IARJSET aligns to the suggestive parameters by the latest University Grants Commission (UGC) for peer-reviewed journals, committed to promoting research excellence, ethical publishing practices, and a global scholarly impact.
Adaptive MIMO-of D Scheme to Reduced User Data Rate over Fading Channel
Rajkumar A. Veer, Dr L C Siddanna Gowd
Abstract: The use of multiple antennas at both the transmitter and receiver has been proposed as one of the best way to provide both an increase in reliability and also in information transmission rate. In this paper, the importance of the quantity and quality of the channel state information available at the communication ends is explored so as to achieve high data rates. The different architectures for various degrees of quality and quantity of CSI are studied in this work. The presented architectures are shown to be robust to the uncertainties of CSI. The main focus of this work is to dynamically provide resource allocation so as to achieve better QoS and improve system capacity. Keywords: Multi-Input Multi-Output (MIMO); Orthogonal frequency division multiplexing (OFDM); Channel side information (CSI).
Modeling and Simulation Capacity Analysis of MIMO Wireless Sensor Network
Rajkumar A. Veer, Dr L C Siddanna Gowd
Abstract: In conventional wireless communication system the problem of estimating the parameters such as coherence time, coherence band width etc. is still not accurate. This problem is mainly due to the fact that the mobile receiver can be in motion and also received signals can arrive along multiple reflected paths. In this work, the channel modeling, optimal location reflectors and scatterers with respect to the location of transmitter and receiver and the optimal valve of angular range with the direction of motion of the mobile receiver are to be explored. The effect of the multipath fading both over time and frequency is also to be considered. The algorithms and schemes proposed in this paper shall benefit in the (i) optimal location of scatterers around a receiver moving at a variable speed (ii) realistic modeling of MIMO fading channels overcoming the conventional assumption that fading coefficients between different transmit and receive antennas are independent random variables. Keywords: Multipath fading, Mobility models, MIMO fading channel, Channel uncertainty.
Mr. Sagar Ravindra Dalvi, Ms. Shamika Rajendra Khatu
Abstract: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. Data allocation strategies (across the agents) that improve the probability of identifying leakages has been proposed. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases distributor can also inject "realistic but fake" data records to further improve our chances of detecting leakage and identifying the guilty party. Keywords: Guilty agent, data distributor, fake object, data leakage.
Biometric Enabled Ration Card Security System for Public Distribution System
Laxman Kumarwad, Rajendra Kumbhar
Abstract: This paper is proposed the improvised technique of implementing smart ration card. Currently, ration card is very useful to every household for various purposes such as family member's details, to get subsidized food items and non-food items, gas connection, and also address proof for various purposes. All people having a ration card to get different foodgrain items such as sugar, rice, wheat and non-food items like edible oils and kerosene from fair price shops. But our public distribution system having many drawbacks like all customer details stored in manually in the registers. This may cause to pilferage. Because of security issues, the ration cards are duplicated by the middlemen, so using computerized ration cards can reduce the misuse and frauds. This article proposed biometric fingerprint system implementing security futures in ration cards so it will bring transparency in the public distribution system. Keywords: Biometric Fingerprint, Fingerprint Classification, PDS.
Abstract: A vehicle tracking system is designed and implemented for tracking the movement of any vehicle from any location at any time. The proposed system made good use of a popular technology that combines a Smartphone application with a GPS. Global Positioning System (GPS) and Global system for mobile communication / General Packet Radio Service (GSM/GPRS) technology that is one of the most common ways for vehicle tracking. API of the Google Maps is used to display the vehicle on the map in the Smartphone application. Thus, users will be able to continuously monitor a moving vehicle on demand using the Smartphone application and determine the estimated distance and time for the vehicle to arrive at a given destination. In today's era everyone is using mobile phones for communication. At the same time Mobile Providers are also providing the variety of services to users. In attempt to expand on this, proposed a GPS based vehicle tracking android application for an organization to help to find addresses of their vehicles and locate their positions on mobile devices in real time adding some best services. Keywords: GPS; GPRS; Monitoring unit; Tracking unit.
Abstract: When it comes to security it becomes very difficult to remember password which is in alphanumeric form. According to psychological studies it is very easy for human to remember images rather than numbers or words. When any application is having user friendly authentication, it becomes very easy to use that application. In this paper we are giving three way graphical password authentications by providing set of images. Authentication deals with the identification of the user and in this paper we are identifying user by checking an image which is selected as password. Keywords: Authentication, graphical password, security.
Context Based Remote Access Control System Using Mobile Device for Educational Campus
Prof. Chaudhari A B, Gitanjali Yadav
Abstract: Now a day's everyone uses different mobile application. Also user can't control the activities perform by applications. Because of that security and privacy can't be maintain. So we face many critical issues. Context Based Remote Access Control System (CBRAC) is an android mobile application which is used to control data leakage as well as malicious activities. It is used to handle the sensitive data and privacy related issues of smartphone users. Through CBRAC user can set different policies according to their individual context and user requirement. This system is also beneficial for pre-defined area like colleges, educational institutes, hospitals etc. Network administrator can apply these different policy set for such pre-defined area. Keywords: Context base remote access control system, android, security and privacy, data leakage, policies.
Hybrid Recommendation System with Review Helpfulness Features
Miss. Jadhav Monika, Mrs. Kakade Shital P
Abstract: As there are millions of product available online it is not easy for the customer to find the best products. Recommendation system is an information filtering system. Many Recommendation system are Collaborative Filtering Algorithm However it still has a problem such as a cold-start problem and sparsity problem. In this paper we proposed Hybrid recommendation system with review helpfulness feature. We can construct the hybrid model. In this system we use the three recommendation technique like as an item based, content based and knowledge based. The result of this system provide the accurate and meaningful service recommendation to active user. Keywords: Collaborative filtering, big data application, cluster.
Abstract: This Now a days there is very busy schedule and all the users wants to complete their task within a less time. Whenever users fire any Top-k query as an input on World Wide Web then they got number of links as an output. The links which are received by users may contain non-useful information or garbage data. Sometimes these links may contain audios, videos, and Twitter and Facebook comments which is not useful for users. To overcome these problems we develop new proposed Top-k extraction system with better performance. By using this system, user wills saves it's time to get proper result. By using this system, when user enter Top-k list as a query it will give user direct Top-k list as a result in tabular format. For obtain this result Top-k extraction system we use Top-k extraction algorithm. This system includes all web pages. The web pages is in the structured, unstructured and semi-structured format. Also gives results in less time. This paper is summaries with data which is useful to user that are extract from top-k web pages, which are web pages that web pages includes top k instances of a query which is user fire on web. That's why top-k lists are highly valuable, give richer data and information. Keywords: Extraction of web information, Top-k lists, Extraction of list, Web mining, Data mining, Context, Web pages.
A Big Data Analytics – Challenges With-in New Data, Metadata Management & Analysis Platforms
Mr. Ashish N. Patil, Dr. Devendrasingh M. Thakore
Abstract: Nowadays, the information technology spreads very fast due to most generated digital data and the exchanged on Internet day-to-day so large volume of data indicates the new age of the big data management. The world's effective capacity to exchange information through telecommunication network and amount of internet traffic; the data growth has increased up to Exabyte annually. So there are big issue to deal with big data and metadata management. In Big data environment; also need to develop analytical platforms which perform corrective analysis with faster response time. So, the paper is focused on the challenges with-in new data, metadata management and analysis Platforms in a Big Data Analytics. Keywords: BD (Big Data), BDA (Big Data Analytics), EB (Exabyte), IDC (International Data Corporation).
Survey on Detection and Classification of Plant Leaf Disease in Agriculture Environment
Prof. Patil Ashish, Patil Tanuja
Abstract: In the agriculture environment, the detection and classification of the plant disease system plays very important role. In this first leaf image is captured and uploaded to the system where this image is compared with another image which is stored in the database. Comparison is take place with the help of algorithm which is named as content based histogram algorithm. For detecting the leaf disease image processing is used. The Image processing consist color extraction and then affected area is compare. The system helps to initial precautionary measures. If proper care is not taken then it will affected on quality, quantity and finally on productivity. This paper presents survey on different detection and classification techniques for plant diseases and also image processing technique which is used for automatic, fast and accurate detection as well as classification of plant leaf diseases. Keywords: K-Mean's clustering, Otsu Method, Fuzzy logic, Artificial Neural Network, Probabilistic Neural Network, Super Vector Machine, Plant leaf diseases.
Abstract: Android is one of the most popular most popular open source operating system for mobile platforms. Contemplating Android application development is great choice as per current market scenario. Tough there are plenty of advantages of associated with it. The Android app ecosystem is rich and diverse and their usage is changing people's lives. Today's the world is moving towards mobility and we think all of us have Smartphone in our hand of android, IOS, windows. Over the year Smartphone have become an important part of the day to day life, today's era are more addicted for the Smartphone and it became basic need in all over the word. There are some advanced feature sin android Smartphone, with which user can easily share application via online market store i.e. Google market store. But still the security area is underdeveloped. This survey is about the current work done on the android operating system. Keywords: Android, Linux Kernel Features.
A Survey Paper on Internet of Things based Healthcare System
Ms. Shinde Sayali P., Ms. Phalle Vaibhavi N
Abstract: IOT is the advanced network infrastructure of connectivity, transportation and technology. IOT smart devices can implement the facilities of remote health monitoring and also emergency notification system .IOT has appreciable application of smart healthcare system. In the healthcare system the highlighted policies and strategies that help to the researchers and scientists and experts who develop smart device which is the up-gradation to the existing technology. This survey paper states that how IOT interrelate to various system including the smart healthcare which is one of the prevalent system. Healthcare system has the surveillance that proposed the need of smart devices and smart objects to decrease the inefficiency of available healthcare system. The IOT based healthcare has enhanced technology which is exclusive from the traditional healthcare and whole medical system. Keywords: Internet of things (IOT), surveillance, smart devices, smart healthcare.
The Web Portal: Collecting and Presenting the Addresses of Different Things on the Web
Avinash Nalawade, Rohit Sawant
Abstract: While the Web has evolved to be a global information platform for anyone to use, this web portal is also using the Web to their own advantages. This web portal work within the entire city. Different things included from this city may be ATM's, Banks, Hospitals, Schools, Colleges, Hotels, Shops, etc. This web portal will be helpful for citizens to detect the information of particular thing as they require. The owners first register their information with address on the web portal with their unique login ID and password for authentication. Owners can also notifies their daily notifications and also advertise their products on the web portal for increase the business growth. Citizen having no need of any authentication on the web portal. They can just enters into the portal and search their category and find out the nearest address from different available options. A web portal software module executing on a computer system for locating relevant Web pages includes instructions to collect information regarding a user from the web portal. Instructions are provided to register a business profile based on the information collected. Instructions are also provided to receive a search entry from portal. The instant portal software module generates a plurality of queries based on the search entry to search for relevant Web page of addresses. Keywords: Web portal, Webpages, Addresses.
Abstract: In the Disaster (e.g. Natural disaster like earthquake, cyclone etc) situation the communication medium goes down because of high congestion the network is unavailable. In that situation it is important to exchange information .In the disaster situation, due to the high congestion the communication infrastructure is partially or totally goes down or unavailable. However, during such critical situations, there is an acute need for information exchange for both rescue organizations and victims (person in disaster). Temporary communication solutions are important until the infrastructure is restored. In this paper, we start by reviewing communication solutions - By using the simple technology which is used everyone - able to uphold communications during disasters when the communication infrastructure is destroyed. We present how these solutions can be applied and summarize the advantages and disadvantages of each unique approach. In a second part, we present One Android application for establishing the communication. The application is based on the simple technology named as Bluetooth and using that communicates the Rescue team and victims .In that we create the one disaster mode. In the disaster mode, the one who present in the disaster area those takes admin role and searches nearest Bluetooth devices and connect and create one small AD-HOC network. In other side the victim also use the application and turn on the disaster mode and send the rescue message to the rescue team (rescue team is the admin or nearest Bluetooth device). Simply, we demonstrate how these useful technologies such as Bluetooth can be of great value right after a disaster by enabling the self-organization of victims and a better coordination with first rescue team. Keywords: Bluetooth, Pico net, Disaster.
Research Paper on Java Interactional Development Environment Programming Tool
Prof. B.A. Jadhawar, Komal A. Bhosale
Abstract: Java language is become very popular and research project deal with improvement of the language or its run time behaviour. A Java IDE (Integrated Development Environment) is a application which enables users to more easily write the code and debug Java programs. its also helpful for beginners. In this IDEs provide features like syntax highlighting and auto code completion, which help the user to code more easily. The IDE is a Free and Open Source IDE for software developers. The IDE runs on many platforms including Windows, GNU/Linux and Mac OS X. It is easy to install. You can easily create Java applications for mobile devices using Mobility Pack in JIDE. With the IDE has become one of the most preferred development tools, whether it be designing a Swing UI, an enterprise application or using it as a platform for creating your own IDE Keywords: Integrated Development Environment (IDE), Hypertext Mark up Language (HTML), Abstract Window Toolkit (AWT), Java Virtual Machine (JVM).
Accident Detection System using Android Application
Patil Ashish N., Yadav Abhilash
Abstract: The rapid growth of technology has made our easier this advancement in technology also increased traffic hazarded. Hence ratio of road accident increases. Most of the Time loss of life due to poor emergency facilities. Our research provide a solution for accident detection and preventation of human life safety. The application has been divided into four module based on functionalities. This module is designed to built up and integrated system to cover various aspects of android based Automatic vehicle Accident Detection By Using Android application. The application is designed using location tracking using GPS technology. Keywords: Android Smart Phone, GPS (Global Positioning System), GSM (Global System for Mobile Communication).
Abstract: Search engine is the procedure used to improve the visibility of the search result for a free search engine or website and webpage .This paper aims to improve the search time of search engine, search function is an interface between a search engine and users. This function receives user's queries and returns relevant pages to the queries. There are some notable open source search engine projects but due to their complex design and implementation this project are still not a good for web search engine technology. There are lots of open source frameworks available to build an inverted index of web documents used for information retrieval. Keywords: Search Engine, Open source frameworks, Information retrieval.
Quick Business Information Retrieval using Dot Lucene
Prof. Mulik A.T, Komal Londhe
Abstract: This system works on indexed data so it is easy and fast retrieval system over large data with millions and trillions of columns. This system will provide the highly accurate and semantic result with minimal time. Two major components of search engines are the indexing and query process. The indexing process aims to create data structures or the indexes that allows the searching. The querying process will use the structures and user queries to generate a ranked list of documents. Search engines should include the concept, models, techniques and the processes of IR. Search function is an interface between a search engine and users. This function receives user's queries and returns relevant pages to the queries. The pages usually are sorted according to some criteria. Firstly, we should build a text database which is used to store all information retrieved by the user, then determine text model of retrieval system, create index with the model according to the text of database. Ordering can enormously enhance the speed of data recovery which way do you utilize and relies upon the size of data recovery framework. After indexing the documents search requests are submitted by the users and information recovery frameworks and seek the data in the long run return to client. Keywords: Search Engine, Indexing, Paging, Lucene.
Thrust Area in Data Science-Big Data and Data Analytics
Prof. Ashish N. Patil, Anagha Ajay Jadhav
Abstract: The dawn of big data has arisen. Big data may be defined as a term which indicates large sets of data. The challenges that occur due to the big data are its storage, management, capture, curation, sharing, analysis, security, handling, etc. The old or traditional methodologies are not much capable for the above purpose. Hence, it is necessary to know about the upcoming methods regarding the big data and the paper introduces the brief information about it. The concept of big data is becoming popular because of the constant increase need and creation of data. In general, big data is constantly moving data and its size has almost reached till yotta bytes. Certain tools used such a Hadoop, MongoDB, Cassendra and Apache spark to deal with big data are briefly presented in the paper. Also, the terms such as parameters, applications, storage and growth are described. Keywords: Introduction to big data, parameters and tools of big data, Hadoop, HDFS,Map-Reduce, Apache Spark,MongoDB, Cassendra.
