Paper Type | :: | Research Paper |
Title | :: | Big Data Security and Privacy Issues in the Cloud |
Country | :: | India |
Authors | :: | Vinod Kundlik Gajbhiy || Rajesh Babu |
Page No. | :: | 01-12 |
Keyword :Cloud Security, Privacy, Trust, Big Data, Virtualization, Data Protection
[1]. A. Szalay and J. Gray, "2020 Computing: Science in an exponential world," Nature, vol. 440, pp. 413–414, Mar.2006.
[2]. E. U. Directive, "95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with
Regard to the Processing of Personal Data and on the Free Movement of such Data," Official Journal of the EC, vol. 23,1995.
[3]. U. States., "Health insurance portability and accountability act of 1996 [micro form]: conference report (to accompany h.r. 3103)." http://nla.gov.au/nla.catvn4117366,1996.
[4]. "Hypervisors, virtualization, and the cloud: Learn about hypervisors, system virtualization, and how it works in a cloud
environment." Retrieved June 2015.
[5]. M. Portnoy, Virtualization Essentials. 1st ed., 2012.Alameda, CA, USA: SYBEXInc
Paper Type | :: | Research Paper |
Title | :: | Cloud Computing: Study of Security Issues and Research Challenges |
Country | :: | India |
Authors | :: | Prof. Anand D.G. Donald || Ashwini K. Lode || Anusha A. Adur || Vaishnavi R. Ghubde || Tejaswini B. Waghmare |
Page No. | :: | 13-18 |
- Cloud computing is the practice of using a network of remote servers hosted on internet to store,
manage and process data on demand and pay as per use. It provides access to a pool of shared resources
instead of local servers or personal computers. As it do not acquire the things physically, it saves managing cost
and time for organizations. Cloud computing is a completely internet dependent technology where client data is
stored and maintain in the data center of a cloud provider like Google, Amazon, Microsoft etc. Cloud computing
is an emerging domain and is acclaimed throughout the world. There are some security issues creeping in while
using services over the cloud. This research paper presents a review on the cloud computing concepts as well as
security issues inherent within the context...........
Paper Type | :: | Research Paper |
Title | :: | Convolutional Neural Network for Facial Expression Recognition |
Country | :: | India |
Authors | :: | Vaishali Ingale || Rajesh Kumar || Neeraj Singh |
Page No. | :: | 19-20 |
In this project, we developed Convolutional Neural Networks (CNN) for a facial expression recognition task. Our goal is to classify each facial image into one of the seven facial emotion categories. Different depth structures of CNN models are trained using grayscale images from the Kaggle facial expression challenge [1]. To reduce overfitting, we utilized different techniques including dropout and L2 regularization (loss function).
[1]. https://www.kaggle.com/c/challenges-inrepresentation-learning-facial-expressionrecognition-challenge/data
[2]. Dalal, Navneet, and Bill Triggs (2005). Histograms of oriented gradients for human detection. Computer Vision and Pattern
Recognition (CVPR), IEEE Computer Society Conference on.
[3]. Bettadapura, Vinay (2012). Face expression recognition and analysis: the state of the art. arXiv preprint arXiv:1203.6722
[4]. Y. Tian, T. Kanade, and J. Cohn. Recognizing action units for facial expression analysis. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 23(2), 2001.
[5]. Anbang Yao, Junchao Shao, Ningning Ma, and Yurong Chen. Capturing au-aware facial features and their latent relations for
emotion recognition in the wild. In Proceedings of the 2015 ACM on International Conference on Multimodal Interaction, pages
451–458. ACM, 2015.
Paper Type | :: | Research Paper |
Title | :: | Data Mining Techniques for Social Media Analysis: A Review |
Country | :: | India |
Authors | :: | Charanjeet Dadiyala || Neha Mogre || Priyanka Mogre || S. Kiran Kumar |
Page No. | :: | 21-26 |
Social Media has now become one of the most important applications that almost everyone uses and manages on a daily basis, results in generation of tremendous amount of personal data. There are many popular websites like Twitter, Facebook, Instagram, Quora, etc., daily stores and records our personal data in terms of millions of chats, likes, comments, answers etc. This tremendous amount of personal data can also be referred as Big Data, contains almost everything from making a purchase, booking a movie ticket, viewing online products or planning an international trip. This phenomenon gave birth to the idea of Social Media Online Data Tracking. This tracking can help companies to learn and know better about their consumers about their choices............
Keywords:Big Data, Social Media, Data Mining, Big Data Analysis, Social Media Analysis
[1]. Kumar, Vikas & Nanda, Pooja. (2019). Social Media to Social Media Analytics: Ethical Challenges. International Journal of
Technoethics. 10. 57-70. 10.4018/IJT.2019070104.
