81818app手机版下载

Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

793 Full-Text Articles 1,293 Authors 337,719 Downloads 99 Institutions

All Articles in Computational Engineering

Faceted Search

793 full-text articles. Page 1 of 37.

Preemptive Priority Scheduling With Aging Technique For Effective Disaster Management In Cloud, MAHITHA. O, SUMA. V 2020 Computer Science and Engineering, Department of Information Science and Engineering, Dayananda Sagar College of Engineering, Bangalore, India

Preemptive Priority Scheduling With Aging Technique For Effective Disaster Management In Cloud, Mahitha. O, Suma. V

Graduate Research in Engineering and Technology (GRET)

Cloud computing has intern the attention of today’s leading IT industries offering huge potential for more flexible, readily scalable and cost effective IT operation. There is a significant anticipation for emergent innovation and expanded capabilities of a cloud-based environment as the cloud services are still in the infant stage. With all technology innovation, the biggest gain will be realized when the Cloud services are efficiently utilized. One of the prime contributions of Cloud is its capacity to handle a huge amount of data for either processing or storing. The inadequacy of this model is that it is prone to ...


User Interface Design For Management Of The Network Elements Using Dojo, SUDHARANI T. K, SHANTHAKUMAR A. H 2020 Dept of CSE, SIT, Tumkur

User Interface Design For Management Of The Network Elements Using Dojo, Sudharani T. K, Shanthakumar A. H

Graduate Research in Engineering and Technology (GRET)

This paper focuses on the design of the user interface for managing network elements using dojo. Dojo is an open source java script toolkit which is used for constructing dynamic web user interfaces. Here we are designing the user interface for the management of the network elements in a optical management system .User can see the tree list of all the network elements and network element hierarchy and will be able to access on any network element and view the details and status of it and perform provisioning operations on it. It also provides various user forms and tabular representation ...


Evaluating Performance Of Hybrid Networks By Using Latency And Pdv, ANUSHRI DIXIT, JINAL KOTHARI, Mr. ASHWINIKSHIRSAGAR, PROF. RAJESH KOLTE 2020 Department of Information Technology, UMIT, S.N.D.T University, Mumbai, India

Evaluating Performance Of Hybrid Networks By Using Latency And Pdv, Anushri Dixit, Jinal Kothari, Mr. Ashwinikshirsagar, Prof. Rajesh Kolte

Graduate Research in Engineering and Technology (GRET)

Hybrid networks are widely used in networking sector. They combine the finest features of both Wired and Wireless networks to give optimum results. Using different types of routing protocols, the capabilities of a hybrid network will be demonstrated using certain performance metrics. In this paper, we will be simulating real-time scenarios of three networks of different sizes. Each of these networks will be implemented with single routing protocol i.e. Enhanced Interior Gateway Routing Protocol (EIGRP). The networks will be simulated using Cisco Packet Tracer simulation tool. Furthermore, we have evaluated the performance of the networks by considering performance metrics ...


An Efficient Method To Feed High Resolution Images To Facial Analysis Systems, ROOPA R, MRS. VANI.K .S 2020 CSE, Acharya Institute of Technology, Banglore. 81818app手机版下载

An Efficient Method To Feed High Resolution Images To Facial Analysis Systems, Roopa R, Mrs. Vani.K .S

Graduate Research in Engineering and Technology (GRET)

Image Processing is any form of signal processing for which the image is an input such as a photograph or video frame. The output of image processing may be either an image or a set of characteristics or parameters related to the image. In many facial analysis systems like Face Recognition face is used as an important biometric. Facial analysis systems need High Resolution images for their processing. The video obtained from inexpensive surveillance cameras are of poor quality. Processing of poor quality images leads to unexpected results. To detect face images from a video captured by inexpensive surveillance cameras ...


Encoding Personal Information On Data Sharing In Cloud Using Base64 Algorithm, P.L. RINI, Y. GOLD ANAND.N 2020 Dept of CSE, M.N.M.Jain Engineering College

Encoding Personal Information On Data Sharing In Cloud Using Base64 Algorithm, P.L. Rini, Y. Gold Anand.N

Graduate Research in Engineering and Technology (GRET)

A major feature of cloud services is that user data are processed remotely among machines. But user fears of losing control of their own data, particularly financial and health data can becomes a significant barrier to wide adoption of cloud services in order to avoid this problem we provide a novel approach, namely Cloud Information Accountability (CIA) for clients. So that the authorized client can only access the data in the cloud. Data owner store data in the format of JAR format thus client access data only by the permission of data owner. To strengthen user’s control also provide ...


