Professional Documents
Culture Documents
http://www.garph.org
Aim & Scope:
International Journal of Research in Computer & Information Technology (IJRCIT) is an online journal in English
published in annually for Academicians, scientist, Engineers, and Research scholars involved in Computer Science
and Information Technology to publish high quality and refereed papers. Paper reporting original research and
innovative application from all parts of the world is invited. Papers for publication in the IJRCIT are selected through
peer review to ensure originality, relevance and readability. The aim of IJRCIT is to publish peer reviewed research
and review articles rapidly developing field of Computer Science and Information Technology.
The core vision of IJRCIT is to publish new knowledge and technology from for the benefits of every one ranging
from the academic and professional research communities to industry practioners in a range of topics in a Computer
Science and Information Technology. It also provides a venue for high caliber research scholars, PhD students,
Professionals
to
submit
on-going
research
and
developments
in
these
areas.
No part of the material protected by this copyright may be reproduced or utilized in any form or by any
means, electronic or mechanical including photo copying, recording or by any information storage and
retrieval system, without prior written permission from the publisher.
Dr. D. N. Chaudhari
Department of Computer Science and Engineering,
Jawaharlal Darda Institute of Engineering &
Technology, Yavatmal
Maharashtra, India.
Dr. S. E. Yedey
P. G. Department of Computer Science &
Technology, D.C.P.E. H.V.P.M., Amravati,
Maharashtra, India.
Prof. P. L. Ramteke
Department of Information Technology,
H.V.P.M College of Engineering & Technology,
Amravati,
Maharashtra, India
Editorial
Research is a creative work undertaken by applying systematic approach to establish new
knowledge or increase the existing knowledge. Research activity includes confirmation of
existing facts, verify and endorse the results, establish new theory, methods, and approaches. The
research undertaken by any individual or a group requires its publication and affirmation by the
peers. Publishing research work in journals and conferences authenticate the work done and
efforts taken by the researcher.
There are several journals available in the areas of Computer Science and Information
Technology having different strategy. IJRCIT aimed at providing an international forum for
scientists, researchers, engineers and developers from a wide range of information science areas
to exchange ideas and approaches in this evolving field. High quality papers in computer science
and information technology areas are solicited and original papers exploring research challenges
will receive especially careful interest from reviewers. Papers that had already been accepted or
currently under review for other conferences or journals were not considered for publications.
This journal publication would not have been possible without help of several individuals
who in one way or another contributed and extended their valuable assistance in the preparation
and completion of journal. My utmost gratitude is to the Editorial Board members and Reviewers
for their sincerity and encouragement. IJRCIT is strongly supported by a dedicated Editorial
Board consisting of renowned scientists. Thus, we ensure the highest quality standards of the
journal and provide prompt, detailed rigorous assessments that allow rapid editorial decisions
and result in significantly improved manuscripts.
We are requesting experts from academia, industry and research groups for active
participation in this publication activity as an editorial committee member, reviewer and
promoter.
INDEX
Sr. No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Page
No
1-7
8-14
15-19
20-22
ISSN:2455-3743
INTRODUCTION
Page 1
ISSN:2455-3743
Page 2
PROPOSED MODEL
ISSN:2455-3743
4.
RESULT ANALYSIS
Page 3
ISSN:2455-3743
5.
No. of
Total
Eyes
Eyes
Correct
Person
Frames
Open
Open
Detection
Detected
Rate
Person1
200
94
94
100%
closed.
Person2
200
92
92
100%
Person3
200
91
91
100%
Person4
200
85
85
100%
Person5
200
86
86
100%
Page 4
Total
Eyes
Eyes
Correct
Person
Frames
Close
Close
Detection
Detected
Rate
200
91
91
100%
Person 2
200
83
83
100%
Person 3
200
88
88
100%
Person 4
200
92
92
100%
Person 5
200
85
85
100%
Person 1
CONCLUSION
LIMITATIONS
ISSN:2455-3743
8.
FUTURE WORK
REFERENCES
Page 5
[13]
[14]
[15]
[16]
[17]
[18]
ISSN:2455-3743
Page 6
ISSN:2455-3743
INTRODUCTION
LITERATURE
BACKGROUND
SURVEY
&
Page 7
ISSN:2455-3743
Page 8
b.
ISSN:2455-3743
1.
Page 9
ISSN:2455-3743
DESCRIPTION OF MODEL
In this section describe the process of proposed model. The
proposed model contain with wavelet transform function
and particle of swarm optimization. The swarm optimization
used for the feature optimization process. Here discuss step
of proposed model.
IMAGE
NAME
Head CT
Name of
Method
DWT
MSER
PSNR
IQI
17.38
15.82
1.96
Head CT
DWTPOS
23.67
18.29
0.953
RESULT ANALYSIS
IMAGE
NAME
Name of
method
MSER
PSNR
IQI
Head
DWT
22.03
18.30
0.955
Head
DWT-POS
26.18
20.17
0.947
IMAGE
NAME
Name of
Method
MSER
PSNR
IQI
Head MRI
DWT
15.89
14.43
1.964
Head MRI
DWTPOS
22.15
16.84
0.957
Name of
Method
MSER
PSNR
IQI
Heart
DWT
22.17
18.43
0.954
Heart
DWTPOS
26.53
21.01
0.943
Name of
Method
MSER
PSNR
IQI
Hand
image
DWT
24.76
20.86
0.948
Hand
image
DWTPOS
29.06
23.41
0.940
Page 10
ISSN:2455-3743
20
DWT
15
DWT-POS
10
30
5
25
20
DWT
15
DWT-POS
0
MSER
PSNR
IQI
10
Figure 4: Shows that the comparative result graph for Head
MRI image with using DWT and DWT-POS image fusion
method and find the value of MSER, PSNR and IQI.
5
0
MSER
PSNR
IQI
30
25
DWT
20
DWT-POS
15
20
10
15
DWT
DWT-POS
10
MSER
PSNR
IQI
0
MSER
PSNR
IQI
Page 11
30
25
DWT
20
DWT-POS
ISSN:2455-3743
6.
FUTURE WORK
15
7.
10
5
0
MSER
PSNR
IQI
REFERENCES
Page 12
ISSN:2455-3743
8.
AUTHOR PROFILE
Prof. Hrishikesh S. Holey
received the Master of
Technology
in
Software
Engineering
from
Rajiv
Gandhi Technical University,
Bhopal. Currently he is an
Assistant Professor in HVPM
College of Engineering &
Technology, Amravati, India.
He has published two papers in
international journals. He is
having 6 year teaching
experience and his field of
specialization
is
Image
Processing, Digital Signal
Processing,
Software
Engineering,
Computer
Network
and
Network
Security.
.
Page 13
ISSN:2455-3743
namratasmahajan11@gmail.com
ABSTRACT: SAP HANA Database is stand for system, application and processing on database with High performance Analytic
Appliance. SAP HANA core database can serve real-time, complex queries and multi structured data needs. Enterprise
Requirement may increase day by day. In SAP HANA database no of user operate same data simultaneously. The goal of the SAP
HANA database is the reduced the problem related with storage and workload within management system. By this reasons it
have modern hardware with multiple processor, large main memory, and caches. SAP HANA database have various method for
compression of database content [1].
Keywords: SAP HANA, real time, multiple processor, cache, main memory.
2. THE SAP HANA DATABASE WITH NETWORK
CONNECTIVITY
1. INTRODUCTION
Network is defined as the set of two or more number of
It is a combination of hardware and software made to
computers that shared the information, resources to each
handle both high transaction rate and complex query
other.
processing. SAP HANA previously called SAP HighPerformance Analytic Appliance. In addition to database engine
HANA include an embedded web server, Trex search engine an
in memory column-oriented search engine [2]. SAP HANA has
the cloud platform for the data storage. And hence the data is
stored in secure and efficient way [3].
