ACSE 2017- National Conference on Advances in Computer Science and Engineering
"ACSE-2017 Conference Papers "
A Study on Sixth Sense Technology[Full-Text ]
Ajesh M.S & Subin P Sabu, Ms. Mintu Movi‘Sixth Sense’ is a wearable gesture interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. Sixth Sense Technology may change how we look at the world forever. Sure, it is a system that projects information about what surrounds you over objects' surfaces, but it's also much more. By using a camera and a tiny projector, Sixth Sense sees what you see and visually augments any surfaces or objects we are interacting with.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Project Quality Assurance using Traceability Matrix[Full-Text ]
Anupama Saswihalli, Shilpa KongiRequirement Traceability Matrix (RTM) keeps track of all user requirements and maps it with test case ids. This document contains the various steps that are used to create a traceability matrix. In this paper we include template of RTM which contains requirements and its associated test case that is required in any of web based project and also benefits of using this matrix which will assure the quality of the project. We are focusing on RTM which manages, maintains and check the test cases against the specified requirements, it also defines the expectation of the testing team. Software always contains a bug that needs to be fixed, but traceability helps to minimize failures and helps to deliver the right software. Ensures the team are not just building the product right, but also building the right product.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Informative and Comparative Study of Process Mining Tools[Full-Text ]
Aruna Devi .T, Dr. Kumudavalli M.V, Dr. SudhamaniService-oriented enterprise computing systems are the recent trends in which the business process plays a vital role. Nowadays theorgani-zations are keen on storing their data in a useful format so that the database creation and retrieval process becomes easier. Event logs are stored in information systems like ERP, CRM and WFM which captures different activities in the organization which can be further used for creating business process models. Process mining research is to fill the gaps between business process and various IT systems. One of the main objectives of process mining is to extract information from event logs. The extracted knowledge from these logs enable us to determine the actual process and existing process models for further analysis, evaluation and continuous improvement in their quality. Various process mining tools are available in the market as open source and commercial tools. Abrief detail about the existing tools and their functionalities are compared and explained in this paper. Some of the process mining tools, namely ProM, Disco, and Celonis are discussed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparison of Predictive Models in Data Mining and Impacts of Air Pollution in Metropolitan Cities[Full-Text ]
ASHA N, Dr M P Indira GandhiThe prodigious increase in vehicle population and industries has led to the concentration of air pollutants in major metropolitan cities. The behavior of the air pollutants has a censorious slam on human health and environment. The health hazards caused due to alarming rate of air pollutants in large scale have to be forecasted and predicted to protect human health. Monitoring and predicting the voluminous data collected abundantly from various monitoring stations at urban area is opened challenge for discussion. This led to the scientist to look for several predicting data mining techniques and big data analytics to monitor and predict the urban air quality. The objective of this paper discusses about different approaches and comparative analysis of data mining techniques like linear regression, back propagation and big data analytics like Map reducing, Geostatistical methods to predict urban air quality.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Contribution of Biometrics in Securing Mobile Phones[Full-Text ]
Bojamma A.M, Rohini Suzana J, Dr.M.P.Indra GandhiMany mobile phone users consider the PIN to be inconvenient as a password that is complicated enough and easily forgotten and very few users change their PIN regularly for higher security as can been seen. Mobile phones have become the most important resource an individual can possess and has a million chances of getting stolen. With the expansion of the functionalities of a mobile phone personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices is highly at stake. How can the data that is present in the mobile phones be secure? Biometrics is the solution to it. This article describes the role of biometrics in cellphones to ensure security.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study of Security Schemes and Related Issues inOnline Payment Systems[Full-Text ]
