International Conference on Innovative and Advanced Technologies in Engineering
(Volume-6)

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Review Paper on Optimization of Cotton Ginning And Pressing Plant
Country
::
India
Authors
::
Ramkrushna S. More || Dr. Ajay U.Awate
Page
::
01-04

The process of separation of fibre from cottonseed is called Ginning . Composite ginnery performs ginning and pressing operations to convert lint cotton into a bale. In modern day, various technology and pressing machinery are devolved This review paper discusses a present work for modern technology implemented in a modern gin, to configure an optimal set of equipment during ginning to produce quality cotton. Along with The future expectations of technological development in the Cotton Ginning & Pressing Technology.

 

Keywords: - Composite ginnery , and pressing machinery, gin

[1] W. Stanley Anthony Gino and J. Mangialardi Jr. Cotton Bale Presses at Gins, 1960-2004. National Cotton Ginners Association Memphis, TN [2] LeRoy Fitzwater, Richard Khalil and Ethan Hunter. 2008. Topology Optimization Risk Reduction. Presented at the American Helicopter Society 64th Annual Forum, Montreal, Canada, April 29-May 1. [3] Anthony, W.S. 1982. Effect of bale covering and density on moisture gain of cotton bales. The Cotton Ginners' Journal and Yearbook. 50:7-18. [4] Neville Sachas. 2009. Root cause failure analysis understanding Mechanical failure. Plant maintenance recourses centre home ,03 August. [5] Fones McCarthy, Demopolis, Marengo. 1840. Ginning for maximum grade without excessive short fibers, neps and trash. Cotton Gin and Oil Mill Press 87:14- 17

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Wildlife Animal Location Detection And Health Monitoring System
Country
::
india
Authors
::
Kushal Naik || Rohit Yadav || Omprakash Verma || Dhruv Zanzrkiya || Professor Meenakshi Saraon
Page
::
05-08

As we know, animals form a big part of the ecosystem. Their existence is very important for the balance of the ecosystem. But nowadays, more and more animals are getting endangered and are on the verge of extinction. So, to save these animals from extinction, humans reserved forest areas (Sanctuaries and national parks) for their safety. However, some animals died due to bad health which couldn't get any attention to. To avoid such casualties, animal location tracking system with a health monitoring system is used. This system uses a pulse radar to keep the track of animal's health and the usage of Global Positioning System, we get the exact location of the animal. So, no time is wasted for the animal to be attended to.


Keywords: - Wildlife animals, GPS module, Wi-Fi module, Pulse sensor, Temperature sensor, PIC microcontroller.

[1] Raj Kamal, "Microcontrollers: Architecture, Programming, Interfacing and System Design", Fourth Edition, Pearson Education. [2] R.Ramani, S.Valarmathy, Dr. N.SuthanthiraVanitha, S.Selvaraju2, M.Thiruppathi, R.Thangam, "Vehicle tracking and locking system based on GSM and GPS", I. J. Intelligent Systems and Applications, 2013, 09, pp. 8693. [3] Theodare S. Rappaport, "Wireless communications: Principles and Practice", Second Edition, Pearson Education, pp. 549-563. [4] Jochen Schiller, "Mobile Communication", 2/E, Second Edition, Person Education, pp. 93-129. [5] Ahmed El-Rabany, "Introduction to GPS: The Global Poisoning System", Second Edition, Person Education, pp. 1 to 10. [6] Muhammad Ali Mazidi, Rolin D. McKinday and Danny Causey, "PIC microcontroller and Embedded System Using Assembly and C for PIC18", Second Edition, Pearson Education..

