NCCCIS 2016- National Conference on Innovation and Technology Strategy in Cloud Computing and Information Security

"NCCCIS 2016 Conference Papers "


Routing Protocols for Google Maps[ ]


This paper exhibits an exhaustive study on the execution of normal MANET (portable adhoc organize) steering conventions under practical system situations. The expansion in accessibility and notoriety of versatile remote gadgets has lead specialists to build up a wide assortment of Mobile Ad-hoc Networking (MANET) conventions to misuse the one of a kind correspondence openings introduced by these gadgets. Gadgets can convey straightforwardly utilizing the remote range as a part of a distributed form, and course messages through transitional hubs, however the way of remote shared correspondence and cell phones result in numerous directing and security challenges which must be tended to before sending a MANET. This paper is a study of dynamic research takes a shot at steering conventions for MANET. Different research groups are working in field of MANET and attempting to receive the conventions and innovation in different applications also. In this paper, an endeavor has been made to think about three surely understand conventions AODV, DSR and DSDV by utilizing three execution measurements parcel conveyance proportion, normal end to end defer and directing overhead. The examination has been finished by utilizing reenactment instrument NS2 which is the principle test system, NAM (Network Animator) and exceed expectations diagram which is utilized for setting up the charts from the follow files.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Developing Hangman Game in Android using Android Studio[ ]


This paper focusses on the development of Hangman Game from initial stages of coding to the final states of implementation. We had abstracted the same idea of developing the game as, but the platform opted is Android, which looks upon for pre-requisites of this operating system knowledge that helps us to develop modules in it. The basic requirement for development of this game is mostly same, that is fetching the most repetitive and redundant alphabets from English language and the other one is requirement of at least 2 or more than 2 players. In future the same can be extended in mobile applications.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cloud Computing: A silver lining in the dark[ ]


“My information? It’s safe right up there in the clouds” – Indeed this is what today’s generation proudly says when it comes to the storage of their never-ending data. The term "cloud computing" is everywhere right from defense to healthcare. In the simplest terms, it means storing and accessing data or information online. This technology enables to create, configure and customize several applications in the form of services over the internet. IT companies, being constantly under the pressure to deliver the expected products before deadline have been hugely dependent on the cloud lately. Focussing on achieving the goal of being the most sought-for field in the entire IT industry, cloud computing is emerging as a model of “Everything as a Service (XaaS)”. This paper presents a study on all the basic information one needs to know about cloud computing, i.e., its pros, cons, deployment models, service models and applications.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Data Protection in Health Care using Big data Analytics[ ]


In recent times, privacy became more concern in many sectors. Mainly, privacy is more important aspect in healthcare industry. The paper describes the nascent field of big data analytics in healthcare, discuss the benefits, storage of patient records in big data, data privacy in healthcare, data protection techniques, discusses the challenges and offers conclusions. As the privacy is one of the most important things that patients holds on, we presented the current methods used the patient’s privacy in healthcare industry. We focused more on the security and privacy aspects of medical data in a Big Data environment.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Lung Cancer Detection via Image Processing[ ]


Lung cancer has turned out to be the most widespread genre of cancer among both men and women. When it comes to improving the survival rate, the only conceivable solution is its early detection. CT images are useful in diagnosing the presence of lung cancer as the doctor analyses the CT image of lungs and predicts the presence of tumour. Now, as the chances of false detection are more in case of manual detection, we need a computerized technique for this purpose. Lung cancer detection system can be developed by using several image processing techniques, among which neural networks is used most commonly.The prediction of presence of the lung nodule by the machine involves three stages, namely - pre-processing stage, feature extraction stage and lung cancer cell identification.Neural networks, with their remarkable ability to derive meaning from complicated or imprecise data, can be used to extract patterns and detect trends that are too complex to be noticed by either humans or other computer techniques. So, this helps in predicting the presence of tumour in the lung.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Facial Expression Detection using KNN algorithm[ ]