Channakeshava RNThis paper provides a study on existing security schemes in online payments systems and their strengths and weaknesses. Which include security schemes adopted by internet banking, EFTs, Debit/Credit card transactions and wallets etc., As these transactions are carried through transmission medium laid in public access areas, there is always threat of someone intruding into the transmission medium and gets the critical information so that he may utilize the critical data for his benefit. If the transactions carried through online are not secured enough customers or banks always exposed to threat of losing money. For ensuring secured transactions security is enforced in different levels encryption, OTP through phone, security pin etc. all these methods adopted for security willnot deny intruder from reading the content, but makes the information unreadable for a third person.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Energy Efficiency Sensor Scheduling to Ensure Quality of Sensing in Multi-task WSNs[Full-Text ]
Dhivya Bharathi K, Dr. E. Srie Vidhya JananiThe recent development of information and communication technologies has realized the significance of Software-Defined Sensor Networks (SDSNs), which has the ability to adapt to any underlying application requirements together efficiently utilizing the resources of WSNs. A sensor node in SDSN can perform multiple tasks with different sensing targets simultaneously. A given sensing task involves multiple sensors to achieve a certain quality-of-sensing. Subsequently, this necessitates an energy-efficient sensor scheduling and management strategy that in turn will guarantee quality-of-sensing for all tasks. The paper addresses three issues with relevance to quality-of sensing; sensor activation; task mapping; sensing scheduling. The proposed sensor scheduling and management strategy effectively decides the subset of sensor nodes that shall be activated; the task that each sensor node shall be assigned and the sampling rate on a sensor for a target. The problem is addressed with mixed-integer linear programming (MILP) thereby overcoming the computation complexity. Further, an online algorithm has been proposed which attempts to deal with sensor node participation and departure, during communication in SDSN. Simulation results prove that the proposed online algorithm performs better in terms of network energy efficiency and rescheduling time.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Identifying various Routing Attacks in Optimized Link State Protocol[Full-Text ]
Hamela K, Kathirvel AyyaswamyA computer network which can be established without a predefined infrastructure is known as wireless adhoc network. Adhoc network can also be classified into various category like Mobile adhoc networks (MANETs),Vehicular ad hoc networks (VANETs),Smartphone ad hoc networks (SPANs),Internet-based mobile ad hoc networks (iMANETs), Military and Tactical MANETs. Here we discuss about one type of wireless adhoc network namely MANET. In MANET, each node itself acts as a router to communicate with neighboring nodes. For the purpose of establishing route between nodes we use routing protocols, which will help to transfer the data packets. Routing protocol in MANET is organized as pro-active routing protocol and reactive routing protocol. One type of pro-active routing protocol is Optimized Link State Protocol (OLSR). In this paper we try to identify various routing attacks in OLSR.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Towards Energy Efficient Communication to Enhance Sustainability of Underwater Acoustic Sensor Networks[Full-Text ]
Dr.E.Srie Vidhya Janani, A.Jaya LakshmiThe emerging field of Computational Sustainability in Underwater Wireless Sensor Networks (UWSNs) focuses on the design of products, processes and services to satisfy the needs of large scale underwater applications. Ocean bottom sensor nodes can be used for oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications. With the dissemination of mobile devices with Internet connectivity, Oceanographers and marine ecologists who are mobile users can interact with underwater sensor networks to collect underwater data, anytime, anywhere using user-friendly mobile applications. The utility of UWSNs is far restricted by many theoretical or practical obstacles. Most underwater sensor nodes adopt un-rechargeable batteries with limited power supply. The wireless links among the sensor nodes appear to be unreliable and easily affected by various environmental factors. Nevertheless, there are hardly any fundamental results on the network capacity of duty-cycled UWSNs with unreliable wireless links. The sustainability of computing in the perspective of UWSNs relates to effective management of energy consumption, operating under energy constraints, and dealing with the environmental impact of electronic devices and systems. Our research addresses an energy efficient communication with a light weighted encoding technique called Lineage Encoding that overcomes the technical barriers of the large Scale UWSNs. The work is driven by the practice of autonomous interrogation of undersea data collected remotely for mobile environment. The simulation results portray the UWSNs to be sustainable under various network conditions.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AmalgamationofSlotAntenna and FractalAntenna forUWBApplications[Full-Text ]
