https://stmjournals.com/index.php?journal=CTIT&page=issue&op=feedCurrent Trends in Information Technology2017-09-27T00:20:21+00:00Editor in ChiefCTiIT@stmjournals.comOpen Journal Systems<p style="margin: 0px; padding: 5px; text-align: justify; color: #333333; font-size: 11.818181991577148px; line-height: 20px;">Current Trends in Information Technology (CTIT) is an international e Journal focused towards the rapid publication of fundamental research papers on all areas of Information technology. It publishes contributions in the shape of research papers, critical reviews and opinions on the organizational, social and management issues that are related to the significant information-oriented technologies.</p><p style="margin: 0px; padding: 5px; text-align: justify; color: #333333; font-size: 11.818181991577148px; line-height: 20px;"><strong style="margin: 0px; padding: 0px;">Focus and Scope Covers</strong></p><ul style="margin: 0px; padding: 0px; color: #333333; font-size: 11.818181991577148px; line-height: 20px;"><li style="margin: 0px 0px 0px 20px; padding: 0px;">Computer Networks</li><li style="margin: 0px 0px 0px 20px; padding: 0px;">Information Databases</li><li style="margin: 0px 0px 0px 20px; padding: 0px;">Data Management</li><li style="margin: 0px 0px 0px 20px; padding: 0px;">Networking</li><li style="margin: 0px 0px 0px 20px; padding: 0px;">Programming Languages</li><li style="margin: 0px 0px 0px 20px; padding: 0px;">Technology Developments</li><li style="margin: 0px 0px 0px 20px; padding: 0px;">Intelligent organisation</li></ul><p style="margin: 0px; padding: 5px; text-align: justify; color: #333333; font-size: 11.818181991577148px; line-height: 20px;"> </p>https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=8819Remote Service Management System2017-09-27T00:20:21+00:00Vinita Agarwalvinitaagrawalec@gmail.comAbhishek Guptavinitaagrawalec@gmail.comHarshita Guptavinitaagrawalec@gmail.comLakshya Jainvinitaagrawalec@gmail.comShivangi Guptavinitaagrawalec@gmail.com<div class="WordSection1"><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 103%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"> </p></div> <p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 10.0pt; mso-line-height-rule: exactly; mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="font-size: 12.0pt; font-family: "Times New Roman","serif";"> </span><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Abstract</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 10.0pt; mso-line-height-rule: exactly; mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">The major objective of the proposed work is to design a system which can remotely monitor the performance of any device. The statistics available to both customer and manufacturer can be used to judge the device health. The technology enables the manufacturer to remotely watch the performance of the device, and if there is any abnormality observed in device performance, the remote server may locate the device and correct it remotely. If there is any hardware (part failure) issue, then they can directly send service persons to device location. This system is very useful for devices like inverters as they are placed at remote location and their failure may be a root cause of heavy loss to the user.</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 10.0pt; mso-line-height-rule: exactly; mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Keywords: Remote server, device location, technology, inverters</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 10.0pt; mso-line-height-rule: exactly; mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Cite this Article</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 10.0pt; mso-line-height-rule: exactly; mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"> </p><p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 10.0pt; mso-line-height-rule: exactly; mso-pagination: none; mso-layout-grid-align: none; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Agarwal Vinita, Gupta Abhishek, Harshita Gupta et al. Remote Service Management System. Current Trends in Information Technology. 2017; 7(2): 29–34p.</span></span></p>2017-09-26T21:41:06+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=8820Smart City: How Do We Understand?2017-09-27T00:20:21+00:00Uttam Singhuttammsw2008@gmail.com<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif; font-size: 12pt;"> </span><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Abstract</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;"><br /></span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">A smart city is a rising and multidisciplinary domain. It has been defined as effective use of</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">information and communication technologies (ITCs) which enhance urban life in terms of</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">quality of life, governance, institution, economy and mobility. A smart city is an urban region</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">which is highly advanced in terms of infrastructure, real estate, communication and market</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">visibility. In smart city, information technology is the main infrastructure and the source for</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">providing essential services to residents. In the year 2015, India launched the program of</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">smart cities which is urban lead economic growth. Many argue that smart cities bring positive</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">change in social and economic life by adopting ITCs in planning and execution. In the last</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">recent year, India introduced many programs to transform the cities and took many initiatives</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">to provide better services to urban residents, like, e-governance has been a major step taken.</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Despite so many efforts, Indian cities face a lot of crisis such as financial, technological as</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">well as implementing governance. Smart cities comprised of three essential components viz.</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">technology, people and institution. There is no significant reference of institution and people</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">in order to build smart cities; their main focus is on technological driven method, because</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">technology is considered as a crucial factor for transforming cities into smart. It is good to</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">use technology for fast solution of problem, but again question arises here that where we</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">locate technology and at what level and how we consider smart city? The neoliberal pushes</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">for smart cities in advance form of capitalist system. This neoliberal system shows how</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">resources have been exploited by a small group of big companies and how a large</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">organization becomes larger and small ones become smaller. In smart cities, technologies are</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">enforced into communities without accessing their fundamental needs. On the other side, it</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">may be said that smart cities are a modern form of imperialism.