IOSR Journal of Computer Engineering (IOSR-JCE)

Recent Trends in Computer Technology & Communication 2k16" (RTCTC-2k16)

Volume 1

Paper Type : Research Paper
Title : FoCUS: System to Learn Crawl Web Forum
Country : India
Authors : S.S.Pophale || Andhale Asmita B || Auti Pallavi S || Gaikwad Akshata S ||
Gavhane Pooja S

Abstract:FoCUS is Forum Crawler Under Supervision. The main aim of the system is to give only relevant content from forum and minimize the overhead. In that user can give request to forum and user can exchange information by using forum. Forum have implicit navigation paths using specific URL type from entry page to thread page. From observation system reduce forum crawling problem by using URL type recognition problem. System also use regular expression pattern. FoCUS design for learning ITF regexe explicitly. FoCUS learns EIT path and ITF regexe from forum. Forum automatically collect index URL, Thread URL and page flipping URL
into training set.
Keywords– Forum crawler, ITF regexe, Page Type, URL Type..

[1] Y. Zhai and B. Liu. Structured Data Extraction from the Web based on Partial Tree Alignment. IEEE Trans.
Knowl. Data Eng., 7(12):314−328, 206.
[2] J.-M. Yang, R. Cai, Y. Wang, J. Zhu, L. Zhang, and W. –Y.Ma. Incorporating Site-Level Knowledge to
Extract Structured Data from Web Forums. In Proc. of 7th WWW, pages 71-190, 209.
[3] X.Y. Song, J. Liu, Y.B. Cao, and C.-Y. Lin. Automatic Extraction of Web Data Records Containing
User-Generated Content. In Proc. of 19th CIKM, pages 39-48, 210.
[4] Z. Bar-Yossef, I. Keidar, and U. Schonfeld. Do not crawl In the DUST: different URLs with similar text. In
Proc. of 3thWWW, pages 111-12, 207.

Paper Type : Research Paper
Title : Dynamic Query Forms for Database Queries
Country : India
Authors : Dekshmukh.G || Kolase.A || Koshti.S || Varma. P || G.M.Dahane

Abstract:Database maintains a large and heterogeneous data, with large number of relations and attributes. This query form is one of the most widely use user interface for querying database. Traditional predefine query form are not able to satisfy various ad-hoc for user on those database. It is very difficult to design a set of static query forms to assure various ad-hoc database questions lying on that complex database. There is a need of such system which generates query form dynamically according to the users need at run time. Main purpose
on this paper is to generate Random query formulation for database queries, a novel database query from interface, which is able to dynamically produce query forms, for both relational and non-relational data
Keywords: Database, Random query, Dynamic Query, relational data

[1] Liang Tang, Tao Li, Yexi Jiang, and Zhiyuan Chen Paper: "Dynamic Query Forms for Database
[2] Gopi Krishna Lakkasani Balakrishna Nayudori Paper " Random Query Formulation for Database
Queries " .
[3] Priyanka P. Nikam Paper "A Review on Dynamic Query Forms for Database Queries"

Paper Type : Research Paper
Title : Design of Model Predictive Controller for Level Process
Country : India
Authors : B.V.Anarase || B. J. Parvat

Abstract:The objective of this study is to investigate the Model predictive control (MPC) strategy, analyze and compare the control effects with Proportional-Integral-Derivative (PID) control strategy in maintaining a water level system. An advanced control method, MPC has been widely used and well received in a wide variety of applications in process control, it utilizes an explicit process model to predict the future response of a process and solve an optimal control problem with a finite horizon at each sampling instant. In this project, we first designed and built up a closed-loop water level system. Next, we modeled the system and linerized the model
for simplification in the analysis and design..

