IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference on Recent Trends in Computer Science and Information Technology

Volume 9

Paper Type : Research Paper
Title : A novel approach for face annotation using multilabel correlation graph for web image search
Country : India
Authors : Ku. Roshani S. Mundhe || Dr. Vilas M. Thakre

Abstract: Social media is growing up as a new way of interacting around the various media. As the digital images are increasing rapidly it is the biggest challenge to classify them. Also the large number of web and personal images requires an effective search and browsing mechanism in either a content or keyword based type. This paper is focused on different image mining applications i.e. human age estimator, web and personal image annotation, face annotation, hypergraph learning and biomedical and health informatics...........

Keywords -Age estimation, face annotation, influencer mining, and web image annotation.

[1]. Bingbing Ni, and Shuicheng Yan, "Web Image and Video Mining Towards Universal and Robust Age Estimator," IEEE Transaction on Multimedia, vol. 13, no. 6, pp. 1217-1229, DECEMBER 2011.

[2]. Yi Yang, and Alexander G. Hauptmann, "Web and Personal Image Annotation by Mining Label Correlation With Relaxed Visual Graph Embedding," IEEE Transaction Image Processing., pp. 1339- 1351, vol. 21, no.3, MARCH 2012.
[3]. Dayong Wang, and Jianke Zhu, "Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation," IEEE Transaction on Knowledge And Data Engineering, vol. 26, no. 1, pp. 166- 179, JANUARY 2014.
[4]. Quan Fang, and Yong Rui, "Topic-Sensitive Influencer Mining in Interest-Based Social Media Networks via Hypergraph Learning," IEEE Transactions on Multimedia, vol. 16, no. 3, pp. 796- 812, APRIL2014.
[5]. Altug Akay, Andrei Dragomir, and Bj¨orn-Erik Erlandsson, "Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care," IEEE Journal of Biomedical and Health Informatics, vol. 19, no. 1, pp. 210-218, JANUARY 2015.

Paper Type : Research Paper
Title : A approach for moving object detection and tracking in image processing methods
Country : India
Authors : MissN.S.Bharti || Dr.S.N.Kale || Dr.V.M.Thakare

Abstract: Image processing is processing of images using mathematical operations by using any form of signal processing for which the input is an image, a series of images, or a video ,such as photograph or video frame,the output of image processing may be either an image or a set of characteristics or parameters realated to the image.This paper focus on blind deconvolution method that permits recovery of the target scene from a single or set of "blurred" images in the presence of a poorly determined or unknown point spread function (PSF).
Keywords: Blind deconvolution,point spread function (PSF),IP camera,network video recorder (NVR),multilayer codebook-based background substraction (MCBS), SAR (single-channel synthetic aperture radar).

[1]. Jie Shao and Shaohua Kevin Zhou, "Robust Height Estimation of Moving Objects From Uncalibrated Videos," IEEE Transactions On Image processing ,VOL. 19, NO. 8, PP. 2221-2232,AUGUST 2010
[2]. Jong Sun Kim and Dong HaeYeom,"Fast and Robust Algorithm of Tracking Multiple Moving Objects for Intelligent Video Surveillance Systems," IEEE Transactions On Consumer Electronics, Vol.57,No.3,PP.1165-1170,AUGUST 2011
[3]. Daniel Henke and Christophe Magnard,"Moving-Target Tracking in Single-Channel Wide-Beam SAR ", IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING,Vol: 50 , No.11,PP. 4735-4747, NOVEMBER 2012
[4]. Jing-Ming Guo and Chih-Hsien Hsia,"Fast Background Subtraction Based on a Multilayer Codebook Model for Moving Object Detection ", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY ,Vol:23,No.10,PP. 1809-1821,OCTOBER 2013
[5]. Guangcan Liu and ShiyuChang,"Blind image deblurring using spectral properties of convolution operators", IEEE TRANSACTIONS ON IMAGE PROCESSING ,Vol:23 , No.12, PP. 5047 -5056, DECEMBER 2014