Dr G JyotiAntennaswereproposed with varied methods ofpracticalandtheoreticalsimulations to achieveultrawidebandwidth[UWB]for UWB devices.Thispaperis intended to analyzevarietiesof proposed slot and fractal antennasandtheir methods ofanalysisby availablesoftware andtheirlacunato combinethemtoachieveUWB.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Hadoop Spark Framework for Machine Learning Using Python[Full-Text ]
J V N LakshmiInformation is mounting exponentially and hungry for knowledge. As data is increasing, world is moving in hunting knowledge with the help of analytics in this age of Big Data. The flooding of data emerging from diverse domains is labelled for automated learning methods for data analysis is meant as machine learning. Spark is a framework build upon Hadoop for implementing the Linear Regression and Naïve Bayes statistical method used for predictive analysis. It calculates the Random mean square error and time required for this to be processed. Both the techniques are compared for time efficiency. The results for calculating the RMSE are evalated to minimize the complexity. These methods are implemented in this paper using python programming tool for analysing the datasets.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Approximations of Fuzzy PredicatesThrough Rough Computing[Full-Text ]
BNV Satish, D.Latha, D.Rekha, G.GanesanAs Fuzzy Predicates have enormous applications in Artificial Intelligence and Machine Learning, the authors focus on deriving a Mathematical Tool for approximating Fuzzy Predicates through Rough Sets. In this paper, we discuss the modified implication, Equivalence rules and Normal forms of Fuzzy Predicates through Rough Computing.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Internet service @ Jain University: A study of SCMS library, Bangalore[Full-Text ]
Meeramani NThe internet has revolutionized the way people access information and has opened new possibilities in areas such as digital libraries, virtual libraries, scientific information retrieval and dissemination. The present study has been carried out for the purpose of taking into account the use of internet by the students of SCMS, Jain University library, Bangalore. The objective is to know the usage of internet resources by the students for their study and research. A well- structured questionnaire was distributed among the students to find out the use of internet facility and its services and resources. It also covers the problems faced by the internet users.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study and Comparative Analysis of Wireless Routing Protocols[Full-Text ]
K.Murugan, Dr.P.SureshWireless networking is an emerging technology that allows users to access information and services electronically, regardless of their geographic position. Wireless networks can be classified in two types: Infrastructures Network and Infrastructuresless Network. Infrastructures network consists of a network with fixed and wired gateways. A mobile host communicates with a bridge in the network (called base station) within its communication radius. The mobile unit can move geographically while it is communicating. When it goes out of range of one base station, it connects with new base station and starts communicating through it.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Exploring the Creation of a Non-Image Data Base Employing Slope and Inclination parame-ters of linear edges of an Image[Full-Text ]
H S Nagalakshmi, Dr Sanjay Pande, Dr P NagabhushanThis research proposal aims at creating a Non-image based retrieval system that has the advantages of efficient matching and retrieval of image, which isdue to the usage of only two image parameters such as slope and inclination captured using a histogram based regression line. The proposed system is expected to be experimented with different types of images from the bench mark dataset of CBIR.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Eyesight on Educational Benefits of Multimedia in Teaching & Learning[Full-Text ]
Nagesh Salimath, Hemalatha K, Dr.Jitendra Sheetlani Multimedia as the name itself suggests use of many media into one.It can be in the form of graphics,text,sound etc.When all these are put together then it is termed as multimedia.It is important to know how much these are useful to us in the teaching and learning process. It has lot of impact on the human race especially in the field of education.Multimedia is a skill that each and every individual must possess.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Open Source Authoring Tools for eContent Development - Issues and Challenges[Full-Text ]
Dr.Nanditha Prasad, Mrs. Sasikala P and Mrs. Jayamma K.V.E-Content is a very power full tool of higher education. E-content is valuable to the learners and also helpful to teachers of all individual instruction systems. E-content is the latest method of instruction that has attracted more attention to gather with the concept of models.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computer Application of Ward’s method for RAPD analysis of mulberry varieties[Full-Text ]
