International Conference On CCODE-2018 FEBRUARY 7-8, Organised by DEPARTMENT OF COMPUTER SCIENCE SRI PADMAVATI MAHILA VISVAVIDYALAYAM

Size: px
Start display at page:

Download "International Conference On CCODE-2018 FEBRUARY 7-8, Organised by DEPARTMENT OF COMPUTER SCIENCE SRI PADMAVATI MAHILA VISVAVIDYALAYAM"

Transcription

1

2 International Conference On CCODE 2018 UNIVERSAL COMPUTING, COMMUNICATIONS AND DATA ENGINEERING CCODE-2018 FEBRUARY 7-8, 2018 Organised by DEPARTMENT OF COMPUTER SCIENCE SRI PADMAVATI MAHILA VISVAVIDYALAYAM (Women s University) TIRUPATI ANDHRA PRADESH, INDIA. Page i

3

4 PROGRAMME SCHEDULE Date , Wednesday Time Event Venue Saaveri Guest House, 8:30 AM-10 AM Registration SPMVV Saaveri Seminar Hall, 10:00 AM 11:30 AM Inauguration SPMVV 11:30 AM 11:45 AM Tea Break 11:45 AM 1:00 PM Keynote Address Saaveri Seminar Hall 1:00 PM 2:00 PM Lunch Session 1 Saaveri Conference Plenary Speech Hall Coffee Break e-class Room, Dept. of 2:00 PM 5:00 PM Session 2 & Computer Science Paper Presentations CC, Dept. of Computer Session 3 Science Room # 2 Block Chain Workshop 1 Dept. of Computer Technologies Science 11:30 PM 5PM Room # 5 Workshop 2 Cloud Computing Dept. of Computer Science Date , Thursday Saaveri Conference 9.30 AM 1.00 PM Session 4 Session 5 Session 6 Plenary Speech Coffee Break & Paper Presentations 1.00 PM 2.00 PM Lunch 2.00 PM 5.00 PM AM 5.00 PM Session 7 Session 8 Session 9 Workshop 3 Workshop 4 Plenary Speech Coffee Break & Paper Presentations IoT Big Data Hall e-class Room, Dept. of Computer Science CC, Dept. of Computer Science Saaveri Conference Hall e-class Room, Dept. of Computer Science CC, Dept. of Computer Science Room # 2 Dept. of Computer Science Room # 5 Dept. of Computer Science Page xviii

5 On the Key Enabling Technologies for Smart Homes and Cities and Samples of Our Related Works Distinguished Keynote Speaker: 07 th Feb, 10:00 am Professor Mohammad S. Obaidat IEEE Fellow and SCS Fellow Inductee of SCS Hall of Fame-Life Achievement Award Past President, Society for Modeling & Simulation International (SCS) Past Advisor to the President of Philadelphia University Founding Editor-in-Chief, Security and Privacy Journal, Wiley Editor-in-Chief, International Journal of Communication Systems, Wiley Editor-in-Chief, Journal of Convergence Editor, IEEE Wireless Communications Editor, IEEE Systems Journal Distinguished Speaker of IEEE Computer Society ( ) Distinguished Lecturer of ACM (1995-Present) Distinguished Lecturer of SCS (2006-Present) msobaidat@gmail.com;m.sobaidat@ieee.org Page xi

6 ABSTRACT Digital and smart homes and cities have become an important research and development area in the 21st century due mainly to their significance to national and international health, economy, safety, transportation, and security, among others.ict Systems have played a vital role in the emergence and development of smart cities and homes. The impressive advances in areas of information and wired and wireless communications technology have brought with them the prospect of embedding different hierarchies of smartness and intelligence in the modern home and cities. Offering comfort and safe and healthy living with an intelligent form of collaboration with their residents has been the prime goal of smart and digital homes and cities. Contingentupon the settings, the communications may be multifaceted such as mobile agent based and context-aware services or they may be uncomplicated such as controlling the room temperature or its humidity level. Sophisticated situations include the delivery of position/location-aware info content of the resident of the digital home as well as his/her activities. The availability of inexpensive low-power sensors, the RF IC chips, and the embedded microprocessors/microcontrollers have made tremendous impact on digital homes and cities; with large quantity of sensors, which jointly manage and make the inferences from the collected data on the state of the home and city as well as the actions and behavior of the inhabitants. As the worldwide life expectancy, especially in developed countries and newly industrialized counties is increasing, the percentage of senior/elderly citizens is increasing at an accelerated pace and most projections suggest that this increase worldwide will reach about 10 millions in the coming decade. Senior citizens usually live in care centers, hospitals or their own homes with some relative supervision/care. Smart homes and cities can be used efficiently and economically in order to accommodate the needs of this population. The increase of worldwide population, especially in populous countries and cities and the increase migration of citizens to cities have also brought with it challenges in transportation systems, health care, utility s supplies, learning & education, sensing city dynamics, computing with heterogeneous data sources, managing urban big data, and environmental protection including pollution and others. In this keynote, we will shed some light on the key enabling Information and Communications technology to smart cities and homes. We will also investigate the advances, current trends, challenges and future in the research and development in smart homes and cities. Page xii

7 Some of our recent research results, especially the ones related to the use of wireless networks and security for smart and digital homes will be presented. Among these, fire detection schemes in forests. An intelligent system for fire prediction based on wireless sensor networks is presented. This system obtains the probability of fire and fire behavior in a particular area. This information allows firefighters to obtain escape paths and determine strategies to fight the fire. A firefighter can access this information with a portable device on every node of the network. Also, we will introduce an adaptive MAC protocol for distributed wireless LANs that is capable of operating efficiently under bursty traffic conditions. According to the proposed protocol, the mobile station that is granted permission to transmit is selected by means of a neural-based algorithm. Another new protocol for dynamically setting wireless LAN waveforms and transmission power levels based on the wireless channel s signal to noise ratio will be introduced. Our method, known as Signal-to- Noise Ratio-Waveform Power Adaptation (SNR-WPA), changes the power in discrete steps matched to each of the data rate-waveform steps. By matching the power to the spreading symbol rate, our technique maximizes the network throughput while minimizing MAC layer contention. We present other new schemes to authenticate and authorize wireless nodes within a network. This new layer of security relies on a neural network decision engine that restricts network access to mobile nodes whose physical location is within a threshold distance from the wireless access point or the controller of the network. Other related wireless research efforts by our group will be presented. Bio of Distinguished Keynote Speaker Professor Mohammad S. Obaidat(Fellow of IEEE and Fellow of SCS) is an internationally well-known academic/researcher/ scientist. He received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is a Professor of CIS at Fordham University, USA. Among his previous positions are Chair of the CIS Department at Fordham University and Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University, Dean of the College of Engineering at Prince Sultan University and Advisor to the President of Philadelphia University for Research, Development and Information Technology. He has received extensive research funding and has published over fiftyfive (55)books, over fifty five (55) book chapters, and over Seven hundreds and fifty(750) refereed technical articles in scholarly international Page xiii