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Overview And Applications of Artificial Neural Networks
Country
::
India
Authors
::
Jyoti Jeetendra Gurav || Shilpa Jaiswal || Ritu Sharma || Kunal Shriwas || Divya Sharma
Page
::
09-13

ARTIFICIAL NEURAL NETWORK INTRODUCTION The simplest definition of a neural network, more properly referred to as an 'artificial' neural network (ANN), is provided by the inventor of one of the first neurocomputers, Dr. Robert Hecht-Nielsen. He defines a neural network as: "...a computing system made up of a number of simple, highly interconnected processing elements, which process information by their dynamic state response to external inputs. ANNs are processing devices (algorithms or actual hardware) that are loosely modeled after the neuronal structure of the mammalian cerebral cortex but on much smaller scales. A large ANN might have hundreds or thousands of processor units, whereas a mammalian brain has billions of neurons with a corresponding increase in magnitude of their overall interaction and emergent behavior. Although ANN researchers are generally not concerned with whether their networks accurately resemble biological systems, some have. For example, researchers have accurately simulated the function of the retina and modeled the eye rather well. Although the mathematics...........

 

Keywords: - Statistical modeling, neural network, back propagation, artificial intelligence

[1] Ali Shah, S.A., ul Asar, A., Shaukat, S.F.: Neural Network Solution for Secure Interactive Voice Response. World Applied Sciences Journal 6(9), 1264–1269 (2009) [2] Nazeer, S.A., Omar, N., Jumari, K.F., Khalid, M.: Face detecting using Artificial Neural Networks Approach. In: First Asia International Conference on Modelling & Simulation (2007) [3] He, L., Hou, W., Zhen, X., Peng, C.: Recognition of ECG Patterns Using Artificial Neural Network. In: Sixth International Conference on Intelligent Systems Design and Applications, vol. 02 (2006) [4] D. R. Hush, B. G. Horne, "Progress in Supervised Neural Networks What's New Since Lipmann", IEEE Signal Processing Magazine, pp. 8-39, 1993. [5] M. T. Musavi, "On the Training of Radial Base Function Classifiers", Neural Networks, vol. 5, pp. 595-603, 1992.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Mapping Hindi Text Document Into Graph Structure
Country
::
India
Authors
::
Yogita Shelar || Pragyamani Sharma || Vaishali Salvi || Jyothi Arun
Page
::
14-21

In this paper, we present a Mapping Hindi text document into graph structure and external program for pre- processed frequently, proper or further. It is derived using natural language processing as follows. Firstly subject – verb – object triplets are automatically extracted from the Hindi dictionary obtained for each sentence in the document. Secondly, extracting the triplets and enhanced by linking them to their corresponding co-referenced named entity, by resolving pronominal anaphors as well as attaching the associated Word Net synset.

 

Keywords -Pre-processed, frequently, atomically, pronominal, anaphors.

[1] Dr.Latesh Malik,"Test Model for Summarizing Hindi Text using Extraction Method",( Proceedings of 2013 IEEE Conference on Information and Communication Technologies) (ICT 2013). [2] Ibrahim F. Moawad, Information Systems Dept.Faculty of Computer and Information Sciences "Semantic Graph Reduction b Approach for Abstractive Text Summarization",(Ain shams University Cairo, Egypt ibrahim_moawad@cis.asu.edu.eg 2012 IEEE). [3] Sachin AGARWAL Manaj SRIVASTAVA, "Anaphora Resolution in Hindi Documents",(Indian Institute of Information Technology – Allahabad Allahabad, UP, India2007IEEE) [4] Do Phuc, University of Information Technology,"Using SOM based Graph Clustering for Extracting Main Ideas from Documents",(VNU-HCM HoChiMinh City,VietNam phucdo@uit.edu.vn 2008 IEEE). [5] Vishal Gupta and Gurpreet Singh Lehal," Automatic Punjabi Text Extractive Summarization system." Proceedings of COLING 2012: Demonstration Papers, pages 199–206, COLING 2012, Mumbai, December 2012.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Ransomware:Past, Present, And Future.
Country
::
India
Authors
::
Shilpa Jaiswal Ritu Sharma || Kunal Shriwas || Jyoti || Gurav
Page
::
22-26