Nataraj.K, and Chikkaswamy.B.K. Many statistical techniques that allow finding similarities or differences among data and variables. Cluster analysis encompasses many diverse techniques for discovering structure within complex sets of data. The objective of cluster analysis is to group either the data or the variables into clusters such that the elements within a cluster have a high degree of “natural association” among themselves while clusters are “relatively distinct” from one another. To do so, many criteria have been described: partitioning methods, arbitrary origin methods, mutual similarity procedures and hierarchical clustering techniques. One of the most widespread hierarchical clustering methods is the Ward's method.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Security Issues and Solutions in Mobile Computing[Full-Text ]
Naveen Kumar.K, Soniya.V“Mobile computing as a generic term describing ability to use the technology to wirelessly connect to and use centrally located information and application software through the application of small,portable and wireless computing and communication devices[1]”. In recent years we can see that it has come a very long way of providing anytime, anywhere service and access to information needed.It is an interaction between human and computer which allows transmission of data, voice and video.Mobile computing involves mobile communication, mobile hardware and mobile software. Security is a major concern for any mobile computing device such as Laptop, Notebook, Mobile Phone, Personal Digital Assistant (PDA), Smart phone etc. As all our mobiles contains sensitive data and accesses the Internet. Due to the inherent nature of these devices such as Mobility and Portability, they encounter additional security issues compare to the conventional computing devices. So there is a need to secure these devices from the various attacks. In this paper we bring out some of the issues related to mobile device security in detail, in terms of Physical, Logical, and Network categories. Also have mentioned some simple solutions to overcome these issues and to protect the devices from various problems.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Proposed Technology Strategies Which can Overcome Challenges of E-Governance[Full-Text ]
Prof.Parvati N Angadi , Ms. Sharada.C , Ms.Bharathi NThe paper is a contribution to the ongoing debate on the appropriate mechanism for good governance particularly in the developing countries like India with the involvement of Information Technology in the system of the government and for the betterment of the society. It focuses on the practices and solution for e Governance implementation and the issues related to its implementation. It highlights the benefits and challenges of implementing e-governance while considering factual speciality, pecularities, growing impact of Information Technology and need of developing and developed countries.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multilevel Image Thresholding using OTSU’s Algorithm in Image Segmentation[Full-Text ]
Priya M.S, Dr. G.M. Kadhar NawazIn any image processing research the main focus is the image which is expected to clean to analyze the expressions or features in it. Most of the images are disturbed with noise either because of natural phenomenon or by the data acquisition process. Pre-processing of images are used improve the quality of the image, which makes the subsequent process in image recognition easier. In this paper we discuss the thresholding algorithm for image pre-processing. Image segmentation is the fundamental approach of digital image processing. Among all the segmentation methods, Otsu method is one of the most successful methods for image thresholding because of its simple calculation. Otsu is an automatic threshold selection region based segmentation method. This paper studies various Otsu algorithms.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Predictive Performance of k-NN Classifier and K-Means Clustering in Imputation of Missing Values[Full-Text ]
Priya.S, Dr Antony Selvadoss ThanamaniThe presence of missing data in a datasets can affect the performance of classifier which leads to difficulty of extracting useful information from datasets. Missing Data is a widespread problem that can affect the ability to use data to construct effective predictions systems. We analyze the predictive performance by comparing K-Means Clustering with kNN Classifier for imputing missing value. For investigation, we simulate with 5 missing data percentages; we found that k-NN performs better than K-Means Clustering, in terms of accuracy.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Biomedical Named Entity Recognition- A Theoretical Study[Full-Text ]
PUSHPALATHA M, Dr. ANTONY SELVADOSS THANAMANIThe present paper deals with the review work of the present trend of data and its types. This paper deals with the named entity recognition in biomedical filed and its categories. Named entity is a task which involves the extraction of infor-mation in relation to biomedical data. It extracts the information regarding the clinical problems, solutions, practices and other details relating to problems which will help the clinicians to handle the other such cases in further. So in general the named entity recognition in the field of biomedical is a ready encyclopedia for the society and people.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Low Delay and High Throughput Data Collection in Wireless Sensor Networks with Mobile Sinks[Full-Text ]
