IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference on Recent Trends in Computer Science and Information Technology

Volume 4

Paper Type : Research Paper
Title : Big Data Analytics: A Concept
Country : India
Authors : Ms. Pooja Dadhe and Dr. R.N. Jugele

Abstract: Big data is a term for massive data sets having large, more varied and complex structure with the difficulties of storing, analyzing and visualizing for further processes or results. Big data is not only changing the way we store data. The process of research into massive amounts of data to reveal hidden patterns and secret correlations named as big data analytics........

Keywords - Big Data, Big data Analytics, information, Hadoop, Predictive Analytics, Text Mining.

[1]. Neerja Kulkarni, Dr. Priti Puri, Big Data Analytics – Business Benefits and Technical Challenges, International Journal of Modern Computer Science and Applications (IJMCSA), Volume No.-3, Issue No.-2, April, 201, ISSN: 2321-2632 (Online)
Books:
[2]. Rajendra Akerkar, big data computing, (CRC Press,NewYork, 2014)
[3]. Paul Zikopolous, Dirk DeRoos, Chirs Eaton, Tom Deutsch, George Lapis, Understanding big data,Analytics for Enterprise class Hadoop and streming class (McGraw hill Publications,Newyork 2012)
Chapters in Books:
[4]. James Manyika, Michael Chui, McKinsey Global Institute, Big data: The next frontier for innovation, competition, and productivity, May 2011


Paper Type : Research Paper
Title : Real Time Automatic Ration Material Distribution System
Country : India
Authors : Pranjal Pedwal

Abstract: Now a day ration card is very significant for every home and used for various field such as family members details, to get gas connection, Domicile certificate, Bank account , It act as address proof for various purposes etc. All the people having a ration card to buy the various materials (sugar, rice, oil, kerosene, etc.) from the ration shops. But in this system having two disadvantages, first one is weight of the material may be imprecise due to human mistakes and secondly, if not buy the materials at the end of the month, they will sale to others without any intimation to the government and customers...........
Keywords: Microcontroller, GSM, RFID, Motor, Solenoid Control Circuits, Mechanical Part.

[1]. Dhanoj Mohan, Rathikarani, Gopakumar, "Automation of Ration Shop Using PLC" International Journal of Modern Engineering Research, 2013, Vol. 3, Issue. 5, pp. 2971-2977.
[2]. S.Valarmathy, R.Ramani, "Automatic Ration Material Distributions Based on GSM and RFID Technology" International Journal Intelligent Systems and Applications, 2013, Vol. 11, pp. 47-54.
[3]. Rajesh C. Pingle and P. B. Boroley, "Automatic Rationing for Public Distribution System (PDS) using RFID and GSM Module to Prevent Irregularities" HCTL Open International Journal of Technology Innovations and Research, 2013, Vol. 2, pp. 102-111.
[4]. S. Sukhumar, K. Gopinathan, "Automatic Rationing System Using Embedded System Technology" International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, 2013, Vol. 1, Issue 8, pp. 339-342.
[5]. Yogesh Kumar Sharma, K. B. ShivaKumar, "Multi-Modality Biometric Assisted Smart Card Based Ration Distribution System" International Journal of Application or Innovation in Engineering & Management, 2014, Vol. 3, Issue 6, pp. 382-392.

Paper Type : Research Paper
Title : Data Centric Security Approach: A way to Cloud Computing Security & Privacy
Country : India
Authors : Prof. Pooja Shelke || Dr. Asish Sasankar

Abstract: Cloud computing paradigms are gaining widespread acceptance due to the various benefits they offer. These include cost-effectiveness, time savings and efficient utilization of computing resources. However, privacy and security issues are among the major obstacles holding back the widespread adoption of this new technology. Some research is focused on improving the security at the application, operating system, Virtual Machine (VM) or hardware levels..........

Keywords- DCS, Trusted Computing, Data Security.

[1]. B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, 2011, pp. 50-57.
[2]. T. Dillon, W. Chen, and E. Chang, "Cloud Computing: Issues and Challenges," in Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, 2010, pp. 27-33.
[3]. M. Malathi, "Cloud computing concepts," in Electronics Computer Technology (ICECT), 2011 3rd International Conference on, 2011, pp. 236- 239.
[4]. P. Mell and T. Grance. (2011, 7/8/2012). NIST Definition of Cloud Computing
[5]. K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, 2012, , pp. 69-73,


Paper Type : Research Paper
Title : Enhancement of Reliability Attribute for Robust Cloud Environment: A Survey
Country : India
Authors : Mrs. Snehal Ashwin Narale || Dr Pradeep K Butey

Abstract: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (networks, servers, storage, applications, and services). Although the rapid demand of highly scalable environment, cloud computing technology is associated with real time applications. It support highly scalable virtual environment which will help to augment the scalability, availability and reliability .cloud computing supports distributed system architecture.......

