IJCST Logo

International Journal of Computer Science and Technology Vol 6.1 SPL -1 Jan-Mar 2015

S.No. Research Topic Paper ID Download
01

Sensibility of Sensors in Smartphones

Zoltan Horvath

Abstract
Nowadays every second person uses a smartphone but very few know what sensors work inside the mobile. The demand is growing for indoor navigation softwares. This topic is very hot because we have a lot of sensor but we can’t use them for indoor positioning. The other problem is that the sensors are too sensitive and we must find a good algorithm what can filter the data and which can present a solution without errors. Full Paper
IJCST/61/SPL1/ACSECT/135
02

E-CRM Practices in Indian Health Insurance: A Comparative Study of Public and Private Sector Players

Dr. Dhiraj Sharma, Mrs. Jyotsna Pahuja

Abstract
With Privatization and Globalization wave, Indian Insurance Industry has seen a drastic change in terms of better products and services as the Indian customer has become more intelligent and careful in choosing the desired health products at best prices from desired health insurer. CRM technology helps in retaining the customer and reducing overall cost and time of both insured and insurer. CRM with technology has proved to provide better services and products to customers. The paper aims to make a comparative analysis of Indian Health Insurance Companies which are using CRM software/database. The comparative analysis of strategies is based on Customer Relationship Management(CRM) policies, usage and impact on overall organizational performance with respect to profitability, providing services and commitments, maintaining contacts, providing customer satisfaction and thus gaining loyal customers. The results revealed that though both public and private sector companies work on CRM policies, but the companies those have incorporated CRM software in the working system has benefitted more as compared to companies which are not using any such software or database to maintain their customer base. It was found that private sector companies are more concentrating on E-CRM than public insurance companies, and hence they have maintained and focused on large number of customers, have reduced cost, gained market share and thus they are overall profitable. Full Paper
IJCST/61/SPL1/ACSECT/136
03

The Effect of VoIP Payload Size on Upload Delay Values in HSPA and HSPA+ Mobile Networks

Viktor Rebay, Sandor Jenei

Abstract
Voice over IP is a more and more popular way of communication, because people can use it for long distances with very low cost. The importance of mobile broadband is also increasing, since the need for immediate information access is bigger than ever. We can combine these fields, and use VoIP in mobile data networks, but because of the QoS needs, we have to consider some problems or limitations. In this paper we examined the connection between delay, as one of the most important QoS parameter, and the used VoIP codec, the payload size, and the mobile broadband technology in HSDPA and HSPA+ data networks. We found strong connection between these parameters in upload, but no relation in download direction. Full Paper
IJCST/61/SPL1/ACSECT/137
04

Mental Tasks Classification from Electroencephalogram (EEG) Signal Using Gabor Based Matching Pursuit (MP)

Zin Mar Lwin, Mie Mie Thaw

Abstract
Brain Computer Interface (BCI) Systems have developed for people who are suffer from severe motor disabilities and difficult to communicate with their environment. BCI let them for communication by non muscular way. For communication between human and computer, BCI uses a type of signal called Electroencephalogram (EEG) signal which are recorded from the human’s brain by mean of electrode. Electroencephalogram (EEG) signal is an important information source for knowing brain processes for the non-invasive BCI. Translating human’s thought, it needs to classify acquired EEG signal accurately. This paper proposed a typical EEG signal classification system which experiments the Mental Tasks Dataset. Independent Component analysis (ICA) method via EEGLab Tools is used for removing artifacts which are caused by eye blinks. For features extraction, the Time and Frequency features of non stationary EEG signals are extracted by Matching Pursuit (MP) algorithm. The classification of one of five mental tasks is performed by Multi_Class Support Vector Machine (SVM). For SVMs, the comparisons have been performed for both 1-against-1 and 1-against-all methods. Full Paper
IJCST/61/SPL1/ACSECT/138
05