A.Rehash Rushmi Pavitra, Dr.E.Srie Vidhya JananiWireless Sensor Networks enabled with Mobile Sinks (WSN-MSs) are observed to be a sensible cost effective replacement towards the implementation of traditional wireless sensing framework. Data collection seems to be a task of highest importance in WSN-MSs. When data collected from the sensor nodes are broadcasted to the MSs an increased delay with a minimum throughput is experienced which in turn leads to high implementation complexity. Subsequently, this necessitates a light weighted routing and scheduling technique called Opportunistic Backpressure Collection (OBC). WSN enabled with MSs is simulated with high-powered networked queuing methods. The technique attempts to reduce the queue length. The approach seems to ensure low delay and high throughput thereby outperforming in large scale sensor networks. In large scale sensor networks OBC achieves an optimum index behavior in terms of end-to-end delay and energy efficiency in comparison to other techniques. The experimental results conform to maximize data collection in WSN-MSs complementing towards the performance of Large Scale WSNs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Prevention of Data Overcollection In Smart Devices[Full-Text ]
V R S Sam Anand, Dr E Srie Vidhya Janani Mobile Security emphasizes on data overcollection which amounts to data being collected by any application or by any process, other than the required functionalities which comes under permission of the users. It seems to be unavoidable since the devices leak privacy data with user’s permission but without their knowledge. Such applications run as a service in background process without the user’s knowledge. Every device has the user’s privacy data such as their personal information and certain sensitive information like the bank account details and so on. This data over-collection becomes an important severe potential hazard for privacy in devices. This privacy issue is mainly focused in the all smart devices which uses smart operating systems like Android, IOS, Windows phone Operating System etc. Such problems are to be treated as malwares. But unfortunately, the data over-collection is complex to solve unlike the malware because of its undue legitimacy with user’s permission. This highly necessitates displaying to the user what data has been collected by the apps thereby allowing the user to impose control on permission to the apps with relevance to privileges found in the user’s device. The data collection issues in Mobile environment has been resolved with the data overcollection prevention algorithm using mobile-cloud framework proposed. By using mobile-cloud framework, the users can store the information in the cloud environment where a huge number of users are involved. Mobile-Cloud framework is created by using Android Studio for developing an application which runs in android platform, collects the information from the apps installed in the device and verify the authentication. The cloud environment can be created by using any open source tools. The results are calculated by the performance of the framework.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review on Image Mining Techniques[Full-Text ]
K.Saraswathi, Dr.V.Ganesh BabuIn this paper, the overview of the Image Mining techniques are surveyed. Feature selection and extraction is the pre-processing step of Image Mining. Obviously this is a critical step in the entire scenario of Image Mining. Our approach to mine from Images –is to extract patterns and derive knowledge from large collection of images, deals mainly with identification and extraction of unique features for a particular domain. Though there are various features available, the aim is to identify the best features and thereby extract relevant information from the images using different image mining techniques. Various methods for extraction are used in this paper. Content Based Image Retrieval is the popular image retrieval method by which the target image is to be retrieved based on the useful features of the given image. In this paper, the concepts of Content Based Image Retrieval and Image mining have been combined and a new clustering technique has been introduced in order to increase the speed of the image retrieval method. Experimental results show that the features here used are sufficient to identify the patterns from the Images. The extracted features are evaluated for goodness and are tested on the images. This paper presents a survey on various image mining techniques that were proposed earlier in literature.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Study of Sentiment Analysis Techniques in Web[Full-Text ]
Sasikala P, L.Mary Immaculate SheelaThe development of web contributes a huge quantity of user created content such as customer feedbacks, opinions and reviews. Sentiment analysis in web embraces the problem of aggregating data in the web and extraction about opinions. Studying the opinions of customers helps to determine the people feeling about a product and how it is received in the market. Various commercial tools are available for sentiment analysis. In this paper, we are going to compare and analyze the techniques for sentiment analysis in natural language processing field.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Hazy Video Recovery using Guided Filtering[Full-Text ]