1] J.G. Ziegler and Nichols, "Optimal Settings for Automatic Controllers", Trans. ASME, vol. 64 P.P. 759- 768, 1942
[2] K.J. Astrom and T. Hagglund, "Automatic Tuning of PID Controllers", 1st ed. Research Triangle Park, NC: Instrum.Soc. Amer, 1988
[3] J.Prakash and K.Srinivasan, "Design of nonlinear PID controller and nonlinear model predictive
controller for a continuous stirred tank reactor", ISA transactions, Vol.48, issue 3, July 2009, page no. 273 – 282.
[4] K.Vijayakumar, T. Manigandan, "High Performance Model Predictive Controller for Non-Linear Temperature Process", European Journal of Scientific Research, ISSN .1450-216X.vol.78 No.1 (2012), PP. 65-73.
[5] Saeed Tawakoni, Mahdi Tavakoli, " Optimal Tuning of PID Controller for First Order Plus Time Delay Models Using Dimensional Analysis", The Fourth International Conference on Control and Automation (ICCA‟ 03), 10-12 June 2003 , Montreal, Canada.

Paper Type : Research Paper
Title : Microcontroller Based Maximum Electricity Demand Controller
Country : India
Authors : M.U.Bhadane || P.R.Rahatal || K.S.Taskar || A.S.Jain

Abstract:This project is to introduce an idea of a controller which it to be operated as a demand controller by using a microcontroller to save the energy of the device to use it as a further savior of consumption of heat and electricity. This project helps us to reduce the certain amount of uncertainties caused by usage of excess amount of device which makes it very mechanical for any human being to use. This project also helps us to increase the market value of the devices having less electrical and mechanical equipments for the operation to be carried out for the industrial purpose. In thermal over load protection system the if the temperature of the transformer is increased beyond the safe value, the transformer quickly disconnected from the system. It is done by the insertion of the control circuit in the secondary winding. This inserted circuit senses the temperature of the transformer and according to the temperature of the transformer it will work. This control circuit again senses the temperature of the transformer and if these temperature is normal then these circuit will connect the transformer to the system.

[1] International journal of Smart and Adaptive Over current Protection for distributed system with distributed generation.
[2] International journal of over current relay setting model for effective substation relay coordination.
[3] International journal over current and over voltage protection of permanent magnet brushless DC motor using wavelet analysis
[4] International journal thermal overload protection of distribution transformer.
[5] Basic electrical engineering: Arvind Mittal
[6] Principles of electronics: v. k. Mehta
[7] The 8051 Microcontroller and Embedded Systems: Muhammad Ali Mazidi

Paper Type : Research Paper
Title : Interactive Voice Response System for Three Phase Motor Protection, Control & Alert Using GSM Mobile with Android Application
Country : India
Authors : Sushama S. Punde || Deepak S.Handore || Ashwini M.Khadse || Tanmay
N.Kapse || Dhanashree S.Wagh

Abstract:Control system is a system where we can start and shut down the system when we want. That's the main difference between controlled and uncontrolled system. Our project aim is to make system more efficient and reliable. As the name suggest control is for controlling the three phase motor from remote place by using GSM mobile with android application, it will also detect there various fault like over voltage, dry run, sequential phase protection, under voltage etc and ensure that safe operation and provide instant status various way sms on mobile(message status),IVRS, android application etc .we used GSM network because it world-wide and operate our motor also transferring feedback Information through it thus the use of GSM network we don't need to establish extra equipment for networking. For eg. Instead GSM we used zigbee then we have to creating range and more costly, for more safety operation we provide unique identification number system, In agricultural sector we hope our project is become handy and cost effective to operate motor and give it's protection.

[1] V. Bhaskar and T. Gowri Manohar Department of E.E.E.,S.V. university, Tirupati,A.P. India Email:-
[2] R. Jadhav , P .Pandit, S .Pal, V .Risbud Department ECE, "Three Phase Motor Control Using GSM",
International Journal Of Innovative Research in electrical, electronic, instrument and control engineering
,vol.3,issue 5,may 2015.
[3] Professional Android TM Application Development (Published by Wiley Publishing, Inc.10475 Cross
point Boulevard Indianapolis, IN 46256) Copyright © 2009 by Wiley Publishing, Inc.,
Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-34471-2
[4] D. J. Gardner- Bonne au, and H. Blanchard (ed), "Human factors and voice interactive system "(Boston,
USA: Kluwer,2007)

