VOLUME 7, ISSUE 8, AUGUST 2018
Combining Genetic Algorithm and Switches for Improving the Quality of Compression
Digvijay Singh Thakur, Prabhakar Sharma
Survey on Data Mining Related Methods / Techniques and Text Mining
Monika Kohli, Rohit Tiwari
Detect Eavesdropper and Traffic Analysis in Wireless Sensor Network to Measuring Global Warming
Rozina Barveen.K, Dr. S.J.Sathish Aaron Joseph
Decentralized Public / Private Ledger Technology and It’s Applications
Akshat Minesh Doshi
Arduino Based Security System for Women
Abhijeet Mane, Manoj Gharghe, Omkar Pol, Karan Grover, Prof. Vijaya Chavan
Elements of System Programming
Pratik Awari, Prathamesh Salunke, Gaurav Rathod, Himanshu Ghatole, Prof. Swati Patil
Survey on Data Security and Security Risks
Varsha Bhosale, Simran Bhaldar, Prerana Ambavale, Chinmayee Achrekar, Swapnil Patil
A Review and Analysis of Centroid Estimation in k-means Algorithm
Mrs. Mini Jain, Prof. Chetan Gupta
Optimization of Low Power CMOS based Voltage Reference Generator in 32nm
Sneha Meshram, Uday Panwar
Survey of Multi Instance learning Algorithms
M.Kavitha, Jasmin Thomas
A Study on Artificial Intelligence
Swaraj Sanas, Srijeet Patil, Om Patil, Prof. Suvarna Nimkarde
Evolution of Operating System
Vivek Laxkar, Pandurang Lahane, Nikita Abhang, Mohanish Shinde, HOD Mithun Mhatre
Performance Analysis of Feature Selection for Twitter Sentiment Analysis: Classification approach
Shweta V. Raut, Madhu M. Nashipudimath
Wireless Data Transfer using Solar Panel in Li-Fi Technology
Aayush Gupta, Syed Adeebul Hafiz, Iltesha
Quality of Service (QoS): Congestion and Queuing
Mahesh VR, Ankush Reddy P, Charan HM, Anil Umesh
A Survey: Document Spamming Detection and Plagiarism Content Techniques
Nidhi Ruthia, Abhigyan Tiwary
Deep Learning
Nikita Patil, Krishna Kadam, Amol Kode, Rohit Thakur, Rahul Patil
Paper on Genetic Algorithm for Detection of Oral Cancer
Nooreen Fatima, Mohammad sameer
Multi-Featured Android Car
Namrata Mahakalkar Khade, Rakhi Kumari, Tushar Wahane, Aditi Gudadhe, Dnyaneshwar Nagrikar
Sleeping Mode MODLEACH Protocol for WSN
Shiv Ashish Dhondiyal, Deeepak Singh Rana
Abstract
Type-Shifting: Four Categories
Hamidreza Bahramian
DOI: 10.17148/IJARCCE.2018.781
Abstract:
Keywords:
Abstract
Combining Genetic Algorithm and Switches for Improving the Quality of Compression
Digvijay Singh Thakur, Prabhakar Sharma
DOI: 10.17148/IJARCCE.2018.782
Abstract:
Keywords:
Abstract
Survey on Data Mining Related Methods / Techniques and Text Mining
Monika Kohli, Rohit Tiwari
DOI: 10.17148/IJARCCE.2018.783
Abstract:
Keywords:
Abstract
Detect Eavesdropper and Traffic Analysis in Wireless Sensor Network to Measuring Global Warming
Rozina Barveen.K, Dr. S.J.Sathish Aaron Joseph
DOI: 10.17148/IJARCCE.2018.784
Abstract:
Keywords:
Abstract
Decentralized Public / Private Ledger Technology and It’s Applications
Akshat Minesh Doshi
DOI: 10.17148/IJARCCE.2018.785
Abstract:
Keywords:
Abstract
Arduino Based Security System for Women
Abhijeet Mane, Manoj Gharghe, Omkar Pol, Karan Grover, Prof. Vijaya Chavan
DOI: 10.17148/IJARCCE.2018.786
Abstract:
Keywords:
Abstract
Elements of System Programming
Pratik Awari, Prathamesh Salunke, Gaurav Rathod, Himanshu Ghatole, Prof. Swati Patil
DOI: 10.17148/IJARCCE.2018.787
Abstract:
In this paper it is listed and explained about various components of system programming and there functions. It tells how the resources are made available to the users to execute the program effectively. System programming solves the problem of central processors which minimize the human efforts. System programming provides various system software. It is basically the conversion of high level programming into low level programming i.e. machine code.Keywords:
System Programming, SPR, Compiler, Assembler, Lex, YaccAbstract
Survey on Data Security and Security Risks
Varsha Bhosale, Simran Bhaldar, Prerana Ambavale, Chinmayee Achrekar, Swapnil Patil
DOI: 10.17148/IJARCCE.2018.788
Abstract: In this world, protecting our information has become an important part. Protecting our information means to protect it from an unauthorized access. This paper provides an excellent and easier way to protect your data from unauthorized access. Various viruses like Trojan horses, worms, malware and attacks like active and passive attack can be avoided by this system. We can also secure our system by using different security concepts i.e. confidentiality, integrity and availability. Nowadays each and every information is stored on electronic systems so this system provides easier way to secure information.
Keywords: Confidential Data, Data Security, Hackers, Attacks
Abstract
A Review and Analysis of Centroid Estimation in k-means Algorithm
Mrs. Mini Jain, Prof. Chetan Gupta
DOI: 10.17148/IJARCCE.2018.789
Keywords:
Software Metrics, Object Oriented Programming, Parameters, Quality EstimationAbstract
Optimization of Low Power CMOS based Voltage Reference Generator in 32nm
Sneha Meshram, Uday Panwar
DOI: 10.17148/IJARCCE.2018.7810
Abstract:
Keywords:
Abstract
Survey of Multi Instance learning Algorithms
M.Kavitha, Jasmin Thomas
DOI: 10.17148/IJARCCE.2018.7811
Abstract:
In multi-instance learning, the training set comprises labelled bags that are composed of unlabeled instances, and the task is to predict the labels of unseen bags. The Multiple instance learning (MIL) is a form of weakly supervised learning where training instances are arranged in sets, called bags, and a label is provided for the entire bag. The supervised learning where training instances are arranged in sets, called bags, and a label is provided for the entire bag. This formulation is gaining interest because it naturally fits various problems and allows to leverage weakly labelled data. However, learning from bags raises important challenges that are unique to MIL. This paper provides a complete survey of the characteristics which define and distinguish the types of MIL problems. Until now, these problem characteristics have not been properly identified and described. There are some types learning generally in ML algorithms like, the types of data distribution, the ambiguity of instance labels, and the task to be performed. Some important issues to be addressed in this paper. Finally delivers insight on how the problem characteristics affect MIL algorithms, recommendations for future benchmarking.Keywords:
Multiple instance learning, weakly labelled data, ambiguity of instance labelsAbstract
A Study on Artificial Intelligence
Swaraj Sanas, Srijeet Patil, Om Patil, Prof. Suvarna Nimkarde
DOI: 10.17148/IJARCCE.2018.7812
Abstract: The birth of the field of Artificial Intelligence was primarily due to the curiosity of researchers and inventors to create a perfect replica of the human mind. This research paper aims to provide better understanding of Artificial Intelligence and the terms related to it [7], providing an unique view to the vast technology under our nose left unnoticed by most of the users. Artificial intelligence is used to solve the logical problem ,similar to the human intelligence although the AI can solve the problems even human are not able to because it is not bind by many of the problem human faces. AI solves the problems. It also the subfield of computer science, now a day’s becoming popular in power station. AI might be Catalyst [6].
Keywords: Artificial Intelligence, Machine Language, Deep Learning
Abstract
Evolution of Operating System
Vivek Laxkar, Pandurang Lahane, Nikita Abhang, Mohanish Shinde, HOD Mithun Mhatre
DOI: 10.17148/IJARCCE.2018.7813
Abstract: An operating system is an interface between the hardware and user. It has simplified the usage of machine in every technological aspect. In this the evolution of the operating system has been explained such as Batch Processing System, Multiprogramming System, Multitasking System, Time Sharing System and Desktop System. In this we have also explained the detailed working of each and every type of Operating system over the period of time. In this we have also listed and explained the type of view i.e. User view and System view.
Keywords: Operating system, Mobile operating system, base of system translator, user view, system view
Abstract
Principal Component Analysis - A Survey
Mr. S. Omprakash, S. Gokila
DOI: 10.17148/IJARCCE.2018.7814
Abstract:
Principal Component Analysis (PCA) is a multivariate procedure that investigates a data slab in which clarifications are designated by numerous inter-correlated measureable reliant variables. Its objective is to excerpt the imperative evidence from the table, to characterise it as a set of new orthogonal variables called principal components, and to show the outline of resemblance of the clarifications and of the variables as points in maps. The worth of the PCA model can be estimated using cross-validation procedures. Statistically, PCA be contingent upon the Eigen-decomposition of positive semi-definite matrices and upon the singular value decomposition of rectangular matrices. The number of principal components is less than or equivalent to the number of unique variables. It is a way of classifying patterns in data, and conveying the data in such a way as to highpoint their resemblances and modifications. This is the survey paper of the previous concept and procedures for PCA.Keywords:
Data mining, Principal Component Analysis (PCA)Abstract
Performance Analysis of Feature Selection for Twitter Sentiment Analysis: Classification approach
Shweta V. Raut, Madhu M. Nashipudimath
DOI: 10.17148/IJARCCE.2018.7815
Abstract:
The social media platform is important as a means to spread information, opinions or awareness about real events. Twitter is prominent because of the huge amount of messages on all kinds of topics posted every day. Text classification of Twitter is never a trivial task that can be handled by common natural language processing techniques. There is also no agreement as to the definition of what type of operation will be performed in the event identification and classification of Tweets. Existing methods are difficult to reproduce and compare because they are often focused on certain types of events according to certain assumptions. This approach is in case of distinct nature. Previous work neglects impactful words due to the use of Bag-of-Words model. The contribution is for feature selection, Information Gain (IG) with consideration of adjectives as most impactful feature in POS tagger is used. Similarity Model, Relevance, Specificity & Span of relationship computation is also carried out later. SVM classification approach is implemented to construct positive and negative sentiments terms. Further this trained dataset is used for SVM classification of test dataset. Results show promising improvements.Keywords:
Feature Selection, Information Gain, Support Vector Machine, Sentiment Classification, Sentiment AnalysisAbstract
Wireless Data Transfer using Solar Panel in Li-Fi Technology
Aayush Gupta, Syed Adeebul Hafiz, Iltesha
DOI: 10.17148/IJARCCE.2018.7816
Abstract:
This paper attempts to showcase the accessibility and availability of a simple Li-Fi system to be used in our everyday life, made from basic equipment at home. It also discusses various parameters such as distance, visibility and angle that affects the Li-Fi communication using a solar panel array. The use of solar cell allows the system to harvest energy along with receiving signal simultaneously. It also highlights the uses of this technology in the future that makes it an exceptional candidate to dominate in the coming era.Keywords:
Solar Panel, Li-Fi, Wireless, LED, SecurityAbstract
Quality of Service (QoS): Congestion and Queuing
Mahesh VR, Ankush Reddy P, Charan HM, Anil Umesh
DOI: 10.17148/IJARCCE.2018.7817
Abstract:
Quality of Service (QoS) refers to ability of a network to provide improved service to selected network traffic over various underlying technologies including Frame Relay, ATM, Ethernet and 802.1 networks, SONETS and IP-routed networks. The traffic through this network may include data types such as email, file sharing or web traffic. Other forms of traffic include voice and video. These are considered as sensitive forms of traffic. They often require guaranteed or regulated service. In this paper, we deal in detail with two factors affecting QoS: Congestion and Queuing. Identifying and rectifying the above problems to reduce packet loss, latency and jitter on the network is the errand for the day. Few of the Queuing Algorithms like First in First out (FIFO), Priority Queuing (PQ), Round Robin and Weighted Round Robin (WRR) are explained in brief pictorially.Keywords:
Frame Relay, ATM, Ethernet and 802.1 networks, SONETS and IP-routed networks, Congestion and Queuing, First in First out (FIFO), Priority Queuing (PQ), Round Robin and Weighted Round Robin (WRR).Abstract
A Survey: Document Spamming Detection and Plagiarism Content Techniques
Nidhi Ruthia, Abhigyan Tiwary
DOI: 10.17148/IJARCCE.2018.7818
Abstract:
Keywords:
Abstract
Interactive ATM for Visually Challenged
Ramkumar Murthy
DOI: 10.17148/IJARCCE.2018.7819
Abstract:
Keywords:
Abstract
Deep Learning
Nikita Patil, Krishna Kadam, Amol Kode, Rohit Thakur, Rahul Patil
DOI: 10.17148/IJARCCE.2018.7820
Abstract:
Keywords:
Abstract
Paper on Genetic Algorithm for Detection of Oral Cancer
Nooreen Fatima, Mohammad sameer
DOI: 10.17148/IJARCCE.2018.7821
Abstract:
Keywords:
Abstract
Multi-Featured Android Car
Namrata Mahakalkar Khade, Rakhi Kumari, Tushar Wahane, Aditi Gudadhe, Dnyaneshwar Nagrikar
DOI: 10.17148/IJARCCE.2018.7822
Abstract:
Our paper provides design and implementation of prototype car that is controlled through Smartphone. In this Project mobile phone is used for controlling a prototype car. Android application provides graphical interface to the user. The prototype car consist of two DC motor with motor driver, Bluetooth module, Arduino microcontroller, some wires, wifi camera, led lights, batteries etc. Two motors are used for controlling speed and direction of car and one motor is just a general purpose. Bluetooth module receives signals from android application and sends data to the Arduino microcontroller unit. This Arduino unit operates the received data and sends control signal to DC motor. Android studio software is used for Arduino programming and android application is downloaded from play store. We will use another android phone for wifi camera.ÂKeywords:
Android Remote control, Advanced Driving version for Car through Android phone with live video streamingAbstract
Sleeping Mode MODLEACH Protocol for WSN
Shiv Ashish Dhondiyal, Deeepak Singh Rana
DOI: 10.17148/IJARCCE.2018.7823
Abstract:
Keywords: WSN, SM-MODLEACH, Cluster head, cluster member
