IOSR Journal of Computer Engineering (IOSR-JCE)

Innovation in engineering science and technology (NCIEST-2015)

Volume 2

Paper Type : Research Paper
Title : A Comparative study of Agile Software Development Methodology and traditional waterfall model
Country : India
Authors : Rupali Pravinkumar Pawar

Abstract:This paper will focus on traditional SDLC method like Waterfall model and will brief on comparative
study of same with Agile.
Traditional SDLC models like Waterfall model is sequential development methodology where output of
one development phase becomes input for other. To brief cons, like risk of failure are high and process itself is
not flexible for change.

1] K. Beck, Extreme Programming explained: Embrace change. Reading, Mass., Addison-Wesley, Nov16, 2004
[2] L. A. Williams, "The XP Programmer: The Few-Minutes Programmer", IEEE Software, pp. 16-20, May/June 2003
[3] K.Mar and K.Schwaber, "Experiences of using Scrum with XP", http://www.controlchaos.com/XPKane.htm, Accessed on 2/2/2005
[4] Robert C. Martin "Agile Software Development: Principles,Patterns and Practices"
[5] Alistair Cockburn "Agile Software Development: The Cooperative Game(2nd edition)
[6] Jim Highsmith "Agile Project Management:creating Innovative product" (2nd Edition)
[7] http://www.agilemanifesto.org
[8] http://www.agilesoftwaredevelopment.com


Paper Type : Research Paper
Title : A Survey on Bug triage with Data Reduction Technique
Country : India
Authors : Rucha Warade || Kanyakumari Pawar Pradnya Hande || Bhavana Ambadkar

Abstract:Software industries spend more than 45 percent of expense in managing programming bugs. An
unavoidable stride of altering bugs is bug triage, which expects to effectively allocate a designer to another bug.
To diminish the time cost in manual work, content characterization procedures are connected to direct
programmed bug triage. In this, we address the problem of information decrease for bug triage, i.e., how to
diminish the scale and enhance the nature of bug data. We join example choice with highlight determination to
at the same time lessen information scale on the bug measurement and the word measurement. To focus the
request of applying example choice and highlight determination, we separate properties from verifiable bug
information sets and construct a prescient model for bug information set..

[1] J. Anvik, L. Hiew, and G. C. Murphy, "Who should fix this bug?" in Proc. 28th Int. Conf. Softw. Eng., May 2006, pp. 361–370.
[2]. S. Artzi, A. Kie_zun, J. Dolby, F. Tip, D. Dig, A. Paradkar, and M. D. Ernst, "Finding bugs in web applications using dynamic test
generation and explicit-state model checking," IEEE Softw., vol. 36, no. 4, pp. 474–494, Jul./Aug. 2010.
[3]. J. Anvik and G. C. Murphy, "Reducing the effort of bug report triage: Recommenders for development-oriented decisions," ACM
Trans. Soft. Eng. Methodol., vol. 20, no. 3, article 10, Aug. 2011.
[4]. P. S. Bishnu and V. Bhattacherjee, "Software fault prediction using quad tree-based k-means clustering algorithm," IEEE Trans.
Knowl. Data Eng., vol. 24, no. 6, pp. 1146–1150, Jun. 2012.
[5]. G. Jeong, S. Kim, and T. Zimmermann, "Improving bug triage with tossing graphs," in Proc. Joint Meeting 12th Eur. Softw. Eng.
Conf. 17th ACM SIGSOFT Symp. Found. Softw. Eng., Aug. 2009, pp. 111–120.
[6]. A. E. Hassan, "The road ahead for mining software repositories," inProc. Front. Softw. Maintenance, Sep. 2008, pp. 48-57.
[7]. J. W. Park, M. W. Lee, J. Kim, S. W. Hwang, and S. Kim, "Costriage: A cost-aware triage algorithm for bug reporting systems,"
inProc. 25th Conf. Artif. Intell., Aug. 2011, pp. 139–144.
[8]. J. Xuan, H. Jiang, Z. Ren, and W. Zou, "Developer prioritization in bug repositories," in Proc. 34th Int. Conf. Softw. Eng., 2012,
pp. 25–35..


Paper Type : Research Paper
Title : Effect of Router Buffer on TCP/UDP Performance
Country : India
Authors : Ambhore P.G. || Mahajan S.G

Abstract:In data communication, congestion occurs when there are so many packets contending for
the limited shared resources, such as the queue buffer in the router at bottleneck link. During
congestion, large amount of packets experience delay or even be dropped due to the queue overflow.
Severe congestion problems result in degradation of the throughput and large packet loss rate. In
this paper, considering two popular queue management methods, Random Early Detection (RED) and
LALRED the analysis of throughput and packet loss rate for different buffer sizes is presented. The results
show that with increase in buffer size for RED, the throughput and efficiency of TCP increases. A l s o ,
UDP packet loss decreases with an increase in buffer size while the buffer size has no key impact on UDP
packet delays. Simulation results obtained using NS2 establish the improved performance of LALRED over the
RED and the graphs are plotted using GNU plot.

