IJSRET » Blog Archives

Author Archives: vikaspatanker

IJSRET Volume 4 Issue 1, January-2018


Chaotic Function Based Data Hiding Approach at Least Significant Bit Positions

Authors: Dilip Kumar Mishra, P.G.Scholar, Sriram Yadav, A.P. & Head

Abstract: With the increase in the digital media transfer and modification of image is very easy. So one major issue of proprietorship is raised, as copying and transferring is very soft practice. Here this paper has resolve proprietorship problem by embedding the digital data with encryption. In this work embedding of data is done by applying the Arnold’s Cat Map algorithm for randomization of pixel values. Then robustness is provided by using the AES algorithm. Finally  using spatial technique embedding of digital data is done in encrypted image. Embedding in LSB portion of the pixel this research work is robust against various attacks. Experiment is done on real data-set image. Evaluation parameter values shows that this research work has maintain the SNR, PSNR values with high robustness of the data.

A Survey on: Social Feature Based Service Rating Prediction Techniques

Authors: Madhu Rajput, P.G.Scholar, Amit Thakur, A.P.

Abstract: The Internet has made it possible to discover opinions of others on a wide range of subjects, through social media websites, such as review sites, wikis, and through online social networks. Some of website provide user rating for different product or services but they do not recommend any user to purchase. This paper focus on elaborating the user rating behavior of particular kind of services. Here techniques developed by various researchers are discussed with there requirements. In social network some inherent features are also detailed with the help of which prediction percentage may be increase.

A Survey on Different Features and Techniques for Web Service Prediction

Authors: Sonika Baisakhiya, P.G.Scholar, A.P. Jayshree Boaddh, Prof. Durgesh Wadbude.

Abstract: – Quality of Service (QoS) assurance is an important factor of service recommendation. The web services which are never been used before by users have some indefinite QoS values for that service, and hence the accurate prediction of indefinite QoS values is important for the successful consumption of Web service-dependent applications. Collaborative filtering is the technique which is broadly accepted in the prediction of indefinite QoS values as it is significant for predicting missing values. Though, collaborative filtering derived from the processing of subjective data. In this paper, we describe various collaborative filtering by QoS rating techniques applied to web service mining and addresses various collaborative filtering problems.

Internet of Things Based Smart Home Automation

Authors: Harshal S.Bhosale, Mrs. V. RPalundarkar, Priyesh S. Surve, Rahul B. Biswas

Abstract: – Home Automation is conveniences installed and designed to perform chore in your living place. Smart homes are often referred to as intelligent homes as they perform services that become part of our life. Many of the automated systems that silently perform their jobs unnoticed this is automation at its best. We live in an exciting time where more and more everyday items “things” are becoming smart! “Things” have sensors and can communicate to other “things” and can provide control to more “things”. The Internet of Things, IoT, is upon us in a huge way and people are rapidly inventing new gadgets that enhance our lives. The price of micro controllers with the ability to talk over a network keeps dropping and developers can now tinker and build things inexpensively. IoT based home automation can be achieved by using low cost ESP8266 ESPino ESP-12 WiFi Module, AVR Controller and Relay’s.

Review Article of Basic ADC Design and Issue of Old Algorithm

Authors: M. Tech. Madhusudan Singh Solanki, Associate Prof. Priyanshu Pandey

Abstract: –Analog to-digital converters (ADCs) are key design blocks and are at present embraced in numerous application fields to enhance computerized frameworks, which accomplish better exhibitions with regard the analog arrangements. With the quick progression of CMOS manufacture innovation, more signal processing capacities are actualized in the computerized space for a lower cost, bring down power utilization, higher yield, and higher re-configurability. Across the board use gives awesome significance to the design exercises, with these days to a great extent adds to the generation cost in coordinated circuit gadgets. This has as of late generated an extraordinary interest for low-control, low-voltage ADCs that can be acknowledged in a standard deep submicron CMOS innovation. Different cases of ADC applications can be found in information securing frameworks, estimation frameworks and digital correspondence frameworks likewise imaging, instrumentation frameworks. Subsequently, this work need to considered every one of the parameters and enhancing the related execution may fundamentally decrease the modern cost of an ADC producing process and enhanced the determination and configuration extraordinarily control utilization . This paper displays a 4 bit Pipeline ADC with low power dissipation executed in <0.18μm CMOS innovation with a power supply of 1.2V.

Published by:

Computer Science


Latest Research Topic for computer science are:


Data Mining include analysis of large amount of unorganized data in form of text files, image, tabular data, etc. Here further classification of this is done by working in specific area of research such as

  • Web Mining:

    Here website related information like page content optimization can be done by using its features of web log, web content, web structure.

    Web Page Prediction: This comes under web mining where web log is use for understanding the user behavior on the website, in this step page content was also used. Some algorithm like Ant colony,  markov modal, etc are use for the same.

    Web Page Ranking: In this work website various pages are analyzed for ranking the pages of the site by using methods of google rank, linear rank, page rank etc.

  • Text Mining:

    Here documents are either arrange, summarized, fetch, etc by using pattern or Term feature.

    Content Retrieval / Document Retrieval / Information Retrieval: In this work text files are either arrange in specific order OR fetch list of files based on the query of user.