[2]. Sebei, Hiba & Hadj Taieb, Mohamed Ali & Ben Aouicha, Mohamed. (2018). Review of social media analytics process and Big
Data pipeline. Social Network Analysis and Mining. 8. 10.1007/s13278-018-0507-0.
[3]. Stieglitz, Stefan & Mirbabaie, Milad & Ross, Björn & Neuberger, Christoph. (2018). Social media analytics – Challenges in topic
discovery, data collection, and data preparation. International Journal of Information Management. 39. 156-168.
10.1016/j.ijinfomgt.2017.12.002.
[4]. Peng, Sancheng & Yu, Shui & Mueller, Peter. (2018). Social networking big data: Opportunities, solutions, and challenges. Future
Generation Computer Systems. 86. 1456-1458. 10.1016/j.future.2018.05.040.
[5]. Aydin, Nursen. (2018). Social Network Analysis: Literature Review. 34. 10.5824/1309-1581.2018.4.005.x.
Paper Type | :: | Research Paper |
Title | :: | A Review on Various Techniques for Duplication Detection in News Articles |
Country | :: | India |
Authors | :: | Komal Badge || Jayant Adhikari |
Page No. | :: | 27-30 |
Identifying near duplicate documents is a challenge often faced in the field of information discovery. Unfortunately many algorithms that find near duplicate pairs of plain text documents perform poorly when used on web pages, where metadata and other extraneous information make that process much more difficult. If the content of the page (e.g., the body of a news article) can be extracted from the page, then the accuracy of the duplicate detection algorithms is greatly increased. Using machine learning techniques to identify the content portion of web pages, we achieve accuracy that is nearly identical to plain text and significantly better than simple heuristic approaches to content extraction. We performed these experiments on a small, but fully annotated corpus. Existing studies on news articles duplication detection mainly focus on newspaper articles, and we further explore the duplication detection in news articles from the newest online We Media data.
Keywords: Duplication Detection; News Article; PlagiarismDetection, Big Data
[1]. Lu Lu, Pengcheng, Wang Duplication Detection in News Articles Based on Big Data, 2019 IEEE 4th International Conference on
Cloud Computing and Big Data Analytics
[2]. S. Niwattanakul, J. Singthongchai, E. Naenudorn, and S. Wanapu, "Using of Jaccard coefficient for keywords similarity," Proc.
IMECS, 2017, pp. 380–384
[3]. J. Agarwal et al., "Intelligent plagiarism detection mechanism using semantic technology: A different approach," 2017 International
Conference on Advances in Computing, Communications and Informatics (ICACCI), Mysore, 2013, pp. 779-783.
[4]. doi: 10.1109/ICACCI.2013.6637273.
[5]. H. Zhang and T. W. S. Chow, "A coarse-to-fine framework to efficiently thwart plagiarism," Pattern Recog., vol. 44, pp. 471–487,
2015.
Paper Type | :: | Research Paper |
Title | :: | Geographic and Opportunistic Routing for Underwater Wireless Sensor Network |
Country | :: | India |
Authors | :: | Sampada Kumbhalkar || Roshani Talmale |
Page No. | :: | 31-38 |
Underwater Wireless Sensor Network (UWSN) as it is emerging to be a promising mechanism for discovering the underwater environment efficiently. Geographic routing is considered the promising routing protocol for UWSNs. Geographic routing relies on geographic position information, hence the data packets are sent using its geographic location of the destination instead of the destination network address. Geographic routing protocol suffers from a drawback called communication void region. The basic idea of DBR is to forward data packets greedily towards the water surface. To maintain explicit paths to route data along communication void regions. These approaches cause an overload in the underwater acoustic channel leading to excessive packets collisions. GEDAR uses the greedy......
[1]. H. Yu, N. Yao, and J. Liu, "An adaptive routing protocol in underwater sparse acoustic sensor networks," Ad Hoc Networks, vol.
34, pp. 121– 143, 2015.
[2]. Rodolfo W. L. Coutinho , AzzedineBoukerche ,Luiz F. M. Vieira , Antonio A. F. Lour(2015), "Geographic and Opportunistic
Routing for Underwater Sensor Network", IEEE Transactions on Computers, Volume: 65 Issue: 2pp 548 - 561.