8 journals and proceedings of international conferences, and currently working on three more books. Professor Obaidat has served as a consultant for several corporations and organizations worldwide. Mohammad is the Founding Editor-in-Chief of the Wiley Security and Privacy Journal. He is also the Editor-in-Chief of the Wiley International Journal of Communication Systems, the FTRA Journal of Convergence and the KSIP Journal of Information Processing. He is also an Editor of IEEE Wireless Communications. Between , he served as a Technical Editor and an Area Editor of Simulation: Transactions of the Society for Modeling and Simulations (SCS) International, TSCS. He also served on the Editorial Advisory Board of Simulation. He is now an editor of the IEEE Wireless Communications, IEEE Systems Journal, SCS Simulation: Transactions of SCS, Elsevier Computer Communications, Springer Supercomputing Journal, among others. He also serves on the editorial board and advisory board of many international journals. Obaidat has served as the steering committee chair, advisory Committee Chair and program chair of numerous international conferences. He is the founder of two well-known international conferences: The International Conference on Computer, Information and Telecommunication Systems (CITS) and the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). He is also the cofounder of the International Conference on Data Communication Networking, DCNET, and SIMULTECH. Between , Obaidat has served as distinguished speaker/visitor of IEEE Computer Society. Since 1995 he has been serving as an ACM distinguished Lecturer. He is also an SCS distinguished Lecturer. Between , Dr. Obaidat served as an IEEE/ACM program evaluator of the Computing Sciences Accreditation Board/Commission, CSAB/CSAC. Obaidat is the founder and first Chairman of SCS Technical Chapter (Committee) on PECTS (Performance Evaluation of Computer and Telecommunication Systems). He has served as the Scientific Advisor for the World Bank/UN Digital Inclusion Workshop- The Role of Information and Communication Technology in Development. Between , he has served as a member of the board of directors of the Society for Computer Simulation International. Between , he has served as Vice President of Conferences of the Society for Modeling and Simulation International SCS. Between , Prof. Obaidat has served as Vice President of Membership of the Society for Modeling and Simulation International SCS. Between , he has served as the Senior Vice President ofscs. Between , he served as the President of SCS. Four of his recent papers have received the Page xiv

9 best paper awards from IEEE AICCSA 2009, IEEE GLOBCOM 2009, IEEE DCNET 2011, and IEEE CITS 2013 International Conferences. Prof. Obaidat has been awarded a Nokia Research Fellowship and the distinguished Fulbright Scholar Award. He received the SCS Outstanding Service Award for his excellent leadership, services and technical contributions. Dr. Obaidat received very recently the Society for Modeling and Simulation Intentional (SCS) prestigious McLeod Founder's Award in recognition of his outstanding technical and professional contributions to modeling and simulation. He received in Dec 2010, the IEEE ComSoc- GLOBECOM 2010 Outstanding Leadership Award for his outstanding leadership of Communication Software Services and Multimedia Applications Symposium, CSSMA He received the Society for Modeling and Simulation International s (SCS) prestigious Presidential Service Award for his outstanding unique, long-term technical contributions and services to the profession and society.he was inductedto SCS Modeling and Simulation Hall of Fame Lifetime Achievement Award for his technical contribution to modeling and simulation and for his outstandingvisionaryleadershipanddedicationto increasingtheeffectivenessandbroadening theapplications of modeling and simulation worldwide. He has been invited to lecture and give keynote speeches worldwide. His research interests are: cyber security, wireless communications and networks, telecommunications and Networking systems, security of network, information and computer systems, security of e-based systems, performance evaluation of computer systems, algorithms and networks, green ICT, high performance and parallel computing/computers, applied neural networks and pattern recognition, adaptive learning and speech processing. During the 2004/2005, he was on sabbatical leave as Fulbright Distinguished Professor and Advisor to the President of Philadelphia University in Jordan, Dr. Adnan Badran. The latter became the Prime Minister of Jordan in April 2005 and served earlier as Deputy Director General of UNESCO. Prof. Obaidat is a Fellow of the Society for Modeling and Simulation International SCS, and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE). For more info; see: Page xv

10 Dr. Ezendu Ariwa Bedfordshire University, UK Keynote Speaker 8 th Feb, 10:00 am Green Technology and Consumer Electronics applications in Corporate Social Responsibility (CSR) Professor Ezendu Ariwa is a Chartered Fellow of British Computer Society (BCS) and Chair of IEEE Consumer Electronics & Broadcast Technology Chapter, UK and Ireland. He is an Academic Supervisor at the University of Warwick, UK and held various academic and professional positions with many years of experience in the United Kingdom and Internationally. He has achieved good collaboration with multicultural SMEs in the United Kingdom, with respect to mentoring and working on joint professional development on ICT enterprise programmes. He has experience of doctoral research supervision and consultancy as well as doctoral external examiner for various Universities both in the UK and internationally on Information Risk Management and applicable computing in Smart Cities and Healthcare. He has a good research profile and the Founding Editor-in-Chief of the International Journal of Green Computing (IJGC), Editor-in-Chief of the International Journal of Computing and Digital Systems (IJCDS), Journal of E-Technology, and the Associate Editor of the International Journal of E-Politics and the Associate Editor of International Journal of Distributed Systems and Technologies (IJDST) Ezendu is author of a number of books and papers published in international journals and conference proceedings. He has also delivered keynote speeches at various international conferences. He recently published a book on Green Technology Applications for Enterprise and Academic Innovation, Publisher: IGI Global, USA Page xvi

11 Session-1 SESSION PLAN Title: Data Science and Applications Venue: Saaveri Seminar Hall SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 27 A Novel Approach on Document Mining using Dirichlet Process Mixture Models and its Kernels Ratnam Dodda 28 Comparison of Single and Multi-Criteria Collaborative Recommendation Systems V. Lakshmi Chetana and K. Vinaya Sri 32 A new NoSQL Framework for effective interpretation in Web Usage Mining Meenatchi Thirumurugan, Thangaraj M., Gnanambal S. and Gayathri V. 34 A Framework for Sentiment Analysis based Recommender System for Agriculture using Deep Learning Approach Pradeepthi Nimirthi, P. Venkata Krishna and Mohammad Obaidat 35 A Methodology for Processing Opinion Mining on GST in India from Social Media Data Using Recursive Neural Networks and Maximum Entropy Techniques N.V. Muthu Lakshmi and T. Lakshmi Praveena 44 Agriculture soil classification and fertilizer recommendation using Adaboost and Bagging approaches G. T. Prasanna Kumari, M. Vijaya Santhi and Jasmine Sabeena 59 Big Data Modeling for Geo-Spatial Data Sai Jyothi Bolla and S. Jyothi 64 Feature based Fuzzy Inference System Design for Squids Classification K. Himabindu, S. Jyothi and D.M. Mamatha Page xix

12 66 A Study on Evaluations of BigData Processing Sai Sandhya Rani and P. Venkata Krishna 75 Adaboost with Feature Selection to Bring the Paths for Somatic Mutations Evaluation in Cancer Chokka Anuradha and K. Sandhya Rani 89 Dimensionality Reduction with Feature selection using Nature inspired algorithms Vaishali R. and Sasikala R. 94 Analysis and Prediction of Crime Rate against Women in West Bengal by Clustering Kamalakannan J., Satadru Datta and Anurag Chakrabortty 95 Weather Analysis Using Statistical Methods Kamalakannan J. and Mira S. 233 Hadoop Technology for BigData Analytics K. Urmila and K. Sandhya Rani 237 Investigating Recommender Systems in OSNs Jana Shafi, AmtulWaheed and P. Venkata Krishna 248 Operational-Log Analysis for Big Data Systems: Challenges and Solutions M. Praneetha and G. Prasad Babu 265 Research Challenges in Big Data solutions in different Applications Bhawna Dhupia and M. Usha Rani 273 Web Data Interchange Using Automatic Semantic Extraction K. Manasa and M. Lavanya Page xx

13 Title: Big Data Analytics and its Applications Session-2 CCODE 2018 Venue: e-cr, Dept. of Computer Science SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 30 Challenges with Hadoop Distributed Framework: An Overview Neelam Sobha Rani and N.V. Muthulakshmi 46 TBTAG+ A Topic-based Discussion Retrieval System for Twitter Content Gayathri V., Thangaraj M., Gnanambal S., Meenatchi Thirumurugan and Aruna Saraswathy P. 50 Optimal Algorithm for Inner & Outer Region Detection of Indian Pulse Seed Varieties for Feature Extraction and Classification Process Salome Hemachitra Hector and S. Suguna Sangaiah 53 A Survey on Contribution of Visual Analytics in Health Care Domain G. Sudha and S. Suguna 54 Optimal algorithms for Preprocessing of server side web logs using parallel computing and HBASE M.Vithya Gopalakrishnan and S. Suguna Thankaraj 73 Critical Analysis of Big Visual Analytics: A Survey Santhi Kuraganti and A. Rama Mohan Reddy 74 Web of Things and Big Data Analytics for Smart and Connected Communities Lokaiah Pullagura and Vinaya Babu 99 Scalable Pattern Mining using Hadoop T. Aditya Sai Srinivas, Manivannan S.S., Ramasubbareddy Somula, Bhuvaneshwari P. and Govinda K. 108 A Survey On Big-Data Analytics In The Health-Care Field Prof Rajasekhara Babu and Vivekananda Potti 109 Analytical Study Of Internet Routers Under Self-Similar Network Traffic With Voids D Mallikarjuna Reddy Doodipala, Thandu Vamshi Krishna and Basetty Mallikarjuna 210 Application of Evolutionary Algorithms in Bigdata to Optimize The Data B. Uma, R. Padmini and E. Ramesh Babu 234 Graph Analysis and Visualization of Social Network Big Data N. Mithili Devi and K. Sandhya Rani Page xxi

14 Title: Advanced Networking, Protocols, Standards & Applications Session-3 Venue: CC, Dept. of Computer Science SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 6 Feasibility Investigation on Cognitive Radio Network Systems: Hearsay Algorithm Adem. Sai Suneel and S. Shiyamala 16 Gossip Based Congestion Aware Routing Algorithm For Vehicular Adhoc Networks Eruvaram Bhanusri 17 Agent Based Hybrid Routing Protocol for Vehicular Ad Hoc Networks P.S. Nithyadharshini1, SanthiyaKumari and M. Pounambal 36 A Novel Approach For Transmission Expansion Planning For 133 Bus Tamilnadu Test System Using BFOA Prakash Samana and Joseph Henry 52 Performance Analysis of Energy Efficient Multicast Routing Protocols in MANET Radhika G. and Papanna N. 62 A Survey on Smart Transportation based on VANET: A Cyber Physical Systems approach Bommineni Kavitha and P.Venkata Krishna 70 A Comparisons of Reservation Based And Non-Reservation Based Routing in Dynamic Source Routing Environment Basetty Mallikarjuna and A. Nagaraju Yadav 78 Dynamic and Random Distribution Method for Route Construction in Vehicular Ad hoc Networks Abhilash M. and A. Rama Mohan Reddy 82 Relative Velocity based Mobility Aware Clustering Algorithm for Wireless Mesh Networks Mallikarjuna Rao Yamarthy, Makam Venkata Subramanyam and Kodati Satya Prasad Page xxii

15 83 QoS Enhanced Hierarchical Mobility Management in Wireless Mesh Networks Mallikarjuna Rao Yamarthy, Makam Venkata Subramanyam and Kodati Satya Prasad 97 High Speed Wireless Internet Using Li-Fi Kamalakannan J., Chinmay Agarwal and Medhavini Kulshrestha 103 Efficient Node Selection Mechanism in Wireless Sensor Networks using Fast Track Random Walk Model Vijaya Bhaskar K., Seshadri R. and A. Rama Mohana Reddy 228 Fusion of multiple techniques and filters for fast and efficient De-noising of Images with Mixed Noise P. Prathusha and S. Jyothi 230 Network Routing Protocols Analysis for Internet of Things & Adhoc Wireless Networks K. Jhansi Lakshmi Rani and N. Geethanjali 235 A Review on Bandwidth Utilization for Bursty Traffic in ATM Networks T. Anuradha and A. Renuka Devi 239 Power Control Approaches in Femtocell Networks Brahmi Ibtissem, Mohamamd S. Obaidat,, Mhiri Fadoua and Faozi Zarai 250 MAC Protocols in Wireless Sensor Networks Garikapati Prasad Babu and Palamakula Ramesh Babu 268 Power Management For Multi-Channel Mac Protocol In Adhoc Wireless Networks K. Jhansi Lakshmi Rani and N. Geethanjali 301 An Energy Efficient Approach for Distributed Channel Allocation with Reservation in Next Generation Cellular Networks Digavinti Sreenivasulu and P. Venkata Krishna 112 Sigfree : Providing Negligible Throughput Degradation To Normal Client Requests In Network Services Gitanjali J, B.Sharmil & Nareshkumar K Page xxiii