</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;"><br /></span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Keywords: Neoliberal, smart city, technology</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Cite this Article</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Uttam Singh. Smart City: How do We</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Understand? Current Trends in</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Information Technology. 2017; 7(2):</span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"> </p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: 98%; mso-pagination: none; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">23–28p.</span></span></p> <br />2017-09-26T21:15:29+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=8215Effect of Rank Based Correlation on K-Nearest Neighbour2017-09-27T00:20:21+00:00Nazmul Shahadatnazmul.ruet@gmail.comAbu Naemnazmul.ruet@gmail.comRasel Dewannazmul.ruet@gmail.com<div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Abstract</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;"><br /></span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Because of its simplicity, higher efficiency and effectiveness, K-nearest neighbour (KNN) is</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">the most popular and chosen algorithm in the last few years. It has many conveniences with</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">the exception of some inconvenience. In this study, we explore the correlation and dependence</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">between attributes, and try to significantly improve the classification accuracy from existing</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">algorithm by skipping correlated attributes. To get classification accuracy, we applied this</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">skipping correlated attributes method in KNN ranking based classifier. In this approach, we</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">proposed a rank minimum distance to find out the category which is unknown and take the</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">best decision at the result. Here used various types of real world datasets for this experiment.</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">In implementation the results are found from original KNN algorithm and by removing some</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">skewed and high kurtosis valued attributes. Each datasets have highly correlated attributes</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">which may affect samples to classify correctly, that is why we implemented KNN algorithm</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">without correlated attributes and found as expected result. The accuracy of KNN algorithm</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">without correlated attributes is better than original KNN and KNN without skewed and high</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">kurtosis valued attributes. The results indicate that without correlated attributes, the rank</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">based KNN method significantly outperforms than the regular k-nearest neighbor technique</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">for different real-world datasets.</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;"><br /></span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Keywords: Classification, correlation, rank minimum distance, K-Nearest neighbour</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;"><div>Cite this Article</div><div>Nazmul Shahadat, Abu Naem, Rasel</div><div>Dewan. Effect of Rank Based</div><div>Correlation on K-Nearest Neighbour.</div><div>Current Trends in Information</div><div>Technology. 2017; 7(2): 17–22p.</div></span></span></div>2017-09-26T20:57:12+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=8818Design and Implementation of a Framework for Travel Package Recommendations2017-09-27T00:20:21+00:00P. Anjaneya ReddyAnjireddy46@gmail.comA. Sivva Kumaranjireddy46@gmail.com<p class="MsoNormal"> Abstract</p><p class="MsoNormal">Travel package recommendations are very important research area as the recommendations can help travellers to make well-informed decisions. The rationale behind this is that travel packages that are suitable for particular trip or travel can provide many benefits to travellers. In the recent past, tourism became an important source of income to many public and private sectors. Therefore, governments are taking special interest on providing tourism facilities. Travel package refers to a collection of facilities and pricing that caters to the needs of travellers. In this paper, we proposed a framework that takes care of travel package recommendations. It takes history of tours of a given tourist and provides travel package recommendations automatically. The travel package recommendations are the outcome of the framework. Towards this end, it performs various operations like neighbourhood selection, collaborative pricing, price distributions, collaborative filtering and travel package analysis. Then it generates travel package recommendations. We built a prototype application that demonstrates proof of the concept. The experimental results revealed that the proposed framework is useful in rendering travel package recommendations.</p><p class="MsoNormal">Keywords: Travel package, recommender systems, topic modelling, and collaborative filtering</p><p class="MsoNormal">Cite this Article</p><p class="MsoNormal">A. Sivva Kumar, P. Anjaneya Reddy. Design and Implementation of a Framework for Travel Package Recommendations. Current Trends in Information Technology. 2017; 7(2): 11–16p.</p><p class="MsoNormal"> </p> <p class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph; line-height: 150%;"> </p>2017-09-26T04:54:21+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=8817Citizen Opinion Mining Initiatives in Government Decision Making by Categorizing Citizen Sentiments2017-09-27T00:20:21+00:00Shikha Parasharshikhaparashar94@gmail.comR. K. Guptashikhaparashar94@gmail.com<p class="Abstract"><span style="font-family: "Times New Roman", serif; font-size: 10pt;"> </span><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Abstract</span></span></p><p class="Abstract"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Citizen opinion mining (C.O.M.) is a type of natural language processing (NLP) for finding the sentiments of citizen on various targeted government policies. Opinion mining techniques can be used for measuring influence facts like citizen behavior, desire, needs that help to improve government services. It includes building a system to gather and examine opinions for specific policy, made in weblog posts, comments, stories or tweets. Proposed approach gives brief description how citizen’s opinions play important role to make strong decision for any government policy. In our proposed approach, we categorized all the citizen opinion in different categories such as based on their profession (student, professor, common man, businessman) etc. Because if government wants to make decision for specific group of citizen then that group of citizens opinion are most important. The aim of our proposed approach is to make strong decision for citizens.