Automated Sentiment Analysis An Automated Analysis Of News Feeds, KARTHIK BALASUBRAMANIAN, APARAJITH CHANDRAN 2020 Department of Information Technology, SRM University, Kattangulathur, Chennai - 603203 81818app手机版下载

Automated Sentiment Analysis An Automated Analysis Of News Feeds, Karthik Balasubramanian, Aparajith Chandran

Graduate Research in Engineering and Technology (GRET)

81818app手机版下载This Paper explains the importance of Sentiment Analysis in today's business. Information which is hidden as unstructured data in the Internet can be utilized more efficiently. In this paper we quote an approach which explains the experiment for collection of news data and analyzing the sentiments for those data. The results provide almost accurate analysis outcomes with a few discrepancies. These are also explained and research is in progress towards making an efficient system.


An Energy Efficient Deactivation Technique For Reactive Jammers In Wireless Sensor Networks, SUPREETHA PATEL T P, K. N. SHREENATH 2020 Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka, India.

An Energy Efficient Deactivation Technique For Reactive Jammers In Wireless Sensor Networks, Supreetha Patel T P, K. N. Shreenath

Graduate Research in Engineering and Technology (GRET)

In recent days, reactive jamming attack has emerged as a great security threat to wireless sensor network [WSN]. Several strategies are developed to identify the trigger nodes, whose legitimate transmission activates any reactive jammer. After identifying the trigger node, the node will be shut down to deactivate the jammer and its routing information is deleted from the routing table, then the node can’t be used again in the network. Since the node can’t be used again in the network it is one of the major drawbacks. Hence to overcome the problem, In this paper we propose a novel ...


Securing Multihop Network By Detecting And Locating Pollution Attacks Using Spacemac., ANUPAMA. T. .A, R APARNA Dr. 2020 Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka, India.

Securing Multihop Network By Detecting And Locating Pollution Attacks Using Spacemac., Anupama. T. .A, R Aparna Dr.

Graduate Research in Engineering and Technology (GRET)

It has been widely observed that providing security is one of the challenging task in Wireless sensor network(WSN). Program images need to be updated continuously as network programming happens in WSN. Many Networking protocols provide an efficient way to update these program images running on sensor nodes. One of the cryptographically strong protocol called DELUGE exists to address this challenge, but it involves high computational cost such as power consumption and communication costs. So Multiple one way key chain is proposed to secure a multihop network programming protocol which is lower in power consumption and communication costs. Even though ...


Impertinent Trilateration: Secure Localization Of Wireless Sensor Network Using Greedy Technique, M. B. NIRMALA, Mr. NAYANA, A.S MANJUNATH 2020 Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka, India

Impertinent Trilateration: Secure Localization Of Wireless Sensor Network Using Greedy Technique, M. B. Nirmala, Mr. Nayana, A.S Manjunath

Graduate Research in Engineering and Technology (GRET)

Wireless sensor network localization is an important area that attracts significant research interest. Current localization algorithms mainly focus to localize as many nodes as possible for a given static set of anchor nodes and distance measurement. In this paper, we discuss a new technique that aims to localize all the sensor nodes in the network using trilateration with greedy technique, and a security protocol is used for providing confidentiality and authentication between anchor nodes and sensor nodes.


Using Different Searching Schemas For Fuzzy Keyword Search Over Cloud Data, SYEDA FARHA SHAZMEEN, RANGARAJU DEEPIKA 2020 Department of Information Technology, Balaji Institute of Technology and Science, Warangal, A.P, India, 506331.

Using Different Searching Schemas For Fuzzy Keyword Search Over Cloud Data, Syeda Farha Shazmeen, Rangaraju Deepika

Graduate Research in Engineering and Technology (GRET)

Cloud Computing is a construct that allows you to access applications that actually reside at a location other than our computer or other internet-connected devices, Cloud computing uses internet and central remote servers to maintain data and applications, the data is stored in off-premises and accessing this data through keyword search. So there comes the importance of encrypted cloud data search Traditional keyword search was based on plaintext keyword search, but for protecting data privacy the sensitive data should be encrypted before outsourcing. Fuzzy keyword search greatly enhances system usability by returning the matching files; Fuzzy technique uses approximate full ...