Face recognition has them ostrelevance in real life issues of security, criminal investigation, and verification intention. Thus it has broad range of applications. Three issues in the field of face recognition are: illumination variation, pose variation and more importantly expression variation which is the main focus of this paper. Human-Computer Interaction is an emerging field of Computer Science where, Computer Vision, especially facial expression recognition occupies an essential role. There are so many approaches to resolve this problem; among them HMM is a considerable one. In this paper, we study Hidden Markov Mode l(HMM) and KNearest Neighbor (KNN) classifiers ,and put forward a combined approach for facial expression recognition. The reared eight different facial expression classified here: angry, annoyed, disgusted, grumpy, happy, natural, sad and surprise. The basic idea of this approach is to employ the KNN and HMM classifiers in as sequential way. Experiment on faced at a bases how that the proposed method has encouraging recognition performance.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Synthesize Approach: Modeling for Java Security[ ]


Java is a programming language which is developed by Sun Microsystems. Sun Microsystems claim that Java has a number of advantages over traditional programming languages. One of the benefit is the ability to execute un trusted programs in a secure environment. This paper investigates the problems that would arise when running un trusted programs. It then takes an in depth explore the answer provided by the Java security model in theory furthermore as in current implementations and calculates their potency and adaptability for present and future ranges of application.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Android Based Food Service Locater Using GPS[ ]


Modern hand held devices like mobile phones ,embedded devices, smart phones ,tabs are becoming powerful as years are passing by. Dramatic breakthroughs in power with various number of additional features included in these devices, opened the doors to commercial possibilities .In particular most cell phones include cameras, processors compatible to PCs from only a few years ago, and internet access. However, even with all these additional features, there are only few applications that allow much passing them the environmental information plus location based services. Nowadays mobile devices become more similar to PCs and they will come to replace objects that we carry around like checkbooks, cameras, planners, credit cards, mp3 , and more. In short, we use these to fulfil our daily life /daily routine tasks. An application that matches to this category is Restaurant Finder Application developed for Android Phones. The major objective of this Android application named as “Restaurant Finder Application” is to create a full-fledged Android application which can locate a various restaurants based on nearby location and type of cuisine wanted by the user. The user can find all the restaurants in the city and can also make a choice of the best restaurant based on the reviews and rating and cuisine he/she chooses to enjoy.The user can also search best restaurant around his /her area using his/her devices GPS.This application is with beautiful user interface that will attract user and makes it more user friendly.The Project is developed using Android Studios(2.2).Android has its own virtual machine "Dalvik virtual machine" which enables this Android application to run on any device and makes it an open source application. For user interface we have worked \

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Technique To Secure Data Storage And Sharing Using AES[ ]


Storage Security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network. The network must be easily accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted by using any type of cryptography security algorithm (Such as DES or Triple DES or AES).These algorithms are symmetric key algorithms which uses same key for encryption and decryption. All users should be informed of the principles and policies that have been put in place governing the use of the network.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Speech Enabled System for Robot[ ]


The science of speech recognition has been advanced to the state where it is now feasible to communicate reliably with a computer or machine by speaking command to it in a disciplined manner using a vocabulary of the moderate size. It is the purpose of this paper to outline the fundamental concept of voice operated machine, Robot in this case. Now-a-days, Scientists are trying to develop Human-like or Humanoid Robots to enable them for work which either a simple human can’t perform or takes more time. Voice System which will be used for controlling the Robot via speech input from any user with the help of an Android application using Bluetooth technology. Voice Recognition system allow people to control a machine by speaking to it through a microphone, entering text, or issuing commands to the system

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cloud computing Network Problem and Storage solutions Using Ant colony optimization[ ]


Cloud computing is the most network-centric distributed computing, parallel computing and grid computing Where successful transition to Cloud will depend on a excel network foundation .One of the fundamental issues in this network environment and storage I related to task scheduling is flexible access and use of resources in network technology where service provider connected through Internet. Cloud computing disregards the need of having a complete infrastructure of hardware and software to meet users requirements and applications. Cloud users to understand and design more of the network to which they are exposed .This paper aim to address most of this network problem and their possible solution using Ant Colony Optimization (ACO) algorithm.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ensuring Data Storage Security in Cloud Computing[ ]