On 12 May 2017, a massive ransomware attack occurred across a wide range of sectors, including health care, government, telecommunications and gas. To date, WannaCry has spread to over 300,000 systems in over 150 countries. The countries that appear to be the most affected are Russia and China, probably because of the high percentage of legacy software, with significant impacts elsewhere, notably to the UK National Health Service. The spread of the ransomware reportedly slowed in the two days following the launch of the attack, in part due to the discovery of a "kill switch" in its code. However, there are reports of new variants of the malware (such as Uiwix) which do not have this kill switch. Data on new variants is unconfirmed and limited at the moment,and EY wil publish updates as more information becomes available.

 

Keywords - kill switch, ransomware and legacy software..

[1] en.wikipedia.org/wiki/Cryptolocker [2] http://www.darkreading.com/attacks-breaches/new-zeus-banking-trojantargets-64-bit-s/240164713 [3] http://blog.fortinet.com/Ransomware/ [4] http://www.symantec.com/connect/blogs/grappling- zeroaccess-botnet [5] http://threatpost.com/zeus-source-code- leaked-051011.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Deploy Hadoop For Processing Text Data To Run Map Reduce Application On A Single Site
Country
::
India
Authors
::
Shrusti Talati || Dr. Mamta Meena || Shrutika Mallya
Page
::
27-33

The arrival of many ubiquitous devices, social networking and other sources of data has created a large amount of data with greater velocity and variety. Multiple organizations are applying big data analytics to challenges such as detection of fraud, analysis of risk, analysis of sentiments, analysis of equities, forecasting of weather, recommendations of various products and their classifications. So the big data is a collection of large datasets that cannot be processed using traditional computing techniques. Hadoop is a Java based open source platform that can process this data over thousands of distributed affordable commodity nodes and deliver predictive insights. It is designed to scale up from single servers to thousands of machines, each offering local computation and storage. In this paper we have installed and configured Hadoop on Windows platform. We have run an application in three wordcount languages , which are MapReduce


Key words: - Hadoop, MapReduce, Big Data Analytics

[1] https://www.safaribooksonline.com/library/view/hadoopessentials/9781784396688/ch02s05.html [2] https://hadoop.apache.org/docs/r1.2.1/hdfs_de ign.html [3] https://hadoop.apache.org/docs/r1.2.1/hdfs_design.html [4] Tom White, Hadoop The Definitive guide, O'Reilly,Yahoo Press [5] http://www.ibm.com/developerworks/cloud/library/clopenstack-deployhadoop/

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Review on Internet of Things
Country
::
India
Authors
::
Ashmita Shetty || Varsha Salunkhe || Komal Gothwal || Dimple Bafna
Page
::
34-39

Internet, a progressive creation, is continually changing into some new sort of equipment and software making it unavoidable for anybody. The type of correspondence that we see now is either human-human or human-gadget, however the Internet of Things (IoT) guarantees an awesome future for the internet where the kind of communication is machine-machine (M2M).Internet of Things (IoT), which will make a tremendous system of billions or trillions of "Things" imparting with each other, are confronting numerous security issues..

 

Keywords - Internet of Things (IOT), Privacy, Security

[1] J. S. Kumar and D. R. Patel, "A survey on internet of things: Security and privacy issues," International Journal of Computer Applications, vol. 90, no. 11, 2014. [2] M. Abomhara and G. M. Køien, "Security and privacy in the internet of things: Current status and open issues," in Privacy and Security in Mobile Systems (PRISMS), International Conference on. IEEE, 2014, pp. 1–8. [3] L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct 2010. [4] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of iot: Applications, challenges, and opportunities with china perspective," IEEE Internet of Things journal, vol. 1, no. 4, pp. 349–359, 2014. [5] M. Abdur Razzaq, R. A. Sheikh, A. Baig, and A. Ahmad, "Digital image security: Fusion of encryption, steganography and watermarking," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 5, 2017.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Review on Resource Allocation Strategies In Cloud Computing
Country
::
India
Authors
::
Varsha Salunkhe || Komal Gothwal || Ashmita Shetty || Dimple Bafna
Page
::
40-42

