presented here helps to analyze the current state of LEGACY software architecture and develops a methodology to compare it with Service Oriented Architecture (SOA)..........
Keywords: Legacy transformation, Service Oriented Architecture, SOA, Soft Architectural Distance, Design Principles
[1] Du Bois, B., "Towards an ontology of factors influencing reverse engineering. In STEP '05:", Proceedings of the 13th IEEE International Workshop on Software Technology and Engineering Practice, pages 74–80, Washington, DC, USA. IEEE Computer Society. (2005).
[2] H. Tromp and G. Hoffman. "Evolution of legacy systems, strategic and technological issues", based on a case. Paper also accepted to the workshop on Evolution of Large-Scale Industrial Software Applications (ELISA), 23 September 2003, ICSM 2003.
[3]Saran, Cliff, "SOA will fail without governance warns Gartner," http://ComputerWeekly.com, September 7, 2006
[4] R. Khadka, A. Saeidi, A. Idu, J. Hage, and S. Jansen, "Legacy to SOA Evolution: A Systematic Literature Review, Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Envioronment", IGI, 2013
[5] S. Murer, B. Bonati, and F. J. Furrer, "Managed Evolution." Springer, 2011
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dashboards for Progression Analysis of Students |
Country | : | India |
Authors | : | Prabhleen Juneja || Dr. Amardeep Singh || Dr. Kawaljeet Singh |
Abstract: The dashboard is a visualization device which shows the present status of metrics and Key Performance Indicators (KPIs) for an endeavor. They are a result of Business Intelligence i.e Descriptive Analytics. This paper aims to give an overview of what Dashboards are, what are their classifications and to introduce some common tools used to build the dashboards. The study also shows the parameters identified for measuring the student progression and performance of various departments of Engineering by describing student progression and data dimensional model..........
Keywords- Dashboard, dashboard types, big data, analytics, KPIs, Student Progression, Parameters, Data Dimensions, Multidimensional data model
[1] R.N.Prasad and Seema Acharya, Basics of Enterprise Reporting, Fundamentals of Business Analytics, Reprint Edition. New Delhi, Wiley, 2014
[2] Ephraim Turban, Ramesh Sharda, Dursun Delen and David King , Business Intelligence: A Managerial Approach, 2nd Edition,Pearson
[3] Mohamed Addelfattah, A Comparison of Several Performance Dashboards Architectures, Intelligent Information Management, vol. 5,pp. 35-41, March 2013
[4] Ernie Mazuin Mohd Yusof and Mohd Shahizan Othman, A review on the Dashboard Characteristics for Manufacturing Organizations, Journal of Information Systems Research and Innovation, ISSN: 2289-1358, 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | MA Assisted and Restrained Sink Mobility based Economical Data Processing in WSNs: MARS |
Country | : | India |
Authors | : | Shivangi Katiyar || Dr. Rohit Vaid || Dr. Devendra Prasad |
Abstract: Wireless Sensor Network (WSN) is composed of large number of tiny sensor node which have sensing and computation ability. In past WSNs, lots of Data Aggregation scheme has been proposed for prolong network lifetime and eliminate data redundancy. In general sink collects data from all deployed nodes in single processing cycle but region critical WSNs and long communication distance between nodes and sink demands a scheme which process data region wise......
Keywords: Mobile sink, Mobile Agent, Data Aggregation
[1] Dattatray S. Waghole and Vivek S. Deshpande, "Techniques of Data Collection with Mobile & Static Sinks in WSN's: A Survey," International Journal of Scientific & Engineering Research, vol.4, no. 10, pp. 501-505, 2013.
[2] Prof. Deepa.T.P., Ujjwal Jain, Aishwarya N and Nischitha S, "Data Aggregation to improve quality of service in wireless sensor networks: survey", International Journal of Computer Science and Mobile Computing, vol.3, no. 10, pp.783-790, 2014.