Cloud Computing is now popular as the next generation architecture of the IT Enterprise. The situation in the conventional solutions is that the IT services are under proper physical, logical and personnel controls whereas Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully reliable. This special attribute poses many new security challenges which have not been well understood. Here we will talk about the cloud data storage security, which has always been an essential aspect of quality of service. To ensure the exactness of users’ data in the cloud, we propose an effective and versatile classified strategy with two features, opposing to its predecessors. By using the homomorphic token with distinguished affirmation of erasure-coded data, our strategy achieves the integration of storage correctness insurance and data error localization which is the identification of misbehaving server(s). The new strategy further supports efficient and secure the dynamic operations on data blocks, which includes like data update, delete and append. Performance and the immense security analysis shows that the proposed strategy is highly resilient and efficient against malicious data modification attack, and even server colluding attacks.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Question Answering System Using NLP and AI[ ]


The Paper aims at an intelligent learning system that will take a text file as an input and gain knowledge from the given text. Thus using this knowledge our system will try to answer questions queried to it by the user. The main goal of the Question Answering system (QAS) is to encourage research into systems that return answers because ample number of users prefer direct answers, and bring benefits of large-scale evaluation to QA task.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Destiny of Silicon Machine[ ]


Computer science is undergoing a fundamental change that is changing our mindset towards the world. An important aspect of this change is the theory and applicationsdealing with the gathering and analysing of large real-world data sets. In this paper, weintroduce four research projects in which processing and interpreting large data sets is a central focus. Innovative ways of analysing such data sets allow us to extract useful informationthat we would never have obtained from small or synthetic data sets, thus providing us with new insights into the modern world.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A survey on E-learning Approaches[ ]


E-learning is an electronic learning which means using a computer to deliver part. It plays a vital role in a persons’ life. The objective of this study is to find various analysis phases of e-learning, its comparison among various other techniques of learning and how it can be implemented in schools, colleges. This paper is divided into eight sections

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Analytical review of different technologies of Cloud Computing[ ]


Cloud Computing offers us a means by which we can contact the applications as services, over the Internet. It permits us to create, configure, and customize applications online. Cloud computing is an emerging model of business computing. In this paper, we discover the concept of cloud architecture and compares cloud computing with grid computing. We also address the features and applications of several popular cloud computing platforms. This paper address to pinpoint the challenges and issues of cloud computing. Index Terms cloud computing, architecture, challenges, cloud platforms, research issues.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Developing Mobile Application Using Android Platform[ ]


This paper focusses on the creation of equipment of versatile world, the execution list is much higher than the genuine necessities of the product setup. Telephone's components more rely upon programming. As the Android working framework is getting more famous, the application in light of Android SDK pulls in a great deal more consideration. However, now, a percentage of the Android application interface is excessively lumbering, pop-up advertisements is overmuch and the capacity is excessively single, these cause some drawback, making it impossible to the clients. Three sorts of uses are created base on Java and Android SDK - video player and sound player.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Big Data Analytics Of Global E-Commerce Organisations: A Study, Survey And Analysis[ ]


In recent years there has been an increasing emphasis on big data analytics (BDA) in e-commerce sector. However, this domain remains rarely-explored as a concept, which restrained its theoretical and practical development. This position paper is based on exploring Big Data Analysis in e-commerce sector globally as well as on the national level by drawing on a systematic review of the literature. This paper presents an interpretive framework based on exploration of the definitional aspects, distinctive characteristics, types, business values and challenges of Big Data Analytics in the e-commerce landscape. The paper is also responsible in triggering broader aspects of discussions regarding future research challenges and opportunities in theory and practice. Overall, the findings of the study synthesize diverse Big Data Analytics concepts such as definition of big data, types, nature, business value and relevant theories providing deeper insights along the cross-cutting analytics applications in e-commerce.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Big Data Analysis of News and Social Media Content[ ]


The analysis of media content has been vital in social sciences, due to the key role that media plays in determining public opinion. This kind of analysis typically relies on the coding of the text being examined; a step that involves reading, annotating it, and that limits the sizes of the corpora that can be analyzed. The use of modern technologies from Artificial Intelligence allows researchers to computerize the process of applying different codes in the same text. Computational technologies also enable the automation of data collection, preparation, management and visualization. This provides opportunities for performing massive scale investigations, real time monitoring, and system-level modelling of the global media system. We describe how the analysis of content on Twitter can reveal mood changes of entire populations, how the political relations among US leaders can be extracted from large corpora, how we can determine what news people really want to read, how writing-style in articles change among different outlets etc. Most importantly, this paper aims to demonstrate some of the steps that can be automated, allowing researchers to access patterns that would be otherwise out of reach