Web Embedded Server for Remote Access Monitoring and Controlling
Ms. Aiysha I. Khairatkhan, Prof. Sumalatha D. Bandari
Abstract: Embedded Web System is a smart system designed to perform one or a few dedicated functions, often with real-time computing constraints. An embedded system is usually embedded as part of a complete device including hardware and mechanical parts. Instead of PC oriented servers, the ARM processor based servers are becoming trend of today's market. Due to its reduced cost and size high performance is achieved using ARM processor along with Ethernet module as Embedded Web Server. Some Embedded Systems are mass-produced, benefiting from economies of scale. Idea is utilized for monitoring and controlling maximum number of home appliances as well as industry devices. Since the Embedded System is dedicated to specific tasks, for industry automation, instrumentation and household devices control etc, this is an optimized solution by engineer, reducing the size and cost of the product, or increasing the reliability and performance. System home page can be accessed using web browser. For sensing the temperature, light and humidity different sensors installed at working place. The different electronic devices are connected to ARM through UART ports. The data from these electronic devices are stored in ARM micro controllers through RS-232 serial bus communication. Keywords: ARM, DACs, Embedded Web Server (EWS), Monitoring.
Modified Active Learning for Document Level Clustering
Snehal Patil, Prof. Jayant Jadhav
Abstract: Learning to rank arises in many data mining applications, ranging from web search engine, online advertising to recommendation system. In learning to rank, the performance of a ranking model is strongly affected by the number of labeled examples in the training set; on the other hand, obtaining labeled examples for training data is very expensive and time-consuming. This presents a great need for the active learning approaches to select most informative examples for ranking learning; however, in the literature there is still very limited work to address active learning for ranking. In this paper, we propose a general active learning framework, expected loss optimization (ELO), for ranking. The ELO framework is applicable to a wide range of ranking functions. Under this framework, we derive a novel algorithm, expected discounted cumulative gain (DCG) loss optimization (ELO-DCG), to select most informative examples. Then, we investigate both query and document level active learning for raking and propose a two-stage ELO-DCG algorithm which incorporate both query and document selection into active learning. Keywords: Active learning, ranking, expected loss optimization.
Abstract: The Student Attendance System Based on Data Analytics is developed with both web interface and mobile application. With the help of web interface admin registers the authorized faculty to the system. Through mobile application the registered faculty can login to the system and then they can take attendance with the help of a Smartphone and save it to the server. Admin has the privileges to view the attendance uploaded by the faculty, to make any changes in the attendance and finally generate the report and also maintain database. Keywords: Data Analytics, Mobile application, Web interface.
Survey on Student Attendance System based on Data Analytics
Prof. S. Y. Inamdar, Divya M. Aswani
Abstract: As Attendance is mandatory in every schools and colleges we developed Student Attendance System Based on Data Analytics which is developed with both web interface and mobile application. With the help of web interface admin registers the authorized faculty to the system. Mobile application is used by faculty to take attendance with the help of a smartphone and save it to the server. Admin has the privileges to view the attendance uploaded by the faculty, to make any changes in the attendance and finally generate the report and also maintain database. Keywords: Data Analytics, Mobile application, Web interface, Internet.
Image Retrieval System based on Colour Shape and Texture Attributes
Prof. Kamble D.R, Davari Ashitosh
Abstract: In general, Image retrieval is well-known research and development field in information management. An image contains several types of visual features which are difficult to extract and combine manually by humans. These papers introduce some visual features of an image: color, shape and texture. There is several method of extraction of an image features and study or learning algorithms for retrieving image. Various methods have been proposed and investigated. These papers introduce, color histogram which is mostly used because of their efficiency, robustness and insensitivity to small changes in camera viewpoint.A color histogram store image's overall color composition. So images with many different appearances can have similar color histogram. Colour histogram is constructed by counting the no of pixels of each color of image. Edges are detected in areas of the image where the intensity level fluctuates sharply, the more rapid the intensity changes the stronger the edge. Texture of each sub-block is obtained by using gray level co-occurrence matrix. A one to one matching scheme is used to compare the query and target image. Keywords: features extraction, histogram, precision.
ANEKA is a Compatible Platform for Cloud Development Application
Prof. S.Y. Inamdar, Ms. Priyanka M.Kamble
Abstract: Aneka is a platform used to develop and manage cloud computing. Aneka is used as PaaS. The feature of the Aneka is used for provisioning resources on public & private cloud. Such as Amazon EC2, Windows Azure etc. Aneka cloud computing use a larger number of resources (computers) to execute their application in distributed ¶llel. Aneka is a market oriented cloud development & management platform with rapid application and workload distribution capabilities. Aneka is integrated middleware seamless package which allows you to build &manage interconnect network. It is market oriented; it allows you to creating, scheduling, monitoring & provisioning result using pricing &accounting in private & public cloud. Aneka is freely available with different version. Aneka is a specially designed to work with the popular environment like .net and provides a choice of programming models to ensure that, your application can get all of the benefits that cloud computing. Keywords: Cloud computing, jobs cheduling, scheduling algorithm, cloud services, Service Level Agreement, task scheduling, resource utilization.
