IOSR Journal of Computer Engineering (IOSR-JCE)

Recent Trends in Computer Technology & Communication 2k16" (RTCTC-2k16)

Volume 3

Paper Type : Research Paper
Title : Dynamic Solutions by Optimize Fine-grain Pricing Scheme
Country : India
Authors : Bachate Anuja B. || Borse Varunkumar D. || Bhalerao Shrikrishna R. || Patil
Pallavi D. || A. Y. Panpatil

Abstract: There are various types of pricing scheme in Cloud computing which are pay-as-you-go and subscription spot policy, but it is still suffer from wasteful payment because of coarse-gained pricing scheme. In this paper, we are going to implement an optimized fine-grained pricing scheme for those two strong issues are addressed: (1) The provider and customer gained benefit must contradict mutually (2) VM- maintenance overhead like startup cost is often too huge to be neglected. Not only can we gain a best charge in the suitable price choices that satisfies both customers and providers at the same time, but we also calculate a best-fit billing cycle to increase social welfare (i.e., the total of the charge reductions for every customers and the income gained by means of the provider).

[1] Arun Anandasivam, Stefan Buschek, Raj Kumar Buyyay,"A Heuristic Approach for Capacity Control in
Clouds" IEEE Conference on Commerce and Enterprise Computing, pp.90-97, 2009.
[2] Michael Mattess, Christian Vecchiola, and Rajkumar Buyya," Managing Peak Loads by Leasing Cloud
Infrastructure Services from a Spot Market" 12th IEEE International Conference on High Performance
Computing and Communications, pp.181-189, 2010.
[3] Varun Kamra, Kapil Sonawane, Pankaja Alappanavar," CLOUD COMPUTING AND IT'S PRICING
SCHEMES" ISSN: 0975-3397 Vol. 4 No., pp. 577-581, 04 April 2012.
[4] Bhanu Sharma, Ruppa K. Thulasiram, Parimala Thulasiraman, Saurabh K. Garg," Pricing Cloud
Compute Commodities: A Novel Financial Economic Model"12th IEEE/ACM International Symposium
on Cluster, Cloud and Grid Computing, pp. 451-457,2012
[5] K. L. Giridas, Shajin Nargunam," Optimal Resource Allocation Technique (ORAT) for Green Cloud
Computing" International Journal of Computer Applications Volume 55– No.5, pp.21-26, October 2012.
[6] May Roomi, Shaikha Ebrahim, Sabika Buqrais and Imtiaz Ahmad "Cloud Computing Pricing Models: A
Survey" International Journal of Grid and Distributed Computing Vol.6, No.5, pp.93-106, 2013.

Paper Type : Research Paper
Title : Context Based Predictor on Lossless and Lossy Compression
Country : India
Authors : Abhishek D. Nalkande || Yogita V. Mahajan || Pooja N. Apsunde || Shivani S.
Patil || P. R. Naoghare

Abstract:In Android devices, Memory management has become a major concern because it has significant impact on system performance and battery life. Also it is important to efficiently use and manage the internal and external memory space present inside the mobile operating system. So it is essential to make a facility that helps in reducing memory consumption. The proposed Classic Image Compression Algorithm compress the RGB color image using lossless Image Compression Algorithm with the help of predictive coding based on Color Quantization for Android Mobile Devices. Predictive coding is very effective for lossless image compression.

[1]. Jiantao Zhou, Xianming Liu, Oscar C. Au, Yuan Yan Tang." Designing an Efficient Image Encryption- Then-Compression System via Prediction Error Clustering and Random Permutation" JANUARY 2014.
[2]. Seyun Kim and Nam Ik." Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression" JANUARY 2014.
[3]. Diego Valsesia and Enrico Magli." A Novel Rate Control Algorithm for Onboard Predictive Coding of Multispectral and Hyper spectral Images" OCTOBER 2014.
[4]. Kai-jen Cheng and Jeffrey Dill." Lossless to Lossy Dual-Tree BEZW Compression for Hyper spectral Images" SEPTEMBER 2014.
[5]. Matthew G. Reyes, David L. Neuhoff, and Thrasyvoulos N. Pappas." Lossy Cutset Coding of Bi-level Images Based on Markov Random Fields" APRIL 2014.
[6]. Eugen Wige, Gilbert Yammine, Peter Amon, Andreas Hutter and André Kaup." In-Loop Noise- Filtered Prediction for High Efficiency Video Coding" JULY 2014.

