IOSR Journal of Computer Engineering (IOSR-JCE)

Recent Trends in Computer Technology & Communication 2k16" (RTCTC-2k16)

Volume 2

Paper Type : Research Paper
Title : Activity Prediction Using Truval Method in Mobile Social Network
Country : India
Authors : Godse Vikas || Suryawanshi Sagar || Nachan Prashant || Mahajan Devyani ||
Kapade N. V.

Abstract: Now a day's current trend is online social network turning towards the mobile. Mobile social networks directly reflect on our real social life, since there are an important source to analyze , understand the underlying dynamics of an human behaviors like (activities). In this report, we are going to study the problems of the activity prediction in mobile social networks using trueval method. We presenting a series of observations in two real mobile social network and then propose a method, ACTPred, based on the dynamic factor-graph model for modeling and predicting the user activities. An approximate algorithm based on mean field method presented an
efficiently learn the proposed method. We are going to deploy a real system to collect user mobility behaviors , validate the proposed method on two combines mobile datasets. Shows that the proposed ACTPred model can be achieve better performance than baseline methods.

[1] M. Granovetter, "The strength of weak ties, American Journal of Sociology", vol. 78, no. 6, pp. 1360-1380,
1973.
[2] D. Krackhardt, "The strength of strong ties: The importance of philos in networks and organization, in
Networks and Organizations", N. Nohria and R. G. Eccles, Eds. Cambridge, USA: Harvard Business School
Press,1992, pp. 216-239.
[3] J. Neville and D. Jensen, "Iterative classification in relational data, in Proc. AAAI‟00", Austin, USA, 2000,
pp. 13-20.


Paper Type : Research Paper
Title : Reliable Data Transmission to Mobile Cloud Computing From
Wireless Sensor Network
Country : India
Authors : Vajpeyi Amey || Wagh Anjali || Patil Payal || A. A. Pundlik

Abstract:The combination of ubiquitous wireless sensor Network (W.S.N.) and powerful mobile cloud computing M.C.C. is an investigation topic that is fascinating growing attention in both academic and usefulness. In this new example, WSN delivers data to the cloud and moveable users demand data from the cloud. To provision applications involving W.S.N.-M.C.C. combination, which need to dependably offer data that are more useful to the moveable users from W.S.N. to cloud, this paper first recognizes the critical problems that disturb the helpfulness of sensory data and the dependability of W.S.N., then suggests a novel W.S.N.-M.C.C.

[1]. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ``Wireless sensor networks: A survey,'' Computer. Network. vol. 38, no. 4, pp. 393_422, Mar. 2002.
[2]. M. Li and Y. Liu, ``Underground coal mine monitoring with wireless sensor Networks,'' ACM Trans. Sensor Network. vol. 5, no. 2, Mar. 2009, Art. ID 10.

Paper Type : Research Paper
Title : Privacy-Preserving Data Leak Detection
Country : India
Authors : Nitin Naik || Aniket Nikam || Narendra Patil || K.V.Ugale

Abstract:Among différent data-leakage examples, man-like mistakes are one of the main causes of data loss. There have existence answers sensing indentent sensitive information for computer leak cause by man like mistake and to make ready for organisations. A common move near by is to screen what is in place for storing and send (power and so on) for made open to sensitive information. Such a move near usually has need of the detecting operation to be guided in secrecy. However, this secretiveness thing need is hard to give what is desired, need to in familiarization, as discovery serve may be put at risk. In this paper, we present a right not to be public keeping harmless data-leak discovery (OLD) answer to get answer to the question under expansion where a special group of sensitive knowledge for computer goes through process of digestion is use in discovery.

[1] J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T.Kohno, "Privacy oracle: A system for
finding application leaks with black box differential testing", in Proc. 15th ACM Conf. Comput.
Commun.
[2] Secur., 2008, pp. 279288
[3] A. Z. Broder, Some applications of Rabins fingerprinting method, in Sequences II. New York, NY, USA:
Springer-Verlag, 1993, pp. 143152.
[4] X. Shu and D. Yao, "Data leak detection as a service", in Proc. 8th Int. Conf. Secur. Privacy Commun.
Netw., 2012, pp. 222240.
[5] A. Z. Broder, M. Charikar, A. M. Frieze, and M. Mitzenmacher," Minwise independent permutations", J.
Comput. Syst. Sci., vol. 60, no. 3, pp. 630659, 2000.


