Title | :: |
Review Paper on Optimization of Cotton Ginning And Pressing Plant |
Country | :: |
India |
Authors | :: |
Ramkrushna S. More || Dr. Ajay U.Awate |
Page | :: |
01-04 |
The process of separation of fibre from cottonseed is called Ginning . Composite ginnery performs ginning and pressing operations to convert lint cotton into a bale. In modern day, various technology and pressing machinery are devolved This review paper discusses a present work for modern technology implemented in a modern gin, to configure an optimal set of equipment during ginning to produce quality cotton. Along with The future expectations of technological development in the Cotton Ginning & Pressing Technology.
Keywords: - Composite ginnery , and pressing machinery, gin
Title | :: |
Wildlife Animal Location Detection And Health Monitoring System |
Country | :: |
india |
Authors | :: |
Kushal Naik || Rohit Yadav || Omprakash Verma || Dhruv Zanzrkiya || Professor Meenakshi Saraon |
Page | :: |
05-08 |
As we know, animals form a big part of the ecosystem. Their existence is very important for the balance of the ecosystem. But nowadays, more and more animals are getting endangered and are on the verge of extinction. So, to save these animals from extinction, humans reserved forest areas (Sanctuaries and national parks) for their safety. However, some animals died due to bad health which couldn't get any attention to. To avoid such casualties, animal location tracking system with a health monitoring system is used. This system uses a pulse radar to keep the track of animal's health and the usage of Global Positioning System, we get the exact location of the animal. So, no time is wasted for the animal to be attended to.
Keywords: - Wildlife animals, GPS module, Wi-Fi module, Pulse sensor, Temperature sensor, PIC microcontroller.
Title | :: |
Overview And Applications of Artificial Neural Networks |
Country | :: |
India |
Authors | :: |
Jyoti Jeetendra Gurav || Shilpa Jaiswal || Ritu Sharma || Kunal Shriwas || Divya Sharma |
Page | :: |
09-13 |
ARTIFICIAL NEURAL NETWORK INTRODUCTION The simplest definition of a neural network, more properly referred to as an 'artificial' neural network (ANN), is provided by the inventor of one of the first neurocomputers, Dr. Robert Hecht-Nielsen. He defines a neural network as: "...a computing system made up of a number of simple, highly interconnected processing elements, which process information by their dynamic state response to external inputs. ANNs are processing devices (algorithms or actual hardware) that are loosely modeled after the neuronal structure of the mammalian cerebral cortex but on much smaller scales. A large ANN might have hundreds or thousands of processor units, whereas a mammalian brain has billions of neurons with a corresponding increase in magnitude of their overall interaction and emergent behavior. Although ANN researchers are generally not concerned with whether their networks accurately resemble biological systems, some have. For example, researchers have accurately simulated the function of the retina and modeled the eye rather well. Although the mathematics...........
Keywords: - Statistical modeling, neural network, back propagation, artificial intelligence
[1] Ali Shah, S.A., ul Asar, A., Shaukat, S.F.: Neural Network Solution for Secure Interactive Voice Response. World Applied Sciences Journal 6(9), 1264–1269 (2009) [2] Nazeer, S.A., Omar, N., Jumari, K.F., Khalid, M.: Face detecting using Artificial Neural Networks Approach. In: First Asia International Conference on Modelling & Simulation (2007) [3] He, L., Hou, W., Zhen, X., Peng, C.: Recognition of ECG Patterns Using Artificial Neural Network. In: Sixth International Conference on Intelligent Systems Design and Applications, vol. 02 (2006) [4] D. R. Hush, B. G. Horne, "Progress in Supervised Neural Networks What's New Since Lipmann", IEEE Signal Processing Magazine, pp. 8-39, 1993. [5] M. T. Musavi, "On the Training of Radial Base Function Classifiers", Neural Networks, vol. 5, pp. 595-603, 1992.
Title | :: |
Mapping Hindi Text Document Into Graph Structure |
Country | :: |
India |
Authors | :: |
Yogita Shelar || Pragyamani Sharma || Vaishali Salvi || Jyothi Arun |
Page | :: |
14-21 |
In this paper, we present a Mapping Hindi text document into graph structure and external program for pre- processed frequently, proper or further. It is derived using natural language processing as follows. Firstly subject – verb – object triplets are automatically extracted from the Hindi dictionary obtained for each sentence in the document. Secondly, extracting the triplets and enhanced by linking them to their corresponding co-referenced named entity, by resolving pronominal anaphors as well as attaching the associated Word Net synset.