Cloud Computing has a great impact on IT industries. Central storage is being the need of current generation and this can be achieved using cloud computing. Cloud uses huge number of resources to provide its services. Managing the resources effectively has become a new challenge in today's world. The workload in cloud computing changes as per the demand and thereby needs dynamic resource provisioning and allocation. In cloud computing, resources are allocated effectively with high resource utilization and low cost. This work presents a comprehensive In this paper, we have discussed various optimal resource allocation schemes reviewing the resource allocation strategies.


Keywords – Cloud Computing, Cloud Services, Resource Allocation

[1] Rajkumar Buyya et.al.,2009, Cloud Computing and Emerging IT Platforms Vision, Hype, and Reality for Delivering IT Services as the Utility, Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616. [2] C. N. Hofer,G. Karagiannis.,2011, Cloud Computing Services:Taxonomy and Comparison, Journal of Internet Services and Applications, vol. 2, Issue 2, pp. 81-94. [3] S.ThamaraiSelvi, C. Valliyammai and V. Neelaya Dhatchayani,Resource allocation issues and challenges in cloud computing,, International Conference on Recent Trends in Information Technology, 2014 IEEE [4] Abirami S.P. and Shalini Ramanathan, Linear Scheduling Strategy for Resource Allocation in Cloud Environment, International Journal on Cloud Computing: Services and Architecture, February 2012. [5] P.Ruth,J.Rhee, D.Xu, R.Kennell and S.Goasguen, Autonomic Adaptation of virtual computational environments in a multi-domain infrastructure, IEEE International conference on Autonomic Computing, 2006,pp.5-14.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Blended Learning By Incorporating LMS, E- Learning & Traditional Learning To Suit The Changing Requirement Of Learner
Country
::
India
Authors
::
Mahendra Patil || Amruta Mhatre || Divya Kumawat || Ajeet Ghodeswar
Page
::
43-47

This paper discusses one of the best practices for e-learning in Atharva College of Engineering (ACE) with blended learning. The paper discusses the blended learning and its advantages as well as disadvantages. The main focus of this paper is to show how Course Networking was introduced as a blended learning tool in the Academics and how it improved the teaching learning process as well as the outcomes. The paper outlines the strategy and the framework designed by the Department of Computer Engineering and how it made the difference. The paper highlights the positives as well as area of improvement of the Course Networking as a blended learning tool.

 

Keywords - e-learning, course networking, blended learning, education practices.

[1] Chirag Patel, Mahesh Gadhavi, Dr. Atul Patel,A survey paper on e-learning based learning management Systems (LMS) ,International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 171 ISSN 2229-5518 . [2] Ahmad Tasnim Siddiqui and MehediMasud, An e-learning system for quality education by Ahmad, International Journal of Computer Science Issues, Vol. 9, Issue 4, No 1, July 2012. [3] Ellis, Ryann K, Field Guide to Learning Management Systems, ASTD Learning Circuits, (2009) [4] Rosalina Babo, and Ana Azevedo, "Higher Education Institutions and Learning Management Systems: Adoption and Standardization", Portugal, 2011, [5] UgurDemiray, Cases on Challenges facing e-Learning and National development: Institutional Studies and Practices, Vol II, Anadolu University, Turkey, p603.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Concise View At The Super-Dense Plasma State
Country
::
India
Authors
::
Abhilasha Saini || Dr. Sudhir Bhardwaj || Dr.O.S.Lamba || Dr.P.N.Nemade
Page
::
48-51

The vital intent of the physics behind the relativistic bulky-ion encounters is to unlock the inherent attributes of the completely novel phase of vigorously interacting nuclear stuff, commonly denominated as the quark-gluon plasma [1]. For the purpose of attaining this goal, one entails the authentic signals for the creation of such a phase or stage. This probe attempts to detain indispensable proposals also the ongoing stature of the abstract studies made for the most encouraging quark-gluon plasma indicators. These propounded quark-gluon plasma signatures can be studied in conformity with the physical traits of super-dense hadronic stuff to which they are sentient of. Here a perfunctory review of the contemporary depiction of the dynamical and constructional features of QGP phase, its erection and evolution is proffered. This certainly assists one for better assimilation about the very novel quark gluon state..