Paper Type : Research Paper
Title : I2mapreduce: Incremental Map reduce For Mining Big Data
Country : India
Authors : S.S.Pophale || Shubham S. Lenekar || Pooja D. Mache || Pradnya N. Husale ||
Snehal N.Shinde

Abstract:Data is continuously arriving by different data generating factors like social network, online shopping, sensors, e-commerce etc. Because of this Big Data the results of data mining applications getting stale and disused over time. Fine-grain Incremental processing is a promising approach to reviving data mining results. I2MAPREDUCE: Fine-Grain Incremental Processing in big data mining a new incremental processing extension to Map Reduce, the most widely used framework for mining big data.

[1] Y. Zhang, S. Chen, Q. Wang, and G. Yu, "i2mapreduce: Incremental MapReduce for mining evolving big
data," CoRR, vol. abs/ 1501.04854, 2015.
[2] J. Dean and S. Ghemawat, "Mapreduce: Simplified data processing on large clusters," in Proc. 6th Conf.
Symp. Opear. Syst. Des. Implementation, 2004, p. 10.
[3] Y. Zhang, Q. Gao, L. Gao, and C. Wang, "imapreduce: A distrib- uted computing framework for iterative
computation," J. Grid Comput., vol. 10, no. 1, pp. 47–68, 2012.
[4] J. Ekanayake, H. Li, B. Zhang, T. Gunarathne, S.-H. Bae, J. Qiu, and G. Fox, "Twister: A runtime for
iterative mapreduce," in Proc. 19th ACM Symp. High Performance Distributed Comput., 2010, pp. 810–
[5] D. Peng and F. Dabek, "Large-scale incremental processing using distributed transactions and
notifications," in Proc. 9th USENIX Conf. Oper. Syst. Des. Implementation, 2010, pp. 1–15.

Paper Type : Research Paper
Title : Best Peer++: A Peer-To-Peer Based Large-Scale Data Processing Platform
Country : India
Authors : Tantak Ashlesha || Sugandhi Renuka || Thorve Rutuja || Mungse Abhilasha || G.
M. Dahane

Abstract:For sharing of information among the participating companies and facilitating collaboration in a certain industry sector where companies share a common interest the corporate network is used. It reduces companies operational costs and increases the revenues. the inter-company data sharing and processing posesunique challenges to such a data management system as like scalability, performance, throughput, and security. In our system we present BestPeer++, a system that provides elastic data sharing services for corporate network applications in the cloud based on BestPeer++ a peer-to-peer (P2P) based data management platform.

[1] K. Aberer, A. Datta, and M. Hauswirth,Route "Maintenance Overheads in DHT Overlays", in 6th
Workshop Distrib. Data Struct., 2004.
[2] Abouzeid, K. Bajda-Pawlikowski, D.J. Abadi, A. Rasin, and A. Silberschatz, "HadoopDB: An
Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads", Proc. VLDB
Endowment, vol. 2, no. 1, pp. 922-933, 2009.
[3] C.Batini, M.Lenzerini, and S. Navathe," A Comparative Analysis of Methodologies for Database Schema
Integration", ACM Computing Surveys, vol. 18, no. 4, pp. 323-364, 1986.
[4] D. Bermbach and S. Tai, "Eventual Consistency: How Soon is Eventual? An Evaluation of Amazon s3s
Consistency Behavior", in Proc. 6th Workshop Middleware Serv. Oriented Comput. (MW4SOC 11), pp.
1:1-1:6, NY, USA, 2011.