Computer Applications in Biochemical Fishery Research

Dr. Rekha Rani

Abstract
Now a day’s bioinformatics and computer applications in life sciences research highly required and easy way to calculate, design the way of experimental protocol and for databases as well as various library and research institute through internet connect in a single click. By the use of different software easily all parameters of fish can be calculated in accurate way than the manual calculations. In given biochemical study of fish Channa puctatus had used various methods and instruments which all are based on computer like spectrophotometer, colorimeter, flame photometer and other digital instruments which all are connected with the computer,LC50 also calculated by the help of software, all type of graphs and tables design by computer application. Present study related on the fresh water snake headed fish Channa punctatus after intoxication pesticide organophosphate Nuvan. Water is one of the most important essential basic natural resources to the living kingdom. In India, there have been tremendous places in the development and standardization of industrial and agriculture practice, since independence. All pesticides, industrial and agricultural sources discharge their effluents in the adjoing watery areas, they not only frequently make ‘‘Man caused’’ serious hazards in the quality of water, but also the aquatic life, especially to the fish, which is also a Chief food resources of the country. Different kinds of pesticides that are used to control pests like organochlorine, organophosphate (OP) etc. Lethal concentration of Organophosphate (OP) Nuvan calculated for the fresh water snake headed fish Channa punctatus 0.27ml/L after 24,48,72 and 96 hours. For the chronic study 1/10th Nuvan concentration (0.027ml/L) provided to observing fish to period 7, 14, 21 and 28 days. Serum Urea, observed significant increase level in Channa punctatus under Nuvan toxicity at the level (p < 0.001).Serum Creatinine (Cre) also estimated significant and non significant elevation in Channa punctatus under Nuvan stress at the level of (p > 0.05 and p < 0.001).Serum Blood Urea Nitrogen (BUN) observed significant elevation in Channa punctatus under Nuvan toxic stress at the level (p > 0.001).for these all data’s calculations has been made by the use of computer applications. It’s equally less time consuming as well also highly impactful for accuracy determination and for references. Full Paper
IJCST/61/SPL1/ACSECT/139
06

Operations Research and Value Engineering – Role in Decision Making and Productivity Improvement

Dr. Vinod Kumar

Abstract
In today’s highly competitive business environment it has become a truism only the fittest survive. Organizations invest in many different aspects of managing their business in order to remain competitive. Operations research and Value Engineering is a key strategic factor for increasing organizational productivity and for better utilization of resources. Operations Research has gained significance in applications like Lean production, Six-sigma quality management, Benchmarking, Just-in-time (JIT) inventory techniques. The growth of global markets and the resulting increase in competition have highlighted the need for Operation Research. To survive and lead the today is highly competitive and demand driven market, pressure is on management to make economical decisions. Value Engineering can reduce product cost by reducing the unnecessary cost associated with the product. It explores each part of Value Engineering for successful application of the technique. The present paper is an attempt to highlight the significance of Operation Research and Value Engineering in business and industry. Full Paper
IJCST/61/SPL1/ACSECT/140
07

‘ICT in Education’ in the Government Institutions in India: Acceptability Issues Associated with the Technology Shift

Amit Kumar, Tanvir Singh, Dr Sawtantar Singh Khurmi

Abstract
ICT (Information and Communication Technology) has become a buzzword while talking about technology and its applications in the Education Sector in India. The credit goes to the paradigm shift in curriculum where teacher acts as a facilitator in a student centered learning and various ICT tools are supplemented to make the teaching-learning process effective. The government has been introducing some of its pilot projects in the public sector schools and colleges where it can exercise its power freely. The projects involve a lot of public money and documentation but we are yet to see any real implementation of the same. There is a huge difference in drafting a policy on paper and actually implementing it in the practical field. CIET (Central Institute of Educational Technology), NCERT (National Centre for Education, Research and Training), New Delhi has introduced ‘ICT in Education Curriculum’ in 2014 as a pilot project through NVS (Navodaya Vidyalaya Samiti), Noida and IIT Bombay has also been working for last few years on bridging the digital divide in Indian Schools, Colleges and Universities through ‘Spoken Tutorial’ project. Both the projects are funded by MHRD (Ministry of Human Resource Development), Government of India. Both the projects are based upon technology shift paradigm i.e. FOSS (Free and Open Source Software). The idea is really good and has a positive thought process behind it to educate the next generation about the alternate technology which is free and not virus prone. We have been educating our students on software platforms offered by proprietors for a long time now, even when a free and open source platform co-exists. In fact, the current generation does not know about such alternate technology. It’s not a rebellion or an offensive attitude but it is just ignorance about a parallel technology. If it is the case with the common people then how can we ignore the educators or teachers who are going to disseminate the knowledge pertaining to FOSS to the next generation? Therefore, the Educators are needed to be properly re-educated about the FOSS at national level before expecting an implementation of the technology shift. This is not only about learning and teaching a new technology but it is more about changing the thought process of the current and the next generation. Hence, the issue of acceptability of the technology shifts from proprietary software to FOSS is very critical and should be handled in a sensitive manner rather than dictating the terms to the educators. But we have been observing that the documentation regarding implementation of ‘ICT in Education’ is a long way away from the facts. As per ongoing research, it has been observed that there is a big gap between the theoretical and practical situation. The national level government institutions like NCERT should ponder upon the situation again to restructure the process of extending the technology shift project to the masses. This paradigm shift should not be looked as just a change in curriculum but a change in the thought process of the educators as well as the learners. Full Paper
IJCST/61/SPL1/ACSECT/141
08