</span></span></p><p class="Abstract"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Keywords: Decision making, data mining, SVM algorithm with RBF kernal function</span></span></p><p class="Abstract"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Cite this Article</span></span></p><p class="Abstract"> </p><p class="Abstract"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Shikha Parashar, R.K. Gupta. Citizen Opinion Mining Initiatives in Government Decision Making By Categorizing Citizen Sentiments. Current Trends in Information Technology. 2017; 7(2): 1–10p.</span></span></p>2017-09-26T04:22:42+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=8258Use of Mobile Technology for Academic Purpose2017-04-29T03:43:20+00:00Rahul K. Sutarnetsetph.d@gmail.com<p class="MsoListParagraph" style="margin: 0in; margin-bottom: .0001pt; mso-add-space: auto; text-align: justify; text-justify: inter-ideograph; line-height: 150%;"><strong><em><span style="font-size: 12.0pt; line-height: 150%; font-family: "Times New Roman","serif";" lang="EN-IN"> The present study is focussed on the application of mobile technology for learning by 50 P.G. students, from the science and social sciences departments of Shivaji University, Kolhapur. The study clears the utilization of mobile phones for educational environment. How the mobiles are useful for post graduate students for their learning and communication. The researcher has covered the usefulness of mobile technology</span></em></strong><span style="font-size: 12.0pt; line-height: 150%; font-family: "Times New Roman","serif";" lang="EN-IN"> <strong><em>i.e. Mobiles, Smart phones, Android, Tablet PC etc. for getting the students needy information in the Shivaji university premises. It also covers findings and conclusion.</em></strong></span></p>2017-04-29T03:38:50+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=8334Experimental Performance Testing of Separable Reversible Data Hiding Techniques2017-04-29T03:43:20+00:00Dimple Chandrakant Anandparadimplemca@gmail.comAmit D Kotharidimplemca@gmail.com<div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Now a day, for authentication of the image and hiding data within image, different types of separable reversible data hiding techniques are available. In this paper, authors give experimental based performance analysis of separable reversible data hiding techniques based on lossless image compression. Comparative analysis is given on the basis of basic two parameters, that is, quality of image after hiding data within image and time taken by both the techniques.</span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;"><br /></span></span></div><div><span style="font-family: "Times New Roman", serif;"><span style="font-size: 13.3333px;">Keywords: Separable data hiding, lossless image compression, 4 LSB, edge detection</span></span></div>2017-04-29T03:30:09+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7357Women Safety App. Using Android Enabled Watch2017-04-29T03:43:20+00:00Devi Devapaldevidevapal30@gmail.comG Ammudevidevapal30@gmail.comArya Ananthakrishnandevidevapal30@gmail.comArya Padmamdevidevapal30@gmail.comP Jayasreedevidevapal30@gmail.comAswathy G Acharyadevidevapal30@gmail.com<p class="Style1" style="margin-top: 4.3pt; text-align: justify;"><strong><em>We are all aware of importance of women's safety. In our society, women and elderly people face many problems. In order to overcome such problems faced by women, the WARRIOR (women security APP.) android based application, which can also be installed in android wearable watch, has been introduced. It helps them to contact their family members and friends timely. The main objective of our app. is to track the current location of a person with an android enabled watch or android enabled mobile phones by extracting the longitude and latitude of that target person. The main features of this app. are: sending alert message, email by the press of button, creating group of trusted people. It can make call along with messages. It automatically updates the status of Face book with a predefined message like “Help me”. The key feature of our app. is that it will send text message even in the absence of internet connection. This message can be received by ordinary phones.</em></strong></p><p class="Style1" style="margin-top: 4.3pt; text-align: justify;"><strong><em>Keywords: Android mobile phone, safety, SOS, GPS, wearable device, APP</em></strong></p>2017-04-29T02:57:06+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=8161A Review Paper on IDS based Data Mining2017-04-29T03:43:20+00:00Shilpi Goyalshilpisrcem@gmail.comShushil Chaturvedishilpisrcem@gmail.com<p class="MsoNormal" style="text-align: justify; mso-layout-grid-align: none; text-autospace: none;">Security is one of the most concerning areas of computer system and for data. So, securing data over the network becomes one of the difficult tasks of data mining. In this paper, we study about data mining and intrusion detection system technology and effects of this system over data mining.</p><p class="MsoNormal" style="text-align: justify; mso-layout-grid-align: none; text-autospace: none;">Keywords: NIDS, IDS, SVM, GA</p>2017-04-29T02:37:40+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7976Protected Data Compilation in WSN Using Random Routing Algorithms2016-12-19T03:41:29+00:00Raju Darasathishreddy.uppu@gmail.comJellela Satish Reddysathishreddy.uppu@gmail.com<p class="MsoNormal" style="text-align: justify; mso-layout-grid-align: none; text-autospace: none;"><span style="font-size: 14.6667px;">Wireless sensor networks make it conceivable to send secure information from source to destination. On the off chance that connected to network checking information on a host, they can be used to distinguish bargained hub; and refusal of administration is two-key assault. In this paper, we display four "Multi-way randomized directing Algorithm", a technique to send the information, various approaches to order the information into wireless sensor systems. The pure random propagation, shares are engendered in view of one-bounce neighborhood data, sink TTL beginning worth N in every offer and remaining calculations enhance the effectiveness of shares in light of utilizing two-jump neighborhood data. Our work ponders the best calculation by distinguishing the included hubs with dark gaps and refusal of administration in the bundle data with multipath directing calculations that has not been utilized some time recently. We investigated the calculation that have the best proficiency and depicts the proposed framework. </span></p><p class="MsoNormal" style="text-align: justify; mso-layout-grid-align: none; text-autospace: none;"><span style="font-size: 14.6667px;">Keywords: Wireless sensor networks, security, attacks and routing </span></p><p class="MsoNormal" style="text-align: justify; mso-layout-grid-align: none; text-autospace: none;"> </p><p class="MsoNormal" style="text-align: justify; mso-layout-grid-align: none; text-autospace: none;"><span style="font-size: 14.6667px;">Cite this Article Raju Dara, Kiran Kumar Chennugani. Protected Data Compilation in WSN Using Random Routing Algorithms. Current Trends in Information Technology. 