[1]. Mihaela Enachescu, Yashar Ganjali †, Ashish Goel‡, Nick McKeown†. ― Routers with Very Small Buffers‖
[2]. Neeraj Bhargava, Dr. Ritu Bhargava, Bharat Kumar,Shilpi Gupta, Naresh Kumar Senwaliya, Kamal Kumar Jyotiyana
―Implementation of TCP_Reno Algorithm in the ns2‖
[3]. Bonald,T. etal.‖ Analytic evaluation of RED Performance‖.Proceedings of the 19th Annual Joint Conference on the IEEE
Computer and Communications Societies,Mar. 26-30, IEEE Xplore Press, USA., pp:1415-1424.
[4]. Floyd S., R. Gummdi and S. Shenker. ―Adaptive RED: An algorithm for increasing the robustness of RED.‖2001‖.
[5]. NS - 2 Simulator tutorial ISI - documentation,[online] Available http:// www.isi.edu/nsnam/ns.
[6]. VINT DARPA-funded research project. [Online] Available: http://www.isi.edu/nsnam/vint.
[7]. Y.Gu, D. Towsley, C. V.Hallot a n d H.Zhang, ―Congestion Control For Small Buffer High Speed Networks,‖ Proc IEEE
INFOCOM, Alaska, USA, May 2007
[8]. S.Misra, B.J.Oommen and S.Yanamandra, ―Random Early Detection for Congestion Avoidance in Wired Networks: A
Discretized Pursuit Learning-Automata-Like Solution‖ IEEE Trans.on system ,man,and cybernetics—part B: cybernetics, vol. 40,
no. 1,February 2010

Paper Type : Research Paper
Title : A Overview on OODB Technology
Country : India
Authors : Bhushan M. Borhade || Dr. Abhijit Banubakode

Abstract:OODB technology an acronym for the 'object oriented database' technology is a database
management system that supports the modelling and creation of the data as objects. The evolution of the OODB
concepts arise from the easy and efficient way of accessing the object using the popular concepts of OOPS
i.e.'Encapsulation and Inheritance '.The objective of the paper is to have the overview of the OODB, its
comparison with RDBMS such as schema, class hierachy, intergrity constraints, query processing ,etc and
explore the areas for improvement in OODB for efficient performance.

[1] Bertino, E., Negri, M., Pelagatti, G., and Sbattella, L., "Object-Oriented Query Languages: The Notion and the Issues," IEEE
Transactions on Knowledge and Data Engineering, Vol. 4, No. 3, 1992.
[2] Khoshafian, S. Object-Oriented Databases, New York: John Wiley & Sons, 1993.
[3] Kim, W., "Object-Oriented Database Systems: Promises, Reality, and Future," in Modern Database Systems: The Object Model,
Interoperability and Beyond, pp. 255-280, Kim, W., ed., ACM Press, Addison Wesley, 1995.
[4] Brown, A.W., Object-Oriented Databases, Applications in Software Engineering. New York: McGraw-Hill, 1991.
[5] Abhijit Banubakode, "Optimization of Queries in the Object-Oriented Database Involving Path Expression"
[6] Dare Obasanjo "AN EXPLORATION OF OBJECT ORIENTED DATABASE MANAGEMENT SYSTEMS "
[7] Sikha Bagui, "Achievements and Weaknesses of Object-Oriented Databases"
[8] Won Kim, "Object-Oriented Database Systems: Promises, Reality, and Future"
[9] E.Bertino arid A.Quarati "An Approach to Support Method Invocations in Object-Oriented Queries "dipartimento di Mathematical -
Univeresita di Genova.


Paper Type : Research Paper
Title : Survey on: Categorization Techniques on the basis of on Evidential Reasoning
Country : India
Authors : Priyanka Deshpande || Dr. A.N.Banubakode

Abstract:It is studied in this paper that the arrangement of inadequate examples is an extremely testing
assignment in light of the fact that the article (inadequate example) with distinctive feasible estimations of
missing qualities may yield particular arrangement results. The insecurity (equivocalness) of grouping is for the
most part brought about by the absence of data of the missing information. Another model based credal
arrangement (PCC) system is proposed to manage deficient examples because of the conviction capacity
structure utilized traditionally as a part of evidential thinking approach. The class models got via preparing
tests are individually used to assess the missing qualities.

[1] P. Garcia-Laencina, J. Sancho-Gomez, and A. Figueiras-Vidal, "Pattern Classification with missing data: A review," Neural
Compute. Appl. vol. 19, no. 2, pp. 263–282, 2010.
[2] D. J. Mundfrom and A. Whitcomb, "Imputing missing values: The effect on the accuracy of classification," MLRV, vol. 25, no. 1,
pp. 13–19, 1998.
[3] A. Farhangfar, L. Kurgan, and J. Dy, "Impact of imputation of missing values on classification error for discrete data," Pattern
Recognit., vol. 41, no. 12, pp. 3692–3705, 2008.
[4] O. Troyanskaya et al., "Missing value estimation methods for DNA microarrays," Bioinformatics, vol. 17, no. 6, pp. 520–525,
2001.
[5] K. Pelckmans, J. D. Brabanter, J. A. K. Suykens, and B. D. Moor, "Handling missing values in support vector machine classifiers,"
Neural Netw., vol. 18, nos. 5–6, pp. 684–692, 2005.
[6] D. Dubois and H. Prade, "Representation and combination of uncertainty with belief functions and possibility measures," Comput.
Intell., vol. 4, no. 4, pp. 244–264, 1988.
[7] F. Smarandache and J. Dezert, "Information fusion based on new proportional conflict redistribution rules," in Proc. Fusion Int.
Conf. Inform. Fusion, Philadelphia, PA, USA, Jul. 2005.