[3] J. Luo and J. Hubaux, "Joint mobility and routing for lifetime elongation in wireless sensor networks," IEEE Infocom, vol. 3, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Detection and Localization of Multiple Spoofing Attackers in Wireless Networks |
Country | : | India |
Authors | : | Divya |
Abstract: Spotting assaults effectively injury the networks performance and straightforward to launch by several equipment's accessible in market. The regular security technique to talk concerning spotting assaults is usually to use crypto graphical authentication. Though the node identification are often tested through crypto graphical authentication. within the current work, a physical house coupled to every node, onerous to redact, and not extremely dependent on cryptography is utilized as ground to uncover spotting strike, deciding.....
Keywords:- Cordless network security, cryptography, spotting assail, spatial correlation
[1] J. Bellardo and S. Savage, "802.11 Denial-of-Service Assaults: Real Vulnerabilities and Practical Solutions," Proc. USENIX Security Symp., pp. 15-28, 2003.
[2] F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access Points Vulnerabilities to Dos Assaults in 802.11 Networks," Proc. IEEE Wireless Comm. and Networking Conf., 2004.
[3] D. Faria and D. Cheriton, "Detecting Identity-Based Assaults in Wireless Networks Using Signal prints," Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006.
[4] Q. Li and W. Trappe, "Relationship-Based Detection of Spotting Related Anomalous Traffic in Ad Hoc Networks," Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006.
[5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, "Secure and Efficient Key Management in Mobile Ad Hoc Networks," Proc. IEEE Int'l Parallel and Distributed Processing Symp. (IPDPS), 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Distributed Cognitive Approach Towards Internet Communication using F-Test |
Country | : | India |
Authors | : | Chaman Verma || Rupinder Kaur |
Abstract: Internet is supposed to be a powerful multi-purpose tool for information searching. A number of people of different ages; from teenagers to old persons use it for sharing ideas, knowledge, experiences, cultures and communication. Internet has brought technological advancement in academics where the mode and medium of studies and research have almost changed......
Keywords: F-test, mean, scatteredness, variance
[1] Internet society report 2015, http://www.internetsociety.org/globalinternetreport/assets/download/IS_web.pdf Accessed on 15 January 2016.
[2] India to have second largest internet base in Dec 2015, http://yourstory.com/2015/11/india-internet-user-base-2015/ Accessed on 16 January 2016.
[3] T. Nazir, "Use and adequacy of e-resources by the research scholars and students of the University of Kashmir in science & social science faculties: a case study by", Brazilian Journal of Information Science: Research Trends, 9(1), 2015, 1-16.
[4] M. Tsvere, T. L. Nyaruwata and S. Swamy, "Internet Usage by University Academics: Implications for the 21st Century Teaching and Learning", International Journal of Science and Research, 2(9), 2013, 19-25.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Research Issues in ASR: A leading edge to Punjabi Language |
Country | : | India |
Authors | : | Navneet Kaur Walia || Sharanpreet Kaur Tiwana |
Abstract: Speech recognition is a field of computer science that deals with designing human interactive systems that recognize spoken words. It is a process of converting an acoustic signal, captured by a microphone to a set of words. The major consideration for developing an efficient ASR is maintaining high recognition accuracy rate and low word error rate..........
Keywords— ASR (Automatic speech recognition), ADHD (Attention Deficit Hyperactivity Disorder), RSI (Repetitive Strain Injury).
[1] Bill Manaris,Renée McCauley and Valanne MacGyvers," An Intelligent Interface for Keyboard and Mouse Control – Providing Full Access to PC Functionality via Speech" Proceedings of 14th International Florida AI Research Symposium May 2001, pp. 182-188.
