The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-5 Published (Acceptance Ratio=27.27%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-3 Issue-2(June 2015)
    Title: Review Paper On Near Far Problem and Their Solution Technical
    Authors: Sonia Devi and Assist. Prof. Sandeep kaur
    Abstract: In this review paper, we are focused on the different technologies that are used to remove the near-far problem in wireless communication. Near-far problem effects the communication in the cell or outside the cell because the single can’t reach properly to the receiver or sender. There is different kind of method that is used to remove the near far problem. Guard zone is created in the network to overcome the near far problem. Exclusion zone is also used with guard zone to remove the effect of the near far problem. Many users observed that near far can be overcome by the 2 way one is too used the MAC protocol and other is the power control of the signal.MAC protocol is used in different ways by different users. And power control is also done in many ways like open loop, close loop, by defining the Hybrid access point for all the users in the cell. The near-far problem will be solving by adjusting dynamic output power at the transmitter end. Sequential Interference Cancellation (SIC) Algorithm is also used to use to remove the near far problem.
    Click Here to Download Pdf
    Title: Enhanced privacy preserving with cost effectiveness of information
    Authors: B. Sravani and Mr. E. Sudheer Kumar /div>
    Abstract: Delicate information is the conveyance of processing administrations over the web. Those administrations permit people and business to utilize programming and equipment that are overseen by outsiders at remote areas. Transforming of such application and information, a substantial volume of moderate datasets will be produced and it can be put away into the touchy information environment. The security accommodating the middle of the road information will be completed by encryption of those halfway dataset. The security accommodating the middle information will be completed by encryption of that moderate information. Scrambling of all moderate datasets will be neither productive nor savvy in light of the fact that it is extremely lengthy and expensive for information escalated application to scramble or unscramble the datasets often while performing any operation on them. To distinguish which middle datasets need to be scrambled and which dont. This method expands the execution and diminishes the bottleneck in delicate information environment.
    Click Here to Download Pdf
    Title: Privacy Preserving Of Association Rules In Horizontally Distributed Databases
    Authors: B.Yamini Priyanka and Mr.A.V. Sriharsha
    Abstract: The convention utilized for privacy preserving affiliation standards of evenly disseminated databases were FDM, UNIFI-KC and UNIFI. FDM is unsecured algorithm in distributed databases. UNIFI-KC is secure but it is used for union of private subsets. Both union and intersection private subsets are secured by using UNIFI. These protocols provide security using secure multiparty computation (SMC). SMC is secure information between different players while distributed data. Adversary attacks may cause of individual players information. In this work, to avoid this adversary attacks add noise to the data.
    Click Here to Download Pdf
    Title: Video Synchronization Methods : A Review
    Authors: Sukhmeet Kour and Mr.Danvir Mandal
    Abstract: Video synchronization is an important processing step in multimedia applications. In today’s scenario with increased availability of cameras, a raise in volume of captured videos and image data is seen. Techniques for processing such data are essential, where synchronization plays a vital role. In this paper we have outlined some hardware synchronization methods and reviewed number of software synchronization methods used.
    Click Here to Download Pdf
    Title: Product Backlog Prioritization in Scrum: A Review
    Authors: Charanpreet Kaur and Vijay Kumar
    Abstract: Scrum is emerged as one of the flexible and lightweight agile approach in IT industry. The key element of its flexibility is evolving requirements and delivery of business value in small releases. Identification of correct candidate requirement (which is most likely to be included in sprint backlog) for a certain release is necessary to deliver highest business value early. Prioritization is an effective way to identify correct candidate requirements. However, in scrum, prioritization is not static and easy process as in traditional development methodologies because of evolving requirements. To prioritize requirements there are different techniques which have been explained in literature. Different techniques consider different factors for prioritization. Value-based prioritization is the best technique which is used in scrum. In this paper a narrative review has been done to explain factors which are considered for prioritization. A small survey has been done to find the answers of questions which arose during literature study.
    Click Here to Download Pdf
    Title: Review Paper on Video Quality Assessment Methods
    Authors: Shipra Parihar and Mr. Danvir Mandal
    Abstract: Video quality measures or assessment plays an important role in various video processing applications such as compression, communication, restoration, printing, enhancement and watermarking. In this paper we reviewed all the techniques and algorithms used to access the quality of the video, and how it works on subjective and objective quality assessment. In this we study about the quality metrics like MSE (mean square error), PSNR (peak signal to noise ratio) or some categories of the video quality algorithms like FR (full reference), NR (non-reference) and RR(reduced reference) quality assessment or we have a look on (VQEG) model and how it works to develop the measurement methods.
