2019
Vol 4, No 3 (2019): Query Expansion with Personalized Web Search Using Enriched User Profiles and Folksonomy Data
Authors:-Kokil Nikita, Shinde Harshada, Wayal Madhuri, Yewale Ankita
Abstract:-Internet is most important and non-detachable part of human beings throughout the world. But Internet is an ocean of information that provides you vast details on whatever topic you search on the web. To infer the user search goals, many researchers have made an excellent effort through user searching history, user profiles or user searching knowledge and pattern but most of the techniques failed as it's not that the user will always try to search the same documents or contents over the internet. Now a day's use of internet usage is increasing rapidly. Each new user may have his different user goals for large topics. Hence the efficiency of the search engine can improve by the analysis and inference of the user search goals. Due to improved efficiency of search engine time needed to search the query get reduced and user get only his goal oriented search results and unwanted data can get hide from the user . Currently everyone is searching on the internet and internet provides you ambiguous result of same things as it contains lot of information. The information related to the user goals will provide by proposed method system. In this system we have discover a novel framework to discover the user goals by clustering the user search goals and then new approach to generate the pseudo document to represent the clustering effectively. At the end to calculate the performance of the search engine we have proposed novel approach CAP.
Vol 4, No 3 (2019): Survey on Advanced and the Best Solution for Home Security using Sensor and IOT
Authors:-P. Ajitha
Abstract:-Security is becoming an important issue everywhere. Home Security is becoming necessary now a day as the possibilities of intrusion is increasing day by day .Safety from theft, leaking of raw gas and fire are the important requirements for home security system. However, the GSM (global system for mobile communication) based security systems provides enhanced security as whenever a signal from sensor occurs, a text message is sent to a desired number to take necessary actions. Here we are using an antitheft reporting system which will report the owner by ringing alarm and sending text message. Also for the safety system in case of fire or gas leakage it will report the owner by sending an SMS and also by ringing an alarm.
Vol 4, No 3 (2019): A Review Paper on Roles and Responsibilities of RMAN
Authors:-Javed Moazzam, Shashi Kant, Sneh Rachna, Shekhar Kaushik
Abstract:-RMAN is a built-in tool of the Oracle Server. Which is used to take backup, restoration and recovering the physical files of the database .It does not require any additional licensing cost to use RMAN (Recovery Manager), with the launch of every new version of Oracle database, the functionality of RMAN also improves by the addition of the new features. This research paper highlights all new features of RMAN according to their versions.
Vol 4, No 3 (2019): A System to Detect and Analyze the Skin Disease Using Deep Learning Algorithm
Authors:-Manish Kumar,Neha Gopaliya
Abstract:-Skin is the most touchy and sensitive part of the body subsequently we need an extraordinary consideration. This exploration is identified with distinguish skin ailment, for example, skin inflammation, clogged pores, dermatitis and so on. When all is said in done this sort of infection can turn out to be progressively hazardous in the event that it isn't controlled at a previous stage. This exploration will give an office to client to deciding the skin illness dependent on manifestations. In this examination the information handling of patients is utilizing profound learning apparatus which has as of late accomplished promising outcomes in a wide scope of zones, for example, PC vision, discourse acknowledgment and regular language preparing. It intends to learn progressive portrayals of information by utilizing profound engineering models. In a skin malady location framework, pictures should be naturally handled and examined. In this paper, we survey the profound learning calculations connected to contaminated skin pictures of people as far as various research themes: skin picture discovery, picture preprocessing, and picture acknowledgment and picture arrangement.
Vol 4, No 3 (2019): Human Thinking with Artificial Intelligence
Author:-Akanksha Srivastav
Abstract:-Research in AI has built upon the tools and techniques of many different disciplines, including formal logic, probability theory, decision theory, management science, linguistics and philosophy. However, the application of these disciplines in AI has necessitated the development of many enhancements and extensions. Among the most powerful of these are the methods of computational logic.
Â
I will argue that computational logic, embedded in an agent cycle, combines and improves upon both traditional logic and classical decision theory. I will also argue that many of its methods can be used, not only in AI, but also in ordinary life, to help people improve their own human intelligence without the assistance of computers
Vol 4, No 2 (2019): Security Analysis of Homomorphic Encryption Scheme for Cloud Computing: Known Plain text Attack
Author:-Aboli Yuvraj Kerle, Supriya Bharat Hemgire, Snehal Mahadev Kolekar, Geetanjali Sutar, Harsha Shekhar Badgujar
Abstract:-Large amount of data is generated in today's world. Saving that data on a single machine is a critical task, so the best way is store that data on the cloud. Cloud computing helps us to acquire data storage, resources over the internet. As far as considering internet, security becomes a major concern .To provide the security for the data stored on the cloud Homomorphic encryption plays major role. It allows cloud to perform calculation on the data. Cryptosystem based on Residue Number System and Secret Sharing Scheme can have disadvantage that it leads to data redundancy which in turn increases the storage size. To overcome the disadvantage considering one of the applications of Homomorphic encryption that is “Online Voting System†where we can provide security by combining cryptosystem and arithmetic coding. By using this mechanism we can directly encrypt and decrypt data on cloud.
Â
Vol 4, No 2 (2019): Prediction of Correlation between Health Parameters using Linear Regression Implemented Using R
Authors:-Ankita Sharma, Ankita Chopra
Abstract:-This Paper deals with the hybrid system which contain the components Heart diseases are among some of fatal diseases and a leading cause of deaths worldwide. It is difficult to diagnose heart diseases well before time as it requires complicated study of patient’s health and medical experiences and knowledge. Today, the health sector contains huge amounts of unprocessed patient’s data that can be significant in making decisions. Predictive Modeling is a type of data analytics technique that uses algorithms and regression models to analyze past trends and generate future outcomes. In this paper, Linear and Multi linear regression models are applied for predicting the risks of heart diseases.
Vol 4, No 2 (2019): Facial Expression Recognition in Video Stream and Audience Measurement
Authors:-Â Hemavathi E M , Savitri N, Dikshita Ramesh Babu*, Amrutha S J, Revathi S
Abstract:-Facial expression plays a pivotal role in nonverbal communication; the primary objective of facial expression is to conveying the social information between the humans. The Face and Facial Expression Recognition system is the process of determining and recognizing the expression state of an individual and group of people. It involves two step processes that is face detection and facial expression classification where the facial expression is classified into seven categories such as fear, angry, happy, neutral, surprise, sad and disgust accordingly. This paper will make uses a well known model called CNN (convolution neural network) model which plays an important role in Image recognition, Video analysis, Natural language processing and Drug discovery etc.., This paper validates the two different models such as face detection and face recognition models, which are simultaneously using our proposed CNN architecture to detect and classify the human frontal face expression. Audience Measurement is measured for facial expression recognition that is, the system gives the total count of people whose faces are detected as well as count of people possessing various facial expressions.
Vol 4, No 2 (2019): Privacy Preserving Indexing, Query Processing and Distributed Cloud Database for TPO
Authors:-S. More, Sachin Babar, Amol Kale, Mukund Gurav*, Vishal Bhagat, Shubham Bhandari
Abstract:- TPO placement coordinator stores and maintains all the data about students and companies in his computer system. So whenever system failure occurs or any hardware failure occurred, so there may be chances of data lost or data corruption . Reliability of data is not maintained. Organizing a pool campus drive is hard. The whole work manual so it is time consuming process. When to overcome this, this TPO system is introduced. It is an online web based system that automates the manual work of TPO coordinator. The TPO coordinator creates students accounts by uploading excel file containing students list .Then student fill their details. The TPO coordinator can access the data all the time, all he need is just active internet connection.. . The privacy preserving indexing and query processing is used to build online TPO cell system. Student’s data is encrypted and stored in database using AES algorithm. So privacy preserving is maintained. Query optimization is used for speed up the performance of the system. Data backup facility is provided and also data is stored on cloud, so easy to access the database and also provides high performance and faster access. Various notifications can be sending to students by email facility.
Vol 4, No 2 (2019): Vendor Meal Service Web Application
Authors:-Malusare. P, Gaikwad. A, More. P, Jadhav. O. R, Kumbhar H.R
Abstract:-Online food ordering system is website or application designed primarily for using the food delivery industry. This system allows mess and small scale food industries to increase scope of business by reducing the labor costs involve. In this system vendor feed menu as per need, typically in a mess food order process involve several steps, for ordering the food where firstly customer looks up for menu and then order is given to vendor for preparation and delivery of food. The proposed system here is ’Vendor Module’ by which the we are trying to aggregate the mess out there at particular location area make them operate on line and provide them a common ’web application’ platform. Just to increase the customer base for a particular mess, and increase in total revenue provides flexibility to customers to choose in between variety of food from number of mess available on line.
Vol 4, No 1 (2019): Microstrip Antenna for Wireless Communication-A review
Authors:-Â Ningappa T Pujar, Dr. Jagadeesh S
Abstract:-Â Antenna becomes prominent in wireless communication. Antennas attracted due to some special characterized with respect to the space filling, and even in self-similarity properties. Such kind of properties may lead to size reduction. In recent days designing of antenna relatively simple and easy because simulation tools are available. The antenna can be categories into many based on structure, frequency and mode application.Microstrip antenna attracted the research attention because of its simplicity and the various application used and it becomes popular.The micrstrip antenna performance can be used multiple inputs and multiple output(MIMO). Day to day due the MIMO it has covered wide variety of application. Designer and researcher are working on deploy wideband antenna to increase the features of Multiple Input Multiple Output.In this paper communication system, classification of antenna and Microstrip antenna and some of the feeding techniques of microstrip antenna feeding , coupling and the applications advantages and disadvantages micro strip antenna is given overview
Vol 4, No 1 (2019): Virtualization and Rapid Deployment of Temporary or Permanent ICT Systems
Authors:-Er. Prachi Pundhir
Abstract:-In today’s world progressing crisis circumstances on the planet signify the inclination that the event recurrence of crippling events is relied upon to increment in future. Along these lines new methodologies for crisis the executives should be explained dependent on the most recent ICT improvements. Distributed computing is considered as a conceivable method to bring down the expense and unpredictability of registering by giving applications running on the Internet. Numerous associations are seeing distributed computing as another type of crisis the board which will keep business congruity. Distributed computing could add to crisis the board since it could encourage the sharing of data among private and government associations. The present article attempts to examine the particular highlights and issues of distributed computing use as a conceivable incorporation segment in the crisis the board and to produce some fundamental proposals for offering help for the business congruity paying little respect to the fatal event.
Â
Vol 4, No 1 (2019): Enhanced Improved Genetic Algorithm for Load Balancing in Cloud Computing
Author:-Sheetal Karki
Abstract:-The cloud computing is the technology which has decentralized nature. Due to such unique nature of the network, load balancing is the major challenge. This research work is based on load balancing in cloud computing. In the previous research work, the improved genetic algorithm is applied for the load balancing but it is analyzed that it has high execution time and resource consumption. The enhancement in improved genetic algorithm is proposed which use less number of resources for the load balancing. The proposed algorithm is implemented in MATLAB and simulation results shows that proposed is efficient in terms of various parameters
Vol 4, No 1 (2019): Outpass System
Authors:Â Omkar H. Kurade, Mangesh M. Bhosale, Rutvik S. Bhosale, Pavan V. Gurav,U. B. Tarlekar
Abstract: In today’s running technology every job has become effortless, keeping this in mind a system has been designed which is helpful for colleges, universities & other educational institutes. This is designed for issuing & maintaining the out pass for students departing outside the campus assuring that they have departed with intimation to their wardens or responsible authorities. There are as many systems, which are being used for this purpose, but they work in native nature. To avoid the demerits of existing system this system is designed intelligently to serve numerous users at an instant. It is purely network-based miniature. A high-level security is used to avoid anonymous entry to system, and to avoid worthless tapping of data.
