Vivechana 2016- National Conference on Advances in Computer Science and Engineering

"Vivechana 2016 Conference Papers "

Pages   [1] [2]
 




Mobile Healthcare Cloud As a Service[ ]


Today mobile healthcare service has expanded its area on a large scale. People find it comfortable and easier to access source rather than going to the hospital every time. The paper reviews the various aspects of the mobile healthcare system. It explains the access model by including every minute detailing and the flow process of the e-healthcare cloud. The work evaluates the mobile healthcare system with the security aspects required for different medical related areas. It compares various required medical related functions that could be performed using different mobile devices on a percentage based criteria.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ENERGY OPTIMIZATION BY GRID CLUSTERING IN WIRELESS SENSOR NETWORKS[ ]


Wireless sensor networks contain small network sensor nodes that are connected without wires with each other.They are used now a day in order to monitor borders, pressure, temperature, weather forecasting.These sensor nodes need rechargeable battery for the power supply.So the main drawback of these networks is that they have limited power supply.As these sensor nodes areused at borders where battery backup are limited, due to which energy is consumed.So to optimize energy, clustering is used in wireless sensor networks to increase the network lifetime of sensor nodes.This paper consists of grid clustering for the energy optimization of sensor nodes.In this grids are further divided into small grids in order to reduce the energy consumption.Size of grid is directly related to the transmission range of the node.So as the size decreases the transmission range also decreases this in turn conserves the energy.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review on Big data Lifecycle and Security Challenges[ ]


Big data is term referring to the process of managing huge amount of data from different sources, such as, DBMS, log files, postings of social media. The big data passes through different developmental stages order to become useful knowledge –life cycle of big data. The big data technology also raises many security concerns and challenges. In this paper, the focus is on big data lifecycle and the various possible security threats and attacks.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Survey on Various Localization Techniques in Wireless Sensor Networks[ ]


Recent improvements in Micro-Electro-Mechanical Systems (MEMS) have made it both technically possible and economically feasible to produce and use hundreds of wireless sensor nodes in a network for industrial applications. One of the challenges in a Wireless Sensor Network (WSN) is localization; meaning to assign coordinates to nodes, according to their actual positions and their premises. Localization has always been a challenge to human beings; from the early times of estimating the width of a river or distance to a ship, to the newly faced challenges of GPS positioning or Molecular structure estimation. WSN localization has been widely studied recently. But there is yet lots of work to do in the field. Localization strategies vary by the capabilities of the nodes and environmental issues; e.g., nodes might be able to measure internode distances or even may be mobile, each of which provides its own design challenges. However, one thing that is usually common among approaches is that they assume that all nodes have identical physical capabilities, all having the same radio range and that nodes know their maximum range initially.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SQL Injection: Detection and Prevention Techniques[ ]


As the use of internet is increasing rapidly, the attacks on web applications are also increasing as well. Nowadays SQL injection attack is a major issue of web applications. It allows unrestricted access to the database. The successful execution of SQL injection leads to a loss of integrity and confidentiality. In this paper, a review of different types of SQL injection attacks, their detection and prevention techniques are presented. This paper will help the researchers decide the technique of interest for further studies.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET[ ]


In the last years, Mobile Ad hoc Networks (MANET) have gained increasing attention from both the research community and actual users. As network nodes are generally battery-powered devices, the crucial aspects to face concern how to reduce the energy consumption of nodes, so that the network lifetime can be extended to reasonable times. In this paper we have discussed mobility models (which are used for efficient movement of nodes) and then routing protocols of MANET. Energy plays the vital role in any ad hoc network, hence total lifetime of the network depends upon the individual energy consumption of node. Energy is consumed in ad hoc networks mainly in two tasks i.e. processing (routing, forwarding, congestion control) and transmission (data receiving and sending). This paper has discussed the factors effecting power consumption in MANET. The factors like distance between two nodes, environment conditions, mobile nature of nodes, modes of node, transmission range of nodes and memory capacity of node are discussed here.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey on Trust Based Data Forwarding in VANET[ ]


