2nd National Conference of Recent Trends in Computer Science and Information Technology
(Volume-1)

Paper Type :: Research Paper
Title :: Analytical Study on Load Balancing Techniques in the Environment of Cloud Computing
Country :: India
Authors :: Mr. Ashish Dilip Musale || Dr. P.G.Khot
Page No. :: 01-05
In today's word the cloud computing paradigm, load balancing is one of the big challenges due to the increase in the users and their demand for different services on the cloud computing platform. Now fruitful or efficient use of resources in the cloud environment became a critical concern while using cloud Platform. Load balancing is playing an important role in maintaining the balance of Cloud computing. The metrics of load balancing performance algorithms in the cloud are depend on response time and waiting time. In this research paper we primarily focus on two load balancing algorithms techniques, first is the Max-Min Algorithm and second is the Min-Max Algorithm.

Keyword :Min-Min, Max-Min, Response time, Load Balancing, Batch mode scheduling, Immediate mode scheduling, Makespan, Minimum completion time, Minimum executiontime

[1]. N. Ajith Singh, M. Hemalatha, "An approach on semi distributed load balancing algorithm for cloud computing systems" International Journal of Computer Applications Vol-56 No.12 2012
[2]. Shanti Swaroopmoharana, Rajadeepan d. Ramesh &DigamberPowar ," Analysis of load balancers in cloud computing" International Journal of Computer Science and Engineering (IJCSE)ISSN 2278-9960 Vol. 2, Issue 2, May 2013, 101-108.
[3]. Gaurav R. et al. "Comparative Analysis of Load Balancing Algorithms in Cloud Computing." International Journal of Advanced Research in Computer Engineering & Technology, Vol. 1, No. 3, pp.120-124, May 2012.
[4]. A.Khiyaita, M.Zbakh, H. El Bakkali&Dafir El Kettani ,"Load Balancing Cloud Computing : State of Art" IEEE Network Security and Systems (JNS2), 2012 National Days of , 978-1-4673-1050-5.
[5]. Ektemal Al-Rayis, HebaKurdi," Performance Analysis of Load Balancing Architectures in Cloud Computing" IEEE Modelling Symposium (EMS), 2013 European, 20-22 Nov. 2013, 978-1-4799-2577-3.

Paper Type :: Research Paper
Title :: Enhanced Quality of Service Parameters Help to Improve Performance of Hybrid Cloud Architecture
Country :: India
Authors :: Mrs. Snehal A.Narale || Dr. P.K.Butey
Page No. :: 06-11

Cloud computing is an emerging technology which has been used for business as well as for education purpose. Cloud computing technology has advantages like agility, flexibility, scalability and quality of service. Quality of service parameter plays an important role to improve the performance of the architecture. In cloud computing due to the increasing use of cloud services, the quality of service (QoS) of cloud computing has become an important and essential issue. To improve the performance of the architecture various parameters of quality like availability, response time, processing time and execution time would enhanced. The performance of hybrid cloud is better than public and private cloud because hybrid cloud always gives optimized results. In this research paper performance of the hybrid.........

Keywords: cloud computing, QoS, hybrid cloud architecture, Availability, Response time

[1]. Gaithersburg, MD 20899-8930, NIST Special Publication 800-145, PP 1-7, September 2011.
[2]. Mrs. Shweta Barhate, Mrs. SnehalNarale, Cloud Based Teaching and Learning Environment for Smart Education, International Journal on Recent and Innovation Trends In Computing & Communication, PP- 38-41, 2015, ISSN 2321-8169.
[3]. Cloud Computing Wikipedia
[4]. A. M. R. M. H. Mohammad Rezah Meshbahi, Reliability And High Availability In Cloud Computing Environment : A Refernce Road Map, Human Centric Computing And Information Sciences, Springer Journal , pp. 2 -31, 2018.
[5]. Mrs. SnehalA.Narale , Dr.P.K.Butey, Discovering The Scope Of Mobile Agent Technology In Cloud Computing Environment: A Study, IJECSCSE, ISSN 2277-9477,Vol 1,Issue1 , PP 1-6,2015.

