IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Kishor M. Dhole, Dr. Vinay Chavan Research Scholar, Department of Electronics & Computer Science (DECS), RTM Nagpur University, Nagpur Associate Professor & Head, Department of Computer Science, Seth Kesarimal Porwal College Kamptee, Nagpur
R.Natarajan, Dr. R.Sugumar, M.Mahendran, K.Anbazhagan Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India Associate Professor, Dept. of CSE, VelMultitech Dr. RR Dr.SR Engineering College, Chennai, India Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
K.Ramu and Dr.R.Sugumar Assistant Professor, Dept., of CSE, Arignar Anna Institute of Science & Technology, Chennai, India. Assistant Professor, Dept., of IT, R.M.D. Engineering College, Chennai, India.
Mr.P.B.Manoj, Mr.Sai Sandeep Baba Assistant Professor, AMC Engineering College, VTU Karnataka, India Assistant Professor, AMC Engineering College, VTU Karnataka, India
Mr.P.R. Nirmal Binu, Mr.K. Sudharson and Mr.N.S. Sivarajan Dept.of CSE, S.A .Engineering College, Chennai, India. Dept.of IT, S.A .Engineering College, Chennai, India. Dept.of CSE, Sri Muthukumaran Institute of Technology, Chennai, India.
Mr.Pradeep K.Deshmukh and Ms. Yogini Gholap Dept.of Post Graduate Computer Engineering, JSPM’S Rajarshi Shahu College of Engineering, Tathawade, Pune, India. Dept.of Post Graduate Computer Engineering, JSPM’S Rajarshi Shahu College of Engineering, Tathawade, Pune, India.
Mr.D.Vinod and Mr.C.BalaKrishnan Dept of P.G.Studies in Engineering, S.A.Engineering College, Chennai, India. Dept. of CSE, S.A.Engineering College, Chennai, India.
Dr.UshaaEswaran, Ms.Sreelakshmi and Mr.Vivek Eswaran Affiliated to Jawaharlal Nehru Technological University, Anantapur, Andhra Pradesh, India. Affiliated to Jawaharlal Nehru Technological University, Anantapur, Andhra Pradesh, India. Affiliated to Anna University, Chennai.
Mr.Saida Aissi and Mr. Mohamed Salah Gouider Bestmod Laboratory, University of Tunis, High Institute of Management of Tunis, Tunisia Bestmod Laboratory, University of Tunis, High Institute of Management of Tunis, Tunisia
Mr.Sultanullah and Mr.Zheng Xuefeng School of Computer and Communication Engineering, University of Science and Technology, Beijing, China.
|
Abstract
INFORMATION INTEGRITY APPROACH TOWARDS TECHNOLOGY DEVELOPMENT SYSTEM
Kishor M. Dhole, Dr. Vinay Chavan Research Scholar, Department of Electronics & Computer Science (DECS), RTM Nagpur University, Nagpur Associate Professor & Head, Department of Computer Science, Seth Kesarimal Porwal College Kamptee, Nagpur
Abstract: Nowadays Information is a key factor in every field of Science and Technology. Some times in information system available information affects the result and performance of the system due to incorrect source of information. Environment uncertainty and 5 C’s affects on it. It creates errors in the system there form system doesn’t gives accurate results. In Information system the available or required information should be correct, accurate and reliable for the best system performance. Hence the Information Integrity Information is important which improves the correctness, accuracy and trustworthiness of information in information system. This paper introduces the concept of information integrity and need of technology development in the system.
Keywords: Information Integrity (I*I), Information System (IS), correctness, accuracy, trustworthiness.
R.Natarajan, Dr. R.Sugumar, M.Mahendran, K.Anbazhagan Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India Associate Professor, Dept. of CSE, VelMultitech Dr. RR Dr.SR Engineering College, Chennai, India Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Abstract: Privacy Preserving Data Mining (PPDM) is a research area concerned with the privacy driven from personally identifiable information when considered for data mining. Therefore, PPDM has become an increasingly important field of research. PPDM is a novel research direction in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provides a complete review on PPDM and different techniques such as data partition, data modification, data restriction technique which could be used to prevent the data access from unauthorized users.
Keywords: preserving privacy, data modification, data restriction, data ownership
Design and Implementation of Server Side Web Proxy Caching Algorithm
K.Ramu and Dr.R.Sugumar Assistant Professor, Dept., of CSE, Arignar Anna Institute of Science & Technology, Chennai, India. Assistant Professor, Dept., of IT, R.M.D. Engineering College, Chennai, India.
Abstract: Due to the increase in popularity of the World Wide Web (WWW) has introduced new issues such as Internet traffic and bandwidth consumption. Recently, much research has focused on improving Web performance by reducing the bandwidth consumption and WWW traffic. Web proxy caching is a well-known technique for reducing access latencies and bandwidth consumption. As in other caching systems, a replacement policy is necessary for determining when and what to evict from the cache, and many proxy caching algorithms have been earlier. In this paper, we propose a server side web caching algorithm in oreder to overcome various issues of web proxy caching such as load balancing, transparency, scalabil- ity and cache miss. Web proxy caching is a well-known strategy for improving performance of Web-based systems by keep- ing Web objects that are likely to be used in the near future closer to the client.