2016; 6(3): 43–50p. </span></p>2016-12-19T03:23:29+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7449Double Guard: Detection Intrusion in Multitier Application2016-12-19T03:41:29+00:00S.R. Nallewarsupriyajadhav654@gmail.comN.V. Burandesupriyajadhav654@gmail.comG.V. Bawaskarsupriyajadhav654@gmail.comR.D. Shilpakarsupriyajadhav654@gmail.com<p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 18.6667px;"><strong>In double guard intrusion in multitier system, it is important concept taking into account attacks. There is very little work being performed on multi-tiered anomaly detection (AD) systems. It generates models of network behavior for both web and database network interactions. In such multi-tiered architectures, the back-end database server is often protected in system behind a firewall, while the web servers are remotely over the internet. Though they are protected from direct remote attacks, the back-end systems are susceptible to attacks that use web requests as a means to exploit. It detects this type of attack since the web IDS would merely see typical user login traffic. The current multi-threaded web server architecture in this system carries multiple systems; it is not feasible to detect or profile such causal mapping between web server traffic and it has deserver traffic, since traffic cannot be clearly attributed to user sessions in the use. </strong></span></span></p><p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 18.6667px;"><strong>Keywords: Attacks, double guard, IDS, SQL, TCP </strong></span></span></p><p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"> </p><p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 18.6667px;"><strong>Cite this Article Jadhav SD, Nallewar SR, Burande NV et al. Double Guard: Detection Intrusion in Multitier Application. Current Trends in Information Technology. 2016; 6(3): 32–42p. </strong></span></span></p>2016-12-19T03:17:52+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7881Public Auditing Based Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks2016-12-19T03:41:29+00:00Raju Dararajurdaara@hotmail.comSrikanth Ravularajurdaara@hotmail.com<p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;"><strong><em>Wireless ad hoc networks are vulnerable to packet dropping attacks. However, they are also subjected to packet dropping due to link errors. In case of multi-hop wireless networks, it is essential to differentiate packet dropping due to link error or malicious attack. When any mechanism is able to differentiate this, can provide high level of security to the network with respect to packet dropping attacks. Many solutions came into existence as found in the literature. In this paper, we considered a special insider attack where malicious nodes are aware of other nodes in the network and exploit their knowledge to achieve packet drop which is potential risk in communication networks. Achieving satisfactory accuracy in detection of packet loss due to malicious attacks is given high importance. In this paper, public auditing mechanism is proposed and implemented that exploits correlations between lost packets. We proposed a public auditing architecture for accurate detection of packet drop attacks. We built a custom simulator using Java platform to demonstrate the proof of concept. The empirical results reveal the usefulness of the proposed system. </em></strong></span></span></p><p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;"><strong><em>Keywords: Wireless ad hoc network, packet dropping, auditing </em></strong></span></span></p><p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"> </p><p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;"><strong><em>Cite this Article Raju Dara, Srikanth Ravula. Public Auditing Based Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks. Current Trends in Information Technology. 2016; 6(3): 24–31p. </em></strong></span></span></p>2016-12-19T01:14:04+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7923Group Management for Secure and Dynamic Sharing of Data in Cloud Computing2016-12-19T03:41:29+00:00Bhongir Sonybhongirsony@yahoo.comBhongir Sonybhongirsony@yahoo.com<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: normal;"><span style="font-family: "Times New Roman", serif;"><em>Cloud computing has emerged as new model of computing which allows outsourcing data. The phenomenon of outsourcing data to cloud became obvious as cloud has infrastructure as a service (IaaS) layer for it. With this feature of cloud, there is growing trend in outsourcing data to cloud. When an enterprise outsources its data to cloud, it needs to take care of its functionalities in terms of data sharing across its users. The company creates groups and manages group members in order to have secure and dynamic data sharing. Group manager is responsible to determine data to be shared and privileges of group members. Group management is very dynamic thing where new users may be added and existing members may be removed from group. The users who are not associated with the group may involve in collusion attack. The existing systems focus on group management and data sharing. In this paper, we built a mechanism for revoking a user and disable all credentials given to him. We built a prototype application that demonstrates the proof of concept. The empirical results revealed that the proposed scheme is effective. </em></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: normal;"><span style="font-family: "Times New Roman", serif;"><em>Keywords: Cloud computing, outsourcing, group management, secure data sharing, user revocation </em></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; line-height: normal;"><span style="font-family: "Times New Roman", serif;"><em>Cite this Article Raju Dara, Bhongir Sony. Group Management for Secure and Dynamic Sharing of Data in Cloud Computing. Current Trends in Information Technology. 