The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-5 Published (Acceptance Ratio=27.27%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-4 Issue-6(December 2016)
    Title: Enhanced Crop Yield Prediction And Soil Data Analysis Using Data Mining
    Authors: Ms.P.Kanjana Devi and Ms.S.Shenbagavadivu
    Abstract: Agriculture is a backbone of Indian economy that is the main income source for most of the population in India. So farmers are always curious about yield prediction. Crop yield depends on various factors like soil, weather, rain, fertilizers and pesticides. Several factors have different impacts on agriculture, which can be quantified using appropriate statistical methodologies. Applying such methodologies and techniques on historical yield of crops, it is possible to obtain information or knowledge which can be helpful to farmers and government organizations for making better decision and policies which lead to increased production. The objective of the work is to compare various data mining techniques which gives the maximum accuracy. Data mining is only the way that assists to convert huge data into technologies and make them available to the farmers. The huge amount of data can be utilized to mine nugget of knowledge that can be useful for farmers and decision makers to take effective and prompt decision. In this paper one of major parameter which is used to increase crop production is considered; that is soil. Different classification algorithms are applied to soil data set to predict its fertility. This paper focuses on classification of soil fertility rate using K-Means, Random Tree, and Apriori.
    Click Here to Download Pdf
    Title: Information Retrieval Systems: Challenges and Issues
    Authors: Dr. D. Durga Bhavani
    Abstract: This paper examines the status of the traditional methods and measures, and the rationale of evaluating information retrieval algorithms in an interactive system environment. This paper reviews late research endeavors that concentrate on the digital searching and retrieving of documents. Major focus is entirely on the retrieval of information in response to user queries. This paper concentration on the algorithm and approaches for information retrieval systems, and also delivers clarifications of the fundamental problems that occur and how people have addressed them in the past. It focuses on only one serious problem, specifically, the enhancement of retrieval accuracy.
    Click Here to Download Pdf
    Title: An Efficient (EEMRP) Protocol for MANET
    Authors: Sanjay Kumar Sahani and Raghav Yadav
    Abstract: Saving energy and increasing network lifetime are significant challenges in the field of Wireless Sensor Networks (WSNs). Energy-aware routing protocols have been introduced for WSNs to overcome limitations of WSN including limited power resources and difficulties renewing or recharging sensor nodes batteries. Furthermore, the potentially inhospitable environments of sensor locations, in some applications, such as the bottom of the ocean, or inside tornados also have to be considered. Zig Bee is one of the latest communication standards designed for WSNs based on the IEEE 802.15.4 standard. The Zig Bee standard supports tworouting protocols, the Ad hoc On-demand Distance Vector (AODV), and the cluster-tree routing protocols. These protocols are implemented to establish the network, form clusters, and transfer data between the nodes. The AODV and the a new protocol energy efficient mobile routing protocol(EEMRP) are two of the most efficient routing protocols in terms of reducing the control message overhead, reducing the bandwidth usage in the network, and reducing the power consumption of wireless sensor nodes compared to other routing protocols. However, neither of these protocols considers the energy level or the energy consumption rate of the wireless sensor nodes during the establishment or routing processes. This thesis aims to develop a methodology for WSN routing protocols to consider the energy level of sensor nodes through the establishment and routing processes in order to increase the network lifetime and reduce the energy consumption rate of wireless sensor nodes. . Finally, we develop a method for discovering the optimum communication routes based on the energy level of the intermediate sensor nodes, on the route between a source node and a destination node, in a WSN. All the aforementioned approaches contribute in increasing the lifetime of the WSN, and distributing the power consumption among the wireless sensor nodes. We demonstrated proposed techniques through simulations accomplished using NS-2 simulator. All the simulation results have verified the remarkable improvement of performance in term of reducing the power consumption rate and increasing the lifetime of the WSN compared with the original AODV and energy efficient mobile routing protocol (EEMRP).
    Click Here to Download Pdf
    Title: An Approach – Cluster Head Selection Using Fuzzy Logic In Wireless Sensor Network
    Authors: Upasana Sharma, Manju Bala and Varsha Sahni
    Abstract: The most important goal of the wireless sensor network routing protocol implementation is balancing network energy consumption and increasing the entire network lifetime. CCWM is a weight based clustering protocol, used for selection of appropriate cluster heads in the network and formation of balanced clusters. But it has some problems like the cluster construction and energy management. In clustering, nodes that have been cluster head in one iteration, cannot become cluster head again for next rounds. Also, the cluster head selection each round is random. It does not distribute the energy load among all sensor nodes to minimize the energy consumption and it is an unconsidered factor which affect the nodes performance in the network. Therefore, to Achieving Energy Efficiency in Wireless Sensor Networks an improved Clustering Routing Protocol is proposed which uses Fuzzy Logics to choose the cluster head and thereby improving the energy consumption of wireless sensor network and prolong its system lifetime.
    Click Here to Download Pdf
    Title: An Overview of Public Key Cryptography
    Authors: Ajit Karki
    Abstract: In the globalization era, cryptography becomes more popular and powerful; in fact it is very important in many areas (i.e. mathematics, computer science, networks, etc). Cryptography is one of the main constituent of computer security. To meet a user’s needs cryptographic algorithm needs to be selected on the basis of attributes like security and performance. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. Cryptography systems can be broadly classified into two categories: Symmetric encryption algorithms and Asymmetric encryption algorithms RSA and ECC are asymmetric key cryptographic algorithms. This paper provides an overview and comparison between the RSA cryptosystem and elliptic curve cryptography, which both focus on sending and receiving messages. RSA is the most popular public-key cryptosystem today but long- term trends such as the proliferation of smaller, simpler devices and increasing security needs will make continued reliance on RSA more challenging over time. Hence Elliptic Curve Cryptography (ECC) is a suitable alternative. Here, the algorithms studied and compared are RSA and ECC. The RSA Cryptosystem and elliptic curve cryptography theories are quite similar but elliptic curve cryptography is more complicated.
    Click Here to Download Pdf
    Title: Virtualization: The effective and efficient way to optimize Data Center
    Authors: Amol S. Gadkari and Nitin R. Suradkar
    Abstract: Today's enterprises have large “server farms” running several computing clusters for their computational needs. Some of these farms occupy large tracts of floor space that it is rather impossible to add additional servers to meet the need of every growing computational demands. Data centers form a key part of the infrastructure upon which a variety of information technology services are built. They provide the capabilities of centralized repository for storage, management, networking and dissemination of data. These servers consume huge energy without performing useful work. The proposed paper helps Data Center managers to properly implement virtualization technology in their data centers to make them effective and efficient which helpful for Educational organizations and IT industries.
    Click Here to Download Pdf
    Title: Big Data and Hadoop: A hand in Hand Approach
    Authors: Ankit Sharma and Surabhi Sharma
    Abstract: In the today's world of information technology, Data are continuously generated by electronic devices like computers, mobile phones, and digital machines. Data are also generated by large-scale simulations, astronomical observatories, Video Conferencing, government and banking transactions, or high-resolution monitoring. All this Data or information which is generated and stored onto electronic storage devices can be used for new discoveries if researchers have enough tools to extract knowledge from this core. Hadoop is one such Software platform that processes huge amounts of digital Data i.e. Big Data. Hadoop can handle data from structured and unstructured systems, log files, sound and graphic files, communications records, server logs etc. In this paper, we discuss the concept of Big Data along with its characteristics. Also, all the sources of Big Data are discussed. Lastly, we discuss Hadoop - a platform that provides a solution for Big Data problem.
    Click Here to Download Pdf
    Title: Opportunities and Challenges Linked with Ubicomp, A Computing Technology that can Trigger the Impending Internet Revolution of Invisible Computers
    Authors: Jayalakshmi R.
    Abstract: If you can dream of your car finding out a parking lot by itself or the racks in the super market reordering a particular product from the inventory department, then you are ready to welcome the next Internet revolution which is mainly rooted in ubiquitous computing. Ubiquitous computing, also called pervasive computing is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. This paper gives a brief idea about ubicomp, the underlying technologies and its relevance related to the forthcoming Internet revolution. The paper also focuses on the major opportunities and challenges in connection with ubicomp. The paper concludes by giving an idea about the relevance of ubicomp in the modernization of Internet to make into reality the existence of a digital world of responsible human beings and invisible computers.
    Click Here to Download Pdf
    Title: A Mean based Algorithm for Object Tracking using Artificial Neural Network
    Authors: Tamanna Nagpal and Sourav Garg
    Abstract: Detection and tracking are important area of research in the video processing. Object tracking is the process of locating the objects in the video sequence. Video is basically the collection of similar frames that are moved at constant speed that human eye perceives that they are actually moving. Various algorithms have been developed to track the object in the video sequence. This paper discusses the working of two tracking systems using mean position estimation and a proposed system using quantized pixel area shift calculation using color binarization difference mapping. The performance of both the systems is analyzed on the basis of noise, motion and blur.
    Click Here to Download Pdf
    Title: Enhance the Security using Diffie-Hellman Algorithm in Cloud Computing
    Authors: Ms. Amandeep Kaur and Mr. Sanjeev Kakkar
    Abstract: Cloud security is the main issue over the wide area network. Cloud computing provide various types of services like software, platform and application as a service. These services are accessed through internet. Cloud provide services on demand, user can pay according to access. That’s why today organizations prefer cloud services. Cloud computing provide various services but security is the main issue in cloud. In this paper security enhanced on data using Diffie-Hellman algorithm. This approach prevents threats and enhance the security.
    Click Here to Download Pdf
    Title: A Mean based Local Kernel Algorithm for Video Restoration using Artificial Neural Network
    Authors: Ankita Goyal and Sourav Garg
    Abstract: Video restoration is the emerging field of the research that deals with processing of the videos to get the original video from the degraded video. Imago restoration is basically performed to enhance the quality of the video. Various algorithms have been developed to restore the original video. The proposed system is based on .This paper discusses the various results of the proposed system. Performance of the proposed system has been analyzed on the basis of various parameters.
    Click Here to Download Pdf
    Title: Image Enhancement Using Fuzzy Morphological Transformations
    Authors: Dillip Ranjan Nayak
    Abstract: This paper proposes a new approach to enhance the poor contrast of images using fuzzy morphology and Weber’s law notion. Image enhancement techniques are concerned with improving the quality of the digital images. First image is modified with Gaussian membership function. Then we applied fuzzy Weber’s method with Morphological Transformations for improving the contrast.
    Click Here to Download Pdf
    Title: Invisible Eye- The Modern Security System
    Authors: Nidhi Sharma and Hina
    Abstract: As crimes and thefts are incredibly increasing day by day, it is the necessity of time that we need an advance system for security that is less complex and very much cost effective. Also can be easily installed anywhere. In today’s era we use multiple cameras that are located at each and every corner to capture the intrusions and any type of activity. They record moment so need a large storage space. Alternatively, we can use an invisible eye- A single camera based system that is easy to install and afford. It slews around the room and record only when it is alerted by the intrusion in the room or the place where it is installed. So we can save extra storage by eliminating recording every moment. It also saves time as the manager will get the footage only of intrusion. The manager or owner is notified by email as and when any intrusion is detected.
    Click Here to Download Pdf
    Title: Medical Image Enhancement Using New Fuzzy Logarithmic Exponential Function
    Authors: Dillip Ranjan Nayak
    Abstract: This proposed paper proposes a novel image enhancement method using fuzzy exponential function. Fuzzy Enhancement is a pre-processing method which improves the brightness of the image. But fuzzy logarithmic exponential function improves the contrast of images in accurate manner. Experiments on several medical images are performed and the results are compared with the existing fuzzy enhancement methods. It is observed that the results using the proposed methods are found to be so better.
    Click Here to Download Pdf
    Title: An Efficient Ranked Search on Encrypted and Outsourced Cloud Data
    Authors: Raju Dara and R.Madhavi
    Abstract: Infrastructure as a Service (IaaS) in cloud computing has been helping people and organizations to outsource their data. Mainly storage space of cloud is used for this purpose. In this context it is important to secure data besides allowing access to users of it. In order to achieve this many encryption standards came into existence. Data owners outsource their data to cloud after encrypting the data. The problem with such data is searching on the encrypted data and making changes of the data is not easy as the data is in the form of cipher text. Many schemes have been introduced by researchers of late to overcome this problem. However, many of the solutions focused on single word search. In this paper we propose an efficient and dynamic multi-keyword ranked search on the encrypted cloud data. We used information retrieval mechanisms and TF/IDF approach in order to have efficient model that can help in supporting multi-keyword ranked search. We built an application to show the functionalities of the proposed system. Our empirical results revealed that the scheme was efficient and works fine with secure and dynamic ranked search on the outsourced cloud data.
    Click Here to Download Pdf
    Title: Efficient Joint User Pairing and Precoding Method for MU-MIMO Broadcast Channel with Limited Feedback Scheme
    Authors: Miss. Padmaja Mishra
    Abstract: In the present research scenario communication being the centre of attraction and most of the people want to be the part of it. The rapid growth rate of wireless communication services put tremendous pressure to make efficient communication system with desired performance and at the same time the designed system must be reliable enough. From the study we know the physical inclination of wireless sensor networks have some limitation for the development of high speed and quality service transmission. Here channel characterization plays very vital role before we move forward to the benefits of wireless channel. When large numbers of users are served from one cell, high capacity gains can be achieved by transmitting independent data streams to different users sharing the same time frequency resources. This multi-user multiple- input multiple- output (MU-MIMO) method solves the above issue. When we focus on broadcast downlink, co-channel interference reduces the system throughput. In our proposed work we try to reduce CCI side effects. In our proposed work we also try to improve the communication system by reducing the noise factor, improving the response time by efficient spatial diversity gain, multiuser diversity gain and spatial multiplexing gain. Here we enhance the user scheduling by using SLNR (signal to leakage plus noise ratio) scheme. Whereas traditional scheduling method based of SINR (signal to interference plus noise ratio).Our system based on two important criteria, validity of user based on relative leakage factor and then scheduling is done on the basis of highest SINR values. The Channel State information again polishes the performance of channel. We ensure that our proposed method outperforms than existing old methods by simulation outputs and results.
    Click Here to Download Pdf
    Title: A Novel Script Recognition Mechanism using the Shape and Texture based Features with SVM algorithm
    Authors: Iqbaljeet Singh and Dr. Gurpreet Singh Lehal
    Abstract: The script classification algorithms require the number of the computations and feature transformations along with the normalization and automatic categorization. In this thesis, the multi-category dataset has been incorporated with the robust feature descriptor using the scale invariant feature transform (SIFT) along with the multi-category enabled support vector machine (SVM). The multi-category support vector machine (SVM) has been designed with the iterative phases to make it able to work with the multi-category dataset. The SVM represents the training samples of main class as the primary class in every iterative phase and all other training samples are categorized as the secondary class for the support vector machine classification. The proposed model is made capable of working with the variations in the script image dataset, which are noticed in the form of the color, texture, light, image orientation, occlusion and color illuminations. Several experiments has been conducted over the proposed model for the performance evaluation of the script recognition system in the proposed model. The results of the proposed model have been obtained in the form of the various performance parameters of statistical errors, precision, recall, F1-measure and overall accuracy. The proposed model has clearly outperformed the existing models in the terms of the overall accuracy. The proposed model improvement has been recorded higher than ten percent for all of the evaluated parameters against the existing models based upon shape, texture etc.
    Click Here to Download Pdf
    Title: Ghost Imaging using A Novel Phase Modulation Patterns for Efficient and High Secured Optical Encryption
    Authors: C. Nithiya and R. Sridevi
    Abstract: In this paper, we propose Computational ghost imaging based optical cryptography (CGI-OC) in which invertible matrix modulation is utilized to enhance the security. But, CGE-OC is vulnerable to detect a plaintext attack which indirectly limits the performance of cryptography. And also, CGI-OC is not applicable in case of using different series of phase-only masks for encryption. Hence, labyrinth-like phase modulation patterns are introduced in Proposed High Security Optical Encryption technique. In this paper, single phase only mask is pre-set and series of random phase-only masks are generated using labyrinth-like phase modulation patterns for encryption process. Thus, the developed technique can save storage space and also improves the security level through effective cryptographic process.
    Click Here to Download Pdf
    Title: Proficient and Enhance The Mobile Ad-Hoc Network Using Routing Protocol and EBFOA (Enhanced Bacteria Foraging Optimization Algorithm)
    Authors: Sonia dhawan and Harkomalpreet Kaur
    Abstract: MANET is self-configured network in which every node is free to move in any direction and connect to each other by wireless network. In order to make communication among nodes, the nodes periodically build paths among others. The behaviour and structure of such networks makes it attractive to various types of attackers. There are a few sorts of attacks in MANET and wormhole attack is one of them. During this attack malicious node receive data packet from one point in the network and tunnels that data to another mischievous node. The tunnel exist between two malicious nodes is referred to as a wormhole. In this paper the principal focus is on security issues associated with mobile ad hoc networks which are required so as to give secure communication. In mobile ad hoc network security can be enhanced by using routing protocols and clustering techniques. The protocol used to enhance the security is Enhance AODV (Ad-hoc on-demand distance Vector), the key concept used in the procedure is that of multipoint relays. MPRs are selected nodes which advancing broadcast messages during the flooding process. This technique significantly reduces the message overhead as associated to a classical flooding apparatus, where every node retransmits each message when it receives the first copy of the message. In mobile ad hoc networks, the movement of the network nodes may quickly change the topology resulting in the surged overhead message in topology maintenance that is why clustering techniques are used. In one of the recent research work performed, to prevent Black hole attack. Aims and objectives of this thesis work are to design and implement IMPROVED BACTERIA FORAGINING OPTIMIZATION protocol with smartest hole attack and prevent the system for threat using this hybridization. At last evaluate the parameter explain in problem statement.
    Click Here to Download Pdf
    Title: Review on CRM Through Data Mining Techniques and Its Tools
    Authors: S. Induja and Dr.V.P.Eswaramurthy
    Abstract: In Today’s aggressive world, “Customer Retention” action in Customer Relationship Management(CRM) is a more apprenticed issue. Data mining techniques plays a major role in bigger CRM. This paper attempts to go with a new angle by absorption the affair of data mining applications, opportunities and challenges in CRM. It undergoes the affair such as customer retention, customer services, risk management ,etc and also about the widely used data mining tools in CRM. This paper brings about the role of data mining techniques in CRM and a brief study about data mining tools
    Click Here to Download Pdf
    Title: A Priority Based Current Resource Load Balancing Approach for Topical Resource Requirement in Cloud Computing
    Authors: Abhinav Singh and Dr. Maitreyee Dutta
    Abstract: Cloud computing is a new class of network based computing that provides the customers with computing resources as a service over a network on their demand. Cloud computing offers scalability, availability and different services as important benefits. Cloud provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. The unique concept of cloud computing creates new opportunities for Business and IT enterprises to achieve their goals. In cloud computing, usually there are number of jobs that need to be executed with the available resources to achieve optimal performance, least possible total time for completion, good throughput, less processing cost ,short average waiting time and efficient utilization of resources etc. The heap of a distributed computing framework is exceedingly progressive. Diverse clients may require distinctive administrations, and it might prompt burden unbalance between the servers (virtual machines, VMs) in a cloud datacenter. To overcome this issue, client solicitations are sent to a heap balancer and the heap balancer then advances them to the fitting VMs for preparing in cloud datacenters. The capacity of load balancing plans to understand a high proportion of client fulfillment and encourage high asset using in the cloud. The proposed techniques balances the load in such way that there is maximum throughput, less overall response time and processing time as well.
    Click Here to Download Pdf
    Title: Review of Human-Computer Interaction
    Authors: Sofia Singh, Baljinder Kaur and Ramandeep Kaur
    Abstract: The goal of this paper is to give a illustration on the subject of Human-Computer Interaction. The outline incorporates the essential definitions, a study of existing technologies and late advances in the field, normal architectures utilized as a part of the plan of HCI frameworks which incorporates unimodal and multimodal setups, lastly the applications of HCI.
    Click Here to Download Pdf
    Title: Cluster Head Selection Based Energy Efficient Routing Protocol for MANET Using HCH Algorithm
    Authors: Mr. S. RAJASEKAR and Dr. A. SUBRAMANI
    Abstract: In the recent research year clustering in Mobile Adhoc Networks (MANET) has become a crucial research issue, because clustering can improve routing performance of wireless adhoc networks. Clustering is a process that divides the network into nodes group is called clusters. This process includes different phases like cluster formation, cluster head selection, and cluster maintenance. Clustering is one of the approaches for regulating the routing process. Partitioning the network into number of interconnected substructures is called clustering and those substructures are called clusters. Cluster head selection in MANET where it is necessary to provide robustness in the face of topology changes caused by node motion, node failure and node insertion or deletion. In this paper proposed a new algorithm for cluster head selection (primary cluster) in MANET for energy efficient path. This cluster head selection process is based on the high node potential score. The potential score calculation is based on the combination of node mobility, node bandwidth, node energy, and node link quality. The same execute hop1, hop2 and so on until reach the destination to find the path from source to destination. Finally the performance analysis of proposed cluster head selection using Hidden Cluster Head (HCH) algorithm and existing algorithm. This HCH algorithm is executing combination of primary and secondary (HCH) cluster head. The proposed algorithm provides the better performance compare to existing algorithm and also reduces the transmission power with number of nodes, transmission range and mobility is increased.
    Click Here to Download Pdf
    Title: Effective Key Items Search on Databases by using Ranking Algorithm
    Authors: S Govinda Rao
    Abstract: Keyword queries on databases provide easy access to data, but often suffer from low ranking quality, i.e., low precisionand/or recall, as shown in recent benchmarks. It would be useful to identify queries that are likely to have low ranking quality toimprove the user satisfaction. For instance, the system may suggest to the user alternative queries for such hard queries. In thispaper, we analyze the characteristics of hard queries and propose a novel framework to measure the degree of difficulty for akeyword query over a database, considering both the structure and the content of the database and the query results. We evaluateour query difficulty prediction model against two effectiveness benchmarks for popular keyword search ranking methods. Ourempirical results show that our model predicts the hard queries with high accuracy. Further, we present a suite of optimizations tominimize the incurred time overhead.
    Click Here to Download Pdf
    Title: To Study the Relationship between Wireless Technology Tools and Education System
    Authors: Pooja Purohit and Dr Jaishree Jain
    Abstract: Wireless is a term used to explain telecommunications in which electromagnetic waves carry the signal over part or the entire communication corridor, For example monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing. In other word we can say that Wireless Technology will play an important role in education system. Use of wireless technology in education system it has become easier for teachers to import knowledge and for students to acquire knowledge. The use of wireless technology has the process of teaching and learning satisfying. In this paper we describe different wireless tools for education .In this also gives the overview future mobile furniture. How wireless technology play an effective role for learning of students and teaching in classes.
    Click Here to Download Pdf
    Title: A Review on Various Scheduling Algorithms in Cloud Computing
    Authors: Rajpreet Kaur and Vikas Khullar
    Abstract: Cloud computing era refers to a dynamic, scalable and pay-per-use distributed computing model empowering designers to depart this world application amid job designation and storage distribution. Cloud computing offers scalability, availability and different services as important benefits. Cloud provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. The unique concept of cloud computing creates new opportunities for Business and IT enterprises to achieve their goals. In cloud computing, usually there are number of jobs that need to be executed with the available resources to achieve optimal performance, least possible total time for completion, less processing cost, short average waiting time, shortest response time, and efficient utilization of resources etc. Normally errands are scheduled by client prerequisites. New scheduling systems should be proposed to beat the issues proposed by system properties in the middle of client and assets. The new scheduling methodologies might utilize a section of the usual scheduling recommendations to union them in conjunction with some procedure conscious techniques to present options for higher and extra amazing venture scheduling. Job scheduling algorithms believed to be essentially the most hypothetical issues in the cloud computing domain. Countless deep investigations and efforts had been applied in this regard. This paper intends to gift the performance evaluation of varied pre-present job programming algorithms when you consider that various parameters.
    Click Here to Download Pdf
    Title: Technique of Data Hiding and Security
    Authors: Garima Rani and Dr. Sunil Kumar
    Abstract: Every industry now a day is suffering from the problem of Piracy. Once released audio or video is copied into several devices to store them and it is sold at very low price.29 billion $ have been spent or lost by industry in 2003.We all are well aware that it is not practical to stop piracy or illegal access of data. These all degrades the reputation and quality faith of industry. In our paper, we are short while trying to prevent the multimedia files to be copied from CD. DES is an algorithm which had wide acceptance in the world and was the only Encryption algorithm which was deployed on such a large scale. In our paper, firstly we have to choose which type of protection we need. Either it is a Folder Protection or File Protection. Java and .net technology is used by us to overcome this type of piracy.
    Click Here to Download Pdf

    QR Code

    IJMCS