IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference on Recent Trends in Computer Science and Information Technology

Volume 1

Paper Type : Research Paper
Title : Enhancing Authentication in Wireless Devices Using Neural Network
Country : India
Authors : Menal || Dr. Sumeet Gill

Abstract: Security has been a crucial issue in the field of Wireless technology. One of the key points in the security is how to identify the authentication of the user. Authentication has been based on passwords or PIN etc. Password based authentication mechanism is very convenient and mostly adaptable in the Wireless devices. In conventional password based method, one way hash or any encryption algorithm is used to prevent the password but they are still vulnerable. In this paper we proposed a method based on Artificial Neural Network and use Back Propagation algorithm that can solve the security problems and enhance the security in Wireless devices.

Keywords - Artificial Neural Network, Authentication, Back Propagation algorithm, Wireless Technology

[1] M. K. Singh, "Password Based a Generalize Robust Security System design using Neural Network", IJCSI International Journal of Computer Science Issues, Vol.4, No. 2, 2009
[2] Bezdek j.c. "On the relationship between neural netwoks,pattern recognition and intelligence", The international journal of approximate reasoning, 6(2): pp85-107,1992
[3] S.N Sivanandan ,S.Sumathi and S.N Deepa, Introduction to Neural Networks using MATLAB 6.0.
[4] I. B. Damgard, "A design principle for hash functions", Advances in Cryptology, CRYPTO'89, pp. 416–427, 1989.
[5] R. C. Merkle, "One way hash function and DES", Advances in Cryptology-CRYPTO'89, pp. 428–446, 1989.

Paper Type : Research Paper
Title : Survey on Visual Cryptography: Techniques, Advantages and Applications
Country : India
Authors : Shruti M. Rakhunde || Manisha Gedam

Abstract: Visual Cyptography (VC) is widely used secret communication technique. Visual Cryptography is the method used for secret-sharing that encrypts a secret image into several shares. These shares are either printed on transparencies or are encoded and stored in a digital form. The shares can look as noise-like pixels or as meaningful images. Decoding require all n shares.........
Keywords: Visual Cryptography (VC), meaningless shares, meaningful shares

[1]. M. Naor & A. Shamir, ―Visual Cryptography‖, advances in cryptology- Eurocrypt'94.Lecture notes in computer science,1-12,1994.
[2]. G. Ateniese, C. Blundo, A. Santis & D. R. Stinson, ―Extended capabilities for visual cryptography‖, ACM Theor. Comput. Sci., Vol.250,pp. 143-161,2001.
[3]. E. R. Verheul & H.C.A. van Tilborg, ―Construction & properties of k out of n visual secret sharing schemes‖, Designs, codes & cryptography, vol.11, no. 2, pp.179-196, 1997.
[4]. Wu, L.H. Chen, A Study On Visual Cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.

Paper Type : Research Paper
Title : An Analytical Study And Futuristic View Towards Wi-Fi Technologies
Country : India
Authors : Mr. Sushilkumar E. Khaparde || Dr. Kishor M. Dhole

Abstract: Wi-Fi, an acronym for Wireless-Fidelity which is the wireless way to handle networking. The popularity of wireless LANs is a testament primarily to their convenience, cost efficiency, and ease of integration with other networks and network components. The majority of computers sold to consumers today come equipped with all necessary wireless LAN technology. Wireless networking has some serious disadvantages when compared to traditional Ethernet..........

Keywords- LAN, Ethernet, Networking, Wi-Fi, Wireless Technologies.

[1]. Comparative Study of Wi-Fi Er. Priyanka Sharma Research Scholar, DAV University, Jalandhar (INDIA) International Journal of Emerging Technology and Advanced Engineering
[3]. Wireless Technology and Health Outcomes: Evidence and Review Dr. Ray Copes, Director of Environmental and Occupational Health, Ontario Agency for Health Protection and Promotion.
[4]. Benefit and security issues in wireless technologies: Wi-Fi and WiMax Gurveen K.Sandhu, Gurpreet Singh Mann Rajdeep Kaur, International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4, June 2013.
[5]. The future directions in evolving wi-fi:technologies, applications and services, Sumant Ku Mohapatra, Ramya Ranjan Choudhury, Pravanjan Das, International Journal of Next-Generation Networks (IJNGN) Vol.6, No.3, September 2014

Paper Type : Research Paper
Title : SEO Techniques for various Applications - A Comparative Analyses and Evaluation
Country : India
Authors : Sandhya Dahake || Dr. V. M. Thakare || Dr. Pradeep Butey

Abstract: In this information times, the website management is becoming hot topic and search engine has more influence on website. So many website managers are trying o make efforts for Search Engine Optimization (SEO). In order to make search engine transfer information efficiently and accurately, to improve web search ranking different SEO techniques are used. The purpose of this paper is a comparative study of applications of SEO techniques used for increasing the page rank of undeserving websites.....

