NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have...

21
NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16) Department of Information Technology - SNSCT 1 Manuscript ID : NCNICS16014 Transportation Management and Tracking System 1 Gayathri.V 2 Sivadharani.S 1,2 UG-Student, Department of CSE N.S.N College of Engineering and Technology, Karur, Tamilnadu, India. ABSTRACT: Transport demand in most Indian cities increased significantly due to increase in population. By this increment of transportation, the maintenance also very important. In order to maintain the detail systematically this implementation is required. This is an ERP product which covers 360 degree view of Transportation goods system, which has modules like Customer Invoice, Vehicle management, Driver information, Goods entry, and GPS etc. It is highly scalable and distributed system. Developed using Struts2, Hibernate and spring. Here we can track from a consignor sending the item from a place to consignee will receiving the item with verification. Manuscript ID : NCNICS16020 Agricultural Robot 1 REVANTH.S 1 UG-Student,Department of ECE, Kongu Engineering College, Erode, Tamilnadu, India. ABSTRACT: Fruit picking robots, driverless tractor / sprayer, and sheep shearing robots are designed to replace human labor. In most cases, a lot of factors have to be considered (e.g., the size and color of the fruit to be picked) before the commencement of a task. Robots can be used for other horticultural tasks such as pruning, weeding, spraying and monitoring. Robots can also be used in livestock applications (livestock robotics) such as automatic milking, washing and castrating. Robots like these have many benefits for the agricultural industry, including a higher quality of fresh produce, lower production costs, and a smaller need for manual labor Robots have many fields of application in agriculture. Some examples and prototypes of robots include the Merlin Robot Milker, Rosphere, Harvest Automation, Orange Harvester, lettuce bot, and weeder. One case of a large scale use of robots in farming is the milk bot. It is widespread among British dairy farms because of its efficiency and non requirement to move.

Transcript of NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have...

Page 1: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

1

Manuscript ID : NCNICS16014 Transportation Management and Tracking System

1Gayathri.V 2Sivadharani.S 1,2 UG-Student, Department of CSE

N.S.N College of Engineering and Technology, Karur, Tamilnadu, India. ABSTRACT: Transport demand in most Indian cities increased significantly due to increase in population. By this increment of transportation, the maintenance also very important. In order to maintain the detail systematically this implementation is required. This is an ERP product which covers 360 degree view of Transportation goods system, which has modules like Customer Invoice, Vehicle management, Driver information, Goods entry, and GPS etc. It is highly scalable and distributed system. Developed using Struts2, Hibernate and spring. Here we can track from a consignor sending the item from a place to consignee will receiving the item with verification.

Manuscript ID : NCNICS16020 Agricultural Robot

1REVANTH.S 1UG-Student,Department of ECE,

Kongu Engineering College, Erode, Tamilnadu, India. ABSTRACT: Fruit picking robots, driverless tractor / sprayer, and sheep shearing robots are designed to replace human labor. In most cases, a lot of factors have to be considered (e.g., the size and color of the fruit to be picked) before the commencement of a task. Robots can be used for other horticultural tasks such as pruning, weeding, spraying and monitoring. Robots can also be used in livestock applications (livestock robotics) such as automatic milking, washing and castrating. Robots like these have many benefits for the agricultural industry, including a higher quality of fresh produce, lower production costs, and a smaller need for manual labor Robots have many fields of application in agriculture. Some examples and prototypes of robots include the Merlin Robot Milker, Rosphere, Harvest Automation, Orange Harvester, lettuce bot, and weeder. One case of a large scale use of robots in farming is the milk bot. It is widespread among British dairy farms because of its efficiency and non requirement to move.

Page 2: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

2

Manuscript ID : NCNICS16031 Monitoring and Preventing Mechanisms For Stealthy Denial of Service in Cloud Computing Using Hit Ratio

Analysis 1R.PAVYA 2N.NIYAS 3B.PRADEEPA

1,2,3 UG Student Vel1alar College of Engineering and Technology, Erode,Tamilnadu,India.

ABSTRACT: Cloud storage is data storage where the digital data is stored in logical storage

disc, the physical storage is in across multiple servers and the physical environment is typically owned and managed by the hosting or the service provider. Cloud Storage is a service where data is remotely maintained, managed, and backed up. The service allows the users to store files online, so that they can access them from any location over the Internet.The aim on forcing the application to consume more resources than needed, affecting the cloud customer more on financial aspects than on the service availability using DoS.Denial of service (DoS) is one of the main draw backs in cloud computing. Denial of service is way of making service unavailable to cloud user. Stealthy DoS insense DoS takes place without knowing to cloud provider.In available technique for hacker, SIPDAS pattern is used for stealthy DoS.In SIPDAS, hacker uses burst period T after the certain allocated T is over they check for both condition mainly attack successful and attack detection. By using SIPDAS algorithm, the hacker can perform DoS.To avoid stealthy DoS we go for hit ratio analysis. In this proposed technique, we use count and threshold value for IP address and document for preventing.By counting the documents and IP address we can easily detect the DoS.