Paper Type : Research Paper
Title : Location Tracking And Positioning In Dtns(Disruption Tolerant Network)
Country : India
Authors : N.B. Upadhyay || S.V. Wagh || N.M.Gandhi || S.R. Kathkade || R.M.Shaikh

Abstract:As the vast research in the field of technology increases, location dependent applications becomes highly important as positioning and tracking of mobile devices plays an important role in context aware and pervasive services. While physical localization and logical localization for satellite has been highly and extensively researched, networks with fixed reference points like GSM and WiFi are densely deployed and tracking and positioning techniques in Sparse Disruption Tolerant Networks (DTN) have not been well
researched. In this paper, we propose a cooperative and localized method called Pulse Counting for DTN localization and a probability based tracking method called Prob Tracking to solve the problem.

[1]. K. Fall, delay-tolerant network architecture for challenged internets," in Proc. ACM Conf. Appl.,
Technol., Architect. Protocols Comput.Commun., 2003, pp. 27–34.
[2]. A. Lindgren, A. Doria, E. Davies, and S. Grasic, "Probabilistic routing protocol for intermittently
connected networks," RFC 6603, Internet Research Task Force, Aug. 2012.
[3]. S. Gaonkar, J. Li, R. R. Choudhury, L. Cox, and A. Schmidt, "Micro-blog: Sharing and querying content
through mobile phones and social participation," in Proc. 6th Int. Conf. Mobile Syst., Appl., Serv., 2008,
pp. 174–186.
[4]. E. D. Kaplan, Understanding GPS Principles and Applications. Norwood, MA, USA: Artech House, Feb.
1996.
[5]. J. Soubielle, I. Fijalkow, P. Duvaut, and A. Bibaut, "GPS positioning in a multipath environment," IEEE
Trans. Signal Processing, vol. 50, no. 1, pp. 141–150, Jan. 2002.


Paper Type : Research Paper
Title : Avoid Duplication in Cloud System with Improved Security AND Reliability
Country : India
Authors : Shweta V. Jondhale || Amita S. Jadhav || Priyanka B. Dhanwate || Rohini. R.
Watane

Abstract:Data duplication is technique has been widely used in a cloud to reduce storage space and upload bandwidth. This technique is also used for eliminating duplicate copies of data. However, in cloud only one copy of each file is stored even if each file is owned by a huge number of users. The duplication system improves storage utilization but it reducing reliability, according to user. Furthermore, in above challenges the Data duplication is a technique has been widely used in cloud servers that are data storage makes first attempt
for formalize notation of distributed reliable duplication system..

[1]. Mohini Ramesh Vikhe, Prof.Dr.KishorKinage, Prof.Jyoti Malhotra, "Secure De-duplication with Efficient and
Reliable Convergent Key Management",IEEE Transaction, VOL.25, NO. 6, pp. 1615-1625 June 2014.
[2]. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, "A Hybrid cloud approach for secure authorized
de-duplication"IEEE Transaction, VOL:PP NO:99 Year 2014.
[3]. Jidong Xiao, Zhang Xu, HaiHuangy,Haining Wang, "Security Implication of memoryDe-duplication in a Virtualized
Environment", in procYear 2013.
[4]. Zhifeng Xiao and Yang Xiao, "Security and Privacy in Cloud Computing",IEEE Communication Surveys and
Tutorial, VOL. 15, NO. 2, pp. 843-859, Second Quarter 2013.
[5]. Hsiao-Ying Lin and Wen-GueyTzeng, "A Secure Erasure code-based cloud storage system with secure data
forwarding",IEEE Transactions, VOL. 23, NO. 6, pp. 995-1003, JUNE 2012.


Paper Type : Research Paper
Title : Parallel Network File System with Authenticated Key Exchange Protocols
Country : India
Authors : Singh Vivek kumar R. || Ahire Akash R. || Singh Vikas J. || Shaikh Faiz I ||
P.V.Nagare

Abstract: We study the problem of key generation for secure many to many communications. The problem is raised by the proliferation of large scale distributed file system supporting parallel access to multiple storage devices. Our work focuses on current Internet standards for such file systems, i.e. the parallel Network File System (pNFS), which makes use of Kerberos to establish parallel session keys between client and storage devices. Our review of the existing Kerberos-based protocol has a number of limitations: (i) a metadata server facilitating key exchange between clients and storage devices has heavy workload which restricts the scalability of the protocol; (ii) the protocol does not provide forward secrecy; (iii) metadata server establish itself all the session keys that are used between the clients and storage devices, and this inherently leads to the key escrow. In this paper, we propose a variety of authenticated key exchange protocols that are designed to address above issues. We show that our protocols are capable of reducing up to approximately 54% of workload of a metadata server and concurrently supporting forward secrecy and escrow-freeness.

Keywords: Parallel sessions, authenticated key exchange, network file systems(NFS), forward secrecy, key escrow.

[1] Qi Xie1*, Bin Hu1*, Na Dong1, Duncan S. Wong2., "Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems."
[2] Michel Abdalla, David Pointcheval., "Simple Password-Based Encrypted Key Exchange Protocols.
[3] A.Sai Kumar **P. Subhadra., "User Authentication to Provide Security against Online Guessing Attacks."
[4] Anupam Datta1, Ante Derek1, John C. Mitchell1, and Bogdan Warinschi2., "Key Exchange Protocols: Security Definition, Proof Method and Applications ."
[5] R.S.RamPriya, M.A.Maffina., "A Secured and Authenticated Message Passing Interface for Distributed Clusters."
[6] Feng Hao1 and Peter Ryan2., "J-PAKE: Authenticated Key Exchange Without PKI"
[7] Bruno Blanchet., "Automatically Verified Mechanized Proof of One-Encryption Key Exchange"
[8] Feng Hao1 and Peter Ryan2.,"Password Authenticated Key Exchange by Juggling"


Paper Type : Research Paper
Title : Design of Vehicle To Vehicle Data Transmission Application Using Li-Fi Technology
Country : India
Authors : D.V.Charahte || P. R. Wagh || P. V. Avhad || S. V. Mankar || N.S.Mankar

Abstract:Vehicle to vehicle data transmission, we present initial designs and results of a small-scale prototype using light fidelity (Li-Fi) technology, a new technology that was developed in the last few years, which still needs more systematic inquiry on its sustainability for outdoor vehicular networks. Vehicle to vehicle communication is the most effective solution we have used in order to reduce vehicle's accidents. The propose use of Li-Fi technology comprises mainly light-emitting diode (LED) bulbs as means of connectivity by sending
data through light spectrum as an optical wireless medium for signal propagation. In fact, the usage of light emitting diode (LED) eliminates the need of complex wireless networks and protocols. The design system is aim to ensure a highly-reliable communication between a commercial LED-based transaction light and a receiver mount on a vehicle.
Keywords: light emitting diode, photodiode, vehicle to vehicle communication, visible light communication.

[1] Kiyoshi MIZUI, Masao NAKAGAWA, "Vehicle-to-Vehicle Multi Target Communication and Ranging System using Spread Spectrum Technique.
[2] Lina Altoaimy, Imad Mahgoub, and Monika Rathod, "Weighted Localization in Vehicular Ad Hoc Networks Using Vehicle-to-Vehicle Communication".
[3] Alin-M. Cailean, Barthélemy Cagneau, Luc Chassagne, Suat Topsu, "Design and implementation of a visible light communications system For vehicle application" , November 2013.
[4] Shubham Chatterjee, Shalabh Agarwal, "Scope and Challenges in Light Fidelity(LiFi) Technology in Wireless Data Communication", June 2015.
[5] Akshata msonnad, anjana gopan, "Recent advancements in li-fi technology", Dec-2013.
[6] Aman Sodhi, Jeslin Johnson, "Light Fidelity (LI-FI) - The Future of Visible Light Communication", March-April 2015.


Paper Type : Research Paper
Title : User Location Provenance Witness And Proxy Generation Framework.
Country : India
Authors : Jadhav Pallavi S. || Khalkar Supriya S. || Randhavane Sonali B. || Joshi Sunil R.||
Singh Seema A.

Abstract: During the last few years, usage of mobile phones as an authorized work and various institutes use mobile devices as an expert communication. Location based services allow users to provide a physical location provenance proof and privacy protection. Our framework maintains a privacy of data sharing and provides witness proof. It is a significant challenge to generate provenance witness and generate a proxy in one fabric. So far propose system accomplish the framework requirement. We are producing a different framework for location specific secure data sharing, which will afford user location proofs generation and proxy location. It is ready-to- deploy framework for secure, witness-oriented, and provenance preserving location proofs.