Keywords -Pre-processed, frequently, atomically, pronominal, anaphors.
Title | :: |
Ransomware:Past, Present, And Future. |
Country | :: |
India |
Authors | :: |
Shilpa Jaiswal Ritu Sharma || Kunal Shriwas || Jyoti || Gurav |
Page | :: |
22-26 |
On 12 May 2017, a massive ransomware attack occurred across a wide range of sectors, including health care, government, telecommunications and gas. To date, WannaCry has spread to over 300,000 systems in over 150 countries. The countries that appear to be the most affected are Russia and China, probably because of the high percentage of legacy software, with significant impacts elsewhere, notably to the UK National Health Service. The spread of the ransomware reportedly slowed in the two days following the launch of the attack, in part due to the discovery of a "kill switch" in its code. However, there are reports of new variants of the malware (such as Uiwix) which do not have this kill switch. Data on new variants is unconfirmed and limited at the moment,and EY wil publish updates as more information becomes available.
Keywords - kill switch, ransomware and legacy software..
[1] en.wikipedia.org/wiki/Cryptolocker [2] http://www.darkreading.com/attacks-breaches/new-zeus-banking-trojantargets-64-bit-s/240164713 [3] http://blog.fortinet.com/Ransomware/ [4] http://www.symantec.com/connect/blogs/grappling- zeroaccess-botnet [5] http://threatpost.com/zeus-source-code- leaked-051011.
Title | :: |
Deploy Hadoop For Processing Text Data To Run Map Reduce Application On A Single Site |
Country | :: |
India |
Authors | :: |
Shrusti Talati || Dr. Mamta Meena || Shrutika Mallya |
Page | :: |
27-33 |
The arrival of many ubiquitous devices, social networking and other sources of data has created a large amount of data with greater velocity and variety. Multiple organizations are applying big data analytics to challenges such as detection of fraud, analysis of risk, analysis of sentiments, analysis of equities, forecasting of weather, recommendations of various products and their classifications. So the big data is a collection of large datasets that cannot be processed using traditional computing techniques. Hadoop is a Java based open source platform that can process this data over thousands of distributed affordable commodity nodes and deliver predictive insights. It is designed to scale up from single servers to thousands of machines, each offering local computation and storage. In this paper we have installed and configured Hadoop on Windows platform. We have run an application in three wordcount languages , which are MapReduce
Key words: - Hadoop, MapReduce, Big Data Analytics
[1] https://www.safaribooksonline.com/library/view/hadoopessentials/9781784396688/ch02s05.html [2] https://hadoop.apache.org/docs/r1.2.1/hdfs_de ign.html [3] https://hadoop.apache.org/docs/r1.2.1/hdfs_design.html [4] Tom White, Hadoop The Definitive guide, O'Reilly,Yahoo Press [5] http://www.ibm.com/developerworks/cloud/library/clopenstack-deployhadoop/
Title | :: |
A Review on Internet of Things |
Country | :: |
India |
Authors | :: |
Ashmita Shetty || Varsha Salunkhe || Komal Gothwal || Dimple Bafna |
Page | :: |
34-39 |
Internet, a progressive creation, is continually changing into some new sort of equipment and software making it unavoidable for anybody. The type of correspondence that we see now is either human-human or human-gadget, however the Internet of Things (IoT) guarantees an awesome future for the internet where the kind of communication is machine-machine (M2M).Internet of Things (IoT), which will make a tremendous system of billions or trillions of "Things" imparting with each other, are confronting numerous security issues..