Manuscript ID : NCNICS16032 Mitigating Channel Allocation Problem Using Dynamic

Channel Assignment for Wireless Sensor Networks 1R.Shanmathi 2N.Savitha 3R.Naveen 4K.Vijaya

1,2,3UG Student, Department of IT

4K.Vijaya, Assistant Professor(Sr.Gr)/ IT, Vel1alar College of Engineering and Technology, Erode, Tamilnadu, India.

ABSTRACT: Wireless sensor networks are becoming increasingly common, and balancing of load should also be taken care. This in turn increase the energy consumption cost , delay in the network Coordinated channel access protocols have been shown to be well suited for highly loaded wireless sensor network under uniform load distributions. Since there is lack of

Page 3: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

3

on-demand dynamic channel allocation in coordinated channel access protocol, there is problem in case of non uniform load distributions. The proposed system presents a lightweight dynamic channel allocation mechanism and load balancing strategies that are applicable to wireless sensor network. The protocols utilize a new mechanism to improve performance in terms of throughput, energy consumption and inter-packet delay variation. Through simulations both dynamic channel allocation and load balancing improve the bandwidth efficiency of the network.

Manuscript ID : NCNICS16033 Enhanced Confabulation Rule Mining For Transaction

Data Set Using Fuzzy Logic

1S.Viveka 2T.Sofia 3K.Pragathi 4S.Ponsankar 1,2,3UG Student, Department of IT

4 Assistant Professor(Sr.Gr)/ IT Department of Information Technology

Vellalar College Of Engineering and Technology, Erode,Tamilnadu,India ABSTRACT: Data mining techniques are methods for obtaining useful knowledge from these large databases. One of the main tasks of data mining is association rule mining (ARM), which is used to find interesting rules from large amounts of data. A new confabulation-inspired association rule mining (CARM) algorithm is proposed using an interestingness measure inspired by cogency. Cogency is only computed based on pairwise item conditional probability, so the proposed algorithm mines association rules by only one pass through the file. The proposed algorithm is also more efficient for dealing with infrequent items due to its cogency-inspired approach. The problem of associative classification is used here for evaluating the proposed algorithm. This paper evaluates CARM over data sets. Experiments show that the proposed algorithm is consistently faster due to its one time file access and consumes less memory space than the Conditional Frequent Patterns growth algorithm. In addition, statistical analysis reveals the superiority of the approach for classifying minority classes in unbalanced data sets using dynamic transaction datasets.

Page 4: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

4

Manuscript ID : NCNICS16034 Automatic Toll Collection System Based on RFID

1Yuvaraj 2P Vijay Raj G Gnanamani College of Technology, Namakkal, Tamilnadu, India.

ABSTRACT: Nowadays, streams of traffic are increased and toll gate on highways are

congested. It will cause the traffic jam and waste time. So in this project we are proposing an Automated Toll System is used for toll collection without making traffic congestion and waiting in long queue with help of RFID technique. Also, by using this system, it will save time, i.e. by avoiding long queue as no need to stop the vehicle and no need of manual transaction. Most important that, the stolen vehicle will be able to catch easily with help of RFID technique and nail assembly. There are three portions in toll collection system. They are RFID system, balance deduction system and toll gate control system.

Manuscript ID : NCNICS16041 Ethernet based Greenhouse Monitoring and

Controlling System 1Lavanya C 2Arun Prabha K C

Department of Information technology, Bannari Amman Institute Of Technology, Sathy, Tamilnadu, India.

ABSTRACT: The greenhouse is an important aspect of agricultural and horticultural sectors like India. In greenhouses, plants are grown under favorable climatic conditions for its production and growth. Thus monitoring and control of greenhouse environment is necessary for production and management of greenhouses. This project is designed to monitor and control the indoor humidity and weather conditions affecting the plants using embedded system and Android mobile phone. The system is connected to a central server which then connects to microcontroller and humidity sensor via serial communication. Thus the sensor records and manages the required weather conditions proved to be appropriate for plant growth.

Page 5: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

5

Manuscript ID : NCNICS16043 An Efficient Hierarchical Data Center Energy Saver

Network For Cloud Environment 1S.Ramya 2K.Rohini 3M.Nithyadevi 4Dr.S.Jabeenbegum

1,2,3 UG Student, 4Professor Department of IT

Vellalar college of Engineering and Technology, Erode, Tamilnadu, India. ABSTRACT:

To design a flow scheduling algorithm for saving the network energy of network-limited flows in data centers. The key contribution is to consider both the number of used switches and the active running duration of the switches for network energy saving, and uses on an SDN based approach to schedule the flows. We formulate the problem by programming, and bring forward an online approximate algorithm to solve it.