The SAP HANA has two type of connection to network:
1) Inbound connection.
2) Outbound connection
Inbound connections: In inbound connection for database
clients and data provisioning it used the protocols SQLDBC by
using port no.3xx15, 3xx17 and SAP HANA Studio operate
administrative functions by using port no.5xx13, 5xx14, 1128,
1129.for the web base access of SAP HANA us done by using
HTTP and HTTPS for this port no.80xx, 43xx is used[3].
Outbound connections: Outbound connection is used by the
solution manager for the purpose of diagnostics agent
installed on each system.
Page 14
ISSN: 2455-3743
Page 15
Protocols used
by client
TCP
port
number
1. Client used
the SAP HANA
database as
application.
The protocol
used
for
database client
access
is
SQLDBC.
3 xx 15
Example:
3 xx 17
Business
Warehouse.
2. The user used
SAP HANA
directly
Example:
Microsoft Excel.
3. SAP HANA
studio:
SAPHANA
studio is
administrative
block
Administrative Tasks:
Client
Protocols and
other
information
Port no.
1)SAP support
3xx09
2)SAP HANA
studio
ISSN: 2455-3743
5xx13 5xx14
(SSL)
Page 16
REFERENCES
ISSN: 2455-3743
Page 17
ISSN: 2455-3743
INTRODUCTION
RELATED WORKS
PROPOSED METHODOLOGY
Page 18
ISSN: 2455-3743
Step 2.
/* In this step, the views are created one after one by
taking the attributes from IAAM in descending order
of importance. It takes as input numbers of views
user want to create and also the corresponding size
of each view. */
Call method Materialized_View_Creation.
End
5.
AN ILLUSTRATIVE EXAMPLE
Page 19
7.
CONCLUSIONS
REFERENCES
ISSN: 2455-3743
International
Conference
on
Data
Engineering,1997, pp. 208-219.
[10] Mistry H, Roy P, Sudarshan S, et al, Materialized
view selection and maintenance using multi-query
optimization, Proceedings of SIGMOD'01, 2001,
pp. 307-3.S.Agarawal, S.Chaudhuri, V.Narasayya
Automated Selection of Materialized Views and
Indexes for SQL Databases Proceedings of 26th
International Conference on Very Large
Databases, Cairo, Egypt, 2000
[11] P.A.Larsen, Jingren Zhou Efficient Maintenance
of Materialized Outer-Join Views 23rd
International Conference on Data Engineering
(ICDE 2007), Istanbul, Turkey, April 2007.
[12] Xia Sun, Wang Ziqiang An Efficient Materialized
Views SelectionAlgorithm Based on PSO.
Proceeding of the International Workshop on
Intelligent Systems and Applications, ISA 2009,
Wuhan, China, May 2009
[13] S.H. Talebian, S.A. Kareem Using Genetic
Algorithm to Select Materialized Views Subject to
Dual Constraints. InternationalConference on
Signal Processing Systems, Singapore, May 2000
9.
THOR PROFILE
Prof.
Ramanand
Samdekar received the
Master of Technology in
Computer Science and
Engineering
Rastrasant
Tukodoji Maharaj Nagpur
university,
Nagpur.
Currently
he
is
an
Assistant. Professor in S.B.
Jain
Institute
of
Technology Management
& Research, Nagpur, India.
He has published three
papers in international
journals, two papers in
national journal and one in
national conference. He is
having 7 year teaching
experience and his field of
specialization is Software
development, Data mining,
Software System, and
Network Security.
Page 20
ISSN: 2455-3743
ABSTRACT: Image mosaic is a technique used to composite two or more overlapped images into a seamless wide-angle
image through a series of processing and it is widely used in remote sensing areas, military applications, etc. When taking these
photos, it's difficult to make a precise registration due to the differences in rotation, exposure and location. The image mosaic
techniques are widely used in remote sensing, medical imaging, and military purposes and so on. Now days, many smart phones
are equipped with the mosaicing application which helps user in many different ways. The image mosaicing technique can be
broadly classified into feature-based and frequency-based techniques. Feature-based method uses the most similarity principle
among images to get the parameters with the help of calculation cost function. Method based on the frequency domain
transforms the image from spatial domain to frequency domain, and get the relationships of translation, rotation and zoom
factor through Fourier transformation. In frequency domain there are methods like phase-correlation, Walsh transform, etc.
Keywords:Image mosaic, remote sensing, medical imaging, Feature-based method, frequency domain transforms, phasecorrelation, Walsh transform.
1.
INTRODUCTION
(a)
(b)
(c)
(d)
Figure 1: An overview of Image Mosaicing (a) First input
image (b) Second input image (c) & (d) Mosaiced images
by different mosaic techniques.
Figure (a) and Figure (b) are the input images,
while Figure (c) and Figure (d) are Mosaiced images.
3. OBJECTIVE
In this work we have used a technique which combines both
namely the feature-based method and frequency-domain
method for image Mosaicing. The feature-based method
used is the Harris corner detection and the frequencydomain method used is the Fourier transform-based crosscorrelation or phase correlation method.
4.
LITERATURE SURVEY
The original image alignment algorithm was the LucasKanade algorithm. The goal of Lucas- Kanade is to align a
template image to an input image, where is a column vector
containing the pixel coordinates. If the Lucas-Kanade
algorithm is being used to compute optical flow or to track
an image patch from time to time, the template is an
extracted sub-region (a window, maybe) of the image [1].
Page 21
ISSN: 2455-3743
Page 22
ISSN: 2455-3743
METHODOLOGY
Step 1: Get the shift and zoom factors with the help of
phase correlation calculation.
Step 2: Modulate the unregistrated image according to the
zoom factor obtained from step 1 to get a couple of images
with the same size.
Step 3: Ascertain the ROI (Region of Interest) between the
images.
Step 4: Preprocess image before other works. The edge
detection can reduce the search area and can greatly cut the
matching-time down.
7.
IMPLEMENTATION
Page 23
ISSN: 2455-3743
Feature Extraction
EXTRACTION OF HARRIS CORNER
In this paper, we get the corner response function by
the ratio from the determinant and trace of matrix M, which
can avoid the randomness when choosing the scale factor
compared to the method based on the difference value of the
above ones. Besides, just as the experiments show, we could
get much more stable features along with a speed-up
procedure.
Set of tentative correspondences (pairs of matched points
between two images) are shown below.
8.
RESULTS
EXPERIMENTAL RESULT
We load three distinct images one by one. For the mosaic
First Image
9.
Second Image
Third Image
CONCLUSION
Page 24
ISSN: 2455-3743
11. REFERENCES
[1] Lucas, B. D. And Kanade, T. (1981). An iterative
image registration technique with an application in stereo
vision. In Seventh International Joint Conference on
Artificial Intelligence (IJCAI-81), pages 674679.
[2] Brown, L. G. (1992). A survey of image registration
techniques. Computing Surveys, 24(4), 325376.
[3] D. Le Gall, MPEG: A video compression standard for
multimedia applications,
Communications of the ACM, vol. 34, no. 4, pp. 4458,
April 1991.
[4] J. R. Bergen, P. Anandan, K. J. Hanna, and R.
Hingorani, Hierarchical model-based motion estimation,
in Second European Conference on Computer Vision
(ECCV92), (Santa Margherita Liguere, Italy), pp. 237252,
Springer-Verlag, May 1992.
[5] M. Irani and P. Anandan, Video indexing based on
mosaic representations,
Proceedings of the IEEE, vol. 86, no. 5, pp. 905921, May
1998.
Page 25
ISSN: 2455-3743
Kanchan
S.Tidke,
H.