Â
Vol 4, No 1 (2019): A survey paper on Online Auto booking system
Authors:-Darshan Magdum, Ashitosh Patil , Uday Swami , Suraj Khot
Abstract:-
Traveling is a large growing business across all countries. Auto booking system deals with providing the users the Auto rickshaw service. This project consists of the development of a contributory web application to display the current Auto rickshaw at your location. The goal of this web application is to make availability of Auto rickshaw at your doorstep by using smart phone. This website consists of many features which are online booking for Auto rickshaw, Multilanguage website, Audio guide. In order to use many of these services together, the web application was purpose-built using the HTMl. CSS, JAVASCRIPT, PHP, BOOTSTRAP Programming languages. This website is done in order to get better and easy travelling for customers who are in need of traveling with the Auto rickshaw at the valuable price which will directly save their time to wait for Auto rickshaw at the Auto Stop. There were many things that were taken in order to submit a successful project such as Market Research, identifying audiences, identifying the problem in Travel sector by using this web application we can get online Auto rickshaw ticket from any part of India through a telephone lines or internet.
The Auto booking service provides both customers and Auto Rickshaw drivers to create an account and we don’t take any charges from our happy clients .We Also provide the customers a sharing Auto feature where customers can book Auto in share manner .Customers can book easily Auto by our user friendly user interface ,With different devices resolution. With Auto booking system customers can also get discounts on Auto plans and they can pay the money online through integrated payment gateway. In some cities the customers who want auto on rent need to call manually for auto reservation but from today this will be online and more efficient. Auto booking also provide safety for customers with our security option in need of emergency protection. So from today women can too travel independently with our security protection.
2018
Vol 3, No 3 (2018): Survey on Efficient News Genuineness Determination Mechanism for Social Media News
Authors:Â Ashwitha Rai A, Manju S, Manoja E Mesta, Vidya Marita D Costa, Sadhana Rai
Abstract:Â Mass media sources, specifically the news media, have traditionally informed us of daily events. In modern times, social media services such as Twitter provide an enormous amount of user-generated data, which have great potential to contain informative news-related content. For these resources to be useful, we must find a way to filter noise and only capture the content that, based on its similarity to the news media, is considered valuable. However, even after noise is removed, information overload may still exist in the remaining data hence; it is convenient to prioritize it for consumption. To achieve prioritization, information must be ranked in order of estimated importance considering two factors. First, the temporal prevalence of a topic in the news media is a factor of importance, and can be considered the media focus (MF) of a topic. Second, the temporal prevalence of the topic in social media indicates its user attention (UA).
Vol 3, No 3 (2018): A Survey on Load Balancing Techniques in Cloud Computing
Authors:-Farjana Girach , Prof. Vaseem Ghada , Prof. Heer Dholakia
Abstract:-The technology of Cloud Computing referred as a use of software, platform, infrastructure as a services via internet. It can provide the resource quickly and release with minimal management. Where clients pay just for what they have utilized, as they have not owned computing infrastructure. In such scenario, load balancing algorithms are used to get high resource utilization, quick response time and better performance and to balance the load equally among the nodes. Cloud provides the virtual machine for task allocation, that is scalable but scheduling them is a major problem. This paper will talk about a portion of the current load balancing technique and benefits of it.
Vol 3, No 3 (2018): A Survey on Overview of Block Chain Technology
Authors:-Aatish Kunal , Dr V NagaveniÂ
Abstract:-Block chain has been considered a breakthrough technology with ever increasing attention in past few years. Block chain is not just about Bitcoin or crypto currencies, It has much greater role to play in today’s world. Many people still confuse Block chain with Bitcoin. However they are not the same. Bitcoin is just one of the many applications that use Block chain technology. While there are certain controversies about bitcoin and block chain, it is up to the users to decide what they want to do with it. Some can invest money in it for trade or some can develop their own applications for solving problem of society. In this paper, I have tried to bring a small introduction of block chain and crypto currencies.