Manuscript ID : NCNICS16045

Mobile Computing 1A.Ansari. 2V.Mahadivya.

Department of Electronics and Communication Engineering RVS Technical Campus, Coimbatore, Tamilnadu, India.

ABSTRACT: Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been able to deliver most of these goodies. Mobile and ubiquitos computing is one such technological wonder experiencing now. This paper mainly contains about the role of mobile and ubiquitos computing in modern world. This also discusses how it improves our lives and about its applications in wide range.

Manuscript ID : NCNICS16049

TBOSHU: Tree Based On Shelf High Utility Itemset Mining With and Without Negative Unit Profit

1K.Priyadharshini 2C.Tharani 3D.Srisakiladevi 4V.Kavitha 1,2,3UG Student,4Assistant.Professor

Vellalar College of Engineering and Technology Erode, Tamilnadu, India. ABSTRACT: High Utility Item mining is a popular data mining task which is employed wide range of applications. In this paper we propose a novel based algorithm known as

Page 6: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

6

FOSHU based on EFIM which introduces new ideas related to efficiency in discovering HUI on shelf with positive and negative profit in terms of both execution time and memory. The main concept relies on two upper bounds named as sub tree & global utility. These upper bounds are used for effectively pruning the search space. It also purpose a method for reducing cost of DB scan by efficient database projection and transaction merging techniques. The proposed system here is based on addressing the limitation of FIM. The algorithm used in FIM & EFIM cannot handle database with negative unit profit. Most algorithms consider that item have the same shelf time however the real life scenario the items are sold in different time periods. Algorithm ignoring shelf time if items have a bias towards items having more shelf time. Since they have a probability for high profit. FOSHU is used to mine HUIs in any given transaction while considering both profit and Loss's and items on shelf time period result shows that FOSHU using tree based approach is much more efficient when considering both positive and negative unit profit along with items on shelf time period when compared to FOSHU.

Manuscript ID : NCNICS16051

A Survey on Security Enhanced Online Voting System Using Biometrics

1R.Nandhini. 2B.Pavithra. 3V.Pavithra. 4S.Vinitha. 5S.Nagaraj.

1,2,3,4 UG-Student, 5 Assistant Professor Department of Information Technology

Angel College of Engineering and Technology, Tirupur, Tamilnadu, India. ABSTRACT: Biometrics is used in online voting in order to provide high security to the voter by means of password and biometric traits. This scheme gives more confidentiality and integrity to the system. All the information of voters and candidates are collected and uploaded in the database of election commission. The Election commission will provide unique voter ID, password to the user. Voter can view the candidate information while voting. The voter must submit their respective ID, password and biometric traits while login to the system. Voter cannot able to vote more than once. So duplicate voting will be strongly restricted here. Cryptography and Steganography concept are used in the proposed system. Cryptography is used for generating user’s unique password and steganography is for biometric traits. Once the voting is done, vote counting will be generated automatically which enables the election commission to release the result in short time.

Page 7: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

7

Manuscript ID : NCNICS16056 MIMO and FILTENNA Reconfiguration in

Cognitive Radio 1T.Ilavarasi 2R.Gokila 3M.Jamuna 4R.Ilavarasi

1, 2, 3, 4 UG Student, Department of ECE M.Kumarasamy College of Engineering, Karur,Tamilnadu,India.

ABSTRACT: Cognitive radio with software defined radio (SDR) is discussed .Here we are using spectrum interweave method. In this method, the antenna system consists of sensing antenna (UWB) and reconfigurable filtenna. This reconfigurable filtenna is achieved by adding a band pass filter within the feeding line of the antenna. The band pass filter modifies the operating frequency by changing the length. A MIMO antenna system is used in this cognitive radio spectrum interweave. The antenna is designed and tested. The outputs are drawn based on the present input.

Manuscript ID : NCNICS16059 Significance of Web Caching and Web

Prefetching Techniques 1K.Premalatha 2C.Kalaiselvi 3Dr.K.R.Baskaran

1, 2 UG Student 3Associate Professor Department of IT

Kumaraguru college of Technology, Coimbatore, Tamilnadu, India. ABSTRACT: Web caching and Web prefetching are two important mechanisms in web mining. Their primary job is to improve the performance of web by reducing server’s load and decreasing the delay. Web performance is increased by keeping the recently used information in user’s cache memory. It can be implemented separately or otherwise combined with that of prefetching. Prefetching is an attempt to place data close to the user before it is required, eliminating as many cache misses as possible. Web caching is the process in which the popular web objects that are likely to be visited in the near future are stored in places closer to the user like client machine or proxy server. It decreases user perceived latency, reduces network bandwidth usage and also reduces the load on the origin servers. In this paper, we discuss about the existing web caching and web prefetching methods.