 

Keywords - Bulky ion collision , Quark-Gluon Plasma ,Hadronic stuff.

[1] For an introduction to lhis field. see e.g., MiIller B 1985 The Physics nf the Quark-Glunn Plnsma (Lecture McLenan L 1986 Rev. Mod. Phy. 58 1021; 1991 Quark-Glunn Plasma ed R C Hwa (Singapore: World scientific) [2] Stachel J and Young G R 1992 Ann. Ret,. Nucl Pan. Sci. 42 537 [3] Shuryak E 1992 Phys. Rev. Lett. 68 3270 [4] Geiger K 1992 Phys, Re\*. D 46 4965,4986; Phys. Rep [5] Bid T S, van Doom E, Miiller B, Thoma M H and X N Wang I993 Phys. Rev. C 48 1275

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Plagiarism Detection And Visual Inspection Of Data
Country
::
India
Authors
::
Pranoti Nage || Priyanka Sharma || Vaishali Salvi || Reena Somani || Sejal D'mello
Page
::
52-57

Digital documents are vulnerable to being copied. Most existing copy detection prototypes employ an exhaustive sentence-based comparison method in comparing a potential plagiarized document against a repository of legal or original documents to identify plagiarism activities. This approach is not scalable due to the potentially large number of original documents and the large number of sentences in each document. Furthermore, the security level of existing mechanisms is quite weak; a plagiarized document could simply by-pass the detection mechanisms by performing a minor modification on each sentence. In this paper, we propose a copy detection mechanism that will eliminate unnecessary comparisons. The system will parse the data to compare against the data obtained from web to detect plagiarism using Hadoop in the backend to increase the efficiency of the system..

 

Keywords - Plagiarism,Hadoop, High charts,Tokens,Comparator

[1] http://techterms.com/definition/apache [2] https://en.wikipedia.org/wiki [3] "An AST-Based Code Plagiarism Detection Algorithm", Jingling Zhao1,2, Kunfeng Xia 1,2, Yilun Fu 3, Baojiang Cui1, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications [4] https://www.digitalgyd.com/top-20-best-online-plagiarism-checker-tools-free/ [5] http://www.plagscan.com/technology.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Recognition And Recall Based Graphical Password Authentication
Country
::
India
Authors
::
Mr. Santosh M.Dodamani || Ms. Aarti B.Valsang
Page
::
58-60

Security is that the degree of protection to persons or person against danger, damage, loss, and crime. The need for security often means that standard human-computer-interaction approaches cannot directly apply. Nowadays, as day today activities are more open to the internet, the importance of security for applications is tremendously increased. Using static passwords alone makes it easy for the hackers to hack the users account. An important usability goal for authentication system is to support users in selecting better password. User often creates memorable passwords that are easy for attackers to guess, but strong system assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods. Here a graphical password is discussed

 

Keywords -Cybercrime, Graphical, Face Recognition, Biometric.

