Vol 4 Issue 2 April 2016-June 2016
Dr. Nita Thakre, Mr. Rohit.A.Bhusari, Mr.Shubham.M.Umbarkar, Mr.Shubham.P.Naware
Abstract: Now a days, a corruption is evil for society which reduces income of society. At every budget sanction at each step the corruption is going on resulted into less facility than actual ones. This project maintains the flow of money released by government, and intern control corruption. To inform the people about how and who has utilized the money and for what purpose.
It includes Users System contains budget officers, different departments, contractors, commissioners etc. which releases illegal activities in budget to be sanctioned by government. Departments may include agriculture, health, education, human resources etc. Each department includes Department Officer who has to distribute money among distinct regions. There may be probability of corruption by department officer. Reports should include all budget details, confirmation of money received and distributed, all details of money released and received and present work that is being undertaken by state government.
Keywords: Corruption, income of society, budget sanction, government, admin, budget officer, department officer, district commissioner, contractor.
Title: Automated System for Financial Management
Author: Dr. Nita Thakre, Mr. Rohit.A.Bhusari, Mr.Shubham.M.Umbarkar, Mr.Shubham.P.Naware
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Kavyashree B L, Prof. Nandhish A C
Abstract: In this paper, a novel structure in light of Map-Reduce innovation is proposed for abridging huge content gathering. Report rundown gives an instrument to quicker comprehension the accumulation of content reports and has various genuine applications. Semantic similitude and bunching can be used proficiently to generate powerful outline of vast content accumulations. Outlining vast volume of content is a testing and tedious issue especially while considering the semantic comparability calculation in outline process. Synopsis of content accumulation includes serious content handling and calculations to produce the rundown. Map-Reduce is demonstrated condition of workmanship innovation for taking care of Big Data.. The proposed system is planned utilizing semantic comparability based grouping and subject displaying utilizing Latent Dirichlet Allocation (LDA) for outlining the huge content gathering over Map-Reduce system. The synopsis undertaking is performed in four stages and gives a secluded usage of numerous reports outline.
Keywords: Summarizing reviews, Text-based analysis.
Title: Summarizing and Re-Evaluating Users Reviews on Network
Author: Kavyashree B L, Prof. Nandhish A C
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Prateek S, Dr T H Sreenivas
Abstract: The airborne network (AN) is envisioned as an IP-based hierarchical network with heterogeneous nodes. It is highly dynamic in nature and has bandwidth constraints. There is a need for new Airborne Network technologies needed to provide reliable network operations for terrestrial networks. This seminar topic identifies challenges in designing and evaluating AN technologies. This topic introduces a realistic wireless testing and performance evaluation framework for AN testing and evaluation. There are set of cases to illustrate how the framework can be used to evaluate new architecture and protocols in AN environments. In this topic I have only one case and evaluated the results.
Keywords: Net-centric, Network Capability, IANetserv, RFNEST, JANSS.
Title: Robust and Auto-Configurable Network Service Framework for Airborne Network
Author: Prateek S, Dr T H Sreenivas
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Naveen Kumar, Elliyash Pathan, Lalan Yadav, Viraj Ransubhe, Prof. Sowjanya Kurma
Abstract: Object detection and tracking are two fundamental tasks in multi - camera surveillance. This paper proposes a framework for achieving these tasks in a no overlapping multiple camera network. A new object detection algorithm using mean shift (MS) segmentation is introduced, and occluded objects are further separated with the help of depth information derived from stereo vision. The detected objects are then tracked by a new object tracking algorithm using a novel Bayesian Kalman filter with simplified Gaussian mixture (BKF-SGM). It employs a Gaussian mixture (GM) representation of the state and noise densities and a novel direct density simplifying algorithm for avoiding the exponential complexity growth of conventional Kalman filters (KFs) using GM. When coupled with an improved MS tracker, a new BKF-SGM with improved MS algorithm with more robust tracking performance is obtained. Furthermore, a monitoring-based object recognition algorithm is employed to support object tracking over nonoverlapping network. Experimental results show that: 1) the proposed object detection algorithm yields improved segmentation results over conventional object detection methods and 2) the proposed tracking algorithm can successfully handle complex scenarios with good performance and low arithmetic complexity. Moreover, the performance of both monitoring - and training-based object recognition algorithms can be improved using our detection and tracking results as input.