Page 8: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

8

Manuscript ID : NCNICS16061 E-Shipping

1D.Akilandeshwari1 2T.Gayathri 3S.Soundarya 1,2,3 UG Student, Department of CSE

N.S.N College of Engineering and Technology, Karur, Tamilnadu, India. ABSTRACT:

E-Shipping Project, which strove to demonstrate state-of-the-art tracking and condition monitoring technologies, to explore their integration into value-added services for business and government agencies, and to participate in the development of best practices and standards.Containers are filled by the objects that need to import from country to another country in a proper way. Maintaining details about objects from the process of loading into container receiving at the client side. The maintaining this entire details as in the form of manual data by human will be more difficult to manage. We automated it as per the client need. Here for now we are going to focus on main model like ports, CFS, terminal and vehicle(vessel).Given the situation, important export enterprises are making use of empty container reuse transportation and transportation to reduce cost. E-Shipping management successfully provided container security data, management, container management, order management which is of essential interest to Customs authorities.

Manuscript ID : NCNICS16062

Attribute Based Encryption Access Privilege In Cloud Data

1S.Monesha 2P.Dharani 3P.Prabhakaran 4K.Gowri 5Dr.P.Gomathi 1,2,3,4UG Student,5Professor & Dean

Department of Computer Science and Engineering N.S.N. College of Engineering and Technology, Karur, Tamilnadu, India.

ABSTRACT:

In this Project, we show how AnonyControl-F extends the User Revocation algorithm with a hierarchical form is used to improve scalability and flexibility while at the same time inherits the feature of fine-grained access control. Second, we express how to implement a full-fledged access control scheme for cloud computing. This scheme deliver full support for hierarchical user grant, file creation, file deletion, and user revocation in cloud computing. Third, we formally prove the security of the proposed scheme based on the security Cloud computing is current trend computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm

Page 9: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

9

also brings forth many new challenges for information security and access control when authorized users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive authorized user data confidential against un-trusted servers, previous solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so,, these solutions have no way introduce a heavy process above your head on the data owner for key sharing and data management, when fine grained data access control is desired and thus do not scale well. The challengence of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this taxing open concern by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner have rides to most of the computation tasks involved in fine grained data access control to un-trusted cloud servers without disclosing the underlying data contents.

Manuscript ID : NCNICS16063

Real Time Taxi Ride Sharing Using Smart Phone Application

1S.Indumathi 2Ms V.Hemalatha 3Dr P.Gomathi 1,UG Student,2 HOD,3 Professor & Dean

Department of CSE N.S.N College of Engineering and Technology, Karur, Tamilnadu, India.

ABSTRACT:

Ridesharing is a capable approach for saving drive consumption and assuaging traffic congestion while satisfying people’s desires in commute. Ridesharing based on private cars, often notorious as carpooling or repeated ridesharing, has stayed studied for years to deal with commons routine commutes, e.g., from home to work. Newly it became more and more difficult for people to hail a taxi during urgency hours in increasingly crowded municipal areas. Naturally, taxi ridesharing is considered as a probable approach to attack this emerging transportation headache. In this project propose a drudge searching algorithm and a forecast algorithm which together can quickly serve dynamic queries while significantly reducing the overall travel distance of taxis in ridesharing. That is, these algorithms potential a small query processing time; and at the similar time a large amount of energy and glasshouse gas emission is saved. Real-time ridesharing qualified by low cost geo-locating devices, shrewd phones, wireless webs, and social networks, is a provision that dynamically arranges ad-hoc shared rides. We perform extensive experiments to validate the helpfulness of taxi ridesharing as well as the competence and scalability of our proposed taxi ridesharing service.

Page 10: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

10

Manuscript ID : NCNICS16067 Design and Implementation of Analog Input Module for

Programmable Logic Controller Using Xpedition Enterprise Tool

1L.ANITHA 2S.ARUN MOZHI 3A.GOKILA 1,2,3 UG-Student, Department of ECE

Kumarasamy College of Engineering, Karur, Tamil Nadu, India. ABSTRACT: This project is done for the benefit of reducing the manpower. In some cases manual work may take more time for completion but the automation process can do the same work much faster with an effective throughput. Hence our project deals with the automation of circuit using controller as programmable logic control (PLC). PLC is used for automation of typically industrial electromechanical processes. For performing automation process in PLC we use analog input modules. With the help of 16 bit and 8 channel analog input modules which connect an input devices such as a panel or a sensor to a programmable logic control (PLC).This project is used in the application such as Data acquisition (DAQ) which is the process of measuring an electrical or physical phenomenon such as voltage, current, temperature, pressure, or sound.

