Paper Type | :: | Research Paper |
Title | :: | Real-Time and Non-Intrusive Method Based On the Diffusion Speed of Single Image |
Country | :: | India |
Authors | :: | Vibha Kamble || Prof. P. S. Mohod |
Page No. | :: | 01-06 |
Keyword :Spoofing, Diffusion speed, Local speed pattern, Local binary pattern, SVM classifier, Face liveliness detection
Paper Type | :: | Research Paper |
Title | :: | An Overview of R-Trees and Its Variants in Spatial Data Searching |
Country | :: | India |
Authors | :: | Bhagyashree Ambulkar || Rajeshree Ambulkar |
Page No. | :: | 07-09 |
Indexing plays a vital role in query processing for fast retrieval of results. Queries using indexing executes fastly and provide noteworthy performance enhancement. The R-tree allows to index multidimensional objects. It arranges data in a treelike structure, with bounding boxes at the nodes. Bounding boxes indicate the next level of the data that is connected to the sub tree underneath. The R-Tree variants are categorized as the original R-Tree, hybrid of R-Tree and an extension of R-Tree to support several applications. In this paper, we overview the R-Tree and its variants R+ Tree, R* Tree, Hilbert R-tree, Spatio-temporal indexing by RST-trees spatial databases are presented.
Keywords: R-Tree, R-Tree variants, Spatial Index, Multidimensional data
Paper Type | :: | Research Paper |
Title | :: | Study of Technical Support for Mobile Process Mining |
Country | :: | India |
Authors | :: | Mr. Dhiraj Rane || Dr. Mahendra Dhore |
Page No. | :: | 10-17 |
A Process mining is relatively young research area that meets the gap between processes and various IT systems. Event logs are the primary sources for a processmining project and they are captured by different data sources including databases, ERPsystems, CRM systems, audit trails, mobile communication, hospital information systems, bank transaction logs,etc. The extracted knowledge from this log enable us to discover the actual process andexisting process model for further analysis, evaluation and continuous improvement intheir quality. This way, various process mining tools have been developed in the market.Nevertheless, there is a lack of sufficient and comprehensive evaluation frameworks thatassist users in selecting the right tool. This thesis provides the schematic view
Keywords: Process Mining, ProM, Simulation, Disco, MATLAB, NS2, RapidMiner
[1]. H. Hoehle and V. Venkatesh, ―Mobile application usability: conceptualization and instrument development,‖ MIS Quarterly, vol.
39, no. 2, pp. 435–472, 2015. View at Google Scholar · View at Scopus
[2]. F. F. Ntawanga, A. P. Calitz, and L. Barnard, ―A context-aware model to improve usability of information display on smartphone
apps for emerging users,‖ The African Journal of Information Systems, vol. 7, no. 4, p. 3, 2015. View at Google Scholar
[3]. V. V. S. M. Chintapalli, W. Tao, Z. Meng, K. Zhang, J. Kong, and Y. Ge, ―A comparative study of spreadsheet applications on
mobile devices,‖ Mobile Information Systems, vol. 2016, Article ID 9816152, 10 pages, 2016. View at Publisher · View at Google
Scholar · View at Scopus
[4]. H. Cai, C. Xie, L. Jiang, L. Fang, and C. Huang, ―An ontology-based semantic configuration approach to constructing Data as a
Service for enterprises,‖ Enterprise Information Systems, vol. 10, no. 3, pp. 325–348, 2016. View at Publisher · View at Google
Scholar · View at Scopus
[5]. B. Xu, L. D. Xu, H. Cai, C. Xie, J. Hu, and F. Bu, ―Ubiquitous data accessing method in iot-based information system for
emergency medical services,‖ IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1578–1586, 2014. View at Publisher ·
View at Google Scholar · View at Scopus
Paper Type | :: | Research Paper |
Title | :: | An Overview of Mind Uploading |
Country | :: | India |
Authors | :: | Mrs. Mausami Sawarkar || Mr. Dhiraj Rane |
Page No. | :: | 18-25 |
Mind uploading is an ongoing area of active research, bringing together ideas from neuroscience, computer science, engineering, and philosophy. Realistically, mind uploading likely lies many decades in the future, but the short-term offers the possibility of advanced neural prostheses that may benefit us. Mind uploading is the conceptual futuristic technology of transferring human minds tocomputer hardware using whole-brain emulation process. In this research work, we have discuss the brief review of the technological prospectsfor mind uploading, a range of philosophical and ethical aspects of the technology. We have also summarizes various issues for mind uploading...........