Keywords: Keyword, internet page, page rank, SEO techniques,

[1]. Antriksha Somani, Ugrasen Suman , "Counter Measures against Evolving Search Engine Spamming Techniques", IEEE Conference, 2011 , 214-217.
[2]. Constantinos Dimopoulos, Sergey Nepomnyachiy, Torsten Suel, "Optimizing Top-k Document Retrieval Strategies for Block-Max Indexes", IEEE Conference, ACM, 2013, 113-122.
[3]. Meng Cui and Songyun Hu, "Search Engine Optimization Research for website Promotion," in IEEE Int. Conf .of Information Technology, Computer Engineering and Management Sciences), 2011, 100-103.
[4]. M. Li, X.J. Gu, Z.X. Yang, "Research of Vertical Search Engine in News Industry," in Proc. IEEE ISMOT, 2012, 2012, 253–256.
[5]. Lihong Zhang, Jianwei Zhang, Yanbin Ju, in " The Research on Search Engine Optimization Based on Six Sigma Management", in IEEE conference 2011, 101-103.

Paper Type : Research Paper
Title : Implementation of Remote Desktop Utility using Teamviewer
Country : India
Authors : Suhashini Chaurasia

Abstract: This paper emphasize on remote desktop utility and its applications. One of the remote desktop utility Teamviewer is explained. Its features are discussed.Implementation in real life has been included in the paper. At the end theRDP(remote desktop protocol) architecture and its layer configuration has been discussed in this paper.

Keywords:- VNC Architecture, Teamviewer, RDP

[1]. T.ZhaoSch. of Comput., Nat. Univ. of Defense Technol., Changsha, China J. Mao ; J. Huang, RNP: A Remote-Desktop Based Net Magic Remote Debugging Platform, Software Engineering (WCSE), 2013 Fourth World Congress on , 2013, 261-265
[2]. AjitKotkar, AlokNalawade, SiddheshGawas, AniketPatwardhan, SnehalMangale, Android Based Remote Desktop Client, International Journal of Innovative Research in Computer and Communication Engineerin, Vol. 1, Issue 2, April 2013, 345-348
[3]. BuntarouShizuki, Masato Nakasu, and Jiro Tanaka, VNC-based access to remote computers from cellular phones, IEEE paper
[4]. Archana Jadhav1 ,Vipul Oswal2,Sagar Madane3 ,Harshal Zope4,Vishal Hatmode5, VNC architecture based remote desktop access through android mobile phones, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 2, April 2012,98-103
[5]., 2018-2016

Paper Type : Research Paper
Title : A review on recovery of node failure in Wireless Sensor Network
Country : India
Authors : Neha Pandey || Pragati Patil

Abstract: The modern era is witnessing a widely used concept of Wireless Sensor Network(WSN).This application is mostly used in sectors of remote and industrial areas where human intervention is very difficult to implement. Timely detection of active failures in such areas is very important as these failures could partition the network into several disjoint networks. Wireless active sensor networks (WSAN) consists of group of actors and sensor nodes. Actors are the individual network nodes that behave according to the directions given by the sensors.......

Keywords: LeDir, DARA, CD, RIM, PDARA

[1]. N.Bala Maruti kumar, K.Reddy Madhavi, "Fault detection and restoration application for Wireless Sensors and actor networks", International advanced research journal in Science, Engineering and technology, Vol1,Issue 1, September 2014. ISSN 2393-8021
[2]. G.Sumalatha,N.Zareena, Ch.Gopi Raju,"A review on Failure node Recovery algorithms in Wireless Sensor Actor Networks",International journal of computer trends and technology,Volume 12, number 2, June 2014
[3]. I. F. Akyildiz and I. H. Kasimoglu, " Wireless sensor and actor networks :Research challenges," Ad Hoc Network, vol. 2, no. 4, pp. 351–367, Oct. 2004.
[4]. I. F. Akyildiz ,Y. Sankara subramaniam ,E. Cayirci, "Wireless sensor networks: a survey of ", Computer Networks, Vol. 38, pp. 393- 422 , 2002.
[5]. M. Younis ,A. Alfadhly and U. Baroudi, and, "Least distance movement recovery approach for large scale wireless sensor-actor networks," in Proc. Workshop FedSenS, Jul. 2011.

Paper Type : Research Paper
Country : India
Authors : Rajat A. Walke || Prof. Jogi John || Palash A.Bambodkar || Kajol Chaudhari || Kashmita Mehar

Abstract: In this modern computer time it is need to protect our computer system from unauthorized user and application (like viruses) which may crash your computer system or may steal your personal data. This event can be performed by connecting any mass storage (external storage device) like PEN DRIVES etc. thus we should need such type security technique which provides a secure platform to the administrator and installed silently & hidden from users like Key Logger Software......

