March - 2019 (Volume-9 ~ Issue-3 ~ Series-3)

Paper Type :: Research Paper
Title :: Enhancing Data Safety Through Dual Layer Security Protection in Cloud Network
Country :: India
Authors :: Sudipta Sahana || Suchismita Gupta || Debabrata Sarddar
Page No. :: 01-10

As visualized by the researchers, Cloud Computing is the next-generation architecture of IT Enterprise. Cloud computing relies on shared computing resources rather than having local servers or personal devices to handle applications. Cloud Computing moves the application software and databases to the large data centers, which distinguishes it from the traditional solutions, where the IT services are under proper physical, logical and personnel controls. Security in cloud is the current discussion in the IT world due to the increasing number of breaches and technological attacks. In this paper we focus on providing a dual layer security to the data to be transmitted and stored in cloud storage. The first stage of encryption is provided in the user end and then the data is transmitted via the transmission network in the cloud network. The second stage of encryption is implemented at the server end before storing the data in cloud storage.

Key words: Cloud Computing, Dual Layer Security, Cloud Data Center, Rail Fence Cipher, Cloud Storage.

[1]. Rajiv Mishra, Meenaxi Kumari, "Need of Multi-Layer Security in Cloud Computing for on Demand Network Access", International Journal of Computer Science and Mobile Computing, A Monthly Journal of Computer Science and Information Technology, IJCSMC, Vol. 4, Issue. 6, June 2015, pg.398 – 404, ISSN 2320–088X.
[2]. Debabrata Sarddar, Rajesh Bose,Sudipta Sahana, "An Enhanced Cloud Network Load Balancing Approach Using Hierarchical Search Optimization Technique", International Journal of Hybrid Information Technology Vol.8, No.3 (2015), pp.9-20.
[3]. Aarti Singh, Manisha Malhotra, "Security Cconcerns at Various Levels of Cloud Computing Paradigm: A Review", International Journal of Computer Networks and Applications, Volume 2, Issue 2, March – April (2015).
[4]. Mahima Joshi, Yudhveer Singh Moudgil, "Secure Cloud Storage", International Journal of Computer Science & Communication Networks,Vol 1(2), 171-175, ISSN:2249-5789.


Paper Type :: Research Paper
Title :: Score-Based Max-Min Budget Constraint Workflow Scheduling Algorithm for Cloud System
Country :: India
Authors :: Makhan Singh
Page No. :: 11-17

Cloud computing is the paradigm that uses central remote servers and internet to host the data and perform distributed computing for large-scale applications. This is the latest concept emerging in Cloud computing for service provisioning in distributed system. The research community groups are keen to explore the merits and demerits of scientific application execution which involves workflow. In Cloud computing the scheduling of workflow is the prominent issue that maps and allows inter-dependent tasks to be executed on the distributed resources. Workflow scheduling allocates those resources to tasks which totally satisfy the quality of service (QoS) constraint that are defined by the Cloud users. In present scenario the workflow scheduling approaches are focusing on execution cost and time related............

Key words: Workflow Scheduling, Score, Virtual Machine, Budget Constraint, Cloudlet.

[1]. Abrishami, S., & Naghibzadeh, M. (2012). Deadline-constrained workflow scheduling in software as a service cloud. Scientia Iranica, 19(3), 680-689.
[2]. Abrishami, S., Naghibzadeh, M., & Epema, D. H. (2013). Deadline-constrained workflow scheduling algorithms for infrastructure as a service clouds. Future Generation Computer Systems, 29(1), 158-169.
[3]. Bala, A., & Chana, I. (2011, November). A survey of various workflow scheduling algorithms in cloud environment. In 2nd National Conference on Information and Communication Technology (NCICT), 26-30).
[4]. Bittencourt, L. F., & Madeira, E. R. M. (2011). HCOC: a cost optimization algorithm for workflow scheduling in hybrid clouds. Journal of Internet Services and Applications, 2(3), 207-227.
[5]. Buyya, R., Ranjan, R., & Calheiros, R. N. (2009, June). Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities. In 2009 international conference on high performance computing & simulation, 1-11.


Paper Type :: Research Paper
Title :: Design and Implementation of Web Based Smart Home Control System using Raspberry Pi
Country :: India
Authors :: Dhiraj Sunehra
Page No. :: 18-28

The appliances used in our home operate using different control mechanisms. Some are controlled using an IR remote controller and some are operated manually using switches. To implement a smart home control system, this paper aims at development of a web based remote control to control the appliances in the home. The design involves decoding of IR remote patterns of the appliances. The Raspberry Pi3 microcontroller is used as a web server. When a particular button is pressed on the developed webpage, the relevant code is transmitted through a IR transmitter to perform the desired control operation on the device or home appliance. A media player remote is decoded here for experimentation. Lights and fans in the home can also be operated through the same webpage.............

