Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583956
Shalaka M. Ragit, Sagar S. Badhiye
Collaborative data publishing means the data are distributed among multiple data providers or data owners. In this main concern is while publishing data preserving individual's privacy. While publishing collaborative data to multiple data providers two types of problem occurs, first is outsider attack and second is insider attack. Outsider attack is performed by people who are not data providers where as insider attack is performed by colluding data provider who may use their own data records to get the data records shared by other data providers. Insider attack is performed by people who are data provider or data owner. In this paper to overcome the problem of such attacks in collaborative data publishing the encryption strategy can be used such as 3DES which provides individuals data protection by using three keys. And again performing encryption on key with MD5 algorithm and appending it to the block of data.
{"title":"Preserving privacy in collaborative data publishing from heterogeneity attack","authors":"Shalaka M. Ragit, Sagar S. Badhiye","doi":"10.1109/STARTUP.2016.7583956","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583956","url":null,"abstract":"Collaborative data publishing means the data are distributed among multiple data providers or data owners. In this main concern is while publishing data preserving individual's privacy. While publishing collaborative data to multiple data providers two types of problem occurs, first is outsider attack and second is insider attack. Outsider attack is performed by people who are not data providers where as insider attack is performed by colluding data provider who may use their own data records to get the data records shared by other data providers. Insider attack is performed by people who are data provider or data owner. In this paper to overcome the problem of such attacks in collaborative data publishing the encryption strategy can be used such as 3DES which provides individuals data protection by using three keys. And again performing encryption on key with MD5 algorithm and appending it to the block of data.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583984
A. S. Vairagade, R. Fadnavis
Online Social Networking (OSN) sites are always helpful for being socialized and to get exposed to a social environment. But, privacy and prevention of undesired posts on user wall is the only problem of biggest concern. User should have the ability to control the message posted on their own private wall to avoid undesirable contents to be displayed. The existing OSN sites have very little support regarding this problem. For example, Facebook filters messages on the basis of identity of sender i.e. only friend, friend of friend or group of friends can post any message; no content based preferences are supported. Taking this fact into consideration, the proposed work contributes to address such problem through a machine learning based soft classifier for labeling messages in support of contents of message. This work experimentally evaluates an automated scheme to filter out unwanted messages posted on Facebook walls by assigning a set of categories with each short text message based on its contents.
{"title":"Automated content based short text classification for filtering undesired posts on Facebook","authors":"A. S. Vairagade, R. Fadnavis","doi":"10.1109/STARTUP.2016.7583984","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583984","url":null,"abstract":"Online Social Networking (OSN) sites are always helpful for being socialized and to get exposed to a social environment. But, privacy and prevention of undesired posts on user wall is the only problem of biggest concern. User should have the ability to control the message posted on their own private wall to avoid undesirable contents to be displayed. The existing OSN sites have very little support regarding this problem. For example, Facebook filters messages on the basis of identity of sender i.e. only friend, friend of friend or group of friends can post any message; no content based preferences are supported. Taking this fact into consideration, the proposed work contributes to address such problem through a machine learning based soft classifier for labeling messages in support of contents of message. This work experimentally evaluates an automated scheme to filter out unwanted messages posted on Facebook walls by assigning a set of categories with each short text message based on its contents.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132978784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583945
S. Viveka, B. Kalaavathi
In the past years, human health care system has limited application and the flow of data was very minimal. But in recent years, health care systems produce huge volume data because the growth of medical science. We use technology to supervise the complex data produced by the health care system. Data mining is one of the technologies used to find the interesting knowledge from the vast data produced by the health care system and used to analysis the patterns in large sets of data. Association, clustering, and classification are the tools used to help better exploitation of the data. It helps the health care professional to confirm the quality of the discovered medicine, prescribed treatment and the adverse reaction of the drugs.
{"title":"Review on clinical data mining with psychiatric adverse drug reaction","authors":"S. Viveka, B. Kalaavathi","doi":"10.1109/STARTUP.2016.7583945","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583945","url":null,"abstract":"In the past years, human health care system has limited application and the flow of data was very minimal. But in recent years, health care systems produce huge volume data because the growth of medical science. We use technology to supervise the complex data produced by the health care system. Data mining is one of the technologies used to find the interesting knowledge from the vast data produced by the health care system and used to analysis the patterns in large sets of data. Association, clustering, and classification are the tools used to help better exploitation of the data. It helps the health care professional to confirm the quality of the discovered medicine, prescribed treatment and the adverse reaction of the drugs.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132921560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583928
I. J. Reddy, R. Meenakshi
In a wireless multi-hop system the communication between the two endpoints is carried out by a some intermediate nodes whose function is to relay information from one point to another. Although there has been exploitation of the physical layer technique enhance the capability of multi-trip system, link scheduling problems still exist. Link scheduling problem addressed with a cross layer design. Cross layer design is a process of solving congestion and scheduling problems in wireless systems wherever nodes capable by way of the Successive interference cancelation (SIC) capability under Signal to Interference Noise Ratio (SINR) model. SIC an efficient advance to tolerate the multiple adjacent concurrent communication to coexist, enable multi-packet reception. Cross layer design placed among the physical layer and MAC layer. The technique of both layers can support the additional difficult cross layer design intended use of improve system process. The proposed system consists of distributed link scheduling for solving the interference occurring during communications. This scheduling is an effectual process used for managing the interference relationships and with the help of advanced physical layer technique using SIC to take out the interference moreover decode the data by receivers.
{"title":"Congestion control using distributed link scheduling in wireless networks","authors":"I. J. Reddy, R. Meenakshi","doi":"10.1109/STARTUP.2016.7583928","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583928","url":null,"abstract":"In a wireless multi-hop system the communication between the two endpoints is carried out by a some intermediate nodes whose function is to relay information from one point to another. Although there has been exploitation of the physical layer technique enhance the capability of multi-trip system, link scheduling problems still exist. Link scheduling problem addressed with a cross layer design. Cross layer design is a process of solving congestion and scheduling problems in wireless systems wherever nodes capable by way of the Successive interference cancelation (SIC) capability under Signal to Interference Noise Ratio (SINR) model. SIC an efficient advance to tolerate the multiple adjacent concurrent communication to coexist, enable multi-packet reception. Cross layer design placed among the physical layer and MAC layer. The technique of both layers can support the additional difficult cross layer design intended use of improve system process. The proposed system consists of distributed link scheduling for solving the interference occurring during communications. This scheduling is an effectual process used for managing the interference relationships and with the help of advanced physical layer technique using SIC to take out the interference moreover decode the data by receivers.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583900
J. Loganathan, S. Janakiraman
Optimal channel sensing and allocation schemes enable Cognitive Radios (CR) to identify and opportunistically transmit on under-utilized radio frequencies. Intelligent way of channel sensing strategies reflected directly to the major performance factors like end-to-end delay, interference, packet loss ratio and energy consumption. Since most of the CR devices are low power handheld devices, we need simpler and efficient channel sensing strategies. In this paper, improved history based channel sensing problems for multiple cognitive users (CU) networks are effectively modeled through channel deciding factor (CDF) from each available channel. The proposed sensing scheme improves both the misdetection ratio and energy consumption of participating radio devices. Each device in cooperative cognitive radio network decides its next channel by sharing the deciding factors with others; this will extend the sensing space of CR network.
{"title":"Improved history based channel allocation scheme for cognitive radio networks","authors":"J. Loganathan, S. Janakiraman","doi":"10.1109/STARTUP.2016.7583900","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583900","url":null,"abstract":"Optimal channel sensing and allocation schemes enable Cognitive Radios (CR) to identify and opportunistically transmit on under-utilized radio frequencies. Intelligent way of channel sensing strategies reflected directly to the major performance factors like end-to-end delay, interference, packet loss ratio and energy consumption. Since most of the CR devices are low power handheld devices, we need simpler and efficient channel sensing strategies. In this paper, improved history based channel sensing problems for multiple cognitive users (CU) networks are effectively modeled through channel deciding factor (CDF) from each available channel. The proposed sensing scheme improves both the misdetection ratio and energy consumption of participating radio devices. Each device in cooperative cognitive radio network decides its next channel by sharing the deciding factors with others; this will extend the sensing space of CR network.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583912
Prashant S. Shinde, S. Ardhapurkar
In last twenty years, use of internet applications, web hacking activities have exaggerated speedily. Organizations facing very significant challenges in securing their web applications from rising cyber threats, as compromise with the protection issues don't seem to be reasonable. Vulnerability Assessment and Penetration Testing (VAPT) techniques help them to go looking out security loopholes. These security loopholes could also be utilized by attackers to launch attacks on technical assets. Thus it is necessary ascertain these vulnerabilities and install security patches. VAPT helps organization to determine whether their security arrangements are working properly. This paper aims to elucidate overview and various techniques used in vulnerability assessment and penetration testing (VAPT). Also focuses on making cyber security awareness and its importance at various level of an organization for adoption of required up to date security measures by the organization to stay protected from various cyber-attacks.
{"title":"Cyber security analysis using vulnerability assessment and penetration testing","authors":"Prashant S. Shinde, S. Ardhapurkar","doi":"10.1109/STARTUP.2016.7583912","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583912","url":null,"abstract":"In last twenty years, use of internet applications, web hacking activities have exaggerated speedily. Organizations facing very significant challenges in securing their web applications from rising cyber threats, as compromise with the protection issues don't seem to be reasonable. Vulnerability Assessment and Penetration Testing (VAPT) techniques help them to go looking out security loopholes. These security loopholes could also be utilized by attackers to launch attacks on technical assets. Thus it is necessary ascertain these vulnerabilities and install security patches. VAPT helps organization to determine whether their security arrangements are working properly. This paper aims to elucidate overview and various techniques used in vulnerability assessment and penetration testing (VAPT). Also focuses on making cyber security awareness and its importance at various level of an organization for adoption of required up to date security measures by the organization to stay protected from various cyber-attacks.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130734679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583921
Shweta S. Dawley, Pradnya A. Gajbhiye
The project presents the design of high performance quaternary Combinational circuits for lower power dissipation. Most of the digital electronic systems are based on the binary logic design which is limited by the requirement of interconnections which increases the chip area. The solution to this problem can be achieved using multi valued logic (MVL)/Quaternary logic. Most of the authors used methods which required Quaternary to Binary and Binary to Quaternary conversion for any arithmetic and logic operation and achieved satisfactory performances. Our aim is to develop MVL/Quaternary logic for combinational circuits under case study without converting these levels into binary logic and vice-versa. It will reduce one additional step, and improve the performance offering less chip size, saving more power. The design is targeted for 0.18um CMOS technology and the design tool for simulation will be Advanced Design System tool (ADS).
{"title":"Design and comparative analysis of binary and quaternary logic circuits","authors":"Shweta S. Dawley, Pradnya A. Gajbhiye","doi":"10.1109/STARTUP.2016.7583921","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583921","url":null,"abstract":"The project presents the design of high performance quaternary Combinational circuits for lower power dissipation. Most of the digital electronic systems are based on the binary logic design which is limited by the requirement of interconnections which increases the chip area. The solution to this problem can be achieved using multi valued logic (MVL)/Quaternary logic. Most of the authors used methods which required Quaternary to Binary and Binary to Quaternary conversion for any arithmetic and logic operation and achieved satisfactory performances. Our aim is to develop MVL/Quaternary logic for combinational circuits under case study without converting these levels into binary logic and vice-versa. It will reduce one additional step, and improve the performance offering less chip size, saving more power. The design is targeted for 0.18um CMOS technology and the design tool for simulation will be Advanced Design System tool (ADS).","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114624042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583989
R. Dharmik, R. Bhanuse, A. D. Gaikwad
The syntax analysis phase of a Compiler is to check syntactic structure of Programming Language construct using Context Free Grammar. Either by using Top-Down or Bottom-Up parsing technique to parse string of a given language. The string of a Language is successfully parsed by parser of Context Free Grammar then that string is syntactically correct. In this paper CYK algorithm is membership algorithm which gives string is member of language generated by Context Free Grammar or not. We have found out the Context Free Grammar is ambiguous or not using CYK algorithm.
{"title":"Ambiguity of Context Free Grammar using the CYK algorithm","authors":"R. Dharmik, R. Bhanuse, A. D. Gaikwad","doi":"10.1109/STARTUP.2016.7583989","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583989","url":null,"abstract":"The syntax analysis phase of a Compiler is to check syntactic structure of Programming Language construct using Context Free Grammar. Either by using Top-Down or Bottom-Up parsing technique to parse string of a given language. The string of a Language is successfully parsed by parser of Context Free Grammar then that string is syntactically correct. In this paper CYK algorithm is membership algorithm which gives string is member of language generated by Context Free Grammar or not. We have found out the Context Free Grammar is ambiguous or not using CYK algorithm.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583965
S. Kala
Modern communication standards are constantly evolving. The main challenge in the wireless industry is to provide hardware requirements for supporting the various evolving standards and protocols to facilitate the services to end users. In such an environment, Software Defined Radio is gaining popularity. Most of the wireless standards are computationally complex and it is challenging to map them on to an architecture, with minimum resources and higher energy efficiency. This paper discusses the design of receiver structure for a software radio, using polyphase channelizer. The paper mainly focuses on the design of Frequency Modulation (FM) channelizer as a case study. Hardware complexity analysis and comparison of the channelizer for various polyphase filter structure implementations is also presented. Simulation results for polyphase channelizer are also discussed in this work.
{"title":"Design of a software defined radio receiver using FM channelizer — A case study","authors":"S. Kala","doi":"10.1109/STARTUP.2016.7583965","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583965","url":null,"abstract":"Modern communication standards are constantly evolving. The main challenge in the wireless industry is to provide hardware requirements for supporting the various evolving standards and protocols to facilitate the services to end users. In such an environment, Software Defined Radio is gaining popularity. Most of the wireless standards are computationally complex and it is challenging to map them on to an architecture, with minimum resources and higher energy efficiency. This paper discusses the design of receiver structure for a software radio, using polyphase channelizer. The paper mainly focuses on the design of Frequency Modulation (FM) channelizer as a case study. Hardware complexity analysis and comparison of the channelizer for various polyphase filter structure implementations is also presented. Simulation results for polyphase channelizer are also discussed in this work.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583906
V. Kodgirwar
E-purchase is being preferred by millions of consumers over traditional shop purchases, all over the world. So in this case we just focus on CBIR system that will be able to learn user's choices in clothing and help him or her to make the best choices of clothing during e-purchase. This work will emphasize on the images matching aspect of the system only to retrieve relevant clothing as per the user's liking. Now we are applying different texture features for detecting patterns. Texture features are Contrast, Coarsness, Entropy, Energy, Correlation.
{"title":"Application of content based image retrieval for E-commerce","authors":"V. Kodgirwar","doi":"10.1109/STARTUP.2016.7583906","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583906","url":null,"abstract":"E-purchase is being preferred by millions of consumers over traditional shop purchases, all over the world. So in this case we just focus on CBIR system that will be able to learn user's choices in clothing and help him or her to make the best choices of clothing during e-purchase. This work will emphasize on the images matching aspect of the system only to retrieve relevant clothing as per the user's liking. Now we are applying different texture features for detecting patterns. Texture features are Contrast, Coarsness, Entropy, Energy, Correlation.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}