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
LITERATURE REVIEW ON ETHICAL ISSUES IN DIGITAL MARKETING[ ]


In this era of digital marketing, communication and information technology have changed the scenario of the way marketers approach consumers. It is preferred because it is least in cost as compared to offline approach and is most effective. It is widely adopted by online virtual mega stores. But, there are many instances of fraudulent practices on the part of online stores. This is resulting in the negative attitude formation of consumers towards online shopping. Indian Consumer is already scared and is slowly gaining confidence. But, news and instances of cheating, fraud and misuse of bank account information are putting hurdles in progress of digital marketing at the infant stage itself. Not only this, many marketers are following unethical ways to approach the consumer .We all are aware, it is easy to wear the mask of any other online user by fiddling with the IP address and even spoof the email ids. Unethical or misusage of digital marketing for fraud against the common consumer has raised the guards and thus made the task of marketers difficult. Only awareness of consumers can help them distinction between the good and the bad. This paper is an attempt to bring conceptual clarity about functioning of mail servers;giving us the ability to judge the difference in genuine and fake emails; drawing the framework of ethics in digital marketing andfinally, to suggest technical safety measures to be adopted by consumers.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Detection and Prevention of Web Application from SQL Injection: A Study, Survey and Analysis[ ]


The goal of this paper is to build an automated fix generation method to prevent SQL injection vulnerability from plain text SQL statements. In an automated method approach, a server will gather information about previously known vulnerabilities, specifically SQL statements, generate a patch, and apply patch. The process can be completed by someone with no security expertise and secure legacy code, which will allow developers to fix the SQL injection vulnerability. Database services having interactive web applications targeted by an SQL Injection. Data as a input is given by the user and that input is used as to form SQL statement at runtime in these applications. An attacker might input a malicious or harmful query segment when user inputs any SQL statement during SQL Injection attacks, which could result in a different database request.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Developing Monitoring System for Analyzing Client and Server Activities[ ]


Security of networks has always been a major problem in the new enterprise environment. A number of ways have been thought of and implemented to ensure security over the infrastructure all over the Internet. Firewalls, VPNs (virtual private networks), intrusion detection systems are used to secure systems from attacks and any kind of misuse. Similarly monitoring of clients over a network becomes an essential function so as to enhance the performance the cyber infrastructure. Section I introduces the subject of security of network and the need of an application to monitor activities of clients. Section IV is a detailed System model of the Activity Monitoring System (AMS). Section III explains the need of an AMA. Section IV explains the features. Section Vi describes the benefits, Section VIII concludes the paper, and Section X presents the references.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Symmetrical Analysis of 3D Facial Recognition in Virtual Modes: A Concepts[ ]


Object recognition and identification of different types of the shapes is relatively new now a day’s emerging as advanced technology. The process of object recognition in the different virtual world is now more sensitive and required more efficiency on real time basis. Thus the real time analysis of different object is more important and recognition of the face is one of them [1]. Face is a identical and the unique identity of the person which require for recognition and identification. The master data base of the face recognition are stored in the cluster data bank and its requires proper filling of various object in that particular mass memory for safe extraction of the face and comparison and recognition of the face in the real time

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Relationship Marketing through Social Media[ ]


Customer Relationship building marketing was described as a paradigm shift in the mid-1990s and has continued to evolve in a range of different business environments. During this time, consumer’s expectations have changed due to the fact that “net-generation” consumers have been immersed in technology and two-way communications since birth and expect businesses to engage with them and embrace relationships. Today’s sport apparel marketers operate in an environment where consumers of all demographic groups are increasingly literate with social media and have significant advancements in technology at their fingertips. This situation presents opportunities and challenges for marketers, who must adopt new approaches and take advantage of micro-blogging media such as facebook, twitter, flickr, google+, tumblr and content aggregators.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------