Gohatre
received the Master of
Technology in System
Software
from
Rajiv
Gandhi
Technical
University
Bhopal.
Currently
he
is
an
Assistant. Professor in
LAMIT,
Dhamangoan,
india. He has published
two papers in international
journals. He is having 7
year teaching experience
and
his
field
of
specialization is software
development,
Image
processing, Networking.
Pritam
Page 26
ISSN: 2455-3743
1.
INTRODUCTION
Page 27
ISSN: 2455-3743
Page 28
3.
ISSN: 2455-3743
In this section to show the comparatively types of open source application Routing Software.
Sr.
No
.
Name
Bird
Internet
routing
daemon
(BIRD)
Quagga
GNU
Zebra
Developed
in
Charles
University
in Prague
International
Computer
Science
Institute in
Berkeley,
California
Kunihiro
Ishiguro
OpenBG
PD
The
OpenBSD
Project
OpenOSP
FD
The
OpenBSD
Project
XORP
International
Computer
Science
Institute in
Berkeley,
California
Release
d in
April 20
, 2015G
License Type
GNU General
Public
License
March 7
, 2015
GNU General
Public
License
Septem
ber 8, 2
005
GNU General
Public
License
4.6
/Novem
ber 1,
2009
4.6/Nov
ember
1, 2009
July
2004
ISC
ISC
GNU GPL
v2, GNU
LGPLv2
Type
Protocols
used
Web sites
Routing
RIP,
RIPv2,
RIPng,
OSPFv2,
OSPFv3,
BGPv4,
BGPv6
www.bird.netw
ork
Routing
RIP,
RIPv2,
RIPng,
OSPFv2,
OSPFv3,
ISIS (v4
only),
BGPv4,
BGPv6,
Babel,
SNMP
www.quagga.or
g
Linux
Routing
IPv4,RIP.
OSPF,
IPv6,
SNMP,
SMUX
www.gnu.org/s
oftware/zebra
OpenBSD,
FreeBSD
Border
Gateway
Protocol
BGPv4,
BGPv6
www.openbgpd
.org
OpenBSD,
FreeBSD
Open
Shortest
Path First
OSPF
www.openbgp.
org
Plateform
Unix,
Linux
Unix,
Linux,
Solaries,
FreeBSD
Linux,
BSD,
windows
Routing
RIP,
RIPv2,
RIPng,
OSPFv2,
OSPFv3,
BGPv4,
BGPv6,
IGMP,
MLD,
PIM-SM,
OLSR
www.xorp.org
Page 29
4.
CONCLUSION
REFERENCES
[1] www.bird.network.
ISSN: 2455-3743
[11] www.xorp.org.
[12] "ICSI Spins out Venture-Backed XORP, Inc.".
International Computer Science Institute. 2008-07-24.
6. AUTHOR PROFILE
Hemant Gadbail received
Bachelor of Engineering in
Electronics
and
TeleCommunication
from
HVPM
College
of
Engineering & Technology.,
Amravati, India.
Page 30
ISSN: 2455-3743
1.
INTRODUCTION
2. LITERATURE REVIEW
By referring first this paper 16 bit floating point
ALU is design using pipelining. Pipelining is
Use to execute multiple instructions simultaneously .TopDown design approach is use. In top-down design
approach, four arithmetic modules, addition, subtraction,
multiplication
Page 31
ISSN: 2455-3743
Page 32
ISSN: 2455-3743
Page 33
ISSN: 2455-3743
Page 34
ISSN: 2455-3743
INTRODUCTION
ALGORITHM
OF
COMPONENT ANALYSIS
INDEPENDENT
3.
4.
Let
If not converged, go back to 2.
Page 35
ISSN: 2455-3743
,
to
the
outputs
after every iteration[1][2]. A simple
way of achieving decorrelation is a deflation scheme based
on a Gram-Schmidt-like decorrelation. This means that we
estimate the independent components one by one. When we
have
estimated p
independent
components,
or p vectors
algorithm for
from
``projections''
previously
renormalize
estimated p vectors,
of
and
the
then
Where
is the matrix
of the vectors,
value
is obtained
decomposition
. A simpler alternative is
the following iterative algorithm
and
. The matrix
needs to be orthogonalized after every step. In this matrix
version, it is natural to orthogonalize
symmetrically.
The above version of FastICA could be compared with the
stochastic gradient method for maximizing likelihood
Where
is the learning rate, not necessarily constant in
time. We show that FastICA can be considered as a fixedpoint algorithm for maximum likelihood estimation of the
ICA data model. . In FastICA, convergence speed is
optimized by the choice of the matrices
and
. Another advantage of FastICA is that it can estimate both
sub- and super-gaussian independent components, which is
in contrast to ordinary ML algorithms, which only work for a
given class of distributions
[4] JADE (ICA): Joint Approximation Diagonalisation of
Eigenmatrices (JADE) is an algorithm for independent
component analysis that separates observed mixed signals
into latent source signals by exploiting fourth order
moments. The fourth order moments are a measure of nonGaussianity, which is used as a proxy for defining
independence between the source signal [5] s. The motivation
for this measure is that Gaussian distributions possess zero
excess kurtosis, and with non-Gaussianity being a canonical
assumption of ICA, JADE seeks an orthogonal rotation of
the observed mixed vectors to estimate source vectors which
possess high values of excess kurtosis.
Let
denote an observed data
matrix whose
columns correspond to observations of
variate mixed vectors. It is assumed that
is prewhitenend, that is, its rows have a sample mean
equaling zero and a sample covariance is the
dimensional identity matrix, that is,
Where
Applying JADE to
entails
Page 36
ISSN: 2455-3743
Page 37
ISSN: 2455-3743
Page 38
ISSN: 2455-3743
6. AUTHOR PROFILE
Page 39
ISSN: 2455-3743
ABSTRACT: There are three main approaches of parallel programming implicit, explicit and systematic. Parallel program is
used to high performance computing. Mainly depend on PGAS and hybrid model. Parallel programing used in processor to
increase the speed of the computing of processor. They work on GIS Raster and Vector to designed algorithm which uses library
GDAL which is based on OGR which is part of GDAL. They are used in parallel computers with multiprocessor and multicore
.Role of parallel processing is for increase performance based on MPI.MPI is the combination of Distributed Memory, Shared
and Hybrid Memory. Power flow problem found in power system which is solved using openMP and thread based programming
which is work on Shared memory programming environment .OpenMP based on Open Threading, Shared Memory and
Multicore Techniques. Parallel Computing work on Virtual Reality concept which depend on object. Object have not any
deterministic shape and cant handle using geometric equation for that there is implementation of Convex Hull algorithm.
Parallel programing used for to support signal processing algorithm for peak detection. Implementation of PAMM and LC-MS
detection algorithm requires Gibbs sampling .Parallel code do speedup but occurs fault tolerance. Simulation and Virtual
Reality depends on Vector processing for geometric projection. This paper we have taken different views of parallel
programming model available in different approaches.
Keywords: GAMMA,VLSI, Multhreading, PGAS,GIS,GDAl,OGR, shared Memory, Parallelism, MPI (Message Passing
Interface), OpenMP, Heterogeneous(hybrid) systems, Virtual reality,,PAMM,LC-MS,MLP,Vector Processing,CUDA
1.
INTRODUCTION
Page 40
2.
RELATED WORK
ISSN: 2455-3743
CPU
Memory
CPU
CPU
Page 41
ISSN: 2455-3743
Page 42
ISSN: 2455-3743
REFERENCES
CONCLUSION
Page 43
5.
AUTHOR PROFILE
Ashish Namdev Pawar
perceiving the 3rd year B.E.
degree
in
Information
Technology from Shri Sant
Gajanan Maharaj College of
Engineering Shegaon, Dist.
Buldhana, Maharashtra, India.
