Special Issue No. – 2, August, 2019

National Conference on Advancement in Engineering, Science & Technology

Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India

Program Identification in Wireless Sensor Networks

Authors:

D. Jeyapriya,R.Velvizhi,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00011

Abstract:

Deployment of Wireless Sensor Networks (WSN) has accomplished enormous development lately making it wind up plainly one of the best creating regions of the low information limit correspondences framework. The critical issue in WSN is the requirement on vitality and preparing assets capacity in bit which lessens down potential usefulness of sensor hub. Likewise persistent utilization of a solitary briefest course amongst source and sink brings about a shorter life expectancy of a sensor hub which thusly debases the system execution. The imperative thought for the wide scale WSN is the advance on control usage productivity. In this way bunching is imperative vitality productive steering procedures for WSN. The proposed Spherical Routing convention (SpRP) are planned and its execution measurements are assessed as i.e. number of bundle transmitted, number of parcel got, rate in parcel conveyance, throughput and normal lingering vitality and contrasted and the execution measurements estimations of Modified LEACH (M-LEACH) grouping Protocol. The conclusion from the investigation of results is that SpRP convention accomplishes better streamlined execution difference to famous M-LEACH convention. The anticipated work results from the execution measurements can includes additional life time in a WSN to give unrivaled Quality of Service (QoS).

Keywords:

Data Capacity,Spherical Routing,M-LEACH,Life traverse,Quality of Service,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “ Journal of Chemical and Pharmaceutical Sciences(JCPS)” Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar, J. Sriram M. “Vehicular cloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Multi Participant Chat Analysis

Authors:

K. Anita Davamani,S.Amudha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00012

Abstract:

Human practices have dependably been of incredible enthusiasm to analysts and researchers. Surmising positive and negative suppositions from discussion has been something which humanity has dependably had enthusiasm from an earlier time. With the appearance of web-based social networking channels, the measure of data we are getting about people and their practices is enormous. Internet based life has brought the discussions of individuals as content which can be handled, and inductions can be made. At present there exists a ton of work in the field of slant examination and there have been a couple of web administrations which use feeling investigation for impact positioning and brand gathering figuring. In my project, my research work is focused on analyzing massive group chats and dividing them separately for every user by clustering them based on gap between them. It can be very useful for societies, Business farms, National Security and in many other fields. Because in today’s world where everybody is interested rely on the data harvesting and What people are talking about. From a big cooperation to National Investigation Agencies (NIA) rely on data about the conversation between people’s what they are more commonly talking about and is there anything odd in those conversations. But a big question arise as there are thousands of groups and they have hundreds of members and thousand’s of messages out of them there few ones who participate actively while there are many members who rarely send messages in those groups and in those thousand’s of messages there is some particular words which are used more commonly and while there are also words which get used rarely. So how to classify all this information? Can we rely on manual classification? Or do we need program to automatically do this work for us and presenting in form of graphs?

Keywords:

web-based social networking,measure of data,(NIA) rely on data,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg. No. 103-S106, 2016
VIII. Priya, N., Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9, Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

A Novel Voice Authentication Using Hidden Markov Model (HMM)

Authors:

K. Anita Davamani,Sangeetha.S,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00013

Abstract:

Hidden Markov Model (HMM) is a characteristic and profoundly hearty measurable technique or programmed voice check. The ordinary sign dealing with strategies envision that the sign ought to be stationary and are inadequate in observing non stationary standard, for example, the voice signals. The voice check framework consolidating the pre-accentuation, begin/end point identification, include extraction and vector quantization. Gee is utilized both in preparing procedure and check process. The info discourse sign is pre-underlined to wipe out the foundation clamor and to improve higher recurrence parts. For this reason a first request high pass FIR channel was utilized. Begin and end point identification of the ideal discourse sign must be finished. For this reason decrease calculation is utilized. At that point the Mel cepstrum is utilized to get an awesome voice check framework. The Mel cepstral coefficients got from each must mapped to a solitary point. For this reason vector quantization is utilized. This is used in HMMA Hidden Markov Model is a Finite State Machine having a fixed number of states. It is a quantifiable procedure for delineating the ghastly properties of the edges of a point of reference. The verified weakness of the HMM is that the trade can be all around depicted as a parametric energetic philosophy and that the parameters of the stochastic system can be considered in a particularly outlined way. Gee is a doubly installed stochastic procedure with a hidden stochastic procedure that isn't straightforwardly recognizable, yet can be watched distinctly through another arrangement of stochastic procedures that produce the grouping of perceptions. The layout technique for discourse acknowledgment experiences the time arrangement issue. DTW takes care of this issue by utilizing Dynamic Programming. Nonetheless, the format approach did not depend on factual sign displaying in an exacting sense.