Keywords - Internet of Things (IOT), Privacy, Security
[1] J. S. Kumar and D. R. Patel, "A survey on internet of things: Security and privacy issues," International Journal of Computer Applications, vol. 90, no. 11, 2014. [2] M. Abomhara and G. M. Køien, "Security and privacy in the internet of things: Current status and open issues," in Privacy and Security in Mobile Systems (PRISMS), International Conference on. IEEE, 2014, pp. 1–8. [3] L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct 2010. [4] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of iot: Applications, challenges, and opportunities with china perspective," IEEE Internet of Things journal, vol. 1, no. 4, pp. 349–359, 2014. [5] M. Abdur Razzaq, R. A. Sheikh, A. Baig, and A. Ahmad, "Digital image security: Fusion of encryption, steganography and watermarking," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 5, 2017.
Title | :: |
Review on Resource Allocation Strategies In Cloud Computing |
Country | :: |
India |
Authors | :: |
Varsha Salunkhe || Komal Gothwal || Ashmita Shetty || Dimple Bafna |
Page | :: |
40-42 |
Cloud Computing has a great impact on IT industries. Central storage is being the need of current generation and this can be achieved using cloud computing. Cloud uses huge number of resources to provide its services. Managing the resources effectively has become a new challenge in today's world. The workload in cloud computing changes as per the demand and thereby needs dynamic resource provisioning and allocation. In cloud computing, resources are allocated effectively with high resource utilization and low cost. This work presents a comprehensive In this paper, we have discussed various optimal resource allocation schemes reviewing the resource allocation strategies.
Keywords – Cloud Computing, Cloud Services, Resource Allocation
Title | :: |
Blended Learning By Incorporating LMS, E- Learning & Traditional Learning To Suit The Changing Requirement Of Learner |
Country | :: |
India |
Authors | :: |
Mahendra Patil || Amruta Mhatre || Divya Kumawat || Ajeet Ghodeswar |
Page | :: |
43-47 |
This paper discusses one of the best practices for e-learning in Atharva College of Engineering (ACE) with blended learning. The paper discusses the blended learning and its advantages as well as disadvantages. The main focus of this paper is to show how Course Networking was introduced as a blended learning tool in the Academics and how it improved the teaching learning process as well as the outcomes. The paper outlines the strategy and the framework designed by the Department of Computer Engineering and how it made the difference. The paper highlights the positives as well as area of improvement of the Course Networking as a blended learning tool.
Keywords - e-learning, course networking, blended learning, education practices.
Title | :: |
Concise View At The Super-Dense Plasma State |
Country | :: |
India |
Authors | :: |
Abhilasha Saini || Dr. Sudhir Bhardwaj || Dr.O.S.Lamba || Dr.P.N.Nemade |
Page | :: |
48-51 |
The vital intent of the physics behind the relativistic bulky-ion encounters is to unlock the inherent attributes of the completely novel phase of vigorously interacting nuclear stuff, commonly denominated as the quark-gluon plasma [1]. For the purpose of attaining this goal, one entails the authentic signals for the creation of such a phase or stage. This probe attempts to detain indispensable proposals also the ongoing stature of the abstract studies made for the most encouraging quark-gluon plasma indicators. These propounded quark-gluon plasma signatures can be studied in conformity with the physical traits of super-dense hadronic stuff to which they are sentient of. Here a perfunctory review of the contemporary depiction of the dynamical and constructional features of QGP phase, its erection and evolution is proffered. This certainly assists one for better assimilation about the very novel quark gluon state..
Keywords - Bulky ion collision , Quark-Gluon Plasma ,Hadronic stuff.
Title | :: |
Plagiarism Detection And Visual Inspection Of Data |
Country | :: |
India |
Authors | :: |
Pranoti Nage || Priyanka Sharma || Vaishali Salvi || Reena Somani || Sejal D'mello |
Page | :: |
52-57 |
Digital documents are vulnerable to being copied. Most existing copy detection prototypes employ an exhaustive sentence-based comparison method in comparing a potential plagiarized document against a repository of legal or original documents to identify plagiarism activities. This approach is not scalable due to the potentially large number of original documents and the large number of sentences in each document. Furthermore, the security level of existing mechanisms is quite weak; a plagiarized document could simply by-pass the detection mechanisms by performing a minor modification on each sentence. In this paper, we propose a copy detection mechanism that will eliminate unnecessary comparisons. The system will parse the data to compare against the data obtained from web to detect plagiarism using Hadoop in the backend to increase the efficiency of the system..