ISSN: 2455-3743
Prof. A. S. Manekar
Amitkumar
S
Manekar
working as assistant Professor
in IT Department SSGMCE,
Shegaon.
His research area is Big Data
analysis and High performance
Computing. He has guided
many Under Graduate and
Post Graduate Students.
Page 44
ISSN: 2455-3743
1. INTRODUCTION
In this system we are using the RFID i.e. Radio Frequency
Identification, NFC i.e. Near Field Communication and the
OCR i.e. Optical Character Recognition.
Radio frequency identification, or RFID, is a standard term
for technologies that use radio waves to automatically
identify objects. The most commonly adopted method to
use the RFID technology is to identify the RFID tag with
serial number of the tag. This serial number is read by
RFID reader whenever the tag comes under readers range
[1]. In the proposed system we are going to use the passive
RFID tag. The operating distance of RFID ranges up to 100
meters. Tags can operate solely under the reader coverage
region [2]. We are using RFID technology because of
following features:
1.2
1.3
Lessfrequent
userVisitor
Page 45
used with the users which are less frequently visiting the
organization. The users under this category can be the client
or trainee. The payment for the parking is done by using
NFC mifare card.
The character recognition of the vehicle number plate
comes into picture when the parking vehicle is rarely comes
to organization. The user can be parents of student coming
to visit the college.
For the convenience of user the allotted parking lot
will be displayed on the screen near the boom barrier.
2.
RELATED WORK
1.
ISSN: 2455-3743
3.
4.
2.
3.
M ETHODOLOGY
Page 46
ISSN: 2455-3743
Page 47
4. IMPLICATIONS
Automated Parking Allotter can be used at the places
where the large numbers of cars checks-in and checks-out.
These places can be Organization, College, Hotels,
Theaters, and Malls. Here the continuous manual
intervention will be eliminated and management of all data
will become easy. The use of technologies like RFID,
NFC, and OCR can be done in optimum level. Thus the
Automated Parking slot Allotter system is Reliable and
Perfect for Service.
5. CONCLUSION
The Automated Parking Allotter will enable the working
with the less human intervention. As we are using RFID
the regular visitors will get the rid off of the waiting long
for the parking. This is achieved by using the RFID tag.
The use of NFC allowes less frequent users to make the
payments using mifare card. The visitors who comes rarely
will have to go through OCR for recognizing the number
plate. Thus this system is fully functional for the multiple
users. And the traffic congestion problem in cities as well
as in parks and organizations can be overcomed to
remarkable level.
6.
REFERENCES
ISSN: 2455-3743
AUTHOR PROFILE
Harshal Sudhakar Phuse
Perceiving the 3rd year B.E.
degree
in
Information
Technology from Shri Sant
Gajanan Maharaj College of
Engineering Shegaon, Dist.
Buldhana, Maharashtra, India.
Sumit Raosaheb Bajare
Perceiving the 3rd year B.E.
degree
in
Information
Technology from Shri Sant
Gajanan Maharaj College of
Engineering Shegaon, Dist.
Buldhana, Maharashtra, India.
Prof. A. S. Manekar
Amitkumar
S
Manekar
working as assistant Professor
in IT Department SSGMCE,
Shegaon.
His research area is Big Data
analysis and High performance
Computing. He has guided
many Under Graduate and Post
Graduate Students.
Page 48
ISSN: 2455-3743
1. INTRODUCTION
Attendance monitoring system is very important process in
almost all the organization and Institutions. Now a days
there are two types of systems are available first is manual
and second is automated. The mostly used method for
taking attendance is totally manual based i.e. by using
sheets of papers or books. Sometimes the attendance sheet
could be lost because of this method and may easily allow
for the impersonation. This method is time consuming
hence for reducing this weaknesses, there is a need of an
automated and reliable system. Due to our manual
attendance system lot of time is being wasted because of
calling each student number and name and also the teacher
has to do lot of paper work and maintaining that paper sheet
is quite difficult. Sometimes the problem of illegal
attendance is faced. So it became necessary to do all this
online and automated. Biometric authentication is one of the
most popular and accurate technology. We can do this using
biometric ideas or by the NFC tags with a unique tag
provided to each student. Now, day by day the world
becomes digitize means we are using automatic systems
which can save times. Similarly we are changing the way of
attendance monitoring system from manual to an automated.
The automated attendance system may use bar-codes,
electronic tags, biometric and touch screens in place of
papers.
2. RELATED WORKS
Current Networked and mobile technologies are developed
by providing more methods which is supporting for
childrens in their transitions between home and schools [3].
For example Childrens can travel securely by using
location system [4]. Giuliano Benelli and Alessandro
Pozzebon they are projected and developed a paper for
Page 49
Techniques
ISSN: 2455-3743
ANALYSIS
Advantages
Limitations
1.
2.
3.
4.
Finger
printing
1.
Facial
recognition
1.
2.
3.
2.
3.
4.
1.
1.
2.
2.
Eye/Iris
recognition
Open-CV
Page 50
3.
4.
1.
NFC/RFID
Technology
4.
Tags
2.
Versatility
3.
4.
Secure communication.
5.
No special software.
6.
CONCLUSION
5.
REFERENCES
ISSN: 2455-3743
4.
1.
2.
3.
Page 51
6.
ISSN: 2455-3743
AUTHOR PROFILE
Nikhil P. Shegokar
Studying BE at Shri Sant
Gajanan Maharaj College
of Engineering, Shegaon,
Maharashtra, India.
Kaustubh S. Jaipuria
Studying BE at Shri Sant
Gajanan Maharaj College
of Engineering, Shegaon,
Maharashtra, India.
Prof. A. S. Manekar
Amitkumar S Manekar
working
as
assistant
Professor in IT Department
SSGMCE, Shegaon.
His research area is Big
Data analysis and High
performance Computing.
He has guided many
Under Graduate and Post
Graduate Students.
Page 52
ISSN: 2455-3743
Page 53
ISSN: 2455-3743
finger.
Page 54
ISSN: 2455-3743
b)
a) RETINA
Retina is nothing but the posterior part of human eye. The
complex structure of eye retina is able to identify each and
every individual from each other. The retina consists of vast
and complex network of capillaries that makes retina
different from the retina of other individual. Figure (5) shows
the complex structure of retina. Capillaries are like pipes that
provides blood to eye. Each individual has a unique structure
of capillaries. Retina based identification technique uses this
network to identify an individual separately. The retina
based identification technique is very complex and used
where very high security is required. The structure of eye
retina is remains unchanged from birth to death. Only
exception to this is diseases like diabetes, glaucoma, and
other retinal degenerative disorder can make some changes in
the structure of retina. The neural network of retina is so
unique that twins child also has the different structure.
Page 55
ISSN: 2455-3743
Page 56
ISSN: 2455-3743
Universal
ity
Uniquen
ess
Permane
nce
Measurabi
lity
Performa
nce
Acceptabil
ity
Circumvent
ion
Finger print
Palm print
Hand
Geometry
Iris
Retina
Face
Voice
Signature
Keystroke
DNA
4. CONCLUSION
In todays digital world the acceptability of the
biometric identification system is increasing more and
more. All the features provided by biometric system such
as uniqueness, persistence, universality etc makes it more
powerful. The biometric security provides the higher
level of security than the system with password, cards, or
other keyword. The main objective of this paper is to
provide abstract overview of currently used biometric
identification and/or verification systems present in
todays society. This paper also concludes that, security
level required by todays
Society can be fulfilled by various biometric security
systems.
5. REFERENCES
[1] James Wayman, Anil Jain, Davide Maltoni and Dario
Maio, "An Introduction to Biometric Authentication
Systems". In Biometrics: Technology, Design and
performance evaluation. Springer Publications. ISBN
978-0-7923-8345-1.
adaptive
optics,
[8] Mehrchilakalapudi.woedpress.com
[2] Jain, A.K.; Bolle, R.; Pankanti, S., eds. (1999).
Biometrics: Personal Identification in Networked
Society. Kluwer Academic Publications. ISBN 978-07923-8345-1.
[9] http//en.wikipedia.org
[10] www.teacherweb.com
Page 57
ISSN: 2455-3743
6. AUTHOR PROFILE
Ankush S. Deshmukh
Pursuing 3rd Year BE at SSGMCE
Shegaon
Poonam V. Hajare
Pursuing 3rd Year BE at SSGMCE
Shegaon
Rajeshri V. Kachole
Pursuing 3rd Year BE at SSGMCE
Shegaon
Prof. A. S. Manekar
Amitkumar S Manekar working as assistant
Professor in IT Department SSGMCE,
Shegaon.
His research area is Big Data analysis and
High performance Computing. He has
guided many Under Graduate and Post
Graduate Students.
Page 65
ISSN: 2455-3743
ABSTRACT: Cloud computing is a recent advancement where in IT infrastructure and applications are provided as services to
end-users. Cloud computing is the delivery of computing services over the internet. It is always required to share work load among
the various nodes of the distributed system to improve the resource utilization and for better performance of the system. So there
may be load on VMs, for balancing the load we have two ways, one is allocation of resources and second is scheduling the task. In
this paper we are making survey on load balancing and task scheduling algorithms for effective utilization of the system and proper
servicing the clients request. For creating cloud environment we are using CloudSim simulator. Makespan parameter is used for
comparing the results of the different algorithm.
Keywords: Cloud computing, task scheduling, load balancing, CloudSim, IaaS
Store data and run software. Cloud computing is comparable
to distributed computing (it is the collection of computer
resources so cloud computing is totally an internet base
1. INTRODUCTION
approach where all the applications and files are hosted on a
Cloud computing is defined as a type of computing that
cloud which consisting of various computers interconnected
depends on sharing computing resources rather than having
with each other in complex manner. Cloud computing
local servers or personal devices to handle applications. As
elaborates the concept of parallel as well as distributed
the 90s came to an end, Cloud Computing progressed quite
computing to provide shared resources, hardware, software
rapidly. The evolution of cloud computing can be explained
and information to computers or other devices on demand.
in three phases.
These system follows a "pay as you use" model. Now, the
customers are not buying the software or computational
platform. With internet facility, the customer can use the
computation power or software resources by paying money
only for the duration customer has used the resource. The
customer is interested in reducing the overall execution time
of tasks on the machines.
The processing units in cloud environments are called as
virtual machines (VMs).The view of business is that the
virtual machine should execute the task as early as possible
and these VMs are run in parallel. This leads to problems in
scheduling of the customer tasks within the available
resources. The scheduler does the scheduling process
a. Mainframe computing: - In mainframe computing
efficiently and makes full use of available resources. We can
system, a single system stored the bulk of data and every
assign more than one task to one or more virtual machines
other user accesses
the data from the same single
that run the task simultaneously. In this kind of environment
system. But this computing was inefficient and
it will be make sure that the load can be balance in all VMs
expensive.
i.e., it should make sure that the tasks are not loaded heavily
b. Distributed System: - In distributed system the data was
on one VM and some VMs do not remains idle and/or under
stored in various system with enough memory and user
loaded. Cloud computing delivers infrastructure, platform,
can access the data from the different system as per their
and software as services, which are made available as
requirement placed at different location.
subscription-based services in a pay-as-you-go model to
Cloud computing:-the cloud is a shared network of
consumers. Those services are referred as
computers through which people and companies
a. Infrastructure as a Service (IaaS)
b. Platform as a Service (PaaS)
c. Software as a Service (SaaS).
IaaS refers to a combination of hosting, hardware
provisioning and basic services needed to run a cloud. PaaS
refers to the provision of a computing platform and the
Page 66
c.
ISSN: 2455-3743
Page 67
ISSN: 2455-3743
Page 68
ISSN: 2455-3743
Page 69
ISSN: 2455-3743
Selection of Parents
Offspring
on
on
Update Generation
7.
8.
9.
Algorithm
Figure a.
2: Max-Min
Flow Chart
for Genetic
Algorithm
In the Max-min algorithmic rule, shown in figure 1,
represents the prepared time of resource
to execute a
task, where as and
represent the expected completion
time and Execution time severally [1]. As shown, task
with most expected completion time is chosen to
be assigned for
corresponding
resource
that
offers minimum execution time.
1.
2.
3.
4.
5.
6.
7.
Where:
Set of task called as meta-task
Resources
Page 70
10. End Do
4.5 Bee Colony Optimization
The BCO rule is predicated on the activities of bees
whereas looking for nectar, and sharing the knowledge with
alternative bees. There square measure 3 styles of agents the employed bee, the onlooker bee, and the scout. The
employed bee stays on a food supply and provides its
surroundings in memory; the onlooker acquires this
knowledge from the employed bees and selects one in every
of the food sources to forage; and also the scout performs the
task of finding new nectar sources.
The procedure for BCO is as follows:
ISSN: 2455-3743
Page 71
ISSN: 2455-3743
Initialize ants
Stop
Find solution
Is termination
criteria met?
Update
pheromon
e
Evaluates
solutions
Update
pheromone
Evaluates
solutions
Page 72
ISSN: 2455-3743
5.
CONCLUSION
Page 73
ISSN: 2455-3743
AUTHOR PROFILE
A Gawande pursuing
Bachelor of Engineering in
Information Technology,
from SSGMCE, SHEGAON
, India.
Page 74
ISSN: 2455-3743
1. INTRODUCTION
Attendance is the necessary think in todays days to maintain
in the discipline in school and colleges. Automated Students
Attendance Management system using Raspberry-Pi and NFC
is a modern easy and cheap way to take attendance and
provide the result accurately. For making this amazing and
modern Attendance management system we required NFC tag
(Raspberry Pi), Student id_tag (NFC tag) and RFID .NFC is
the technology which is been with us since a couple of years
back and carries a lot of advantages .The NFC which is use in
todays each phone is basically based on wireless
communication interface and also the NFC tags are available
which is used for storing and identify particular identity ,
RFID (Radio Frequency Identifier) is based on the magnetic
field induction which is used for communication between two
electronic devices here RFID is used to identify a particular
NFC tag. A Raspberry Pi is a low cost, business card size
computer with his ARM processor, able to play 1080p video
with Videocore 4 GPU, 512MB of RAM , a SDcard slot, USB
slots with a 10/100 Ethernet port. This attendance system can
be used by school, college, offices, university, by using NFC
in Linux OS based Raspberry Pi device. The student just has
to tab his NFC tag to RFID reader which is placed along with
the Raspberry Pi and after identifying the Face recognition is
done. After this, the system will generate the report of the
student and calculate the number of students attends that class
and this also avoid the problem of illegal marking of
attendance. In this way the system works. The Hardware
requirements are Raspberry Pi, NFC tag, RFID reader, camera
module. The overall cost of this system will not be more than
a 5,000 INR. The total execution is done by hardware and
software of this system. The main advantage of this type of
this system is this system totally avoid the illegal attendance
2.
RELATED WORK
Page 75
METHODOLOGY
3.1
COMPONENTS
3.1.1 NFC/RFID: Near Field Communication which is also
popular as NFC is a short range wireless technology and it is
the subset of RFID family. Near Field Communication is the
one of the most significant technologies in the field of
ISSN: 2455-3743
personal communication. NFC is based on High frequencyRadio Frequency Identification (HF-RFID) technology that
uses magnetic field induction to do communication between
electronic devices in its active area. Both operate at 13.56
MHz Operating distance of NFC technology is typically 10
cm and data exchange rate is typically 424 kb/s.