Manuscript ID : NCNICS16071

Implementing Reliable, High Capacity and Efficient WAN Network Using DWDM

1A.Divya 2Anitha 3B.Abinaya 4M.Divya 5R.Gayathri 6A.subhashini 1,2,3,4,5UG-Student, 6Assistant Professor

Department of Electronics and Communication Engineering M.Kumarasamy College of Engineering, Karur,Tamilnadu,India

ABSTRACT:

Dense Wavelength Division Multiplexing (DWDM) is an optical technology which allows transmitting across a fiber many wavelengths, which can be added and dropped by means of passive optical components. We present and discuss the performance of a complex DWDM network data transmission system that will find an application in the fast transmission of data, voice etc with low SNR and BER analysis. The tests cover the qualification of a complete multi-point DWDM network consisting of transponders, fibers, passive optical filters and an optical amplifier. The behavior of the network is evaluated in the final arrangement by means of Bit Error Ratio (BER) and Optical Signal to Noise Ratio measurements at 400 Gb/s rate.

Page 11: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

11

Manuscript ID : NCNICS16072 Improving Network Life Time By Enhanced Efficient

Routing Protocols In MANET 1K.Roophavani 2M.Udhayamoorthi 3C.Senthilkumar 4Dr.Ramesh sahabadkar

1 PG-Student,2,3 Assistant Professor, Department of IT 4Professor,Christ University,Bangalore.

SNS College of Technology, Coimbatore, Tamilnadu, India ABSTRACT:

Cooperative communication, which utilizes nearby terminals to relay the overhearing information to achieve the diversity gains, has a great potential to improve the transmitting efficiency in wireless networks. In this paper we use An Energy Efficient ANT Based Routing algorithm (EEABR). This routing protocol is based on ANT colony based routing algorithm for MANETs. By introducing energy efficiency parameter to this algorithm, it can be adopted in WSN. It is used for multi-hop ad-hoc networks and on the ANT colony based meta-heuristic. These approaches try to map the solution capability of swarms to mathematical and engineering problems. This routing protocol is highly Enhancements of EEABR considerably reduce the size of routing tables and in consequence, the memory needed by the nodes. By considering the quality of the path between the nodes, not only in terms of distance, but also in terms of energy level of that path, network lifetime can be maximized. EEABR algorithm is adaptive, efficient and scalable.

Manuscript ID : NCNICS16073 Scalable Distributed Processing of K-Nearest Neighbor

Queries Over Moving Objects 1J.Gunasri 2J.Iswarya Roy 3C.Nithya 4A.Umamageswari 5J.T.Thirukrishna

1,2,3,4UG Student,5Assistant Professor Department of Information Technology

SNS College of Technology,Coimbatore,Tamilnadu,India ABSTRACT:

Trajectory data are prevalent in systems that monitor the locations of moving objects. In a location-based service, for instance, the positions of vehicles are continuously monitored through GPS; the trajectory of each vehicle describes its movement history. We study joins on two sets of trajectories, generated by two sets M and R of moving objects. For each entity in M, a join returns its k nearest neighbors from R. We examine how this query can be evaluated in cloud environments. This problem is not trivial, due to the complexity of

Page 12: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

12

the trajectory, and the fact that both the spatial and temporal dimensions of the data have to be handled. To facilitate this operation, we propose a parallel solution framework based on MapReduce. We also develop a novel bounding technique, which enables trajectories to be pruned in parallel. Our approach can be used to parallelize existing single-machine trajectory join algorithms. We also study a variant of the join, which can further improve query efficiency. To evaluate the efficiency and the scalability of our solutions, we have performed extensive experiments on large real and synthetic datasets.

Manuscript ID : NCNICS16074 Enhancing Privacy-Preservation And Truthful

Detection Of Packet Dropping Attacks In Wireless Ad Hoc Networks Using Radical Algorithms

1N.Manjupriya 2S.Sowntharya 3S.Sunitha 4M.Udhayamoorthi 1,2,3UG Student,4Assistant Professor

Department of Information Technology SNS College of Technology,Coimbatore,Tamilnadu,India

ABSTRACT:

In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, “conventional algorithms” that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a “homomorphic linear authenticator (HLA)” based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a “packet-block-based mechanism” is also proposed, which allows one to trade detection accuracy for lower computation complexity.

Page 13: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

13

Manuscript ID : NCNICS16075 Datasync Smart-Drive Application Using Cloud 1V.Ashika 2K.Koushika 3D.Kowsalya 4S.Vinoth Kumar 5K. Rajakumari

1,2,3,4UG Student,5Assistant Professor Department of Information Technology

SNS College of Technology,Coimbatore,Tamilnadu,India ABSTRACT:

Smartphone’s are becoming popular because of their capabilities and functionalities. Their small size and light weight make them very easy to carry, and they provide useful services as they run PC-like applications. The Multimedia applications such as image, video playing are very much resource intensive in terms of processing and data rates. Consequently they consume much energy and drain Smartphone battery very quickly. These limitations can be eased off in the era of cloud computing by uploading all our important activities to the cloud. Everyone using cloud storage offer by many cloud providers but users can only upload the things which we stored in internal or external storage. It’s a drawback in this fastest lifestyle. Enhancement for drawback we created an android application which connected with cloud, this is the one application which contains various option to deal with all multimedia activities. In proposed system we can upload our activities to cloud server directly and we use cloud storage and Cloud-Centric Media Network communication systems from mobile to cloud. Offline actions are uploaded automatically when turning online. The data is stored in a secured way and it is protected from other users, authorized user can retrieve and view data at anytime from anywhere. The files are viewed by using the date filter. The energy cost of multimedia applications on Smartphone that are connected to the Multimedia cloud Computing is evaluated. We are proposed a new ideology where the memory consumption problem has been very much addressed.