Keywords: Web proxy, Bandwidth, Cache, Server Side Web Caching Algorithm, LFU, LRU
Random Routing Algorithms for Wireless Sensor Networks
Mr.P.B.Manoj, Mr.Sai Sandeep Baba Assistant Professor, AMC Engineering College, VTU Karnataka, India Assistant Professor, AMC Engineering College, VTU Karnataka, India
Abstract: Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we present data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We observe that the classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm, it can compute the same routes known to the source, hence, making all information sent over these r o u t e s v u l n e r a b l e t o i t s a t t a c k s . B e si d e s randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes. In this paper three routing algorithms are presented with simulation results.
Desktop Solution for Mobile Environment Using Mobile Cloud Computing
Mr.B. Gopikrishnan and Mr. A.Mani Dept.of CSE, S.A .Engineering College, Chennai, India. Dept.of CSE, S.A .Engineering College, Chennai, India.
Abstract: A virtual network computing based architecture for accessing the desktops of remote computers from a cellular phone. A viewer is provided on the cellular phone that enables the user to see and manipulate the desktop of various remote systems such as MS Windows, Macintosh, and UNIX. The system to be accessed must be running a VNC server and it must be attached to a network. . In this architecture, a mobile user exploits virtual machine (VM) technology to rapidly instantiate customized service software on a nearby cloudlet, and then uses that service over a wireless LAN .A proxy is used to send the image of the desktop to the cellular phone, to convert different devices, to suppress network traffics, and to support recovery from an unscheduled disconnection. To reduce user effort and solve problems inherent to the cellular phone’s small screen, several functions are provided on the cellular viewer. They are Shortcut Guidance and Twin view function.
Keywords: mobile computing, cloud computing,Virtual network, Remote access
A Logical Topology Based Network Compositor for Packet Distribution System with Effective Edge Replacement
Mr.P.R. Nirmal Binu, Mr.K. Sudharson and Mr.N.S. Sivarajan Dept.of CSE, S.A .Engineering College, Chennai, India. Dept.of IT, S.A .Engineering College, Chennai, India. Dept.of CSE, Sri Muthukumaran Institute of Technology, Chennai, India.
Abstract: A typical failure in communication networks is disconnection of link between two nodes. When communication link fails, failed links can be replaced by a single swap link. But selecting the best possible link can be very crucial. The edge is chosen from the minimum diameter spanning tree that has been communication overhead and minimizes the time required to adopt routing in case of failure. Spanning tree is based on the labeling and collections of systems in a network using logical topology networks this allows deciding in constant time whether node is leaf node or rooting node using round trip time. The selection of high quality swap links is essential for a reliable communication and it must follow the same objective as the originally chosen communication sub networks. A distributed algorithm that efficiently computes all of these swap links, and how to route messages across swap edges with a compact routing scheme. Spanning tree is based on the labeling and collections of systems in a network using logical topology networks. This allows deciding in constant time whether node is leaf node or rooting node using round trip time. This will minimize the maximum travel time of messages. Hence, each swap link must minimize (among all possible swaps) the diameter of the tree when swapping the edge. We propose a distributed algorithm that efficiently computes all of these swap links, and how to route messages across swap edges with a compact routing scheme. Virtual LAN (VLAN) refers to a group of logically networked devices on one or more LANs that are configured so that they can communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments. Because VLANs are based on logical instead of physical connections, it is very flexible for user/host management, bandwidth allocation and resource optimization.
Efficient Object Tracking Using K means and Radial Basis Function
Mr.Pradeep K.Deshmukh and Ms. Yogini Gholap Dept.of Post Graduate Computer Engineering, JSPM’S Rajarshi Shahu College of Engineering, Tathawade, Pune, India. Dept.of Post Graduate Computer Engineering, JSPM’S Rajarshi Shahu College of Engineering, Tathawade, Pune, India.
Abstract: In the present article, an efficient method for object tracking is proposed using Radial Basis Function Neural Networks and K-means. This proposed method starts with K-means algorithm to do the segmentation of the object and background in the frame. The Pixel-based colour features are used for identifying and tracking the object. The remaining background is also considered. These classified features of object and extended background are used to train the Radial Basis Function Neural Network. The trained network will track the object in next subsequent frames. This method is tested for the video sequences and is suitable for real-time tracking due to its low complexity. The objective of this experiment is to minimize the computational cost of the tracking method with required accuracy.
An Optimal Solution For Sending The Packet Using Energy Efficient Opportunistic Routing
Mr.D.Vinod and Mr.C.BalaKrishnan Dept of P.G.Studies in Engineering, S.A.Engineering College, Chennai, India. Dept. of CSE, S.A.Engineering College, Chennai, India.