Keywords: Image Processing and Computer Vision, Histogram matching, Motion Detection, Surveillance, Hadoop.
Title: Video Surveillance over Camera Network Using Hadoop (Implementation Paper)
Author: Naveen Kumar, Elliyash Pathan, Lalan Yadav, Viraj Ransubhe, Prof. Sowjanya Kurma
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Nivedita Debnath, Supriya Guduru, Prof. Devendra Singh
Abstract: In order to provide authentication, confidentiality and security to the transmitted data the universal technique used is cryptography. Cryptography is the science of manipulating the data such that it is made unreadable for the unintended readers. It is the practice and study of hiding information. Here in this paper data is encrypted using Armstrong numbers on which RGB colours are used for authentication and key generation is done using random prime number generator thereby making use of both Armstrong numbers and prime numbers which also provides better security. Further, this encryption-decryption algorithm has already been implemented taking a 3-digit Armstrong number i.e. on a 3X3 matrix , but in this paper we would implement it taking a 4-digit Armstrong number , thereby providing security of data on a higher level.
Keywords: Data Security, Armstrong numbers, RGB colours, random prime number generator.
Title: Authentication Using Color Codes and Data Security Using Armstrong Numbers
Author: Nivedita Debnath, Supriya Guduru, Prof. Devendra Singh
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Felix Mmanuoma Eke, Joyce Chinyere Oyadongha, Anne Anthony Edem
Abstract: This paper highlights information and data-generating sources that could be explored by library users, authors and researchers. It reveals the primary and secondary information sources that aid library users and researchers in their literature search. While primary sources comprises printed or published text-books and pamphlets; serials (newspapers, periodicals, magazines); government documents (text of laws, regulations and treaties, records of government expenditures and finances, statistical compilations); manuscript and archival materials (maps, realia/artifacts, tablets, photographs, sound recordings) etc, secondary data/sources are finding tools such as catalogues, bibliographies, abstracts, indexes, databases, etc. Libraries should stock such primary and secondary sources/ data, while library users, authors and researchers are encouraged to explore them to enhance their research and publication purposes.
Keywords: Information, Data-Generating sources, Library users, Authors, Researchers, Primary sources, Secondary sources, finding tools, Publication.
Title: Information and Data-Generating Sources: Implications for Libraries, Authors and Researchers
Author: Felix Mmanuoma Eke, Joyce Chinyere Oyadongha, Anne Anthony Edem
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Blue Brain Technology
Abstract: The brain is the most complex organ in human body. The aim of blue brain technology is to upload the complete information in the brain into a computer. We can achieve this even after the death of a human body. In this way, preserve the knowledge and intelligence. The Blue Brain technology is the latest invention in the field of neural networks. This technology will open doors in the field of artificial intelligence. The blue brain technology provides a comprehensive simulation of internal connectivity of the cerebral parts with the external artificial intelligent network. This study of human brain will lead to a total outline of the flow of the electrical signals through the brain. The intelligent neurons are a part of cortex accessible in the human brain. This new technology has made way for considerable improvement in supercomputing, also known as high performance computers.
Keywords: Blue Brain, Virtual, Artificial Intelligence, Connectivity.
Title: Blue Brain Technology
Author: C.Sunitha, R.Pavithra, G.SofiyaMary
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Mr.S.Narayanan, C.Kokila, N.Kowsalya, C.Madurambiga
Abstract: Mobile Ad hoc Networks also called infrastructure less networks are complex distributed systems consist of wireless links between the nodes and each node also works as a router to forwards the data on behalf of other nodes, MANETs have been widely used for various important applications such as military crisis operations and emergency preparedness and response operations. The dynamic topology feature of MANETs makes these networks highly vulnerable to various attacks. We propose a detection scheme called the cooperative bait detection scheme, which aims at detect and prevent malicious nodes launching black and gray hole attacks in MANETs. By using CBDS its only prevent the black-hole attack, There is no possibilities to detect and prevent the gray-hole attack. So, The Packet Estimation Algorithm to Calculate packet delivery rate per hop count determine trustworthiness, To prevent both the attacks in the wireless communication. Main Advantages are preventing (or) avoiding an attack in its initial stage, Hidden attack is not possible and Qos is maintained.