Shari ThomasRestoration of weather degraded videos, especially hazy videos are important in computer vision/graphics. A method for de hazing of videos using dark channel method along with the use of guided filter is proposed. On the hazy video first dark channel approach is applied for transmission estimation and then for better enhancement guided filter is applied. Guided filter relies on a guidance or reference image. It has a better filtering capability and fast running time and gives us a clear haze free video. The proposed method will successfully be applied to videos; hence we can use this algorithm in even real time video applications.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computer Science in Sports[Full-Text ]
SHIVANNA R,Chandrashekar C, Sharadamma BComputer Science in Sport is an interdisciplinary discipline that has its goal in combining the theoretical as well as practical aspects and methods of the areas of informatics and sport science. The main emphasis of the interdisciplinarity is placed on the application and use of computer based but also mathematical techniques in sport science, aiming in this way at the support and advancement of theory and practice in sports. The reason why computer science has become and important partner for sport science is mainly connected with the fact that the use of data and media, the design of models, the analysis of systems etc, increasingly requires the support of suitable tools and concepts which are developed and available in computer science.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Challenges in Surveillance Video Forgery Detection[Full-Text ]
Sowmya K.N, Dr H.R ChennammaIn the modern world / current scenario technological advancements in the area of photography has made pave for digital cameras by replacing classical analog cameras which are increasingly used to record events in day to day life. Law or security enforcement agencies are increasingly relying on digital photographs or videos for corroborating evidence against crime scene scenario. Verifying authenticity and integrity of such digital evidence which was gathered from crime scene place an important role Various forensic tools help in examining the digital evidence to identify whether it has been forged or not.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computer framework for identifying the nationality[Full-Text ]
Suma M, Dr M P Indra GandhiIdentification of a person's nationality is a legal responsibility of the respective state. In the area of image processing, face is one of the most challenging biometric traits. In recent years, gender identification, compete with age, has gained a lot of importance and it has also become one of the challenging areas in research. In addition to this, the analysis of traits also helps in identifying the nationality of a person, and this adds value to immigration-related activities.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Method for Different Noise Image Format by Restoring the Images from Image Processing[Full-Text ]
Sumanth S, Deepak KA good efficient method of high resolution image tone mapping is proposed here, filter is proposed for edge-preserving decomposition of an image. Compare to other filter it is different from previous filters in its locally adaptive property. The filtered image contains local means everywhere and preserves local salient edges. Comparisons are made between our filtered result and the results of three other methods. A detailed analysis is also made on the behavior of the filter. Multi scale decomposition with this filter is proposed for manipulating a high dynamic range image; the multi scale decomposition with the filter addresses four assumptions: every scale’s salient edges are relatively large gradients in a local window; and all of the nonzero gradient information belongs to the detail layer. An effective function is also proposed for compressing the detail layers. The reproduced image gives a good visualization. Experimental results on real images demonstrate that our algorithm is especially effective at preserving or enhancing local details.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Resource Allocation Using Game Theoretic Model in Cloud Computing[Full-Text ]
Sushmitha. N.R, Vikash KumarCloud computing provides computational resources as a highly scalable service in a pay-as-you-go model and implements high performance computing in a distributed way. This paper proposes a resource allocation algorithm based on game theory for multi resource environment. Each physical server providing resources is treated as a game player and knows the utility information of other players. To achieve the fair allocation among users while keeping a high resource utilization level, we design a 'fairness utilization trade-off utility function'. This paper focuses also on trying to maximize the minimum consumption among these multiple resources and lowering the uneven consumption of different resources [1].