Paper Type :: Research Paper
Title :: Knowledge Management: Current Scenario in Context of IT Students
Country :: India
Authors :: Preeti .S. Agrawal
Page No. :: 12-15

The purpose of this paper is to provide the information on impact of various technologies available based on the application of knowledge management on IT students to enhance their study and career. Educational organizations are the main element of society for the constant source of knowledge. The role of knowledge management (KM) in the educational institutions is critical and important. KM is the application of systematic thinking. KM in educational group can be separately recognized and studied at administrative, research, education (teaching and learning processes). Knowledge assets are very important to all students as they play a major role in their study time.

Keywords: knowledge management, IT.

 

[1]. Alavi, M., Leidner, D.E.: Review: knowledge management and knowledge management systems: conceptual foundations and research issues. MIS Quarterly, 25, 1 (2001), 107-136.
[2]. Dennis, A.R., Vessey, I.: Three knowledge management strategies: knowledge hierarchies, knowledge markets and knowledge communities. MIS Quarterly Executive, 4, 4, (2005).
[3]. Schultze, U., Leidner, D.E.: Studying knowledge management in information systems research: discourses and theoretical assumptions. MIS Quarterly, 26, 3, (2002), 213-242.
[4]. Jennex, M.E., Olfman, L.: A knowledge management success model: an extension of DeLone and McLean's IS success model. In Proceedings of Ninth Americas Conference on Information Systems, (August 2003).
[5]. Zerega, Blaise. Art of knowledge management. InfoWorld, July 27, 1998, Vol. 20, No. 30, p. 61.


Paper Type :: Research Paper
Title :: Spatial Technology for POI Cognition and Image Localization
Country :: India
Authors :: Priti S. Netam || Jagdish Pimple
Page No. :: 16-19

In this paper location based information generation and sharing is considered which becomes increasingly more popular due to the explosive growth of internet capable and location aware mobile devices. The system consist of data collector, data contributor, location based service provider by using google maps and system users.The data collector gathers all the information from data contributor while user fire query to perform spatial top-k query which ask for POI in certain region & finding the highest k rating for interested POI attribute. In practice, LBSPs are untrusted and may return fake query results for various bad motives eg. In favor of POIs willing to pay. Three novel schemes are used for user to detect fake query result and moving top-k query result as push to cultivate the helpful arrangement and utilization of the projected framework. The affectivity and productivity of schemes area unit analyzed and evaluated.

Keywords: Location based service provider (LBSP), Point-of-interest (POI), Data collector and contributor.

[1]. R. Zhang, Y. Zhang, and C. Zhang, "Secure Top-k Query Processing via Untrusted Location-Based Service Providers," Proc. IEEE INFOCOM '12, Mar. 2012.
[2]. H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "SybilGuard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 576-589, June 2008.
[3]. H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks," IEEE/ACM Trans. Networking, vol.18, no. 3, pp. 885-898, June 2010.
[4]. H. Hacig€um€us, S. Mehrotra, and B.
[5]. Iyer, "Providing Database as a Service," Proc. IEEE 18th Int'l Conf. Data Eng. (ICDE), Feb. 2002.


Paper Type :: Research Paper
Title :: Positive and Negative Impact Social Networking Sites on the Adolescents
Country :: India
Authors :: Sandip.S.Gudelliwar || Dr. S. B. Kishor || Dr.S.K.Yadav
Page No. :: 20-22

The study of this research to create awareness among the Adolescents for social networking sites but the statistics all tell the same story: Social media are gaining in popularity every day in the adolescent. Increase in spending time on social network it gives the positive and negative impact of social networking on Adolescents one study show that average spending time of Adolescents on social network..........

Keywords: Social networking, Facebook, Twitter, Internet. Adolescent

[1]. Kuppuswamy S, Narayan PB (2011) The impact of social networking websites on theeducation of youth
[2]. Jain MR, Anand N, Gupta P (2012) Impact of social networking sites in the changingmindset of youth on social issues- A study of Delhi-NCR youth. Journal of Arts, Science & Commerce 3: 36-43.
[3]. Khan S (2011) Impact of social networking websites on students.Abasyn Journal of Social Sciences 5: 56-77.
[4]. Ahn J (2011)The effect of social networking sites on adolescents' social and academicdevelopment: Current theories and controversies. Journal of the American Society for Information Science and Technology 62: 1435-1445.
[5]. Camilia ON, Ibrahim SD, Dalhatu BL (2013) The effects of social networking sites usageon the studies of Nigerian students. The International Journal of Engineering and Science 2: 39-46.
[6]. Beres, D. (n.d.): 5 Weird Negative Effects of Social Media on Your Brain. Reader's Digest.
[7]. California Adolescent Health Collaborative. (2011, 8). Impact of Social Media on Adolescent Behavioral Health in California phi.org.