    Click Here to Download Pdf
    Title: Modeling and Stability Issues in Mini/Micro Hydro Power Plant: A Survey
    Authors: Kruti Gupta and Kamal Kant Sharma
    Abstract: Hydro power is available mostly in hilly or mountainous regions due to owing of river tributaries. To install micro/mini hydro plants in such regions, proper modelling and simulation of hydraulic, mechanical and electrical components is required considering coupling interactions between all of them through the use of proper software such as proprietary software, free and open source software and free software. The design of controller to maintain fixed speed, head and discharge is also dealt with. A new field of islanding is included in this paper which enlists various functions being performed by hydraulic turbine and governor controller in smart distribution systems.
    Click Here to Download Pdf
    Title: Security Issues in Cloud Computing: A Review
    Authors: Mankiran Kaur and Manish mahajan
    Abstract: Cloud Computing (CC) is the most popular and emerging paradigm in the IT industry today such as Google, IBM, Microsoft etc. Cloud computing is a distributed computing providing the users with the advantage of accessing the cloud services on demand at low cost, faster processing with the ease of scalability and elasticity. It is growing at larger scale in every field such as education, other industries etc. Although with the numerous benefits, security issues still exist in cloud computing. This paper introduces the concept of cloud computing, cloud service models (Software-as-a-Service, Platform-as-a-Service, Infrastructure-as-a-Service), types of cloud, features and the various security issues affecting the integrity and confidentiality cloud computing.
    Click Here to Download Pdf
    Title: Different Hybrid Routing Protocols in MANET: A Review
    Authors: Amroj Kaur Gill and Dr. Rajneesh Talwar
    Abstract: MANET constitutes of randomly placed nodes in an ad hoc network. It has no fixed infrastructure, thus for communicating through such a network we need some protocol suites. In this paper we explore the three basic protocols used in MANET: reactive, proactive and hybrid. The disadvantages of reactive and proactive are overcome in hybrid routing protocols. Hybrid routing protocols works with combined features of reactive and proactive protocols. We study and compare the different hybrid protocols used along with their advantages and disadvantages. At the end we also propose a new hybrid protocol which will be different from the originals and can be termed as Cache Based Hybrid Routing Protocol. This paper brings an overview of all types of routing protocols.
    Click Here to Download Pdf
    Title: Anomaly Multiview Human Action Recognition Using Web Camera
    Authors: P. Kalaivani and Dr. S. Vimala
    Abstract: This paper presents the anomaly recognition of human actions under view changes. This deploys an automotive visual surveillance system to detect abnormal behavior patterns and recognize the normal ones. If a person enters a room, video of him is captured and stored both front view and the top view. Whenever an action is recognized blob images are saved, and the frame counts are taken in the training video. In case, if there is any anomaly frame is detected an alert will be issued. The abnormal behavior is achieved by keeping track the videos and blob frames and checking each frame values. Most of the current methods for action recognition are designed for limited view variations. For a given action sequence and a given type of low level features, and compute distances between extracted features for all pairs of time frames and store results in a Self-Similarity Matrix (SSM). This approach builds upon self-similarities of action sequences over time.
    Click Here to Download Pdf
    Title: Image Feature Detection and Extraction using Modified Invariance Edge Detection
    Authors: Neha Bansal, Manish Mahajan and Shashi Bhushan
    Abstract: Feature detection, extraction and representation are important steps for multimedia processing. Extracting ideal features that reflect the intrinsic and core content of the images in a complete form is still a challenging problem in computer vision systems. However, less research time has been given to this problem in the last few decades. In this paper, our review shows development made in image feature detection, extraction and provide a comprehensive survey on image feature techniques. We analyze the effectiveness of the mixture of global and local features in an automatic image description and content based image copy paste systems, this proposed scheme work includes some classic models and their illustrations. And finally, conclude and point out the proposed scheme of improved Invariant corner detection system for future potential research directions.
    Click Here to Download Pdf
    Title: A Review on various vehicle detection techniques for aerial or non-aerial images
    Authors: Kamini Goyal and Dapinder Kaur
    Abstract: The vehicle detection is the process of marking the vehicles in the images. The vehicle detection processes can be performed on the aerial, satellite, vehicular camera or other similar or non-similar images. The vehicle detection methods are used for vehicle number or vehicle density calculations, vehicle tracking, vehicle monitoring, urban vehicular activity monitoring, etc. Such application requires a high accuracy to perform their operations accurately. For the purpose of higher vehicle detection efficiency, there are several techniques such as dynamic bayesian network, hybrid deep convolutional neural network, real time global localization, unmanned ground vehicle and synergistic approach. The vehicle detection techniques have been evaluated on the basis of their theoretical or practical hypothesis based performance evaluation in various domains. The hybrid deep neural network is found to be the best technique among all the other techniques used for the vehicle detection.
    Click Here to Download Pdf
    Title: To Pinpoint Colluding Attackers for Multitenant Software-as-a-Service Cloud Systems
    Authors: A.Sai Priya and C.Shoba Bindu
    Abstract: Software as a Service (SaaS) is a software distribution model in which a vendor or service provider develops the applications and this is made available to customers over a network. SaaS clouds are vulnerable to malicious attacks because of their sharing nature. IntTest, a scalable service integrity attestation framework has been anticipated and it uses a novel integrated attestation graph analysis scheme to pinpoint attackers. But IntTest has still a limitation that attackers can still escape the detection if they have less inconsistency links than benign service providers. In this paper, we present Function Combination Generator along with the IntTest in order to detect the attackers more in number. Also, Result Auto Correction is provided to correct the incorrect results provided by the attackers. Our experimental results shows that our scheme is effective and can achieve higher accuracy in pinpointing the attackers in large number than the existing schemes.
    Click Here to Download Pdf
    Title: A Secure Routing For Wireless Sensor Networks: An Improved Approach for Handling Wormhole Attack
    Authors: Ankit Deo
    Abstract: A wireless sensor network is a collection of multiple sensors deployed in an open field. Wireless sensor networks have always faced two major issues viz, routing and security. One of the major reasons behind these reasons is the mobility of nodes in a wireless network. In this paper, we are concerned about one of such threats, wormhole attack. The chosen method for deploying this wormhole attack is using a node possessing high power transmission capabilities. Major aim of a wormhole is to misguide the source of its route to the destination in order for transmitting some data. Eventually, packets being generated by the source will either be dropped by this node or would have a chance to be manipulated. This paper focuses on detecting such a node in the network and preventing the network from its attack. A statistical comparison of the performance of AODV routing protocol has been presented under the three cases: 1. Standard AODV functioning, 2. In presence of the attack and 3. after preventing the attack.
    Click Here to Download Pdf
    Title: An Analysis of Instance Selection Algorithms using Support Vector Machine for Text Classification
    Authors: B.Ramesh and Dr.J.G.R.Sathiaseelan
    Abstract: Automatic text classification is a popular research topic in text mining. Automatic text classification is an eminent field of research in text mining, which is tries to automatically classify the text documents into pre-specified categories. Text mining involves several pre-processing and classification techniques. In this paper, we have analysed several feature selection methods with support vector machine for text classification. Several instance selection methods analysed with different aspects such as accuracy, processing time, reduction rate and selected support vectors. This analysis is mainly focused to techtc-100 dataset with several feature selection strategies. Support Vector Oriented Instance Selection is shown better efficiency in all aspects. This study is very useful to novice text mining researchers. Click Here to Download Pdf
    Title: Re-Encryption based Secure Communication for Scalable Data in Multiple Clouds
    Authors:P. Reddy Prathyusha and C. Shoba Bindu
    Abstract: The Cloud Computing provides the services to organizations based on the service models such as SaaS, PaaS and IaaS through deployment models like Public, Private and Hybrid clouds. There are lots of advantages with data outsourcing to the cloud. Cloud has the ability to function well even though changes are made to the data. But, one of momentous challenge is providing security to the cloud data. Now a day’s these cloud data is accessed by mobile users also. Such that there is need to diminish the communiqué cost and totaling load. In the previous scheme, the Attribute Based Encryption was proposed to provide security. Additionally Re-Encryption is also provided in order to minimize sustained users only in single cloud. In this paper, we will present a protocol that outsources the data in multiple Clouds to achieve more security and high scalability.
    Click Here to Download Pdf
    Title: Cluster Performance Analysis of Multi-objective Genetic Algorithm and Particle Swarm Optimization Techniques
    Authors: M.Anusha and J.G.R.Sathiaseelan
    Abstract: Optimization based on pattern discovery has emerged as a predominant field in knowledge discovery and data mining (KDD). It has been used to enhance the efficiency and accuracy of clustering. The main beneficiary of cluster analysis, would identify group of similar data items in large data sets. The increasing complexity and large amount of data in the data sets which emerges to focus for the application of optimization based techniques for clustering data. Different clustering techniques have been applied to investigate the optimal solutions for clustering problems. Genetic algorithms and swarm intelligence are the major optimization techniques whose algorithms have successfully been demonstrated as solutions for different data clustering domains. In this paper, performance analysis on two meta-heuristics algorithms like Genetic algorithms and Swarm Intelligence were considered to investigate the overall cluster accuracy in optimizing multiple objectives. The comparison experiment of these algorithms resulted with good searching and better convergence for certain features using multi-objective genetic algorithm (MOGA) than multi-objective particle swarm optimization (MOPSO) techniques.
    Click Here to Download Pdf
    Title: Review Paper on Wind power generation
    Authors: Jaswinder Singh and Sunny Vig
    Abstract: The wind power technology is highly developed in many countries in recent years. Manny types of research field in modern power system such as a wind speed prediction, modelling of wind generator, stability of system are emphasized with the consideration of wind power. Due to the increasing the penetration level in power system, the different researcher use the different method for maintaining the stability of system. The wind power is a energy source which is variable in nature. The output of wind power plant effects the grid operation. Because the wind is not constant all time in day. This paper is review on wind power generation and controllers which improve the voltage profile of system and make the system more stable
    Click Here to Download Pdf
    Title: Zero Dispersion and Minimum Confinement Loss of Hexagonal Borosilicate Crown Glass PCF with Elliptic and Linear Waveguide
    Authors: Ravi prakash and Amol Purohit
    Abstract: In this paper we developed the theoretical method for chromatic dispersion of Borosilicate crown glass from the scalar effective index method using transparent boundary condition with linear and elliptic waveguide. Development of wavelength division multiplexing (WDM) network in recent years and requirement of data transmission at high bit rate in optical fibers have caused serious concerns using conventional optical fiber communication, because high dispersion and losses leads to partial loss of data in long distance communication. Control of chromatic dispersion in fiber is a very important factor for optical communication system. dispersion and minimum confinement loss in different wavelength channels for transmission of high data rate in WDM technology The objective of my investigation is to propose a PCF that will have near zero or almost flat. Finally we compare the result obtained in hexagonal-lattice PCF of Borosilicate crown glass with silica glass and conclude that Borosilicate glass material gives the better dispersion and confinement loss characteristics. Finite-difference time domain (FDTD) method has been used for investigation.
    Click Here to Download Pdf
    Title: Weak Signal De-Noising Method Based On Moving Averaging and Wavelet De-Noising Algorithm on Labview
    Authors: Pawan Kumar Sharma and Amol Purohit
    Abstract: In order to detect the weak signal contaminated with strong background noise successfully, a new weak signal detection method based on software was verified and investigated in this paper. LabVIEW was used to realize the weak signal de-noising. The results show that, the data with N sampling points can be accumulated 10, 50, 100, 500, 1000, 2000 and 2300 times and then averaged. In this paper, the method of weak signal de-noising based on the combination of moving signal averaging algorithm and wavelet de-noising algorithm is proposed. First, the effectiveness of time domain in moving averaging algorithm and then wavelet de-noising algorithm is presented respectively. Then, the combination of two methods was used to remove noise and extract information signal from the noisy signal on LabVIEW.
    Click Here to Download Pdf
    Title: Attack Resistant Robustious Video Watermarking Using Scaled Wavelet Transform with SVD-DCT Techniques
    Authors: Shaveta and Daljit Kaur
    Abstract: The raised and widespread usage of digital transmission has aroused nice issues relating to problems like copyright protection, copy management and proof of possession. Digital watermarking is an answer to those styles of problems; but, digital watermarking techniques have incontestable to possess vulnerabilities. Therefore, maintaining the safety of digital watermarked media i.e. text, image, audio and video has received wide attention. This paper has conducted a comprehensive analysis with special stress on the classification of malicious attacks against digital watermarking using proposed algorithm. In this watermark embedding is done by using scaled wavelet transform technique with SCD and DCT to get high payload and robustness and gives better results as compared to 3D-DCT watermarking.
    Click Here to Download Pdf
    Title: Review paper on Hybrid Power System with Different controller and tracking Methods
    Authors: Jaswinder Singh and Sunny Vig
    Abstract: This paper is review on stability of hybrid power system. The hybrid power system is based upon the renewable energy source. In this paper analyze stability problem and different controllers which affect the output power of hybrid power system. The main problem of hybrid system is stabile operation. For stability and power quality improvement many types of facts devices are used. Now day’s the renewable energy source are highly developed. In china after every year, the wind power generation is doubled. The majority of the work is based upon the different controller and controlling techniques which is used for maximum power generation of hybrid system with good power quality.
    Click Here to Download Pdf

    QR Code

    IJMCS