Abstract: Opportunistic routing has been shown to improve the network throughput, by allowing nodes that overhear the transmission and closer to the destination to participate in forwarding the packet, i.e., in forwarder list. The nodes in forwarder list are prioritized and the lower priority forwarder will discard the packet if the packet has been forwarded by a higher priority forwarder. One challenging problem is to select and prioritize forwarder list such that a certain network performance is optimized. In this paper, we focus on selecting and prioritizing forwarder list to minimize energy consumptions by all nodes. We study both cases where the transmission power of each node is fixed or dynamically adjustable. We present an energy efficient opportunistic routing strategy, denoted as EEOR. Our extensive simulations in TOSSIM show that our protocol EEOR performs better than the well-known ExOR protocol (when adapted in sensor networks) in terms of the energy consumption, the packet loss ratio, the average delivery delay.
Embedded System Based Automated Drug Delivery Unit and MicroFluidics for drug discovery
Dr.UshaaEswaran, Ms.Sreelakshmi and Mr.Vivek Eswaran Affiliated to Jawaharlal Nehru Technological University, Anantapur, Andhra Pradesh, India. Affiliated to Jawaharlal Nehru Technological University, Anantapur, Andhra Pradesh, India. Affiliated to Anna University, Chennai.
Abstract: Drug dosing is a technique that is done to cure the diseases through proper prescription and control of drugs that have been identified to the corresponding disease based on diagnosis. Drug dosing is a very critical and challenging step that needs to be correctly monitored and prescribed by the doctor. Drug dosing in human beings also depends upon size, area, weight and volume of the recipient. There are various ways of drug dosing, targeted therapies are the current state of the art and are probably the best predictor in terms of perceiving the dosing. Nanobio systems are used for targeted therapies. Food and Drug Administration (FDA) has recommended the use of nanobio systems for targeted therapy and drug dosing but they do not have many models. In reality very few exist. With limitations in availability of common platforms for development and validation of automated systems there is a need for a new methodology or integration of multiple platforms to integrate biosensors, expert system and drug diffusion unit. Prostate cancer is one of the major cancers that is affecting men in India. After lung cancer prostate cancer has caused large number of deaths in India. Nanowire is the biosensor used for detection of cancers. In this paper, we present a design of nanowire array sensor for prostate cancer detection. A sensor array of 8 x 8 elements is designed to capture the PSA present in the blood that helps in detecting the presence of prostate cancer. An experimental setup has been developed using the biosensors lab from Nanohub.org. Based on the experimental setup the nanowire sensor is characterized for PSA detection. The sensitivity of detection is increased by use of sensor array. The Automatic drug delivery system is based on bio sensors. However the bio sensors are not under the purview of this project. To create a real time model, the sensors were simulated. Employing Servo motors connected to a voltage divider network simulated sensors. Eight voltage dividers were employed wherein, in each of the dividers; a fixed resistor & a potentiometer were used. The servo motor moves the wiper of pot and thus varies the voltage output on the ADC channel.
Keywords: Prostate specific antigen, bio sensors, nano wire sensors, Bio markers, DNA, Micro Fluidics
Spatial and Spatio-Temporal Multidimensional Data Modelling: A Survey
Mr.Saida Aissi and Mr. Mohamed Salah Gouider Bestmod Laboratory, University of Tunis, High Institute of Management of Tunis, Tunisia Bestmod Laboratory, University of Tunis, High Institute of Management of Tunis, Tunisia
Abstract: Data warehouse store and provide access to large volume of historical data supporting the strategic decisions of organisations. Data warehouse is based on a multidimensional model which allow to express user’s needs for supporting the decision making process. Since it is estimated that 80% of data used for decision making has a spatial or location component, spatial data have been widely integrated in Data Warehouses and in OLAP systems. Extending a multidimensional data model by the inclusion of spatial data provides a concise and organised spatial data warehouse representation. This paper aims to provide a comprehensive review of literature on developed and suggested spatial and spatio-temporel multidimensional models. A benchmarking study of the proposed models is presented. Several evaluation criteria’s are used to identify the existence of trends as well as potential needs for further investigations.
Keywords: Data warehouse, Spatial data, Multidimensional modelling, Temporal dataI
Mr.Sultanullah and Mr.Zheng Xuefeng School of Computer and Communication Engineering, University of Science and Technology, Beijing, China.
Abstract: An emerging internet based super computing model is represented by cloud computing. Cloud computing is the convergence and evolution of several concepts from virtualization, distributed storage, grid, and automation management to enable a more flexible approach for deploying and scaling applications. However, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. The concept of cloud computing on the basis of the various definitions available in the industry and the characteristics of cloud computing are being analyzed in this paper. The paper also describes the main cloud service providers and their products followed by primary cloud computing operating systems.