VANET is vehicular ad hoc network in which vehicles are move from one place to another place and carry messages that are transmitted from one vehicle to another vehicle. To transfer messages to vehicles uses ITS (Intelligent Transportation Systems). During data transmission data or information may be accessed by attackers. So Security in VANET is challenging task. Various techniques are proposed by researchers to prevent VANET from attacks. Every system has its own component and also upsides and downsides. These techniques are discussed in detail after that we discussed our proposed mechanism for trust based data forwarding.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Systematic Analysis of Sequential Pattern Mining Algorithms And Future Research Directions[ ]


Web Usage Mining (WUM) is one of the key areas of Web Mining that deals with the discovery of user access patterns from weblog files. Pattern discovery phase in WUM attempts to discover hidden patterns from preprocessed weblog files by the application of various data mining techniques. Association rule mining is used in Pattern discovery phase to uncover associations among a set of frequently accessed web pages but does not take into account the sequence in which the web pages are accessed. Sequential pattern mining (SPM) takes care of the time order and thus it can be seen as a generalized model of association rule mining due to which more candidates are generated. SPM is one of the various techniques that have earned particular attention from the web mining community as these algorithms can determine the web page traversal sequences of the customers by analyzing the weblog files. SPM algorithms discovers the existent maximal frequent sequential patterns from the given sequence database. This paper intends to review sequential pattern mining algorithms systematically and draw research directions in this field.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SEGMENTATION TECHNIQUES IN IMAGE PROCESSING[ ]


Image processing is a form of signal processing. One of the mostly used operations of image processing is image segmentation. Over the last few year image segmentation plays a vital role in image processing . The goal of image segmentation is to partition the pixels into silent image segments i.e., these segments corresponding to individual objects, natural parts of objects, or surface. The problems of digital image segmentation represent great challenges for computer vision. Segmentation techniques which are used in image processing are edge based, region based, thresholding, clustering etc.In this paper, different image segmentation techniques have been discussed.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A REVIEW OF VARIOUS SCHEDULING ALGORITHMS ON CLOUD COMPUTING[ ]


Cloud computing is set of IT service that are provided to customer over a network and these services are delivered by third party provider who own the infrastructure. Cloud computing is general term used to describe a new class of network based computing over internet. Scheduling the task is quite a challenging in cloud environment. Scheduling algorithms need to be proposed to overcome the problem due to network scheduling strategy is the key technology in cloud computing. It describes various scheduling algorithms.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Database Security: Attacks and Techniques[ ]


In today’s world, the data become an essential asset as it is used in daily life from a single person to every big organization. To make the use of data efficient and maintained it is stored in database. Hence the database security is an important factor to provide integrity, confidentiality and availability of data. This paper generally provide a review of need of database security, attacks possible on databases and their prevention techniques.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Butterfly Patterns of Matrix in Interconnection Network[ ]


We have presented the unique patterns obtained from Sparse matrices of interconnected networks. We showed properties derived from these patterns. We have presented the common properties obtained from these patterns. We have showed that matrices obtained are alpha-beta band matrices. The routing function is evaluated from alpha-beta band matrices.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Evaluation of JMeter, LoadComplete and WAPT[ ]


Load testing is used to monitor the changes in system performance with increase in load to the system. Load testing is a non functional testing which is used to understand the system behavior under a specific expected load. At present there is a huge shift towards web applications and large numbers of tools are available in the market for web application performance analysis. In this paper three load testing tools namely Apache JMeter, LoadComplete and WAPT are compared. The main focus of the study is to discuss these load testing tools and compare them on the basis of key parameter called response time. The response time of these tools is compared by varying number of concurrent users. The primary objective is to study these load testing tools and identify which one of them is better and more efficient .In this study it is concluded that in term of response time WAPT has better performance than that of Apache JMeter and LoadComplete.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ant Colony Algorithms: A Brief Review and Its Implementation[ ]


Ant Colony optimization is a method to find the shortest possible path from source to sink. ACO algorithms are inspired by the social behavior of ants that use stigmergic behavior to search the food. A chemical substance left by ants, called pheromone , help them to find the food .In this paper, we present the basic behavior of ants for searching food, preliminary study of different papers related to ACO , basic ant colony algorithms and its extensions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Projectile Tracking and Launch Point Prediction[ ]


The project aims at creating a path projection for a projectile launched from a source so as to determine the source of the said projectile.This can be applied in military field where it can be utilized to track an artillery barrage.By determining the position of the gun, it will make it easier for the army to strategize. We intend to accomplish this via image processing to track an object in 3d space and reverse project its course.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
File Allocation and Recovery in FAT16 and FAT32[ ]