Paper Type : Research Paper
Title : A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data
Country : India
Authors : Purva Jain || Dr. Abhijit Banubakode

Abstract:Because of the expanding prominence of distributed computing, more information proprietors are
inspired to outsource their information to cloud servers for extraordinary accommodation and diminished
expense in information administration. Then again, delicate information ought to be scrambled before
outsourcing for security prerequisites, which obsoletes information use like catchphrase based report recovery.
In this paper, we show a safe multi-essential word positioned inquiry plan over encoded cloud information,
which at the same time bolsters element overhaul operations like cancellation and insertion of archives.
Specifically, the vector space model and the broadly utilized TF×IDF model are joined as a part of the record
development and question era.

[1] K. Ren, C. Wang, Q. Wang et al., "Security challenges for the public cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69–73,
2012.
[2] S. Kamara and K. Lauter, "Cryptographic cloud storage," in Financial Cryptography and Data Security. Springer, 2010, pp. 136–
149.
[3] C. Gentry, "A fully homomorphic encryption scheme," Ph.D. dissertation, Stanford University, 2009.
[4] O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious rams," Journal of the ACM (JACM), vol. 43, no.
3, pp. 431–473, 1996.
[5] D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Advance in Cryptology
Eurocrypt 2004.Springer,2004 pp. 506–522.
[6] C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," Parallel
and Distributed Systems, IEEE Transactions on, vol. 23, no. 8, pp. 1467–1479, 2012.


Paper Type : Research Paper
Title : N Analysis Of Renewable Energy Sources Using An Integrated Data-Acquisition System
Country : India
Authors : C.M.Arun Kumar || G.Manivanan

Abstract:Data-acquisition systems are used in renewable energy source (RES) applications in order to
collect the data such as temperature, voltage of industrial appliances, for evaluation purposes. In this paper,
a software based s y s t e m fo r RES sys tems is used to analyze the performance of industrial appliances.
The proposed system consists of a set of sensors for measuring both environmental, devices changes (e.g.
temperature, humidity etc.) and electrical parameters (voltage and current etc.).The collected data are first
monitor using precision electronic circuits and then interfaced to a PC using a data-acquisition card. The
MATLAB program is used to further process, Simulate and analysis the collected data in the PC disk. The
proposed design p e rmi t s the rapid system development and has the advantage of flexibility in the case of
changes, while it can be easily extended for controlling the RES system operation.
Keywords: Renewable energy sources, Data-acquisition sys tem,Microcomputer,Sensor s ,MATLAB.

[1] BlaesserG.PV system measurements and monitoring: theEuropean experience .Solar Energy Mater, Solar Cells
1997; 47:167–76.
[2] WilshawA,PearsallN,Hill R. Installation and operation of the first city center PV monitoring station in the United
Kingdom. SolarEnergy1997; 59:19–26.
[3] KimM, Hwan gE . Monitoring theb a t t e r y s t a t u s f o r p h otov o l t a i c systems. J. Power S o u r c e s 1997;
64:193–6.
[4] BenghanemM, MaafiA .Data acquisition system for photovoltaic systems performance monitoring.IEEETrans.
Instrument.Meas 1998; 47:30–3.
[5] BenghanemM, Arab AH, MukadamK. Data acquisition systemfor photovoltaic w a t e r pumps.Renewable Energy
1999; 17:385–96.


Paper Type : Research Paper
Title : Analysis And Detection of Infected Fruit Part Using Improved kmeans
Clustering and Segmentation Techniques
Country : India
Authors : Ridhuna Rajan Nair || Swapnal Subhash Adsul || Namrata Vitthal Khabale ||
Vrushali Sanjay Kawade

Abstract:Drastic increase in the overseas commerce has increased nowadays .Modern food industries work on
the quality and safety of the products. Fruits such as oranges and apple are imported and exported on large
scale. Identifying the defect manually become time consuming process. The combined study of image processing
and clustering technique gave a turning point to the defect defection in fruits. This paper gives a solution for
defect detection and classification of fruits using improved K-means clustering algorithm. Based on their color
pixels are clustered.