Keywords: Mind Uploading, Whole brain simulation
[1]. A framework for approaches to transfer of a mind's substrate, Sim Bamford
[2]. Goertzel, BEN; Ikle', Matthew (2012). "Introduction". International Journal of Machine Consciousness. 04: 1–3.
doi:10.1142/S1793843012020015.
[3]. Coalescing minds: brain uploading-related group mind scenarios
[4]. Jump up to:a b c d e f g h Sandberg, Anders; Boström, Nick (2008). Whole Brain Emulation: A Roadmap (PDF). Technical Report
#2008‐3. Future of Humanity Institute, Oxford University. Retrieved 5 April 2009. The basic idea is to take a particular brain, scan
its structure in detail, and construct a software model of it that is so faithful to the original that, when run on appropriate hardware, it
will behave in essentially the same way as the original brain.
[5]. Goertzel, Ben (December 2007). "Human-level artificial general intelligence and the possibility of a technological singularity: a
reaction to Ray Kurzweil's The Singularity Is Near, and McDermott's critique of Kurzweil". Artificial Intelligence. 171 (18, Special
Review Issue): 1161–1173. doi:10.1016/j.artint.2007.10.011.
Paper Type | :: | Research Paper |
Title | :: | Literature Review: Analysis of Soft Computing Techniques Used In Pattern Recognition of 2-D Diagram/Object |
Country | :: | India |
Authors | :: | Dr. Girish Katkar || Mr. Nikam Vr |
Page No. | :: | 26-29 |
When images are to be used in different areas of image analysis such as object recognition, it is important to reduce the amount of data in the image while preserving the important, characteristic, structural information. Many soft computing technique are been studied here, for object detection and analyzing the importance of it. Mathematics of soft computing technique varies according to the problem statement applied, here we are discussing most of the soft computing mathematics and how we are integrating with our object and pattern detection. We are discussing here about various past work in two dimensional diagram and pattern recognition. We have also discussed about some soft computing technique like Hough transform, genetic algorithm, neural network and ant colonization optimization.
[1]. Zadeh, Lotfi A., "Fuzzy Logic, Neural Networks, and Soft Computing," Communications of the ACM, March 1994, Vol. 37
No. 3, pages 77-84.
[2]. X. S. Yang, Z. H. Cui, R. Xiao, A. Gandomi, M. Karamanoglu, Swarm Intelligence and Bio-Inspired Computation: Theory and
Applications, Elsevier, (2013).
[3]. D. K. Chaturvedi, "Soft Computing: Techniques and Its Applications in Electrical Engineering", Springer, (2008).
[4]. Shalinee Patel, Pinal Trivedi, and Vrundali Gandhi, "2D Basic Shape Detection Using Region Properties", International Journal of
Engineering Research & Technology, vol. 2, no. 5, pp. 1147-1153, May 2013.
[5]. M. Sezgin and B. Sankur, "Survey over Image Thresholding Techniques and Quantitative Performance Evaluation", Journal of
Electronic Imaging, vol. 13, no. 1, pp. 146–168, Jan. 2004.
Paper Type | :: | Research Paper |
Title | :: | Overview of Intelligence Amplification |
Country | :: | India |
Authors | :: | Ashwinkumar Lilhare || Prof. Dhiraj Rane |
Page No. | :: | 30-33 |
Intelligence amplification (I.A.) is a multidisciplinary field whose goal is to automate activities that presently require human intelligence. Recent successes in A.I. include computerized medical diagnosticians and systems that automatically customize hardware to particular user requirement. Perception is concerned with building model of the physical world from sensory input (visual, audio, etc.). Many important technical concepts have arisen from A.I. that unify these diverse problem areas and that from the foundation of the scientific discipline.