[1]. Antorweep Chakravorty, Tomasz Wlodarczyk, Chunming Rong, "Privacy-Preserving P2P Data Sharing with OneSwarm" SIGCOMM'10, August 30–September 3, 2010.
[2]. Antorweep Chakravorty, Tomasz Wlodarczyk, Chunming Rong, "Privacy Preserving Data Analytics for Smart Homes" Department of Computer & Electrical Engineering, 2013.
[3]. Larry A. Dunning, Member, IEEE, and RayKresman, "Privacy Preserving Data Sharing With Anonymous ID Assignment" Department of Computer Science, Bowling Green State University, 2013.
[4]. Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang, "Privacy Preserving Mining of Association Rules From Outsourced Transaction Databases" University of British Columbia, Vancouver, Canada, 2013.
[5]. Stanislav Mamonov &Raquel Benbunan-Fich, " Factors Affecting Perceptions of Privacy Breach among
Smartphone Application Users" 2014 47th Hawaii International Conference on System Science. [6]. Adrian Z.Y. Tan, Wen Yong Chua &Klarissa T.T. Chang, "Location Based Services and Information Privacy Concerns among Literate and Semi-Literate Users", 2014 47th Hawaii International Conference on System Science.


Paper Type : Research Paper
Title : Content-Based Image Retrieval Using Features Extracted From Block Truncation Coding
Country : India
Authors : Sanket Shinde || Manish Badgujar || Ashish Vishwakarma || Pravin Avhad || Prof.
R. M. Shaikh

Abstract:In our paper the technique accustomed Content primarily based Image Retrieval (CBIR) by victimization the ODBTC for generation of pictures. During this formula actual image can get regenerate in RGB (Red, Green, and Blue) format and its applicable icon image format. There are 2 image options are planned to associate index image, color co-occurrence feature and Bit Pattern Image, those are inherit from ODBTC formula encoded knowledge stream with none coding method. BPF and CCF are merely inherit from 2
ODBTC quantizer additionally icon. Planned technique is better-quality techniques to dam truncation cryptography image retrievals theme and any earlier ways, furthermore because it proves to facilitate ODBTC structure isn't solely applicable for image firmness, since its straight forwardness; aside from it propose untroubled and economical descriptor to index pictures in CBIR structure.

[1] ZHOU Yiming, "Fast Fractal Image Encoding Using an Improved Search Scheme", TSINGHUA SCIENCE AND TECHNOLOGY ISSN 1007-0214 15/19 pp602-606 Volume 12, Number 5, October 2007.
[2] LI Xiaowen, ZHANG Milin, WANG Zhihua, Amine Bermak, "Smart Image Sensor with Integrated Low Complexity Image Processing for Wireless Endoscope Capsules", TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll06/18llpp586-592 Volume 14, Number 5, October 2009.
[3] Manimala Singha, K.Hemachandran, "Content Based Image Retrieval using Color and Texture", An International Journal (SIPIJ) Vol.3, No.1, February 2012.
[4] P.Jayaprabha and Rm. Somasundaram," Content Based Image Retrieval Methods Using Graphical Image Retrieval Algorithm (GIRA)", COMPUTER SCIENCE AND APPLICATION, VOL. 1, NO. 1, JANUARY, 2012.
[5] Jianji Wang, Student Member, IEEE, and Nanning Zheng, Fellow, IEEE,"A Novel Fractal Image Compression Scheme with Block Classification and Sorting Based on Pearson's Correlation Coefficient", IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 9, SEPTEMBER 2013


Paper Type : Research Paper
Title : Advanced Security System Using Bluetooth
Country : India
Authors : Jadhav . S. N. || Lokhnade .B.V. || Pawar. D. S. || Somwanshi.S. R

Abstract:Security is a prime concern in our day to day life. Everyone wants to be as secure as possible and also want to keep their valuables very safe. Access control forms a very integral part of the system. Over here we have made a very unique kind of security system comprising of a Bluetooth based embedded hardware and an android based software.
Keywords: Bluetooth, ISM Band, Microcontroller, Personal Area Network [PSN], Security System, UHF Radio Wave

[1] C.S.R.Prabhu & A .Pratap Reddy, "Bluetooth technology and its applications".
[2] Enthil Kumar's & Padmavathy.N, "Android Based Security and Remote Surveilance Systems
",Department of Electrical and Electronics Engineering, G.K.M College of Engineering.
[3] Ming Yan and Hao Shi, "Smart Living Using Bluetooth-Based Android SMARTPHONE" , College of
Engineering and Science, Victoria University, Melbourne, Australia, International journal.[2]
[4] Sayyed Hussain Raza, Naqvi Sayyed Muhammad, Tahir Raza Muhammad Umer, Rahmed Khan, "Home
Automation via Bluetooth (using android platform)"
[5] Josh Potts and Somsak Sukittanon "Exploiting Bluetooth on Android Mobile Devices for Home Security
Application." University of Tennessee at Martin Department of Engineering Martin, TN USA.[4].