Keywords: Cloud Computing, Cloud metric, Fault Tolerance Techniques, Replication, Virtualization.

[1]. P. Mell and T. Grance, ,"Draft-NIST Working Definition Of Cloud Computing ", v15, Aug 2005, 2009.
[2]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. ,"Cloud Computing And Emerging IT Platforms: Vision, Hype, And Reality For Delivering Computing As The 5th Utility", Future Generation Computer Systems, 25(6), pp599-616, 2009.
[3]. Muhammad Zakarya, Izaz ur Rahman and Mukhtaj Khan," Cloud Qos, High Availability & Service Security Issues with Solutions", Bahria University Journal of Information & Technology" Vol. 4, Issue 1, pp 1999-4974,August 2011,
[4]. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al. ," A View Of Cloud Computing. ", Communications of the ACM, 53(4), ,pp50–58, 2010.
[5]. G. M. Nayeem and M. J. Alam, "Analysis of Different Software Fault Tolerance Techniques", Google Scholar, 2006.


Paper Type : Research Paper
Title : User Authentication Issues In Cloud Computing
Country : India
Authors : Mrs. S. M. Barhate || Dr. M. P. Dhore

Abstract: Cloud Computing is an emerging concept for geographically distributed data centres and resources which are made available online as services. In cloud computing, interoperability means the ability of an organization to move its workload easily from one cloud environment to other. As the resources are being shared among the servers and users, the files or data is more vulnerable to attacks. Thus interoperability brings with it the challenges of security and privacy.......

Keywords—Cloud computing, interoperability, user authentication, authorization, virtual machines

[1]. Wayne A Jansen, NIST, "Cloud Hooks: Security and Privacy Issues in Cloud Computing" Proceedings of the 44th Hawaii International Conference on System Sciences – 2011.
[2]. Grace A.Lewis, "The Role of Standards in Cloud Computing Interoperability", Technical note, Software Engieering Institute, October 2012.
[3]. Shikha Choksi, "Comparative Study on Authentication Schemes for Cloud Computing", IJEDR, Volume 2, Issue 2, ISSN 2321-9939.
[4]. Abdel Majid Hassan, Mansoor emam, "Additional Authetication and Authorization using registered E-mail id for cloud computing", International Journal of Soft Computing and Engineering(IJSCE), ISSN 2231-2307,Volume-3, Issue-2,May 2013.


Paper Type : Research Paper
Title : Techniques of Data Migration in Cloud Computing
Country : India
Authors : Anandi J.Mungole || M.P. Dhore

Abstract: Data migration is the process of transporting data between computers, storage devices or formats. It is key consideration for any system data implementation, Upgrade or consolidation. During data migration, software programs or scripts are used to map system data for automated migration Once the data migration is complete, an organization validates statistics to determine data accuracy. Finally, data cleaning facilities improve data quality via the removal of unnecessary or repetitive data. This paper presents the different data migration techniques.

Keywords -Data migration, data migration Techniques, data migration services

[1]. Mohsin Nazir, Overview &Current Research Challenges, IOSR Journal of Computer Engineering(ISOR-JCE), 8), 1, 2012.
[2]. Michael Nelson, Fast Transparent Migration For Virtual Machines.
[3]. Harry Katzan,On An Ontological View Of Cloud Computing, Journal of Services Science,3,2010.
[4]. Michael R. Hines,Post copy live migration of virtual machines,
[5]. Christopher Clark, Live Migration of Virtual Machines.


Paper Type : Research Paper
Title : A Novel and Secure Approach for Reversible Data Hiding using Visual Cryptography
Country : India
Authors : Prof. Monali C. Nikose || Prof. Mrunali L. Vaidya || Prof. Priyanka A. Jalan || Prof. Roshan V. Chaudhari

Abstract: Steganography is one form of data hiding, in which data is embedded in digital media. But in almost all forms of such data hiding, distortion can occur in the original cover media and cannot be restored to the original cover. Reversible data hiding is different from such form of data hiding, here additional message is embedded in cover media (distortion-unacceptable cover media), such as military or medical images, in reversible manner, so that the original cover content can be perfectly restored after extraction of the hidden message............

Keywords: Reversible data Hiding, RDH, SDS

[1]. Kede Ma. Weiming Zhang, Xianfeng Zhao, Nenghai Yu,Fenghua Li, "Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption", IEEE Trans on Information Forensics and security, Vol. 8, No. 3, March 2013.
[2]. Rintu Jose, Gincy Abraham, "A Separable Reversible Data Hiding in Encrypted Image with Improved Performance", International Conference on Microelectronics, Communication and Renewable Energy, ICMiCR-2013.
[3]. W. Hong T. Chen and H. Wu, "An improved reversible data hiding in encrypted images using side match", IEEE signal Process Lett., vol.19, no. 4,pp. 199-202, Apr. 2012.
[4]. Jun Tian, "Reversible Data Embedding Using a difference Expansion", IEEE Transaction on circuits and systems for video technology, Vol.13, No. 8, Aug 2003.