Key words: Smart Home, Appliance Control, Intrusion detection, IR Remote, Raspberry Pi Web server, Python language

[1] Sung-Jung Hsiao, Kuang-Yow Lian and Wen-Tsai Sung (2016), "Employing Cross-Platform Smart Home Control System with IOT Technology Based", International Symposium on Computer, Consumer and Control (IS3C), Xi‟an, China, 4-6 July, pp, 264-267, IEEE.
[2] Ch. Pandu Ranga Sai, V.Sameeka Datta and Sudheera (2016), "Design of a Smart Remote", International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 18-19 Mar., pp. 1-4, IEEE.
[3] Dhiraj Sunehra and Veena, M. (2015), "Implementation of Interactive Home Automation Systems Based on Email and Bluetooth Technologies", International Conference on Information Processing (ICIP), Pune, 16-19 Dec., pp.458-463, IEEE.
[4] ElKamchouchi, H. and Ahmed ElShafee (2012), "Design and Prototype Implementation of SMS Based Home Automation System", IEEE International Conference on Electronics Design, Systems and Applications (ICEDSA), Kuala Lumpur, Malaysia, 5-6 Nov., pp.162-167.


Paper Type :: Research Paper
Title :: Web Controlled Door Lock System with Email Alert using Raspberry Pi
Country :: India
Authors :: Dhiraj Sunehra
Page No. :: 29-38

In recent days, security and safety of the homes has become a major challenge with increase in thefts and robberies. House with a traditional door lock system can be easily intruded. Also, a lost key can create problems if it is misused by unauthorized persons. Home owners cannot open the door when the key is lost. Sometimes the user can fail to remember to lock the door. The users don't have an option to check whether the door is locked or unlocked. In this paper, a Web controlled door lock system with email alert using Raspberry Pi is developed. The main objective of the system is to provide security and simple authorized access to a home. The owner is alerted when there is someone in front of the door or when someone knocks the door............

Key words: Smart Home, Raspberry Pi 3, Web controlled Door lock, IR sensor, Vibration sensor, Limit switch

[1]. Akash V. Bhatkule, Ulhas B. Shinde, Shrinivas R. Zanwar, "Home Based Security Control System using Raspberry Pi and GSM", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 9, Sept. 2016.
[2]. Lia Kamelia, S.R. Alfin Noorhassan, W.S. Mada Sanjaya, W.S. Edi Mulyana, "Door-automation system using Bluetooth-based android for mobile phone", ARPN Journal of Engineering and Applied Sciences , Vol. 9, No. 10, October 2014.
[3]. Akshay N. Patil, Rohit B. Ranavare, Dayasagar V. Ballal, Prof. P. P. Kotekar, "Raspberry Pi Based Face Recognition System For Door Unlocking", International Journal of Innovative Research in Science and Communication Engineering, Vol. 2, Issue 3, March 2016.
[4]. Selvin Pradeep Kumar S., "Password Based Remote Controlled Door Opening Using Android Application", International Journal of Engineering Development and Research, Vol. 4, Issue 4, 2016.
[5]. Gyanendra Kumar Verma, Tripathi Pawan, "A Digital Security System with Door Lock System using RFID Technology", International Journal of Computer Applications, Vol. 5, No.11, August 2010.


Paper Type :: Research Paper
Title :: Adomian Decomposition Method for Solving Highly Nonlinear Fractional Partial Differential Equations
Country :: India
Authors :: Bhausaheb R. Sontakke
Page No. :: 39-44

The aim of this paper is to propose the Adomian Decomposition Method (ADM) to solve linear and nonlinear fractional partial differential equations. The fractional derivatives are described in the Caputo sense. The approximate solution of the partial differential equations shows that the fractional iteration method is very efficient technique. As an application of this method we solve some test problems and their solutions are represented graphically by very powerful software Mathematica

Key words: Time Fractional Differential Equation, Caputo Fractional Derivative, Adomian Decomposition Method, Mathematica

[1]. Adomian,G. (1994). Solving Frontier Problems of Physics, the Decomposition Method.Kluwer Academic Publishers, Boston.
[2]. Adomian, G. (1988). A Review of the Decomposition Method in Applied Mathematics. J.Math., 135, 501-544
[3]. Atangana, A., G´omez-Aguilar, J.F. (2018). Numerical Approximation of Riemann Liouville Definition of Fractional Derivative: From Riemann-Liouville to Atangana-Baleanu. Numerical Methods to Partial Differential Equations. 34, 1502-1523.
[4]. Baleanu, D., Machado, J.A.T., Cattani,C., Baleanu, M.C., Yang, X.J. (2014). Local Fractional Variational Iteration and Decomposition Methods for Wave Equation on Cantor Sets within Local Fractional Operators. Abstract and Applied Analysis, 6 pages.
[5]. Caputo M. and Mainardi, F. (1971). A New Dissipation Model Based on Memory Mechanism. Pure and Applied Geophysics, 91(8), 134-147.