[1] M.Manjunath, Mr. K. Ishthaq Ahamed and Ms. Suchithra, Security Implementation of 3-Level Security System Using Image Based Authentication, International Journal of Emerging trends and technology,2(2),2013,401-404. [2] Aakansha Gokhale, Vijaya Waghmare,The Recognition and Recall Approach based Graphical Password Technique, International Journal of Computer Applications,22-27 [3] Vamsi Krishna Vemuri, S D Vara Prasad, A Secure Authentication System by Using Three Level security, International Journal of Engineering Science and Computing,2014,344-348 [4] Swarna Lakshmi M, Roobini S, Shalie Monicka A, Saraswathi V, Ms. N. Radha, International Journal of Advance Research in Science and Engineering, 6(3),2017,79-87 [5] Nagesh.D Kamble, J.Dharani, Implementation of Security System Using 3-Level Authentication, International Journal Of Engineering Development And Research,2(2),2014,1528-1532

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Smart Anti-Theft System For Vehicle Security And Tracking
Country
::
India
Authors
::
Raj Kupekar || Prasad Lawte || Prasad Nate || Gaurav Narvekar || Mahalaxmi Palinje
Page
::
61-65

Nowadays most of the public are having their own vehicles also on the other hand there is a need to provide security for vehicles from any external threats. Smart anti-theft system for vehicle security and tracking is used to provide the fundamental security to vehicles. This system is accompanied with a keypad part, placed on the door outside the car to authenticate the valid user. Global Positioning System (GPS) and Global System for Mobile communication (GSM) provides the current location of the vehicle. The system is also designed to recognize any unusual vibrations in case if the car undergoes an accident and sends the respective signal to the owner through GSM. This is achieved by using MEMS accelerometer.

 

Keywords - Atmega 328, GPS, GSM, Keypad, MEMS accelerometer, Vehicle tracking and locking

[1] S.Valarmathy, R.Ramani, S.Selvaraju, G.Suresh Kumar, "Advanced Vehicle System Based on Embedded Technology'' International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 9, September 2015. [2] S.Boopathi, K.Govindaraju, M.Sangeetha, M.Jagadeeshraja, M.Dhanasu, "REAL TIME BASED SMART [3] VEHICLE MONITORING AND ALERT USING GSM "International Journal of Advanced Research in [4] Computer and Communication Engineering Vol. 3, Issue 11, November 2014. [5] Vikram Kulkarni &ViswaprakashBabu, "Embedded Smart Car Security System on Face Detection" special issue of IJCCT, ISSN(Online):2231-0371, ISSN(Print):09757449,volume-3, issue-1.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Movie Success Prediction
Country
::
India
Authors
::
Komal Gothwal || Dhiral Sankhe || Nirav Waghela || Mitul Sharma || Ramanand Yadav
Page
::
66-79

In this system we have developed a mathematical model for predicting the success class such as flop, hit, neutral of the movies. For doing this we have to develop a methodology in which the historical data of each component such as actor, actress, director, music that influences the success or failure of a movie is given is due to weight age and then based on multiple thresholds calculated on the basis of descriptive statistics of dataset of each component it is given class flop, hit, neutral label. Based on the weight age of historical data of each film crew the movie will be labelled as neutral, hit or flop. This system helps to find out whether the movie is super hit, hit, flop on the basis of historical data of actor, actress, music director, writer, director, marketing budget and release date of the new movie. If the movie releases on weekend, new movie will get higher weight age or if the movie releases on week days new movie will get low weight age. The factors such as actor, actress, director, writer, music director and marketing budget historical data of each component are calculated and movie success is predicted. This application helps to find out the review of the new movie...

 

Keywords - Data Mining, SVM, k-NN, Machine Learning, Movies

[1] Krushikanth R. Apala, Merin Jose, Supreme Motnam: "Prediction of Movies Box Office Performance UsingSocial Media", 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining [2] Muhammad Hassan Latif, Hammad Afzal: "Prediction of Movies popularity Using Machine Learning Techniques", IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8, August 2016 [3] Nithin VR, Pranav M, SarathBabu PB, Lijiya "A Predicting movie success based on IMDB data" International journal of data mining and techniques , Volume 03, june 2014, pages 365-368 [4] Darin Im and Minh Thao Nguyen : "PREDICTING BOX-OFFICE SUCCESS OF MOVIES IN THE U.S. MARKET ", CS 229, Fall 2011 [5] Andrei Oghina, Mathias Breuss, Manos Tsagkias, and Maarten de Rijke , "Predicting IMDB Movie Ratings Using Social Media", Advances in Information Retrieval , Volume 7224, 2012, pp 503-507 [6] Ramesh Sharda , DursunDelen :"Predicting box-office success of motion pictures with neural networks", Expert Systems with Applications 30 (2006) 243–254