[2] Mu-Chun Su 1 and Ming-Tsang Chung, "Voice-controlled human-computer interface for the disabled" Computing & Control Engineering Journal, Vol. 12, Issue 5, October 2001, pp. 225 – 230.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Survey on Big Data Tools and Techniques |
Country | : | India |
Authors | : | Veenakshi Devi || Meenakshi Sharma |
Abstract: Collection of huge quantity of data is generally called as Big data. Its playing a crucial role in todays world and is one of the necessary technology for the upcoming era..Big data technologies plays a vital role in providing accurate analysis that leads to making of decisions in a tangible manner that too results in reduction of cost, risk and better efficiencies in terms of various operations.......
Keywords - Hadoop , HDFS, Spark , Map Reduce, Big data platforms
[1] M. Chen, S. Mao, and Y. Liu, Big data: A survey, Mobile Networks and Applications, vol. 19(2), 2014, pp. 171–209.
[2] Y. Demchenko, C. De Laat, and P. Membrey, Defining architecture components of the big data ecosystem, in IEEE International Conference on Collaboration Technologies and Systems (CTS), 2014, pp. 104–112.
[3] J. Dean and S. Ghemawat, Mapreduce: simplified data processing on large clusters, Communications of the ACM, vol. 51 (1), 2008, pp. 107–113.
[4] A. Katal, M. Wazid, and R. Goudar, Big data: Issues, challenges, tools and good practices, in Sixth IEEE International Conference on Contemporary Computing (IC3), 2013, pp. 404–409.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Energy Efficient Battery Discharge Rate Based Asynchronous Duty Cycling Protocol for WSN to improve Network Lifetime |
Country | : | India |
Authors | : | Amandeep Kaur || Dr. Rajneesh Gujral |
Abstract: In Energy Constrained Wireless Sensor Network, maximizing network lifetime is an important issue. The challenge is to find out the optimal schedule of duty cycle for nodes while maintaining the sufficient number of active nodes for network coverage. In this paper we propose the Energy Efficient Battery Discharge Rate Based (E2BDRDC) Asynchronous Duty Cycling Protocol for WSN which consider the battery discharge rate of active node to find the duty cycle of inactive nodes. Further the E2BDRDC protocol improves the energy consumption and network lifetime 30% and 20% as compared to DCBSP (Discharge Curve Back off Sleep Protocol).
Keywords: Duty cycle, Network Lifetime, SNs, WSN.
[1] Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirici, Wireless sensor networks: A survey, Elsevier, Computer Networks, vol. 38 (4,) 2002, 393–422.
[2] Ghosh, S. Das, Coverage and connectivity issues in wireless sensor networks: A survey, Science Direct, Pervasive and Mobile Computing 4 (2008), 303–334.
[3] G. Anastasi, M. Conti, M. Di Francesco, A. Passarella, Energy Conservation in Wireless Sensor Networks: a Survey, Ad Hoc Networks , vol. 7(3), May 2009.
[4] Avinash More,, Vijay Raisinghani, Discharge Curve Backoff Sleep Protocol for Energy Efficient Coverage in Wireless Sensor Networks, in Proceedings of 3rd International Conference on Recent Trends in Computing (ICRTC), 2015, pp.1131-1139.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography |
Country | : | India |
Authors | : | K.S.Seethalakshmi |
Abstract: As a result of widespread use of communication medium over the internet, information security has become the area of concern. In the field of internet, the main issue is the data security. Image steganography is concerned with sending secret message while hiding its existence itself. Cryptography is not concerned with hiding the existence of a message, but it means a process called encryption. In order to achieve a better level of secrecy, a message is encrypted before being hidden in a message. Hence, after applying encryption, image steganography embeds the secret message in a cover, such as a digital image file........
Keywords – Cryptography, visual cryptography (VC), steganography, neural networks (NN), radial basis functions(RBF), Integer Wavelet Transformation(IWT)
[1] Yogita Patil , Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network, International Journal of Computer Applications (0975 – 8887), vol. 113 (1), March 2015.