[1] Shiv Ram Dubey, Pushkar Dixit, Nishant Singh, Jay Prakash Gupta , "Infected fruit part detection using K-means clustering
segmentation technique", International journal of artificial intelligence and interactive multimedia,Vol.2,No.2.2013.
[2] Yizhong Wang, Yanhua Cui, George Q. Huang, Ping Zhang, Shaohui Chen, "Study on fruit quality inspection based on its surface
color in produce logistics", International conference on manufacturing automation,2010.
[3] Shiv Ram Dubey, Anand Singh Jalal, "Detection and classification of apple fruit diseases using complete local binary patterns",
Third international conference on computer and communication technology, 2012.
[4] Sanjay Chaudhary, Bhavesh Prajapati, "Quality analysis and classification of bananas", IJARCSSE, Vol.4, Issue 1, Jan.2014.
[5] P. Vimala Devi and K. Vijayarekha, "Machine vision applications to locate fruits, detect defects and remove noise: a review",
RASAYAN journal, Vol.7, No.1, 104-113, Jan.-Mar. 2014.
[6] Madhuri A. Dalal, Nareshkumar D. Harale, Umesh L. Kulkarni, "An iterative improved k-means clustering", ACEEE DOI:
02.ACE.2011.02.183.


Paper Type : Research Paper
Title : A Survey On Various Techniques For Effective Optimization Of Cross Domain Network Protocol For Redundancy Removal In Firewall Policies
Country : India
Authors : Swati Kobal || Sucheta More || Shraddha Kumbhar || Jyoti Sonawane

Abstract:In today's progressing world, internet is used as a medium for almost every operation. Firewalls are
a piece of code that checks the data flow from start to end. Firewalls are extensively implemented to prevent
unauthorized access to concealed networks and secure them. Firewalls are made of set of rules or policies.
Based upon those applied policies a firewall can approve or decline the data packet by scaning them. If the
number of rules is increased rapidly which are turns degrades the throughput of a firewall and also results to
complex firewall policies. Optimizing these policies is crucial for improving the network performance. There is
a need to come up with a better solution to solve this problem. Undoubtedly the following discussed techniques
are extremely good. A collaborative approach using few of them can be a better solution.
Index Terms: Cross domain firewall optimization; privacy; protocol optimization; redundancy removal.

[1] Rakesh Agrawal, Alexandre Evfimievski,Ramakrishnan Srikant "Information Sharing Across Private Database International
Journal of Research in Engineering and Technology.
[2] Kalaivani.M, Rohini.R "Interfirewall optimization across various administrative domain for enabling security and privacy
preserving" Scientific Journal Impact Factor (SJIF): 1.711
[3] P.Venkata Ramalakshmi, Mr. Ch.Vijaya Krishna "Firewall Optimization in Inter-Administrative Domains" Technologies ISSN .
[4] Ehab S. Al-Shaer and Hazem H. Hamed "Discovery of Policy Anomalies in Distributed Firewalls" {ehab, hhamed}@cs.depaul.edu.
[5] Mohamed G. Gouda, Alex X. Liu, "Structured firewall design".
[6] Alex X. Liu Mohamed G. Gouda "Diverse Firewall Design" IEEE RANSACTIONS ON PARALLEL AND DISTRIBUTED
SYSTEMS, VOL. 19, NO. 9, SEPTEMBER 2008.
[7] P.R.Kadam, V.K. Bhusari "Review On Redundancy Removal Of Rules For Optimizing Firewall" International Journal of Research
in Engineering and Technology.


Paper Type : Research Paper
Title : Preparation and characterization of spray deposited nickel oxide(NiO) thin film electrode for supercapacitor
Country : India
Authors : A. S. Devasthali || S. G. Kandalkar

Abstract:In the present work, we report a spray pyrolysis route for preparation of nickel oxide (NiO) thin films
on the glass and FTO substrate from solution of nickel chloride and ammonia. The deposition process based on
the thermal decomposition ofammonia complex with nickel ions at temperature 623 K. As-prepared films were
used for structural, surface morphological and opticalcharacterizations. Deposited NiO thin films were
crystalline nature, SEM study of the film revealed elongated grains over the surface. The water contact angle of
NiO film on glass substrate is less than 900, so the film behaves in hydrophilic nature. Thecapacitive
characteristics of the films deposited on FTO substrate wereinvestigated using cyclic voltammetry. The
maximum interfacial and specific capacitance of23 mF/cm2 and 187 F/g was obtained in 1 M KOH electrolyte.
Keywords: NiO thin films; Spray pyrolysis; Contact angle; Supercapacitor

[1]. B.E. Conway, Electrochemical Super Capacitors, Kluwer Academic/Plenum Publishers, New York, 1999.
[2]. B.E. Conway, J. Electrochem. Soc. 138 (1991) 1539.
[3]. J H. Chen, W.Z. Li, D.Z. Wang, S.X. Yang, J.G. Wen, Z.F. Ren, Carbon 40 (2002) 1193.
[4]. N. Yoshizawa, H. Hatori, Y. Soneda, Y. Hanzawa, K. Kaneko, M.S. Dresselhaus, J. Non-Cryst. Solids 330 (2003) 99.
[5]. M. Toupin, D. Belanger, I.R. Hill, J. Power Sources 140 (2005) 203.
[6]. C.C. Hu, W.Y. Li, Y.J. Lin, J. Power Sources 137 (2004) 152.
[7]. C. Sivakumar, J.N. Nian, H. Teng, J. Power Sources 144 (2005) 295.
[8]. Q.F. Xiao, X. Zhou, Electrochim. Acta 48 (2003) 575.