Customized Task Scheduling Algorithm for Scientific Application using Aneka
Prof. S.Y. Inamdar, Pratima N. Ghalsasi
Abstract: Cloud computing is emanate technology in IT domain. The scheduling of the cloud services to the consumers by service providers significance the cost benefit of these computing paradigms. Cloud computing is a recent technology that are used for online distribution of computing resources also services on pay- per- use basis. Task scheduling as well as provision of resources are main problem areas in cloud computing. There are many algorithms like Min-Min, Max-Min, Suffrage, Shortest Cloudlet to Fastest Processor (SCFP), Longest Cloudlet to Fastest Processor (LCFP), Ant-Colony Optimization. Priority Based, First Come First Serve (FCFS) etc. These dynamically scalable resources within a cloud are handled by cloud service provider and distributed among the number of users according to the contract known as Service Level Agreement (SLA). After recognition of benefits of cloud computing, a large number of users using cloud services are increasing tremendously. Therefore task scheduling plays important role in allocating and scheduling the cloud resources among the users efficiently. A capable task scheduling policy provides proper resource utilization, load balancing and optimization of execution time and cost. In this paper, we have given an overview of research work done by several researchers in the area of cloud task scheduling. Keywords: Cloud computing, job scheduling, scheduling algorithm, cloud services, Service Level Agreement, task scheduling, resource utilization.
Abstract: New step closer to earth. The HDEV it means high definition earth viewing. It is an experiment which is developed by NASA. This system is connected to the international space Station. The system made of four specialized high definition video cameras, role of these cameras are to record video of the earth from multiple angles. The main primary purpose is overcome with problems of data loss, errors, wrong data which transmitted from space and maintenance of hardware system. In this paper, we are going to see what is HDEV, how it works, the purpose of this Experiment and some interesting things yet many readers are unknown from this. Keywords: HDEV description, operation, application.
A Review Paper on General Concepts of “Artificial Intelligence and Machine Learning”
Mahind Rupali, Patil Amit
Abstract: Long days ago, there was all kind of work which is only done by the humans. There were no such machines and technologies like today. At that time, science is not developed and technologies were not invented. So the working is totally dependent on the peoples and humans have recognised that "Today's science is the tomorrow's technology". New superiorly advanced technologies are not less than blessing of god. Adaptive inventions for reducing the human work and bright future were invented which is simply called as Artificial Intelligence and Machine learning. Even though there were many false assumptions at the early beginning, we are witnessing a new era of errorless technology and superior science. This review involves the general concepts of artificial intelligence and machine learning. Keywords: Digitalization, reasoning, general AI, supervised learning, unsupervised learning, humanoids.
Internet of Things: “Research and Innovation Agenda”
Shagufta. L. Faras, Prof B.A. Jadhwar
Abstract: Internet of Things (IOT) today, is actuation, sensing, communication, and control become ever more elegant and omnipresent, there is established overlap in these communities, sometimes from slimly different perspectives. More cooperation between communities is encouraged. To provide a basis for discussing open research problems in IOT, a visual sense for how IOT could change the world in the distant future is first presented. The Internet of Things is a system of computing devices, and digital machines, mechanical objects, animals or human that are provided with incomparable identifiers and the ability to transfer data over a network without necessary human-to-human or human- to-computer interaction IOT has rotated from the convergence of wireless technologies, micro-electromechanical systems (MEMS), micro services and the internet's, allowing unstructured machine-generated data to be analysed for insights that will drive improvements. The Internet of Things term has been used from marketing combination all the way to research publications. We thought it would be helpful along with a Short Internet of Things history to explore the variety of ways people have been defined the term in the wild. Keywords: Internet of Things (IOT), micro-electromechanical systems (MEMS), information and communications technologies (ICTs).
Detection and Classification of Plant Leaf Disease
Mr. Ashish N. Patil, Miss. Vidya Pawar
Abstract: Plant leaf images is a form of important data and information in biological science. Plant leaf disease affect in both reduction in both in quality and quantity of agriculture products. Automatic plant leaf detection is very important research topic now because our nation's economy is based on an agriculture products. The automatic leaf detection prove number of benefits in monitoring crops and also automatically detect the leaf disease. The developed image processing technique having four steps as below: 1.The input leaf image is first converted into RGB colour transformation structure. 2.Then the green pixels are removed and masked using a specific threshold level. 3.Then the important segments are captured. 4.Finally the statistics is computed. Using this extracted segments the presents leaf disease is evaluated. Database is about 200 plant leaves of 10 different plants are used for experimental results. In India, Farmers are bearing from an issues developing from a few sorts of plant diseases. In some cases plant's specialists are likewise not ready to distinguish the infection that brings about need of acknowledgment of exact sort of sickness and thusly to product ruin if not dealt with at proper time. Thus, we ought to take the upside of accessible innovation in programmed discovery and arrangement of agrarian plants has turned out to be urgent. Keywords: Plant Leaf Disease, colour transformation, segment, Image processing.