Paper Type :: Research Paper
Title :: The Role of Technology in Project Management - a case study of Saudi Company
Country :: Saudi Arabia
Authors :: Yousef A Alharbi || Rami H Alamoudi
Page No. :: 45-50

The paper discusses the effects of applications such as Oracle Primavera, Zoho Projects, Omnifocus and Clarizen on project management. The influence of storage cloud functionalities on project management is discussed. The decentralization of project teams, computerized scheduling, automation of workflows and budget tracking have all been made a reality by specialized software. The practical effects of all these advantages are highlighted. Therefore, the companies often have to work at promoting cohesion within their organization. Short examples of how the use of technology has affected Almarai corporation's projects are researched into. Hence, the role of technology in enhances the decision making for the project member is discussed. Finally, the paper outlines the drawbacks and the benefits of incorporating technology into a company's projects and gives recommendation based on the observations.

Key words: Project management, technology, Zoho Projects, Oracle Primavera, Omnifocus, Clarizen, Saudi Arabia, Saudi Company

[1] Kerzner, Harold "Project Management: A Systems Approach to Planning, Scheduling, and Controlling" John Wiley & Sons, 2017.
[2] Uptmor, Doug "Five Technologies That Can Improve Project Management" Clarizen, 20 Sept. 2017
[3] Bunner, Angela "5 Ways Technology Has Changed Project Management" Clarizen, 28 July 2016.
[4] Jeurissen, Ronald. Ethics & Business. Uitgeverij Van Gorcum, 2007.


Paper Type :: Research Paper
Title :: Some Expansion Formulae For The Aleph (? )-Function
Country :: India
Authors :: Yashwant Singh || Poonam Kumari
Page No. :: 51-53

In the present paper, the author has established two expansion formula of Aleph -Function.

Key words:  -Function, Expansion Formula, Gamma Function (2010 Mathematical Subject Classification: 33C99)

[1]. Fox, C.; TheG -function and H function as symmetric Fourier kernels, Trans. Amer. Math. Soc. 98, (1961), 396-429.
[2]. Srivastava,H.M.,Gupta, K.C. and Goyal,S.P.; The H-Functions of One and Two Varibale with Applications,South Asian Publishers, New Delhi and Madras, (1982).
[3]. Sudland, N., Baumann, B. and Nonnenmacher, T.F.; Open problem: who knows about the Aleph( )- functions? Frac. Calc. Appl. Annl. 1(4),(1998), 401-402.


Paper Type :: Research Paper
Title :: Urban Polarization: Case of Riot Affected Ahmedabad
Country :: India
Authors :: Ar. Parul Vyas
Page No. :: 54-64

The research aims at studying the transformation in morphology of the spaces post communal conflicts. Conflicts divide the city into groups fighting for the common agenda of "Whose city?" It leaves devastated impression on urban morphology by creating roads and boundaries as borders, changed landscape, no man‟s land and continuous surveillance; which in turn results in changing the physical and social use of spaces in everyday life. The cities divided on ethnical backgrounds have become enclaves of homogenous neighborhoods; the settlements belonging to one‟s community and culture can be identified clearly through architecture, hoardings, symbols and the spaces generated. Violent morphologies are the byproduct of conflicts which produce sense of fear and feeling of "them" and "us" between the two communities.............

Key words: Communal polarization, morphology, gentrification, ghettoization, Sense of fear

[1]. Charlesworth, E., 2006. Architects Without Frontier. 1 ed. Burlington: Elsevier Ltd..
[2]. Chaterjee, I., 2009. Violent morphologies: Landscape, border and scale in Ahmedabad conflict. Elseveir, Issue 40, pp. 1003-1013.
[3]. De, A., 2002. Spatial Structure and Social Interaction in the Core Area of Indian Cities : A Case study of Ahmedabad, Ahmedabad: Gujarat University.
[4]. Frank Gaffikin, M. M. K. S., 2010. Creating Shared Public Space in the Contested City : The Role of Urban Design. Jounal of Urban Design , 15(4), pp. 493-513.
[5]. Leclair-Paquet, B. J., 2013. Beirut Divided: The potential of urban design in reuniting a culturally, London: The Bartlett Development Planning Unit.