Paper Type : Research Paper
Title : A Comprehensive Review of ZnO nanostructures and thin films for biosensor applications
Country : India
Authors : Ravi.C.Bharamagoudar || Anil.S.Patil

Abstract:ZnO nanostructured materials, such as films and nanoparticles, could provide a suitable platform for
development of high performance biosensors due to their unique fundamental material properties.The
performance of biosensors depends on their components, among which the matrix material, i.e., the layer
between the recognition layer of bio molecule and transducer, plays a crucial role in defining the stability,
sensitivity and shelf-life of a biosensor. This paper reviews different preparation techniques of
ZnOnanocrystals. Efforts are made to summarize and analyze existing results regarding surface modification
for successful biofunctionalization and understanding of the mechanisms involved.

[[1] M. Frasconi, G. Favero, M. Di Fusco, F. Mazzei, Biosens. Bioelectron.24 (2009) 1424.
[2] A. Ashrafi, C. Jagadish, J. Appl. Phys. 102 (2007) 071101.
[3] J Wang, X Sun, A Wei, Y Lei, X Cai, C Li, Z Dong: ApplPhysLett 88,233106 (2006)
[4] E Gizeli: Smart Mater Struct 6, 700 (1997)
[5 ] S A Kumar, S -M Chen: Biosensor Applications.AnalLett 41, 141 – 158 (2008)
[6] Z L Wang, Materials Science and Engineering R 64, 33–71 (2009)
[7] B A Gregg: Excitonic solar cells. Journal of Physical Chemistry B 107, 4688–4698 (2003)


Paper Type : Research Paper
Title : Effect of EDTA and Na2EDTA along with Mussoorie rock phosphate and Tata basic slag on N,P,K,Ca,Mg,Na and Fe uptake by Paddy Field
Country : India
Authors : Suruchi || S.M Yadav || P.A.Tomar

Abstract:Chelates such as EDTA and DTPA are often used to increase micronutrient solubility, but
micronutrients complexed by these chelates are not readily taken up by plants. A field experiment was
conducted to assess the effect of the application of EDTA coupled with Tata basic slag and Mussorie Rock
Phosphate on Rice . The aim of this study was to identify the interaction of Na,Ca,Mg,Fe,Cu and Zn when the
rice was planted on the test soil and to evaluate the effect of EDTA ,Na2EDTA with MRP and TBS of these
metals. It was found from the study that by applying increased the organic carbon, organic matter,
micronutrient i.e. Fe,Cu and Zn in the soil. Further it was noticed that TBS, MRP increases the N,P and K
content in soil. From the results of this experiment, it could be concluded that combined application of MRP and
TBS improved micronutrients in rice.

[1]. Aleksandra Sobkowska, Maria Basińska ,Flame photometry determination of Na, K, Li, and Ca traces in Cr-Ni steel, Microchimica
Acta,1975,64,227-234
[2]. A.P. Gupta, H. U. Neue&V. P. Singh,Phosphorus determination in rice plants containing variable manganese content by the
phospho‐molybdo‐vanadate (yellow) and phosphomolybdate (blue) colorimetric methods,Communications in Soil Science and plant
Analysis , 1993,1309-131824:11-12
[3]. Blaylock, M.J., Dushenkov, D.E., Zakharova, S., Gussman, O., Kapulnik, C.,Ensley, Y., Raskin, B.D., Enhanced accumulation of
Pb in Indianmustard by soil-applied chelating agents. Environmental Science and Technology,64,1997,489–496.
[4]. Bucheli-Witschel, M., Egli, T., Environmental fate and microbial degradation of aminopolycarboxylic acids. FEMS Microbiol.
Rev.2001, 25, 69–106.
[5]. Cakmak, I,Enrichment of cereal grains with zinc: Agronomic or genetic biofortification? Plant and Soil 302:2008, 1-17.
[6]. Collins, R N., Merrington, G., McLaughlin, M J., and Knudsen, C.,Uptake of intact zinc-ethylenediaminetetraacetic acid from soil
is dependent on plant species and complex concentration. Environ.Toxicol. Chem. 21,2002, 1940–1945.


Paper Type : Research Paper
Title : Data Warehouse with Data Integration: Problems and Solution
Country : India
Authors : Prof. Sunila Shivtare || Prof. Pranjali Shelar

Abstract:In the recent years the data is regularity added. This is large challenge for data warehouse. Because
large data is collected from different sources & in different structure. Heterogeneous data is managed to
converting this different data into a single unified structure. These data must contain historical, current & some
real time values from different & most likely from heterogeneous sources. All effective decisions are totally
depend on aggregated, calculated, and time-series data values in a data warehouse. Over the period of times
many researchers have contributed to the data integration issues, but no researches have collectively gathered
all the causes of data integration problems. At all the phases of data warehousing along with their possible
solution. Problems regarding data integration are discussed in this paper.