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Content-Based Real Time Video Copy Detection Using Hadoop
Country
::
India
Authors
::
Pramodini Kamble || Priyanka Shejawal || Tejaswi Surve || Kushal Yadav || Prof. Bhushan Patil
Page
::
70-74

Due to emerging interest in videos along with the evolution of new technology and facilities, today the amount of videos on the internet is increasing enormously. But these videos do not hold original content and are simply revised versions of the original videos. The purpose of the Video Content Copy Detection is to detect the copied videos and find the similarities among them. The currently available video copy detection algorithms have certain limitations, such as it requires more time for searching and gives inaccurate output. TIRI-DCT algorithm along with Brightness Sequence algorithm is implemented to overcome the problems in the existing system. For the significant improvement in the processing of videos we use Hadoop platform in distributed file system and for vital practical significance in video tracking and real time video content retrieval.

 

Keywords - Hadoop, brightness sequence, cluster – based similarity search, inverted file-based similarity search and TIRI - DCT

[1] Jing Li, Xuquan Lian, Qiang Wu and Jiande Sun "Real time Video Copy Detection Based on Hadoop," Sixth International Conference on Information Science and Technology Dalian, China; May 6-8, 2016. [2] Abrum Jeysudha, Samit Shivadekar, "Real Time Video Copy Detection using Hadoop", International Journal of Computer Application 2017 [3] Ms. Laxmi Gupta, Prof. M.B Limkar, "Search Methods for Fast Matching of Video Fingerprints within a Large Database", by SSRG International Journal of Electronics and Communication Engineering (SSRG IJECE) – volume1 issue 3 May 2014. [4] Vaishali V. Sarbhukan, Prof. V.B.Gaikwad ,"Video Fingerprinting Extraction Using TIRI-DCT" , International Journal of Engineering Research and Development 2013 [5] Hanlin Tan, Lidong Chen," An Approach For Fast And Parallel Video Processing On Apache Hadoop Clusters" IEEE International Conference on Multimedia and Expo 2014.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Cloud Computing: A Perspective Study
Country
::
India
Authors
::
Sufiyan Kazi || Vipul Padgal
Page
::
75-80

Cloud computing can be defined as reliable services that are delivered through data centers which are built on compute and storage technologies. Consumers are able to use applications and data from a cloud anywhere in the world on demand. Services like Google Docs are cloud Computing , where your document exist on the company's servers and you can reach these documents easily and work on them without using your own hard drive. A cloud is a type of parallel and distributed system consisting of interconnected and virtualized computers. Cloud computing uses 'Hadoop' software that implements a cloud on a cluster of computers. Google Apps, Google Maps and Gmail are all based on the cloud .Other major web players including Amazon, eBay, yahoo and Facebook are running some sort of an enormous cloud computing. Computing at the scale of the cloud allows the users to access supercomputers-level power and storage. The concept behind cloud computing is to scale your application by deploying it on a large grid of commodity Hardware boxes. Thus, cloud computing and storage compiles physical resources into scalable and shareable resources over the internet.