Paper Type :: Research Paper
Title :: Smart Restaurant Automation System
Country :: India
Authors :: Sandhya N. Dhage || Maheetkumar Palliwar || Shailvi Meshram
Page No. :: 23-28

In the last years, the restaurant industry has lived through many changes. Anyway, an area was not improved since several decades. The main aim of the project is to provide automation in the restaurant by using QR Technology and Internet of Things to replace the traditional restaurant system in which there exist various people for doing different works. "Smart Restaurant Automation System" will accomplish the goal that only the administrator will be able to control the whole restaurant environment. The restaurant ordering system will be replaced with Wi-Fi Connectivity, QR Technology and Internet Portal by which the customer will not have to wait for the waiter to take orders. The restaurant will be equipped with LED Board at the administrator side which helps taking the order and providing with precise bill. The restaurant will also be equipped with Gas sensor for leakage detection, Voltage sensor to monitor daily voltage ratings and fluctuations and humidity sensor, which will help maintaining the room temperature accordingly.

Keywords- Restaurant automation, QR Code, Light Emitting Diode (LED), Wi-Fi connectivity.

[1]. Khairunnisa K., "The Application of Wireless Food Ordering System", MASAUM Journal of Computing, Volume 1 Issue 2, September 2009.
[2]. N. M. Z. Hashim, "Smart Ordering System via Bluetooth", International Journal of Computer Trends and Technology (IJCTT), Volume 4 Issue 7, 2013.
[3]. S. R. Patil, "e-converse An affordable touch screen solution to intrigue Dining experience", International Journal of Computer& Communication Technology ISSN (PRINT): 0975 -7449, Volume-6, Issue-2, 2017.
[4]. K. A. Wadile, "E- restaurant management system using robot", International Journal of Informative & Futuristic Research (IJIFR) Volume - 2, Issue - 6, February 2015 18th Edition, Page No: 1840-1847.
[5]. Ashwini Bankar, "Review paper on - Design of Intelligent Restaurant with a Touch Screen Based Menu", IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 3 Ver. I (May – Jun. 2015).


Paper Type :: Research Paper
Title :: Computational Model for Document Classification Based on New Fuzzy Soft Distance
Country :: India
Authors :: Dr. Neeraj Sahu
Page No. :: 29-34

In this paper, we introduced new fuzzy soft distance based document classification. The Fuzzy Soft Distance (FSD) is a powerful classification for Document classification. The different distance are based on Hamming distance, normalized Hamming distance, Euclidean distance, normalized Euclidean distance, Hausdorff metric, normalized hausdorff distance, generalized Hamming distance, generalized Euclidean distance and generalized hausdorff distance. An application of Fuzzy Soft distance is illustrated for the document classification. We use here MATLAB 7.14 software tools for calculating result analysis of efficiency and accuracy of document classification.

Keywords- Fuzzy sets, Soft sets, Fuzzy Soft sets, Document Classification, Fuzzy Soft Distance

[1]. L.A. Zadeh, ―Fuzzy Sets,‖ Inform. Control, vol. 8, pp.338–353, 1965.
[2]. D. Molodtsov, ―Soft set theory—first results,‖ Comput. Math. Appl, vol.37, pp. 19–31, 1999.
[3]. P.K. Maji, R. Biswas and A.R. Roy, ―Fuzzy soft sets,‖ J. Fuzzy Math. vol. 9, pp. 589–602, 2001.
[4]. P.K. Maji, R. Bismas and A.R. Roy, ―Soft set theory,‖ Comput. Math.Appl. vol.45. pp. 555–562, 2003.
[5]. D. Molodtsov, ―The Theory of Soft Sets,‖ URSS Publishers, Moscow, 2004.