Paper Type : Research Paper
Title : An Approach with Operation Box for the Performance Improvement of the Welding Robot
Country : India
Authors : Dehadray. B || Pawar M || Pandav D || Sayyad H.S || Elza Baby

Abstract:The robotic welding concept is beginning of the twenty first century because of to reduce the efforts of manual welding & to increase the need of high performance, high production rates, accuracy and Labor cost, automation has been adopted to the welding technology that were once the programmable logic controller (PLC) for large manufacturing plans are often familiar with their function. For small manufactures often did not want to invest in PLC hardware. Now in existing system we perform work of welding Robot with the help of operation box which is in built in robot controller unit this Robot controller can now handle many typical PLC functions, such as start-up and shut down sequence, fault diagnostics and including manual controls such operation box can used for communication from controller to Robot.

[1] Dinesh Kumar.R1, Elangovan.S2, Siva Shanmugam.N3, "Parametric Optimization Of Pulsed – Tig Welding Process In Butt Joining Of 304l Austenitic Stainless Steel Sheets" IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
[2] The International Journal of Robotics Research, Analytical Expression for the Inverted Inertia Matrix of Serial Robots, DOI:10.1177/027836499901800108 1999; 18; 116
[3] GROOVER, MIKELL P., 1939-Industrial Robotics., Ts191.8.G76 1986 629.8‟92 85-18453, ISBN 0-07- 024989-X.
[4] FU, K.S Robotics Control Sensing Vision And Intelligence Tj211.F82 1987 629.8‟92 86-7156, Isbn 0- 07-022625-3
[5] M.P.Groover, M.Weiss, R.N. Nagel and N.G.Odrey, "Industrial Robotics-Technology, Programming and Application", McGraw Hill, 1986.]

Paper Type : Research Paper
Title : Rf Based Wireless Notice board
Country : India
Authors : P.S.Sonawane || N.V.Bhamare || S.S.Bothe || S.S.Jadhav

Abstract:Devices commonly used to display various notices are the notice boards. This is designed to display scrolling messages for notice board. It can be used to display various latest information anywhere such as colleges, shops, railway stations and different types of places. Notice board is all about sticking different type of information. Sticking various notices day-to-day is difficult in our day- to -day life. A person is required separately to take care of this notice board.

1]. International Journal of Electrical, Electronics and Data Communication, ISSN: 2320- notice boards. Model wireless notice board system with GSM modem.
[2]. International journal of advanced technology in engineering and science, this method can be discarded by using wireless notice board to display. Books:
[3]. Let Us C -Fifth Edition: Yashavant P. Kanetkar Principles of electronics: v.k.mehta
[4]. The 8051 Microcontroller and Embedded Systems Using Assembly: Muhammad Ali Mazidi

Paper Type : Research Paper
Title : Microcontroller Based Visible Light Spectrometer
Country : India
Authors : Keshav Dhikale || Abhijeet Shimpi || Rushikesh Raut || D.A.Ghogare

Abstract: Visible spectroscopy is working based on the principle of Beer Lambert's Lam. It involves absorbance is directly proportional to intensity of the color and thickness of the medium. Visible Light wave length between 400nm to 800nm.
Keywords: Absorbance, Monocrometer, Spectrophotometer, Spectroscopy, Transmittance.