 

Keywords - Cloud Computing, Distributed System, Hadoop, supercomputers, Virtualization

[1] Cloud security: A comprehensive guide to secure cloud computing RL Krutz, RD Vines - 2010 - dl.acm.org [2] Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. [3] R Buyya, CS Yeo, S Venugopal, J Broberg… - Future Generation …, 2009 – Elsevier A view of cloud computing. [4] M Armbrust, A Fox, R Griffith, AD Joseph… - Communications of the …, 2010 - dl.acm.org. The Economist. 2009-10-15. Retrieved 2009-11-03.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Accelerating The Degradation Kinetics of Azo Dyes Using Iron Oxide Nanoparticles
Country
::
India
Authors
::
Priyanka Patel || Sudheer Lingayat || Nitin Gulvi || Purav Badani
Page
::
81-88

Azo dyes have a wide spread industrial applications. When released in water bodies, these dyes hinder the penetration of light which results in adverse effects on aquatic life. Hence it is pertinent to treat the dyes before their discharge in environment. Present work focuses on degradation of azo dyes (via chemical route) using NaBH4 as a reducing agent. For this purpose, Fast Sulphone Black F (FSB-F) dye was used as a model system. FSB-F has an absorption maxima (λmax) at 464 nm in aqueous medium. On reduction, FSB-F is converted into its corresponding leuco-form which has poor absorption in visible region. Time required for complete degradation of FSB-F was observed to be ~ 7 hrs. With a view to enhance reaction kinetics, system was loaded with iron oxide nanoparticles, keeping all other experimental conditions identical. In presence of iron oxide nanoparticles, complete degradation of dye was accomplished within 1 hr. Thus, our study suggests that nanoparticles plays a potent role as catalyst for reaction involving dye degradation

 

Keywords - Azo dyes, Fast Sulphone Black-F, Iron oxide nanoparticles, NaBH4, Reduction Kinetics

[1] T.H. Wallace, Biological treatment of synthetic dye water and an industrial textile wastewater containing azo dye com-pound., MSc Thesis, Virginia Polytechnic Institute and State University, Blacksburg, VA, 2001. [2] F.M.D. Chequer, D.J. Dorta and D.P. De Oliveira, Azo dyes and their metabolites: Does the discharge of the azo dye into water bodies represent human and ecological risks? In P. Hauser (Ed.), Advances in Treating Textile Effluent, (London: InTech, 2011) 27-48. [3] K.T. Chung, K.T. Cerniglia, Mutagenicity of azo dyes: structure–activity relationships, Mutat. Res., vol. 277, 1992, 201–220. [4] H. Kusic, N. Koprivanac, L. Srsan, Azo dye degradation using fenton type processes assisted by UV irradiation: a kinetic study, J. Photochem. Photobiol. A, 181, 2006, 195–202. [5] N. Azbar, T. Yonar and K. Kestioglu, Comparison of various advanced oxidation processes and chemical treatment methods for COD and color removal from a polyester and acetate fiber dyeing effluent, Chemosphere, 55, 2004, 35-43.
  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Secure Transfer of University Question Paper Using Image Steganography
Country
::
India
Authors
::
Sanjeev Bhogan || Sai Kumawat || Ajay Chawla || Aditya Chaudhary || Prof. Snigdha Bangal
Page
::
89-92

This paper discusses on how the security of question paper delivery can be enhanced by image steganography. There are a lot of cases of university question paper leakage. Due to this, university has undergone various problems in order to tackle this event. The current system that the university uses for question paper transfer is based on face detection which is not very reliable and can be exploited. Moreover, this transfer process is not very secured and is a complex process, so we have developed our system to enhance the security of the transfer process.

[1] A Combined Approach of Steganography with LSB Encoding technique and DES Algorithm, Prof. B.Karthikeyan, Prof. A.Deepak, IEEE 2017 [2] Research of Image Encryption Algorithm Based on S-DES, Linxain Zhi, IEEE 2016 [3] Lossless compression of high resolution disparity map images, Prof. Pekka Astola, Prof Ioan Tabus, IEEE 2017 [4] Effect of saturated pixels on security steganographic schemes for digital images, Prof. Vahid Sedighi and Prof. Jessica Fridrich, IEEE 2017 [5] An Approach Towards Image, Audio and Video Steganography, Prof. Kunal Hossain, Prof.Ranjan Parekh IEEE 2016