Paper Type : Research Paper
Title : Micro Controller Based Ph Meter using magnetic stirrer
Country : India
Authors : A.V.Gangurde || SmitaS.Pagar || Ashish V. Kadam || Roshan S. Ghodke

Abstract:A pH Meter is an electronic device which is used for measuring the pH. The pH is either the concentration of Hydrogen ions in an aqueous solution or the active number of Hydrogen ions in an aqueous solution. The pH scale canmeasure that how acidic or basic a solution is. The pH scale has range of from 0 to 14. A pH 7 of solution is neutral;A pH less than 7 of the solution is acidic. A pH greater than 7 of solution is basic. pH is defined as the negative logarithm of the hydrogen ion concentration [2].Using digital pH meter we get the numerical value of pH with more accuracy where as in conventional methods we get only indication that the solution is alkaline or base. As it gives the exact number of pH so it is easy to maintain the solution at neutral level. Also it gives the accuracy up to 0.01 %. In thisworkweused a magneticstirrer or mixer whichisemployed forrotatingthe magneticfieldfor stirring the solution whilesensing the hydrogen ion concentration.
Keywords: Hydrogen ions, Magnetic stirrer, pH Sensor, pH, pH meter

[1]. PK Glasoe, FA Long - The Journal of Physical Chemistry, 1960 - ACS Publication all-about-ph.com/phmeter-
calibration.html Development of the Beckman pH Meter". National Historic Chemical
Landmarks.AmericanChemical Society. Retrieved March 25, 2013
[2]. P Pillay, R Krishnan - Industry Applications, IEEE Transactions …, 1989 - ieeexplore.ieee.org Arthur
Rosinger (June 6, 1944). "Magnetic Stirrer".United States Patent Office.Retrieved 16 February 2013.
[3]. Arnold Thackray and Minor Myers, Jr. ; foreword by James D. Watson. (2000). Arnold O. Beckman :
one hundred years of excellence. Philadelphia, Pa.: Chemical Heritage Foundation.ISBN 978-0-941901-
23-9.
[4]. Ohio Electric Motors. DC Series Motors: High Starting Torque but No Load Operation Ill-Advised. Ohio
Electric Motors, 2011. Archived 20 July 2011 at WebCi


Paper Type : Research Paper
Title : Integration of Two Pokayoke's for O-ring Detection & Nozzle Projection
Country : India
Authors : Sagar H. Atram || Ganesh G. Gaikwad || Tejas S. Joshi || A.R.Kaushik

Abstract:The injector is likely to be said as an heart of any engine which contributes in injecting fuel with desired specification. The injector manufacturing involves various discrete processes. Within view to recent customer complaints of o-ring missing and inaccurate nozzle projection possessing an error percentage of two percent for which the traditional manufacturing processes misses the mark/comes to grief thereby in order to prevail over these drawbacks system integration is proposed, wherein o-ring detection and nozzle projection is done in one process cycle, which not only detects o-ring but also computes exact nozzle projection of required
specification with respect to thresholds preset. The system integration minimizes human errors if any as it does not allow any bypass of faulty product.

[1] Diesel Fuel Injection published by Robert Bosch GmbH, 1994.
[2] T. Karkoszka , J. Honorowicz, Kaizen philosophy a manner of continuous improvement of processes and
products, AMME, VOLUME 35,ISSUE 2,August-2009.
[3] Gratiela Dana BOCA, North University Baia Mare, "Kaizen Method in Production Management",
International Scientific Conference YOUNG SCIENTISTS 2011.
[4] M. Dudek-Burlikowska, D. Szewieczek, "The Poka-Yoke method as an improving quality tool of
operations in the process", AMME, VOLUME 36, ISSUE 1, September-2009.
[5] Aguinaldo dos Santos and James Powell, "Potential of Poka-yoke Devices to Reduce Variability in
Construction," Potential of Poka-Yoke Devices to Reduce Variability in Construction Proceedings.



IOSR Journals are published both in online and print versions.