Manuscript ID : NCNICS16076 Dietary Management System

1J.Abarnasree 2K.A.Aparna 3M.Mohanapriya 4K.Sangeetha 1,2,3UG Student,4Assistant Professor

Department of Information Technology SNS College of Technology,Coimbatore,Tamilnadu,India

ABSTRACT:

In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. Link error and malicious packet dropping

Page 14: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

14

are two sources for packet losses in multi-hop wireless ad hoc network. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, “conventional algorithms” that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a “homomorphic linear authenticator (HLA)” based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a “packet-block-based mechanism” is also proposed, which allows one to trade detection accuracy for lower computation complexity.

Manuscript ID : NCNICS16077

Data Sharing On Cloud With Forward Security 1C.Jayanthi 2S.Lavanyadevi 3R.K.Pavithra 4Dr.L.M.Nithya

1,2,3UG Student,4Professor & Head Department of Information Technology

SNS College of Technology,Coimbatore,Tamilnadu,India ABSTRACT:

Due to the advance of new technology data sharing has never been easier in this world. An accurate analysis on the shared data provides a group of benefits to both the society and individuals .Data sharing between two members or group of members must take into account several issues. They are efficiency, data integrity and privacy of data owner. To overcome this issue Ring signature concept is introduced. It is a promising approach to construct a secret and authentic data sharing system which allows a owner of the data to anonymously authenticate his/her data which can be put into the cloud for storage or analysis purpose. This could be creating costly certificate verification in the traditional public key infrastructure (PKI).So this type of verification additionally create a bottleneck and scalable problem. To overcome this problem Identity-based (ID-based) ring signature could be used. The major advantage of this ID based scheme is eliminates the costly certificate verification. This paper further enhances the security by integrating ID-based ring signature with forward security. Even though a secret key of any user has been attacked or compromised, all previous generated signatures that belong to the user still remain valid. For any type of large scale data sharing system this property is especially important. This scheme provides a concrete and efficient method.

Page 15: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

15

Manuscript ID : NCNICS16078 Secure Reversible Image Data Hiding Over Encrypted

Domain Via Key Modulation 1G.Pragathi 2R.Ramya 3R.Jayashree 4T.Archana 5T.Shanmughapriya

1,2,3,4UG Student,5Assistant Professor Department of Information Technology

SNS College of Technology,Coimbatore,Tamilnadu,India ABSTRACT:

This application lets you embed or hide important or private messages or files into files like images without affecting the quality of actual files. It achieves this by using the least significant bits of these files for embedding data which are not used by the Image viewers or Image editors. The data embedding is achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non-encrypted image patches, allowing us to jointly decode the embedded message and the original image signal. Compared with the state-of-the-arts, the proposed approach provides higher embedding capacity, and is able to perfectly reconstruct the original image as well as the embedded message. It allows you to embed the messages or files in encrypted form using steganography and uniform embedding algorithm which means that once encrypted, the message or file could be retrieved (or decrypted) from a Master file only after specifying the correct password which was used at the time of encryption. It allows embedding messages and files in compressed form using ZIP compression format. Gives you a choice of compression level to be used- low, normal or high.

Manuscript ID : NCNICS16079 Indoor Occupant Positioning System Using Active RFID

Deployment And Particle Filters 1S.Madumitha 2S.Nancy Jenifer 3J.Gayathri 4M.Nandhini

1,2,3UG Student,4Assistant Professor Department of Information Technology

SNS College of Technology,Coimbatore,Tamilnadu,India ABSTRACT:

Increasingly, for many application areas, it is becoming important to include

Page 16: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

16

elements of nonlinearity and non-Gaussianity in order to model accurately the underlying dynamics of a physical system. Moreover, it is typically crucial to process data on-line as it arrives, both from the point of view of storage costs as well as for rapid adaptation to changing signal characteristics. In this paper, we review both optimal and suboptimal Bayesian algorithms for nonlinear/non-Gaussian tracking problems, with a focus on particle filters. Particle filters are sequential Monte Carlo methods based on point mass (or “particle”) representations of probability densities, which can be applied to any state-space model and which generalize the traditional Kalman filtering methods. Several variants of the particle filter such as SIR, ASIR, and RPF are introduced within a generic framework of the sequential importance sampling (SIS) algorithm. These are discussed and compared with the standard EKF through an illustrative example. In addition, we show how to further improve tracking accuracy, by tuning the parameters of the motion sensing model using an unsupervised EM-style optimization scheme. Extensive experiments in multiple sites show how MapCraft outperforms state-of-the art approaches, demonstrating excellent tracking error and accurate reconstruction of tortuous trajectories with zero training effort. As proof of its robustness, we also demonstrate how it is able to accurately track the position of a user from accelerometer and magnetometer measurements only (i.e. gyro- and WiFi-free).We believe that such an energy-efficient approach will enable always-on background localisation, enabling a new era of location-aware applications to be developed.