Paper Type : Research Paper
Title : Study of Need and Framework of Expert Systems for Medical Diagnosis
Country : India
Authors : Dr. Mamta Baheti

Abstract: In general, in the real world applications, the information for analysis is incomplete, may be precise and have traces of uncertainty which make process of final decision a difficult task. In the field of medical diagnosis this same scenario is seen. To handle such problems artificial intelligence provides a solution by the way of expert systems. Fuzzy logic works on uncertainties and incomplete information and concludes which discrete decision..........

Keywords –Expert Systems, Fuzzy Logic, Medical Diagnosis, Artificial Intelligence and Rule based system

[1] S. Krishna Anand, R. Kalpana and S. Vijayalakshmi et. al., Design and Implementation of a Fuzzy Expert System for Detecting and Estimating the Level of Asthma and Chronic Obstructive Pulmonary Disease, Middle-East Journal of Scientific Research 14 (11), 2013, 1435-1444.
[2] Mayilvaganan M and K.Rajeswari, Human Blood Pressure Classification Analysis using Fuzzy Logic Control System in Data mining, by, International Journal of Emerging Trends & Technology in Computer Science , 3(1), 2014, 305-306.
[3] Vishal Chandra, Pinki Singh, Fuzzy Based High Blood Pressure Diagnosis, International Journal of Advanced Research in Computer Science & Technology , 2(2)1 ,2014, 137-139.
[4] Rupinder Kaur, Amrit Kaur, Hypertension Diagnosis Using Fuzzy Expert System, International Journal of Engineering Research and Application March 2014,14-18.


Paper Type : Research Paper
Title : Temporal Video Segmentation
Country : India
Authors : Aslam Y. Suriya || Dr. S. B. Kishor

Abstract: The process of shot break detection is a fundamental component in automatic video indexing, editing and archiving.Temporal video segmentation is that the first step towards automatic annotation of digital video for browsing and retrieval. This article offers an outline of existing techniques for video segmentation that operate each uncompressed and compressed video stream. The segmentation task is accomplished through event detection in a frame-by-frame processing setup.

Keywords:- Temporal video segmentation, Shot boundaries detection, Shot classification, Video segmentation, unsupervised video analysis.

[1]. A. Hanjalic, R.L. Lagendijk, and J. Biemond, \Automated High-Level Movie Segmentation for Advanced Video-Retrieval Systems", IEEE Transactions on Circuits andSystems for Video Technology, Vol. 9, Issue 4, 1999.
[2]. Z. Rasheed, M. Shah, "Scene Detection In Hollywood Movies and TV Shows", International Conference on Computer Vision and Pattern Recognition, 2003.
[3]. H. Sundaram and S.F. Chang, "Video Scene Segmentation Using Video and AudioFeatures", IEEE International Conference on Multimedia and Expo, 2000.
[4]. B. Adams, C. Dorai, S. Venkatesh, \Novel Approach to Determining Tempo and Dramatic Story Sections in Motion Pictures", International Conference on Image Processing, 2000.


Paper Type : Research Paper
Title : Multi-Authority Data Access Control For Cloud Storage System With Attribute-Based Encryption
Country : India
Authors : G. V. Kapse || Dr. V. M. Thakare || Prof. S. S. Sherekar || A. V. Kapse

Abstract: Data access control is an efficient way to provide the data security in the cloud but due to data outsourcing over untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Attribute-based Encryption (ABE) technique is regarded as a most trustworthy cryptographic conducting tool to guarantee data owner's direct control on their data in public cloud storage.........

Keywords:- Access control, Attributes-Based Encryption, data storage, Multi-Authority

[1]. Wei Li, Kaiping Xue, Yingjie Xue, and Jianan Hong, "TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage", IEEE Transactions on parallel and distributed systems, VOL.24, NO. 06, October 2015.
[2]. [7] Jianan Hong, Kaiping Xue and Wei Li, "Comments on "DAC-MACS: Effective Data Access Control for Multi-authority Cloud Storage Systems"/Security Analysis of Attribute Revocation in Multi-authority Data Access Control for Cloud Storage Systems", IEEE transactions on information forensics and security, VOL. 10, NO. 06, June 2015.
[3]. Taeho Jung, Xiang-Yang Li, Zhiguo Wan, and Meng Wan, "Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption", IEEE transactions on information forensics and security, VOL. 10, NO. 01, January 2015.
[4]. Kan Yang and Xiaohua Jia, "Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage", IEEE Transactions on parallel and distributed systems, VOL. 25, NO. 07, July 2014.



IOSR Journals are published both in online and print versions.