Vol 3, No 3 (2018): Twitter Sentiment Classification on GST Using Naive Bayes and Score Based Algorithms
Authors:-Rohini Kancharapu , Dr. A. Sri NageshÂ
Abstract:-Sentiment Analysis (SA) extracts and analyses people’s opinion about an entity. SA in twitter tackles the problem of analyzing the tweets. Twitter is one of the popular micro blogging platform in which users can publish their thoughts and opinions. It has been used as a forum to understand the opinions of public towards recently launched Goods and Services Tax (GST) by Indian Government. The tweets originated have been analyzed using supervised learning. This type of learning uses unlabelled data to complement the information provided by the labeled data in the training process. SA agrees with the human judgment and determines at sentence level whether the opinions arrives at a decision and perform classification on emotion and polarity using naive bayes and score based algorithms to find the effect of GST on public.
Vol 3, No 3 (2018): A Predictive Approach of Crop Disease Analysis Using Machine Learning
Author:-V.B. Ingale
Abstract:-Machine learning is becoming a very useful technology now days and surely with the help of some basic knowledge you can be able to make a great use of this. Machine learning putting a step in the image processing as image processing becomes possible in artificial intelligence. Machines are now better able to identify patterns than ever there are so many things that can cause different diseases to the plants, which damaged big crop fields and ultimately the economy of the country is affected. If plants diseases are detected on the early basis and prevented accordingly, then big losses can be avoided. So to strengthen the agricultural fields and the economy of the country, rapid and accurate detection of plants diseases is needed the ability of disease diagnosis in earlier stage is very essential so that timely cure and control of such disease leads to decreasing dissatisfactory products. Timely recognition is useful for taking disease control measures; it lies on the visual identification by the agricultural technicians and requires high professional knowledge and many professional as well as technical personnel. There is heterogeneity of characteristics of plant diseases and usage of many image processing and computer vision techniques for plant diagnosis problems. To save time, efforts, labors and use of heavy pesticides there is a need of fast and accurate diseases detection of plants. For better quality and quantity of crops in agricultural fields different techniques are proposed by different researchers with the help of digital image processing for rapid and accurate plants disease identification
Vol 3, No 2 (2018): Bike Pooling
Authors:Â Archana Bhalla, Stuti Jain, Sanjana Goel, Rishabh Jain
Abstract: As is the trend worldwide, India is undergoing rapid urbanization. This means not only that more people than ever before will be living and working in cities, but also that more people and more goods will be making more and longer trips in urban areas. The costs of increasing dependence on cars is resulting in expensive road building and maintenance, clogged and congested roads, high levels of energy consumption along with its economic and environmental costs, worsening air and noise pollution, traffic accidents and social inequities that arise when the poor find transportation services increasingly unaffordable. The most widely used mode of conveyance of public transport in Delhi is “busesâ€. Thus buses form a backbone of the transportation system in Delhi and serve about half of the travel demand while it constitutes less than 1 % of the total vehicle fleet of Delhi. In spite of this, it does not receive any preferential treatment in terms of traffic management, dedicated lanes, and better upkeep/ maintenance of vehicles resulting in that common man who can afford even slightly is shifting from buses to their own vehicles. It may be two-wheelers or four wheelers or even bicycles because of which the number of vehicles on the roads are increasing which is leading to further lowering of speed, congestion, increase in pollution level etc. Strategies to combat these problems would include reducing the emissions per vehicle kilometre travelled and the total number of kilometres travelled. Road congestion may be reduced by the use of good public transport management, traffic management and bike pools etc. In this paper, we have conducted a survey based on a structured questionnaire for bikepooling
Vol 3, No 2 (2018): Non-Pathological Parameters Based Prediction for the Occurrence of Diabetes in an Individual: A Model by Using Cloud Pla
Author:-Yusera Farooq Khan
Abstract:-
In this paper , a classification model is formed by means of cloud platform Microsoft Azure that predicts the happening of Diabetes in an individual on the basis of non-pathological parameters – age, sex, family history of being diabetic, smoking and consumption habits, frequency of dehydration and urination, weight height and tiredness. The model created using “Two-Class Neural Network Algorithm†has the highest accuracy and hence has been deployed as a service. Finally a GUI has been developed in python to access the service.