Secure Dependable Selective Storage Services And Support For Dynamic Data Operations In Cloud Computing, VINITHA S. P, GURUPRASAD E 2020 Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka, India. 81818app手机版下载

Secure Dependable Selective Storage Services And Support For Dynamic Data Operations In Cloud Computing, Vinitha S. P, Guruprasad E

Graduate Research in Engineering and Technology (GRET)

Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard ...


A Novel Algorithm Based On Cascading Of Neural Network Models And Wavelet Transform For Image Enhancement., SHOBHIT VERMA, HITESH GUPTA 2020 Department of Computer Science & Engineering, PCST, Bhopal, India

A Novel Algorithm Based On Cascading Of Neural Network Models And Wavelet Transform For Image Enhancement., Shobhit Verma, Hitesh Gupta

Graduate Research in Engineering and Technology (GRET)

Image enhancement and restoration is pre-request of computer vision. The distortion and degradation of image suffered the process of pattern matching and quality of image. Wavelet is very important transform function play a role in image enhancement and image de-noising. The concept of wavelet used as soft thresholding and hard thresholding. A processing of data through wavelet is very efficient in process of neural network. In this paper we discuss the proposed algorithm for image enhancement based on self organized map network and wavelet transform. Basically self organized map network is unsupervised training mechanisms of pattern, due to this reason ...


Mobile Data Collector For Secure Time Synchronization In Clustered Wireless Sensor Network, RAMYA M DR., A.S. POORNIMA 2020 Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka, India.

Mobile Data Collector For Secure Time Synchronization In Clustered Wireless Sensor Network, Ramya M Dr., A.S. Poornima

Graduate Research in Engineering and Technology (GRET)

81818app手机版下载Secure time synchronization is a key requirement for many sophisticated application running on these networks. Most of the existing secure time synchronization protocols incur high communication and storage costs and are subject to a few known security attacks. In wireless sensor network (WSN), lifetime of the network is determined by the amount of energy consumption by the nodes. To improve the lifetime of the network, nodes are organized into clusters, in which the cluster head (CH) collects and aggregates the data. A special node called mobile data collector (MDC) is used to collect the data from the CH and transfer ...


Maximizing The Lifetime And Security Of Wireless Sensor Networks, SARANYA. S, GOWRI. V 2020 Department of Computer Science and Engineering, G.K.M College of Engineering and Technology, Anna University, Chennai, TamilNadu, India 81818app手机版下载

Maximizing The Lifetime And Security Of Wireless Sensor Networks, Saranya. S, Gowri. V

Graduate Research in Engineering and Technology (GRET)

81818app手机版下载Recent technological advances have facilitated the widespread use of wireless sensor networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In wireless sensor networks, sensor nodes are typically power-constrained with limited lifetime, and so it’s necessary to understand however long the network sustains its networking operations. We can enhance the quality of monitoring in wireless sensor networks by increasing the WSNs lifetime. At the same time WSNs are deployed for monitoring in a range of critical domains such as military, healthcare etc. Accordingly, these WSNs are vulnerable to attacks. Now this proposed ...


An Efficient Approach Using Rule Induction And Association Rule Mining Algorithms In Data Mining, KAPIL SHARMA, SHEVETA VASHISHT 2020 Computer Science & Engineering, Lovely Professional University, Punjab, India 81818app手机版下载

An Efficient Approach Using Rule Induction And Association Rule Mining Algorithms In Data Mining, Kapil Sharma, Sheveta Vashisht

Graduate Research in Engineering and Technology (GRET)

In this research work we use rule induction in data mining to obtain the accurate results with fast processing time. We using decision list induction algorithm to make order and unordered list of rules to coverage of maximum data from the data set. Using induction rule via association rule mining we can generate number of rules for training dataset to achieve accurate result with less error rate. We also use induction rule algorithms like confidence static and Shannon entropy to obtain the high rate of accurate results from the large dataset. This can also improves the traditional algorithms with good ...