16 Session-4 Title: Security and Privacy Issues and Challenges CCODE 2018 Venue: Saaveri Seminar Hall SPMVV, Tirupati. Date & Time: , 9:30 AM 12:30 PM 37 Cryptanalysis of Secure Hash Password Technique (CSHPT) in Linux Harshavardhan Metla, Vinay Reddy Mallidi, Sai Kiran Chintalapudi and Madhu Viswanatham V. 56 Authenticated Users Reviews Based on Genuine Ratings for Apps Tejasree Samakoti 61 Security Analysis of Verifyable and Recoverable Encryption of A New Variant of RSA Signstures Anitha Cuddapah and Padmavathamma M. 65 Honey Maze Encryption (HOME) Usha Rani N., Noor Ahmad Shaik, Hari Kumar Reddy C. and Jaya Lakshmi P. 79 Extending Network Security by Multi Model Encryption Standards for Dynamic Networks using Fuzzy Logic Technique Shanmugam S., Vetrivel K. and Sasikumar Gurumurthy 91 Securing Internet of Things (IoT) Health Care Data using Blockchain Technology Divyanshu Bhati and M. Rajasekhara Babu 96 Security Verification in Web Browser Extensions Kamalakannan J. and Chinmay Agarwal 227 Efficient Pairing Free Certificateless Authentication Scheme with Batch Verification for VANETS N.B. Gayathri, P. Vasudeva Reddy and T. Gowri Page xxiv

17 232 Image Transformation Based Hybrid Graphical Password Authentication System P. Baby Maruthi and K. Sandhya Rani 240 Iris and Fingerprint Based Authentication Protocol for Impersonate Attacks in the Smart Health care C. Naga Swaroopa 242 Digital Evidences In Forensics Using Cryptography T. Anuradha and S. Saravana 249 Security in Wireless Body Area Network and Open Research Issues: A Review G. Prasanna, R.J. Ramasree and K. Ramesh Reddy 260 Test Packet Generation based on Firewall Policies K. Vijaya Bhaskar, R. Sheshadri and A. Rama Mohan Reddy 264 Possible attacks on SOHO Systems B.J. Annie Neeraja and Padmaja M. 275 The study of Block Chain Technology in Bit Coin E.N. Rambabu Page xxv

18 Title: Cloud Computing, Architectures and Applications Session-5 Venue: e-cr, Dept. of Computer Science SPMVV, Tirupati. Date &Time: , 9:30 AM 12:30 PM 11 Shortest Job First and Priority Based Hybrid Algorithm for Cloud Govinda K., Ramasubba Reddy Somula, Rajkumar R., Sreenivasulu Vajjala and Adithya Sai Srinivas S. 13 Fault Tolerant Framework for Web Applications using CloudFront Govinda K., Ramasubba Reddy Somula, Rajkumar R., Sreenivasulu Vajjala and Ramya S. 45 Intensified Task Scheduling Algorithm For Balancing Load In Cloud Computing Environment Barani R. and Suguna S. 63 Securing cloud data using laplace transform based encryption P. Namratha, Shoba Bindu Chigarapalle and Sri Lakshmi 67 Designing an Efficient auto Scaling Technique for Minimizing Response Time on Amazon AWS Cloud Load Balancing Kaushik Sekaran and Arvindhan M. 72 Mobile Healthcare Management System Utilizing Cloud Computing and Android Operating System Basetty Mallikarjuna and D. Arun Kumar Reddy 77 Heterogeneous Data Storage Management with Deduplication Aware in Cloud Computing Tulasi K. and Susmitha Karanam 84 Shortest Job First and Priority Based Hybrid Algorithm for Cloud Ramasubbareddy Somula and Swetha E. Page xxvi

19 86 Task Scheduling Using PSO and GA in Cloud Computing Ramasubbareddy Somula, Govinda K., Aditya Sai Srinivas Thuluva, Sasikala R. and Manivannan S.S. 98 A Study on Performance Analysis of Various Load Balancing Algorithms for Cloud Environment P.S. Latha Kalyampudi and P. Venkata Krishna 104 Performance Analysis of Cloud Computing Center With Queuing Model Anand Gnana Selvam S., Rita D. and Reni Sagayaraj M. 212 A New Bio-Inspired Optimization Algorithm for Dynamic Resource Allocation in Cloud Computing P. Neelima and A. Rama Mohan Reddy 214 Ensuring QOS Through Cloud Federation Gunakala Rekha 238 Classifying Content Quality and Interaction Quality on Online Social Networks Jana Shafi, Amtul Waheed and P. Venkata Krishna 266 An efficient approach for virtual machine placement in cloud computing environment Prasad Devarasetty and Ch. Satyananda Reddy 271 Identification of major security issues and suggested measures in Cloud Computing Y. Kiran Kumar and R. Mahammad Shafi 114 Trust Based Framework For Efficient Communication In Mobile Cloud Computing D. Shobha Rani and Pounambal M Page xxvii

20 Session-6 Title: Health and Bio Informatics Venue: CC, Dept. of Computer Science SPMVV, Tirupati. Date & Time: , 9:30 AM 12:30 PM 22 Rank Level Fusion Based on Multiple Iris Biometric Instances Sireesha Vedururu and K.Sandhya Rani 33 Role of Imaging Modality in Premature Detection of Bosom Irregularity Kavitha Modepalli and P. Venkata Krishna 39 An effective framework for Breast Cancer diagnosis using Weka knowledge flow environment Gnanambal S., Thangaraj M., Meenatchi Thirumurugan and Gayathri V. 43 Cellular and Molecular Signalling Mechanisms in Neuronal Injury and Neurodegeneration Maralla Swaroopa and Depuru Bharathi 47 Alzheimer s disease Diagnosis using Fuzzy Logic Approach R.M. Mallika, K. Usha Rani and K. Hemalatha 49 Identifying Protein Coding Regions using Computational Methods Subhashini U., Bhargavi P. and Jyothi S. 58 A Comprehensive Study on Software Engineering B. Manaswini and A. Rama Mohan Reddy 60 Insilico Anti-Inflammatory Activity of Dibutylphthalate Derived From Marine Streptomyces Carpaticus Uma Maheswari Devi Palempalli, Lavanya Latha Yerraguravagari and Vasavi Thirumalanadhuni 93 Enhancing the performance of Decision Tree using NSUM technique for Diabetes patients Nithya Settu and M. Rajasekhara Babu 202 Cellular And Molecular Signaling Mechanisms In Neuronal Injury And Neurodegeneration Swaroopa Maralla and D. Bharathi 205 Search for Novel β- Lactamase Inhibitors using Bioinformatics Tools Lakshmi Jayasri Akkiraju and V.V. Lakshmi Page xxviii