[2] S.Premkumar, R. Swathiramya, Optimal Contrast Grayscale Visual Cryptography with Modified Multi-secret Sharing for Secure Application, International Journal of Engineering Research and Applications (2248-9622), vol. 4 (4), April 2014, pp.103-106
[3] Moushmee Kuri, Dr. Tanuja Sarode, Steganography Combined with RKO Technique for Visual Cryptography, International Journal of Computing and Technology (2348 – 6090), vol. 1 (4), May 2014.
[4] Monu U. Ragashe1, Sneha M. Ramteke2, Combine use of steganography and visual cryptography in computer forensics, Discovery, vol. 18 (51), May7, 2014.
[5] S. R. Navale, S. S. Khandagale, R. A. Malpekar, Prof. N. K. Chouhan, Approach for Secure Online transaction using Visual Cryptography & Text Steganography, International Journal of Engineering Research & Technology (2278-0181), vol. 4 (3), March, 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Technique for Improving Data Availability in VANETs |
Country | : | India |
Authors | : | Brij Bihari Dubey || Naveen Chauhan || Narottam Chand |
Abstract: Vehicular networks are useful technique to establish communication using vehicles. Vehicular Delay Tolerant Networks (DTNs) are emerging technology which provides communication among mobile nodes at low cost. In DTN nodes carry data packets till it does not find any neighbor and forwards data to any node moving around other as early as it encounters and agrees to accept that data packet for forwarding.......
Keywords:-VANETs. Cooperation. Coalition. Incentive. Selfish nodes. Availability.
[1] Iqbal S., Chowdhury S. R., Hyder C. S. , Vasilakos A. V. & Wang C., Vehicular communication: protocol design, testbed implementation and performance analysis, In Proceedings of International Conference on Wireless Communications and Mobile Computing, Leipzig, Germany, 2009, 410–415.
[2] Yu F. & Biswa, S., Self-configuring tdma protocols for enhancing vehicle safety with dsrc based vehicle-to-vehicle communications, In IEEE Journal on Selected Areas in Communications (JSAC), 25(8), 2007, 1526–1537.
[3] Saad W., Han Z., Debbah M., Hjørungnes A. & Basar T., Coalition game theory for communication networks: A tutorial, In IEEE Signal Processing Magazine., Special issue on Game Theory in Signal Processing and Communications, 26(5), 2009, 77–97.
[4] Ray D., A Game-Theoretic Perspective on Coalition Formation, New York, USA: Oxford University Press, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Routing Protocols and Movement Models in Opportunistic Networks |
Country | : | India |
Authors | : | Rinky || R.K. Chauhan |
Abstract: In recent years during data transmission handling long enduring delay is very difficult task. To handle these delays opportunistic networks are used. In these networks nodes uses store -carry and forward mechanism to forward data messages between intermediate nodes. These intermediate nodes are used to transfer data from source to destination. In opportunistic networks data transmission takes place with the help of standard routing protocols that are already presented in network..........
Keywords: Opportunistic networks, routing, movement models, store carry and forward and delays.
[1] Gao et al., Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks, IEEE Transactions On Mobile Computing, Vol. 12 (11), pp. 2132-2144, 2013.
[2] S. Jain, K. Fall and R. Patra., Routing in a Delay Tolerant Network, in Proceedings of ACM SIGCOMM, pp. 145–2008.
[3] Y. Cao et al., Approach-and-Roam (AaR): A Geographic Routing Scheme for Delay/Disruption Tolerant Networks, IEEE Transactions On Vehicular Technology, Vol. 63 (1), pp. 266-281, 2014.
[4] Anders Lindgren, AvriDoria, and OlovSchelen, Probabilistic routing in intermittently connected networks, Proceeding of 1st International Workshop on Service Assurance with Partial and Intermittent Resources , pp. 239-254, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | CDN Perspectives for Quality Delivery of Contents |
Country | : | India |
Authors | : | Meenakshi Gupta || Atul Garg |
Abstract: Web performance has become critical and essential with the massive growth of web-based applications and services. Popular web service providers find it difficult to cope up with the increasing demand from their users due to network congestion and overloading of web servers. A Content Delivery Network (CDN) facilitates improved performance by serving end-users, from...
Keywords: Content Delivery Network, Content Provider, End-user, Quality of Service, Net neutrality
[1] J. Dilley, B.M. Maggs, J. Parikh, H. Prokop, R. Sitaraman, and B. Weihl, Globally distributed content delivery, Internet Computing, IEEE, 6(5), 2002, 50-58.
[2] G. Peng, CDN: content distribution network, CoRR, arXiv:cs/0411069v1, Technical Report TR-125 of Experimental Computer Systems Lab, Stony Brook University, NY, 2004.
[3] A. Garg, and A. Kapil, Portable extended cache memory to reduce web traffic, International Journal of Engineering Science and Technology, 2(9), 2010, 4744-4750.
[4] A.A. Sofi, and A. Garg, A proxy load reduction technique to improve web performance, International Journal of Engineering Research & Technology, 4(4), 2015, 967-973.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Evaluation of Features Extraction from Lung CT Images for the Classification Stage of Malignancy |
Country | : | India |
Authors | : | Santosh Singh || Yogesh Singh || Ritu Vijay |
Abstract: Image processing has become an active research topic in recent years. Researchers have focused on developing an algorithm using image processing to detect the different types of cancer in its early stage. Various preprocessing steps using image processing have been proposed. But high accuracy, sensitivity and specificity are important. To achieve this, preprocessing of the acquired original image is needed. This study evaluates CT images of lung, which contains noise.......
Keywords: Accuracy, Computed Tomography Image, Feature Extraction, Image Processing, Sensitivity
[1] Khin Mya Mya Tun, Khaing, Implementation of Lung Cancer Nodule Feature Extraction using Digital Image Processing, International Journal of Scientific Engineering and Technology Research, vol 3 (9), May 2014, 2204-2210
[2] Shamala B. T, Kulhalli K V CAD System for Lung Cancer Detection using ANN, IOSR Journal of Electronics & Communication Engineering, 11-15.
[3] Cox G S, Hoare F J, Jager G de, Experiments in lung cancer nodule detection using texture analysis and neural network classifiers
[4] Song Y, Cai W, Kim J and Feng D D, A Multistage Discriminative Model for Tumor and Lymph Node Detection in Thoracic Images, IEEE Transactions on Medical Imaging, May 2012, vol 31(5), pp 1061-1075
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Hybrid Approach to Security of Multimedia Data Using ncryption/Decryption and Key Generation Algorithms |
Country | : | India |
Authors | : | Gemini Garg || Jaspreet Singh |
Abstract: Cloud Computing has become famous due to its effective characteristics.The growing approval of cloud computing kindsthe data holder to contract complex data in encoded form onto the cloud. Outsourcing the storage and processing of multimedia data to cloud data centres is becoming expanded common. The data in cloud computing is growing producing to scale up the software and hardware resources. How to defend the subcontracted delicate data as a service is becomes a main data safety challenge in cloud computing.......
Keywords: Cloud Computing, Multi-media, Security Challenges, Software Resources, Skipjack and Elgamal Algorithm.
[1] Li, Jin. "Identity-based encryption with outsourced revocation in cloud computing." Computers, IEEE Transactions on 64.2 (2015): 425-437.
[2] Kehoe, Ben, "A survey of research on cloud robotics and automation", Automation Science and Engineering, IEEE Transactions on 12.2 (2015): 398-409.
[3] Carroll, Mariana, Alta Van Der Merwe, and Paula Kotze, "Secure cloud computing: Benefits, risks and controls", Information Security South Africa (ISSA), 2011, IEEE.
[4] Buyya, Rajkumar, et al., "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility", Future Generation computer systems 25.6 (2009): 599-616.