Abstract: Inventory Management Software is a computer based system for tracking inventory levels, orders, sales and deliveries. It can be also used in the manufacturing industry to create a work order, bill of materials and other production related documents. Companies use inventory management system to avoids product overstock and outage. Companies often use inventory management system to reduce their carrying cost. The software is used to track the products and parts as they are transported from a vendor to a warehouse, between warehouse and finally to retail location to directly to the customer. This software is also useful in picking, packing and shipping items from warehouse. It is useful to avoiding missing out on sales due to out-of-stock situation. The system that we are developing is whole based system. Keywords: Web Technology, Inventory, Stock, Performance.
Celebrity Face Naming based on Relationships and Knowledge using Caption-Based Supervision
Jyoti H. Jadhav, Pankaj Agarkar
Abstract: Auto face annotation is important in many real world knowledge management system and multimedia information. Face annotation is a field of face detection and recognition. Mining weakly labeled web facial images on the internet has emerged as a promising paradigm towards auto face annotation. The System examines the problem of celebrity face naming in unconstrained video with user provided metadata. Normally we depend on accurate face labels for supervised learning. But sometimes the faces were not properly annotated. One of the solution used in the proposed system is that; it uses the two parameters a rich set of relationships automatically derived from video content and knowledge from image domain. Relationship is the appearance of faces under different context and their visual similarities. The knowledge includes Web images weakly tagged with celebrity names and the celebrity social networks. The relationships and knowledge is elegantly encoded using conditional random field (CRF) for label inference. Two versions of face annotation are considered: within-video and between-video face labeling. The system further rectifies the error in the metadata to correct false labels and annotate the faces with missing names in the metadata of a video by considering a group of socially connected videos for joint label inference. The system leads to higher accuracy in face labeling than several existing approaches but with minor degradation in speed efficiency. Keywords: Celebrity face naming, face annotation, social network, unconstrained web video, weak label.
Android Based Public Transportation System using GPS Technology
Mahind Rupali N, Chautre Vinayak G
Abstract: Now a day's everyone is using an android phone for variety of needs. Also in today's era android phones become the basic need. In most of the city's public transportation has increased due to increase in the population. In rural area and smaller town has triggered a greater need for the organized public transport system. Android based auto rickshaw booking system has been gaining more importance because they provide accurate information of route as well as the drivers and other required details at any anytime. The application has been divided in into two parts based on functionalities of the system. These modules is designed to build up an integrated system to cover various aspect of the android based auto rickshaw booking system. The android application include a form which will be able to filled by customer according to his requirements. Later the driver will go through it and notify to the customer. The application is designed using location tracking using GPS technology. Keywords: GPS, Android, LBS, Shortest Path Algorithm.
Abstract: An Location aware mobi-feed framework empowers portable clients to get every continuous way area data and the highlighted news. Here an office get gave to clients that he/she can pick any intrigued area. This paper shows a mobi-encourage framework which keeps versatile clients overhauled portable clients from new news of any spatial and non-spatial location. In this paper we have introduced three key modules that are, client module, server module, web seek module. This area mindful mobi-nourish framework separates itself from all current mobi-bolster frameworks that it empowers clients for getting different fundamental data of a specific area just utilizing this one application rather utilizing distinctive applications for various hunts furthermore clients can pick spatial area as opposed to static point area. The area mindful mobi-bolster framework keeps the portable clients overhauled from progressing or forthcoming areas and the imperative news of any area. Keywords: Location Aware, mobi-feed, Location Aware News Feed.
Abstract: A location aware MobiFeed system enables convenient customers to share geo-marked customer delivered messages, e.g., a customer can get nearby messages that are the most noteworthy to her. Existing LANF structures simply send the most appropriate geo-marked messages to their customers. Shockingly, the genuine confinement of such a present approach is, to the point that, a news reinforce may contain messages related to a comparable territory (i.e., reason for interest) or a comparative order of regions (e.g., food, incitement or wear). We battle that varying qualities is a basic component for zone careful news sustains in light of the way that it helps customers find new places additionally, exercises. In this paper we propose MobiFeed framework which permit the client to choose the classification and in view of that classification client can get news of his/her decision. Keywords: Location Aware, MobiFeed, Location Aware News Feed.
Abnormal Behaviour Detection using Mobile Cloud Infrastructure
Prof. Sumalatha D. Bandari, Sana I. Mulla
Abstract: Now days, some mobile services are changed with cloud-based mobile services with richer communication and greater flexibility. So, we now present new mobile cloud infrastructure with including features of mobile devices and cloud services. With cloud computing this infrastructure provides the virtual mobile instance. For commercialize new services, service providers should be aware from security obstacles. Hence we introduce new mobile cloud services with mobile cloud infrastructure and defines possible security problems with use of some service scenario. Hence, we introduce methodology and architecture for detecting abnormal behavior through the monitoring of host and network data. To validate our methodology, we used machine learning algorithm to detect the abnormal behavior that arose from these programs. Keywords: Mobile devices, Random Forest Machine Learning algorithm, Abnormal Behaviour.
Design and Development of KisanSeva: an Android based application for Farmers
Karan V. Ghorpade and Mrs. R. B. Pandhare
Abstract: This application which is named as 'KisanSeva' will certainly bring a major transformation in the ways which are both known and unknown to the farmers. Most of the farmers in Maharashtra are still using traditional methods for farming due to which they are facing problems like loss of soil quality, fewer yields from the farm, unpredictable weather, lack of knowledge about pests, unnecessary expenditure on pesticides etc. This project focuses on improving the quality and quantity of the goods produced by the farmers by providing them with new & precise information about the important aspects of farming. There are few apps related to farming available in the market but this app will provide extra features like organic farming, methods of water management & expert suggestions. This app will also provide a small platform for the farmers to sell their produce. Keywords: KisanSeva, Leave, soil quality, pests, unnecessary expenditure on pesticides.