Keywords- Machine learning, Deep learning, Big data, Emotions Recognition.
[1]. B. Balzer, "HEARSAY-III: A Domain – Independent Framework For Expert Systems", Proceedings of the First Annual National
Conference on Intelligence Amplification, 1980-August.
[2]. R. J. Brachman, R.E. Fikes, H.J. Levesque, "KRYPTON: Integrating Terminology and Assertion", Proceedings of the First
Annual National Conference on Intelligence Amplification, 1983.
[3]. J. C. Kunz, A Physiological rule-based system for interpreting pulmonary function test rules, November 1978.
[4]. D. B. Lenat, "EURISCO: A Program That Learns New Heuristics and Domain Concepts", Artificial Intelligence, vol. 21, no. 1 and
2, March 1983.
[5]. J. D. Lowrance, T. D. Garvey, "Evidential Reasoning: A Developing Concept", IEEE 1982 Proceeding of the International
Conference on Cybernetics and Society, 1982-Octomber
Paper Type | :: | Research Paper |
Title | :: | An Overview of Redtactonhuman Area Networking Technology |
Country | :: | India |
Authors | :: | Ms.Tanushree N.Choudhari || Prof. Ms.Bhagyashree Ambulkar |
Page No. | :: | 34-38 |
As, in these days international the communique generation may be very essential to speak with each other. To speak with each other we use gadgets like mobiles, pda's, pagers etc. And numerous networking technologies. Now what about if we should use yourself as a networking era as a RedTacton generation. RedTacton is a HAN (human area networking era) and it became advanced by means of NTT(Nippon Telegraph and cellphone Co-Operation),Japan in 2004. RedTacton transfers statistics 802.3half duplex conversation at the rate of 10 Mb/s. in this era the minute alternate in electric powered area generated with the aid of human because of RedTacton transmitter reasons the statistics switch .RedTacton conversation takes location within the RedTacton transmitter and RedTacton receiver..............
Keywords- RedTacton, Data, NTT, HAN, Transmission Mediumetc
[1]. wikipedia.RedTacton[Online].Available:http://en.wikipedia.org/wiki/RedTacton
[2]. .NTT (February 2005). "RedTacton: An innovative Human Area Networking technology.
[3]. Prof. VasantkumarUpadhye and Pooja C Kallatti,"Redtacton", International Journal of New Innovations in Engineering and
Technology, Volume4Issue March 2016 ISSN : 2319-6319
[4]. M.Jadhav, KrushnkumarA.Bhanuse, Chetan S.Lokhande and Ms. A. A. Pujari, "Data Transfer Through Human Body using
REDTACTON",INTERNATIONAL JOURNAL FOR RESEARCH IN EMERGING SCIENCE AND TECHNOLOGY,
VOLUME-3, ISSUE-3, MAR-2016, E-ISSN: 2349-7610
[5]. Ashutoshkumar, M.V.N.R. Pavan Kumar, UtkarshKamble, Mahesh Dhebe , Amol Khot, "Overview on RedTacton
Technology",Internatrch in Advent Technology, Vol.2, No.4, April 2014 E-ISSN: 2321-9637
Paper Type | :: | Research Paper |
Title | :: | Survey on Artificial Life Brain |
Country | :: | India |
Authors | :: | Ms.Jivanjyoti S. Thakare || Prof. Rashmi Dukhi |
Page No. | :: | 39-42 |
Three components of a brain model operating on neuromolecular computing principles are described. The first component comprises neurons whose input-output behavior is controlled by significant internal dynamics. Models of discrete enzymatic neurons, reaction-diffusion neurons operating on the basis of the cyclic nucleotide cascade, and neurons controlled by cytoskeletal dynamics are described. The second component of the model is an evolutionary learning algorithm which is used to mold the behavior of enzymedriven neurons or small networks of these neurons for specific function, usually pattern recognition or target seeking tasks.