[1] Razi O. Mohammed and Samani A. Talab, Clinical Data Warehouse Issues and Challenges, International Journal of u-and e-
Service, Science and Technology
[2] Rahul Kumar Pandey, Data Quality in Data warehouse: problems and solution, IOSR Journal of Computer Engineering (IOSRJCE)


Paper Type : Research Paper
Title : Auditing of Cloud Data with Privacy Preserving using TPA
Country : India
Authors : Rushikesh P. Dhanokar || Prof. Gitanjali S. Mate

Abstract:Cloud computing is emerging Technology, economical and sensible option for all home users, IT
companies and other organizations for storing their large amount of data remotely on Cloud Server. With the
rapid rate at which data is being generated as well as the high costs of data storage devices, it costly for
enterprises or individual users to regularly update their hardware. Cloud-based outsourced storage space
reduces the user load of local storage and burden of maintenance. User can upload their data on cloud and can
access those data anytime anywhere by internet with comparably low-cost. Data is maintained by the cloud
service provider and user is billed based on usage.

1] Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou,
Senior Member, IEEE, "Privacy- Preserving Public Auditing for Secure Cloud Storage" IEEE Transactions on Computers, vol. 62,
no. 2, February 2013.R. Caves, Multinational Enterprise and Economic Analysis, Cambridge University Press, Cambridge, 1982.
[2] CloudSecurityAlliance,"TopThreatstoCloudComputing,"http://www.cloudsecurityalliance.org, 2010
[3] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, "Provable Data Possession at Untrusted
Stores," Proc.14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, 2007.
[4] A. Juels and J. Burton, S. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proc. ACM Conf. Computer and Comm.
Security (CCS'07), pp. 584-597, Oct. 2007.008.
[5] M.A. Shah, R. Swaminathan, and M. Baker, "Privacy- Preserving Audit and Extraction of Digital Contents," Cryptology ePrint
Archive, Report 2008.


Paper Type : Research Paper
Title : Survey on Improving Web Service Selection Results Through Exploring Service Usage History
Country : India
Authors : PoojaKumbhar || Prof. G. S. Mate

Abstract:Web Service mining has become one of the predominant areas of Service Oriented Architecture. Web
service discovery methods include syntactic based system and semantic based system. In the proposed work,
both syntactic and semantic based approach is followed. The most widely used recommender technique is
collaborative filtering. In this paper, author have a tendency to propose a novel net service recommendation
approach incorporating a user's potential QoS preferences and variety feature of user interests on net services.
User's interests and QoS preferences on net services area unit initial deep-mined by exploring the online
service usage history.

[1] L. Zhang, J. Zhang, H. Cai. Services computing. Tsinghua University Press, Beijing, 2007.
[2] Y. Jiang, J. Liu, M. Tang, X. Liu. "An effective Web service recommendation based on personalized collaborative filtering".
Proceedings of International Conference on Web Services. IEEE Computer Society, pp. 211-218, 2011.
[3] M. Tang, Y. Jiang, J. Liu, X. Liu. "Location-Aware Collaborative Filtering for QoS-Based Service Recommendation". Proceedings
of International Conference on Web Services. IEEE Computer Society, pp. 202-209, 2012.
[4] X. Chen, X. Liu, Z. Huang, H. Sun. "RegionKNN: a scalable hybrid collaborative filtering algorithm for personalized Web servicer
ecommendation". Proceedings of International Conference on Web Services. IEEE Computer Society, pp. 9-16, 2010.
[5] Z. Zheng, H. Ma, M. R. Lyu, I. King. "Wsrec: a collaborative filtering based web service recommender system". Proceedings of
International Conference on Web Services. IEEE Computer Society, pp. 437-444, 2009.


Paper Type : Research Paper
Title : A Survey on Deduplication Strategies and Storage Systems
Country : India
Authors : Guljar Shaikh

Abstract:Now a day there is raising demands for systems which provide the data storage by keeping in mind
security and cost factor. A duplicate file not only occupies a high volume space but also increases access time
so that removing duplicates records become very necessary. But to achieve this is not that simple since neither
duplicate files don't have a common key nor they contain error which makes duplicate matching a tedious task.
There are different ways to eliminate duplicate data first at file level & then at chunk levels that reduces
duplicate lookup overhead. In this survey paper we have discussed and describes about some of the
deduplication strategies and some of storage systems like MAD2, Venti, HYDRAstor, Extreme Binning,
Duplicate Data Elimination (DDE).
Keywords- Deduplication, storage system, MAD2, Venti, HYDRAstor, Extreme Binning, Duplicate Data
Elimination (DDE).