The advantage of this model over other classification model is its high exactness of prediction and it can be used by any individual for a pre-diabetic check without any prerequisite of the pathological information.
Vol 3, No 2 (2018): Lifetime Improvement of Wireless Sensor Network Using Effective Routing Technique
Author:Â Dr. S. Anandamurugan
Abstract: Energy efficiency is one of the most important factors to consider when designing protocols for Wireless Sensor Networks (WSNs). During the running of asynchronous MAC protocols, in Wireless Sensor Network sender waits for its receiver to wake up and receive the packet is the major source of energy consumption. Opportunistic routing can reduce the sender wait time by allowing multiple candidate receivers. But by doing that it suffers from redundant packet forwarding due to multiple receivers waking up at the same time. The proposed system is an approach for controlling redundant forwarders in Wireless Sensor Networks. The objective of this paper is to reduce the sender wait time by controlling the redundant packet forwarding. However, the problem where multiple receivers wake up simultaneously and receive packets causes redundant forwarding, which severely degrades energy efficiency in the network. Also, lack of load balancing leads to some nodes draining their energy faster than others. The proposed protocol Authenticated Redundancy Checking Opportunistic Routing(ARCOR) addresses these problems by including residual energy factor in the forwarder selection algorithm, and controlling number of forwarders based on forwarding cost estimation. Opportunistic routing using Residual Energy (ORR) method is used here. First, the optimal number of forwarders is calculated based on forwarding cost estimation, which is derived from duty cycle and network topology. Second, the metric used for selecting forwarders considers residual energy so that more traffic is guided through nodes with larger remaining energy. The resulting routing protocol is proven to avoid loops and shown to achieve longer network lifetime compared to other protocols regardless of duty cycle and network topology.
Vol 3, No 2 (2018): Secured Wireless Transmission of Medical Data for Personalised Health Care
Authors:Â Pradeep P, Arogia Victor Paul M, Arbind Kumar Gupta, S Venkatesan
Abstract: Internet of things (IoT) technology has attracted much attention in the health care monitoring Scenarios. This research work briefs about how health sensors  are utilized to read the vital parameters from patients. It also explains the methodology of security for transmitting captured data using Wi-Fi module, once the data is collected, the feedback is send to the stakeholders of the patient and to the doctors for clinical study for effective patient care monitoring. The entire patient care monitoring system is quite helpful for the patients especially for the elderly patients and to the paediatric care.
Vol 3, No 2 (2018): A Survey on Big Data Indexing Strategies
Author:Â A. Logeshwari,
Abstract:Â
The operations of the Internet have led to a significant growth and accumulation of data known as Big Data. Individuals and organizations that utilize this data, had no idea, nor were they prepared for this data explosion. Hence, the available solutions cannot meet the needs of the growing heterogeneous data in terms of processing. This results in inefficient information retrieval or search query results. The design of indexing strategies that can support this need is required. A survey on various indexing strategies and how they are utilized for solving Big Data management issues can serve as a guide for choosing the strategy best suited for a problem, and can also serve as a base for the design of more efficient indexing strategies. The aim of the study is to explore the characteristics of the indexing strategies used in Big Data manageability by covering some of the weaknesses and strengths of B-tree, R-tree, to name but a few. This paper covers some popular indexing strategies used for Big Data management. It exposes the potentials of each by carefully exploring their properties in ways that are related to problem solving.
Keywords: Big Data; Indexing; Query; Information Re-trieval