2016; 6(3): 16–23p. </em></span></p>2016-12-19T00:30:27+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7742Big Data to Big Data Mining: Issues, Challenges and Data Analytics Solutions2016-12-19T03:41:29+00:00Madhulika Pandeymadhulika.pandey02@yahoo.inMadhulika Pandeymadhulika.pandey02@yahoo.inKrishan Kumarmadhulika.pandey02@yahoo.in<p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Data has evolved at a great pace due to increasing interest of people and valuable contribution towards the emerging technologies. Emerging technologies are successful in generating huge quantity of data from various sources which in return provides Big Data. Big Data constitutes large amount of data in terms of texts, statistics, facts, figures, and records, etc., generated from heterogeneous environment. Big Data needs special attention for storage, managing, transportation and processing of data. It includes amassing of data in terms of 3V’s, i.e. volume, variety and velocity. Issues and challenges of Big Data are real time obstacles and needs instant consideration. This paper presents the overview of Big Data along with its issues and challenges. Applications of data mining in Big Data along with some of its open sources are also discussed in the paper. </span></span></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Keywords: Big Data, big data analytics, big data mining, Massive Online Analysis, R, GraphLab, Pegasus, Mahout </span></span></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Cite this Article Neeraj Kumar, Madhulika Pandey, Krishan Kumar. Big Data to Big Data Mining: Issues, Challenges and Data Analytics Solutions. Current trends in Information Technology. 2016; 6(3): 7– 15p. </span></span></p>2016-12-19T00:26:28+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7823Hadoop and Map Reduce for Simplified Processing of Big Data2016-12-19T03:41:29+00:00Shobha Ranimsrani1998@gmail.com<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; text-indent: .5in; line-height: 150%; mso-layout-grid-align: none; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Big data refers to large and complex data sets made up of a variety of structured and unstructured data, which are too big, too fast, or too hard to be managed by traditional techniques. Hadoop is an open source software platform for structuring big data on computer clusters built from commodity hardware and enabling it for data analysis. It is designed to scale up from a single server to thousands of machines, with a very high degree of fault tolerance. MapReduce is a programming model for processing large data sets with parallel distributed algorithm on cluster. This paper presents the survey of simplified big data processing with Hadoop architecture and MapReduce framework. </span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; text-indent: .5in; line-height: 150%; mso-layout-grid-align: none; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Keywords: Big data, Hadoop, MapReduce, HDFS, Big data Analytics </span></span></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; text-indent: .5in; line-height: 150%; mso-layout-grid-align: none; text-autospace: none;"> </p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; text-justify: inter-ideograph; text-indent: .5in; line-height: 150%; mso-layout-grid-align: none; text-autospace: none;"><span style="font-family: "Times New Roman", serif;"><span style="font-size: 16px;">Cite this Article Ch. Shobha Rani. Hadoop and Map Reduce for Simplified Processing of Big Data. Current Trends in Information Technology. 2016; 6(3): 1–6p. </span></span></p>2016-12-19T00:22:00+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7382Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography2016-08-09T03:05:28+00:00Amrtha Anand.Kammuanandk@gmail.comDheena Kurienammuanandk@gmail.com<p class="Abstract" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-indent: 0in;"><em><span style="font-size: 10pt;">In this paper, system uses the cryptography and steganography concept, which proposes a lossless, reversible, and combined data hiding methods for images encrypted by public key cryptosystems with probabilistic and homomorphic properties. </span></em><em><span style="font-size: 10pt;">In the lossless method, pixels of encrypted images are replaced with new values to embed additional data into LSB-planes of ciphertext pixels by multiple layer wet paper coding. Thus, original data can be directly extracted from encrypted image, and the data embedding does not affect the decryption of plaintext image. In the reversible method, histogram shrink is done before image encryption, so that the modification on cipher text images for data embedding will not cause any loss in plaintext image. With the combined lossless and reversible technique, receivers extract a part of embedded data before decryption, extract another part of embedded data and recover the original plaintext image after decryption.</span></em></p><p class="Abstract" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-indent: 0in;"><em><span style="font-size: 10pt;"> </span></em></p><p class="Abstract"> </p><p class="keywords" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-indent: 0in;"><span style="font-size: 10pt;">Keywords: </span><span style="font-size: 10pt;">Lossless, reversible, encryption, data hiding, decryption</span></p><p class="keywords" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-indent: 0in;"> </p><p class="papertitle" style="margin-bottom: .0001pt; text-align: justify;"><strong><span style="font-size: 12pt;">Cite this Article</span></strong></p><p class="keywords" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-indent: 0in;"> </p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: 11pt;">Amrtha Anand K, Dheena Kurien</span><span style="font-size: 11pt;">.</span><span style="font-size: 11pt;"> Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography</span><span style="font-size: 11pt;">. <em>Current Trends in Information Technology</em>. 2016; 6(2): 27–33p.</span></p>2016-08-09T02:57:59+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7383ICAMPUZ: Android and Web Based Campus Friendly Application for Students2016-08-09T03:05:28+00:00Aswani P Baswanibhasi@gmail.comDeepthy Paulyaswanibhasi@gmail.comTeslin Sabuaswanibhasi@gmail.comChinnu K.Saswanibhasi@gmail.com<p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">There are lots of applications and management systems available for college departments. But all these are focused to facilitate an easy and reliable way for managing the college departments by the authorized authority in the college. And it is not focused to full fill the students’ needs. In this paper, we are introducing an android application based on the web service, which will help and support students for getting updated with all the activities in the college and class. The students will be provided with all the information including their own profile, progress report and all other activities in their departments. It is very useful for parents to get updated with the students progress report everyday and let them to make sure that their child is currently present in the college. This system will also help the faculties to record the scores and the attendance of the students and also make it easy to keep contact with the students. The proposed method in this paper is implemented by creating a web server at the server side and the client side is an android application.