Keywords- neuromolecular, cytoskeleton, perceptron,gyros,cortical.
[1]. Artificial brain '10 years away' 2009 BBC news
[2]. Aston University's news report about the project
[3]. The critics:
a. Searle, John (1980), "Minds, Brains and Programs", Behavioral and Brain Sciences, 3(3): 417–
457, doi:10.1017/S0140525X00005756, retrieved May 13, 2009
b. Dreyfus, Hubert (1972), What Computers Can't Do, New York: MIT Press, ISBN 0-06-090613-8
c. Penrose, Roger (1989), The Emperor's New Mind: Concerning Computers, Minds, and The Laws of Physics, Oxford University
Press, ISBN 0-14-014534-6
[4]. Voss, Peter (2006), "Essentials of general intelligence", in Goertzel, Ben; Pennachin, Cassio, Artificial General Intelligence,
Springer, ISBN 3-540-23733-X, archived from the original on July 23, 2013
[5]. see Artificial Intelligence System, CAM brain machine and cat brain for examples
Paper Type | :: | Research Paper |
Title | :: | Screenless Display Technology |
Country | :: | India |
Authors | :: | kalyani V. Chikhale || rupali Chikhale |
Page No. | :: | 43-48 |
This paper discusses about the new computing technology i.e., Screenless display, that has become a good prospect in the near future for a wide range of applications. The main idea behind this technology is displaying the image without any physical screens like projector, LCD etc. This paper it is a survey paper that demonstrates about how the screen less display technology works and its applications in the various fields of science. Using this display technology, we can directly project any image on the human retina, free space and to the brain of human. It requires only light weight device and at the same time the privacy will be at the high state.
Keywords: Hologram, VRD, LCD, Screenless displays.
[1.] https://www.technologyreview.com/s/420266/the-future-of-interfaces-is-mobile-screen-less-and-invisible/
[2.] https://www.scribd.com/document/296700043/Final-Screenless-Display
[3.] https://www.scribd.com/doc/316412527/Report-Sem
[4.] https://www.slideshare.net/vikasraj225/screenless-display-report
[5.] https://www.scribd.com/document/355998334/V5I11-0311-1
[6.] https://www.seminarsonly.com/computer%20science/screenless-display-seminar-report-ppt-pdf.php
Paper Type | :: | Research Paper |
Title | :: | Roles Ofhoneypot |
Country | :: | India |
Authors | :: | Ruchika Pantawane || Prof Sandhya Dahake |
Page No. | :: | 49-53 |
These days, firewall innovation in the field of the system security has been utilized generally, The different methods for assaults, the weakness and constraints of firewall innovation are increasingly selfevident. The Research paper talks about the honeypot innovation in the field of the system security innovation. The existed lack of honeypot framework, the conveyed honeypot interruption framework dependent on interruption following was proposed. The framework utilizes circulated arrangement. It sends the system territory and utilizations the bundle stamping innovation to recognize wellsprings of genuine assaults. The existed system is secured better.
Keywords: Honeypot, Firewall, instruction tracking.
[1]. Y. Yun, Y. Hongli, M. Jia, "Design of distributed honeypot system based on intrusion tracking", 2011 IEEE 3rd International
Conference on Communication Software and Networks (ICCSN), pp. 196-198, 2011.
[2]. J.C. Chang, T. Vi-Lang, "Design of virtual Honeynet collaboration system in existing security research networks", 2010
International Symposium on Communications and Information Technologies (ISCIT), pp. 798-803, 2010.
[3]. L. Li, H. Sun, Z. Zhang, The Research and Design of Honeypot System Applied in the LAN Security in Beijing, pp. 360-363, 2011.
[4]. L. J. Zhang, "Honeypot-based defense system research and design", Computer Science and Information Technology 2009. ICCSIT
2009. 2nd IEEE International Conference on, pp. 466-470, 2009.