Paper Type : Research Paper
Title : Multi attribute authority Cipher text Attribute Based Encryption approach with multi Central Authority
Country : India
Authors : Miss S.M.Mahalle || Dr.V.M.Thakare

Abstract: Data access Control is a mechanism which defines a set of conditions or criteria to access the system and its resources. It is an effective way to ensure data security in the cloud. This paper is focused on efficient data access control schemes for Multiauthority Cloud Storage Systems, DIFC with authorization condition, outsourced policy updating method for big data access control, and also explain ID-based ring signature with forward security.....

Keywords: Data access control, Multiauhority cloud, CP-ABE, outsourcing, policy updating, ABE, DIFC-AC.

[1]. Kan yang and Xiaohua Jia, "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems", IEEE Transactions on Information forensics and security, VOL. 8, NO. 11, PP. 1790-1801, NOVEMBER 2013.
[2]. Kan yang and Xiaohua Jia , "Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage", IEEE Transactions on parallel and distributed system, VOL. 25, NO. 7, PP. 1735-1744, JULY 2014.

[3]. Xinyi Huang and Joseph K, "Cost-Effective Authentic and Anonymous Data Sharing with Forward Security", IEEE Transactions on computers, VOL. 64, NO.4, PP. 971-983, APRIL 2015.
[4]. Ye Jianwei and Xu Jie, "Protecting Cloud Data Using the Decentralized Information Flow Control with Authorization Condition", IEEE Transactions on cloud computing, VOL. 5,NO.3, PP. 230-234, JUNE 2015.
[5]. Kan yang and Xiaohua Jia , "Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud", IEEE Transactions on parallel and distributed system, Vol. 26, NO. 12, PP. 3461-143470, DECEMBER 2015.

Paper Type : Research Paper
Title : Information Extraction Technique: A Review
Country : India
Authors : Varsha pande || Dr. A. S. Khandelwal

Abstract: Now days, various digital information available electronically hasmade the organization of textual information into an important task. Text mining concerns looking for patterns in unstructuredtext. The Information Extraction (IE) is a technique that aims to extract the namesof entities and objects from text and to identify the rolesthat they play inevent descriptions. An IE system generally focusses on a specific domain or topic,searching only for information that is relevant to a user's interests.This paper presents the review of Information Extraction Technique.

Keywords:Text mining, Information extraction.

[1]. Mooney, U. Y. N. a. R. J., 2002. Text Mining with Information Extraction, Austin: s.n.
[3]. Nahm, U. Y., n.d. Text Mining with Information Extraction. s.l.:s.n.
[4]. Berners-Lee T, H. J. &. L. O., 2001. The Semantic Web ,Scientific american. s.l., s.n.
[5]. califf M. E., a. M. R. J., 1999. Relational learning of pattern-match rules for information extraction. Orlando, FL, s.n.
[6]. Grishman, R., 1997. Information Extraction: Techniques and Challenges. Berlin, Heidelberg, Springer-Verlag, pp. 10-27.
[7]. D, A. D. a. I., 1999. Introduction to Information Extraction Technology. IJCAI-99.

Paper Type : Research Paper
Title : Content Systemization using Naive Bayes Technique
Country : India
Authors : Isha Pandya || Deepti Theng

Abstract: In today's scenario, the internet is growing day-by-day. And so the data and information is growing large. More and more users rely on search engines. It is the need of the hour to improve the speed and efficiency of the search engine. When a user searches a query he should be able to get most relevant results in very less time. Therefore there is need to do content systemization for efficient and faster search. One of the efficient ways to achieve is to use a supervised learning algorithm called Naive Bayes algorithm.