Simulation of Probability of False Alarm and Probability of Detection Using Energy Detection in Coginitive Radio

Er. Kirti Arora, Prof T.L Sngal, Er.Tulika Mehta

Abstract
The rapid growth of wireless devices and application has contributed to huge demand for licensed and unlicensed frequency spectrum. However, recent studies exhibits that restricted spectrum assignment policy results in congestion for spectrum utilization under which considerable portion of the licensed spectrum is severely under-utilized. To address this problem, Cognitive radio is a paradigm for wireless communication in which network or a node changes its transmission and receiver parameters in order to communicate effectively and avoiding interference with licensed or unlicensed user. The main function of each Cognitive Radio User in CR network is to identify primary licensed user. This is attained by sensing RF environment and a process called Spectrum sensing Algorithm. In this paper the simulation of probability of false alarm and probability of detection is discussed. Full Paper
IJCST/61/SPL1/ACSECT/142
09

Job Stress in IT Age: A Study of Indian Female Bankers

Shelly Gupta

Abstract
In all organizations, employees are one of the most critical resource for gaining competitive advantage. It is one of the most important ‘P’ viz. ‘People’ in services sector; other being ‘Process’ and ‘Physical Evidence’. The IT (information technology) not only enables better customer experience but also enables employees to provide better services. However the complexity of new applications may cause uncertainty amongst the employees. New interventions become a cause of stress in customer oriented organizations like banking sector. This study aims at exploration of sources of role stress in IT age among female bankers. The research follows an empirical approach to study the phenomenon of role stress amongst female bankers in select regions of India. The theoretical and policy implications of the findings of the study have been discussed which would facilitate understanding the role of stress among female bankers. Full Paper
IJCST/61/SPL1/ACSECT/143
10

Mobile Ad-Hoc Networking

Dr. Inderjit Kaur Nijjar

Abstract
A mobile Ad Hoc network is collection of nodes that can physically move and that communicate using wireless technology. Each node can also act as a router and nodes cooperate to facilitate multyhop connections. This is in contrast to the well-known single hop cellular network model that supports the needs of wireless communication by installing base stations as access points. In these cellular networks, communications between two mobile nodes completely rely on the wired backbone and the fixed base stations. In a MANET, no such infrastructure exists and the network topology may dynamically change in an unpredictable manner since nodes are free to move. A mobile Ad Hoc network sometimes called a mobile mesh network is a self- configuring network of mobile devices connected by wireless links. In this paper we discuss the overview of many applications scenarios today where mobile multy-hop mesh wireless communications technology, technical challenges network security quality of service represents. Full Paper
IJCST/61/SPL1/ACSECT/144
11

Stock Trading Strategy Based on Daily Stock Volatility

Ranjit Singh, Amit Kumar

Abstract
In this paper, we introduced a stock trading strategy based on daily stock volatility. We have exploited the moment of the stock and used daily stock range (High price – Low price) and developed a strategy which recommends buying and selling at different prices with different quantities. The daily volatility of the stock makes this strategy highly successful and hence profitable.
Full Paper
IJCST/61/SPL1/ACSECT/145
12

An Empirical Study on Mobile Banking Technology: Factors Affecting its Adoption in Indian Context

Neha Sharma

Abstract
Technology plays a vital role in the global world of banking. Banking sector is one of the largest financial institutions which is constantly innovating new services for better customer satisfaction and convenience. In this information technology era, the mobile banking service is the most common technology which became the part of life for many individuals. Mobile banking is an emerging technology which has given a new face to the Indian banking sector. India is the second largest country which has the high potential for expanding banking through technology like mobile banking services. The constructs in this study were developed by using measurement scales adopted from prior studies. The instrument was evaluated for reliability and validity. Data were analyzed using SPSS. This paper focuses on defining the factors influencing mobile banking adoption. Full Paper
IJCST/61/SPL1/ACSECT/146
13

A Novel KNN Approach to Implement Inpainting and Compression/Decompression Technique and Get an Optimized Output With the Help of DCT Coefficients

Biprajit Bhattacharjee, Sanyam Anand, Usha Mittal

Abstract
This review work has major focus on images which have cracks and minor distortions in them. This prevents any compression technique to give the best output. Hence there is a need to first remove those distortions from the images before applying compression. A system is proposed, in which K-Nearest Neighbor Algorithm is implemented after the DCT Step, to remove the distortions before compressing it. The neighboring color of the distorted part can be used to merge with the damaged part. So basically, we have to store less color intensities to save the same image without the distorted part which will result in more optimized compression ratio. It will be greatly valuable for viewer perspective. Full Paper
IJCST/61/SPL1/ACSECT/147
14

Vehicular Ad-Hoc Networks (VANETs): A Survey

Er. Archana Phutela, Er.Tulika Mehta

Abstract
Wireless networks are gaining popularity now days, as the users require wireless connectivity irrespective of their geographic position. VANETs are the promising approach to provide safety and other applications to the drivers as well as passengers. In this paper we discuss the VANET architecture, security issues, characteristics in VANETs and current solutions to these attacks. Full Paper
IJCST/61/SPL1/ACSECT/148
15

Enhancement in Clustering to Find Cluster Center and Improve Cluster Quality

Veerpal, Sanyam Anand

Abstract
In daily life more much amount of data is produced.Sometimes data created is uncertain and is difficult to handle. By using clustering uncertain data can be handled. Determining cluster center or say guesstimate of cluster center issues from these dissemination are expected. Problem is cracked by non-linear minimum square optimization compliant the cluster center and cluster size. Clustering has many applications in many domains Where clustering is used in various fields of our real life. It is a development which are given here and described few on it. Also is used in various fields are unknown on it. Finding cluster center and cluster sizes are very useful in many areas. Purposed work would describe the enhancement of clustering to define the cluster center to increase cluster quality. Suggested technique is very useful for practical applications and theoretical reflection for clustering problems. Full Paper
IJCST/61/SPL1/ACSECT/149
16

Malware Analysis, Clustering and Classification: A Literature Review

Nirmal Singh, Dr. Sawtantar Singh Khurmi

Abstract
Malware is major security threat on the Internet now-a-days. Anti-Virus companies receive large number of malware samples every day. Malware samples are classified and grouped for further analysis. There are different type of malware analysis, clustering and classification methods available. The purpose of this study is to examine the available literature on malware analysis, clustering and classification. Full Paper
IJCST/61/SPL1/ACSECT/150
17

Is Technology Stressful? (A Study of Indian Public Sector Banks)

Dr. Dhiraj Sharma, Tavleen Kaur Gill

Abstract
Banking sector is rapidly adopting technology in every function to cope up with the increasing competition among the foreign, domestic and private players. The paper discusses the stress factors created due to the usage of technology in public sector banks. The results are based on both primary and secondary mode of research study. It covers the employees working in the branches of public sector banks in Punjab. The study is based on 7 point likert scale derived from the past literature. The objective of the present study is to understand the technological antecedents which induce stress among employees of public sector banks. Three hundred fifty respondents were interviewed through questionnaire from various public sector banks in Punjab. The demographic characteristics of the respondents show that majority of respondents were in the age group of 30 to 40 and 80% of them were males and the rest of them were females. The method of factor analysis has been used for grouping and summarization of factors creating technostress. The factors identified through the factor analysis are: role ambiguity, usefulness, complexity, reliability of technology, and work-home conflict. Full Paper
IJCST/61/SPL1/ACSECT/151
18

Work Life Balance in E- Age: A Study of Women Employees

Ms. Nidhi Aggarwal

Abstract
In terms of Indian perspective, the anxiety over work-life balance is progressively becoming a common talk especially for women employees. Work life balance is a condition of equilibrium in which the demand of both professional and personal life is equal. Managing rising demands from the work and family domains represented a source of high strain for many employees which even lead to the health problems among employees. Although it is believed that work family role strain is more common among women employees, but men also experience stress resulting from differing roles and demands. The purpose of this paper is to figure out the working atmosphere of public sector banks specifically for women employees and what is the opinion of women about the ideas and policies of banks and effects of those ideas on their lives. Chi square test is applied in this paper to check the authenticity of data given by the respondents. The focus of research is on working women in banks with special reference to State Bank of India, Patiala city (Punjab). We propose that Work-Life Balance is nowadays, no doubt a major concern to be discussed as a serious matter and has to be managed. Full Paper
IJCST/61/SPL1/ACSECT/152
19

A Comparative Study of Enhanced ROI Techniques

Navneet Kaur Kang, Sanyam Anand

Abstract
In medical imaging system, image compression is the important task. Economic and effective image compression techniques are needed to minimize the storage volume of medical database in hospitals while maintain the image quality. There are certain regions in an image which demands high quality where small quality reduction might alter subsequent diagnosis. A Region Of Interest (ROI) – based approach is used to separate the important medical data and the background data. This paper proposes four enhanced ROI techniques having common objective to separate the image as foreground and background to improve the compression process. The four techniques are Mixed Raster Contour layering, block-based, region growing and hybrid active contour algorithms. Various experiments performed revealed that all the techniques are efficient to separate the input image into IR and NIR. Full Paper
IJCST/61/SPL1/ACSECT/153
20

A Proposed E-PAM System for Polyhouse Marketing

Resham Arya, Ayesha Bhandralia, Dr. Sachin Ahuja

Abstract
The polyhouse farming technique gives an absolute assurance to the farmers for the timely production of the agricultural commodities despite of unpredictable environment. But farmers do not have any proper channel or marketing system which helps them in advertising their organic polyhouse products and also help in tremendous growth of farmers financially. So, in this paper, an E-PAM (Electronic- Polyhouse Agricultural Marketing) system is proposed which will help farmers to directly sell their products. As there is no market network, some farmers go to the market itself and sell their product which leads to the bad production schemes, because their main focus is on market now. So here, an E-PAM is proposed which will act as an interface between the farmers and the customers. Full Paper
IJCST/61/SPL1/ACSECT/154
21

Role of Cloud Computing in Higher Education

Rekha Rani, Dr. Sawtantar Singh

Abstract
Education is the social pillar for the development of human beings. In Today’s world, Information and Communication Technologies (ICT) are being used to deliver education services. The interlinking of computing devices have resulted into World Wide Web (www) of computers and gave birth to new term that is Internet. The internet also helps in providing several methods to accomplish the goal of learning. A new concept of E-learning emerges out of it. The e-learning means delivery of education service to the user or client anywhere, anytime. E-learning is possible with the help of Internet to spread education services with minimum expenditure throughout the country due to ease of access through handheld and easily affordable devices. There are many problems that exist in the traditional education system like integration of teaching resources, teaching development systems, teaching information systems [9]. E-learning is a service in the form of many applications like content management, virtualization, resource management, Communication management, management of learning etc. Keeping the pace with the technology, the Cloud computing technology shows another silver lining in delivery of education electronically [8]. The explorers allow users to share or access information from any device like mobile phone, tablets, personal computers (PCs) [13].
Full Paper
IJCST/61/SPL1/ACSECT/155