Abstract: The existing system is not a complete automated system for that matter their leave management, document management is totally manual and it takes a long time to process a leave request. In the proposed system a leave application has to go through a long chain of official and as a result, several time the competent authorities get manipulated information. The proposed system is used to solve the identified problems. The proposed system will minimize the paperwork. It will help management in decision making as they will get up-to-date report. The aim of this paper is to develop a web based application that can access through internet from anywhere. This Online Establishment Automation system can generate reports for every month and year. The proposed system also provide the facility to manage their profile. Keywords: Automation, Leave, Controlling officer, HoD, paperwork.
Survey on Resource Provisioning of Hybrid Cloud with Aneka
Ankita S. Bhosale, Sumalatha D. Bandari
Abstract: Scientific applications often require large computational power and availability massive numbers of processing data intensive applications. Traditionally these needs were addressed using grids, clusters and supercomputers for processing and managing large scale applications, but cloud computing offers users with a new model for utilizing computing infrastructure. Scientific applications include mathematical model and numerical solutions techniques to solve engineering and scientific problems. That model often required large number of computing resource and to cut down such computing complexities a dedicated high performance infrastructure such as the grid, clusters were used. The resources for execution of scientific application may be seen in some parts of the year which can lead to long waiting times for utilization of these resources ,or the available resources for one applications Mayer be insufficient to complete the applications before its deadline. In these cases, scientific resources may be complemented by cloud resources. Leasing cloud computing services on pay per use basic, even minor institutions can easily access a large number of resources, which are utilized and paid for only for the time they are actually utilized. Keywords: Paas, IaaS, Service Level Agreement.
Abstract: The Internet regarded as an amorphous omnipresent space for processing and storage is called as Cloud computing. In other words Cloud Computing is defined as operations which are based on internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. A legal way of protecting user's data which means that data the user has created and uploaded cannot be published by anyone except the user without his permission is Multimedia copyright protection on cloud . The development of Internet has led the multimedia computing to emerge as a technology for generating, editing, processing and searching contents of media like image, audio, video, graphics and such others. Multimedia cloud computing has much challenges like Network heterogeneity, Device heterogeneity , Multimedia and service heterogeneity, Security, Power Consumption, QoS heterogeneity which has to be met. Besides this there is a big challenge for data security and access co¬ntrol when the user uploads any data in the form of multimedia content for sharing on cloud. In this paper we can see detection of copyright violation of multimedia content like images and videos. This paper proposed a new method of creating and comparing signatures of data on cloud. This paper travel through a method for enhancing security for copyright protection of multimedia content like images and videos. Keywords: Cloud, Multimedia, DES, Security, Copy Detection.
Copyright Protection for Multimedia Content on Cloud
Miss. Dikshita R. Shetty, Prof. Shital P. Kakade
Abstract: Cloud computing is the Internet regarded as a shapeless omnipresent space for processing and storage. Cloud computing can be defined with having two word which includes "cloud" means internet and "computing" means operations. In short, Cloud Computing can be defined as an internet based operations. Multimedia copyright protection on cloud is a legal way of protecting user's data which means that whatever data the user has created and uploaded cannot be used or published by anyone else without the consent of the user. The development of Internet has led the multimedia computing to emerge as a technology for generating, editing, processing and searching contents of media like image, audio, video, graphics and such others. This system explores detection of copyright violation of multimedia content like images and videos and will create a method to deny access for uploading such copyright violated images and videos. To keep uploaded data to be copyright protected and deny uploading of copyright violated data by other user's, various methods have been proposed in this literature. Keywords: cloud, multimedia, DES, security, copyright.
Survey on Hybrid Recommendation System with Review Helpfulness Features
Patil Dhanashree T., Prof. Kakade Shital P.
Abstract: There are numbers of services available on the internet. Recommendation system helps to user to choose products, services according there interest among the huge amount of available items. As the increasing use of the internet as well as the increasing number of user there are some challenges to recommendation system. There must be quick recommendation for the large amount of data. For performing recommendation there are different techniques like collaborative, content based, knowledge based and other techniques. In hybrid recommendation this methods are combined to improve the performance of recommendation. Services contains lots of data i.e. big data, big data is unstructured manner that cannot be manage or handle easily. In this paper, we introduce the topic of hybrid recommendation system with review helpfulness features. It provides way to overcome cold-start problem, sparcity problem & also improve the efficiency, accuracy of recommendation system. Keywords: Collaborative filtering; Content-based filtering; filtering technique; Recommendation systems.