21 206 Structure-Based Virtual Screening For Drug Discovery: Tools and Applications V.V. Lakshmi 207 Diversity Analysis of Beta-Lactamase among Uropathogenic Enterobacteriaceae Y.V.S. Annapurna and V.V. Lakshmi 208 Investigating Molecular Relationships Among Clinically Prevalent Aminoglycoside Phosphotransferases K.Madhavi and V.V. Lakshmi 216 Image Processing Techniques for Anteversion Angle Detection (Avad) in Total Hip Replacement Surgery T. Sandhya and M. Usha Rani 219 Impact of e- health technology in India BurraVijitha 231 Big Data Analytics for Healthcare System S. Sandhya kumari and K. Sandhya Rani 262 Role of ICT on the conservation strategies for rain water harvesting B. Hemavathi, A. Shobha Rani and D. Bharathi 272 Recommender System to Classify Antenatal Records of Pregnant Women M. Lavanya and K. Manasa 304 Conserving Rare and Endangered medicinal plants through Net Working Data Base P. Lakshmi Padmavathi, A. Suvarna Latha, K.S. Shanhi Sree and D. Bharathi 309 Metric Based Quality Assessment Technique For Software Requirement Specification M.R Raja Ramesh, Dr. Ch.Satyananda Reddy Page xxix

22 Title: Systems, Architecture, Protocols and Models Session-7 Venue: Saaveri Seminar Hall SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 209 A Model for Prognosticating Effect of Defects During Software Estimation Using Rayleigh Function P. Srivyshnavi, B. Sony and A. Supriya 215 Enhancement of Security in cloud Maas and JUJU using Foxiproxy Naresh, M. Muni Babu and P. Venkata Krishna 218 CLOAK: A Flow Cipher Based Encryption Protocol for Mobile Cloud Computing K. Lavanya 223 Binary Particle Swarm Optimization for Solving NP Hardness in Software Architecture Sushama and A. Rama Mohan Reddy 224 A Survey on SDN Orchestration and NFV in Cloud Networking N. Chandana Priya and M. Usha Rani 226 Data Analytics on Chronic Kidney Disease Data N. Padmaja and T.Sudha 229 Cloud Storage Auditing by Utilizing Provable Data Possession Method P.Vijaya Kumari and V. Kavitha 247 Student Chat Box Android App for College Related Activity R. Yamuna and M. Usha Rani 255 A Review on Soil Data Analytics using Apache Spark Padmavathi Vanka and T. Sudha 257 Pervasive and Mobile Computing Characteristics and Challenges V. Sireesha and M. Usha Rani Page xxx

23 Session-8 CCODE 2018 Title: Machine Learning and Classification Methods Venue: e-cr, Dept. of Computer Science SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 15 Multiple Kernel Probabilistic Clustering with Crow Lion Neural Network for Missing Data Imputation and Classification Rajalingam Rajani and T. Sudha 51 a architectural approach for image mining using k means and c- means algorithm Saritha Dasari1, Dr.A.Rama Mohan Reddy, Dr.B.Eswara Reddy3 69 Fusion of multiple techniques and filters for fast and efficient Denoising of Images with Mixed Noise Prathusha Reddy and Jyothi S. 71 Enhancement of Railway and Metro Rail Reservation System Basetty Mallikarjuna and A. Nagaraju Yadav 87 Predicting Ozone Layer Concentration Using Machine Learning Techniques Rekha G., Ramasubbareddy Somula, Govinda K., Ellaji Ch and Jaya Sri P. 201 Comparative Study of different Statistical Distributions in generating Noise Components for Privacy Preserving Data Clustering T. Sudha and P. Nagendra Kumar 203 Heart Disease Prediction Using Multi-Constrain Support Vector Machine G. Krishna Veni and T. Sudha 217 Performance Analysis of Metric Multi Dimensional Scaling with Respect to Different Goodness-of-Fit Criteria in the Context Of Dimensionality Reduction T. Sudha and P. Nagendra Kumar 221 Deep Web Indexing and Ranking Search with Learning-Based Application Framework using Mobiles S. Suneetha and M. Usha Rani 225 Rack-based Privacy Preserving Algorithm uses cryptographic scheme for Workload Balancing In Hadoop MapReduce N. Padmaja and T.Sudha 236 Multidocument Textsummarization Using Deeplearning Algorithm With Fuzzylogic S. Sudha Lakshmi and M. Usha Rani Page xxxi

24 243 Ground Water Quality Data Analysis Using Classification Techniques S.V.S. Ganga Devi 244 Mining Association rules in Distributed Data mining K. Srilakshmi, M. Praneetha and D. Mukesh 245 Feature Based Summarization System for E-Commerce Based Products by Using Customers Reviews Penubaka Balaji, D. Haritha and O. Nagaraju 246 Efficient Tool for Diabetes Tracking through Layered Classification (Bigrams) Approach V. Vasudha Rani and K. Sandhya Rani 252 Falling the risk of consumerrelocation by using bigdata clustering algorithm P. Nirupama and E. Madhusudhana Reddy 253 Agriculture soil classification and fertilizer recommendation using Adaboost and Bagging approaches G.T. Prasanna kumari, M. Vijayasanthi and Jasmine Sabeena 254 Population Classification of Dietary Data Using Machine Learning Techniques and Big Data Jangam J. S. Mani and K. Sandhya Rani 256 An Extensive Survey on Various Deep Learning Applications Jabeen Sultana, M. Usha Rani and Mohammed Farquad 259 Decision Tree with Genetic algorithm for Health care a Data Mining approach C.S. Udaya and G. Bala Krishna Priya 261 Anomaly Detection Techniques G. Sandhya Madhuri and M. Usha Rani 263 TPS Classification in Data Mining A Review K. Sreelatha 267 A Multi-objective Pareto Optimization Algorithm For Feature Selection In Medical Datasets B. Sarojini and R. Bhuvaneshwari 302 Improving the Efficacy of Automotive Service With Recovery Analytics Kushanoor Akbar, K.K. Baseer and Kalaga Anil 311 Imine Index A General And Compact Structure Providing Tight Integration Of Item Set Extraction Gitanjali J, Kayal, Ponnarasi and J Indumathi Page xxxii

25 Session-9 Title: IoT and Applications Venue: CC, Dept. of Computer Science, SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 19 Internet of Things (IoT) & Big Data Analytics for Smart Cities-A Case Study Telugu Giribabu and Swathi Pothala 23 A Credibility Management for Assisted Health Care Using Context Aware Monitoring Sai Deva Dattu Kakumanu, Gitanjali J. and Sathiyamoorthy E. 25 Development of a Wireless Temperature Monitoring System Using Smartphone Harini Roddam and Rama Murthy B. 31 IoT (Internet of Things) & Big data Solutions for Farmers and Agriculture Industry to boost yields and reduce waste in farming Telugu Giribabu and G. Anjanbabu 40 IoT: A Study on Retailer s- Internet of Things Utilizing Today Vijaya Santhi and Jaya Chandra 41 IoT: A Survey on E-Pool Smart System for Swimming Pool Using Wireless Monitoring System Vijaya Santhi and Jaya Chandra 42 IOT: An Overview on Internet of Restorative Things Vijaya Santhi and Jaya Chandra 57 The Role Of Big Data Analytics, Cloud and Fog Computing In Internet Of Things Basetty Mallikarjuna, Chakradhar Pabba and Sridhar Reddy Gogu 85 IoT Based Waste Management for Smart City Usha Rani 92 Sensitivity enhancement of Micro Mass Optical MEMS Sensor for Bio- Medical IoT devices I. Mala Serene, M. Rajasekhara Babu and Zachariah C. Alex 100 Survey on Multilevel Association Rule Mining Nandhaluru Swathi and V. Saritha 101 A Novel Framework for Healthcare Monitoring System through Cyber Physical System Monisha K. and M. Rajasekhara Babu Page xxxiii

26 102 A Review on Crypto-Currency Transactions Using Iota (Technology) Kundan Dasgupta and M. Rajasekhara Babu 110 Iot Model To Improve Cognitive Skills Of Students Learning Experience Using Neuro Sensors Abhishek Padhi, M Rajasekhara Babu, Bhasker Jha and Shrutisha Joshi 111 Anomaly Based Technique For Detection And Prevention Of Black Hole Attacks In Rpl Based Networks Mr. Vikram Neerugatti and Prof. A. Rama Mohan Reddy 204 A Smart Cognitive Agricultural Robot T. Manjula and T. Sudha 211 Localized Mobile Agent Framework for data processing on Internet of Things J. Mahalakshmi and P. Venkata Krishna 213 Feedback based data forwarding approach for smart communication in IoT based Cloud D. Arun kumar Reddy and P. Venkata Krishna 220 Literature Survey on Real World Applications using IoT Dr. K. Sailaja and Ms. M. Rohitha 258 A Novel Implementation for Patient Monitoring in Rural Areas using IOT Technology M. Usha Rani and P. Divyaja 269 A Novel Approach for Road Symbol Detection using Sensors K. Suneetha, M. Sreekanth, K. Sankara and E. Hari 270 An Intelligent Traffic Signal Control System for Ambulance using IoT K. Suneetha, M. Sreekanth and E. Hari 274 A Survey on Secure Data Management and Transmission over IoT Devices E. Hari and H. Parveen Sultana 303 Analysis and Detection of Deforestation Using Novel Remote-Sensing Technologies with Satellite Images J. Suresh Babu and Prof. T. Sudha 310 A Malicious Node Detection Algorithm For 6lowpan Based Networks A Sreekanth Reddy, K.Venkatagurunatha Naidu, Pradeep G and K. Syama Sundar 113 Group And Hierarchical Key Management For Secure Communications In Iot Environments Aravind Karrothu and Jasmine Norman 115 A Study On Analyzing Massive Data In Iot Enabled Infrastructures Through Machine Learning Methods N.SAI Lohitha and Pounambal M Page xxxiv

27

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

AI: A UAE Perspective. Nawaf I. Almoosa Deputy Director - EBTIC March 7 th 2018

AI: A UAE Perspective. Nawaf I. Almoosa Deputy Director - EBTIC March 7 th 2018 AI: A UAE Perspective Nawaf I. Almoosa Deputy Director - EBTIC March 7 th 2018 2 EBTIC Overview 3 Our Model Research & Innovation Structure Partners and Target Sectors Sustainability Smart Air- Conditioning

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

Intelligent Operations Utilizing IT to Accelerate Social Innovation

Intelligent Operations Utilizing IT to Accelerate Social Innovation 324 Hitachi Review Vol. 63 (2014), No. 6 Featured Articles Operations Utilizing IT to Accelerate Social Innovation Toshiyuki Moritsu, Ph.D. Keiko Fukumoto Junji Noguchi, Ph.D. Takeshi Ishizaki Katsuya

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company)

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company) Intranet Mailing System Intrusion Detection System M-banking Mobi-Thesaurus Mobile Video Archive Mobile i Broker Android Projects Mobiminder: Location Based Reminder on Mobiles Mobi Travel Guide Friend

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

The 2018 (14th) International Conference on Data Science (ICDATA)

The 2018 (14th) International Conference on Data Science (ICDATA) CALL FOR PAPERS LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS Paper Submission Deadline: May 20, 2018 The 2018 (14th) International Conference on Data Science (ICDATA) (former International

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

Classification and Optimization using RF and Genetic Algorithm

Classification and Optimization using RF and Genetic Algorithm International Journal of Management, IT & Engineering Vol. 8 Issue 4, April 2018, ISSN: 2249-0558 Impact Factor: 7.119 Journal Homepage: Double-Blind Peer Reviewed Refereed Open Access International Journal

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Void main Technologies

Void main Technologies SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse

More information

M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008

M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008 M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008 Conference Details To be Held in Hyderabad, located in South-Central India, about 800KM North of Bangalore Hyderabad is about

More information

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,

More information

IT POLICY AND PROJECTS THAILAND

IT POLICY AND PROJECTS THAILAND IT POLICY AND PROJECTS THAILAND Mr. Kitti Sriboonyagorn Acting Director Digital Technology Infrastructure Bureau Ministry of Digital Economy and Society Thailand 4.0 is a model aims to eliminate the middle

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address

More information

IEEE Project Titles

IEEE Project Titles www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

DEPARTMENT OF COMPUTER SCIENCE

DEPARTMENT OF COMPUTER SCIENCE Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,

More information

IEEE Access Special Section Editorial. Yan, Zheng.