Keywords - Plagiarism,Hadoop, High charts,Tokens,Comparator
Title | :: |
Recognition And Recall Based Graphical Password Authentication |
Country | :: |
India |
Authors | :: |
Mr. Santosh M.Dodamani || Ms. Aarti B.Valsang |
Page | :: |
58-60 |
Security is that the degree of protection to persons or person against danger, damage, loss, and crime. The need for security often means that standard human-computer-interaction approaches cannot directly apply. Nowadays, as day today activities are more open to the internet, the importance of security for applications is tremendously increased. Using static passwords alone makes it easy for the hackers to hack the users account. An important usability goal for authentication system is to support users in selecting better password. User often creates memorable passwords that are easy for attackers to guess, but strong system assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods. Here a graphical password is discussed
Keywords -Cybercrime, Graphical, Face Recognition, Biometric.
Title | :: |
Smart Anti-Theft System For Vehicle Security And Tracking |
Country | :: |
India |
Authors | :: |
Raj Kupekar || Prasad Lawte || Prasad Nate || Gaurav Narvekar || Mahalaxmi Palinje |
Page | :: |
61-65 |
Nowadays most of the public are having their own vehicles also on the other hand there is a need to provide security for vehicles from any external threats. Smart anti-theft system for vehicle security and tracking is used to provide the fundamental security to vehicles. This system is accompanied with a keypad part, placed on the door outside the car to authenticate the valid user. Global Positioning System (GPS) and Global System for Mobile communication (GSM) provides the current location of the vehicle. The system is also designed to recognize any unusual vibrations in case if the car undergoes an accident and sends the respective signal to the owner through GSM. This is achieved by using MEMS accelerometer.
Keywords - Atmega 328, GPS, GSM, Keypad, MEMS accelerometer, Vehicle tracking and locking
[1] S.Valarmathy, R.Ramani, S.Selvaraju, G.Suresh Kumar, "Advanced Vehicle System Based on Embedded Technology'' International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 9, September 2015. [2] S.Boopathi, K.Govindaraju, M.Sangeetha, M.Jagadeeshraja, M.Dhanasu, "REAL TIME BASED SMART [3] VEHICLE MONITORING AND ALERT USING GSM "International Journal of Advanced Research in [4] Computer and Communication Engineering Vol. 3, Issue 11, November 2014. [5] Vikram Kulkarni &ViswaprakashBabu, "Embedded Smart Car Security System on Face Detection" special issue of IJCCT, ISSN(Online):2231-0371, ISSN(Print):09757449,volume-3, issue-1.
Title | :: |
Movie Success Prediction |
Country | :: |
India |
Authors | :: |
Komal Gothwal || Dhiral Sankhe || Nirav Waghela || Mitul Sharma || Ramanand Yadav |
Page | :: |
66-79 |
In this system we have developed a mathematical model for predicting the success class such as flop, hit, neutral of the movies. For doing this we have to develop a methodology in which the historical data of each component such as actor, actress, director, music that influences the success or failure of a movie is given is due to weight age and then based on multiple thresholds calculated on the basis of descriptive statistics of dataset of each component it is given class flop, hit, neutral label. Based on the weight age of historical data of each film crew the movie will be labelled as neutral, hit or flop. This system helps to find out whether the movie is super hit, hit, flop on the basis of historical data of actor, actress, music director, writer, director, marketing budget and release date of the new movie. If the movie releases on weekend, new movie will get higher weight age or if the movie releases on week days new movie will get low weight age. The factors such as actor, actress, director, writer, music director and marketing budget historical data of each component are calculated and movie success is predicted. This application helps to find out the review of the new movie...
Keywords - Data Mining, SVM, k-NN, Machine Learning, Movies
Title | :: |
Content-Based Real Time Video Copy Detection Using Hadoop |
Country | :: |
India |
Authors | :: |
Pramodini Kamble || Priyanka Shejawal || Tejaswi Surve || Kushal Yadav || Prof. Bhushan Patil |
Page | :: |
70-74 |
Due to emerging interest in videos along with the evolution of new technology and facilities, today the amount of videos on the internet is increasing enormously. But these videos do not hold original content and are simply revised versions of the original videos. The purpose of the Video Content Copy Detection is to detect the copied videos and find the similarities among them. The currently available video copy detection algorithms have certain limitations, such as it requires more time for searching and gives inaccurate output. TIRI-DCT algorithm along with Brightness Sequence algorithm is implemented to overcome the problems in the existing system. For the significant improvement in the processing of videos we use Hadoop platform in distributed file system and for vital practical significance in video tracking and real time video content retrieval.