The data recovery is the fastest emerging dynamic technology with a huge market in the area of computer security and maintenance. In order to carry out the recoveryone is to be acquainted with the file management systems i.e. FAT, NTFS. FAT is the oldest file system which was used in MSDOS and early versions of Windows. In this paper, an exhaustive study has been performed for the two variants of FAT file systems like FAT16 and FAT32 with respect to data recovery. In addition the main differencesbetween FAT16 and FAT32 are discussed. Recovery issues are also addressed. Some techniques to recover the data that have been deleted accidently or maliciously have also been reviewed.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mutation Testing:An Oversight of Equivalent Mutant Problem[ ]


Mutation testing is an approach which will help to find software errors. Mutation testing creates different versions of a program by making small syntactic changes,known as mutants of program.However, the mutants functionally identical tomainversion,are well-known as equivalent mutants.The topic of equivalent mutants is one of major problem of mutation testing as they remain undetected in program by any test suite. Traditionally, equivalent mutants were detectedmanually,thus making testing more time consuming and difficult. Nowadays, various algorithms,mutation operators and tools are implemented to achieve a solution to the equivalence problem to some extent.Butautomatic detection of alltheequivalent mutant is still a problem.This paper gives an overview of various types of equivalent mutants,methods to overcome this problem and oversight of tools and algorithms to detect such mutants.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Twitter Streaming API Using Apache Spark in Big Data Analytics[ ]


Analysing big data is very common requirement of today; all such requirements become difficult to access when analyzing bulk of data source such as social networking sites which are having a lot of information on day basis. Twitter is the micro blogging and popular site providing social networking services today. To analyze bigger amount of tweets from twitter to get different patterns and extract relevant information is a big challenge. Apache spark is the platform that is used to analyze big data efficiently. In order to find out the context used, we make out relevant patterns from big data by using Twitter Streaming API. This paper explores the concept of twitter streaming API to extract relevant information from enormous amount of data from twitter tweets.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review: Denial of Service and Distributed Denial of Service attack[ ]


Denial of Service and Distributed Denial of Service attack has become major security issue to the current computer networks. Both DoS and DDoS are used to make a web resource or site unavailable to its genuine users. However the motive, target and method of DoS attack may vary. These attacks generally consist efforts of a person or machine to temper normal functionality of any internet server or host.The objective of this paper is to provide a survey of various methods of distributed denial of service attacks, its detection and some approaches to handle these attacks.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automated Detection of Spammers in Twitter[ ]


In the world of digital applications, a new application called twitter made a major impact in online social networking and micro blogging. The communication between users is through text based post. The open structure and its increasing demand have attracted large number of programs known as automated program also called as bots. One side of this is genuine bots, generates a large volume of nonthreatening tweets, e.g. blog updates/news which compiles with twitters goal of becoming a news information web. Other side of this is malicious bots have been greatly misused by spammers to spread spam. Spammers are the users who send unsolicited messages to a large audience with the intention of advertising some product or to lure victims to click on malicious links or infecting user’s system just for the purpose of making money. A lot of research has been done to detect spam profiles in online social networking sites (OSNs). Features for the detection of spammers could be user based or content based or both. In this paper, an attempt has been made to review and analyzed the existing techniques for detecting spam users and their profiles in Twitter. Current study provides an overview of the methods, features used, detection rate and their limitations for detecting spam profiles mainly in Twitter.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Critical Investigation on collaborative Recommendation System based on User’s credibility[ ]


Nowadays, there are many recommendation systems, accessible via internet, which attempt to recommend to users several products such as music, movies, books, etc. In order to understand them first it is necessary to have a description. In a general way, recommendation systems are systems that intend to acquire opinions or preferences about items from a community of users, and use those opinions to present other users with items that are interesting to them and thus increased the ratings for that particular item and increased the revenue of a company. From this general description, one can see that recommendation systems need two basic things to work properly: Information about the preferences of the users’, and a way to determine if an item is interesting for a user. Normally, the users’ information includes external information, such as user profiles, purchases histories, and product ratings.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Examining Polarization of Emotions in Online Shopping Websites[ ]


Today, everyone has exuberant ways to express his/her opinion, share content with others and access almost any information, hardly within a few seconds. The notoriety of online social networks and e-commerce websites has skyrocketed since last decade that they have become the indispensable need of the individual while conversing and shopping online. However, many users are harnessing these social and e-commerce websites as a mean of information and productivity. Online Shopping has overturned the idea people shop with so much ease and tremendous options. To understate insistent and arduous web surfing for comparison of various products, e-commerce websites have added a review and comment section for customers to facilitate social interaction among them which can be further analysed to detect emotion or opinion about a product -whether positive or negative. In this paper, a review of studies conducted on polarization of emotions using text mining is done to judge the shopping experience of the users and to increase the revenue for the online shopping websites from the users’ weblogs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Approach for High Security using Multibiometric System[ ]


Biometric system provides authentication to an individual by recognizing physiological or behavioural characteristics. Fingerprint is one of the most commonly used biometric for providing secure authentication, but nowadays spoofing has become an important issue to be taken into account. A fingerprint recognition system can be easily spoofed with the use of fake fingerprint of the legitimate user. But with the use of multiple instances, authentication level can be enhanced. Multi-Biometric System improves the capability of traditional biometric system. Here we have proposed a scheme by fusing different instances of a trait for raising the biometric system performance. The approach includes multiple instances of fingerprint at feature level fusion. The main purpose of the purposed scheme is to reduce the FAR (false acceptance rate), FRR (false reject rate) and total response time.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review Paper on RF Interference in Armed Forces, SES, BPSMV[ ]


This paper gives a review, regarding India’s national security. India has some neighboring countries, due to which security in border area is a big concern. Security system has become an important component in Indian defense. Attacks like 26/11, are the tragic events in terms of security is concerned. Due to lack of security analysis, the incident took place and shook the nation badly. As there were broken clues but no perfect figures were there to relate the incident. These are the intruders, who intercept the information communicated between different people working in a system. So the information is intercepted by outsiders, the problem areas so far, developments done in this field and the work that has been done to make the security system strong and reliable so far are expressed here.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
MAC Protocols in Adhoc Networks[ ]


With the increasing rate of wireless networks, the research work is increased in this field. Adhoc network is infrastructure less type of network in which nodes are communicating with each other. Collision occurs when two transmitters transmit at the same time. CSMA, CSMA/CA and Aloha are random access MAC protocols. The purpose of this paper is to give a general idea of MAC protocols. CSMA and CSMA/CA protocols are more efficient than Aloha protocol due to carrier sense mechanism before transmission.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Approach to Identify Multiple Paths in a Network[ ]


This paper presents a new technique to identify multiple paths in a network using the concept of ants in Ant Colony Optimization. This paper uses the concept of probe ant, which identifies the multiple paths to be stored at destination node. Overall purpose of this paper is to create multiple optimal paths using probe ant and ACO.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study on Quantum Cryptography and Key Generation Methods[ ]


The secure communication in the real global environment is the primary requirement for a web or network user. Quantum cryptography is a environment and the application specific cryptography method that uses the physics law for key generation. The cryptography method extracts the energy features to apply data encoding and embed the key generation algorithm with cryptography process. On the receiver side, the key decoding is used quantum method and this extracted key is then used for data decoding. There are different methods for key generation which are explored in this paper. The paper also explored the scope of quantum key protocol for key generation and encoding.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AN EFFICIENT ALL PATH ROUTING ALGORITHM[ ]


In computer networks, the data is transferred in the form of packets. To transfer a packet, there must be a known path. Traditionally single path routing algorithms were used. But that increases traffic load on that link and in case that path breaks down due to any reason then complete communication will stop. Multipath routing may be an alternate of this solution. There are so many multipath routing algorithms like edge disjoint or node disjoint. Through every multipath routing some specific paths are found out, so some path are still unused. So all path routing is used from which all path are find out, due to which efficiency of link increased and utilization of all links also grown up.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review of Homomorphic Encryption on the Cloud for Secure Data Storage[ ]


Companies are showing their interest in storing data on the clouds. In the last few years, data increases in miraculous way. The security issues are also associated with storage of data in the cloud. So the cryptographic methods for the security of data find out that will provide confidentiality. Homomorphic encryption is one of the encryption methods for the cloud applications. The data is protected and managed in the cloud using homomorphic encryption. Homomorphic encryption also uses a updating method to reduce the bandwidth consumption while transfer of large encrypted files.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Histogram-based Watermarking Technique for Securing Biometric Templates[ ]


Now-a-days, internet is used everywhere, but sometimes it becomes bane instead of boon. With the rapid growth of internet, its security issues have also been raised side by side. Security in biometric is also required to avoid it from intruders. Securing the templates in the database has gained the attention of researchers. Biometric system is different from other system in its way of using biometric traits instead of PINs and passwords which have chances of being stolen or forgotten. Thus, templates needs to be accessed only through authenticated users, which could be achieved by using techniques like liveness detection, watermarking, steganography etc. Watermarking is a technique of embedding the watermark into the host image to generate authentic image for storing in database instead of original host image.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SQL Injection Attacks: Vulnerabilities, Detection and Prevention Techniques[ ]


The last decade has observed an exponential growth of World Wide Web. There are various vulnerabilities in the web based applications which have been generally exploited by the various attackers. One of the most common web application attacks is SQL injection attack. In this paper, a critical analysis has been performed with regard to, how the SQL injection attack is carried out, the vulnerabilities that are exploited by attackers and the detection and prevention techniques that have been used in past.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cloud Computing Security Issues[ ]


Cloud Computing is a conceptual term that define the basic of tomorrow’s computing. After research of many years on virtualization, distributed computing and networking the beneficial final result comes in the shape of “Cloud computing”. Cloud computing is totally internet based technology where user data is stored and maintained in various data center provided by cloud provider. Some issues are also there other than cloud computing strength and that are it suffers from various security issues like data security, privacy of users information and security from infected applications.This paper presents a review on basics of cloud computing and on some security issues attached with this new technology.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A REVIEW ON WEB PAGE CHANGE DETECTION TECHNIQUES[ ]


The World Wide Web is growing exponentially adding billions of web pages daily. Most of the information on the Web is dynamic in nature. Web crawler crawls the new as well as the web pages which have changed since the last crawl and index them in the search engine database. In order to increase the efficiency, the web crawlers need to detect the changes in the web pages so that only those pages which have changed need to be index in the search engine. So, to do that many page changes detection techniques have been proposed in the literature which is systematically analyzed in this paper. Many weaknesses in the techniques are found and future research directions are drawn.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A NOVEL ROUTE REPAIRMENT APPROACH FOR CBR[ ]


A Mobile Ad Hoc Networks (MANETs) consists of collection of mobile nodes which are dynamic in nature, forming arbitrary topologies with time. Path connecting source nodes with destination node may become unstable, go down at any time and hence route maintenance or Repairment is an important task to be performed regularly. As compared to other routing protocols Cluster Based Routing (CBR), a hierarchical protocol performs well in terms of bandwidth and energy conservation. In this paper cluster based routing has been discussed and a new route Repairment approach has been proposed for the same.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Search operation #1[ ]


Identification of Events in Social News Streams Tabiya Manzoor Beigh taha.beigh@gmail.com Shuchita Upadhyaya shuchita_bhasin@yahoo.com Girdhar Gopal girdhar.gopal@kuk.ac.in Department of Computer Science & Applications, Kurukshetra University, Kurukshetra-136119 Abstract Current age can be well described as the age of digitization. The digital universe uses enormous amount of structured as well as unstructured data. The data can be in any form, of any shape and size. The data being generated evolves from almost everything and every source which could be imagined in present era.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Use of Strategy Design Pattern in Service Oriented Architecture for Healthcare System[ ]


Healthcare system is one of the most important and uncertain era for the people or society. The patients need to improve very fast with fewer complexities. Now a day, technologies play great role to reduce the complexities in specific era. Service oriented architecture (SOA) provides the web-services in integrated and distributed environment. Service oriented architecture combines the design pattern to improve usability and recurrence solution of the problems. The Service oriented architecture with design pattern improve the solution (improve health of the patients) of patients problem at any instance of time in global environment. The Strategy design pattern strengthens the selection of suitable method among the number of methods as per the circumstances. The services of SOA are inexpensive, easy to access, reducing in operating cost and improve medical protocols.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improving Sensor Interoperability for Fingerprint Biometric Systems[ ]


Interoperability refers to the system’s ability to work with various set of devices. Fingerprints of a person are the oldest biometric identifiers and are most widely used for authentication purposes. The advances in sensor technology allow us to acquire fingerprint data of a person through variety of fingerprint sensors. The manufacturing technologies of these sensors are different. With the advancing technology, it is common to replace older designs with newer ones. So, the sensors used at the time of fingerprint enrollment and identification can be different. Different types of sensors can induce different types of variations in resolution, scanning area etc. So, there should be interoperability between sensors otherwise the performance of recognition system will be affected. The system should be able to handle the variations induced by different sensors used. This problem is discussed and a solution to overcome this problem is proposed in this paper.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review Paper On Security issues in Wireless LAN[ ]


Wireless LAN is the most commonly used everywhere nowadays. Wireless LAN is commonly used only because it is easy to use and maintain. We can access it easily ad work effectively with it. But because of higher availability of wireless LAN means its increased attacks, errors and challenges for any organization. In this paper we will discuss about various security issues and threats. In order to study about various security threats this paper will examine about the various attacks such as DOS attack, session hijacking, man-in-middle etc. attacks. This will also explain various securities like confidentiality, availability and access controls. This will help to humans to understand that how actually it is.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Analysis between Theoretical Model and 2-Phase Method for Mining Profit Based Pattern[ ]


Every business organization needs profit. Profit based pattern play an important role in several real life applications. Mining efficient profitbased pattern is a difficult task. Several researchers have been proposed efficient algorithms for mine profit based pattern. Each and every algorithm tries to minimize useless candidate’s generation, minimizing traversal at each phase, reducing memory and execution time. In this paper we proposed a comparative analysis over two basic models Theoretical and Two phase model. Our comparison is based on some parameter like accuracy, arithmetic complexity and candidates cutting strategies.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey of Recommender Systems[ ]


Recommender System (RS) is one of the appealing topics in data mining and machine learning fields. Recommender System is data analysis software that helps in decision making processes such as what item to buy, what music to listen, what online news to read and so forth. Given a set of users and their reviews of items, RS generates ranked list of items to recommend to individual users. It predicts the rating of an item that a user has not rated yet. Recommendation generation phase recommends novel and relevant data from tremendous amount of data overloaded over internet. It acts as a subset of information filtering system. Its main aim is to provide products or items to users which are of high interest to them. This paper reviews the various recommender system techniques in a systematic way and aid new researchers to gain new insights or vision in this field.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Energy Efficiency in Internet of Things[ ]


The term Internet of Things is integrated of various technologies like wireless technology, sensor technology , and network technology and many more, by which globally connected real- time application can be developed through various objects like sensor, devices ,etc . where connection take place between devices is known as machine-to-machine (M-M). IoT having very complex nature and plays its vital role in many areas like medical era, industrial field, to make everything smart as smart city, as smart environment and so on . In IOT as the involvement of human decrease , less energy consumed by direct connection among devices. This paper introduce detailed and comparison study on various energy efficient method proposed by different author .

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A survey on battery conservation approaches in MANET[ ]


MANET is a network having mobile nodes communicating with each other without any fixed topological structure or centralized administration. These mobile devices operate on batteries which may be homogeneous or heterogeneous depending upon the scope of network. Efficient power consumption is therefore a major indicator for maximizing network lifetime. To maximize the lifetime of MANET, it is quite important to maximize the life time of communicating nodes in order to make them active by minimizing their transmission as well as processing power consumption. Ad hoc network undergoes various challenges like less memory space, limited bandwidth, battery backup limitation, route discovery and selection, data forwarding etc. Power is consumed basically in processing(routing, forwarding etc.) and transmission(sending, receiving). We will focus our attention towards various energy efficient techniques which can be used to maximize the lifetime of MANET and minimizing the power consumption through routing, sleep time effect etc.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review of Genetic Algorithm and Mendelian Law[ ]


Optimization is a commonly encountered mathematical problem in all engineering disciplines. It literally means finding the best possible/desirable solution. There are various optimizations techniques available like GA (Genetic Algorithm), Evolution strategy, DE(Differential Evolution) etc. Different researchers proposed various theory and techniques to handle optimization problem. Gregor Mendel provides various laws to overcome optimization problems. While Darwin, provides theoretical concept to evaluate optimization problems. This paper provides detailed study of different Meta heuristic techniques also provides Mendel’s laws and Darwin theory of evaluation.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pages   [1] [2]