IEEE Access Special Section Editorial. Yan, Zheng. https://helda.helsinki.fi IEEE Access Special Section Editorial Yan, Zheng 2018 Yan, Z, Wang, H, Yang, L T & Niemi, V 2018, ' IEEE Access Special Section Editorial : Trust Management in Pervasive Social

More information

Many of these have already been announced via JIT weekly updates on the KB-L listserv, but are gathered here for a more complete look.

Many of these have already been announced via JIT weekly updates on the KB-L listserv, but are gathered here for a more complete look. WorldCat Knowledge Base Monthly Update March 2017 Many of these have already been announced via JIT weekly updates on the KB-L listserv, but are gathered here for a more complete look. New Collections

More information

Innovative M-Tech projects list

Innovative M-Tech projects list 1 Technologies: Innovative M-Tech projects list 1. ARM-7 TDMI - LPC-2148 2. Image Processing 3. MATLAB Embedded 4. GPRS Mobile internet 5. Touch screen. IEEE 2012-13 papers 6. Global Positioning System

More information

Information and Communication Technologies (ICT) thematic area

Information and Communication Technologies (ICT) thematic area Information and Communication Technologies (ICT) thematic area Network & Service Infrastructures 1.1 The Network of the Future (Call 4, Call 5) 2009-2010 a) Future Internet Architectures and Network Technologies

More information

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session

More information

Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.

Saint Petersburg Electrotechnical University LETI (ETU LETI) , Saint Petersburg, Russian FederationProfessoraPopova str. Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor

More information

ADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS

ADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 ADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS Radhakrishnan R 1, Karthik

More information

AYAN MONDAL ayan.mondal/

AYAN MONDAL ayan.mondal/ AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)

More information

EMBEDDED SYSTEMS 2017 IEEE PROJECT

EMBEDDED SYSTEMS 2017 IEEE PROJECT EMBEDDED SYSTEMS 2017 IEEE PROJECT 1. Smartphone Application to evaluate the individual possibilities for the Application of Electric Vehicles 2. Face recognition System for Smartphone based on LBP 3.

More information

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America 5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES Narsaiah Putta Assistant professor Department of CSE, VASAVI College of Engineering, Hyderabad, Telangana, India Abstract Abstract An Classification

More information

BMS COLLEGE OF ENGINEERING (Autonomous Institute, Affiliated under VTU)

BMS COLLEGE OF ENGINEERING (Autonomous Institute, Affiliated under VTU) BMS COLLEGE OF ENGINEERING (Autonomous Institute, Affiliated under VTU) TEQIP-II SPONSORED One Week Workshop Jointly organized by Department of Computer Science & Engineering and Information Science &

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Broadband for Digital Transformation

Broadband for Digital Transformation Broadband for Digital Transformation ITU Regional Workshop on Organizational and Technical Aspects of Broadband access Development Odessa-Ukraine, 27-28 September 2017 Turhan Muluk Government and Policy

More information

All Rights Reserved 2017 IJARCET

All Rights Reserved 2017 IJARCET END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,

More information

Tech Wings. News letter of the CSE Department, CIET. From the HOD s Desk VOLUME 4, ISSUE 1,JULY 2016-DECMBER. Inside Issue:

Tech Wings. News letter of the CSE Department, CIET. From the HOD s Desk VOLUME 4, ISSUE 1,JULY 2016-DECMBER. Inside Issue: Tech Wings VOLUME 4, ISSUE 1,JULY 2016-DECMBER 2016 2016 News letter of the CSE Department, CIET From the HOD s Desk Inside Issue: PEO s PO S Faculty Achievements Student Achievements Department Events

More information

Data Processing at Scale (CSE 511)

Data Processing at Scale (CSE 511) Data Processing at Scale (CSE 511) Note: Below outline is subject to modifications and updates. About this Course Database systems are used to provide convenient access to disk-resident data through efficient

More information

Semi-Structured Data Management (CSE 511)

Semi-Structured Data Management (CSE 511) Semi-Structured Data Management (CSE 511) Note: Below outline is subject to modifications and updates. About this Course Database systems are used to provide convenient access to disk-resident data through

More information

Technologies for Solutions for Society. September, 2014 NEC Corporation

Technologies for Solutions for Society. September, 2014 NEC Corporation Technologies for Solutions for Society September, 2014 NEC Corporation NEC s Focus: Solutions for Society Providing infrastructures for an abundant society for all people via ICT Social Value Innovations

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE

GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE George Anders is a president of Anders Consulting. Between 1975 and 2012 he has been employed by Ontario Hydro and its successor companies in Toronto, Canada.

More information

JEAS-Accredited Environmental Assessor Qualification Scheme

JEAS-Accredited Environmental Assessor Qualification Scheme JEAS-Accredited Environmental Assessor Qualification Scheme Osamu Kajitani, President Japan Association of Environment Assessment (JEAS) Abstract The Japan Association of Environment Assessment (JEAS)

More information

Keywords Hadoop, Map Reduce, K-Means, Data Analysis, Storage, Clusters.

Keywords Hadoop, Map Reduce, K-Means, Data Analysis, Storage, Clusters. Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

Accelerating Innovation and Collaboration for the Next Stage

Accelerating Innovation and Collaboration for the Next Stage Accelerating Innovation and Collaboration for the Next Stage November 8, 2013 Smart Life & Smart Work in the Next Stage - ICT as an Enabler Transportation Intelligent Transportation Systems, Quick Charging

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

Fall 2017 ECEN Special Topics in Data Mining and Analysis

Fall 2017 ECEN Special Topics in Data Mining and Analysis Fall 2017 ECEN 689-600 Special Topics in Data Mining and Analysis Nick Duffield Department of Electrical & Computer Engineering Teas A&M University Organization Organization Instructor: Nick Duffield,

More information

Security & Trust in Smart Cities. A Min Tjoa Vienna University of Technology & SBA Research

Security & Trust in Smart Cities. A Min Tjoa Vienna University of Technology & SBA Research Security & Trust in Smart Cities A Min Tjoa Vienna University of Technology & SBA Research Overview General Intro Smart City / Digital Trust Activities Quest for Specific Smart City Activities Quest for

More information

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations By Dr. Saeed Al Dhaheri @DDSaeed Chairman, We are the leading Smart Solutions Integrator. With our far sight and