3.1.2 Raspberry Pi: The Raspberry Pi is the low cost credit
card size computer with a RAM of 512MB and a memory card
slot, memory card is used for booting purpose and Linux OS is
used. Slots of USB and Ethernet is provided with a 40pin
GPIO used to interface with RFID reader and a camera
module can be attached to Raspberry Pi for face recognition. It
also contains a memory card slot and standard mobile charger
slot.
Page 76
CONCLUSION
ISSN: 2455-3743
REFERENCES
7.
AUTHOR PROFILE
Mahesh P. Sangewar
Studying BE at Shri Sant
Gajanan Maharaj College of
Engineering,
Shegaon,
Maharashtra, India.
Shubham R. Waychol
Studying BE at Shri Sant
Gajanan Maharaj College of
Engineering,
Shegaon,
Maharashtra, India.
Page 77
ISSN: 2455-3743
Prof. A. S. Manekar
Amitkumar S Manekar working
as assistant Professor in IT
Department SSGMCE, Shegaon.
His research area is Big Data
analysis and High performance
Computing. He has guided many
Under Graduate and Post
Graduate Students.
Page 78
ISSN: 2455-3743
1. INTRODUCTION
The diary is the best way to note down your day to day
activity so that in future you may be able to have looked at
your achievement and happy moments. Diaries can be of two
type personal diary and work diary (professional
diary).Personal diary is to be kept secret one where as private
diary can be shared with organization to which you are
abounded. My Moments application will allow you to have
your personal diary and Professional diary in the same case
but with different privacy menu and allow you to note down
your memories in your cell phones which is much secured
than traditional way i.e. book .User must write the diary on
daily basis for that proper scheduling in this Application we
are focusing on the same with help of reminders and
notifications. When it comes to write diary we thought about
writing text but it is not the efficient way or we can express
our thoughts in more colorful way though the pictures and
videos or through the audios that will make this application
different from others. In this application all the four methods
i.e. text, image, audio, video will be implemented that will
make the user more easy to use and will not force user to type
all the things in the text. Android application is the way to
make the life easy and convenient and to make your smart
phone smarter this application will Help and keeping
memories of your memorable moments and to watch that
moment will give and different filling as a person.
This diary will be an audiovisual diary and you may
Page 79
ISSN: 2455-3743
Main Activity
Personal Diary
Add Moments
Capture Video
See past
Moments
Retrive All Data
W.R.To Time
Add moments
Capture Video
Add text
Add text
Capture Audio
Capture Audio
Capture Image
Capture Image
Official Diary
Settings
See Past
Moments
Share Data.
Page 80
ISSN: 2455-3743
Capturing Image:
Images can be captured by using the Android Application we
simply need to have permission for the hardware in the
android Manifest as like in recording videos .And following
java code can be applied to capture photo using the android
application method dispatchPictureIntent() is used as shown
in following code in figure 5:
:
Figure 6: Login Activity
Figure 6 shows the login activity which will be the first
activity that user will interact. User will enter the password so
that the security of data will be maintained.
Personal Diary:
1. Performance Analysis:
As Android application are making life easy and mobile
based application are more easy and convenient to use. My
Moments diary is the application which can be used for the
personal diary as well as business note taking. All the other
available application in market provide text and image input
but My Moments diary will provide you methods to take
input in four different ways. Following figures.
Login Page
Figure 7: Personal diary Activity
Figure 7 shows the personal activity .It is one of the shelf of
the diary application in which user can access after entering
correct password and if the user is authenticate.
Work Diary:
Page 81
ISSN: 2455-3743
12.
13.
5.
CONCLUSION
In this paper we have implemented the proposed
application for writing diary in an interesting way and to
change the conventional diary writing method. Android
application makes the cell phone smart and this
application will one of the smartest applications. As
proposed system is having feature to maintain youre
personal as well as your work diary it would be useful for
the professionals as well as to the common persons who
are willing to write the diary on the daily basis.
6.
REFERENCES
[1] https://developer.android.com/guide/topics/media.
[2] Paper on Model Based Rapid Application Development
by Netta M. Shanil ,Shiri Davidson IBM Haifa Research Lab
[3 ]https://play.google.com/store/apps.
[4] https://www.slideshare.net.
Figure 8: Work diary Activity
Figure 8 shows the work Diary activity in which user can
enter data related to the work same as the personal diary
methods to input the data are same.
4. FEATURES
In the market there are many applications available for the
same purpose but My Moments Application stands different
from the others in many ways. We have all four types of
methods to input the data and to make the diary audio visual.
Many applications provide feature to take note while
attending the meeting these can be done by using Work
Diary and notes can be note down by using audio recorder or
in the text also.
Some of the feature is listed below
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
7.
AUTHOR PROFILE
Page 82
ISSN: 2455-3743
Prof. A. S. Manekar
Amitkumar S Manekar working as
assistant Professor in IT Department
SSGMCE, Shegaon.
His research area is Big Data
analysis and High performance
Computing. He has guided many
Under Graduate and Post Graduate
Students.
Page 83
ISSN: 2455-3743
1,2
ABSTRACT: Cloud computing is a recent advancement where in IT infrastructure and applications are provided as services to
end-users. Cloud computing is the delivery of computing services over the internet. It is always required to share work load among
the various nodes of the distributed system to improve the resource utilization and for better performance of the system. So there may
be load on VMs, for balancing the load we have two ways, one is allocation of resources and second is scheduling the task. In this
paper we are comparing two well-known non-linear algorithms for load balancing in cloud environment for effective utilization of
the system and proper servicing the clients request. We conducted our experiments on CloudSim simulator taking makespan as
parameter for comparing the results of the different algorithm.
Keywords: Cloud computing, task scheduling, load balancing, PSO, Swarm optimization, Genetic algorithm, CloudSim, IaaS.
1. INTRODUCTION
Cloud computing is not another thought in specialized world but
rather it is a forthcoming innovation. Grid Computing, Utility
Computing and dispersed frameworks have direct association with
the Cloud Computing. It can be expressed that framework
processing goes about as the spine to Cloud Computing. Cloud
computing gives virtual assets and administrations with the goal of
diminishing expense. Cloud computing is actualized and famous
generally because of its properties of giving virtualization and
reflection [1] [2].
In operating system, various strategies have been projected for
the purpose of job scheduling. The algorithms or strategies
proposed for job scheduling are SJF (Shortest Job First), FIFO
(First in First Out), LIFO (Last in First Out), Priority Based,
Greedy Algorithm. The basic aim of these algorithms is
minimization of total execution time of all jobs. These algorithms
are easily understandable and can be implemented [3]. In Cloud
environment, there is no restriction on number of jobs at a time
requesting for scheduling which becomes the issue of efficiency of
existing operating system scheduling algorithms. These algorithms
may produce unwanted results in Cloud Computing environment
and thus are not feasible to be implemented.
To make use of existing algorithms, there is a need of
optimization of these algorithms to generate better results. One
more issue in job scheduling and load balancing is that the
response time for various task is very high and load on the
processor become a threaten of failure of processor. This leads to a
need of the algorithm which can optimize the load balancing
process [4]. In this paper, both the Genetic Algorithm [5] and
Particle Swarm Optimization approach [6] has been implemented
for scheduling and load balancing and a
Page 84
ISSN: 2455-3743
Page 85
ISSN: 2455-3743
Page 86
ISSN: 2455-3743
(1)
Where is the fitness value of the solution i evaluated by the
employed bee, N represents the number of employed bees, and
is the probability of selecting the
employed bee.
Choice of a target food source to move to onlooker bees and
determination of the nectar amounts, by the equation.
