The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-5 Published (Acceptance Ratio=27.27%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-5 Issue-2(April 2017)
    Title: Cloud Security based on Cryptography, Data Fragmentation, Distribution and Replication Model: A Survey and Characterization
    Authors: Diljit Kaur and Dapinder kaur
    Abstract: Data outsourcing is new model that offer reliable optimized storage and accessibility to the users by hosting their data in the cloud as per pay basis. Maintaining the confidentiality of data from the service provider is the challenge presented by the growth of data into bigger size and exponential increase in use of cloud services. The cloud service providerís (CSP) are paying less attention to the data security of the end user by only keeping the infrastructure based security for protection of the cloud environment or traditional PKI(Public Key Infrastructure) based security such as encryption and decryption but these impose high computational load on the server. But these techniques impose the extra computation overhead in the userís data protection in the framework of cloud computing and also these depend upon the selection of encryption algorithm and its key to determine the efficient algorithms. Recently the researchers and CSPs incubate the capacity of data fragmentation and its dispersal on multiple cloud nodes to overcome the threats implanted by the attackers. In this way, the security problem is solved into two fold way: attacker does not have idea where the exact data is located in cloud environment and the data is fragmented into pieces with efficient algorithm, thereby attacker will not be able to get the exact size of the data. This paper explored the data security to protect the userís data by applying the encryption and data fragmentation techniques proposed in the history of research. The review of data encryption, data fragmentation, distribution and its retrival is presented to get the internal capabilities of each proposed techniques and framework.
    Click Here to Download Pdf
    Title: An Implementation View for NEWS Recommendation System
    Authors: Ms. Surbhi Ambulkar and Prof.Mayank Bhatt
    Abstract: In day to day life we donít know that recommender system have become a part of web world. Newspaper, shopping bill payments are just a click away due to digitization. These days in busy life user wants to access information in quick and efficient manner. Filtration should not be their part is major concern. Proposed solution will refine content on popularity, impact and user preference basis. User desired news will be displayed effectively and systematically. The given solution gives most appropriate news as per the input given by user. For best output the algorithm used is popularity algorithm and association rules. The implementation will be done using java technology.
    Click Here to Download Pdf
    Title: A Novel Approach for Removal of Redundant Test Cases using Hash Set Algorithm along with Data Mining Techniques
    Authors: Pandi Jothi Selvakumar and Dr.K.Thyagarajan
    Abstract: Software Testing is a process of ratifying the functionality of software. It is a crucial area which consumes a great deal of time and cost. The time spent on testing is mainly concerned with testing large numbers of unreliable test cases. The authorsí goal is to reduce the numbers and offer more reliable test cases, which can be achieved using certain filtering techniques to choose a subset of existing test cases. The main goal of test case selection is to identify a subset of the test cases that are capable of satisfying the requirements as well as exposing most of the existing faults. Authors used the Data mining approach, mainly because of its ability to extract patterns of test cases from complex and invisible data set. In Data Mining, there are numerous algorithms and methods available to extract irredundant data. In this paper, Authors generate test cases based on the Software Requirements Specifications document and apply Feature Selection: Filter method along with Hashing technique on those redundant test cases to make it irredundant. Later, the authors produce the comparison of the applied techniques to identify the number of unique effective test cases out a total.
    Click Here to Download Pdf
    Title: Intelligence Attendance System based on Face Recognition using the KLT Algorithm
    Authors: Shashank sanket
    Abstract: Face detection is a computer technology being used in a variety of applications that identifies human faces in digital images. Face detection also refers to the psychological process by which humans locate and attend to faces in a visual scene.Face detection can be regarded as a specific case of object-class detection. In object-class detection, the task is to find the locations and sizes of all objects in an image that belong to a given class. Each possible face candidates is normalized to reduce lightning effect caused due to uneven illumination and the shirring effect due to head movement. The fitness value of each candidate is measured based on its projection on the eigen-faces. After a number of iterations, all the face candidates with a high fitness value are selected for further verification. At this stage, the face symmetry is measured and the existence of the different facial features is verified for each face candidate. Traditional method for taking attendance is lecture calling student name and record the attendance in sheet. For each lecture its wastage of time. It is very difficult to verify each and every student in a large classroom. To avoid these losses, we use automatic attendance system. The proposed system describes a method like when he\she enters the class room and marks the attendance by extracting the image using Personal Component Analysis (PCA) algorithm. The system will record the attendance of the student in class room environment automatically. The student database is collected. The student database includes name of the students, there images & roll number. It maintains a log report entry of each student with respect to each subject and also generates a report of the student attendance.
    Click Here to Download Pdf
    Title: A Hybrid Cryptographic Algorithm for Secure communication
    Authors: Ms. Mayuri wagh and Prof.Hemant Gupta
    Abstract: Security is way to get assures that entire execution will be happen with trust factor. It gives completely different culture to operate while communication. Security highlights gives assurance about protection of data and communication from unapproved utilization as well as access. . It can be state as the tool or mechanism to keep up security and assurance of data from risky circumstance. Security is the basic need which should be present in any application. For achieving security six different features can be defined as confidentiality, authentication, integrity, non-repudiation and availability. Of this confidentiality, authentication and integrity are the major principles and mandatorily integrate with application. This paper discusses the need of security and existing mechanism. It also discusses the problems present and the way in which it can be resolved.
    Click Here to Download Pdf
    Title: Big Data Analysis : Data Management in Microblogs
    Authors: Rashmi Gopal Mate and Mohd. Saif Wajid
    Abstract: The growing complexity of micro blogging services in term of size, number of users and verity of bloggers relationships have generated big data which requires innovative approaches to manage data. We have three methods like query language, indexing and query processing, and main memory management.
    Click Here to Download Pdf
    Title: Analysis of Pre-processing Methods using MRI Images
    Authors: Neeraj Battish and Dapinder Kaur
    Abstract: In medical field, MRI images are used to detect different types of diseases. Images are formed using sensors. These images need to be clear and more accurate to make detection more easy and clear. Pre-processing is the first step of the any processing systems in Medical Image Processing. It is an important and challenging factor in the computer-aided diagnostic systems. In this paper, different pre-processing methods are analyzed and then quality of an image is measured using statistical parameters. To analyze performance the sample data from hospital is collected. This data will further use for tumor detection.
    Click Here to Download Pdf
    Title: Enhancement Methods and Techniques for Brain MR Imaging
    Authors: Harsmeet Singh and Jagbir Singh Gill
    Abstract: In this paper, it is wanted to audit the different strategies for enhancing a DICOM of brain utilized as a part of pre-handling and division procedures. In preprocessing and upgrade stage is utilized to take out the clamor and high recurrence parts from MRI picture. Image division is the way toward dividing a image into numerous sections, So as to change the portrayal of a picture into something that is more important and less demanding to examine. A few strategies and systems have been created for image improvement. This paper portrays the distinctive Enhancement procedures utilized as a part of the field of ultrasound, MR Imaging.
    Click Here to Download Pdf
    Title: Performance Improvement of Secure Ad-Hoc On-Demand Distance Vector With Optimized Trust Management
    Authors: Klaudia Ndadhina Makili
    Abstract: Ad-Hoc Network allows nodes to communicate with each other without a presence of any infrastructure or central administration. However, the absence of infrastructures presents many security threats among nodes within the network. Since, communication between nodes should be reliable; therefore MANETs' protocols must accommodate the communication reliability. Moreover, the wireless channel and possibility of nodes misbehaving (malicious nodes), leads to the introduction of security mechanisms to prevent attacks within the network. The introduction of Trust Management System which is implemented on the Optimized Secure Ad-Hoc On-Demand Distance Vector (SAODV) protocol can protect the network against many attacks from malicious nodes, causing wireless communication to be reliable and to be highly secure. In this contribution, the black and gray attack will be detected and communication will not be disrupted. Additionally, an energetic analysis will be done on the Optimized SAODV with Trust Management and security mechanisms which are implemented within the network.
    Click Here to Download Pdf
    Title: Evaluation of Scheduling Mechanisms in Cloud Computing
    Authors: Harpreet Kaur, Dr. Manish Mahajan and Nitika Sharma
    Abstract: Cloud computing is the basic popular expression in today's Information Technology. Cloud computing stages are quickly developing as the favoured alternative for facilitating applications in numerous business settings. A vital component of the cloud that separates it from conventional administrations is its clearly unending measure of asset limit (e.g. CPU, Network, and Storage) offered at an aggressive rate. It disposes of the requirement for setting up framework which takes a while. New businesses require not contribute on the framework in light of the fact that the assets are accessible in the cloud. Cloud computing empowers clients to obtain assets progressively and flexibly. A noteworthy test in asset provisioning and planning method is to decide the appropriate measure of assets required for the execution of work keeping in mind the end goal to limit the monetary cost from the viewpoint of clients and to augment the asset usage from the point of view of specialist co-ops. This paper will give the data about the different existing mechanisms.
    Click Here to Download Pdf
    Title: Routing in Opportunistic Network: A Challenging Field
    Authors: Tejinder Kaur Khattra, Dr. Manish Mahajan and Harpreet Kaur
    Abstract: In opportunistic networks, hubs come into contact with each other opportunistically and convey remotely. Opportunistic networks are human-driven in light of the fact that they opportunistically take after the way people come into contact. In this way, opportunistic networks are firmly combined with informal communities and can misuse human connections to manufacture more effective and reliable conventions. Opportunistic Routing is another perspective in coordinating for remote sensor sorts out which picks the closest center point to the target center point for sending the data and for up-reviewing trades between compact wise devices. In this article, we have explained the fundamental idea of Opportunistic Network and Opportunistic steering with various regions in which it has been asserted to be helpful.
    Click Here to Download Pdf
    Title: N-QUEENS Problem Using GA and MA for Optimizing Space Complexity
    Authors: Er. Vishal Khanna, Er. Sarvesh Chopra and Er. Abhishek Bhardwaj
    Abstract: The N-Queens problem is well-known NP-hard problem. In this research study, we use Memetic Algorithm (MA) to optimize N-Queens problem and make complexity analysis on the parameter viz. space. It is a hybrid algorithm, being a combination of the Genetic Algorithm (GA) and a local search algorithm. The performance of the MA is found to be superior to that of a solitary algorithm like GA. The MA solves the N-Queens in two stages. In the first stage, the randomly generated solutions are evolved till they become feasible (i.e., the hard constraints are satisfied) and in the second stage, these solutions are further evolved so as to minimize the violations of the soft constraints. In the final stage, the MA produces optimal solutions in which the hard as well as the soft constraints are completely satisfied.
    Click Here to Download Pdf
    Title: A Novel Approach towards Providing Security to the Images by Using Encryption and Compression Mechanism: A Review
    Authors: Ujwala N. Dhanule, Viplavi N. Harne and Prof. V.B.Gadicha
    Abstract: Image encryption has to be conducted prior to image compression in many applications. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. Here we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compression is considered. The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security. We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. More notably, the proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy image coders, which take original, unencrypted images as inputs. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency.
    Click Here to Download Pdf

    QR Code

    IJMCS