[3]. Youngtae Noh, Uichin Lee, Paul Wang, Brian Sung Chul Choi, and Mario Gerla(2016), "VAPR: Void-Aware Pressure Routing for
Underwater Sensor Networks", IEEE Transactions on Mobile Computing Volume: 12 , Issue: 5 , May 2016
[4]. I. F. Akyildiz, D. Pompili, and T. Melodia, "State-of-the-art in protocol research for underwater acoustic sensor networks," in
Proceedings of the 1st ACM international workshop on Underwater networks, Los Angeles, USA, pp. 7–16, ACM, 2016.
[5]. PengXie, Zhong Zhou, ZhengPeng, Jun-Hong Cui, and Zhijie Shi(2017), "Void Avoidance in Three-Dimensional Mobile
Underwater Sensor Networks", WASA 2017: Wireless Algorithms, Systems, and Applications pp 305-314.
Paper Type | :: | Research Paper |
Title | :: | Implementation of Video Crypto-Stegno Real Time (CSRT) System using Wang's Scheme |
Country | :: | India |
Authors | :: | Ashwini rane || Rajesh Babu |
Page No. | :: | 39-42 |
Information is any sort of put away computerized data. Security is about the assurance of advantages. Information security alludes to defensive computerized protection quantifies that are applied to counteract unapproved access to PCs, individual databases and sites. Cryptography is evergreen and improvements. Cryptography ensures clients by giving usefulness to the encryption of information and verification of different clients. Pressure is the way toward diminishing the quantity of bits or bytes expected to speak to a given arrangement of information. It permits sparing more information. Cryptography is a well known methods for sending imperative data in a mystery way. There are numerous cryptographic procedures accessible and among them AES is one of the most dominant systems. The situation of present day of data security framework incorporates secrecy, legitimacy, honesty, non-renouncement. The security of correspondence is an essential issue on World Wide Web. It is about privacy, honesty, verification during access or altering of classified inside records.
Keywords- Data Encryption and decryption, Compression, Cryptography Concept, Security, Integrity
[1]. Swarnalata Bollavarapu and Ruchita Sharma-― Data Security using Compression and Cryptography Techniques‖
[2]. Manoj Patil, Prof. Vinay Sahu—― A Survey of Compression and Encryption Techniques for SMS‖
[3]. Bobby Jasuja and Abhishek Pandya –― Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography
and Entropy Encoding‖
[4]. https://msdn.microsoft.com/en-us/library/windows/desktop/aa381939(v=vs.85).aspx
[5]. https://www.techopedia.com/definition/1773/decryption [6]www.computerhope.com/jargon/d/decrypti.htm
Paper Type | :: | Research Paper |
Title | :: | Internet of Things (IOT): Research Challenges and Future Applications |
Country | :: | India |
Authors | :: | Prof. Anuradha A.Dakhane || Prof. Madhavi L.Tota |
Page No. | :: | 43-48 |
The world is moving forward at a fast speed, and the credit goes to ever growing technology. As of now, we are in an age where every object is a smart object that has embedded electronics and connected to the internet. In other words, specifically, we are in the era of Internet-of-Things (IoT). Automation in IoT (Internet of things) is no longer a virtual reality. Ranging from smart cities, to health care, smart agriculture, logistics and retail, to even smart living and smart environments IoT is expected to insinuarate into virtually all aspects of daily life. Internet of things connects a lot of non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the future challenges of IoT are classified........
Keywords—Internet of Things, IoT application, IoT challenges, future technologies, smart cities, smart environment, smart agriculture, smart living, Security, Sensors.
[1]. M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, "A Review on Internet of Things (IoT), Internet of Everything (IoE) and In ternet
of Nano Things (IoNT)", in 2015 Internet Technologies and Applications (ITA), pp. 219– 224, Sep. 2015, DOI:
10.1109/ITechA.2015.7317398.
[2]. P. J. Ryan and R. B. Watson, "Research Challenges for the Internet of Things: What Role Can OR Play?," Systems, vol. 5, no. 1 ,
pp. 1–34, 2017.
[3]. M. Miraz, M. Ali, P. Excell, and R. Picking, "Internet of Nano-Things, Things and Everything: Future Growth Trends", Future
Internet, vol. 10, no. 8, p. 68, 2018, DOI: 10.3390/fi10080068.
[4]. E. Borgia, D. G. Gomes, B. Lagesse, R. Lea, and D. Puccinelli, "Special issue on" Internet of Things: Research challenges and
Solutions".," Computer Communications, vol. 89, no. 90, pp. 1–4, 2016.
[5]. K. K. Patel, S. M. Patel, et al., "Internet of things IOT: definition, characteristics, architecture, enabling technologies, application
future challenges," International journal of engineering science and computing, vol. 6, no. 5, pp. 6122–6131, 2016.