</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";"> </span></em></strong></p><p class="MsoNormal" style="text-align: justify;"> </p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">Keywords: </span></em></strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">Android application, web server part</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify;"><strong><span style="font-size: 12.0pt; mso-bidi-font-size: 11.0pt;" lang="EN-IN">Cite this Article<span style="text-transform: uppercase;"></span></span></strong></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-size: 11.0pt;" lang="EN-IN">Aswani PB, Deepthy Pauly, Teslin Sabu, <em>et al</em>. ICAMPUZ: Android and Web Based Campus Friendly Application for Students. <em>Current Trends in Information Technology</em>. 2016; 6(2): 22–26p.</span></p>2016-08-09T02:51:09+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7587Haptic Technology: A Comprehensive Review of its Applications and Future Prospects2016-08-09T03:05:28+00:00Sreelakshmi Msssreelakshmi7@gmail.comT.D. Subashsssreelakshmi7@gmail.com<p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif"; mso-bidi-font-weight: bold;">Computer science finds a variety of applications in different fields. In the modern scenario, the combination of human senses with field of computer science is becoming more and more common. A detailed study of haptic technology is described in this paper, which is entirely related to touch. The complete potential of the field is yet to be explored. The science of applying touch sensation and control to interact with computer developed applications is the best definition given for haptic technology. With the help of haptic device, people get a sense of touch with computer generated environments, so that when virtual objects are touched, they seem to be real and tangible. Haptic technology enables the user to interface with a virtual environment via the sense of touch by applying forces, vibrations, or motions to the user. This mechanical simulation helps in the creation of virtual objects, controlling of virtual objects and to augment the remote control properties of machines and devices. This paper describes how haptic technology works, its devices, applications, and disadvantages. A brief explanation on haptics functions and its implementation in various fields of study is provided in this paper. A description on some of its future applications and a few limitations of this technology are also provided.</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">Keywords: </span></em></strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif"; mso-bidi-font-weight: bold;">Human sense of touch, tactile feedback, virtual object creation and control, Phantom, haptic rendering</span></em><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";"></span></em></p>2016-08-09T02:14:56+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7571Design and Implementation of Smart House using LabVIEW2016-08-09T03:05:28+00:00Dinesh Kumar Nalidinuhai@yahoo.co.inK Siva Kumardinuhai@yahoo.co.in<span style="font-family: Times New Roman; font-size: small;"> </span><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10pt; font-family: "Times New Roman", serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Everyone wants to enjoy comfort and ensure security at his or her homes. Most of the security and automation systems in the market are not flexible and full-fledged. There are two important issues addressed by the automation system. The first issue that is to be overcome is the compatibility with various devices and forthcoming technologies. This issue is overcome by auto updating of the central controlling tool. The second issue is that every automation system requires different software for different functions. Smart home management system overcomes this problem by integrating all the functions into single software. Energy is efficiently managed by separate controls, which are equipped by LabVIEW. To make a complete system, a hybrid of security and automation systems is designed. Controlling system is to be designed with more caution and user friendliness. The LabVIEW controlled system will control four main systems of the house, i.e., digital key (password protected), burglar alarm system, temperature sensor and fire alarm system. The four functions of LabVIEW controlled system are controlled using LabVIEW. The user even gets an option to configure his settings via LabVIEW.</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10pt; font-family: "Times New Roman", serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"> </span></em></p><p style="margin: 0in 0in 10pt; text-align: justify; line-height: normal;"> </p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em><span style="font-size: 10pt; font-family: "Times New Roman", serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Keywords:</span></em></strong><em><span style="font-size: 10pt; font-family: "Times New Roman", serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"> Digital key, LabVIEW, password, sensor, smart house</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="MsoListParagraph" style="margin: 0in 0in 0.0001pt; text-align: justify;"><strong><span style="font-size: 12pt; font-family: "Times New Roman", serif;">Cite this Article</span></strong><strong><span style="font-family: "Times New Roman", serif; text-transform: uppercase;"></span></strong></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-family: "Times New Roman", serif;">Dinesh Kumar N, Siva Kumar K. Design and Implementation of Smart House Using LabVIEW. <em>Current Trends in Information Technology</em>. 2016; 6(2): 5–13p.</span></p><span style="font-family: Times New Roman; font-size: small;"> </span>2016-08-09T02:04:15+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7381A Survey on Detections and Preventions of IP Spoofed DoS/DDoS Attacks2016-08-09T03:05:27+00:00Teslin Sabuteslinsabu@gmail.com<p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">In the modern computer world, maintaining the information in remote host is very difficult. The main issue involved in using internet lies in its security. According to the latest studies the DoS attack is the most popular attack in networks security. A denial of service (DoS) attack is an attempt to make a machine or network or its resource unavailable to its intended users. DoS also compromise the availability of network services. Distributed denial of service (DDoS) is that attack that which originates from multiple distributed attackers. Also it differs from DoS in its execution. The idea called IP spoofing is used recently for the DDoS attacks that even include attacks on E-commerce. As internet grows without much security concerns one can exploit the weaknesses of the network to alter or break its normal working. In this paper, we present various IP spoofed DoS/DDoS attack detection and prevention methods.</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";"> </span></em></p><p class="MsoNormal" style="text-align: justify;"> </p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">Keywords: </span></em></strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">DoS, IP spoofing, DDoS, firewalls, cryptography, packet filtering, hop count filtering, round trip time (RTT), distributed probability HCF (DPHCF)</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify; break-after: auto;"><strong><span style="font-size: 12.0pt;" lang="EN-IN">Cite this Article<span style="text-transform: uppercase;"></span></span></strong></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify; break-after: auto;"><span style="font-size: 11.0pt;" lang="EN-IN">Teslin Sabu, Sanam Anto. A Survey on Detections and Preventions of IP Spoofed DoS/DDoS Attacks. <em>Current trends in Information Technology</em>. 2016; 6(2): 1–4p.</span></p>2016-08-09T01:39:32+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7168Park Information System for Kolkata: A Low Cost Web Enabled Solution2016-04-26T22:35:29+00:00Arati Paularatipaul@yahoo.comDebasish Chakrabortyaratipaul@yahoo.comDibyendu Duttaaratipaul@yahoo.comPrabir Kumar Dasaratipaul@yahoo.comMallika Jalanaratipaul@yahoo.comSiddharth Chettriaratipaul@yahoo.comNirpendra Shresthaaratipaul@yahoo.comShruti Menonaratipaul@yahoo.com<span style="font-family: Times New Roman; font-size: small;"> </span><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";" lang="EN-IN">Green parks in urban environment play an important role in promoting public health, art, culture, tourism and economy. City dwellers require information about the parks to get the benefit of green spaces. Web GIS technology has a potential to maintain inventory and disseminate spatial and aspatial information over the Internet. Open source software enables cost effective and feature rich implementation, operation and maintenance of Web GIS application. In this study an efficient approach is presented for developing an open source Web GIS application based on Geoserver as a web GIS server and PostgreSQL/PostGIS as an object oriented relational database management system (ORDBMS). Open layer is used to deploy the mapping contents to the web application. HTML together with PHP and JavaScript is used for developing the interactive user interface for effective dissemination, sharing and management of park information of Kolkata city. The application plots locations of parks along with name and ground photographs over high resolution satellite images. It enables to search and navigate the map based on ward, borough, and postal index number (PIN). It also facilitates to identify features, measure the distance between points and area of the object in the map in web environment. This application is found to be useful for city dwellers and green parks conservation.</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";" lang="EN-IN"> </span></em></strong></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";" lang="EN-IN">Keywords: </span></em></strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";" lang="EN-IN">Park, <span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Geoserver</span>, open source, WebGIS, Kolkata</span></em></p><p style="margin: 0in 0in 10pt; text-align: justify; -ms-text-justify: inter-ideograph;"> </p><p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-family: "Times New Roman","serif";" lang="EN-IN"> </span><strong><span style="font-size: 12.0pt; mso-bidi-font-size: 11.0pt;" lang="EN-IN">Cite this Article</span></strong></p> <p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-size: 11.0pt;" lang="EN-IN">Arati Paul, Debasish Chakraborty, Dibyendu Dutta,<em> </em>Prabir Kumar Das, Mallika Jalan, Siddharth Chettri, Nirpendra Shrestha, Shruti Menon. Park Information System for Kolkata: A Low Cost Web Enabled Solution. <em>Current Trends in Information Technology. </em>2016; 6(1):35–39p.</span></p><span style="font-family: Times New Roman; font-size: small;"> </span>2016-04-26T22:32:01+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=6809Library Resources and Collection Development: A Study2016-04-26T22:35:29+00:00Rajaram Kjairajaram6@gmail.comS. Jeyachitrajairajaram6@gmail.comB.S. Swaroop Ranijairajaram6@gmail.com<p class="MsoNormal" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">The selection activities of the public, academic and large special libraries will also vary depending upon their sizes. In small public libraries, most of the librarians are involved in the selection procedure. As the library system grows, adds branches and expands services, selection is usually delegated to the departmental heads or branch library supervisors. A large metropolitan public library system frequently assigns the selection activities to a committee composed of representatives for all service programs, though not from every branch library. This committee formulates a list of title that different service programs may select from thus serving as a first level screening group. </span></em></p><p class="MsoNormal" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";"> </span></em></p><p class="Default"> </p><p class="MsoNormal" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in;"><strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">Keywords: </span></em></strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">Collection development, management, development policies, acquisition and processing</span></em></p><p class="MsoNormal" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in;"> </p><p class="MsoNormal"><strong><span style="font-size: 12.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";">Cite this Article<em></em></span></strong></p><p class="MsoNormal" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in;"> </p><p class="MsoNormal"><span style="font-family: "Times New Roman","serif"; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;">K. Rajaram, S. Jeyachitra, B.S. Swaroop Rani</span><em><span style="font-family: "Times New Roman","serif";">.</span></em><span style="font-family: "Times New Roman","serif";"> Library Resources and Collection Development: A Study. <em>Current Trends in Information Technology. </em>2016; 6(1): 29–34p.<strong></strong></span></p>2016-04-26T22:18:28+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7181Extraction of Retinal Features in Fundus Images for Glaucoma Diagnosis2016-04-26T22:35:29+00:00T. Keerthanashreekeerthanashreet@gmail.comM. Ponni Balakeerthanashreet@gmail.com<p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif"; mso-bidi-font-weight: bold;" lang="EN-IN">Glaucoma is a major cause for blindness, identified early by the structural changes of optic nerve head in the retina. </span></em><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif"; mso-bidi-font-weight: bold;" lang="EN-IN">Retinal image analysis is emerging as an important screening tool for prior detection of eye diseases</span></em><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";" lang="EN-IN">. Glaucoma is a chronic eye disease in which damage to the optic nerve leads to progressive, irreversible vision loss and it is considered as second leading cause for blindness worldwide. In this research work, segmentation of optic disc and optic cup and extraction of retinal features from the fundus images is proposed. The optic cup and optic disc are segmented by active contour, level set, K-means clustering based segmentation techniques. The proposed method has been evaluated for 110 fundus images of DRIONS-DB database. The features are extracted from the processed segmented image and used to identify the severity level of glaucoma. The cup to disc ratio (CDR) is calculated from the segmented fundus image and the severity level of disease is identified if the CDR value exceeds 0.6. Then, the texture based feature extraction is done and these features are used for detection of glaucoma. The features such as CDR (Cup to Disc Ratio) and GLCM (Gray level Co-occurrence Matrix) are used to diagnose the glaucoma. </span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";" lang="EN-IN"> </span></em></p><p class="MsoNormal" style="margin: 0in 23.8pt 0.0001pt 0.5in; text-align: justify;"> </p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";" lang="EN-IN">Keywords: </span></em></strong><em><span style="font-size: 10.0pt; mso-bidi-font-size: 11.0pt; font-family: "Times New Roman","serif";" lang="EN-IN">Glaucoma, optic disc, optic cup, K-means clustering, cup to disc ratio (CDR)</span></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify;"><strong><span style="font-size: 12.0pt; mso-bidi-font-size: 11.0pt;" lang="EN-IN">Cite this Article</span></strong><span style="font-size: 12.0pt; mso-bidi-font-size: 11.0pt;" lang="EN-IN"></span></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-size: 11.0pt;" lang="EN-IN">Keerthanashree T, Ponni Bala M. Extraction of Retinal Features in Fundus Images for Glaucoma Diagnosis. <em>Current Trends in Information Technology. </em>2016; 6(1):21–28p.</span></p>2016-04-26T22:11:58+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7180Design of Controller to Evaluate Optimal Chemical Ratio in Starch Modification Process2016-04-26T22:35:29+00:00Kalaaranjini Vkalaranjini.ei@gmail.comMadhan Mohan Mkalaranjini.ei@gmail.com<p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em>In modern times,</em><em><span style="mso-bidi-font-size: 11.0pt; font-style: normal; mso-bidi-font-style: italic;"> </span></em><em>the modified starch industry uses chemical modification process which involves physical monitoring and labor-intensive addition of chemicals with native starch. So, chemical modification process needs exact calculation of chemical proportion to be mixed with the native starch according to the applications of industrial requirements. In order to reduce the physical error during manual mixing of chemicals and monitor the environmental safety of chemicals, it is important to design a controller to calculate the proper ratio of chemicals blend up with the native starch for the application of modified starch to manufacture paper, and cones in paper industry. The mamdani fuzzy logic controller (FLC) model was designed to meet the modified starch process in paper industry applications.</em><em><span style="mso-bidi-font-size: 11.0pt; font-style: normal; mso-bidi-font-style: italic;"> </span></em><em>The simulation result shows that maximum error obtained is found to be 50% in base region, 12.5% in neutral region and 15% in acid region </em><em>in predicting the chemical ratio using FLC. Hence in future genetic algorithm is used to tune the fuzzy logic controller.</em><em></em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><em> </em></p><p class="MsoNormal" style="text-align: justify;"> </p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"><strong><em>Keywords: </em></strong><em>Native<strong> </strong>starch, modified starch, fuzzy logic controller, genetic algorithm tuned fuzzy logic controller</em></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify;"><strong><span style="font-size: 12.0pt; mso-bidi-font-size: 11.0pt;" lang="EN-IN">Cite this Article</span></strong></p><p class="MsoNormal" style="margin: 0in 0.5in 0.0001pt; text-align: justify;"> </p><p class="Els-Author" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-size: 11.0pt;" lang="EN-IN">Kalaaranjini V, Madhan Mohan M. Design of Controller to Evaluate Optimal Chemical Ratio in Starch Modification Process. <em>Current Trends in Information Technology. </em>2016; 6(1):15–19p.</span></p>2016-04-26T22:07:33+00:00Copyright (c) https://stmjournals.com/index.php?journal=CTIT&page=article&op=view&path%5B%5D=7042Real Time Analysis of Twitter Data2016-04-26T22:35:29+00:00Rishu Chaudharychaudharyrishu7@gmail.comAnurag Singhbaghelchaudharyrishu7@gmail.com<p class="MsoNoSpacing" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-align: justify; text-justify: inter-ideograph;"><em><span style="font-size: 10pt; font-family: 'Times New Roman', serif;">In last two decades, big data has emerged as one of the most trending fields of research. In today’s world, every minute, huge amount of structured and unstructured data is produced via various platforms. This data includes texts, images, and forums gathered from social media platforms. This increasing data implies a fundamental change in the way we analyze data since it is unable to analyze data using conventional methodologies and therefore, we need more advanced technologies and methodologies. There is increasing interest in business society to draw conclusions about the diverse type of data available to it from consumers. By proper analysis of users’ opinions business professionals can identify a trend, a problem or an opportunity, microsecond before anyone else, which can give them an edge over others in today’s competitive environment. One of the best methods to get valuable information is to extract sentiments and opinions from the text. Sentiment analytics aim at analyzing sentiments, emotions, attitudes, opinions etc., towards topics, products, people, organizations, services, etc. Nowadays data is evolving at a rapid pace, thus, there is a growing demand for analysis of big data in real-time. This paper aims at real-time sentiment analytics of twitter stream. More than 340 millions of tweets are generated daily, and this number is increasing rapidly, thus, there arises a demand for a much robust system to process these tweets in real-time. Here apache storm is being used for real-time sentiment analytics. The tweets are first parsed and then classified, followed by grouping.</span></em></p> <p class="MsoNoSpacing" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-align: justify; text-justify: inter-ideograph;"><em><span style="font-size: 10pt; font-family: 'Times New Roman', serif;"> </span></em></p> <p class="MsoNoSpacing" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-align: justify; text-justify: inter-ideograph;"><strong><em><span style="font-size: 10pt; font-family: 'Times New Roman', serif;">Keywords:</span></em></strong><em><span style="font-size: 10pt; font-family: 'Times New Roman', serif;"> Big data, sentiment, analytics, real-time, apache storm, parsing, spout, bolt, topology</span></em></p><p class="MsoNoSpacing" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-align: justify; text-justify: inter-ideograph;"> </p><p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><strong><span style="font-size: 12pt; font-family: 'Times New Roman', serif;">Cite this Article</span></strong></p><p class="MsoNoSpacing" style="margin-top: 0in; margin-right: .5in; margin-bottom: .0001pt; margin-left: .5in; text-align: justify; text-justify: inter-ideograph;"> </p><p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-family: 'Times New Roman', serif;">Rishu Chaudhary, Anurag Singhbaghel. Real Time Analysis of Twitter Data. <em>Current Trends in Information Technology. </em>2016; 6(1): 6–14p.</span></p>2016-04-26T22:00:18+00:00Copyright (c)