Paper Type :: Research Paper
Title :: Community Detection and Behaviour Study for Social Computing Using New Media Technology
Country :: India
Authors :: SharadSahu || Swatantra Kumar Sahu || Dr.Neeraj Sahu
Page No. :: 35-41

This paper presents a computational model for community detection and behavior study for social computing with new media technology. The proposed numerical results analysis of social computing is based on computational model how make efficient and accurate use of new media technologies. In this paper, we have used accuracy calculations of new media technologies for social computing results. The experimental results are evaluated using the numerical computing MATLAB 7.14. The Experimental results show the proposed approach optimistic solution for business growth of media.

Keywords- Social Media, Data Mining, Community Detection, Behavior Prediction, New Media Technology

[1]. Andrus, D. Calvin (2005). "The Wiki and the Blog: Toward a Complex Adaptive Intelligence Community." Studies in Intelligence, 49 (3, September).
[2]. Dearstyne, Bruce W (2007). "Blogs, Mashups, & Wikis: Oh, My!" Information Management Journal, 41 (4, Jul/Aug), 25-31.
[3]. Drury, Sarah. The History of New Media, 2003. Retrieved March 12, 2008 from http:// isc.temple.edu/ sdrury/survey2006/ timeline.html.
[4]. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. NYU Press, 2006.
[5]. Langfitt, Frank (2006, November 22). "Social Networking Technology Boosts Job Recruiting." NPR, Retrieved March 16, 2008 from http://www.npr.org/templates/story/story.php?storyId=6522523


Paper Type :: Research Paper
Title :: Literature Review on Detection of Breast Cancer by Mammogram Interpretation Using CAD System
Country :: India
Authors :: Grace John M || Amresh Kumar
Page No. :: 42-47

Breast cancer is one of the major causes of non-accidental death in women. Early diagnosis of the disease allows physician to administer suitable treatment, and can improve the patient's survival rate. Traditional diagnosis involves trained physicians to visually examine the medical images of breast for any signs of tumor development in the region. However due to the large scale of the medical image data, this manual diagnosis is often laborious and can be highly subjective due to inter-observer variability. Inspired by the advanced computing technology which is capable of performing complex image processing and machine learning, researches had been carried out in the past few decades to develop computer aided diagnosis (CAD) systems to assist clinicians detecting breast cancer.............

Keywords: CAD (Computer Aided Diagnosis) system, Classification, Feature extraction & selection, Mammogram, Preprocessing, Segmentation.

[1]. Chun-Chu Jen and Shyr-Shen Yu, ‚Automatic detection of abnormal mammogramsinmammographicimages‛, ExpertSystemswithApplications,vol.42,pp.3048–3055,2015.
[2]. J.Dheeba, N.Albert Singh and S.Tamil Selvi, ‚Computer-aided detection of breast cancer on mammograms: A swarm intelligence optimized wavelet neural network approach‛, Journal of Biomedical Informatics, http://dx.doi.org/10.1016/j.jbi.2014.01.010 ,2014.
[3]. S.D. Tzikopoulos, M.E. Mavroforakis, H.V. Georgiou, N.Dimitropoulos and S.Theodoridis, ‚A fully automated scheme for mammographic segmentation and classification based on breast density and asymmetry‛, computer methods and programs in biomedicine , Elsevier,vol. 102 ,pp. 47–63,2010.
[4]. R. Llobeta, M.Pollánb, J. Antóna , .J. M Garcíad , M.Casalsd, I. Martínezd , F.R Peralesd , B.P Gómeza , D.S Trejod and J.CCortés,
[5]. ‚Semi-automated and fully automated mammographic density measurement and breast cancer risk prediction‛, Computer methods and programs in biomedicine, vol. 116,pp. 105–115, 2014.


Paper Type :: Research Paper
Title :: Business Intelligence: Concepts, Components, Techniques and Benefits
Country :: India
Authors :: Prof. SudhirJuare
Page No. :: 48-53

Business intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and analyzing business data, such as sales revenue by products and/or departments, or by associated costs and incomes. For companies maintaining direct contact with large numbers of customers, however, a growing number channel-oriented application (e.g. e-commerce support, call center support) create a new data management challenge: that is effective way of integrating enterprise applications in real time. To learn from the past and forecast the future, many companies are adopting Business Intelligence (BI) tools and systems. Companies have understood the importance of enforcing achievements of the goals defined by their business strategies through business intelligence concepts................

Keywords: business intelligence, data, support system.

[1]. Adelman Sid , Moss Larissa and Barbusinski Les. (2002) "I found several definitions of BI‟, DM Review. Retrieved 17 August 2002 from http://www.dmreview.com /article_sub.cfm?articleId=5700
[2]. Berson Alex, Smith Stephen and Thearling Kurt. (2002) "Building Data Mining Applications for CRM‟, Tata McGraw Hill
[3]. Cui, Z., Damiani, E. and Leida, M. (2007) "Benefits of Ontologies in Real Time Data Access‟, Digital Ecosystems and Technologies Conference, DEST '07.pp. 392-397.
[4]. Curt Hall. (1999) "Data Warehousing for Business Intelligence‟.Retrieved 20 March 1999, from http:// www.cutter.com/ itreports/RP68E .pdf.


Paper Type :: Research Paper
Title :: The Severe Effect of IoT Characteristics on Security and Privacy: Threats, Existing Solutions, and Challenges
Country :: India
Authors :: Prof. Manisha G. Gedam || Mr. Waibhav K. Deogade
Page No. :: 54-62

IoT applications have been widely used in many fields of social production and social living such as healthcare, energy and industrial automation. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. Internet of Things (IoT) envisions everything in the physical world will be connected seamlessly and integrated securely through Internet infrastructure. When things react to environment or stimuli, data will be captured and transformed into valuable insights, which can be utilised in various application domains, ranging from automated home appliances, smart grids and high-resolution assets, to product management. Then, the security and privacy effects of IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.

Keywords: Internet-of-Things (IoT), IoT Characteristics, privacy, security, survey.

[1]. The Statistics Portal. (2017). Internet of Things (IoT) connected devices installed base worldwidefrom 2015 to 2025 (in billions). [Online]. Available:https://www.statista.com/statistics/471264/iot-number-of-connected-dev ices-worldwide/
[2]. IDC. (2016). Internetof Things Market Statistics. [Online]. Available: http://www.ironpaper.com/webintel/articles/internet-of-things-market-st atistics/
[3]. Bigthink Edge. (2016). Hacking the Human Heart [Online]. Available: http://bigthink.com/future-crimes/hacking-the-human-heart
[4]. Envista Forensics. (2015). The Most Hackable Cars on the Road. [Online]. Available: http://www.envistaforensics.com/news/the-most-hackable-cars-on-the-ro ad-1
[5]. Wikipedia. 2016 Dyn cyberattack. [Online]. Available: https://en.wikipedia.org/w/index.php?title=2016_Dyn_cyberattack&oldi d=763071700


Paper Type :: Research Paper
Title :: Importance of Usefulness, Usability And Integrity Model for Cost–Benefit Analysis
Country :: India
Authors :: Dr. Kishor M. Dhole || Dr. Vinay Chavan || Dr.Parag R. Kaveri
Page No. :: 63-66

This paper covers the Usefulness, Usability and Integrity (UUI) factor for information system. Which calculates Information Integrity (I*I) value in the context of Cost Benefit analysis for achieving high integrity of information in information system environment. This paper suggests reducing the high integrity risk value by calculating I*I index value. This paper imposes the usefulness, usability and integrity factor for competitive advantages in control environments. Its determinants are Accuracy, Correctness and Reliability of information improved the decision situation in Information System(IS).

Keywords: Usefulness, Usability and Integrity (UUI), Information Integrity ( I*I)

[1]. Dhole K.M., Chavan Vinay, "Crime proofing techniques in ICT and I*I attributes" IJARCCE, 2013,volume 2,index 3(22), (print):2319-5940.
[2]. Dhole K.M.,Chavan Vinay, "Review of Information Integrity Problem" NCRAECS14,Shri. Shivaji Science College, National Conference,Nagpur, 2014, 978-81-906457-5-1 .
[3]. Anders Tallberg, "An Economic Framework for Information Integrity", Library, Swedish School of Economics and Business Administration, P.O. Box 479, 00101, Helsinki, Finland,2002.
[4]. Delone W.H., and McLean E.R., "Information Systems Success: The Quest for the Dependent Variable", Information Systems Research3 (1), 2007.
[5]. Mandke V. V. and Nayar M.K., "Information Integrity Imperative for Competitive Advantage in Business Environment characterized by Uncertainty", in InformationTechnology for Business Management, World Computer Congress, Beijing, China 2008, pp. 115-125.