More information

SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK

SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK Mohammad Alwadi 1 and Girija Chetty 2 1 Department of Information Sciences and Engineering, The University of Canberra, Canberra, Australia

More information

5G Journey: Path Forward

5G Journey: Path Forward 5G Journey: Path Forward Vida Ilderem, PhD Vice President, Intel Labs Director, Wireless Communication Research Acknowledgement: Schooler, Foerster, Srikanteswara, Himayat, Talwar WE ARE HERE: 5G Reactive,

More information

Networking Cyber-physical Applications in a Data-centric World

Networking Cyber-physical Applications in a Data-centric World Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday

More information

Green ICT Technologies for Smart Cities

Green ICT Technologies for Smart Cities Green ICT Technologies for Smart Cities Pr. Mohamed Cheriet, P.Eng, Ph.D Canada Research Chair on Sustainsble Smart Eco-Cloud École de technologie supérieure, Montréal, Québec Laboratory for Multimedia

More information

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017 mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015-2016 DOT NET IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 DOT NET Project Titles Domain Lang/Year 1 JPD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted

More information

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research: Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,

More information

Charting the Progress of Smart City Development in Shanghai

Charting the Progress of Smart City Development in Shanghai Charting the Progress of Smart City Development in Shanghai Xueguo Wen Executive Vice President of Shanghai Academy 2017 TM Forum 1 C ONTENTS Current situation Experience and outlook Strategic cooperation

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

D DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi

D DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi Journal of Energy and Power Engineering 10 (2016) 405-410 doi: 10.17265/1934-8975/2016.07.004 D DAVID PUBLISHING Shirin Abbasi Computer Department, Islamic Azad University-Tehran Center Branch, Tehran

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY

More information

Smart infrastructure for a smart sustainable city

Smart infrastructure for a smart sustainable city CSIC Emerging Connections Workshop, Cambridge, 23 June 2017 Smart infrastructure for a smart sustainable city Dr Navil Shetty Fellow and Technical Chair for Asset Management Atkins Context Smart Infrastructure

More information

ITU Kaleidoscope 2013 Building Sustainable Communities. Achieving Sustainable Communities with ICT: lessons from the Great East Japan Earthquake

ITU Kaleidoscope 2013 Building Sustainable Communities. Achieving Sustainable Communities with ICT: lessons from the Great East Japan Earthquake ITU Kaleidoscope 2013 Building Sustainable Communities Achieving Sustainable Communities with ICT: lessons from the Great East Japan Earthquake Hideyoshi TOMINAGA Professor emerritus of GITI Waseda University

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things

A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things - 2018 Embedded Systems IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE SYSTEM Project Titles Domain Year 1 JPE1701 A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things

More information

A Review on Privacy Preserving Data Mining Approaches

A Review on Privacy Preserving Data Mining Approaches A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana

More information

NEC Enterprise Overview

NEC Enterprise Overview NEC Enterprise Overview Huw Wilkins - NEC Enterprise Business Development NEC Enterprise Solutions EMEA March 2018 Agenda NEC Enterprise Portfolio Overview NEC Networking NEC VDI NEC High Availability

More information

COURSE OUTCOMES AND PROGRAM OUTCOMES

COURSE OUTCOMES AND PROGRAM OUTCOMES COURSE OUTCOMES AND PROGRAM OUTCOMES 3.1. Establish the correlation between the courses and the Program Outcomes (POs) and Program Specific Outcomes (PSOs) List of PSO s List of Program Outcomes PSO1 PSO2

More information

Machine Learning in WAN Research

Machine Learning in WAN Research Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network

More information

Route Optimization in MANET using FIGA

Route Optimization in MANET using FIGA Route Optimization in MANET using FIGA Vishal Gupta Electronics and Communication Department P.I.E.T College Smalkha (Panipat), INDIA Abstract: In MANET route optimization is the basic requirement to improve

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment Circuits and Systems, 2016, 7, 3246-3252 Published Online August 2016 in SciRes. http://www.scirp.org/journal/cs http://dx.doi.org/10.4236/cs.2016.710276 High-Performance Multipath Routing Algorithm Using

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

CSE 701: LARGE-SCALE GRAPH MINING. A. Erdem Sariyuce

CSE 701: LARGE-SCALE GRAPH MINING. A. Erdem Sariyuce CSE 701: LARGE-SCALE GRAPH MINING A. Erdem Sariyuce WHO AM I? My name is Erdem Office: 323 Davis Hall Office hours: Wednesday 2-4 pm Research on graph (network) mining & management Practical algorithms

More information

Proposed Cooperative ICT Projects. Mie Mie Thet Thwin. Rector University of Computer Studies, Yangon, Myanmar

Proposed Cooperative ICT Projects. Mie Mie Thet Thwin. Rector University of Computer Studies, Yangon, Myanmar Proposed Cooperative ICT Projects Mie Mie Thet Thwin Rector University of Computer Studies, Yangon, Myanmar Contents Cyber Security Projects Big Data Analytic Projects Research & Education Network Other

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Contents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1

Contents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 Preface xiii PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 1 Princi ples of Cloud Computing Systems 3 1.1 Elastic Cloud Systems for Scalable Computing 3 1.1.1 Enabling Technologies for Cloud Computing

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Hybrid Communication CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Contents Project Overview Hybrid Communication Concepts Services Enabled by Hybrid Communication

More information

TOOLS FOR INTEGRATING BIG DATA IN CLOUD COMPUTING: A STATE OF ART SURVEY

TOOLS FOR INTEGRATING BIG DATA IN CLOUD COMPUTING: A STATE OF ART SURVEY Journal of Analysis and Computation (JAC) (An International Peer Reviewed Journal), www.ijaconline.com, ISSN 0973-2861 International Conference on Emerging Trends in IOT & Machine Learning, 2018 TOOLS

More information

Building a Europe of Knowledge. Towards the Seventh Framework Programme

Building a Europe of Knowledge. Towards the Seventh Framework Programme Building a Europe of Knowledge Towards the Seventh Framework Programme 2007-2013 FP7 /1 EUROPEAN COMMISSION - Research DG - November 2005 EU research: the story so far 1952: ECSC treaty; first projects

More information

SMART. Investing in urban innovation

SMART. Investing in urban innovation SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.

More information

IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER

IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER N. Suresh Kumar, Dr. M. Thangamani 1 Assistant Professor, Sri Ramakrishna Engineering College, Coimbatore, India 2 Assistant

More information