Keywords: Content systemization, supervised learning, Naive Bayes Technique

[1]. Muhammad Husnain Zafar1 and Muhammad Ilyas2 ," A Clustering Based Study of Classification Algorithms ," International Journal of Database Theory and Application Vol.8, No.1 (2015)
[2]. Soumen Swarnakar1, Sangita Karmakar2 , " CONCEPT BASED CATEGORIZATION OF DOCUMENTS FOR SEARCH ENGINES "Volume: 04 Issue: 10 | Oct-2015
[3]. Teena Rani, Ankush Goyal ,"Survey of Clustering Techniques for Information Retrieval in Data Mining ", International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 4, April 2015
[4]. Khushboo Thakkar, Urmila Shrawankar, "Test Model for Text Categorization and Text Summarization" , International Journal on Computer Science and Engineering (IJCSE) ISSN :0975-3397 Vol. 3 No. 4 Apr 2011.
[5]. Bhumika1, Prof Sukhjit Singh Sehra2, Prof Anand Nayyar3, "A REVIEW PAPER ON ALGORITHMS USED FOR TEXT CLASSIFICATION", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 3, March 2013.

Paper Type : Research Paper
Title : Web Based Academic Smart System
Country : India
Authors : Miss. Rutuja Wankhede || Miss. Monika Gomase || Miss. Monika Sawarkar

Abstract: Web application for college automation is to start paperless work permanently. This web application will make system smarter. The principle idea of the system is used as platform in educational institute to manage academic details online and reduce iterative manual and paper based work. Our system also taken care of administrative actions required during management of academic details. It also focuses on the implementation of task engineering without disturbing the role hierarchy and their access rights policy........

Keywords: PHP, Smart System, SQL, Training and Placement, Web Application

[1]. Er. David A. Botwe and Joseph G. Davis, "A Comparative study of web development Technology using open source and properties software,"Vol.4, Issue 2, February 2015.
[2]. Akashat Mantra, Naina S. Rohra, Naman Varma, Nikita Gaikwad, and Prof. Sachin Godse, "Engineering Admission Counseling," International Journal of Advance Research in Computer and Communication, Vol.4, Issue 5, May 2015.
[3]. K. Sridevi and D. R. Umarani, "Web Personalization Approaches, A Survey," International Journal of Advance Research in Computer and Communication, Vol.2, Issue 3, March 2013.
[4]. Amandeep Kaur and Mrs. Shailja Kumari, "Secure Database Encryption Web Application," International Journal of Advance Research in Computer and Communication, Vol.3, Issue 7, July 2014.
[5]. Saurabh Walia, et. Al., "A Framework for Web Based Student Record Management System using PHP," Journal of Computer science and Mobile Computing, Vol.3, Issue 8, August 2014.

Paper Type : Research Paper
Title : Role of Ubiquitous Computing in Recent Computing Environment
Country : India
Authors : Dr. Pravin Ghosekar

Abstract: Ubiquitous computing (ubicomp) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. Ubiquitous computing (ubicomp) is a human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. In general, someone using ubiquitous computing may engage many computational devices and systems simultaneously, and may not necessarily aware that they are doing so. This model is usually considered advancement from the desktop paradigm......

Keywords - Ubicomp. distant vision, GPS, MEMS, Clay.

[1]. Abowd, G.D., & Mynatt, E.D. Charting past, present, and future research in ubiquitous computing. ACM Transactions on Computer-Human Interaction
[2]. ABOWD, G. D., BROTHERTON, J., AND BHALODIA, J. 1998b. Automated capture, integration, and visualization of multiple media streams. In Proceedings of the 1998 IEEE Conference on Multimedia and Computing Systems (San Antonio, TX), IEEE Computer Society Press, Los Alamitos, CA, 54–63
[3]. Bergman, E. Information appliances and beyond. San Francisco: Morgan Kauffman.
[4]. Daniel Minali, Emma Minali, Web Commerce Technology Handbooks.
[5]. R.K. Jena, Trends in Information Technology & Business Intelligence

IOSR Journals are published both in online and print versions.