Dynamic Provisioning of Resources in Hybrid Cloud using Aneka Platform
Prof. Sumalatha D. Bandari, Anuradha A. Chavan
Abstract: Many vendors are offering subscription-based computing services through the Infrastructure as a Service (IaaS) model. Users can purchase resources from different vendors and get the best from each of them to run their applications. But is very complex task to deploy applications in multi-cloud environments. Therefore, application platforms are necessary to help developers succeed. Developer use Aneka to deploy their applications in multi-cloud environments because Aneka provides platform as service. It can be used to provide resources from different cloud providers and can be configured to request resources dynamically according to the needs of specific applications. This paper introduces extensions built into Aneka to support the deployment of applications in multi-cloud environments. The first extension shows the flexibility of the Aneka architecture to add cloud providers. We also discussed the inclusion of public IPs to communicate resources located on different networks. We are reducing the total execution time of an application composed of independent tasks when deployed in the multi-cloud environment created by Aneka using Azure and EC2-supplied resources. Keywords: IaaS, PaaS, Aneka, Map Reduce.
A Survey on Automatic Question Paper Generation System
Amruta Umardand, Ashwini Gaikwad
Abstract: In today's world education is the most important thing, and in that important part is examination process. So the generation of question paper is a difficult process for teachers and also this process was tedious and insecure. So we have presented forward technique that is an "Automatic Question Paper Generation System". Which is randomized, fast and also riskless. In that system, every task is performed by automated that include subject selection, question entry, paper management. This system randomly selects question like in categorized manner from the file and generate question paper. This system is useful for many educational institutes. Keywords: Automation, paperless, question generation, randomization.
Improving Data Integrity for Storage & Recovery Security in Cloud Computing
Prof. Ashwini Mandale, Pradnyarani Chavan
Abstract: The cloud computing has been developed as the next generation architecture in IT industry. In addition to traditional solutions where IT services are under control of physical/ logical / personal controls. Cloud computing moves to the application software as well as databases to the large data centres, where large amount of data and services manage properly. These maybe not fully trusted. So, that causes to introducing new challenges in cloud era. In this paper we are focusing on Cloud Security, Data Integrity, authentication, authorization. Here basically storage correctness, fast localization, dynamic data support, dependability are take into consideration. Keywords: Cloud Computing, Cloud Service Provider, Cloud Security Services, Data Integrity, Data Recovery, Third Party Auditor.
A Design to Filter Undesired Message from OSN User Wall
Ganesh Ghone, Pratiksha Pawar
Abstract: One of the important issue in today's world is nothing but users ability to take the limitations posted on the on their private wall. Now a day OSN provides little support to OSN posting. Proposed system able to direct control on the user's vulgar messages, for this system we use filtering mechanism are their walls to delete the existing system problem. Machine method used to direct control message posted on the wall. For this phenomenon we use machine learning based soft classifier that that work with the help of the content based filtering algorithm. OSN is mostly popular younger generation entertainment .It helps of content based filtering algorithm. It helps to communicate the peoples, friends as well as society through online order. The proposed system helps to keep the track of the message for posting on the wall of online social network. On the point of exiting system and need of today's life, my paper work for filter unwanted message before they rich user wall. Keywords: Social Network Application, SNM- Social Network Manager, black List, FL- filter Wall.
Raspberry Pi based Security Surveillance with Face Detection
Ms. Patil Sahyadri N, Mr. Devrukhkar Akshay S
Abstract: The Raspberry Pi is a credit-card sized chip or mini computer is used in surveillance to the security of thefts. This system is crucial for the safety purpose of these days. In this paper focuses on only detect the face by using Opencv (Open Source Computer Vision) technique. ARS (Audience Response System) captures and identify the face of the theft and then ARS system notify the user. The process of notification is done by sending short message service (SMS) through Global System for Mobile communication (GSM) Module. The people i.e. human faces, are one of most common and specific objects that we try to trace in images. Face Detection the first step is analyzing the face of thefts then detect the person. In this paper we presented various methods of face detection, which are commonly used. These are various methods are Local Binary Pattern (LBP). Keywords: Raspberry pi, GSM module, Opencv, Surveillance, Camera, Local Binary Pattern (LBP).
Abstract: The term cloud computing "Is a reset buzzword's in IT world". Cloud computing aimed at providing IT as a service to the cloud user on-demand basis with greater flexibility, availability, reliability and massive scalability with utility of computing mode. It is concept where a computer is created using internet with main purpose of utilizing share resources like computer, software and hardware etc. In general cloud computing is an internet based environment where you pay for resources that you use. The term cloud computing centralizing computation, it came in web backing in 1990's. This paper represent review of cloud computing concept also different kinds of services provide over the cloud computing, cloud infrastructure, security. However, the vulnerabilities of the infrastructure involved in cloud - computing based on m- health system as well as problems and solutions in information security. Keywords: Cloud Computing, Cloud services (IaaS, PaaS, SaaS), Complex network.
Abstract: Finding proper information from web pages is very difficult. Because we face problems such as most of available data contains unnecessary information such as some product advertisements, Facebook or twitter posts. One more problem is, obtained data is not in structured format. To overcome these problems, we introduce a system which mainly focuses on extracting exact information in top-k list format. List data is very eventful source to retrieving information. This paper work on information extraction from top-k web pages which contains top-k instances for open domain knowledge based. For example- "Top 10 IT companies in India". As compare to structured information from web, Top-k list data is cleaner and ranked. Top-k data has interesting semantics. We propose a system which gives direct top-k list when user enters a search query within minimum time. Extraction of top-k list depends on 1] Extracting web URLs and its titles 2] Removing dust from web URLs 3] Using extraction algorithm extract exact top-k list. Keywords: Top-k list, structured data, data extraction, DOM parser, top-k web pages.