Keywords - Hadoop, brightness sequence, cluster – based similarity search, inverted file-based similarity search and TIRI - DCT
Title | :: |
Cloud Computing: A Perspective Study |
Country | :: |
India |
Authors | :: |
Sufiyan Kazi || Vipul Padgal |
Page | :: |
75-80 |
Cloud computing can be defined as reliable services that are delivered through data centers which are built on compute and storage technologies. Consumers are able to use applications and data from a cloud anywhere in the world on demand. Services like Google Docs are cloud Computing , where your document exist on the company's servers and you can reach these documents easily and work on them without using your own hard drive. A cloud is a type of parallel and distributed system consisting of interconnected and virtualized computers. Cloud computing uses 'Hadoop' software that implements a cloud on a cluster of computers. Google Apps, Google Maps and Gmail are all based on the cloud .Other major web players including Amazon, eBay, yahoo and Facebook are running some sort of an enormous cloud computing. Computing at the scale of the cloud allows the users to access supercomputers-level power and storage. The concept behind cloud computing is to scale your application by deploying it on a large grid of commodity Hardware boxes. Thus, cloud computing and storage compiles physical resources into scalable and shareable resources over the internet.
Keywords - Cloud Computing, Distributed System, Hadoop, supercomputers, Virtualization
[1] Cloud security: A comprehensive guide to secure cloud computing RL Krutz, RD Vines - 2010 - dl.acm.org [2] Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. [3] R Buyya, CS Yeo, S Venugopal, J Broberg… - Future Generation …, 2009 – Elsevier A view of cloud computing. [4] M Armbrust, A Fox, R Griffith, AD Joseph… - Communications of the …, 2010 - dl.acm.org. The Economist. 2009-10-15. Retrieved 2009-11-03.
Title | :: |
Accelerating The Degradation Kinetics of Azo Dyes Using Iron Oxide Nanoparticles |
Country | :: |
India |
Authors | :: |
Priyanka Patel || Sudheer Lingayat || Nitin Gulvi || Purav Badani |
Page | :: |
81-88 |
Azo dyes have a wide spread industrial applications. When released in water bodies, these dyes hinder the penetration of light which results in adverse effects on aquatic life. Hence it is pertinent to treat the dyes before their discharge in environment. Present work focuses on degradation of azo dyes (via chemical route) using NaBH4 as a reducing agent. For this purpose, Fast Sulphone Black F (FSB-F) dye was used as a model system. FSB-F has an absorption maxima (λmax) at 464 nm in aqueous medium. On reduction, FSB-F is converted into its corresponding leuco-form which has poor absorption in visible region. Time required for complete degradation of FSB-F was observed to be ~ 7 hrs. With a view to enhance reaction kinetics, system was loaded with iron oxide nanoparticles, keeping all other experimental conditions identical. In presence of iron oxide nanoparticles, complete degradation of dye was accomplished within 1 hr. Thus, our study suggests that nanoparticles plays a potent role as catalyst for reaction involving dye degradation
Keywords - Azo dyes, Fast Sulphone Black-F, Iron oxide nanoparticles, NaBH4, Reduction Kinetics
Title | :: |
Secure Transfer of University Question Paper Using Image Steganography |
Country | :: |
India |
Authors | :: |
Sanjeev Bhogan || Sai Kumawat || Ajay Chawla || Aditya Chaudhary || Prof. Snigdha Bangal |
Page | :: |
89-92 |
This paper discusses on how the security of question paper delivery can be enhanced by image steganography. There are a lot of cases of university question paper leakage. Due to this, university has undergone various problems in order to tackle this event. The current system that the university uses for question paper transfer is based on face detection which is not very reliable and can be exploited. Moreover, this transfer process is not very secured and is a complex process, so we have developed our system to enhance the security of the transfer process.
© 2019 All Rights Reserved | Design by iosrjen