Paper Type : Research Paper
Title : Protected and Verifiable Policy Update for Big Data Access Control in the Cloud
Country :  
Authors : Vishnu R. Lembhe || Ravi A. Mule || Pratik R.Ponde || Tejas S. Yerguntla ||

Abstract:In computing environment, the storage of big data is major problem. So to overcome this store the big data in cloud because it has capabilities of storing largeamount of data and processing a high volume of user access requests. Cloud computinguse the Attribute Based Encryption (ABE) [3] for providing the end to end security forbig data in a cloud. Using this ABE policy, updating has been a challenging issue in the previous implementations, firstly data owners have to retrieve the data and thenre-encrypt the new access policy
and send back to the cloud .Due to this, high communication and computational burden was on the data owners. Soto overcome this problem of existing system here proposed a new system that dynamicallyupdates a policy for big data in the cloud. Data owners have to just check whether cipher text has been updated correctly or not.

[1] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control
of encrypted data, in CCS06. ACM, 2006, pp. 8998.
[2] A. Sahai, H. Seyalioglu, and B. Waters, Dynamic credentials and ciphertext delegation for attribute-based
encryption, in CRYPTO12. Springer, 2012, pp. 199217.
[3] A. B. Lewko and B. Waters, "Decentralizing attribute-based encryption,"
in EUROCRYPT'11. Springer, 2011, pp. 568–588.
[4] T. Jung, X.-Y.Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-authorities," in
INFOCOM'13. IEEE, 2013, pp. 2625–2633.

Paper Type : Research Paper
Title : New Approach for ID-Based Data Sharing Mechanism with Forward Security
Country : India
Authors : Are Akshay sunil || Davange Mayuri Bhausaheb || Dhage Diksha Nivrutti ||
Kalwane Ganesh Kaduba M/S. Kale M.N

Abstract:With the advancement in the cloud computing data sharing has never been easier, as well as An array of benefits to both the society and individuals provided by the shared data accurate analysis. When there is data sharing with a large number of participants on cloud several issues might considered, these issues may include efficiency, data integrity and also privacy of data owner by the system constructor To construct ananonymous as well as authentic data sharing system to the constructer is promised by the ring signature. Data owners data can be anonymously authenticate by itself, this data can be put into the cloud for storage or for analysis purpose allowed by it. Certificate verification process in the traditional public key infrastructure setting is more costly process. This process may turn to a bottleneck instead for this solution to be scalable. The need for certificate verification process eliminated by the ID-based) group(ring) signature.

[1]. Xinyi Huang, Joseph K. Liu+, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou, "Cost-
Effective Authentic and Anonymous Data Sharing with Forward Security", IEEE TRANSACTIONS

Paper Type : Research Paper
Title : Continuous Biometric Verification to Protect Interactive Login Sessions for Secure Internet Services
Country : India
Authors : Waghmare. S. D || More. A. B || Jahaurkar. S. A || Kasture. S.V || Dahane. G.M.

Abstract:Nowadays, it becomes serious concern to provide more security to web services. So, secure user authentication is the fundamental task in security systems. Traditionally, most of the systems are based on pairs of username and password which verifies the identity of user only at login phase. Once the user is identified with username and password, no checks are performed further during working sessions We explore the continuous user verification for the secure internet services using biometrics in the session management No checks are performed during working sessions, which are terminated by an explicit logout or expire after an idle activity period of the user However a single verification step is still deemed sufficient, and the identity of a user is considered immutable during the entire session.

[1]. CASHMA-"Context Aware Security by Hierarchical Multilevel Architectures", MIUR FIRB, 2005.
[2]. Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, PaoloLollini, Angelo Marguglio, Andrea Bondavalli,, "Continuous and
[3]. Transparent user identity verification for secure internet services", IEEE Transactions on Dependable and Secure Computing MAY/JUNE 2015.
[4]. L . Hong, A. Jain, and S. Pankanti, "Can Multibiometrics Improve Performance?" Proc. Workshop on Automatic Identification Advances Technologies (Auto ID '99) Summit, pp. 59-64, 1999.
[5]. [4] L. Montecchi, P. Lollini, A. Bondavalli, and E. La Mattina,"Quantitative Security Evaluation of a Multi-Biometric Authentication System", Proc. Int'l Conf. Computer Safety, Reliability and security, pp. 209-221, 2012.
[6]. S. Kumar, T. Sim, R. Janakiraman, and S. Zhang, "Using Continuous Biometric Verification to Protect Interactive Login Sessions" Proc. 21st Ann. Computer Security Applications Conf. (ACSAC '05), pp. 441-450, 2005.

