Ijcet Iaeme
321 Followers
Recent papers in Ijcet Iaeme
News archiving becomes a formidable task due to the perpetual generation of news. Archives play a vital role in crafting personalized news programs. Adhering patches of information, crafting the story and shaping up a news script defines... more
In today’s digital world, image edge detection is widely used in all over the globe. Digital image edge detection is used to detect the sharp changes in brightness of the images and the edge of a digital image. There are many classical... more
Service-oriented architectures are widely considered to be the determining trend in software engineering. Vendors of software products want to benefit by migrating to cloud environments. However, when transforming an existing software... more
A new kind of comfort and confidence has been created by location based services in the mind of mobile and internet users by providing automotive help in many areas like tracking, navigation, gaming and information fetching about a... more
At present, cloud computing extremely popular subject, which allows a service provider to provide seamless service/information over internet. Therefore, it eliminates the necessity for maintaining expensive computing resources. Testing... more
In this system we propose a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of... more
Computing is changing frequently to serve the user’s needs for security and reducing a dependency which leads researcher to develop newer technologies. Cloud computing is one of those technologies which successfully delivers the service... more
This paper addresses the problem of partitioning a graph and particular the use of the genetic algorithms for graph partitioning. It is a NP hard problem. The solution of a graph (circuit) partitioning problem is global optimum. In this... more
In this paper, a new adaptive weight algorithm is developed for the removal of salt and pepper noise particularly in satellite images. Satellite images are corrupted when acquired by a defective sensor or when transmitted through a faulty... more
In today’s age the major problem is related to the predicting user’s web page request. In the past few years the markov model is used for this problem. The effective web mining techniques like Clustering, Association rule mining and... more
This article describes in detail how to detect the effects of climate change through hybrid technology and give the solutions. In today's environment, climate change [1] is emerging as the biggest problem threatening the world. This study... more
In this paper, a similarity measure for images based on values from their respective Fourier Transforms is proposed for image registration. The approach uses image content to generate signatures and is not based on image annotation and... more
As mobile devices grow in popularity and presents in everyday life, it’s often involved in digital crimes and investigation as well. But rapid evolution of new form of online communication known as social networking has become a medium... more
With the substantial growth in volume and complexity of data used in the digital world large organizations need to handle a variety of unstructured data. Traditionally relational database systems have been used to store, process and... more
In information field we have huge amount of data available that need to be turned into useful information. So we used Data reduction and its techniques. A process in which amount of data is minimized and that minimized data are stored in... more
Nowadays, analytics is playing a key role in any field. Analytics is used in our day to day life. People don’t want to purchase even without analytics. Before few months IPL (Indian Premier League for Cricket) auction was taking placed.... more
Cloud computing is a concept of modern and smart computing world. People buy high configuration computer system for their use but a little amount of the total capacity is used by them. So, computing power and money both becomes waste. The... more
With the substantial growth in volume and complexity of data used in the digital world large organizations need to handle a variety of unstructured data. Traditionally relational database systems have been used to store, process and... more
There are millions of websites in the world now but it has been observed since very long time that Web Security has been one of most important areas of research whether be it either analysis or detection and later developing to mitigation... more
With the continues development of the computer network, information has been exchange in different format like text, image, audio and videos. In today’s scenarios security is playing a vital role in networking. Securing all these types of... more
With the substantial growth in volume and complexity of data used in the digital world large organizations need to handle a variety of unstructured data. Traditionally relational database systems have been used to store, process and... more
The study investigates the current impact of Electronic Data Interchange (EDI) adoption in shipping, logistics sea freight forwarding industry and in customs. It is found that the level of adoption of EDI applications in shipping... more
At present, tags are extensively used to describe the images, so that utilizing these tags for image retrieval system is today’s need. So, our system incorporates image similarity graph with image-tag bipartite graph using visual features... more
With the continues development of the computer network, information has been exchange in dif erent format like text, image, audio and videos. In today’s scenarios security is playing a vital role in networking. Securing all these types of... more
Rootkit is one of the primary concerns of network communication systems, which is related to the security and privacy of Internet users. The worldliness of malicious software (malware) used to breakdown the computer security has increased... more
Diabetes mellitus is a common disease caused by a set of metabolic ailments where the sugar stages over drawn-out period is very high. It touches diverse organs of the human body which therefore harm a huge number of the body's system, in... more
Biometric Systems Now a Days are playing a vital role in the whole word. Biometric Identification is been carried out in all the industrics, Institutions and in all the concerns wherr we are in need of the security and heavy monitoring.... more
Agriculture is the backbone of Indian economy. About 50% of Indian population depending on agriculture sector to meet their day-to-day expenses. The current irrigation system practiced in India is sprinkler water irrigation, tank water... more
The Cyber risk landscape is developing rapidly in multitude areas. Report to cyber attacks dominates the headlines. It is seemingly becoming more frequent and more sophisticated than ever. Businesses across the wide spectrum of industries... more
Big Data has become a research hotspot in academia and industry, and it is affecting people's daily life, work habits and ways of thinking. However, at present, big data faces many security risks in the process of collection, storage and... more
OLTP applications, in the current times, require support for ACID transactions and concurrency. But these properties each come with their trade-off. NewSQL systems have emerged as the solution to this conundrum, by overhauling the... more
Computational Musicology is new and emerging field of Data Mining. Raga is the most aspect of Indian Classical Music. It consists of unique set of notes (swara) and Pakad that correspond to a specific pitch. North Indian Classical Music... more
With the substantial growth in volume and complexity of data used in the digital world large organizations need to handle a variety of unstructured data. Traditionally relational database systems have been used to store, process and... more
RFID is only one of numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, magnetic inks, optical character recognition, voice recognition, touch memory, smart cards, biometrics etc. Auto ID... more
Semantic Textual Similarity (STS) calculates the degree of semantic equivalence between two textual snippets, even though they do not share common words. The textual snippets are words, phrases, sentences, paragraphs or documents. In... more
Vehicular ad hoc network (IEEE 802.11e) is dynamic network where independent identity node helps each other to forward the message. But some time node may not be interested in forwarding the message. Thus it is essential to give node some... more
Eclipse Modeling Framework (EMF) designed especially for models. Eclipse is a platform for building integrated development environments (IDEs) for Java and C programming, websites and other applications. EMF may use for reducing... more
Smart city is a prominent concept and it is being used in entire world with various contexts. Smart cities provide technological services, cost effective services and optimized services for the stakeholders. Smart solutions can solve the... more
It is the ability to examine/write information among specific executions of an utility and between requests. A way to make sure facts persistency for an utility is to apply database software to save records. Large websites and... more
In this paper we discuss about a brief overview of TCP SYN Flood attack which is a type of denial of services attack. Most of the research papers discuss only about theoretical aspect. Main idea of this paper is to use attacker tools for... more
Computer programming is the worldwide language of our earth and a basic literacy in the digital age. There is no doubt that knowledge computer programming at a youthful age is helpful for all students at least in their daily life. The... more
Cloud Computing allows users to modify number of resources in real time thus focusing on computing as a utility that can be access over the Internet. We saw various phases starting from Centralized Bulky systems to Distributed Networks... more
Wireless Sensor Networks have been growing in many areas like healthcare, surveillance, disaster sensing, agriculture, defence, weather forecasting, smart home and manufacturing. A sensor network is a sensor node that is connected... more
In information field we have huge amount of data available that need to be turned into useful information. So we used Data reduction and its techniques. A process in which amount of data is minimized and that minimized data are stored in... more
Image enhancement has been an area of active research for decades. Most of the studies are aimed at improving the quality of image for better visualization. Contrast Limited Adaptive Histogram Equalization (CLAHE) is a technique to... more
Electronic Commerce (E-commerce) is the conduct of business activities using electronic data transmission technologies such as those used in the Internet and World Wide Web (WWW). There are different aspects of doing Ecommerce such as... more
Water management has become one of the major concerns in many countries. Researchers have proposed different criteria and methodologies for identification of suitable dam sites. Based on our literature review, we have identified three... more
Engineering Industries (EI), Product Lifecycle Management (PLM) and Engineering Change Management project with the objective of reengineering several business processes and enabling the processes within PLM... more
- by IAEME Publication
- Energy Systems, Engineering Change Management, PLM, Product Lifecycle Management, Computer Aided Design / Manufacturing / Engineering (CAD-CAM-CAE) Product Data Management / Product Lifecycle Management (PDM/PLM) Lean Production (Kaizen, 5S, Six sigma) Rapid Prototyping / Manufacturing (3D printing)
Anonymous credential systems provide a mechanism for the users to authenticate themselves anonymously. Since the transactions are inherently anonymous, some users try to misbehave by taking advantage of their anonymity. So there is a... more
The incumbent trend in process industry is to use ICT enabled wired process control systems. Distributed control system, Supervisory control and data acquisition systems with wireless open loop control systems are commonly used to... more