[1] Qian Wang, Cong Wang, Jin Li, KuiRen, Wenjing Lou: Enabling Public Verifiability and Data Dynamics for Storage Security in
Cloud Computing. ESORICS 2009:355-370.
[2] A Study of Practical Deduplication Dutch T. Meyer *† and William J. Bolosky * * Microsoft Research and † The University of
British Columbia {dmeyer@cs.ubc. edu, bolosky @microsoft .com.
[3] K. Jin and E. Miller. The effectiveness of deduplication on virtual machine disk images. In Proc. SYSTOR 2009: The Israeli
Experimental Systems Conference.
[4] Harnik, D., B. Pinkas and A. Shulman-Pelge, 2010 side chaneels in cloud services : Deduplication in cloud storage. IEEE Security
Privacy, 8: 40-47 Zhu, B., K. Li and H. Patterson, "Avoiding Disk bottleneck in the data domain deduplication file system.
Proceedings of the 6th USENIX Conference on File and Storage Technologies, February 26-29, 2008, San Joes, CA. USA., pp: 269-
282.
[5] D. T. Meyer and W. J. Bolosky, "A Study of Practical Deduplication," in Proceedings of the 9th USENIX Conference on File and
Storage Technologies (FAST‟11), 2011, pp. 1-14.


Paper Type : Research Paper
Title : Extracting the Web Data through Deep Web Interfaces
Country : India
Authors : Monika Bhide || M. A. Shaikh || Amruta Patil || Sunita Kerure

Abstract:The web stores huge amount of data on different topics. The users accessing web data vastly in now
days. The main goal of this paper is to locating deep web interfaces. To locating deep web interfaces uses
techniques and methods. This paper is focus on accessing relevant web data and represents significant
algorithm i.e. adaptive learning algorithm, reverse searching and classifier. The locating deep web interfaces
system works in two stages. In the first stage apply reverse search engine algorithm and classifies the sites and
the second stage ranking mechanism use to rank the relevant sites and display different ranking pages.

[1] Peter Lyman and Hal R. Varian. How much information? 2003. Technical report, UC Berkeley, 2003.
[2] Roger E. Bohn and James E. Short. How much information? 2009 report on american consumers. Technical report, University of
California, San Diego, 2009.
[3] Martin Hilbert. How much information is there in the"information society"? Significance, 2012.
[4] Idc worldwide predictions 2014: Battles for dominance – and survival on the 3rd platform.
http://www.idc.com/research/Predictions14/index.jsp, 2014.
[5] Michael K. Bergman. White paper: The deep web: Surfacing hidden value. Journal of electronic publishing, 2001.
[6] Yeye He, Dong Xin, Venkatesh Ganti, Sriram Rajaraman, and Nirav Shah. Crawling deep web entity pages. In Proceedings of the
sixth ACM international conference on Web search and data mining, 2013.


Paper Type : Research Paper
Title : Energy Efficient Opportunistic Routing Protocol for Large Scale WSN
Country : India
Authors : Mrs. K. Y. Amrutkar || Mrs.G.S.Mate

Abstract: OPPORTUNISTIC routing is a new design trend of wireless routing protocols. In traditional routing,
the source takes one "best" path to the destination while in the opportunistic routing, the source takes multiple
opportunistic paths to forward packets to the destination. It is proved that, opportunistic routing can better cope
with the unreliable, and varying link qualities that are typical of wireless networks. In the literature many
routing protocols are presented for efficient routing but all existing opportunistic routing protocols have to
periodically build the network graph with all link qualities among the whole topology. In large-scale networks,
this would be a tedious task. Recently the new approach is introduced in which it solves all limitations of
existing routing protocols.

1] S. Biswas and R. Morris, ExOR: Opportunistic routing in multi-hop wireless networks in Proc. ACM SIGCOMM, 2005, pp. 133–
144.
[2] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, Trading structure for randomness in wireless opportunistic routing, in Proc.
ACM SIGCOMM, 2007, pp. 169–180.
[3] Y. Li, W. Chen, and Z.-L. Zhang, Optimal forwarder list selection in opportunistic routing, in Proc. IEEE MeshTech, 2009, pp.
670–675.
[4] Y. Li, W. Chen, and Z.-L. Zhang, Trading Optimality for Scalability in Large-Scale Opportunistic Routing, IEEE transactions on
vehicular technology, vol. 62, NO. 5, June 2013.
[5] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, Least-cost opportunistic routing, presented at the Allerton Conf. Commun.,
Control, Comput., Monticello, IL, 2007.


Paper Type : Research Paper
Title : Outsourcing Privacy-Protecting Social Networks to a Cloud
Country : India
Authors : Harshit Varshney || Nital Adikane

Abstract: In the planet, corporations would publish social networks to a 3rd party, e.g., a cloud service
supplier, for promoting reasons. Protective privacy once business enterprise social network information
becomes a vital issue. During this paper, we tend to establish a unique sort of privacy attack, termed 1*-
neighborhood attack. We tend to assume that associate aggressor has data regarding the degrees of a target's
one-hop neighbors, additionally to the target's 1-neighborhood graph, that consists of the one-hop neighbors of
the target and also the relationships among these neighbors With this data, Associate in Nursing wrong doer
could re-identify the target from a k-anonymity social network with a likelihood beyond 1/k, wherever any
node's one-neighborhood graph is isomorphism with k - 1 alternative nodes' graphs. To resist the 1*-
neighborhood attack, we have a tendency to outline a key privacy property, likelihood identity, for Associate in
Nursing outsourced social network, Associate in Nursing propose a heuristic indistinguishable cluster
anonymization (HIGA) theme to come up with an anonymzed social network with this privacy property.