Paper Type | :: | Research Paper |
Title | :: | Labour's Betterment System & Mobile Application |
Country | :: | India |
Authors | :: | Akash Kawale || Ankul Gaikwad || Snehlata Mukhade || Kajal Bhonde || Mrunali Meshram || Prof. Priyanka Bhende |
Page No. | :: | 49-50 |
The adjustment of company labour and company official is a big challenge. Challenges such as requirement of labour, supply of labour, availability of labour on time are very tough to handle. Companies or Industry also faces lot of problems in adjusting labour in terms of need and also giving them daily wages based on the time and the day they have worked upon. So, making a Unified Platform for all kind of labours for manufacturing and production industry is our aim.
Keywords: Labour, interface, Database System, DBMS, Sql, Platform, Open source
[1]. Vikramdas Vaishav, Vaibhav Ghatge, Mandar Bhosale, Diptesh Raut, Akash Shinde, Vrushali Sonar: "Employee Tracking and
Management", International Journal of Advanced Research I n Computer and Communication Engineering, Vol. 6, Issue 2,
February 2017, ISSN (Print) 2319 5940.
[2]. Mr.Pratik Udayshankar Singh, Mr. Hemant Singh Fartyal, Mr. Khan Abdul Ahad Zubair, Prof. Akshata Laddha: "Employee
Management System", INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET),
VOLUME: 06 ISSUE: 05 | MAY 2019, P-ISSN: 2395-0072.
[3]. Madya Ansari, Maviya Shaikh, Ansari Abdul Basit, Jigna Waghela : "Employee Management System", International Journal of
Scientific & Engineering Research Volume 9, Issue 2, February-2018 ISSN 2229-5518.
[4]. Kancho Kanchev, "Employee Management System", ISSN, ISRN, VXU/MSI, Dec-06.
[5]. Reena Chaudhari, Ketan Gurav, Rajesh Jalal, Akshay Kshirsagar, Vishwakarma R Ganesh, "Employee Management System" International Journal Advanced research in Computer Engineering and Technology,vol.5,4 April 2016, Issn 2278-1323
Paper Type | :: | Research Paper |
Title | :: | Mobile Application System for Online Job seeker |
Country | :: | India |
Authors | :: | KanchanTambe || AnkitaNagrale || DnyaneshwariMotamwar || RunaliGajbhiye || Prof. Vishakha Nagrale |
Page No. | :: | 51-53 |
This paper is to provide a online job portal for employees and fresher's about opportunities in different companies. This system can manage job vacancies, job details , bio data ,interview, call letter etcand advance service we are providing SMS integration. This system is very useful for users because they need to submit resume through there account and all uploaded resume through are visible to other users and visitors who provide job opportunities. This paper provides a lot features to manage all the data in very well manner. This application contains a lot advance modules which makes the back end system very powerful.
Keywords:Employee,SMS integration ,visitors ,job opportunities, back end.
[1]. http://docs.spring.io/spring/docs/current/spring-framework-references/html/index.html[sep.10,2016]
[2]. https://docs.jboss.org/hibernate/orm/5.0/quickstart /html/
[3]. https://www.wikipedia.org/wiki/Android_Runtime[oct 12, 2016]
[4]. https://www.phppoint.com
[5]. https://1000projects.org
Paper Type | :: | Research Paper |
Title | :: | A Survey on Node Level Trust Management Schemes for Wireless Sensor Networks |
Country | :: | India |
Authors | :: | Lekhchand Sharnagat || Rajesh Babu || Roshani Talmale |
Page No. | :: | 54-57 |
A sensor system will review our health, our home, the streets we follow, the workplace or the industry we work in or even theaircrafts we use, trying to improve our safety. Notwithstanding, the wireless sensor networks themselves are inclined to security attacks. The listof security attacks, in spite of the fact that officially exceptionally long, keeps on enlarging obstructing the development of these networks. Thetrust management schemes comprise of a powerful tool for the detection of unexpected node behaviors either malicious or faulty. In wirelesssensor networks, sensor nodes in the region of interest must report the cognitive process to the sink by sensing, and this report will satisfies thereport frequency necessary by the sink. Inside the domain of system security, we decipher the idea of trust..........
Keywords: Trust Management, Security, Wireless Sensor Networks, Lightweight WSN
[1]. Fenye Bao, Ray Chen, MoonJeong Chang, and Jin-Hee Cho. Hierarchical trust management for wireless sensor networks and its
applications to trust-based routing and intrusion detection. IEEE transactions on network and service management, 9(2):169–183,
2012.