Manuscript ID : NCNICS16080 Hiresome-Ii: Towards Privacy-Aware Cross-Cloud

Service Composition for Big Data Applications 1P.Shonish Bhushan 2N.Mytheli 3J.Mumsika 4Mr C.Magesh Kumar

1,2,3UG Student,4Assistant Professor Department of Information Technology

SNS College of Technology,Coimbatore,Tamilnadu,India ABSTRACT:

Cloud computing promises a scalable infrastructure for processing big data applications such as medical data analysis. Cross-cloud service composition provides a concrete approach capable for large-scale big data processing. However, the complexity of potential compositions of cloud services calls for new composition and aggregation methods, especially when some private clouds refuse to disclose all details of their service transaction records due to business privacy concerns in cross-cloud scenarios. Moreover, the credibility of

Page 17: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

17

cross-clouds and on-line service compositions will become suspicion, if a cloud fails to deliver its services according to its ‘‘promised’’ quality. In view of these challenges, we propose a privacy-aware cross-cloud service composition method, named Hire Some-II (History record-based Service optimization method) based on its previous basic version Hire Some-I. In our method, to enhance the credibility of a composition plan, the evaluation of a service is promoted by some of its QoS history records, rather than its advertised QoS values. Besides, the k-means algorithm is introduced into our method as a data filtering tool to select representative history records. As a result, Hire Some-II can protect cloud privacy, as a cloud is not required to unveil all its transaction records. Furthermore, it significantly reduces the time complexity of developing a cross-cloud service composition plan as only representative ones are recruited, which is demanded for big data processing. Simulation and analytical results demonstrate the validity of our method compared to a benchmark.

Manuscript ID : NCNICS16081 Dual Sentiment Analysis

1B.Shankamithra 2B.Meena 3S.Hari Hara Eshwaran 4Ms J.Vasuki 1,2,3UG Student,4Assistant Professor

Department of Information Technology SNS College of Technology,Coimbatore,Tamilnadu,India

ABSTRACT:

Bag-of-words (BOW) is now the most popular way to model text in statistical machine learning approaches in sentiment analysis. However, the performance of BOW sometimes remains limited due to some fundamental deficiencies in handling the polarity shift problem. We propose a model called dual sentiment analysis (DSA), to address this problem for sentiment classification. We first propose a novel data expansion technique by creating a sentiment-reversed review for each training and test review. On this basis, we propose a dual training algorithm to make use of original and reversed training reviews in pairs for learning a sentiment classifier, and a dual prediction algorithm to classify the test reviews by considering two sides of one review. We also extend the DSA framework from polarity (positive-negative) classification to 3-class (positive-negative-neutral) classification, by taking the neutral reviews into consideration. Finally, we develop a corpus-based method to construct a pseudo-antonym dictionary, which removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a wide range of experiments including two tasks, nine datasets, two antonym dictionaries, three classification algorithms, and two types of features. The results demonstrate the effectiveness of DSA in supervised sentiment classification.

Page 18: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

18

Manuscript ID : NCNICS16082 Android Application For Bus Management Systems

1R.Karthikeyan 2P.Ashick 3S.S.Murali 4Mr K.S.Mohan 1,2,3UG Student,4Assistant Professor

Department of Information Technology SNS College of Technology,Coimbatore,Tamilnadu,India

ABSTRACT:

Public transport especially buses are getting crowded day-by-day due to heavy demand of transport facility. More over the frequency of the buses are unregulated. Either the buses lines up at one time or buses get delayed for a long time. This kind of chaos is mainly due to irregular Planning of bus intervals and not knowing the details of the amount of passengers expected at a time. Everyone in the cities uses TNSTC buses for travelling from one place to another. Sometimes people need to go new places where they never went. At that time they need to know from where they begin their travel. There are no available details to plan such travel prior. Passengers need to wait for unknown buses in Bus stands for long time. Our idea is to develop an App that contain details of the buses which the passengers make use of it. Our idea is to develop an App that will work on android initially will contain the details of every bus that runs between the specified source and destination. A bus that runs on rare routes will have a special database and that can be updated in a real time by transport officers. We are providing a module to update Normal route bus details and any changes in the buses in real time. Transport officers can add new bus, remove bus or change the timing of the bus in real time. We will be having PHP website for transport officers to monitor the changes in the bus routes. This website will be hosted in the Internet to make it live. The Android App we are developing will communicate with the PHP website for getting the information. The user can view the required details of the buses in the Android App. The communication between the website and Application is made by using JSON(JavaScript Object Notation).