[1] L. Getoor and C. Diehl, "Link mining: A survey," ACM SIGKDD Explorations Newsletter, 2005.
[2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al., "A view of
cloud computing," Communications of the ACM, 2010.
[3] G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in
Proceedings of ACM CCS, 2010.
[4] J. Gao, J. Yu, R. Jin, J. Zhou, T. Wang, and D. Yang, "Neighbor hood privacy protected shortest distance computing in cloud," in
Proc. of ACM COMAD, 2011.
[5] B. Zhou, J. Pei, and W. Luk, "A brief survey on anonymization techniques for privacy preserving publishing of social network
data," ACM SIGKDD Explorations Newsletter, 2008.
[6] J. Potterat, L. Phillips-Plummer, S. Muth, R. Rothenberg, D.Woodhouse, T. Maldonado-Long, H. Zimmerman, and J. Muth, "Risk
network structure in the early epidemic phase of HIV transmission in Colorado springs," Sexually Transmitted Infections, 2002.
[7] B. Zhou and J. Pei, "Preserving privacy in social networks against neighborhood attacks," in Proc. of IEEE ICDE, 2008.


Paper Type : Research Paper
Title : Fundamentals of E-Learning Models: A Review
Country : India
Authors : Prof. Vaishali Suryawanshi || Prof. Dayanand Suryawanshi

Abstract:This paper is review of the basic models of e-learning process. The different models are implemented
different purposes in e-learning. Wide range of e-learning theories and models are evolving day to day according to
the domain of e-learning and learning environment. Here we have précised some of the fundamental models which
are used by different researchers for educational technology enhancement to take advantage of opportunities to
develop effective learning strategies among students for dealing with web information overload and varying
information quality. In fact, good teaching implies of course that, in order to develop effective learners, teachers
need to be visible. These models plays very important role for e-learning process development and enhancement.
Keywords – E-learning, Educational Technology web information, information quality , effective learners

[1]. Alexander, S 2001. E-learning developments and experiences. Education and Training, Bradford 43(4-5):240-
248
[2]. eLearning Fundamnetals, Lesson2- Theories and Models of e-learning Towards an effective framework for
the evaluation of e-learning ,Tom Franklin, Franklin Consulting Jill
[3]. Armstrong, LTSN & Liverpool Hope University College Martin Oliver, University College LondonJim
Petch, University of Manchester.
[4]. Alook at e-learning models: investigation of their values for e-learning strategy
[5]. Blignaut, S. & Trollip, S. (2003). A Taxonomy for Faculty Participation in Asynchronous Online
Discussions. In D. Lassner & C. McNaught (Eds.), Proceedings of EdMedia: World Conference on
Educational Media and Technology 2003 (pp. 2043-2050). Association for the Advancement of Computing in
Education (AACE).


Paper Type : Research Paper
Title : Android Based LAN Monitoring System
Country : India
Authors : Kiran Purkar || Akshay Jotrao || Nilesh Bade || Prof. Priyanka More

Abstract: When computers are connected in a network then, we need a person for monitoring the whole
network. The network may be wired or wireless and we need to monitor that network for keeping an eye on any
misbehavior by client in the network. In college, the network in the lab is being monitored by lab incharge, but
if the lab incharge is not present in the lab then monitoring is not possible. So in this paper we are developing a
system in which an android app will be connected to the main LAN server via WLAN or mobile data and
through this app the admin or lab incharge will be able to monitor the LAN network. This will increase the
efficiency of lab incharge's work and will help in several ways. Providing details of every client in the network
to the administrator is the main aim of our system

[1] Shiva Shree Nagendra R, Bhat Geetalaxmi Jairam, Controlling LAN using J2ME and RMI API, International Journal of Research in
Engineering & Advanced Technology, Volume3, Issue 3, June-July, 2015
[2] Prof. Ashvini Jadhav, Mr.Akshay L. Gosavi, Miss.Vrushali R. Hargude, Mr.Nikhil S. Thite, Miss.Mamta B. Sawle, Android Server
For Wlan Control And Management, International Journal Of Engineering And Computer Science, Volume 4 Issue 3, March 2015,
Page No. 10616-10619
[3] Karishma Gidge, Kalyani Patil, Priyanka Wadnere, Android Based LAN Monitoring System, International Journal for Research in
Applied Science & Engineering Technology, Volume 3 Issue I, January 2015 ISSN: 2321-9653
[4] Prof. Rathod R. B. , Priyanka R. Shinde ,Bharati M. Shinde, Rashmi R. Bhole, Design and Implementation of monitoring LAN user
wirelessly by Android mobile based on client/server mode, The International Journal Of Engineering And Science, Volume 4, Issue
4, Pages PP.37-40, 2015
[5] http://en.wikipedia.org/wiki/Secure_Hash_Algorithm
[6] http://en.wikipedia.org/wiki/SHA-1


IOSR Journals are published both in online and print versions.