  • Temporal Mining:

    Here analysis done on the basis of time stamp where various information are summarized as per there happening and there causes.

    Event Activity Happening: In this work events are proposed with there probability where chance of data going was done.

    Nature Prediction: Large amount of information gather from the satellite images for predicting the glacier movements, galaxy analysis.

Published by:

IJSRET Volume 3 Issue 6, November-2017

Archive Volume 3 Issue 6

An Approach for Trusted Computing of Load Balancing in Cloud Environment

Authors: Manoj Kumar Selkare, Vimal Shukla

Abstract: Cloud computing is a novel approach in order to use the resource of computing where these resources may be hardware or software. This facility is delivered as a service in the communication network. This facility known as cloud, which occurred from the use of a service as a cloud, which is an abstraction for the complex infrastructure system containing diagrams. Services of cloud computing involve trusted remote user data, and computer software. This paper proposed to an approach to efficient load balancing in cloud computing

Low Power Three Input XOR Gate For Arithmetic And Logical Operation

Authors:Ms. Pooja Sahu, Mr. Ashish Raghuwanshi

Abstract: With advancement of microelectronics technology scaling, the main objective of design i.e. low power consumption can be easily acquired. For any digital logic design the power consumption depends on; Supply voltage, number of transistors incorporated in circuit and scaling ratios of the same. As CMOS technology supports inversion logic designs; NAND & NOR structures are useful for converting any logic equation into physical level design that comprises of PMOS and NMOS transistors. In similar way, logic can be implemented in other styles as well, with the difference in number of transistors required. The conventional CMOS design for three input XOR logic can be possible with 10 or more than 10 transistors, with the methodology discussed in this paper, the same design for three inputs XOR logic can be made possible with 16 transistors. The proposed methodology consists of transmission gate and systematic cell design methodology (SCDM). This design consumes 45% (35%) less power dissipation than that of conventional LPHS-FA and SCDM based XO10 XOR logic design with CMOS technology. Since the design for XOR logic, is useful for variety of applications such as Data encryption, Arithmetic circuits, Binary to Gray encoding etc. the XOR logic has been selected for design. The design explained in this paper is simulated with 130nm technology.

Low Read Power Delay Product Based Differential Eight Transistor SRAM cell
Authors: Ms. Jaya Sahu,Mr. Ashish Raghuwanshi

Abstract: SRAM is designed to provide an temporary storage for Central Processing Unit and replace Dynamic systems that require very low power consumption. Low power SRAM design is critical aspect since it takes a large fraction of total power and die area in high performance processors. This paper include the work on eight transistor SRAM cell that of smaller read power delay product due to cascading of pull offers 28% (74%) smaller read ‘0’ (‘1’) than exiting 7T. The SRAM cell read and cycle is characterized at 45nm technology using SPICE EDA tool.

A Robust Classification Algorithm for Multiple Type of Dataset

Authors:M.Tech. Scholar Afshan Idrees, Prof. Avinash Sharma

Abstract: With the increase in different internet services number of users are also increasing. Although while taking service user may be on risk for sharing data. So this work focus on increasing the security of the user data while taking classification service. Here algorithm provide robustness by encrypting the data and send to server, while server classify the data in encrypted form. One more security issue is that instead of transferring whole encrypted data, features are extract from the data first then encrypt and send to server for classification. Here proposed work successfully classify all type of user data in form of text, image, numeric.

An Unsupervised TLBO Based Drought Prediction By Utilizing Various Features

Authors:M.Tech. Scholar Shikha Ranjan Patel, Prof. Priyanka Verma

Abstract: Agricultural vulnerability is generally referred to as the degree to which agricultural systems are likely to experience harm due to a stress. In this work, an existing analytical method to quantify vulnerability was adopted to assess the magnitude as well as the spatial pattern of agricultural vulnerability to varying drought conditions. Based on the standardized precipitation index (SPI) was used as a measure of drought severity. A number of features including normalized difference vegetation index (NDVI), vegetation condition index (VCI), and SPI will be use for classification. Here proposed modal use Teacher Learning Based Optimization genetic approach for classify the different location present in geospatial dataset. By use of  this TLBO approach prior knowledge is not required. Experiment results shows that proposed work is better as compare to previous work.

Published by:

IJSRET Volume 3 Issue 5, September-2017

Volume 3 Issue 5

MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

Secret Sharing Schemes over MANET to Avoid Cheater Participation [102-109]

Author: Nisha Bharti, Hansa Acharya
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research



Web URL Classification and Malicious Activities: A Review [110-115]

Author: Anshika Bansal
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research



Malicious Web URL Classification using Evolutionary Algorithm [116-199]

Author: Anshika Bansal
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research



Attack over Email System: Review [200-206]

Author: Anuradha Kumari, Nitin Agrawal, Umesh Lilhore
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research



Encryption Scheme for Mobile Ad Hoc Networks: A Survey [207-209]

Author: Neha Dwivedi, Dr. Rajesh Shukla
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research



Evolutionary Algorithm Based Optimized Encryption Scheme for Mobile Ad-Hoc Network [210-216]

Author: Neha Dwivedi, Dr. Rajesh Shukla
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research
Published by: