Vol 4 Issue 1 January 2016-March 2016
Mukul Raj, Meghana Kiran, Saajan Tikare, Shamanth Jagadish Manakame, Nandhini Vineeth
Abstract: Heads up display (HUD) is an upcoming technology that is still open for interpretation. This technology works around Raspberry Pi, Heads up Display implemented in vehicles, Virtual and Augmented reality, Wearables and smart glasses. An extensive survey has been made in this paper on these topics. This paper describes the computational and hardware functionalities of the Raspberry Pi. It also gives light to the pros and cons with regards to HUD application in vehicles. This paper also reviews the literature on how big a part wearables and smart glasses will play in the future. This also gives an insight on how this technology can be used in cars and cockpits for a better field of view and prevent accidents in future. From this survey carried out, it is prominent that HUD systems have a great potential and thus are here to stay.
Keywords: Heads up display; Raspberry Pi; Virtual reality; Wearable computing; Human assistive technology.
Title: A Survey on Heads up Display Systems
Author: Mukul Raj, Meghana Kiran, Saajan Tikare, Shamanth Jagadish Manakame, Nandhini Vineeth
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Tanuja
Abstract: E-Commerce (Electronic- Commerce) has made it possible for business to give advertisement along with features and price- tag of products using computers. All organizations are setting for E-commerce as it is simple, secured and efficient. Moreover it standardizes organization in present competitive market. E- Commerce is used to handle electronic commerce. It is the latest trend for commerce.
Keywords: Data Mining Implementation, E- Commerce (Electronic- Commerce).
Title: Challenges of Data Mining Implementation in E-Commerce in India
Author: Tanuja
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Shefna Salam, Surya Surendran, Josmy George
Abstract: Super Resolution of images is the construction of a High Resolution (HR) image from a Low Resolution (LR) image input. Super Resolution refers to the task of constructing a high resolution enlargement of a given low resolution image. However, image super-resolution problem is an inherently ill-posed problem, where many HR images may produce the same LR image when down-sampled. As a result, how to generate an HR image with good visual perception and as similar as its ground truth has become the goal of image super-resolution. There has been many research works in this field in recent years, which can be mainly classified into three categories: interpolation based approaches, learning based approaches and reconstruction based approaches.
Keywords: single image super resolution, gradient profile sharpness, gradient profile transfor mation.
Title: Literature Survey on Super Resolution of Images
Author: Shefna Salam, Surya Surendran, Josmy George
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Minu Antony, Neethu Mol Abraham, Ushus Maria Joseph
Abstract: Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. Both transparent images and layers are required to reveal the information. In this paper (2,n) BVCS and an encryption algorithm are proposed to hide the text, audio and image that should be fed as a digital image in the system as the input and the system generates “n” (2≤n) numbers of different images called shares, look like images of random noise. Among “n” number of shares user has to stack “k” number of shares, where 2≤k≤n, to reveal the secret. In order to reduce the transmission risk of the shares, SIRDSs are used as cover images of the shares of VCSs. The audio recorded is converted to text and is encrypted using an image. It is then send to the receiver, who decrypts the encrypted data and the audio and text is revealed.
Keywords: Shares, BVCS, Visual cryptography.
Title: SHARING SINGLE IMAGE USING VISUAL CRYPTOGRAPHY
Author: Minu Antony, Neethu Mol Abraham, Ushus Maria Joseph
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Aniket Kale, Ajay Sonune, Om Awagan, Sandeep Chavan, Prof. Rupali Dalvi
Abstract: This project works with the shortest path finding ant optimization algorithm. Using this apps manager efforts reduce to selecting the employee. We can implement this concept in large scale to reduce the time taken during the selection process. It is very hard to find the bug free selection of data from anonymous dataset. Using ant optimization we can find the lots of solution and the shortest path solution for the problem which going to take very less time to complete the problem. This project has the big scope to implement in selection arena. In project we can implement the chatting option for manager and employee to sharing their issue to resolve quickly and problem solving panel to everyone to reduce the time taken by the development. We will implement the star rating to the employee after completing project successfully, and it is very easy to find the employee of the month or year. We can generate the project list which completed on time.
Keywords: Ant Colony Optimization, project distribution, Agent based data mining, Distributed data mining.
Title: IT PROJECT DISTRIBUTION AUTOMATION
Author: Aniket Kale, Ajay Sonune, Om Awagan, Sandeep Chavan, Prof. Rupali Dalvi
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Pyung Kim
Abstract: While Twitter, micro blog service based on short messages, is important online communication media, it is increasingly important to detect and track issues through Twitter analysis. For Twitter analysis, various features including contents, time, retweets and follower relations of Twitter are used, and Twitter analysis results are visualized by using tag clouds, tree maps or time series graphs. This study aims to suggest the modelling of a trend analysis system and service for Twitter analysis results related to a specific subject to the user. The components of system architecture include data collection, data streamer, trend analysis, topic keyword extractor, language pre-processor. The proposed service is designed for presenting Twitter analysis results effectively by using selected information when a user selects the period and keywords of interest after presenting a keyword list related to a specific subject to the user.
Keywords: Trend Analysis, Twitter Monitoring, Trend Tracking, Twitter.
Title: The Trend Analysis Service Using Twitter
Author: Pyung Kim
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Miss. Vrushali Kadu, Prof. Ashish V. Saywan
Abstract: The Smartphone market has been growing at phenomenal rate. A major source of smartphone energy consumption is accessing the Internet via 3G or WiFi when running various interactive apps and background services. The energy consumed by the wireless interfaces is perceived as a necessity – after all, a smartphone provides the user with a ubiquitous portal to the Internet. Ideally, accessing the Internet should consume an amount of energy commensurate with the amount of traffic being transported and the (peak) throughput supported by the wireless technology used.
In this paper, we present a measurement study of the energy consumption characteristics of three widespread mobile networking technologies: 3G,GSM, and WiFi. We find that 3G and GSM in cure a high tail energy overhead because of lingering in high power states after completing a transfer. Based on these measurement, we study TailEnder a protocol that reduces energy consumption of mobile application.
Keywords: Cellular networks, WiFi, Energy savings, Mobile applications, Power measurement.
Title: Review of Energy Consumption in Mobile Networking Technology
Author: Miss. Vrushali Kadu, Prof. Ashish V. Saywan
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Amrutha Ramakrishnan, Lakshmi Anand, Seema Redekar
Abstract: The 3D password authentication scheme is based on a combination of multiple sets of factors. A 3D virtual environment is presented to the user where he navigates and interacts with a multitude of objects which are present. The order in which actions and interactions are performed with respect to the objects constitutes the user’s 3D password. The 3D password key space is built on the basis of the design of the 3D virtual environment and the nature of the objects selected. The advantage of the 3D password is that it can combine many existing systems of authentication, providing an extremely high degree of security to the user. Biometrics can be coupled with the 3D password to further increase the degree of security, making it extremely secure and suitable for applications in which information security is of essence.
Keywords: virtual environmnent, security.
Title: 3D Password - An Authentication System
Author: Amrutha Ramakrishnan, Lakshmi Anand, Seema Redekar
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Nandhini Vineeth, Pranav Udupa, Prasad Majali, Sagar Shetty, Sivaranjani Suresh
Abstract: Recognizing, extracting and validating various emotions from facial expressions has become an important part of improving the overall human computer interaction. Facial expressions give important information about the emotions of a person. Automatic emotion recognition using facial detection is henceforth a major area of interest within various fields. This paper reviews the literature on different aspects, such as image processing, face detection and emotion recognition. Different comparative methods for automatically recognizing facial actions in successive images are discussed. Different theories of emotions and defining unique methods for studying a variety of images in databases as well as detecting different ways of extracting emotions are studied. The purpose of this survey is also to identify and extensively study the framework, components and papers related to image processing and emotion recognition. This also helps us to establish the significance of the general fields of image processing and emotion recognition and thus help identify where a new contribution pertaining to these fields could be made.
Keywords: Image processing, Computer vision, emotion recognition, face detection.
Title: Live Analysis Using Emotion Recognition
Author: Nandhini Vineeth, Pranav Udupa, Prasad Majali, Sagar Shetty, Sivaranjani Suresh
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Aishwarya S. Pagare, Karishma K. Khairnar, Suruchi R. Kharat, Pooja S. Suryawanshi
Abstract: Nowadays, mobile devices are the most widespread hardware platforms. Furthermore, the owners of these devices install millions of applications per day, being videogames the predominant type. As a result, an immense number of people is interacting with mobile videogames at every second. Videogames currently produce more revenue than the film and music industries together. The project present a game genre centered on Bow and arrow shooting through a First-person perspective. It makes efforts to raise player’s immersion using interface, graphic effect, and so forth. In game environment space, the player experiences complexities (limited arrows) as the level increases.
The actual working of the system is that when the shooter finds the target with some indication mark then we have to shoot it and if the target is shot successfully then that level is successfully completed and player moves to next level with some power boosters.
To implement game environment system, Microsoft Unity Framework is used. It is a cross-platform game engine with a built-in IDE. It is used to develop video games for web plug-ins, desktop platforms, consoles and mobile devices. The core aspects of FPS play is to shoot at an opponent and movement through the virtual world.
Keywords: Unity Frame work, Mobile, Controller, Touch, FPS, videogames.