Paper Type : Research Paper
Title : Applying Cipher Technique Using Key-Aggregate Searchable Method For Multi Data Sharing Via Cloud Storage
Country : India
Authors : Pawar .S.S. || Rayate .M.H. || Ghuge.P.R || Sonawane .A. S || A. A. Pundlik

Abstract:In cloud storage data sharing is the most valuable activity to perform necessary actions. In this article, we show how to share data with others in cloud database in an efficient, reliable, secure and scalable manner. We explain new public-key cryptography for efficient allocation of decryption rights for any set of cipher texts is possible that generate static-size encryption. The innovation is that one can collectively gather any set of secret keys makes them as compact as a single key, but surrounding the power of all the keys being collective at surrounding.

[1] Baojiang Cui, Zheli Liu and Lingyu Wang, "Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage ", Proc. IEEE Press, pp.year 2015.
[2] S. Yu, C. Wang, K. Ren, and W. Lou, " Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing ", Proc. IEEE INFOCOM, pp. 534-542, 2010.
[3] R. Lu, X. Lin, X. Liang, and X. Shen, " Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing ", Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.
[4] X. Song, D.Wagner, A. Perrig. "Practical techniques for searches on encrypted data ", IEEE Symposium on Security and Privacy, IEEE Press, pp. 44C55, 2000.
[5] D. Boneh, C. G, R. Ostrovsky, G. Persiano. "` Public Key Encryption with Keyword Search ", EUROCRYPT 2004, pp. 506C522, 2004.

Paper Type : Research Paper
Title : Target Opinion Words Based On the Word Alignment Model for Online Reviews
Country : India
Authors : P.S. Hire || S.A. Gangurde || S.A. Darade || B.J.Patil

Abstract:The important tasks of opinion mining is Mining opinion targets and words from the online reviews. The main component is to detect opinion relations between words. We study a novel approach, which looks for opinion relations in the form of alignment process. After that graph-based algorithm is study. And at the last, a candidate who has higher confidence those is extracted. As compared with other methods, this model is making the task of opinion relations, for large-span relations also. As Compared with the syntax method, the word alignment model is looks for negative effects of when we are looking for online texts. We can say that this model obtains better precision, As Compared to the traditional unsupervised alignment model. When we search for candidate confidence, we get to know that higher-degree vertices in the graph-based algorithm are decreasing the probability of the generation of error.

[1] M. Hu and B. Liu, "Mining and summarizing customer reviews," in Proc. 10th ACM SIGKDD Int. Conf.
Knowl. Discovery Data Mining, Seattle, WA, USA, 2004, pp. 168–177.
[2] F. Li, S. J. Pan, O. Jin, Q. Yang, and X. Zhu, "Cross-domain co extraction of sentiment and topic
lexicons," in Proc. 50th Annu. Meeting Assoc. Comput. Linguistics, Jeju, Korea, 2012, pp. 410419.
[3] L. Zhang, B. Liu, S. H. Lim, and E. O'Brien-Strain, "Extracting and ranking product features in opinion
documents," in Proc. 23th Int. Conf. Comput. Linguistics, Beijing, China, 2010, pp. 1462–1470.
[4] M. Hu and B. Liu, "Mining opinion features in customer reviews," in Proc. 19th Nat. Conf. Artif.Intell.,
San Jose, CA, USA, 2004, pp. 755–760.
[5] G. Qiu, B. Liu, J. Bu, and C. Che, "Expanding domain sentiment lexicon through double propagation," in
Proc. 21st Int. Jont Conf. Artif. Intell., Pasadena, CA, USA, 2009, pp. 1199–1204.

IOSR Journals are published both in online and print versions.