International Journal of Computer Science and Technology
IJCST 8.2 ver-2 (April-June 2017)

S.No. Research Topic Paper ID Download

Finger Vein Recognition with Gray Level Co-Occurrence Matrix based on Discreet Wavelet Transform

Mansur Mohamed Ali, Khalifa Nusrat, Abdelhafid Ali I. Mohamed, Mohamed Ali Hagal, Hend Hadia Ali Almezogi, Javad Rahebi, Aybaba Hançerlioğullari


In this paper, presented a robust method for finger vein recognition with gray level co- occurrence matrix based on the discrete wavelet transform. In first step for compression of the image we used wavelet Daubechies 4. Also we used local binary pattern for feature extraction.The combination of local binary pattern and gray level co- occurrence matrix with discrete wavelet transform is not used before for finger vein recognition. The simulation results show that this method is robust and fast for feature extraction and classification.
Full Paper


A Review on Data Aggregation

Krati Rastogi, Kaushik Ghosh


A Wireless Sensor Network (WSNs) is a network consisting of various nodes in the network. The application of this network is in various fields such as in health monitoring, environmental management, security and military, etc. Constraint for the network of wireless sensor nodes is the size of node as it is very small and has limited processing capability with low battery power. Collection of data from the nodes and sending to the other node is the main aim of the wireless sensor network. It basically collects information from various nodes and sends the collected data from source to the sink node. Wireless sensor network has been used to transmit data to base station from among the collected data of various sources it has sensed for decision making method. Transmitted information is collected to the base station which may act as a station for data aggregation that stores all the collected data and transmit further for more operations. With the help of data aggregation we can reduce the energy consumption by eliminating the redundant data, the implosion and overlap of data among the nodes in the network. For era of development in the field of the improvement in the energy of wireless sensor networks (WSN) data aggregation is an excellent technique. This paper reviews about the techniques of data aggregation efficiently for the energy conservation in the network.
Full Paper


Modified Multicast Cellular Aggregated Location Management

Upendra Verma, Ayush Soni, Damini Ranawat, Parth Rajpal


The wireless ad-hoc network operates without an access point. When this infrastructure less network provides the mobility of nodes we call it MANET. Various protocols are proposed for MANET’s, some of which provides multicast services. Today, the application of multicasting can be seen in defense area, multiple user games and natural calamity operations. The internal working of protocols can be different but the goal of all the protocols are same i.e. reliable and efficient multicast packet delivery. The route of the Multicast packet transfer become sensitive with respect to mobility. In order to, enhance the efficiency and reliability, the MPRs (multi point relays) selection mechanism along with multicasting in CALM is used. So, to transfer the data packets i.e. multicast packets, from the source to group members we have proposed an approach that builds multicast delivery routes using multi point relays.
Full Paper


Optimizing the Management and Use of Energy in the Greenhouse by Modeling the Associated Heating and Cooling Systems and Implemented by an Intelligent Controller

Didi Faouzi, N. Bibi-Triki, N. Benmoussa, A. Bouhdjar, A. Abène


In Algeria, greenhouse cultivation is undergoing significant development. To meet an increasingly competitive market and conditioned by increasingly stringent quality standards, “Greenhouse” production systems (heating and air-conditioning systems) Become considerably sophisticated and then disproportionately expensive. That is why locks who want to remain competitive must optimize their investment by controlling production conditions. The aim of our work is to model heating and air conditioning systems whose goal of heating and cooling the air inside our model and implemented in our application of climate control are due to the fuzzy logic that Has the role of optimizing the cost of the energy supplied using MATLAB software.
Full Paper


Data Mining Technique, Method and Algorithms



Data mining is a technique of finding and processing useful information from large amount of data. The paper covers all data mining techniques , algorithms and some organisations which have adopted data mining technology to have better information about business patterns.
Full Paper


Environmental Change Analysis in Nias Island Using Remote Sensing Technique

Togi Tampubolon, Rita Juliani, Evan Alvin Harefa


This research was aimed at identifying the environmetal change by using Landsat 5 TM satellite imagery and Landsat 8 OLI with NDVI and LST parameters in Nias island. It was conducted by using overlay method by utilizing the ArcGIS 10.0 software and ENVI 4.7, at the administrative boundary map in the local area which is supported by 40 control points (GCP) of direct observation in the research area. The results showed a decrease in the normalized difference vegetation index (NDVI) and the increase in the average of land surface temperature (LST), so that it can be concluded that there was environmental changes in Nias Island
Full Paper


Smart Precision based Irrigation System using Embedded Systems

Chinmay Salaskar, Meet Shah, Ankush Kumar, Priyank Doctor, Narendra Vishwakarma


In the recent technology obsessed world, the need for inclusion of technology in the existing agricultural techniques has become the need of the hour. This project proposes a layout of a smart precision based agricultural irrigation system with the use of embedded machines which is value effective along with improvements in the existing conventional techniques and practices in the field of agriculture. Presently, the Indian agriculture is well developed in comparison to many nations. The Indian agriculture contributes approximately 14% to the overall GDP of the country. However, there is much scope for improvement using technology in the existing agricultural methods. Compared to many other foreign countries the Indian farmer is not very well exposed to the technology. One of the major problems is that there is a lot of human intervention needed even after installation of current systems that exists. Also, there is a need of economical and easy to use agricultural systems that can be an active companion to the farmers. Also, there is an upcoming term, precision agriculture which is about the observation and measuring of real-time values. The functions carried out by our proposed system is to control water supply to the crops automatically. The outcome of the system will be based on various sensors like temperature, humidity, soil moisture and raindrop sensor that acquire dynamic values from the surrounding which can be used to set the threshold parameters for carrying automated decisions. The sensor will be coupled with the combination of microcomputer and microcontroller. The other functions in the system include remotely controlling as well as monitoring the overall working system.
Full Paper


GARDUINO- The Garden Arduino

Osho Tripathi, Paras Gandhi, Dr. Naveen Kumar Jayakumar


Home automations systems are a requirement of modern day life, because we might not be present at our homes every time. There isrequirement of this system not only for people who are too busy but even for those who are physically handicapped. The point we will be discussing in this research paper is which option we shall choose to make a home automation system more interactive and easy to use and with major point being its cost. Though there are systems present in the market but they are not cost effective because they are using more complex mechanism and costly materials. Such a system for garden is known as Garduino-the garden Arduino.
Full Paper


NBA Web Portal

Veena J Jadhav, Abhishek Kumar, Sharad K Yadav, Sahil Srivastava


Accreditation is said to be an important part for assuring quality of institutions regarding education in colleges and university, particularly in engineering education. Ministry of Human Resource Development (MHRD) and University Grants Commission (UGC) established National Board of Accreditation (NBA) and National Assessment and Accreditation Council (NAAC) for the sole purpose of just assuring proper education environment. So, in this paper we will be discussing about a web portal we designed for college management system. This paper develops and describes a web model which covers different aspects of web designing. Visual Studio is used for designing purpose and c# is used for the purpose of coding and database management.
Full Paper


Efficient Text Mining using Improved IPE Algorithm

Alfiya Sana, Prateek Gupta


Many data mining techniques have been proposed for mining useful patterns in text documents. However, how to effectively use and update discovered patterns is still an open research issue, especially in the domain of text mining. Over the years, people have often held the hypothesis that pattern (or phrase)- based approaches should perform better than the term-based ones, but many experiments do not support this hypothesis. This paper presents an innovative and effective pattern discovery technique which includes the processes of pattern deploying and pattern evolving, to improve the effectiveness of using and updating discovered patterns for finding relevant and interesting information. For achieving the relevant output which is left due to less frequency, improved IPE has been suggested and proposed to be implemented in this work.
Full Paper


The Contribution of Public Relations Practice to Organizational Effectiveness: A Case of Private Universities in Rwanda

Andrew Nyanyuki Onsongo, Dr. Hellen Mberia, Dr. Margaret Jjuuko


This study aimed to investigate the contribution of Public Relations practice to Organizational Effectiveness in private universities in Rwanda. The study focused on the current execution of public relations activities and how they enhance organizational effectiveness of private universities. The research employed several objectives as to: establish the contribution of public relations communicator roles to organizational effectiveness in private Universities in Rwanda; determine the effect of public relations practice models used in enhancing organizational effectiveness in private Universities in Rwanda; and establish the influence of public relations hierarchical placement in organizational effectiveness in private Universities in Rwanda. The researcher based this study on the Excellence and the Systems Theories of public relations and rational, systems, and strategic constituents modals of organizational effectiveness. This study employed a quantitative approach and a descriptive survey design. Data analysis was done using computer SPSS software. The findings revealed that PR had a high positive influence on organizational effectiveness. However, the nature of practice of PR in private universities in Rwanda did not meet the excellency threshold provided by the Excellency theory and did not adequately play the role described by the systems theory. In addition, the ideal two way symmetrical model of communication was not satisfactorily applied and, finally, PR was not duly constituted at the strategic level. Thus, study recommends enhancement of PR practice in private universities to the Excellency standards in order to facilitate PR to have a real contribution to effectiveness of the institutions.
Full Paper


Relevant Content Extraction and Text Summarization

Yashashvi Sharma, Ashutosh Dixit


Text Summarization is a process of extracting or collecting important information from original text and providing that information in the form of summary. It is an important research area in today’s era of the fast growing information age. As information is growing day by day on the internet, it is difficult for users to identify the relevant information. Users have to read the whole document to determine whether the given document is relevant or not. With the help of text summarization a shorter version of large text documents by keeping relevant information from the original text document can be generated. In this work, the focus is on the comparison of clustering technique and novelty detection technique used in generating summary of the documents.
Full Paper


The Multi Keyword Search over the Encrypted Data in Cloud Storage

Sindhuja Somisetty, Dasari Ravi Kumar


The significance of keywords will change a great dispense of exactresults, and in this manner the inclination variables of keywords state to the significance of keywords inside the inquiry keyword set nominative via search users and correspondingly allows customized hunt to oblige particular client inclinations. Individual will remotely store her insight on the cloud server, particularly information outsourcing, thus make the cloud computing open for free through the cloud server. It contain delicate protection data, they’re typically encrypted before transferred to the cloud. Be that as it may, significantly restrains the ease of use of outsourced information on account of the issue of watching out over the encrypted computing. Amid this paper, we tend to address this issue by building up the fine-grained multi-keyword search conspires over encrypted cloud information. The cloud server then uses the figure to coordinate the outsourced encrypted keywords, and in conclusion gives back the coordinating results to the pursuit client. to achieve the comparable inquiry intensity and exactitude over encrypted information as that of plaintext catchphrase seek, a top to bottom collection of examination has been produced in writing. an investigation client questions the outsourced reports from the cloud server with taking after 3 stages. To start with, the pursuit client gets each the key and symmetrical key from the data proprietor. Second, in accordance with the hunt keywords, the pursuit client utilizes the key to think of trapdoor and sends it to the cloud server. Last, she gets the coordinating record arrangement from the cloud server and unscrambles them with the symmetrical key.

Full Paper


Autonomous Vehicle With Monocular Vision for Object Detection Using Haar-cascade Classifiers

Tuneer Guha, Sarthak Kataria, Shivam Goel, Netra Patil


The biggest challenge in case of an autonomous driving system is proper integration of all the functions to be carried out for a safe driving experience. Detection of obstacles and prevention of collision plays an important role in road safety in case of such vehicles. The use of Haar-feature based cascade classifiers provides a light weight solution to object detection with extensive use of computer vision. With the help of monocular vision, image processing algorithms (Gaussian blur), identifying brightest spots (e.g. break lights of a car) and distance measuring algorithms, quick collision preventing actions can be taken. Multilayer Perceptron(MLP-ANN) can be used to classify objects and paths to create a simple decision making data structure for proper navigation. This paper illustrates on an intelligent self-driving vehicle that uses all the above methods tied together to drive on a predefined path. The monocular vision camera takes in image inputs that are processed and the above algorithms are applied on them. This acts as input to the ANN that recognizes the road direction. The road direction is classified into 4 classes- left, right, forward and reverse. The neural network then takes the correct decisions based on the road direction and obstacles that lie on it.

Full Paper


Data Mining: Evaluation for Intrusion Detection System

Jucy Job M, Hinduja Hariharan


Data mining has been gaining popularity in knowledge discovery field, particularity with the increasing availability of digital documents in various languages from all around the world. Network intrusion detection is the process of monitoring the events occurring in a computing system or network and analyzing them for signs of intrusions. In this paper, intrusion detection & several areas of intrusion detection in which data mining technology applied are discussed. Data mining techniques are used to discover consistent and useful patterns of system features that describe program and user behavior. Data mining can improve variant detection rate, control false alarm rate and reduce false dismissals. By using these set of relevant system features to compute classifiers that recognize anomalies & known intrusion.

Full Paper


Smart Training & Placement System

Dr. S.B.Vanjale, Rahul Kumar Modi, Supreet Raj, Akshit Jain


The system focuses on automation of conventional training and placement management system. This system can be used as an application for the Training & Placement Officers in the college to manage the student information with regard to placement and providing assistance using the assistance portal where students can post their query to the TPO and coordinators. Providing Student login helping them to update their personal and educational information in a form which will be added to the database and upload a resume and providing them with preparation materials for placements. An additional feature of the portal is a Company Tab which will be providing assistance to the companies to shortlist the students as per their eligibility criteria. It reduces the manual work and consumes less paperwork to reduce the time. Front end of the system is developed with the help of CSS, Bootstrap, and HTML. Backend of this system will be managed with the help of Java, Servlets and JSP’s. Database management of this system will be done with the help of MYSQL database.

Full Paper


Effect of Interactive Radio Platforms on Family Planning Comprehension in Kigali City

Jacqueline UWAMWEZI, Gerard RURANGWA, Dr. Hellen Mberia, Dr. Margaret Jjuuko


Nowadays, people can access radio broadcasts whenever they want by using different distribution platforms. The objectives of this study are; to determine the level of interactive radio platform to the Comprehension of family planning in Kigali city, to assess the level of audience participation to the Comprehension of family planning in Kigali city and to analyze the effect of radio content to the Comprehension of family planning in Kigali city. In this study, the researcher used a descriptive research design because the study aimed at obtaining information concerning the current status of interactive platforms in radio broadcasts on family planning. For the purpose of this study, a sample size of 399 respondents was determined from total population of women lives in Kigali city. ANOVA results further show that types of interactive radio platforms, audience participation and radio content explains variations of comprehension of family planning. The results show that the sig value (0.000) is less than the level significance (0.05). The F-statistics (F=214.145) is far greater than the P-value (0.000) hence a further confirmation that aspects of types of interactive radio platforms, Audience participation and radio content are significantly influential the comprehension of family planning. The interactive radio platform were significant with (sig=0.000 and 0.01) while radio content is not significant with (0.021 is greater than 0.005). This means that all variables influence the comprehension of family planning except the radio content. Further, there is a positive and significant effect of interactive radio broadcast content on the comprehension of family planning programs in the selected radio stations and radio programs among the population of in Kigali City. A big number of females still believe that women asking men to use condoms mean that they are promiscuous. Therefore, it is recommended for radio program directors and presenters to give more content on this topic and allow more audience participation so that listeners can from each other.

Full Paper


Ranking Fraud Identification for Mobile Apps Consuming EA-RFD Model

Gogula Sravani, A. Swathi


From most recent couple of years, mobile technology has been gotten a great deal more consideration since it is most mainstream and essential need of today’s reality. Because of the fame, mobiles are significant focus for malignant applications. Key test is to distinguish and expel pernicious apps from mobiles. Various measures of mobile apps are produced day by day so ranking fraud is the one of the real angles before the mobile App advertise. Ranking fraud alludes to fraudulent or defenseless exercises. Primary point of the fraudulent is to thump the fraud mobile apps in the fame list. Most App engineer produces the ranking fraud apps by precarious means like upgrading the apps deals or by essentially appraising fake apps. Subsequently, there is need novel framework to adequately break down fraud apps. This paper gives a study on different existing methods with the curiosities highlighting the need of novel procedure to distinguish fraud mobile apps. This paper is inspired by emerging need to distinguish fraud apps with less time. In proposed framework, we include suggestion based the changed ranking.

Full Paper


Particle Swarm Optimization Move toward for VLSI Steering using Modified Prim’s Algorithm

Nitin Agarwal, Aditya Prakash, Praveen Khichar, Sumit Lathwal, Dr. N. S. Choubey


Brisk advances in VLSI development has extended the chip thickness through reliably growing the wide grouping of parts on an unmarried chip, and furthermore decreasing the chip full length. In this kind of bewildered condition, the primary target is to restrain the power put off consequence of the system. it may be finished by technique for cutting down the interconnect concede by methods for increasing the rope distance i.e. through the right connection of the significant number of centers. The insignificant estimation of connection of all center points can be founded by methods for a linear stone minimum Tree (RSMT) surrounded through the center points. The issues of searching a RSMT are NP-complete. Particle Swarm Optimization is a capable swarm understanding arrangement of standards which brags of fast joining and ease of use, fit for settling the sort of issue. This document gives a lone discrete atom swarm improvement (DPSO) to clear up the NP-entire burden that is searching RSMT. Changed PSO game plan of rules has been gotten with the ultimate objective of verdict the estimation of RSMT. An outstanding difference to the reliable PSO had been done all the way through showing the alteration treatment of hereditaryfigure which makes up to 15% diminishment in the rope height or estimation of connections. Two types of the DPSO set of principles – first with straightly cutting down inaction weight and some other with self-adaptable torpidity weight – had been used and their outcomes were in relationship. Examinations have additionally been made among the results available from latest pieces and our game plan of measures and the last has set up on to it to dominating in updating the interconnected length and thusly finding the slightest twine length.

Full Paper


A Survey on the Machine Learning Techniques for the News Classification

Amritpal Singh, Sunil Kumar Chhillar


Data mining proceeds with large amount of data. Data mining has popularly treated as synonym of knowledge discovery in database, although some researchers view data mining as an essential step of knowledge discovery. Online news classification is vast area of data mining. As large numbers of articles are published it is time consuming task to select the interesting one. There have been a lot of work for the outer classification but there has been a very less amount of work for inner classification of news. The paper here deals with the existed studies surveyed on the news classification using various machine learning methods.

Full Paper