Manuscript ID : NCNICS16083

Privacy Preserving And Efficient Management Of Transaction Logs Using Hadoop

1P.Abinaya 2Adarsh Srinivas 3G.Guha Shree Priya 4C.Ranjitha 5Mr J.Rajesh Kumar 1,2,3,4UG Student,5Assistant Professor

Department of Information Technology SNS College of Technology,Coimbatore,Tamilnadu,India

ABSTRACT:

Page 19: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

19

Big data has brought a revolution in the world of data analytics. Data that was discarded a few years back is now considered a powerful asset. Big data is now being extensively used for knowledge discovery by all sectors of society. It is produced by almost all digital processes and is stored, shared on web. This reliance of big data on web model poses serious security concerns. Traditional security methods cannot be applied to big data due to its large volume, variety and volume. Also since big data contains person specific information, privacy is a major security concern. The three important privacy preservation methods are: data anonymization, notice and consent and differential privacy. In this paper we discuss these privacy preservation methods for big data and how differential privacy is a better solution for big data privacy.

Manuscript ID : NCNICS16084 Efficient Algorithms For Mining The Concise And Lossless Representation Of High Utility Itemsets

1R.Abinaya 2S.Dharani 3N.Divya Dharshini 4D.Karthika 5Ms M.Nandhini 1,2,3,4UG Student,5Assistant Professor

Department of Information Technology SNS College of Technology,Coimbatore,Tamilnadu,India

ABSTRACT:

High utility itemsets mining extends frequent pattern mining to discover itemsets in a transaction database with utility values above a given threshold. This task is very challenging due to the possibility of long transactions. A potential solution is to limit the cardinality of transactions by truncating long transactions. A smart weighted splitting technique is proposed to divide long transactions into sub-transactions whose cardinality is no more than a specified number of items. In addition, to offset the information loss caused by transaction splitting, a support estimation technique is devised to estimate the actual support of itemsets in the original database. Transaction Weighted Utility (TWU) proposed recently by researchers has anti-monotone property, but it is an overestimate of itemset utility and therefore leads to a larger search space. We propose an algorithm that uses TWU with pattern growth based on a compact utility pattern tree data structure. Our algorithm implements a parallel projection scheme to use disk storage when the main memory is inadequate for dealing with large datasets.

Page 20: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

20

Manuscript ID : NCNICS16085 Centered Meeting Location Detection Using Location

Based Services 1R.Sindu 2S.Nandhini 3P.Suguna 4Mr C.Magesh Kumar

1,2,3UG Student,4Assistant Professor Department of Information Technology

SNS College of Technology,Coimbatore,Tamilnadu,India ABSTRACT:

Now a day, cell phone becomes a most important for maintaining the daily activities and it also used by maximum population worldwide. For making the easiest way use of smart mapping technology is increase in large area like transportations, defense, sports, etc. Through this we can easily detect the location. Mapping applications are always depend upon current location detection or preferred location of individual user or the group of user. Many technologies or the application trying to get the location of the user location to serve better service. The individual user location is the easily calculated or finding the location in the known area or city is easily find and it is some time feasible also but in the group finding the location in the unknown city is not feasible at every time. So considering above condition, if any group want to meet even they are in the different areas or cities and they unknown from their location to make it easy find the centroid from all the geo-location which is suitable for the all members. It also has issue with finding better options of meeting while calculation. Proposed system aimed at finding the preferred and central location for user group using geo-point calculation and mapping technologies.

Manuscript ID : NCNICS16086

Enhanced Application for College Bus Tracking and Campus Notification

1M.Dhineshkumar 2V.Nagaraj 1,2UG Student

Department of Information Technology SNS College of Technology, Coimbatore,Tamilnadu,India

ABSTRACT:

Campus Notification App will be helpful for the students to know about college Circulars, Notices, Exam results and Calendar. A vehicle tracking system is one of the most commonly used for tracking vehicles and used to prevent vehicle from theft. Today Android is very helpful to develop Application for tracking the vehicles. It provides real time data on the movement of vehicles. Android phones are equipped with GPS, it acts as both

Page 21: NATIONAL CONFERENCE ON NETWORKS,INTELLIGENCE ... · Scientific technologies have developed and have propelled man to challenge new frontiers. And with his super brain man has been

NATIONAL CONFERENCE ON NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’16)

Department of Information Technology - SNSCT

21

transmitter and receiver. A vehicle tracking system combines location of individual vehicle with our database using Google maps. GPS collects these fleet data for a comprehensive picture of vehicle locations. Vehicle information can be viewed on digital maps via the Internet. The App will be very much useful for the public to trace the availability of required bus. This system will play the major role in the development of Smart Cities.