Paper Type :: Research Paper
Title :: An Overview of Energy-Efficient Cloud Data Centres
Country :: India
Authors :: Prof. Anupam Chaube
Page No. :: 67-70

The designers of computing systems have interested on the improvements of computing performance that are driven by the demand of consumer, business, and scientific applications. However, further growth of computing performance has started to be limited due to the increasing energy consumption of cloud data centres as a result of carbon dioxide footprints and overwhelming electricity bills. Therefore, the designers of computing systems have started to improve the energy efficiency. In this study, we present an overview of energy efficient design of cloud virtualized data centres to guide future.

Keywords: cloud computing; energy consumption; data centre; virtualization

[1]. L. Barroso, "The Price of Performance, ACM Press, " Queue, vol. 3, no. 7, pp. 53, 2005.
[2]. W.D. Weber, X. Fan, L.A. Barroso, "Powering the data center," U.S. Patent No. 8,595,515. Washington, DC: U.S. Patent and Trademark Office, 2013.
[3]. A. Beloglazov, R. Buyya, Y.C. Lee, A. Zomaya, "A taxonomy and survey of energy-efficient data centers and cloud computing systems, " Advances in computers, vol. 82, no. 2, pp. 47-111, 2011.
[4]. R. Nathuji and K. Schwan, "VirtualPower: Coordinated power management in virtualized enterprise systems," ACM SIGOPS Operating Systems Review, vol. 41(6), pp. 265–278, 2007.
[5]. R. Raghavendra, P. Ranganathan, V. Talwar, Z. Wang, and X. Zhu, "No "power" struggles: Coordinated multi-level power management for the data center," SIGARCH Computer Architecture News, vol. 36, no. 1, pp. 48–59, 2008.
[6]. A. Verma, P. Ahuja, and A. Neogi, "pMapper: power and migration cost aware application placement in virtualized systems," in Proceedings of the 9th ACM/IFIP/USENIX International Conference on Middleware, pp. 243–264, 2008.


Paper Type :: Research Paper
Title :: Artificial Intelligence System
Country :: India
Authors :: DevarshiAnantvijayPatrikar
Page No. :: 71-73

The intelligence shown by artificial objects like machines/computer systems used in industries to make the work smartly is called Artificial Intelligence. The overall system is used to reduce manual efforts and get the things with accuracy and error free.While exploiting the power of the computer systems, the curiosity of human, lead him to wonder, "Can a machine think and behave like humans do?"Thus, the development of AI started with the intention of creating similar intelligence in machines that we find and regard high in humans.The terminology "Artificial Intelligence" was given by a Professor John McCarthy in 1956. However now-a-days, this is one of the major technology used in the industries.................

Keywords: Artificial Intelligence (AI).

[1]. Websites related to AI education and tutorials.


Paper Type :: Research Paper
Title :: A Review of Multimodal Biometric Technology based on Fusion of Iris and Fingerprint Traitsfor Identification of Person
Country :: India
Authors :: A. A. Halder || Dr. S. R. Pande
Page No. :: 74-77

Biometric features are widely used for unique identification of any person. Iris is considered as the most reliable feature for identification of an individual with greatest accuracy because iris is the most discriminatory of facial biometrics. It is also found that biometrics is combined with cryptography for security to the greater extent. For greater precision of security many researchers are mixing other biometrics and hence multimodal biometric system has come into existence. In multimodal biometrics one or more features are combined together and using feature extraction technique features are extracted and fused together thereafter these fused feature set is matched using various matching algorithm with the feature of the person who will be identified. This paper presents an insight on issues with the biometrics which may help the researchers and other organizations working on biometrics.

Keywords: Biometrics, Fusion, trait, gait, Multimodal, HDC, FRR

[1]. Gaurav Bhatnagar, Jonathan Wua, BalasubramanianRamanb (2012). Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission. Future generation computer systems, 28,1,2012, p254- 267
[2]. R. ÁlvarezMariño, F. Hernández Álvarez, L. Hernández Encinas.(2012). A crypto-biometric scheme based on iris-templates with fuzzyextractorse. Information Sciences, 195, p91-102.
[3]. Javier Galbally, Arun Ross, Marta Gomez-Barrero, Julian Fierrez, Javier Ortega-Garcia. (2013). Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms. Computer Vision and Image Understanding, 117 (1), p1512-1525.
[4]. Farmanullah Jan, Imran Usman, Shahrukh Agha. (2012). Iris localization in frontal eye images for less constrained iris recognition systems. Digital Signal Processing, 22 (1), p971-986.
[5]. Simona Crihalmeanu and Arun Ross. (2012). Multispectral sclera patterns for ocular biometric recognition. Pattern Recognition Letters, 33(1), p1860-1869.