Keywords: CBDS, Packet estimation, RREQ, RREP.
Title: Packet Estimation Algorithm to Prevent Collaborative Attacks in Manet
Author: Mr.S. Narayanan, C.Kokila, N.Kowsalya, C.Madurambiga
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Ajmal CS, Adarsh Kurian, Deepa Merin Jose
Abstract: This paper provides a smart generating route program utilizing the intellect of knowledgeable motorists. In this technique, GPS-equipped cabs are employed as mobile receptors searching the visitor’s beat of a city and cab drivers’ intellect in choosing generating guidelines in the physical globe. We recommend a time-dependent milestone chart to design the powerful visitors design as well as the intelligence of knowledgeable motorists so as to provide a user with the essentially quickest strategy to a given location at a given leaving time. Then, a Variance-Entropy-Based Clustering strategy is developed to calculate the submission of travel time between two landmarks in different time spots. Depending on this chart, we design a two-stage redirecting criteria to calculate the essentially quickest and personalized path for customers. We build the body with different real-world velocity data set produced by over 33,000 cabs in a period of three months, and look at the program by performing both artificial tests and in-the-field assessments. As a result, 60-70 % of the tracks recommended by our method are quicker than the competitive methods, and 20 % of the tracks share the same results. On average, 50 % of our tracks are at least 20 % quicker than the competitive techniques.
Keywords: Spatial databases and GIS, data mining, GPS trajectory, driving directions, driving behavior.
Title: Intelligent Drive Using Driver’s Intellegence
Author: Ajmal CS, Adarsh Kurian, Deepa Merin Jose
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Haitham Ennajah, Dr. Edward Chow
Abstract: The purpose of this paper is to explore and evaluate techniques and tools utilized in the world of Cloud Forensics. The main focus will be on how to acquire evidence from a cloud computing structure in a sound forensic manner, so as to preserve integrity and authenticity of the forensic evidences. Furthermore, the challenges facing investigators in acquiring data off of a cloud structure that could be out of their jurisdiction area will be discussed as well, along with recommendations based on this report’s findings in order to overcome some of the critical challenges in Cloud Forensics.
Keywords: Techniques and Tools, Critical Challenges in Cloud Forensics.
Title: Cloud Forensics
Author: Haitham Ennajah, Dr. Edward Chow
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Ashin Mathew, Vishnu Gupthan, Sneha Thankachn
Abstract: Piracy in video distribution is a challenging problem nowadays. There are many studies and researches done to prevent the piracy. We can find some of the main reason for increased piracy is unavailability of the video to the user, increased cost of video. The low bandwidth of internet makes the users to download the video to view them without interruption. The downloaded video is distributed using Bluetooth, hotspot sharing, flash drives, optical disks etc. The proposed systems solve this problem by splitting the video content and encrypting each part. To view the video content a ticket is needed. The users have to pay for the ticket. The video content can be shared among users without violating copyright laws.
Keywords: Video Encryption, Distribution, Piracy, Compression, Video Splitting.
Title: MOViEDuS: Multipart Offline Video Encryption and Distribution System
Author: Ashin Mathew, Vishnu Gupthan, Sneha Thankachn
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
MR.M.DILLI BABU, S.K.PRAVEEN, R.KAMALESH, M.ARVIND, R.PRAVEEN
Abstract: In high energy consumption of cloud data centers is a great concern of data accessing of dynamic consolidation of virtual machines in this present method if used to significant opportunity to save energy in large data centers. In this method the VM consolidation approach the use of live migration of VM that time the under loaded physical machines can be switch off or put into low power mode. At same time to achieving the exact level of quality of services provide between the cloud provider and the users is very critical, in this paper id main challenge is reduce the energy consumption of data centers for providing require Quality of Services. In this paper we providing distributed virtual machines consolidation to reduce the energy consumption of cloud data center. Finally we done the nearest optimal virtual machines method and this paper automatically allocate the virtual machines machine without buy new virtual machines in cloud computing.