Keywords:

HMM,wavelet transform,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”. Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Intelligent Surveillance System with Time Optimization

Authors:

M. Ramamoorthy,N. Ayyanathan,M. Padma Usha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00014

Abstract:

Recent video surveillance system provides a path to continuously monitor any place at any time. In addition IP based surveillance system helps to monitor the place remotely through wide area network. Here the system is designed such that the camera which captures the video act as the front end and the computer which helps as to view the details acts as the client of the system. The main aim of this paper is to increase the resolution of the video in the system and to reduce the transmission time of the IP based video surveillance system. In this system we use IP camera to capture the scene and a field programmable gate array (FPGA) is connected to the local server through the IP network. The FPGA used here is programmed to process the captured video and operates towards effective data transmission in IP network. The algorithms like connected component labeling, background modeling is analyzed along with High Efficiency Video Coding (HEVC) to enhance the quality of the video captured. In future on updating the designed model Using WAP structure the cell phones can be used for the client side of the system. As expected due to the introduction of efficient video coding and IP networking the transmission time is highly reduced in our proposed system.

Keywords:

HEVC,FPGA,Video Surveillance,Image Enhancement,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET”, 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Relationship Identification & Prediction Of Diseases Association Using Micro-RNA Of Genomic Data

Authors:

G. Michael,R. Kavitha,P. Abi Glory Treasa,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00015

Abstract:

The current process of finding the relationship between the father and the son and also predicting the diseases that is yet to occur is quite inaccurate because it includes only the gene-id of the respected person. In order to handle or to make this system more accurate, we propose this system by using the chromosome structure of the person. This system takes the input of the chromosome structure of the son that has been partitioned from the father’s chromosome structure. It initially preprocesses the image of the son using the collaborative filtering for making it look different from the input image to show the similarity between the father and the son. It then detects the edge of the structure after preprocessing it using the SOBEL edge recognition calculation. The SOBEL edge discovery calculation is that the inclination of the picture is determined for every pixel position in the picture .After detecting the edges of those input images, matching process starts between the input image and the list of father chromosome images. Then the matched output appears. In order to predict the diseases which is yet to come in future for the son is represented graphically by dividing it into three colors, firstly green represents there is less possibility of the son getting the disease, secondly yellow represents there may be any chance of son getting the disease and finally red represents there is high possibility of son getting the disease.

Keywords:

Image processing,Edge detection,Image matching,Graphical representation,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.Sridhar, J. Sriram, M. “Vehicular cloudc omputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April -June, 2016

View | Download

Forensic Investigation of data in cloud environment with virtual objects

Authors:

Michael G,Sangeetha.S,Akilesh JS,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00016

Abstract:

Virtualization is the heart of business nowadays as this holds the key to the development of the world in terms of advancement in technology. It is often noted as the medium through which the single physical device can be used to emulate several virtual copies which can function as stateful entity. These machines are capable of running on their own as in a physical machine where the storage system is often encapsulated and not visible from the base layer. As the technology matures, the crimes associated with it also mutates which is not in the best intent of the innovators. To curb these crimes in cloud environment, forensics investigation must be wellequipped. An attempt has been made in this project to investigate the forensic analysis of data in cloud environment specifically on Amazon Web Services EC2 instances by leveraging the tools from ThreatResponse project. Advanced cloud forensic capabilities help an organization to adapt to challenges and result in improved overall security for the systems.

Keywords:

Cloud Computing,Cyber Crime,Digital Evidences,Forensics Solutions,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N. Sridhar, J. Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Applying New Cryptographic Methods in E-Banking security

Authors:

N. Priya,C. Anuradha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00017

Abstract:

Electronic Banking that is furthermore define as E –Banking.It could be a supply of getting information concerning bank and its various administrations by means of web. E - Banking is at present the crucial substance of Banking administrations. Information innovation has purchased real changes inside the operational setting of the Banking sector. The creative strategies upheld by banks square measure inside the kind of programmed teller machine Machines – ATM's, on-line Banking, phone Banking, Mobile Banking and so on,. the wellbeing and protection of the learning is that the real concern on the whole web Banking techniques. Additionally the web keeping money industries inclined to assaults related with client validation. The objective of this paper is to discuss various encoding systems upheld science advancements and audit various methods for security in E-Banking

Keywords:

E-banking, Security,Encryption, Decryption,Cryptography,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“ Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N.,SridharJ., Sriram M.: “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2., April – June 2016

View | Download

Analysis of Block Chain based E-Procurement System –A Novel Approach

Authors:

Priya N,Ponnavaikko M,Rex Aantonny,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00018

Abstract:

In recent years everything is digitalized in the world. E-procurement is one of the services used by the government in business sectors. Security is the main aspect of this e-procurement method. In existing systems, various cryptographic mechanisms are used. Recently block chain made a tremendous change in business and economic activities. blockchain is a distributed ledger that stores the transactions in a secure and immutable way. In this paper Blockchain mechanism is introduced in the proposed system for a secure E-Procurement system. Hyper ledger composer supporting e-procurement framework is designed. Few consensus algorithms in blockchainare discussed to support the blockchain method.

Keywords:

E-Procurement,cryptography,security,block chain,consensus,hyper ledger composer.,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2, 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016
X. P. Zahradnik, “Equiripple Approximation of Low-pass FIR Filters Equiripple Approximation of Low-pass FIR Filters”,IEEE Transactions on Circuits and Systems II: Express Briefs, Issue: 99,pp. 1-5, 2017
XI. P. Zhao, J. McNeely, P. Golconda, M. A. Bayoumi, R. A. Barcenas, W. Kuang, ” Low-Power Clock Branch Sharing Double-Edge Triggered Flip-Flop”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.: 15, Issue: 3,pp: 338 – 345, 2007
XII. R. Kubasek, Z. Smekal, E. Gescheidtova, K. Bartusek, “Design of Twochannel Half-band Bank of Digital Filters using Optimization Methods”, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, page: 151, 2006
XIII. S. Archana, G. Durga, “Design of low power and high speed ripple carry adder”, International Conference on Communication and Signal pocessing, pp: 939 – 943, 2014
XIV. S. K. Mitra and J. F. Kaiser, Handbook for Digital Signal Processing. New York, NY, USA: Wiley, 1993.
XV. S. Samadi, A. Nishihara, H. Iwakura, “Universal maximally flat low pass FIR systems”, IEEE Transactions on Signal Processing Vol: 48, Issue: 7,pp: 1956 – 1964,2000
XVI. Wen Bin Ye, Xin Lou, Ya Jun Yu, “Design of Low-Power Multiplierless Linear-Phase FIR Filters” , IEEE Access, Volume: 5,pp: 23466 – 23472,2017
XVII. X. Zhang, K. Intosume, and T. Yoshikawa, “Design of low delay FIR half band filters with arbitrary flatness and its application to filter banks,” Electron. Comm. Jpn 3, vol. 8, no. 10, pp. 1–9, 2000

View | Download

Execution increment of Classifiers using Combination of Clustering and examination Techniques

Authors:

P. Nandhini,Sangeetha. S,

DOI:

https://doi.org/10.26782/jmcms. spl.2019.08.00019

Abstract:

Therapeutic masters require a solid guess thinking to separate Diabetes. Information mining is the way toward isolating information from trade viewpoints and spreading out it into noteworthy data. The basic objective of information mining is to find new cases for the clients and to make an understanding of the information cases to give basic and huge data to the clients. Information mining is related with find vital cases to help in the basic errands of therapeutic affirmation and treatment. In this paper, execution examination of direct assembling figurings and joined packaging and course of action calculations are done. It was discovered that the joined packaging depiction procedure was superior to the essential social occasion approach.

Keywords:

KDD,Simple K-Means,Density Based Clustering,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.Sridhar, J.Sriram, M., “Vehicularcloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2, April – June 2016

View | Download

Extended VEoT framework – Implemented in a Smart Boutique

Authors:

S. Pothumani,C.Anuradha,A.Ashok Kumar,

DOI:

https://doi.org/10.26782/jmcms. spl.2019.08.00020

Abstract:

With advent of new technologies in communication and security in IoT and advantages of Cloud computing, have multiplied, the opportunities in Smart homes, Offices and Equipment’s. Augmented Reality (AR) adds another dimension to the experience. The proposed system makes use of all these concepts including Edge computing to design a Smart Boutique. A boutique is a unique store that sells stylish, luxury and fashion clothing, jewelry, or other exquisite goods. Considering the richness to be experienced by the Customers, the usage of these techniques would amply complement their senses. VEoT or Virtual Environment of Things is a framework for combining all these technologies to mix both real world objects and Virtual Reality. It is very important to cater to the needs of customer in a unique way, giving personal touch to the business. This would create repeat orders and would attract more customer footfalls. The base paper gives a concrete architecture for combining IoT and AR with the help of Edge server. We have tried to make the system robust, including a kiosk touch screen to enable the customer to have more information on Boutique and its articles. The goal of the system is to produce renewed customer experience and create a Smart Boutique with technology.

Keywords:

Augmented Reality,Internet of Things (IoT),Kiosk,Virtual Environment of Things (VEoT),Cloud Server,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.Sridhar J., Sriram M., “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download