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Business Intelligence Model- Enhancement of Quality Education System Using Data Mining Techniques[Full-Text ]
Tapan NayakThe objective of research paper is to provide the basic idea in the quality education systems to understand which factors might test the quality of the students. The necessity of having institutional achievement in further enhancement of value added education systems to give good quality students and career, one way to do this is by using valid database management and processing of the students information. A data mining methods represent a valid approach for the extraction of precious information throughout their years of study from existing student’s data base to manage relations with other students. This may indicate at an early stage which type of students will potentially be success and what percentage result will be and what areas to concentrate upon in education systems for improvement. For this purpose a data mining framework is used for mining related to academic data from existing student, and the rule generation process is based on the classification method. The generated rules are studied and evaluated using different evaluation methods and the main attributes that may affect the student’s quality have been highlighted. Software that facilitates the use of the generated rules is built which allows the quality education systems to predict the student’s quality in respect of degrees awarded.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A REVIEW ON APPLICATION FIELDS IN CLOUD COMPUTING[Full-Text ]
S. ThangaduraiCloud processing is the figuring that offers virtualized IT assets as an administration by utilizing Internet innovation. In distributed computing, a client loans IT assets as required, uses them, get a support of constant adaptability as per administration stack, and pays as he/she goes. Distributed computing is turning into an adoptable innovation for a significant number of the associations with its dynamic versatility and utilization of virtualized assets as an administration through the Internet. Distributed computing utilizes the internet and focal remote servers to keep up information and applications. In this paper we will experience distributed computing administrations, cloud administrations models, cloud organization models and we concentrate on different use of distributed computing in different fields, for example, E-Learning, E-Governance, Research Field, Banking and Financial Services, Library, Social Networking and Backup Services. This will help in comprehension distributed computing and it's administrations betterly.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Provision of Uninterrupted Services to the Users in the Libraries and Information Centers through Cloud Computing[Full-Text ]
Dr. C S Venkatarama Reddy & Mrs. Jayamma K VCloud computing is a boon for the networking technology to overcome the hindrances of technical capabilities of handling information or data. The cloud is paved way to overcome the problems of infrastructure, storage, servers and other technical capabilities of the handling the information. The paper overviews the concept of cloud computing, architecture, storage and models of cloud computing. The cloud computing is also boon for the libraries to manage the data or information by using this technology. It also helps in maintaining the large online databases and content management systems. The cloud computing applied in the areas of libraries like Library automation, institutional repositories, web hosting, content management system, hosting databases, Knowledge Management etc.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Applications of Data Mining Techniques for Knowledge Management[Full-Text ]
YETHIRAJ N G, NAGENDRA B R, NOOR AYESHAData mining is one of the most important steps of the knowledge discovery in databases process and is considered as significant subfield in knowledge management. Research in data mining continues growing in business and in learning organization over coming decades. This review paper explores the applications of data mining techniques which have been developed to support knowledge management process. The discussion on the findings is divided into 4 topics: (i) knowledge resource; (ii) knowledge types and/or knowledge datasets; (iii) data mining tasks; and (iv) data mining techniques and applications used in knowledge management. The article first briefly describes the definition of data mining and data mining functionality. Then the knowledge management rationale and major knowledge management tools integrated in knowledge management cycle are described. Finally, the applications of data mining techniques in the process of knowledge management are summarized and discussed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
WRITER IDENTIFICATION IN HANDWRITTEN DOCUMENT USING OCR TECHNIQUE[Full-Text ]
Smt.Vidya DAn image is a digital representation of real-world scene composed of discrete elements called pixels. Pixels are parameterized by position,intensity,time these parameters define still images,video, volume data and moving volumes. Digital image processing operations are electronic data processing operations on a 2-D array of numbers. The array is a numeric representation of an image.Optical Character Recognition (OCR) deals with the automatic machine recognition of characters present in a document image. OCR converts the paper manuscripts to digital documents where entire contents can be read and processed by machines.The utilities proved by OCR systems are manifold postal automation, banking automation, digital library creation and the design of reading aids for the blind in the form of text-to-speech converters.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Exception Based Scanning and Assigning of Data Variables[Full-Text ]
Dr. Kumudavalli M.V, Rohit Kumar Singh, Amthul HaiData validation is a necessity when it comes to data parsing. Choosing whether the given data can fit into the given data type or not is a concern to the programmers. Error in input and ignoring the resulting exceptions may result in undesired working of the program. This is of concern to programmers which takes a lot of their coding time and effort. To end this the current function/class read_var is being developed which checks for the given input, compares the input to match with the given data type and gives exceptions if the data is not suitable and assigns the value if it fits the data type. read_var is a single class with multiple functionalities which allows the programmers to concentrate on their program rather than fixing the problems related to scanning/parsing.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------