Keywords - PMS, Remote Task, Task Manager

[1]. Protection to the Computer System from USB Port Devices except Operating System Security: Theory and Development
Proceedings Papers:
[2]. Lubonski, M. Gay, V. Simmonds, "A Conceptual Architecture for Adaptation in USB Services Driven by the User Perception of Multimedia" University of Technology Communications, 2005 Asia-Pacific Conference on 03-05 Oct. 2005.
[3]. CaiLongzheng,Yu Shengsheng,Zhou Jing-li, "Research and Implementation of Remote Desktop Protocol Service Over SSL VPN," scc, pp. 502-505, Services Computing,2004 IEEE International Conference on

Paper Type : Research Paper
Title : Digital Exhaust: An Insight on Big Data Projects
Country : India
Authors : Dr. Prajakta Dhote || Dr. Pradeep Butey || Sandhya Dahake

Abstract: At present the maximum industries are concentrating on managing their organization's big data efficiently. It can be a big competitive differentiator. For many companies today it is considered as mission- critical entity. Recent survey shows that there are a significant number of Big Data Projects underway in a wide variety of industries. While carrying out such Big Data Projects we need to take into account various architectural, organizational, and security considerations before deciding on it. This research paper throws an insight on various critical factors coming in the way of designing Big Data projects. Few recommendations and suggestions are given. We have tried to address both the perspective i.e. organizational as well as technical.

Keywords – Big Data, Big Data Governance, Big Data Projects, Big Data Technology, Business Intelligence,

[1] NewVantage Partners Big Data Executive Survey: Themes & Trends, 2016,
[2] Ibid., NewVantage Partners
[3] Avanade, Global Survey: The Business Impact of Big Data, November 2010,
[4] Taylor, Paul, Financial Times Corporate 'Digital IQ' Linked to Performance, March 26, 2014,

Paper Type : Research Paper
Title : Wavelet Based Feature Extraction Technique for Face Recognition and Retrieval: A Review
Country : India
Authors : Mr. Zafar G. Sheikh || Dr. V.M. Thakare

Abstract: With enormous growth in video applications, a huge amount of video data is being generated every day. The proposed work is inspired from the same issuein concern face recognition and retrieval. The features are always plays an important role. Meanwhile, most of the features are directly proportional to the accuracy and inversely proportional to the speed.Wavelets have finds third way to find eminent solution to such problems......

Keywords:-Wavelets, DWT, Gabor,

[1] Sachin P Nanavati and Prasanta K Panigrahi, "Wavelet Transform A New Mathematical Microscope," RESONANCE, pp.50-64, March 2004.
[2] SangeetaKakarwal and RatnadeepDeshmukh "Wavelet Transform based Feature Extraction for Face Recognition," International Journal of Computer Science and Application Issue 2010, pp. 100-104, 2010.
[3] Yongzhong Lu, Jingli Zhou, Shengsheng Yu, "A Survey of Face Detection, Extraction and Recognition," Computing and Informatics, Vol. 22, pp.163-195, 2003.
[4] Bhumika G. Bhatt1 and Zankhana H. Shah, " Face Feature Extraction Techniques: A Survey,", National Conference on Recent Trends in Engineering & Technology, 2011.

Paper Type : Research Paper
Title : Steps towards effective eGovernacne Framework in India
Country : India
Authors : Nitin V Choudhari

Abstract: The benefits of virtualization are typically considered to be server consolidation, increased availability, isolation, ease of operating system deployment and simplified disaster recovery. The basic use of virtualization is the optimization of technical resources, improved service delivery with valuable reduction of the cost. Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in today's internet-service-oriented enterprise data centers.........

Keywords: Virtualization, Virtual Machine, Service Delivery, resource optimization, e-Governance framework, and throughput

[1] D. Gupta, L. Cherkasova, R. Gardner, and A. Vahdat. "Enforcing Performance Isolation across Virtual Machines in Xen". In Proceedings of the 7th International Middleware Conference, LNCS Press, 2006. pp.342-362
[2] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt and A. Warfield. "Live Migration of Virtual Machines". Proceedings of the 2nd Symposium on Networked Systems Design and Implementation, Boston, Massachusetts, USA, May 2005.
[3] K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson. "Safe Hardware Access with the Xen Virtual Machine Monitor". Proceedings of the 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS), Boston, MA, October 2004.

Paper Type : Research Paper
Title : Power conservation through Android application
Country : India
Authors : Ashi Trivedi || Prof. Jogi John || Deepshikha Sinha || Brajesh Tiwari || Ayesha Afreen || Amrit Raj

Abstract: Android platform for smart mobiles is rapidly getting popular all over the world owing to it's wide variety of possible applications that can be run onto it and uses in many areas of life. Considering this ,an Android based Home Automation project is presented in this paper, whose main objective is power conservation in our homes. Another feature is that through this system, one can operate electrical appliances in another room by means of a simple mobile application. Technically main components are the at mega controller and the Wifi.

Keywords: Automation, Adapter, ATmega, ,Smartphones.

[1] Sadeque Reza Khan and Farzana Sultana Dristy ,"Android based Security And Home Automation System".
[2] Mrs. Latha A.P.,Pratik Agarwal , Rishabh Rajgarhia, Shashank Sinha , Nafiya Monis , "Home Automation using Android Application and Predictiv Behaviour Implementation", Department of Information Science and Engineering, Dayananda Sagar College of Engineering, Bangalore.

IOSR Journals are published both in online and print versions.