[1] Practical Absorption Spectrometry, Techniques in Visible and Ultraviolet Spectrometry: Volume 3,
Burgess, C.; Knowles, A., Eds.; Chapman and Hall: London, 1984.
[2] Levine, R.L.; Federici, M.M. "Quantification of aromatic Residues in proteins; model compounds for
second derivative Spectroscopy"; Biochemistry, 1982, 21, 2600–2606.
[3] Spectrophotometry and Light Scattering, United States Pharmacopoeia XXII,National Formulary,
XVII,theUnited States Pharmacopoeial Convention, Inc., Rockville, MD, 1990
[4] Maris M.A.; Brown, C.W.; Lavery, D.S. "Nonlinear Multicomponent analysis by Infrared
spectrophotometry"; Anal. Chem., 1983, 55, 1694.
[5] Practical Absorption Spectrometry, Techniques in Visible and Ultraviolet Spectrometry: Volume 3,
Burgess, C.; Knowles, A., Eds.; Chapman and Hall: London, 1984.
[6] Strong III, F.C. "Correlation of measurements of absorbance in the ultraviolet and Visible regions at
different slit widths"; Anal. Chem., 1976, 48, 2155.

Paper Type : Research Paper
Title : Improve Energy-Efficient Real-time Human Mobility State Classification Using Smartphone.
Country : India
Authors : Pooja D. Andhale || Chaitali R. Kakad || Madhuri P. Lokhande || Nikhil V.

Abstract: The advantage of using the embedded accelerometer of smartphone for human mobility analysis, with or without location tracking based upon GPS, Wi-Fi is that it is energy-efficient and has high availability. Using an accelerometer for human mobility analysis has its challenges as carrying our smartphones differently as well as the measurements are body placement dependent. And it often relies on an on-demand remote data exchange for processing; which is less energy-efficient and is not real-time. We're presenting a framework based upon an algorithm that reduces the effect of different smartphone on-body placements as well as orientations and allows human movements to be accurately and energy efficiently identified. Focusing the only use of embedded smartphone accelerometer without referencing previous data and accelerometer noise filtering, this method can identify the human mobility state.

[1]. I. Constandache, S. Gaonkar, M. Sayler, R. R. Choudhury, and L. Cox,"EnLoc: Energy -efficient
localization for mobile phones," in Proc. 28th IEEE Int. Conf. Comput. Commun., 2009, pp. 2716–
[2]. L. Bao, and S. S. Intille, "Activity recognition from user-annotated acceleration data," in Proc. 2nd Int
Conf. Pervasive Comput., 2004, pp. 1–17.
[3]. A. Ofstad, E. Nicholas, R. Szcodronski, and R. R. Choudhury, "AAMPL: Accelerometer aug mented
mobile phone localization," in Proc. 1st Int. Conf. Mobile Entity Localization Tracking GPS-Less
Envir., 2008, pp. 13–18.

Paper Type : Research Paper
Title : Fingerprint Image Reconstruction from Minutiae
Country : India
Authors : Pranali S. Patil || Komal Samdadiya || Gauresh R. Suryawanshi || Kishor P. Lokhande || Seema A. Singh

Abstract:For fingerprint matching the set of Minutiae is considered as the most distinct feature .
Reconstruction techniques illustrates the need for securing fingerprint templates and its interoperability, and
improving fingerprint fusion. Earlier it was considered that only minutiae set are not sufficient for
reconstructing the fingerprint .However, the recent studies have proved that through Minutiae set it is possible
to reconstruct the fingerprint. But still the matching accuracy between the original fingerprint image and its
corresponding reconstructed image has some difference.

[1] C. J. Hill, Risk of masquerade arising from the storage of biometrics, B.S. thesis, Dept. Comput. Sci.,
Austral. Nat. Univ., Canberra, ACT, Australia, 2001.
[2] A. Ross, J. Shah, and A. K. Jain, From template to image: Reconstructing fingerprints from minutiae
points, IEEE Trans. Pattern Anal.Mach. Intell., vol. 29, no. 4, pp. 544560, Apr. 2007.
[3] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, Fingerprint image recon- struction from standard
templates, IEEE Trans. Pattern Anal.Mach. Intell., vol. 29, no. 9, pp. 14891503, Sep. 2007.
[4] J. Feng and A. K. Jain, Fingerprint reconstruction: From minutiae to phase, IEEE Trans. Pattern Anal.
Mach. Intell., vol. 33, no. 2, pp. 209223, Feb. 2011.
[5] S. Li and A. C. Kot, An improved scheme for full fingerprint reconstruction, IEEE Trans. Inf. Forensics
Security, vol. 7, no. 6, pp. 19061912, Dec. 2012.

Paper Type : Research Paper
Title : Wireless based DC motor speed control using Zigbee
Country : India
Authors : Parthsarthi || M. B. Patel || S. J. Bora || B. U. Parihar

Abstract: Every system is automated in order to face new challenges in the present day situation. Automated systems have less manual operations, so that the flexibility, reliabilities are high and accurate. Hence every field prefers automated control systems. Especially in the field of electronics automated systems are doing better performance. Nowadays, there are lots of good-quality motor speed controls on the market. However, their costs are relatively high. A speed control with both low cost and good performance will be highly marketable, especially for small mobility applications. On the other hand, the wireless connectivity has a nature of low cost and less environmental limitations. Combining these ideas together, we came up with this paper.

[1] "Study on Zigbee technology" (ICECT) 2011 3rd international conference on (volume 6) page 296-301.
[2] .NALIN KANT MOHANTY, RANGANATH MUTHU "Microcontroller based PWM controlled motor
drive" Serbian journal of electrical engineering vol.7, No.2, November 2010 (195-204)
[3] SETHU PRIYAN, SELVARAJ.A, SURENDER.S (IJAREEIE)" wireless technology and Zigbee unit"
vol.3, Special Issue 2, April 2014.
"wireless personal area network & speed control dc motor unit" International journal of computer science
(0975-8887) volume 69-no 23, May 2013.

Paper Type : Research Paper
Title : A Novel Approach for Codeword Substitution Using Encrypted H.264/AVC Video Streams for Data Hiding
Country : India
Authors : Nikita Ramdas Bodke || Sandip Nathu Kapse || Jayashri Shantaram Khule ||
Premlata Uttam Shinde

Abstract: Digital videos are very most popular because of their frequency on their internet and to strictly preserve the size of file There are different types of techniques present for hiding secure data in videos. Digital video necessary to be stored in encrypted format. The purpose of content notation and or tampering these it is necessary to perform data hiding in these encrypted video. The data embedding in video following three parts that is H264 /AVC, video encryption, data insertion, data extraction. The working of the system have three stages, first the analyzing of H.264/AVC video the codewords of intraprediction modes, the codewords of motion vector differences, and the codewords of residual coefficients are encrypted with stream cipher. second data hider may embed additional data in the encrypted domain with codeword substitution technique, and also does not knowing the original video data.

[1] W. J. Lu, A. Varna, and M. Wu, "Secure video processing: Problems and challenges," in Proc. IEEE Int. Conf. Acoust., Speech,
Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
[2] B. Zhao, W. D. Kou, and H. Li, "Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,"
Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010.
[3] P. J. Zheng and J. W. Huang, "Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image
watermarking," inProc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
[4] W. Puech, M. Chaumont, and O. Strauss, "A reversible data hiding method for encrypted images," Proc. SPIE, vol. 6819 pp.
68191E-1–68191E-9, Jan. 2008.
[5] X. P. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process.Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.

Paper Type : Research Paper
Title : Facilitating document annotation using content value and query value
Country : India
Authors : Vaishnavi Mhaske || Gauri Kale || Rashmi Dashpute || Ashwini Yeole

Abstract: Document annotation is the task of adding metadata information in the document which is useful for information extraction. In many applications domain textual data contains significant amount of structured information which is in unstructured text. So that it is always difficult to find relevant information. This paper proposes, an adaptive technique that facilitates the generation of structured metadata by identifying documents containing information of interest. Such information is further useful for querying the database. This paper proposes survey on Collaborative Adaptive Data sharing platform (CADS) for document annotation and use of query workload to direct the annotation process. A key novelty of CADS is that it learns with time the most important data attributes of the application, and uses this knowledge to guide the data insertion and querying.
Keywords – Annotation, CADS, Key-pair value, Metadata, Unstructured data.

[1] Eduardo J. Ruiz, Vagelis Hristidis, and Panagiotis G. Ipeirotis,"Facilitating Document Annotation Using Content and Querying
[2] R. Fagin, A. Lotem, and M. Naor, "Optimal aggregation algorithms for middleware," J. Comput. Syst. Sci., vol. 66, pp. 614–656,
June 2003.
[3] S.R. Jeffery, M.J. Franklin, and A.Y. Halevy, "Pay-as-You-Go User Feedback for Dataspace Systems," Proc. ACM SIGMOD Int'l
Conf. Management Data, 2008.
[4] J.M. Ponte and W.B. Croft, "A Language Modeling Approach to Information Retrieval," Proc. 21st Ann. Int'l ACM SIGIR Conf.
Research and Development in Information Retrieval (SIGIR '98), pp. 275-281,
[5] R.T. Clemen and R.L. Winkler, "Unanimity and Compromise among Probability Forecasters," Management Science, vol. 36, pp.
[6] C.D. Manning, P. Raghavan, and H. Schu¨ tze, Introduction to Information Retrieval, first ed. Cambridge Univ.
[7] M. Franklin, A. Halevy, and D. Maier, "From Databases to Dataspaces: A New Abstraction for Information Management,"
SIGMOD Record, vol. 34, pp. 27-33,

Paper Type : Research Paper
Title : Steganography Based on Low Power Linear Feedback Shift Register's
Country : India
Authors : Rehna Abdul Salam || Elza Baby

Abstract: The linear feedback shift register is a core component in many electronics applications. A design modeled around LFSR often has both speed and area advantages over a functionality equivalent design that does not use LFSR's. But it is having a drawback in the area of power consumption. This is overcame in this project by adding clock-gating and then the power efficient LFSR is applied in a steganographic circuit. Steganography is a very relevant field now as the need to protect information is very important. Steganography
is the art and science of hiding information by embedding messages within a cover. It hides the presence of messages and creates a covert channel.

[1] M Walter Aloisi and Rosario Mita "Gated Clock Design Of Linear Feedback Shift Registers" IEE transactions on circuits and
systems-II:Express briefs,vol.55,june 2008
[2] Saeed Mahmoudpour and Sattar Mirzakuchakki "Hardware Architecture For A Message Hiding Algorithm With Novel
Randomizers" International journal of computer applications Vol.37, no.7,january 2012.
[3] R. Jain, "The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation
and Modeling:". New York: Wiley, 1991.
[4] R. David,"Random Testing of Digital Circuits. Theory and Application."New York: Marcel Dekker, 1998[9]
[5] S. Sannella ."Security Requirements for Cryptographic Modules" U.S. Department of Commerce, National Institute of Standard
and Technology, 2001, FIPS PUB 140-2.
[6] L.Wang and E. J. McCluskey, "Circuits for pseudoexhaustive test patterngeneration," IEEE Trans. Comput.-Aided Des., vol. 7, no.
10, pp.

Paper Type : Research Paper
Title : Mobile Ad-hoc Network Using P-Encryption Scheme
Country : India
Authors : Shraddha R. Satpute || Archita B. Deore || Pradnya R.Nandwalkar ||
Sagar B.Kothale || Kavita S.Kumavat

Abstract:As MANET edge closer toward wide-spread deployment, security issues have become a central concern and are increasingly important. Various security mechanisms have been proposed, widely used, and proven to be effective in wired networks, but no single mechanism provides all the services required in a MANET. Due to certain characteristics of MANETs, some security mechanisms are not applicable to this environment. These certain characteristics of ad hoc networks include: lack of a network infrastructure and
online administration, the dynamics of the network topology and node membership, the potential attacks from inside the network. an important issue in Mobile Ad Hoc Networks (MANETs) is Energy saving. the energy consumption can be reduced by network coding in MANETs by using less transmissions. However ,there are other sources of energy consumption, e.g., data encryption/decryption. To point this issue energy saving encryption scheme called Enhanced P-Coding is proposed for MANETs , by exploiting networking coding technique.

[1] P. Zhang, Y. Jiang, C. Lin, Y. Fan, and X. Shen, ''P-coding: Secure Network Coding Against Eavesdropping Attacks,'' in Proc.
IEEE INFOCOM, Mar. 2010, pp. 1-9.
[2] S. Singh, C. Raghavendra, and J. Stepanek, ''Power-Aware Broadcasting in Mobile Ad Hoc Networks,'' in Proc. IEEE PIMRC,
1999, pp. 1-10.

IOSR Journals are published both in online and print versions.