[5]. T. Holz, F. Raynal, "Detecting honeypots and other suspicious environments", Proceedings from the Sixth Annual IEEE SMC
Information Assurance Workshop 2005. IAW '05., pp. 29-36
Paper Type | :: | Research Paper |
Title | :: | Cognitive Computing Applications |
Country | :: | India |
Authors | :: | Ms. Nikita S. Lanjewar || Mr. Dhiraj Rane |
Page No. | :: | 54-59 |
The goal of Cognitive computing is to simulate human thought process in a computerized model. The result is cognitive computing – a combination of cognitive science and computer science. Cognitive computing models provide a realistic roadmap to achieve artificial intelligence. Cognitive computing represents selflearning systems that utilize machine learning models to mimic the way brain works." Eventually, this technology will facilitate the creation of automated IT models which are capable of solving problems without human assistance Cognition comes from the human brain.
Keywords: Cognitive science, Human brain, Artificial Intelligence
[1]. https://www.techopedia.com/definition/32482/cognitive-technology
[2]. https://www.techopedia.com/definition/32710/cognitive-science
[3]. https://dataconomy.com/2017/01/cognitive-computing-next-level/
Paper Type | :: | Research Paper |
Title | :: | A Study Of Student Monitoring System Through RFID |
Country | :: | India |
Authors | :: | Chetan Dilip Bhonde || Ms. Bhagyashree Ambulkar |
Page No. | :: | 60-63 |
The idea behind this paper is to track the student in school campus and record the place where the student visited. The proposed system requires the RFID tag which will be embedded in the identity card of students. System also requires RFID readers which will be installed at various places in school campus and also in classes. When student comes in the range of reader then location can be found which will sends that location to server. The RFID card Reader reads the Student identity. The Interface software is responsible to record the location of the student in the server. The system generates the reports of location of the students. It is application which is completely automated and parents can see the location of their child through application.
Keywords: Security, Smart Monitoring, Smart Reader
[1]. N. Amiyana and M. Alias, "Attendance and Access Control System Using RFID System", (2011).
[2]. C. E. Geoffrey, "Automatic Access Control System using Student's Identification Card based on RFID Technology", Unpublished
Thesis Faculty of Electrical Engineering, University of Teknologi Malaysia, (2012).
[3]. M. P. V. Mojares, G. A. T. Litan and J. G. Mojares, iNotified: An SMS and RFID-Based Notification System of Lipa City
Colleges", Journal of Applied Global Research, vol. 6, no. 18, (2013).
[4]. B. M. Stephen, E. S. Sanjay and R. W. John, "RFID Technology and Applications", Cambridge University Press, (2008).
[5]. https://www.rfidjournal.com/.
Paper Type | :: | Research Paper |
Title | :: | 3-D Face Image Identification from Video Streaming Using Map Reduce (Hadoop) |
Country | :: | India |
Authors | :: | Ms.Shamali Baware || Prof. Rashmi Dukhi |
Page No. | :: | 64-68 |
This paper focuses on the massive face identification system. I want to recognize a face from a lot of faces at public places. There are two of techniques are used to hit the goal: one is the 3Dface identification technique and the other is the Hadoop detection technique. Face identification technique find a similar face by 3D face features form mass face data. The Hadoop is a parallel processing structure; it can boost the computation ability. From imulation outcome, it is demonstrate that our algorithm is an efficient and accurate method for huge face identification.
Keywords: huge, Face identification, Hadoop, Features, Parallel Processing.
[1]. Advantages of hadoop"https://www.tutorialspoint.com/articles/advantages-of-hadoop-mapreduce-programming"
[2]. A Massive Face Recognition Algorithm Based on the Hadoop Technique Wei Li, Ming-Ming Li "http://ij3c.ncuteecs.org/volume/paperfile/4-4/IJ3C_5.pdf"
[3]. Face detection using Map Reduce "https://www.irjet.net/archives/V5/i3/IRJET-V5I3361.pdf "
[4]. M. E. Iber and M. L. Stone, "Low altitude wind shear detection using airport surveillance radars," IEEE Aerospace.Electron. Syst.
Mag., vol. 10, no. 6, 1995, pp. 3-9.
[5]. P. Avis, "Surveillance and Canadian maritime domestic Security," Canada. Military J., 2003, pp. 9- 15.