An Efficient Fault Tolerant System Using Improved Clustering In Wireless Sensor Networks, VENKATESH S 2020 Student Member, IEEE-Computer Society

An Efficient Fault Tolerant System Using Improved Clustering In Wireless Sensor Networks, Venkatesh S

Graduate Research in Engineering and Technology (GRET)

In Wireless Sensor Networks (WSNs), Efficient clustering is key for optimal use of available nodes. Fault tolerance to any failure on the network or node level is an essential requirement in this context. Hence, a novel approach towards clustering and multiple object tracking in WSNs is being explored. The Proposed method employs judicious mix of burdening all available nodes including GH (Group Head) to earn energy efficiency and fault tolerance. Initially, node with the maximum residual energy in a cluster becomes group head and node with the second maximum residual energy becomes altruist node, but not mandatory. Later on, selection ...


Achieving Availability And Data Integrity Proof In Hierarchical Attribute Encryption Scheme Using Hybrid Cloud, PALLAVI R, R APARNA 2020 Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka, India. 81818app手机版下载

Achieving Availability And Data Integrity Proof In Hierarchical Attribute Encryption Scheme Using Hybrid Cloud, Pallavi R, R Aparna

Graduate Research in Engineering and Technology (GRET)

81818app手机版下载It has been widely observed that the concept of cloud computing has become one of the major theory in the world of IT industry. Data owner decides to release their burden of storing and maintaining the data locally by storing it over the cloud. Cloud storage moves the owner’s data to large data centers which are remotely located on which data owner does not have any control. However, this unique feature of the cloud poses many new security challenges. One of the important concerns that need to be addressed is access control and integrity of outsourced data in cloud ...


Implementation Of Model Predictive Control And Auto Tuning Based Pid For Effective Temperature Control In Cstr, CHENIMINENI KISHORE, T. VANDHANA, SHEEREEN HUSSAIN, S. SRINIVASULU RAJU 2020 Electronics and Control Engineering, Sree Vidyanikethan Engineering College, Tirupathi, India 81818app手机版下载

Implementation Of Model Predictive Control And Auto Tuning Based Pid For Effective Temperature Control In Cstr, Chenimineni Kishore, T. Vandhana, Sheereen Hussain, S. Srinivasulu Raju

Graduate Research in Engineering and Technology (GRET)

Continuous Stirrer Tank Reactor (CSTR) is an important topic in process control and offering a diverse range of researches in the area of chemical and control engineering. A simulation on mathematical model has several advantages over the experiment on a real model or system, which is used for steady state analysis and dynamic state analysis. The main objective is to control the temperature of CSTR in the presence of disturbance. Various control approaches have been applied on CSTR to control its parameters through PID control and MODEL PREDICTIVE CONTROL (MPC). Model design and simulation are done in MATLAB SIMULINK


Leaking Agent Detection And Email Filtering, GIRISH SHANKAR, SOMESHWAR DHAYALAN, ASHISH ANAND 2020 Computer Engineering, Sinhgad Institute OF Technology & Science, Pune,Maharashtra,PIN :411041

Leaking Agent Detection And Email Filtering, Girish Shankar, Someshwar Dhayalan, Ashish Anand

Graduate Research in Engineering and Technology (GRET)

Leaking of confidential data to an unauthorized agent is a major concern for an organization. In this article we seek to detect the trusted node that leaks the confidential data to an unauthorized agent. Traditionally, leakage of data is handled by water marking technique which requires data modification. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. But one of the issues with watermarking method is data modification. To overcome the disadvantages of using watermark, data allocation strategies are used to improve the probability of identifying guilty third parties. The idea is to ...


Android Based Security And Remote Surveilance System, SENTHIL KUMAR.M, PADMAVATHY. N 2020 Department of Electrical and Electronics Engineering, G.K.M College of Engineering and Technology, Anna University, Chennai, India

Android Based Security And Remote Surveilance System, Senthil Kumar.M, Padmavathy. N

Graduate Research in Engineering and Technology (GRET)

81818app手机版下载Mobile phones have been important Electronic devices in our life. Consequently, Home automation and security system becomes one of the prominent futures on mobile devices. In this paper, we have developed the android application that interfaces with the security system using wifi direct technology. The wifi technology is relatively new as compared to other technologies and there is huge potential of its growth and practical application. The android application loaded on mobile devices, can connect with security system and easy to use GUI. The application developed to command lock, unlock or video monitoring of the home. The security system then ...