The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-5 Issue-1(February 2017)
    Title: A Secure Model Based on Classification in Cloud Environment
    Authors: Tamanna Rajput and Rajeev Kumar
    Abstract: Cloud computing provides various benefits which includes scalability, availability and many more. But due its wide acceptance all over the globe, its more prone to new risks and vulnerabilities. Cloud computing supplies facility of storing and accessing understanding and programs over the web without bothering the space for storage on procedure. Saving the information on cloud reduces one's worries about space considerations, buying new storage space equipment or managing their data, rather they are able to access their data any time from anywhere provided through internet access. Yet the rising security issues have resisted the companies from connecting with cloud computing fully. Hence security challenges have appeared as the key disadvantage of cloud computing. This paper involves the initiatives to research the security risk and then suggests a framework to addresses these risks on the authentication and storage level in cloud computing. Although addressing the security issues the first and the foremost thing is to categorise what data needs security and what data needn't bother with security and hence data gets classified into classes. To achieve data classification, an information classification approach structured on the confidentiality of data is proposed in this paper. Following that an efficient security mechanism must be deployed by using encryption, authentication, or by means of every other approach to ensure the privacy of data on cloud
    Click Here to Download Pdf
    Title: The Frame Work for Processing Software Development Life Cycle Model-A Survey
    Authors: R.Elampirai, D.V.Sathiya Vadivoo and S.Shanthini
    Abstract: The software development life cycle model is the model which is used for the development of the software products it includes a complete lifecycle of a software development process. Today the software development life cycle plays an important role in software industries for developing complete software. There are lots of SDLC models available for software development. This paper gives the framework for developing software using the software development life cycle, the software development models like waterfall, prototype, spiral, incremental and iterative models, and their pros and cons are discussed in this paper.
    Click Here to Download Pdf
    Title: Advanced Mining Approach for Classification of Emails Based on the Category
    Authors: Vinita Thopte, Aishwarya Shete, Pooja Todkar, Shweta Shinde and S. M. Kolekar
    Abstract: In daily life, Emails are the method or media between the computer users for communication purpose. Emails are used for both Professional and Personal levels. Every day the bulk of emails are arrived into user?s mail box. If user wants to search particular email from mail box the users have to search throughout the mailbox. So we wish to focus on the problem of categorizing mails into relevant category which would help to users to find important mail very quickly. In our paper, we will classify and customize our mail box. There are several options ar e present in our mail box like primary, social, promotions. Emails will save into relevant category. We will create some datasets like Shopping, Education, and Job etc. So whenever any mail will receive, it will check with the datasets and saved into corresponding category.
    Click Here to Download Pdf
    Title: A Survey of Security Standards in Service Oriented Architecture
    Authors: Ibrahim Khalil and Ahmed Saleh
    Abstract: In recent years, Service Oriented Architecture(SOA) and in particular Web services provide many benefits for developing Web applications but security is one of the major concerns when developing those applications and needs to be addressed. In this context, the existing standards and tools use to configure the security properties of web services to assisting in choosing data to encrypt through the encryption algorithms. As a result, much emphasis has been placed on the development of various high-level security standards and protocols, but in many cases the simplest application level attacks have been neglected. In this paper we try to analyze the security standards associated with Service Oriented Architecture and how they are related to each other. Also, dependency of SOA, Web services and XML security standards will be discussed.
    Click Here to Download Pdf
    Title: Prediction of Hidden Patterns and Relationship Using Ensemble Learning Algorithm
    Authors: Priyadharsini and Antony Selvadoss Thanamani
    Abstract: Data mining reveals significant insights due to its nature in identifying hidden patterns and relationships that can be used for predicting generalized anxiety disorder. For effective prediction, random forest approach is one of the classification data mining techniques which embeds good predictive characteristics. Therefore, this research adopts random forest approach to predict Generalized Anxiety Disorder among women, and the accuracy of the predictive result is reported.
    Click Here to Download Pdf
    Title: Imputation of Missing Data Using Ensemble Algorithms
    Authors: Priyadharsini and Antony Selvadoss Thanamani
    Abstract: Missing data or incomplete data are very common in statistical situations. One way to deal with missing data is to conduct model imputation either one time or multiple times. One of the key problems in analyzing the imputed dataset is to give the valid statistical reference of the parameter estimated, that is, to give a right estimation of the standard error of the interested statistic. This paper proposes the new developed ensemble algorithms as imputation model. In order to realize multiple imputation, we suggest bootstrap sampling the prediction error several times. The properties of the proposed methods are studied by simulation and compared with existing methods. Finally, the methods are applied to analyze one real large dataset, taking the missing mechanism into consideration.
    Click Here to Download Pdf
    Title: An Overview Of Data Mining Applications And Importance’s In Yearly Base
    Authors: M.priya, S. Sowndarya and N.Juber Rahman
    Abstract: Data mining is a process of discovering knowledge by analyzing the data store from various perspectives in huge repositories, and then the consequence is summarize into useful information. Data mining techniques are used widely to analyze the data to give useful information which is previously unknown or unseen. All the data mining applications are type to the overall growth of the state . Data mining in agriculture sector ,learning sector data mining, healthcare, weather predictions is a very recent and famous research topic. Recent technologies are currently able to provide information on all the activities, which can be analyzed in order to note the central information. This paper discussed about how data mining applications are used in cultivation, educational data mining, weather conditions and predictions field and its types and importance’s of data mining. Finally, the applications compared and classified in year wise and increase of data mining techniques.
    Click Here to Download Pdf
    Title: Comparative Analysis of Predicting Kidney Disorder Using Clustering Techniques
    Authors: N.Pavithra and Dr. R. Shanmugavadivu
    Abstract: Knowledge mining provides the methodology and technology to alter the medical data mining of knowledge into helpful information for decision creating. By victimization data processing techniques it takes less time for the prediction of the illness with additional accuracy. Knowledge mining tools and algorithms will provide results to trade queries that conventionally used multiple times which is dominant factor to decision making. In this paper, discuss about comparative analysis of data mining clustering techniques like k-mean and fuzzy c means (FCM) algorithm for predicting kidney diseases. Aim of this work is compare these two algorithms and their performance accuracy which one is best for the predicting kidney diseases.
    Click Here to Download Pdf
    Title: Evolution and Adoption of programming languages
    Authors: Akshat Jain and Dr.Megha Gupta
    Abstract: Programming languages tend to evolve in response to user needs, hardware advances, and research developments. Language evolution artefacts may include new compilers and interpreters or new language standards .The foundations of functional programming languages are examined from both historical and technical perspectives. Their evolution is traced through several critical periods: early work on lambda calculus and combinatory calculus, Lisp, Iswim, FP, ML, and modern functional languages such as Haskell. The fundamental premises on which the functional programming methodology stands are critically analyzed with respect to philosophical and theoretical concerns.This paper focuses on the evolution of programming languages over certain years.Some programming languages become widely popular while others fail to grow beyond their niche or disappear altogether. The paper also focuses upon the certain factors required to adopt the programming languages.
    Click Here to Download Pdf
    Title: Oracle RAC, Oracle Data Guard, and Pluggable Databases for Managing Multiple Database as One using Oracle Multitenant Architecture
    Authors: Vibha H Mehta and Nirav K Shah
    Abstract: This paper describes how Pluggable Databases work in a Maximum Availability Architecture and how to deal with PDB creation and services. It is targeted at database administrators and architects who want to know more about Oracle Multitenant in HA environments. This paper reviews the challenges facing today's enterprise IT managers and DBAs in managing the rising numbers of databases while trying to control cost, reduce errors, and deliver more and better service to users in the form of responsiveness, flexibility, and agility. It considers various approaches to this problem and focuses on a core RDBMS-centric response based on enabling users to consolidate databases systematically through an approach involving a two-level architecture of a database container (or superinstance) and multiple pluggable databases. The paper then considers how Oracle Database 12c, with its multitenant architecture, delivers this capability.
    Click Here to Download Pdf
    Title: Different Scheduling Algorithm in Cloud Computing: A Survey
    Authors: Preeti Thakur and Manish Mahajan
    Abstract: Cloud computing is a rising technology in distributed computing which encourage pay per show according to client summon and prerequisite. Cloud comprises of an arrangement of the virtual machine which incorporates both computational and storage facility. Presently a day, cloud computing technology is utilized everywhere. Cloud gives numerous offices because of its boundless zone with the end goal that sharing of resources for various purposes. The essential point of cloud computing is to give most reasonable access to remote scattered resources. Cloud is creating step by step and faces many difficulties, one of them is scheduling. In this context, Scheduling turns into an essential variable to talk about. Scheduling focuses to an arrangement of guidelines to control the request off work to be satisfied by a system. A decent schedule fits its scheduling arrangement as per the changing circumstance and the sort of undertaking. To productively expand the working of cloud computing environments, job scheduling is one the primary occupation performed to get the most noteworthy benefit. In this paper, we compare three scheduling algorithm, first-in-first-out (FIFO), round robin and shortest job First algorithm. This paper we focus some existing different scheduling and issues identified with them in cloud computing.
    Click Here to Download Pdf
    Title: Implementation of Efficient Data Tranconfiguration Technique for Relational To Object Oriented Database
    Authors: G.J.Sayasikamal and Prof A.B.Gadicha
    Abstract: The traditional Database management system uses the relational database management system to manage the data by querying methodology but object oriented database management system used for managing huge amount of data by assigning object id to the object created using relational schema. Now days industries using object oriented database management software as a standard database management system. The relational database based on typical relation for performing operation whereas modern software development technologies interact with data based on object oriented paradigm. object-oriented database management system shortened to ODBMS for object database management system, it is a database management system (DBMS) that supports the modelling of data as objects which help in achieving reusability and managing the complexity in querying system .The object-oriented data model is assumed to be the central idea of the next generation of database systems and it considered as the fifth generation database. It also beneficial for applying this new technology that provides adaptability in maintenance. This paper presents an extended fictional work to transform a given conventional database into an object oriented database Such a mismatch inspires for migrating relational database to object oriented database and deals with development of single environment which relates a relational schema to an object oriented schema and providing a scenario for successfully transferring data from relational database to object oriented database using data migration algorithm.
    Click Here to Download Pdf
    Title: Software Security in Requirements Engineering Phase: MCOQR Metrics Framework Perspective
    Authors:Chitresh Banerjee, Arpita Banerjee and S. K. Sharma
    Abstract: Security has been an issue since the inception of software and application development. A good number of tools, techniques, methods, standards, protocols, etc. has been proposed and laid down from time to time but the security of software has always been compromised for malicious intent. With the technological advancement in the field of software development, the no. of reported and unreported security breaches have also increased exponentially. Though 100% security of software cannot be guaranteed but at least the level of security can be increased to countermeasure the possible attack. Initially, the focus of the software industry was on safeguarding the software practically implemented in the market with many tools and techniques available but it worked more as a tactics rather than as a strategy. From last decade, the industry has shifted its focus and started to implement security during the software development process. This research paper highlights the importance of implementing security during the requirements engineering phase of software development so that the treatment of security is provide from the beginning of development process. It showcases the various techniques which could be used to implement security during the requirements engineering phase of software development. It further tries to explore the role of Misuse Case Oriented Quality Requirements (MCOQR) metrics framework in implementation of security from the requirements engineering phase. The paper gives the security implementation mechanism by using MCOQR metrics framework during the requirements engineering phase with results and validations.
    Click Here to Download Pdf
    Title: Unified Approach for Mobile APP Categorized Fraud Detection
    Authors: Ms.V.MALARKKODI and Ms.S.SHENBAGAVADIVU
    Abstract: At the moment the whole world is using smart phone. The amount of Mobile Apps has grown at a huge rate over the previous few years. There is need of few applications to be installed on smart Phone. To download application smart phone user has to visit Apps store such as Google Play Store, Apples store. When user visit play store then he or she is able to see the variety of applications list. There are millions of apps are offered in market for the application of mobile users. However, all the mobile users first favor high ranked apps when downloading it. But we cannot pledge the dependability for the downloaded application since there is growing number of ranking frauds. While the importance of prevention ranking fraud has been widely predictable, there is limited understanding and research in this area. To this conclusion in this paper, we supply an entire view of ranking fraud and suggest a ranking fraud detection system for mobile Apps. This work is done into three groups. At first, ranking fraud finding second is online review recognition and last one is mobile application suggestion. The Web ranking demonstrates to any focused activities which pass on to prefer Web pages an undeserved ideal pertinence or importance. To list the application first we are going to find the active phase of the application named as most important session. Proposed framework as well eliminates the fake surveys from the dataset utilizing same measure algorithm and after that differentiate the application rank with the suitable proof of user. At last this system will also advocate Apps which are more relevant and most genuine. The propose structure will save the time and also memory than the preceding structure.
    Click Here to Download Pdf
    Title: Internal Intrusion Detection And Protection System By Forensic Method
    Authors:Mrs.K.Aruna, V.Dhivya, M.Tahseen Aayisha and S.Ayisha Marliya
    Abstract: Most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with co-workers and request these co workers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since most intrusion detection systems and firewalls identify and isolate malicious behaviours launched from the outside world of the system only. In addition, some studies claimed that analyzing system calls (SCs) generated by commands can identify these commands, with which to accurately detect attacks, and attack patterns are the features of an attack. Therefore, in this paper, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The IIDPS creates users’ personal profiles to keep track of users’ usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing his/her current computer usage behaviours with the patterns collected in the account holder’s personal profile. This system checks user behaviour profile, then perform the action. In our system, to provide improving IIDPS’s performance and investigating third-party shell commands. This method analysis, details of command and then provide security code, these code to verify.
    Click Here to Download Pdf
    Title: Securing Geological Location Privacy in Geo Social Application
    Authors:Chaya Kumari H A and Suman M
    Abstract: Theoretical by huge change of pinpoint localization, more number of geo-social applications is utilized by millions, which also gives a chance to interface, likewise sharing areas to others. For instance Four Square is utilized by many individuals to get information about their environment, through their friends and their suggestions. Be that as it may, with no security insurance that these frameworks can be effectively abused by following the users or target those for home attack. LocX is an option for such issues which gives altogether enhanced area protection without including uncertainty into query results or depending on strong assumption about server security. Our key insight is to apply secure userspecific, distance-preserving coordinate transformations to all location data shared with the server. The friends of a user can share this current user's secret key so they can apply a similar transformations. This allows all area queries to be assessed accurately by the server, yet our security components ensure that servers can't see or derive the exact area information from the transformed information or from the data access. We demonstrate that LocX gives security even against an intense adversary model, and we also utilize model estimations to demonstrate that it gives protection next to no execution overhead, making it reasonable, for today’s cell phones.
    Click Here to Download Pdf

    QR Code

    IJMCS