Paper Type | :: | Research Paper |
Title | :: | Study of Natural Language Processing and Its Factors |
Country | :: | India |
Authors | :: | Monica N.P Tiwari || Prof. Rupali Chikhale |
Page No. | :: | 69-74 |
The Natural language processing is a combination of computer science and artificial intelligence.
Basically it is related to artificial intelligence. It is concerned that interaction between the computers and
human languages. These include the spoken language systems that integrate speech and natural language.
Natural language processing has a role in computer science because many aspects of the field deal with
linguistic(related language) features of computation. Natural language processing is an area of an application
and research to explore how the computers can be used to manipulates and understands natural language text
or speech to do useful things.The paper has been distributed in four phases by discussing different levels of NLP
and components ofNatural Language Generation (NLG) the history NLP, state ofthe art presenting the various
applications of NLP and current trends andits factors.
Keywords: Natural Language Processing; Aspects of Syntactic Analysis; Component of NLP; Matrix
[1] https://www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_natural_language_processing.html.
[2] https://www.tutorialspoint.com/artificial_intelligence
[3] https://arxiv.org/pdf/1708.05148
Paper Type | :: | Research Paper |
Title | :: | Overview on Airborne Internet System |
Country | :: | India |
Authors | :: | Mrunali Makeshwar || Prof. Sandhya Dahake |
Page No. | :: | 75-83 |
NASA is undertaking the developmentof the Small Aircraft Transportation System (SATS).SATS could play a major role in decreasing the doorstop to destination times for travel and shipping. It is conceived to meet four major objectives: higher volume at non-towered/non-radar airports, lower landing minimums at minimally equipped landing facilities, increased single crew safety and mission reliability, and integrated procedures and systems for integrated fleet operations. SATS is to be prototyped in the 2005 timeframe.A key enabling technology for such a system is the development of an Airborne Internet to provide aircraft to the ground, ground to ground and aircraft to aircraft communications in support of air traffic management, fleet operations, and passenger support services............
Keywords: Small Aircraft Transportation System (SATS), Airborne Internet (AI)
[1]. Allen, David L., et al. The Economic Evaluation of CNS/ATM Transition, Boeing Commercial Airplane Group, September 2001.
[2]. BCI. Proposed FAA ATN Architecture White Paper, August 1999.
[3]. Eurocontrol. An Overview of ADS—Principles, Drivers, Activities, Technology and Standards, June 1999.
[4]. NEXCOM IPT AND-360. Next Generation Air/Ground Communications (NEXCOM) System Requirements Document (SRD),
September 2001.
[5]. Global Weather Dynamics, Inc. Air Traffic Services Message Handling System (AMHS) on the
ATN, http://www.gwdi.com/prodserv/ATS.html
Paper Type | :: | Research Paper |
Title | :: | An overview of Agile Software Development and Future Scope |
Country | :: | India |
Authors | :: | Manishakaikadi || Dhiraj Rane |
Page No. | :: | 84-92 |
Agile software development has rapidly gained a lot of interest in the field of software engineering. Agile software development, despite its novelty, is an important domain of research within software engineering discipline. Agile software development methods have caught the attention of software engineers and researchers worldwide. Scientific research is yet scarce, there has been little detailed reporting of the usage, penetration and success of agile methodologies in traditional, professional software development organizations. Report on the results of an empirical study conducted at Microsoft to learn about agile development and its perception by people in development, testing, and management. This paper reports results from a study, which aims to organize, analyses and make sense out of the dispersed field of agile software development methods.
Keywords: Agile, Scrum, Kanban, DSDM Atern, DAD, AUP.
[1]. https://www.agilealliance.org/agile101/
[2]. https://en.wikipedia.org/wiki/Agile_software_development
[3]. https://www.inflectra.com/ideas/whitepaper/introduction%20to%20agile%20development%20methods.aspx
[4]. http://www.inflectra.com/Agile-Software-Development.aspx
[5]. www.scrum.org
© 2019 All Rights Reserved | Design by iosrjen