Pub Date : 2019-05-12DOI: 10.22362/IJCERT/2019/V6/I04/V6I0402
Shashank Karn, S. Chaurasia, Kedar Davate, M. Nemade, Namrata Ansari
{"title":"RPA Based Digital Marketing Robot","authors":"Shashank Karn, S. Chaurasia, Kedar Davate, M. Nemade, Namrata Ansari","doi":"10.22362/IJCERT/2019/V6/I04/V6I0402","DOIUrl":"https://doi.org/10.22362/IJCERT/2019/V6/I04/V6I0402","url":null,"abstract":"","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122638415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-30DOI: 10.22362/IJCERT/2019/V6/I04/V6I0401
Ayushi Singh, Gulafsha Shujaat, Isha Singh, A. Tripathi, Divyang Thakur
Bitcoin is a popular cryptocurrency that records all transactions in an allotted append-handiest public ledger referred to as a blockchain. The security of Bitcoin heavily relies on the motivation-suitable proof-of-work (PoW) founded dispensed consensus protocol, which is run with the aid of the community nodes known as miners. Because of its inception, blockchain technological know-how has proven promising application possibilities. The spectrum of blockchain functions stages from financial, healthcare, automobile, hazard administration, internet of matters (IoT) to public and social offerings. Several reports focal point on utilizing the blockchain information structure in various applications. These vulnerabilities result in the execution of different security threats to the ordinary functionality of Bitcoin. We then examine the feasibility and robustness of the brand new safety solutions. Moreover, we discuss the current anonymity concerns in Bitcoin and the privatenessrelated threats to Bitcoin customers together with the evaluation of the comprehensive privacy-keeping solutions.
{"title":"A Survey of Blockchain Technology Security","authors":"Ayushi Singh, Gulafsha Shujaat, Isha Singh, A. Tripathi, Divyang Thakur","doi":"10.22362/IJCERT/2019/V6/I04/V6I0401","DOIUrl":"https://doi.org/10.22362/IJCERT/2019/V6/I04/V6I0401","url":null,"abstract":"Bitcoin is a popular cryptocurrency that records all transactions in an allotted append-handiest public ledger referred to as a blockchain. The security of Bitcoin heavily relies on the motivation-suitable proof-of-work (PoW) founded dispensed consensus protocol, which is run with the aid of the community nodes known as miners. Because of its inception, blockchain technological know-how has proven promising application possibilities. The spectrum of blockchain functions stages from financial, healthcare, automobile, hazard administration, internet of matters (IoT) to public and social offerings. Several reports focal point on utilizing the blockchain information structure in various applications. These vulnerabilities result in the execution of different security threats to the ordinary functionality of Bitcoin. We then examine the feasibility and robustness of the brand new safety solutions. Moreover, we discuss the current anonymity concerns in Bitcoin and the privatenessrelated threats to Bitcoin customers together with the evaluation of the comprehensive privacy-keeping solutions.","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123591938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.22362/IJCERT/2019/V6/I03/V6I0301
J. VijiPriya, S. Suppiah, R. Mohammad
{"title":"Wireless Ultrasonic Auto Navigation Robot for Agriculture","authors":"J. VijiPriya, S. Suppiah, R. Mohammad","doi":"10.22362/IJCERT/2019/V6/I03/V6I0301","DOIUrl":"https://doi.org/10.22362/IJCERT/2019/V6/I03/V6I0301","url":null,"abstract":"","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127506321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-17DOI: 10.22362/IJCERT/2019/V6/I02/V6I0202
Varun Jasuja, R. Singh
Background/Objectives: Cloud computing is a shared pool of configurable computer system resources and higher-level services. These services quickly configured over the Internet to achieve consistency and economies of scale. Methods/Statistical analysis: In this research, the DVFS (Dynamic Voltage and Frequency Scaling) mechanism is used to save energy in the cloud environment. In the existing work, MBFD has been used to check the resources in the physical machine. In case, if the resources are available, then the VM is placed over the PM. However, the problem is that the MBFD algorithm does not check the PM and hence result in higher energy consumption. Findings: In this paper, the MBFD algorithm is enhanced by using the concept of DVFS along with the concept of location-aware algorithm. Due to this algorithm, VM which is near to the server is executed first by measuring the distance. To measure the performance the parameters such as energy consumption and TCJ are measured. Improvements/Applications: The proposed framework reduced energy consumption and increased the total completed jobs.
背景/目标:云计算是可配置的计算机系统资源和高级服务的共享池。这些服务通过互联网快速配置,以实现一致性和规模经济。方法/统计分析:在本研究中,采用DVFS (Dynamic Voltage and Frequency Scaling)机制来实现云环境下的节能。在现有的工作中,已经使用MBFD检测物理机中的资源。在这种情况下,如果资源可用,则将VM放置在PM上。但是,问题是MBFD算法不检查PM,因此会导致更高的能耗。研究发现:本文利用DVFS的概念和位置感知算法的概念对MBFD算法进行了增强。由于该算法,通过测量距离,首先执行离服务器较近的VM。为了测量性能,测量了能耗和TCJ等参数。改进/应用:建议的框架减少了能源消耗,增加了完成的工作总数。
{"title":"Enhanced MBFD Algorithm to Minimize Energy Consumption in Cloud","authors":"Varun Jasuja, R. Singh","doi":"10.22362/IJCERT/2019/V6/I02/V6I0202","DOIUrl":"https://doi.org/10.22362/IJCERT/2019/V6/I02/V6I0202","url":null,"abstract":"Background/Objectives: Cloud computing is a shared pool of configurable computer system resources and higher-level services. These services quickly configured over the Internet to achieve consistency and economies of scale. Methods/Statistical analysis: In this research, the DVFS (Dynamic Voltage and Frequency Scaling) mechanism is used to save energy in the cloud environment. In the existing work, MBFD has been used to check the resources in the physical machine. In case, if the resources are available, then the VM is placed over the PM. However, the problem is that the MBFD algorithm does not check the PM and hence result in higher energy consumption. Findings: In this paper, the MBFD algorithm is enhanced by using the concept of DVFS along with the concept of location-aware algorithm. Due to this algorithm, VM which is near to the server is executed first by measuring the distance. To measure the performance the parameters such as energy consumption and TCJ are measured. Improvements/Applications: The proposed framework reduced energy consumption and increased the total completed jobs.","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126931764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-13DOI: 10.22362/IJCERT/2019/V6/I02/V6I0201
M. Guzman, Roosevelt Ecle
{"title":"The Social Studies Curriculum Standards in Junior Secondary Schools; Input to Quality Instruction and Students’ Civic Competence","authors":"M. Guzman, Roosevelt Ecle","doi":"10.22362/IJCERT/2019/V6/I02/V6I0201","DOIUrl":"https://doi.org/10.22362/IJCERT/2019/V6/I02/V6I0201","url":null,"abstract":"","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115886146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.22362/IJCERT/2019/V6/I03/V6I0302
A. Sivabalan, G. Bharathi, K. Rani
{"title":"Quad-Band Circularly Polarized Patch Antenna for UWB/5G Applications","authors":"A. Sivabalan, G. Bharathi, K. Rani","doi":"10.22362/IJCERT/2019/V6/I03/V6I0302","DOIUrl":"https://doi.org/10.22362/IJCERT/2019/V6/I03/V6I0302","url":null,"abstract":"","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-19DOI: 10.22362/ijcert/2019/v6/i01/v6i0102
Minakshi Ghorpade, Megharani Patil
{"title":"Product Review Summarization for E-Commerce Site Using Gibbs Sampling Based LDA","authors":"Minakshi Ghorpade, Megharani Patil","doi":"10.22362/ijcert/2019/v6/i01/v6i0102","DOIUrl":"https://doi.org/10.22362/ijcert/2019/v6/i01/v6i0102","url":null,"abstract":"","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-06DOI: 10.22362/IJCERT/2019/V6/I01/V6I0101
Poonam Jaglan, Rajeshwar Dass, M. Duhan
{"title":"Detection of Breast Cancer using MRI: A Pictorial Essay of the Image Processing Techniques","authors":"Poonam Jaglan, Rajeshwar Dass, M. Duhan","doi":"10.22362/IJCERT/2019/V6/I01/V6I0101","DOIUrl":"https://doi.org/10.22362/IJCERT/2019/V6/I01/V6I0101","url":null,"abstract":"","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-15DOI: 10.22362/ijcert/2018/v5/i12/v5i1205
S. Patil, U. Nuli
{"title":"A Review of Clustering and Clustering Quality Measurement","authors":"S. Patil, U. Nuli","doi":"10.22362/ijcert/2018/v5/i12/v5i1205","DOIUrl":"https://doi.org/10.22362/ijcert/2018/v5/i12/v5i1205","url":null,"abstract":"","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-10DOI: 10.22362/ijcert/2018/v5/i12/v5i1204
Namita M. Butale, D. V. Kodavade
{"title":"Survey Paper on Detection of Unhealthy Region of Plant Leaves Using Image Processing and Soft Computing Techniques","authors":"Namita M. Butale, D. V. Kodavade","doi":"10.22362/ijcert/2018/v5/i12/v5i1204","DOIUrl":"https://doi.org/10.22362/ijcert/2018/v5/i12/v5i1204","url":null,"abstract":"","PeriodicalId":408791,"journal":{"name":"International Journal of Computer Engineering in Research Trends","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132264641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}