(2)
Step3. Movement of Scouts: If the fitness values are not
improved by continuous iterations, those food sources are
abandoned, and these employed bees convert into scouts and
are moved by the equation
Page 87
ISSN: 2455-3743
Abstract
Enco
ding
schem
e
Initial
popula
tion
genera
tion
Optimiz
ation
criteria
Natu
re of
tasks
Enviro
nment
Highligh
ts
Conclusion
[12]
1
n
Vecto
r
Repre
sentati
on
Rando
m
Commun
ication
Time
and
Executio
n Cost
Indep
ende
nt
Cloud
Simulat
ion
Environ
ment
[13]
1
n
Vecto
r
Repre
sentati
on
Rando
m
Make
span
Indep
ende
nt
Grid
Simulat
ion
Environ
ment
Local
search
based on
VNS
applied
after each
permutati
on
Simulation
results
demonstrate that PSO
algorithm can get better
effect for a large scale
optimization
problem.
Task
scheduling
algorithm based on PSO
algorithm can be applied
in the computational grid
environment.
[14]
1
n
Vecto
r
Repre
Rando
m
Commun
ication
Cost and
Executio
Work
flow
Cloud
Simulat
ion
Environ
Combine
d
with
Heuristic
Page 88
ISSN: 2455-3743
sentati
on
[15]
1
n
Vecto
r
Repre
sentati
on
Rando
m
while
conside
ring
constra
ints
Executio
n Cost
with
Deadline
Constrai
nt
Work
flow
Cloud
Simulat
ion
Environ
ment
(Java)
Used hill
climbing
after each
iteration
The
hybrid
PSO
algorithm performs better
for
local
searches.
Because GELS is used
for the local search rather
than other local search
algorithms such as hillclimbing or SA, the
hybrid algorithm finds
better solutions than other
algorithms. PSOGELS
perform better than the
other algorithms.
[16]
1
n
Vecto
r
Repre
sentati
on
Rando
m
Make
span,
No. of
tasks
that miss
their
deadline
Indep
ende
nt
Java
Simulat
ion
Environ
ment
Local
search
based on
GELS
applied
on results
obtained
from
PSO
[17]
Fuzzy
Matric
es
Rando
m
Make
span
Indep
ende
nt
Grid
Simulat
ion
Environ
ment
Applying
LJFPSJFP
heuristic
alternativ
ely after
allocation
of batch
of jobs to
nodes
We
evaluated
the
performance of a fuzzy
PSO
for
grid
job
scheduling and compared
the performance with GA
and SA. Empirical results
revealed
that
the
proposed approach can be
applied
for
job
scheduling.
When
compared to GA and SA,
n Cost
ment
(Swarm
package
)
Page 89
ISSN: 2455-3743
Re
f.
Enco
ding
sche
me
Initial
populat
ion
generat
ion
an important advantage
of the PSO algorithm is
its speed of convergence
and the ability to obtain
faster
and
feasible
schedules.
Optimiz
ation
criteria
Selecti
on
operat
or
Cros
sove
r
oper
ator
Mutat
ion
operat
or
Nature
of
tasks
and
enviro
nment
Conclusion
wo
rk
Abstract
[18]
Fixe
d bit
strin
g
repre
senta
tion
Random
ly
Load
Balancin
g
Rando
mly
Sing
le
Poin
t
Cros
sove
r
Bits
are
toggle
d
(01
or
10)
Indepe
ndent
and
Cloud
Analys
t
[19]
Per
muta
tion
Base
d
Repr
esent
ation
Random
Make
span,
Load
Balancin
g,
Resource
Utilizatio
n, Time
taken to
obtain
solution
Roulett
e
Wheel
No
oper
ator
Adapti
ve
Mutati
on
Operat
or
Workfl
ow and
Grid
Simula
tion
[20]
Dire
ct
Resourc
e having
some
data for
the task
is
assigne
d to task
Makespa
n
Roulett
e
Wheel
OnePoin
t
Cros
sove
r
Flip
Mutat
or
Indepe
ndent
and
Cloud
Simula
tion
Enviro
nment(
Hadoo
Page 90
ISSN: 2455-3743
optimization method
for
the
new
scheduler.
p
MapRe
duce)
[21]
Dire
ct
Not
mention
ed
Resource
Utilizatio
n<comm
a> Speed
of
resource
allocatio
n
Not
mentio
ned
Not
ment
ione
d
Not
mentio
ned
Indepe
ndent
and
Cloud
Simula
tion
Enviro
nment
(using
Java
Langua
ge with
Java
Geneti
c
Algorit
hm
Packag
e)
[22]
In this paper, we
proposed a hybrid
heuristic
method
(HSGA) to find a
suitable scheduling
for workflow graph,
based on genetic
algorithm in order to
obtain the response
quickly
moreover
optimizes
makespan,
load
balancing
on
resources
and
speedup ratio.
Dire
ct
New
method
Based
on bestfit and
roundrobin
method
Makespa
n<comm
a> Load
Balancin
g
on
Resource
s<comm
a>
Speedup
Ratio
No
operat
or
Ran
dom
Gen
e
Sele
ction
Cros
sove
r
Selecti
ng a
rando
m
gene
and
replaci
ng its
resour
ce
with a
resour
ce
having
better
failure
rate
and
not
overlo
aded
Workfl
ow and
Cloud
Simula
tion
Enviro
nment
[23]
Dire
ct
Greedy
algorith
m
Makespa
n<comm
a> Load
Balancin
Rotatin
g
Selecti
on
Strateg
One
Poin
t
Cros
sove
Local
Search
Indepe
ndent
and
MATL
Page 91
and
original
adaptive
genetic
algorithm (AGA), a
new
scheduling
algorithm based on
double-fitness
adaptive algorithmjob spanning time
and load balancing
genetic
algorithm
(JLGA)
is
established.
ISSN: 2455-3743
AB
[24]
Tree
Repr
esent
ation
Spannin
g tree
based
method
Load
Balancin
g
Rotatin
g
Selecti
on
strateg
y
New
ly
deve
lope
d
meth
od
Newly
develo
ped
metho
d
Indepe
ndent
and
Cloud
Experi
mental
Enviro
nment
[25]
Multi-agent genetic
algorithm (MAGA)
is a hybrid algorithm
of
GA,
whose
performance is far
superior to that of
the traditional GA.
This
paper
demonstrates
the
advantage
of
MAGA
over
traditional GA, and
then exploits multiagent
genetic
algorithms to solve
the load balancing
problem in cloud
Fixe
d bit
strin
g
repre
senta
tion
Random
ly
Load
balancin
g
Neighb
orhood
Compe
tition
Operat
or for
agents
Neig
hbor
hood
Orth
ogon
al
Cros
sove
r
Oper
ator
for
agen
ts
Mutati
on
operat
or for
agents
Indepe
ndent
and
Cloud
Simula
tion
Enviro
nment.
This
paper
experimentally
proves that MAGA is more
appropriate than GA to handle
high-dimensional
function
optimization problems. Then,
establishing a cloud computing
load balancing model, Min_min
and MAGA algorithms were
applied for resource scheduling
respectively. This method, used
for solving load balancing
strategy based on virtualized
cloud computing, is feasible and
effective.
Page 92
ISSN: 2455-3743
computing
[26]
In this paper, we
present a hybrid
approach
called
FUGE that is based
on fuzzy theory and
a genetic algorithm
(GA) that aims to
perform
optimal
load
balancing
considering
execution time and
cost.
FUGE
algorithm
assigns
jobs to resources by
considering virtual
machine
(VM)
processing
speed,
VM memory, VM
bandwidth, and the
job lengths.
Dire
ct
Random
Makespa
n<comm
a>
Cost<co
mma>
Load
Balancin
g
Based
on
fitness
value
Fuzz
y
base
d
cross
over
appr
oach
Indepe
ndent
and
CloudS
im,
MATL
AB
[27]
Dire
ct
Random
Energy
Conserva
tion
Rando
m
Mult
ipoin
t
Cros
sove
r
Single
-Point
Mutati
on
Operat
or
VM
Placem
ent and
Cloud
Simula
tion
Enviro
nment
Page 93
8.
ISSN: 2455-3743
CONCLUSION
In this paper, we have surveyed GA and PSO method for
load balancing in cloud computing. The main purpose of
load balancing is to satisfy the customer requirement by
distributing load dynamically among the nodes and to make
maximum resource utilization by reassigning the total load
to individual node. This ensures that every resource is
distributed efficiently and evenly. So the performance of the
system is increased. We have also discussed architecture of
CloudSim simulator and required qualitative matrix for load
balancing.
9.
1.
REFERENCES
Page 94
ISSN: 2455-3743
Page 95
ISSN: 2455-3743
Page 96
ISSN: 2455-3743
d) Video Surveillance
In this system, video surveillance is used to monitor
employee behaviour. In it, cameras are places in some area
that is in hidden as well as in noticeable area. These tiny
cameras can give surveillance information. At that time,
main reason for this system was to track employees
pilferage, horseplay, safety hazards. It was stated that 40%
of respondents believe it is employer's right to use video
surveillance [2]. But it is very costly to maintain camera in
large campus.
e) Active Badge
It is credit card sized badge which stick on the cloth of
employee. This system requires transmitting device.
Sensor uses signal from device and monitor the activity of
employee via network to server. Server is used to translate
the signal into information and share it on the LAN that is
Local Area Network [8]. It requires lithium battery to
activate the badge which is entering consuming process.
f) Biometric Based Tracking System
In manual tracking system, it is difficult to keep a track of
large amount of employee by using only pen and paper. In
computerized tracking system, there may be chances of
duplication that is proxy. To avoid these problems a new
system is invented called as biometric based tracking
system. In biometric based tracking system, we can
uniquely identify an employee on the basis of his or her
voice, eye i.e. retina, fingerprint, and face recognition.
For tracking, employee has to put his or her finger
on finger print device. Device scan finger print and unique
matriculation number sends to database. After that if
number matches then employee can consider as
authorized. Otherwise employee cannot enter into
organization [9]. Simple architecture is shown as below
Page 97
ISSN: 2455-3743
2. CONCLUSION
Work suggests survey on existing attendance and tracking
system. We observed some advantages and disadvantages
of that system and by using some good properties of
existing system we are developing 'The master spy'. By
using this system, job performance will be improved as
employee knows someone keeps eye on them. Thus we
can deploy the project to customer in deadline. We can
also meet to customers satisfaction. It is not costly as
employee just has to install this application in mobile. We
can also track the mobile of employee. Specialty of this
project is - it is not harmful for anyone as it does not
induce any rays. It can be used in shopping mall, schools
or colleges, organizations, companies etc. We can also
calculate the behaviour of employee by using k means
cluster algorithm. This project can be implemented offline
by using HTML5.
3.
REFERENCES
Page 98
4.
ISSN: 2455-3743
AUTHORS PROFILE
Poonam V. Hajare
Pursuing 3rd Year BE at SSGMCE
Shegaon
Rajeshri V. Kachole
Pursuing 3rd Year BE at SSGMCE
Shegaon
Ankush S. Deshmukh
Pursuing 3rd Year BE at SSGMCE
Shegaon
Prof. A. S. Manekar
Amitkumar S Manekar working as
assistant Professor in IT Department
SSGMCE, Shegaon.
His research area is Big Data analysis
and High performance Computing. He
has guided many Under Graduate and
Post Graduate Students.
Page 99
ISSN: 2455-3743
ashwinigugle@email.com
asmanekar24@gmail.com
ABSTRACT: Various Password authentications methods are available now days now a days various complex and light weighted
methods are available in various online application and E Commerce sites. Some methods are based on encryption which provide
real time security and basically its a lasts alternative. Some methods are based on biometric data where humans eye and figure
prints are the key values. In this work we are trying to take a tour and collect information about all authentication methods
available in todays context. While collecting information their pros and cons are measured and analysis. Finally a conclusion is
drawn on the basis of these methods. A future scope is canvassed and a conclusion drawn on the basis of some parameters which
will help to decide the best method for online transactions system.
Keywords: Authentication, Security, Online Data Accessing.
1. INTRODUCTION
Spyware is a most dangerous malware that get installed on
any computer without the authority or permission of the
owner in order to collect the information of owner. The
owners information can be private or public, it collects
information such personal details, credit card no. , password
saves in chrome cookies etc. which is personal to the owner.
Spyware also collect information such as user keystrokes,
internet activities, sometimes slow down our computer or
crash and also take space etc. So it is becoming serious issue
of spyware which need to be handling in some cases, so we
have many different software tools to protect this issue. Our
review says there are until now so many methods for
password security. The most widely used is textual password
technique. Textual password is the combination of alphabet
(A-Z, a-z), Digits (0-9) and special symbol (eg: @,*,-). This
type of password also called as alphanumeric password. But
with this many different security issues arises. The
alternative to this textual password there is another technique
Graphical password. To reduce all this problem of traditional
methods, textual graphical password scheme using color
combinations have been developed for the possible 9
alternative solution to old one traditional system. The textual
password authentication is not secure and has high failure
rate compare to the others because shoulder surfing is too
much easy for textual based password. To overcome these,
the primary design without any extra complexity into the
authentication process is improved.
2. RELATED WORK
Various types of techniques are available for authentication
alphanumeric password is a traditional technique which is
widely used. It consists of secret series of characters. The
user id and password act as user identification and
authentication to access required resources. This
alphanumeric password technique secures resources but it
has many disadvantages. User can pick password which can
Page 100
ISSN: 2455-3743
Page 101
ISSN: 2455-3743
CONCLUSION
FUTURE SCOPES
Page 102
REFERENCES
ISSN: 2455-3743
Page 103
ISSN: 2455-3743
AUTHOR PROFILE
Mitali Lakade Perceiving the
3rd year B.E. in Information
And Technology at Shri Sant
Gajanan Maharaj College of
Engineering, Shegaon, Dist
Bhuldhan, Maharashtra ,
India
Ruchi Kela Perceiving the
3rd year B.E. in Information
And Technology at Shri Sant
Gajanan Maharaj College of
Engineering, Shegaon, Dist
Bhuldhan, Maharashtra ,
India
Ashwini Perceiving the 3rd
year B.E. in Information And
Technology at Shri Sant
Gajanan Maharaj College of
Engineering, Shegaon, Dist
Bhuldhan, Maharashtra ,
India
Prof. A. S. Manekar
Amitkumar
S
Manekar
working as assistant Professor
in IT Department SSGMCE,
Shegaon.
His research area is Big Data
analysis
and
High
performance Computing. He
has guided many Under
Graduate and Post Graduate
Students
Page 104
Area of Research
Data Base Management System, Data Mining and Warehousing, Image Processing, Data Structure , Design and
Analysis of Algorithm, Multi-media and Computer Graphics, Software Engineering, Computer Security and
Cryptography, Theory of Computation, Artificial Intelligence, Distributed System, Operating System, Fuzzy logic,
Cloud Computing, Nanotechnology, Soft Computing, Network Security, Mobile Communication, Internet and web
technologies etc.
All submitted papers will be judged based on their quality by the technical committee and reviewers. Papers that
describe research and experimentation are encouraged.
All paper submissions will be handled electronically and detailed instructions on submission procedure are
available on IJRCIT website (http://www.garph.org).
Best Regards
Editor-in-Chief
Global Advanced Publication House