Title: Evaluating Performance of Point and Shoot in Bow and Arrow Shoot Mobile Game: Touch, Swipe, Rotate, Artificial Intelligence
Author: Aishwarya S. Pagare, Karishma K. Khairnar, Suruchi R. Kharat, Pooja S. Suryawanshi
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Mahesh N Nair, Vinay Hegde, SaumyaOmanakuttan
Abstract: The captioned project is an android application program that intends to provide an interface for the Placement cell of any Institution serving the training exercises and to its subscribers as well who will get to access their online exercise, tests, reports, analysis rankings and notes through the system intended to be implemented by this project. The placement cell admin will get a customized access to incorporate the timely changes, give tests and to monitor the results and progress of the cell as a whole and also at an individual level.
Keywords: Mobile Training, android application program.
Title: Placement Cell Mobile Training App
Author: Mahesh N Nair, Vinay Hegde, SaumyaOmanakuttan
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
V. Thilagavathi, V.R.Kavitha
Abstract: In portable distributed computing, a major application is to outsource the versatile information to outside cloud servers for adaptable information stockpiling. To test this issue, in this paper, We build up the Searchable encryption for multi-watchword positioned look over the capacity information. In particular, by considering the extensive number of outsourced the reports in the cloud, we use the significance score and k closest neighbor in methods to build up an effective multi-catchphrase look conspire that can give back the positioned indexed lists in view of the exactness. Security analysis demonstrates that our scheme can achieve confidentiality of documents and index, trapdoor privacy, access unlinkability, and obscuring access pattern of the search user. Finally, using extensive simulations.We leverage an efficient index to further improve the Search efficiency, and adopt the blind storage system to conceal access pattern of the search user.
Keywords: Searchable encryption, blind storage, access pattern.
Title: Privacy Preserving Multi-Keyword Search Through Blind Storage in Cloud
Author: V. Thilagavathi, V.R.Kavitha
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Chukwuedozie N Ezema, Albert C Agulanna, OkechiOnuoha, Helen U Nonyelu, Nwannedimma M Anagbogu
Abstract: The main objective of this work is to design and develop an employee performance evaluation and management system that will: improve the effectiveness and efficiency of performance evaluation and management, eradicate unnecessary delay during search/retrieval of employee records, minimize the loss of data/information of employees and evaluate and rank the employees based on their performance and set target values for all the output factors for the inefficient employees. The methodology adopted in the design of this work is the universally accepted software engineering model, which is the Structured System Analysis and Design Methodology (SSADM). This research work heralds the achievement of an automated system in carrying out performance evaluation and management which is easier, faster and interactive; interestingly it eliminates the problems associated with the old system. The utility of the new system will be maximized with the support of supervisors in carrying out performance evaluation and management tasks. This research work has revealed that a computer system can be used to perform a successful and easy performance evaluation and management exercise.
Keywords: Job Performance Evaluation, Structured System Analysis and Design Methodology (SSADM), Federal College of Education (Technical) Umunze.
Title: Rule-Based Access Control Information Management System for Effective Records Management of Employee Performance
Author: Chukwuedozie N Ezema, Albert C Agulanna, OkechiOnuoha, Helen U Nonyelu, Nwannedimma M Anagbogu
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
NIPUN GARG
Abstract: In the field of computer science and IT research, this paper suggests the basic understanding of software defined networks to all the telecom professionals worldwide and provides the foundation of this emerging technology. A new approach has been discussed in this paper which can be used by network vendors, hardware manufacturers or software companies that in turn will help them to utilize the existing resources in the best possible manner with some new innovation. This will definitely provide relevant inputs to new entrants in this area of networks and lay the basic foundation.
Keywords: LLDP, SDN.
Title: Link Utilization Using Link Layer Discovery Protocol In Conjunction with the SDN Implementation
Author: NIPUN GARG
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 1 January 2016-March 2016
Ning Cui, Xiaoting Liu, Song Yang
Abstract: In this paper an algorithm for vessel segmentation in retinal images is proposed. Firstly, on the basis of preprocessing of the retinal image, the contrast between retinal image vessel and background is improved. Then the multi-scale enhancement filter based on the Hessian matrix is used to enhance the retinal image, and finally the whole vessel network is binarized by using an iterative thresholding method.
The experimental evaluation in the publicly available DRIVE database shows accurate extraction of vessels network. The average accuracy of 95.88 with 0.729 true positive rate and 0.194 false positive rate, which is very close to the manual segmentation rates obtained by the second observer. The proposed algorithm is compared also with widely used supervised and unsupervised methods, and the experimental results show the effectiveness of the method.
Keywords: Retinal image; Preprocessing; Hessian matrix; Iterative thresholding.
Title: Multi-Scale Retinal Vessel Segmentation Using Hessian Matrix Enhancement
Author: Ning Cui, Xiaoting Liu, Song Yang
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals