KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653734
P. Akulwar, Sujata Pardeshi, Arvind Kamble
{"title":"Survey on Different Data Mining Techniques for Prediction","authors":"P. Akulwar, Sujata Pardeshi, Arvind Kamble","doi":"10.1109/I-SMAC.2018.8653734","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653734","url":null,"abstract":"Data Mining has wide applicability due to wide ease of use of large amount of data and requirement of storage as per the need. Data mining techniques are widely useful in educational data mining for analysis of student data. The different data mining techniques such as classification, clustering, association rule mining, decision tree etc. are used in educational field for analyzing student’s performance, mindsets, forecasting their result and grouping them as per defined category. These techniques are also used for finding various patterns. Educational data mining helps for improving student’s performance, for managing the student database and for managing the institute. This paper focuses on different data mining techniques that are useful for predicting student performance.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"80 1","pages":"513-519"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83422384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Champion Identification for NGOs","authors":"Utsav Das, Arvind Narayanan, Aman Gupta, Onkar Singh Bagga, Shalu Chopra","doi":"10.1109/I-SMAC.2018.8653753","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653753","url":null,"abstract":"In this paper, we attempt to provide a recommender system to help NGOs select motivated and passionate individuals to promote their cause on social media by evaluating their digital social profiles. We have taken Twitter as the social medium due to its relatively easier access to user data and tweets. The best fit for a particular NGO would be the person who has both influence within her digital social network as well as writes and posts on matters relevant to the NGO. To achieve this ranking, we break down the profile of the candidate into three metrics: Influence, Engagement and Relevance. These three metrics provide quantitative scores of the influence the candidate has over her network, how engaged her follower base is and how relevant the topics the candidate talks about is to the NGO’s work respectively. The first metric uses the TwitterRank algorithm to measure the influence the user has on his follower base. Engagement quantifies the way the follower base reacts to the posts through likes and retweets. Finally, we implement topic modelling with LDA to quantify the relevance of the candidate’s tweets to the NGO’s areas of interest. We consider whichever topic the NGO provides as the domain on which it requires candidates and hence, this system can be used by any organization to find persons of interest on Twitter.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"37 1","pages":"361-366"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87086315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653673
Minal Tandale, S. Panbude
{"title":"Latent Fingerprint Enhancement Using Sparse Representation","authors":"Minal Tandale, S. Panbude","doi":"10.1109/I-SMAC.2018.8653673","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653673","url":null,"abstract":"Latent fingerprints are fingerprints which are smudged, overlapped, and distorted. They are poor quality images with unclear ridge structure. Latent fingerprints are seen at crime scene, so it plays a vital role in identifying and declaration of criminal in law enforcement.Therefore it is important to enhance the latent finger prints which are distorted by most of the non-finger print patterns. By enhancing the latent fingerprints it becomes easy to match with the large database of know persons fingerprints.By seeing the advances of sparse representation in image denoising, the work proposes the method of enhancement using sparse representation. In Sparse representation initially total variation model will be used for latent fingerprint image, where image is disintegrated into cartoon and texture components. Cartoon component contains noise, which will be discarded while texture component contains main information. Second sparse enhancement algorithm is implemented on texture component of the image. Experimental results are carried on NIST SD4 to show the results of the proposed algorithms.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"137 1","pages":"671-675"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86618294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653745
K. M. M. Fathima
{"title":"A Survey on Multiprotocol Label Switching in Virtual Private Networks","authors":"K. M. M. Fathima","doi":"10.1109/I-SMAC.2018.8653745","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653745","url":null,"abstract":"When a customer browses internet or sends files (upload/download), the request reaches the DNS (Domain Name System) in the network and does lookup for IP address of the corresponding URL (viz.,www.google.com). Then the request gets transformed to packets and traverses in the internet. The router builds the routing table for the packets based on the source ip and destination ip addresses of the packets. For better security purposes, we need to protect the data by way of encryption i.e. covering up of the packet. Hence we are hiding the information from the hackers. This can be implemented by cisco’s MPLS VPN (Multi Protocol Label Switching – Virtual Private Networks). The VPN network is formed by routes named vrf (virtual routing and forwarding). The vrf identifiers distinguish the routes between different customers landing the ISP (Internet Service Provider) routers. Apart from the existing network, the packets travel in an MPLS enabled ISP network. This results in better security, privacy, reliability, latency and enables fast transmission of data.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"13 1","pages":"737-740"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83317812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653750
Akhil Gupta, Shweta Singh
{"title":"Design of Two Stage CMOS Op-Amp with High Slew Rate and High Gain in 180nm","authors":"Akhil Gupta, Shweta Singh","doi":"10.1109/I-SMAC.2018.8653750","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653750","url":null,"abstract":"This paper present a CMOS two stage op-amp using 180nm technology. Keeping the 1.8 V dc supply with 50uA bias current this amplifier produces a gain greater than 66dB along with a very high slew rate of 95 V/us. On decreasing the current the gain can be increase but the slew rate will also decrease which will going to effect the sensitivity of the amplifier. Therefore a high slew rate amplifier has design along with high gain without any much power consumption. The various parameter such as Gain Bandwidth Product, Phase margin, Power consumption are measured. The results shows that the on decreasing the size of MOSFETs the power dissipation also decreases.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"2 1","pages":"341-345"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82610669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653775
Sanjith. M. Gowda, G. Sushanth, S. Sujatha
{"title":"IOT Based No-parking Notifier System","authors":"Sanjith. M. Gowda, G. Sushanth, S. Sujatha","doi":"10.1109/I-SMAC.2018.8653775","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653775","url":null,"abstract":"Traffic congestion due to vehicles parked in No-parking zones has become a serious problem in major cities of India. Due to traffic congestion environment, economy and overall quality of life is affected. Hence it is high time to effectively manage the traffic congestion problem. With increase in number of vehicles, discipline in road regulation or traffic system becomes mandatory. The existing traffic system is very accurate but not efficient enough to monitor all the vehicles on the road. With the advent of new technology this problem can be tackled by using Wi-Fi enabled micro-controllers, RFID and cloud systems to monitor every vehicle on the road all the time. This becomes easy for the government in regulating its traffic rules with high efficiency without affecting the smoothness of the traffic.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"18 1","pages":"108-110"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72648232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653650
Abantika Choudhury
{"title":"Optimized Deployment of Roadside Unit in VANET for Urban Area to Reduce the Cost of Deployment","authors":"Abantika Choudhury","doi":"10.1109/I-SMAC.2018.8653650","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653650","url":null,"abstract":"This paper concentrates over optimal deployment of Road Side Unit in a road network for communication with Vehicular Ad-Hoc Networks. Vehicular Ad-hoc networks comprises of moving vehicles communicating with each other via wifi and also some vital components like Roadside unit and On-Board Unit. Roadside Units are placed across the road for infrastructure communication. But the deployment cost of Roadside unit is very high, so, our goal is always to optimally place limited number of Roadside unit in a given region and to achieve maximum performance as well. In this paper, an algorithm is presented, the performance of the algorithm shows better results compared to other existing ones. Proposed algorithm uses selected deployment of Roadside unit and vehicle to vehicle communication in between two intersecting points of a road.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"53 1","pages":"272-277"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79294180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653689
Dhanashree Toradmalle, Rohan Singh, Het Shastri, N. Naik, Vishal Panchidi
{"title":"Prominence Of ECDSA Over RSA Digital Signature Algorithm","authors":"Dhanashree Toradmalle, Rohan Singh, Het Shastri, N. Naik, Vishal Panchidi","doi":"10.1109/I-SMAC.2018.8653689","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653689","url":null,"abstract":"Digital signatures are replacing paper-based work to make life easier for customers and employees in various industries. We rigorously use RSA and Elliptic Curve Cryptography (ECC) for public key cryptographic algorithms. Nowadays ECDSA (Elliptical Curve Digital Signature Algorithm) gaining more popularity than the RSA algorithm because of the better performance of ECDSA over RSA. The main advantage of ECC over RSA is ECC provides the same level of security with less key size and overhead than RSA. This paper focuses on a brief review of the performance of ECDSA and RSA in various aspects like time, security and power. This review tells us about why ECC has become the latest trend in the present cryptographic scenario.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"99 1","pages":"253-257"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78551091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653703
Abhijeet Anil Khandre, S. Shikalpure
{"title":"WAAM Web & Android Authentication Model using Improvised User Identification and Verification Technique using Biometric and Digital Certificate","authors":"Abhijeet Anil Khandre, S. Shikalpure","doi":"10.1109/I-SMAC.2018.8653703","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653703","url":null,"abstract":"Security of web organizations is a stress in the present. Secure user check is essential and fundamental in numerous structures. Authentication and authentication systems typically use a pair of usernames and passwords, and only authenticate the user during the login session. No sessions were checked during a session that was canceled by a clear lock or expired after the user’s idle session. An emerging biometric solution replaces the user name and password of a user with biometric attributes and data during creation and session access. In this way, one-time verification is not enough, and user credentials are considered permanent throughout the session. The solution is to use a short session timeout period and ask users to enter their credentials periodically, but this is not a definitive solution and is a great punishment for service and satisfaction. User Satisfaction This article explores the interesting options offered by using biometric conferencing. Secure protocols for continuous monitoring are constantly monitored by users. Finally, the use of biometric data validation ensures that credentials are transparent without informing users or interacting with them in order to guarantee better service.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"297 1","pages":"536-541"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75000956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653726
M. G. Gurubasavanna, Saleem Ulla Shariff, R. Mamatha, N. Sathisha
{"title":"Multimode authentication based Electronic voting Kiosk using Raspberry Pi","authors":"M. G. Gurubasavanna, Saleem Ulla Shariff, R. Mamatha, N. Sathisha","doi":"10.1109/I-SMAC.2018.8653726","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653726","url":null,"abstract":"India being the fastest developing country and the largest democracy in the world has replaced the trivial paper based ballot system with EVMs in the voting process. The technical advancement in the field of voting process by introduction of electronic voting machines or EVMs has changed the way how voting is done all over the world along with the raise of security concerns and issues like hacking or tampering of EVMs. The Proposed paper discusses about the steps to mitigate the security issues and how the turn out in voting can be increased by introducing the voter to have the facility to vote from any constituency even if he belongs to some other constituency from the designated authorized voting centers. The voting process can be made more secure by involving finger print or bio metric based authentication in the design along with face and iris recognition features. The paper discusses how raspberry pi can be utilized to build the prototype.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"12 1","pages":"528-535"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76210235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}