The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-5 Issue-4(August 2017)
    Title: Video Coding Standards - A Review
    Authors: Dr.V.Murugan, T.Ilamparithi and Dr.R.Balasubramanian
    Abstract: In todayís world, the usage of data in the form of video is increasingly rapidly which requires a large amount of data for storage. Video is a group of images or frames. Here the individual frames are transferred at a faster rate. Basically we transfer 25 frames per second for a movie. Instead of transferring frame by frame, only the difference between the frames has been sent which results in reduction of storage space and also saves the time which it is transmitted over the network. This paper gives the survey of various video compression techniques namely MPEG (Motion Picture Expert Group) and H. 26X Family, Which help us to know the features advantages and disadvantages of these techniques.
    Click Here to Download Pdf
    Title: A Novel Approach towards Translating SQL Queries into Spreadsheets
    Authors: Tasnim T. Hajiwala and Prof. Santosh A. Shinde
    Abstract: SQL(Structured Query Language), in todayís digitalized world, is present everywhere, since enormous amount of data is being collected every second and stored into the database. Also, SQL Queries can efficiently and very quickly retrieve large amounts of records from database. On the other hand, Database Management Systems require sophisticated hardware and software and highly skilled personnel. There are lot of government and private organizations whose data is in spreadsheet format. Spreadsheets also have diverse features like statistics, visualiza- tion, reporting, etc. To avail the RDBMS functionalities, they either need to log shift the data or a query compiler which will execute relational queries over this data and hence migration would no longer be required. And hence, the proposed system that provides a query compiler, which translates a given SQL queries into a worksheet of the same semantics. Queries could be defined using a high level language. We propose a system where the SQL Queries like simple SELECT, SELECT with Conditions, GROUP BY, ORDER BY, JOIN, VIEWS could be easily executed on spreadsheets. Our further contribution to the proposed approach is 'Log Shifting' of spreadsheet data into relational tables.
    Click Here to Download Pdf
    Title: A MCDM Based Technique in Wireless Networks
    Authors: Heena Sharma
    Abstract: A MCDM based technique for smooth handover in wireless networks is presented in the paper. In the future, people have even more flexibility when true wireless internet and real-time multimedia are provided seamlessly over heterogeneous wireless network. Also, various applications demand different quality of service (QoS) parameters. The goal is to select the best network that can support the required service(s) and avoid excessive switching among different networks in order to minimize service interruptions and power consumption. The vertical handover scheme is proposed for conversational, streaming and interactive applications. In this multi- hierarchy decision making process the best suited Analytical Hierarchy Process(AHP) is applied for the decision making process in vertical handover. The proposed scheme of vertical handoff provides higher QoS than the earlier than the earlier algorithms. All the unnecessary vertical handover we controlled by proposed scheme. The results show that the proposed scheme provides low traffic applications and overall system throughput with a control of unnecessary handoffs for all kinds of services. Also, parameterized utility functions are used to model the different Quality of Service (QoS) attributes (data rate, delay, and jitter) and user preferences (cost) for three different types of applications. Finally, scores are calculated exclusively for each network by two MADM (Multiple Attribute Decision Making) methods, TOPSIS (The Technique for Order of Preference by Similarity to Ideal Solution) and AHP (Analytic hierarchy process).
    Click Here to Download Pdf
    Title: Secret Data Hiding in H.264/AVC Compressed Videos
    Authors: S.Saraswathi and K.Blessing Christiana
    Abstract: Digital video needs to be stored and processed in an encrypted format to maintain security and privacy. For the purpose of content notation and/or tampering detection, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. In this paper, a scheme of encrypted data hiding directly in the encrypted version of H.264/AVC video stream is proposed, which includes the following three parts, i.e., H.264/AVC video encryption, data embedding, and data extraction. Information hiding methods in H.264/AVC compressed video is illustrated by using various data representation schemes such as bit plane replacement, spread spectrum, histogram manipulation, and matrix encoding. Furthermore, video file size is strictly preserved even after encryption and data embedding. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.
    Click Here to Download Pdf
    Title: A PERLUSTRATION ON WEB USAGE MINING
    Authors: Dr. K. Prabha and T.Suganya
    Abstract: Web usage mining is a type of web mining which exploits data mining techniques to discover valuable information from navigations of web uses, application of data mining techniques to web worthwhile data in order to extract usage patterns. The performance of web information retrievals and web based data warehousing are boosted with the extraction of information from the web using web mining tools. And web usage mining is one of the fastest developing areas of web mining, thus this activity that involves automatic discovery of user access patterns from one or more web servers. This paper provides an exploration about web usage mining analysis of concepts, ranking, and applications.
    Click Here to Download Pdf
    Title: Secure Data Transmission by using Image Steganography: A Study
    Authors: Bharti Sharma and Sachin Sharma
    Abstract: Internet is a public network that is used to transfer secret data from one place to another place. Data security is a basic need of people who communicate through the internet. Data security means providing security to sensitive data from unauthorized access and intruders. Today lots of technique has been developed to provide secrecy to secret data like cryptography, watermarking, and steganography. Cryptography provides security to secret information by converting plain text into cipher text but it doesnít hide the existence of secret data so intruders can easily detect the secret information. Steganography is an art and science of technology that is used to provide security. Steganography provides more security to the data by hides the existence of secret data so that human eyes canít able to see the hidden information. In steganography technology data is hidden into the cover media like text, image, and audio/video. In this paper, we are giving some views in the development of image steganography. The image steganography technique is selected because it provides good capability for securing information without easily discovering by human visual system.
    Click Here to Download Pdf
    Title: Fundus Images Based on Hybrid Neighbourhood Estimator before Filling with Fuzzy Based Filtering
    Authors: Manpreet Kaur and Jagbir Singh Gill
    Abstract: Segmentation means allocating tag to every pixel of image so that pixels having same label share definite visual traits. Automatic segmentation of fundus image plays an important role in detection of eye diseases. Accurate vessel segmentation in retinal images is an important and difficult task. Detection is made more challenging in pathological images with the presence of exudates and other abnormalities. Several methods of retinal vessel segmentation are proposed which can detect the exudates in fundus images in more promising manner. In this paper proposed a hybrid Neighborhood estimator before filling with fuzzy based filtering segmentation which enables us to segment vessels even in low intensity of images.
    Click Here to Download Pdf
    Title: Improved Coarse Estimated Atmospheric Veil Algorithm by using Hybrid Filters and Dark Channel with large Haze Gradients
    Authors: Tanu Mahajan and Jagbir Singh Gill
    Abstract: Fog phenomena bring about air flow gentle generating and also decline this awareness involving made from photograph caught in the camera. To increase awareness, air flow gentle evaluation is essential regarding photograph errors removal. As air flow gentle can be quite dazzling, this conventional methods immediately select dazzling p regarding air flow gentle estimation.In this paper improved/ hybrid bilateral filters and dark channel prior based haze removal algorithm is proposed. The dark channel prior can automatically extract the global atmospheric light and roughly eliminate the atmospheric veil. To make dark channel prior more effective, the atmospheric veil has been refined by using hybrid bilateral filters as well as it able to produce a haze free image in more optimistic manner. The use of improved/hybrid bilateral filters has improved the coarse estimated atmospheric veil by reducing halo artifacts
    Click Here to Download Pdf
    Title: Proposing a Mobile Application Interface for Obstacle Free Routing
    Authors: Manjinder Kaur and Prof. Sukhjit Singh Sehra
    Abstract: There are number of applications available for providing navigation services, like Google Maps, waze, HERE and MapQuest. These applications are for road network transportation facility, but there is a need of mobile application development for railway network too. From past years, it is been observed that any collision between train and human have always resulted as a loss of properties as well as human being. To save society from these kinds of accidents, there arises a need of developing obstacle free routing application. Here considered obstacle is railway tracks. In this application, the obstacle is calculated in such a way that using heuristic approach the arrival time is predicted before the arrival time of train. Thus the accidents can be reduced.
    Click Here to Download Pdf
    Title: Development of Cloud Based Adaptive Congestion Control Smart Traffic Management Systems
    Authors: M.R.Sundarakumar
    Abstract: Today Bangalore is obviously one of the most sought after cities in the country what with the rapid growth in the IT industry and the rise in the number of job opportunities in the city. With the rising population in the city there is also a corresponding increase in the number of vehicles in the city and a huge increase in the demand on land. Rapid population growth because of IT and other associated industries in Bangalore led to an increase in the vehicular population to about 1.5 million, with an annual growth rate of 7-10%. With the increase in population and the expansion of the city, the problem of connectivity of the populace has arisen. Quite obviously personalized modes of transport have grown at a tremendous rate and two wheelers along with the cars almost comprise 90% of the total registered vehicular population in the city. Two wheelers constitute more than 70% of the total volume, while cars comprise 15%, autos 4% and the remaining 8% includes other vehicles such as buses, vans and tempos. Due to this and bad traffic management it is becoming increasingly difficult to commute in the city. Designing a promising traffic management system to provide smooth traffic flow in non-recursive congestion situation can be an interesting issue for future research.
    Click Here to Download Pdf

    QR Code

    IJMCS