International Journal of Computer Science and Technology
IJCST 8.3 ver-1 (July-September 2017)

S.No. Research Topic Paper ID Download

Design and Development of IOT Access Point for Medicare

Sourabha Hediyal, Kirthana.S, Priyanka S, Netravathi U, Sundari Tribhuvanam, Nagaraj Hediyal


Medical emergencies are prevalent in senior citizens. The paper presents the Internet of Things (IOT) Access Point for Medicare to keep the tab on the senior citizens health. The health parameters such as temperature, blood pressure, pulse rate, weight have been monitored through the current work. The system is based on 8-bit programmable interface controller, which acquires the health parameters through sensors. The data sensed via sensors is converted into digital by means of analogue to digital converter of the microcontroller. The processed data is displayed on the liquid crystal display. System is designed to operate from AC mains as well as from solar energy.
Full Paper


Efficient DNA Encryption Strategy of Secure Network Communications

Priyanka Sharma, Parikshit Singla


DNA processing is a type of figuring which utilizes DNA, organic chemistry and atomic science, rather than the conventional siliconbased PC innovations. DNA registering, or, all the more by and large, Bio-sub-atomic figuring, is a quick creating interdisciplinary range. Innovative work around there concerns hypothesis, trials, and utilizations of DNA figuring. The expression “molectronics” has some of the time been utilized, yet this term had as of now been utilized for a before innovation, a then-unsuccessful adversary of the principal coordinated circuits this term has likewise been utilized all the more for the most part, for sub-atomic scale innovation. This exploration makes a DNA based XOR encryption technique, the proposed encryption calculation concentrates on accomplishing taking after targets.
Full Paper


Cost Effective Home Automation System

Shubham Chavan, Mayan Bhadage


This paper presents the implementation of cost effective Home Automation using Arduino Uno and various sensor. The proposed system is able to control and monitor the temperature, light, gas, water level, humidity and other household appliances. The main body of the framework contains Arduino Uno microcontroller connected to a relay driver circuit to same a Wi-Fi network. The model is also integrated with various sensors to increase the effectiveness of proposed system. A user-friendly Android application is also developed using Android Studio which provides GUI for the users. This system works within same Wi-Fi network hence it has high speed and low connection issues. The proposed system is flexible and easy to understand. Unlike most system, the proposed system is not only used for switching functionality but also for monitoring the homeenvironment. Results of the experiments conducted are quite promising. Existing homes can be converted into thesmart home using prototype at relatively low cost with convenience.
Full Paper


A Collective Methodology of Software Metrics and Software Fault Exploration to Software Dependability Approximation

T. Ravi Kumar, Dr. T. Srinivasa Rao


The accurate prediction of where faults are probably going to happen in code with coordinate test exertion, lessen costs and enhance the quality of software. Target of this paper is we research how the setting of models, the autonomous factors utilized and the demonstrating methods connected, impact the execution of fault prediction models. In this paper we have indicated compherensive assessment of various machine learning techniques for software imperfection predection. A thoughtful of quality viewpoints is pertinent for the software relationship to convey high software reliability. An accurate thought of metrics to forecast the quality characteristics is essential keeping in mind the end goal to procure understanding about the estimation of software in the primitive periods of software advancement and to guarantee restorative activities. We relate one measurable strategy and six machine learning system to anticipate the models. The proposed generation are approved utilizing dataset unruffled from Open Source software. The results are dissected utilizing Area under the Curve (AUC) accomplish from Receiver Operating Characteristics (ROC) testing. The results demonstrate that the imitation anticipated utilizing the arbitrary timberland and sacking strategies beat the various form. Henceforth, bolster on these results it is fair to guarantee that quality models have an impressive pertinence with Object Oriented metrics and that machine learning associations have a comparable execution with numerical strategies. It is test that the CBR routine utilizing the Mahalanobis separation likeness occupation additionally the reverse separation weighted arrangement calculation yielded the best fault prediction.
Full Paper


Future of IOT

Pooja Arora


No matter which way you look at it, technology has been headed towards automation for a long time now. In fact, isn’t the very basic principle of technology to make our lives easier by leaving fewer things to be explicitly done by us? It might be making us all lazier everyday, or one might argue that it is giving us far greater time to pursue whatever we desire. Whatever might be the effect, there is no doubt that automation is the future and place that it is happening the most significantly is right in our homes.
Full Paper


Web Mining on Traversal Constraints using MFP & MBP

E.Sandeep Krupakar, Dr. A.Govardhan


Dynamic With the fast developing number of www clients, obnubilated data turns out to be ever progressively profitable. As outcomes of this marvel, mining Web information and examining on-line client’s deportment and their on-line traversal design have developed as a nascent region of research. Fundamentally predicated on the Web server’s log documents, the principle goal of traversal designs in client’s perusing ways and deportments. This paper introduces a quintessential structure for web mining, endorsing clients to predefine physical imperatives while authorizing many-sided traversal designs to improve the proficiency of calculations and offer adaptability in inducing the outcome. Amid this paper, an imperative predicated conspire for the digging errands was displayed for the indicate of representing the conceivable similarity when incorporated with different applications or calculations. The proposed approach performs autonomously before the primary calculations in this way being fit for taking care of an overwhelmingly enormously monster set of information and its adjustable imperative predicated sentence structure builds the effectiveness and exactness of calculations. Future work will incorporate further tests to check the model traversal of client’s web based perusing dispositions talked about and a more thorough examination of the transient imperatives concerning periodicity viewpoints.
Full Paper


Text Mining Techniques and Its Applications: A Survey

R.Annamalai Saravanan, Dr. M.Rajesh Babu


The massive growth of databases in nearly all area of human activity has created a huge demand for new, the great tools for turning data in helpful knowledge. Text mining is supported for research area. Text Mining is finding with new computer, previous unknown information, by automatically extracting information from various written resources. This survey article is main objective is to provide easy accessibility to the major ideas for non experts about Text Mining Techniques, applications and Difference between text mining and data mining, text mining applications have been presented.
Full Paper


Routing of Data From Raspberry PI to A Remote Router Connected in a Network through Shortest Path Algorithm

Owais Kazi


The proposed security system captures information and transmits it via a remote router to local router and then to client’s laptop. To route the video data the Raspberry Pi is sending the data to remote router with the help of shortest path algorithm the local router is able to receive it. So to route the data we have two types of routing (1) Static and (2) Dynamic. Static routing manually sets up the optimal paths between the source and the destination computers. On the other hand, the dynamic routing uses dynamic protocols to update the routing table and to find the optimal path between the source and the destination computers. Since we are having multiple router connected in the network present therefore we are using Dynamic Routing with Shortest Path algorithm. We have two types of data to be send to client (1) Encrypted video data (2) Signal for checking whether motion is detected or not. After receiving the signal of motion detection, the client will decrypt the encrypted data to see the video data received through routing and hence the Smart Surveillance Monitoring System is achieved.
Full Paper


Biometric IRIS Recognition using Canny Edge Detection and Histogram Threshold

Manpreet Kaur, Mohita, Jasvir Singh Kalsi


Iris recognition security system is a most versatile research field of recent years. The Iris recognition system comprises of a segmentation system that is based on the Hough Transform Gamma Correction and Histogram Threshold method. The combination of these systems is able to localize the circular Iris outer circle and inner pupil region, reflection, rejecting eyelid and eyelashes. In this paper, we will discuss the different steps to design a system that process an Iris image through image processing steps such as acquisition, segmentation, normalization, feature extraction and matching. However, it is highly probable that images captured at a distance, without user’s cooperation and within highly dynamic capturing environments lead to the appearance of extremely heterogeneous images, with several other types of information in the captured Iris regions (e.g. iris obstructions by eyelids or eyelashes and reflections). The algorithm is implemented over CASIA v4.0 database, IIT Delhi Database and ICE 2005 database and the accuracy of 99.20%, 97.71% and 98.16% is achieved respectively which is seen better from other literature studied and cited in the work..For the implementation of proposed design, the Image Processing Toolbox under MATLAB software is used.
Full Paper


A Taxonomical Review on MANET Networks for IoT based Air Pollution Controls

B.KameswaraRao, Dr. A. S. N. Chakravarthy


Continuous up gradation nature of the infrastructure and modernization of methods in the air pollution control space demands continues enhancements in the framework architecture and management of Internet of Things.A number of research attempts are made in order to standardize the framework for the MANETs using IoT for air pollution controls by various researchers. Nevertheless, the fissure between the solutions for technical issues like bandwidth, energy conservation, time and architectural complexities and the demand for the up gradation is never a match. The additional components such as practical implementation complexity and cluster based management complexities including lack of MANET data collection standards make the further development into a bottleneck of improvements.
Specifically, the demand of the modern infrastructure management for MANET using IoT is posing a strong demand on timely data analysis and delivery, thus focusing on the need for a highly time efficient architecture to the current research improvements. Thus, this work analyses the current state of the modern research and considers the empirical analysis of the existing models. In the due course of the analysis, this work proposes a novel theoretical framework and compares the results with the existing methods. The major outcome of the work is to build the foundation for the further research and provide a standard framework for IoT based MANET development for Air pollution control.
Full Paper


Image Carving From Fragmented Clusters

Balan C, Nikhil R


The interaction with technology continues to grow in our day today life, so does the amount of data created through this interaction. The role of a digital forensics analyst is to acquire the data and draw conclusions about the events or actions, either caused by accident or with criminal intent create, delete or manipulate data and discover the facts about who or what is responsible for the event. ‘‘Image carving’’ reconstructs images based on their content, rather than using metadata that points to the content. The knowledge of common file structure, information contained in files, and heuristics regarding how file systems fragment data are the factors used in this carving process. This paper aims at carving files from unallocated space, free clusters, lost clusters, slack area, formatted partition, deleted partition or even in cases where file system could be unknown, corrupt or even missing. This paper also aims to carve the files in which the data are contiguouslyallocated or fragmented.
Full Paper


Improved Inner Pattern Evolution Mechanism for Accurate & Efficient Text Mining

Alfiya Sana, Prateek Gupta


This paper presents an innovative and effective pattern discovery technique which includes the processes of pattern deploying and pattern evolving, to improve the effectiveness of using and updating discovered patterns for finding relevant and interesting information. For achieving the relevant output which is left due to less frequency, improved IPE has been suggested and proposed to be implemented in this work. The work has been implemented and tested for precision, recall and f-measure values and found to be better than the existing systems. A comparison has been made to prove the success of the proposed mechanism.
Full Paper


Optimal Relay Design for MIMO Relay Networks Using Gradient Projection

Apriana Toding


In this paper, we design the optimal relay matrices for multipleinput multiple-output (MIMO) relay communication systems with parallel relay nodes using the projected gradient (PG) approach. We show that the optimal relay amplifying matrices have a beamforming structure. Using the optimal structure, the relay power loading algorithm is developed to minimize the meansquared error (MSE) of the signal waveform estimation at the destination node. Simulation result demonstrate the effectiveness of the proposed relay amplifying matrix with multiple parallel relay nodes using the PG approach in the system bit-error-rate performance.
Full Paper