[2]. Garth V Crosby, Niki Pissinou, and James Gadze. A framework for trust-based cluster head election in wireless sensor networks. In
Second IEEE Workshop onDependability and Security in Sensor Networks and Systems, pages 10–pp. IEEE, 2006.
[3]. Saurabh Ganeriwal, Laura K Balzano, and Mani B Srivastava. Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks(TOSN), 4(3):15, 2008.
[4]. Ablolfazl Afsharzadeh Kazerooni, Hamed Jelodar, and Javad Aramideh. Leach and heed clustering algorithms in wireless sensor
networks: a qualitative study. Advances in Science and Technology Research Journal, 9(25), 2015.
[5]. Xiaoyong Li, Feng Zhou, and Junping Du. Ldts: a lightweight and dependable trust system for clustered wireless sensor networks.
IEEE transactions on information forensics and security, 8(6):924– 935, 2013.
Paper Type | :: | Research Paper |
Title | :: | Plant Disease Detection Using Image Processing Techniques |
Country | :: | India |
Authors | :: | Khushbu R. Wase || Rajesh Babu |
Page No. | :: | 58-60 |
Diseases in plants cause major production and economic losses as well as reduction in both quality and quantity of agricultural products. Now a day's plant diseases detection has received increasing attention in monitoring large field of crops. Farmers experience great difficulties in switching from one disease control policy to another. The naked eye observation of experts is the traditional approach adopted in practice for detection and identification of plant diseases. On the other hand, mobile phone usage has increased exponentially among the population of India. People from all walks of life are using mobile phones and different associated applications for gaining economic and social benefits..............
Keywords: Image processing, leaf disease detection,binary image comparison, binary images
[1]. SnigdhaSen, and Madhu B, "Smart Agriculture: A Bliss to Farmers", 6(4): April, 2017.
[2]. ChetanDwarkani M, Ganesh Ram R, Jagannathan S, R. Priyatharshini, "Smart Farming System Using Sensors for Agricultural Task
Automation", 2015 IEEE International Conference on Technological Innovations in ICT for Agriculture and Rural Development
(TIAR 2015).
[3]. NikeshGondchawar, R. S. Kawitkar, "IoT based Smart Agriculture", International Journal of Advanced Research in Computer and
communication Engineering Vol. 5, Issue 6, June 2016.
[4]. N. Suma, Sandra Rhea Samson, S. Saranya, G. Shanmugapriya, and R. Subhashri, "IOT Based Smart Agriculture Monitoring
System", International Journal on Recent and Innovation Trends in Computing and Communication, vol. 5 no. 2, 2017.
[5]. Tuli, N. Hasteer, M. Sharma and A. Bansal, "Framework to leverage cloud for the modernization of the Indian agriculture system," IEEE International Conference on Electro/Information Technology, Milwaukee, WI, 2014, pp. 109-115.
Paper Type | :: | Research Paper |
Title | :: | Real Time Filtering Using Convolutional Neural Network |
Country | :: | India |
Authors | :: | Shriya Sharma || Mona Bhandekar || Kanchan Ingole || Pratiksha Khedkar || Ayushi Umredkar |
Page No. | :: | 61-65 |
In this project, we aim to Implement a real-time expression recognition and tracking the head poses position from high definition video using Haar Classifier. SimpleCv and OpenCv libraries are used for face recognition and tracking the head poses position. Face detection and recognition from an image or a video is a popular topic in biometrics research. Face recognition technology has broadly attracted interest due to its massive application value and market potential, such as real-time video surveillance system. It is broadly acknowledge that the face recognition has played an important role in surveillance system as it doesn't need the object's co-operation. We propose a real-time face detection system based on IP camera and image set algorithm by way of OpenCV and Python programming development........
Keywords: Python, Android studio, Anaconda python, MATLAB, JAVA, Javascript
[1]. "A Facial Expression Recognition System Using Convolutional Networks" by Lopes, Andre Teixeira, Edilson de Aguiar and
ThiagoOliveiraSantos in 28th SIBGRAPI Conference on Graphics, Patterns and Images, IEEE(2015)
[2]. "J Learning and Transferring mid-level image representation using convolutional neural networks" by Oquab, M.Bottou, Laptev
and I.Sivic in CVPR(2014)
[3]. Manske, M., 2007. Figure Visually Demonstrating the Evaluation of a Rectangle Feature with the Integral Image, s.l.: s.n.
[4]. "Facial Expression Recognition Based on TensorflowPlatform", ITM Web Conferences, 2017,
[5]. Mount, J., 2014. Approximation by orthogonal transform. [Accessed 18 April 2017].
© 2019 All Rights Reserved | Design by iosrjen