Paper Type :: Research Paper
Title :: Exploring Integrity Management and Verification Techniques for Cloud Data Storage
Country :: India
Authors :: Ms. I. U. Wankhede || Dr. S. S. Sherekar || Dr. V. M. Thakare
Page No. :: 78-82

Cloud Computing has emerged as a boosting technology for industries and communities all over the world. It has opened new vistas for researchers, developers, engineers and even common man. However, there are many issues which are yet to be addressed, most important of all, integrity and security management for cloud data storage. The Cloud Service Provider must perform a transparent role while keeping the user's data. It must provide some guarantee that the outsourced user data remains tamper proof. Various methods like Data Encryption, Auditing and Access control mechanisms have been proposed to maintain and check data integrity in cloud environment. Recently, Cloud Forensics has also gained importance as an integrity verification technique. The paper reviews few prominent data integrity management and verification techniques for cloud data storage. It explores the availability of integrity frameworks, protocols and tools applicable to the Cloud environment.

Keywords: Data Integrity, Cloud Data Storage, Auditing, Integrity Management

[1]. M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell and E. Dubois, "Security transparency: the next frontier for security research in the cloud", Journal of Cloud Computing: Advances, Systems and Applications, Springer, June 2015
[2]. B. Wang, B. Li and H. Li, "Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud", IEEE Transactions on Cloud Computing, Vol. 2, No. 1, pp. 43-56, 2014.
[3]. Y. Zhang, C. Xu, X. Liang, H. Li, Y. Mu and X. Zhang, "Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation", IEEE Transactions on Information Forensics and Security, Vol. 12, No. 3, pp. 676-688, March 2017
[4]. T. Jiang, X. Chen, and J. Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation", IEEE Transactions on Computers, Vol. 65, No. 8, pp. 2363 – 2373, August 2015
[5]. P. Wen Chi and C. Lei, "Audit-Free Cloud Storage via Deniable Attribute based encryption", IEEE Transactions on Cloud
Computing, Vol. 6 , No. 2 , pp. 414 – 427, April 2015


Paper Type :: Research Paper
Title :: A Study of Patient Monitoring System in Hospitals through RFID
Country :: India
Authors :: Saurabh Dadaji Gabhane || Ms. Bhagyashree Ambulkar
Page No. :: 83-86

Radio Frequency Identification (RFID) has become popular from army to industry. RFID tags have been implanting into many various products, especially in organization part. A tag stores individual information of its fix object and an RFID reader reports with the tag in radio frequencies to determine the object. This object to be monitored may also be a human. In our use, RFID technology is applied in health care systems. The system carries wireless mobile communication between the reader and RFID tags. Each patient available in the system is wears a bracelet and built-in mobile united with a unique tag, and the readers are mobile PDA devices each including a wireless RFID reader card. The proposed system can be used to identify and monitor the patients.

Keywords:Security, Smart Monitoring, Smart Reader.

[1]. S.–W. Wang, W.–H. Chen, C.–S. Ong, L. Liu and Y.–W. Chuang, RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital, 39th Annual Hawaii International Conference on System Sciences 8, 2006.
[2]. http://en.wikipedia.org/wiki/Biometric passport, accessed on May, 2010.
[3]. S.–E. Sarma, S.–A. Weis and D.–W. Engels, RFID Systems and Security and Privacy Implications, LNCS 2523, 2002, pp. 454– 469.
[4]. C.–J. Li, L. Liu, S.–Z. Chen, C.–C. Wu, C.– H. Huang and X.–M. Chen, Mobile Healthcare Service System Using RFID,IEEE International Conference on Networking, Sensing and Control 2, 2004, pp. 1014–1019.
[5]. http://www.rfidinhealthcare.org, accessed on May, 2010.