Keywords: Dynamic VM consolidation, ant colony system, cloud computing, green computing, energy-efficiency, SLAF.
Title: Effective Usage of Unutilized Resource for Distributed System in Closed Network
Author: MR.M.DILLI BABU, S.K.PRAVEEN, R.KAMALESH, M.ARVIND, R.PRAVEEN
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Sonali Parkar, Samikshya Gujare, Harshali Malvankar, Sonal Balpande
Abstract: The research effort centralizes the idea to implement the system that employs Computer vision and Artificial Intelligence to solve the puzzle. Artificial Intelligence based real time Computer Vision and puzzle solver using web-cam allowsto provide the computer system with the Sudoku-puzzle in real-time and give the optimum solution to it. The system tries to analyze the environment by capturing the multiple image bursts from the real time and from those images it would detect the Sudoku grid. For the detection of the grid the use of Hough Transform technique has been made. Then the numbers are detected using OCR i.e. Optical Character Recognition. Thus, the system gets the total knowledge of the puzzle and then computes the final solution by making the use of Artificial Intelligence based strategies for getting the optimal solution to the Sudoku puzzle problem.
Keywords: Sudoku puzzle, Computer vision, Artificial Intelligence.
Title: Artificial Intelligence Based Real Time Computer Vision and Puzzle Solver Using Web-Cam
Author: Sonali Parkar, Samikshya Gujare, Harshali Malvankar, Sonal Balpande
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Hitesh Purandare, Abhishek Singh, Niket Vyas, Chhagan Chavan
Abstract: This paper addresses the issue of keyword extraction from conversations, with the objective of utilizing these watchwords to recover, for every short discussion piece, a little number of conceivably pertinent reports, which can be prescribed to members. In any case, even a short piece contains a mixed bag of words, which are conceivably identified with a few themes; also, utilizing a programmed discourse acknowledgment (ASR) framework presents slips among them. Along these lines, it is hard to surmise correctly the data needs of the discussion members. We first propose a calculation to remove decisive words from the yield of an ASR framework (or a manual transcript for testing), which makes utilization of theme demonstrating methods and of a sub modular prize capacity which supports differing qualities in the magic word set, to coordinate the potential differing qualities of subjects and decrease ASR commotion. At that point, we propose a technique to infer various topically isolated inquiries from this decisive word set, keeping in mind the end goal to amplify the possibilities of making at any rate one pertinent proposal when utilizing these questions to seek over the English Wikipedia. The proposed systems are assessed as far as significance as for discussion pieces from the Fisher, AMI, and ELEA conversational corpora, appraised by a few human judges. The scores demonstrate that our proposition moves forward over past systems that consider just word recurrence or theme closeness, and speaks to a promising answer for a report recommender framework to be utilized as a part of discussions.
Keywords: Document recommendation, information retrieval, keyword extraction, meeting analysis, topic modelling.
Title: Extraction of Keywords from Conversation for Recommending Document
Author: Hitesh Purandare, Abhishek Singh, Niket Vyas, Chhagan Chavan
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 2 April 2016-June 2016
Abin Sebastian, Vipin Mohan, Sneha Thankachan
Abstract: Video streaming is the sending of contents in a compressed form to the internet and it is displayed by a viewer in real time, with video streaming a web user does not have to wait to download a file and to play it. instead of this the media is sent in a continues stream of data and played as it arrives, nowadays tremendous studies are conducted according to the video streaming such as Gnutella, Bit torrent, Bit Tyrant, peer to peer streaming, Random push etc. This paper also compares each streaming techniques.
Keywords: Video streaming, Random push, Gnutella.
Title: Video Streaming: A Case Study
Author: Abin Sebastian, Vipin Mohan, Sneha Thankachan
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals