Monday, February 26, 2018

Cloud Accounting - It's Benefits and Challenges


Cloud accounting refers to transactions performed over the internet. The practice does not require you to install software in your computer or own a server. A cloud computing company that sells accounting services provides remote servers and the applications. It is simply using the internet to access software and storage rather than physically installing it in a computer. Cloud accounting is also known as “online accounting” serves the same function as cloud computing. We have to install only the software on our computer but it runs on servers and we can access it using our internet. 


In some instances, we would not need to install the software on our computer and can access it via web browser. Technological trend of recent years brings forward the concept of cloud computing an innovative model of processing and storage of data that allows companies to run business smoothly. 

The study has made an attempt to find out the benefits and issues of cloud accounting an accounting and decision making abilities of the firm. The benefits are more in compared to the issues involved in using cloud based accounting system. This paper focuses on the impact of cloud accounting on each factor in the entire business area.

By Prof. Piyush. M. Modi"Cloud Accounting - It's Benefits and Challenges"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9620.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/9620/cloud-accounting---it's-benefits-and-challenges/prof-piyush-m-modi

review papers, ugc approved journals for engineering, special issue publication

Friday, January 26, 2018

Basics and Features of Artificial Neural Networks

The models of the computing for the perform the pattern recognition methods by the performance and the structure of the biological neural network. A network consists of computing units which can display the features of the biological network. In this paper, the features of the neural network that motivate the study of the neural computing are discussed and the differences in processing by the brain and a computer presented, historical development of neural network principle, artificial neural network (ANN) terminology, neuron models and topology are discussed. 

By Rajesh CVS | M. Padmanabham"Basics and Features of Artificial Neural Networks" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9578.pdf  

Direct URL: http://www.ijtsrd.com/engineering/mechanical-engineering/9578/basics-and-features-of-artificial-neural-networks/rajesh-cvs

research publication, ugc approved journals for engineering, special issue publication

Data Storing in Multitenant Clouds using Split and Merge Method


Resource Accounting of Shared IT Resources is a technique that distributes the excess dynamic local workload evenly across all the nodes. It is used for achieving a better service provisioning and resource utilization ratio, hence improving the overall performance of the system Incoming tasks are coming from different location are received by the load balancer and then distributed to the data center, for the proper load distribution. Also accounting of the shared resources is very important to process the new requests. Hence in this project, we have designed and implemented the resource accounting technique, called Rameter. 


Rameter consists of 2 parts : 1. Keeps track of the distributed requests. 2. Keeps an account of the resource usage. Also integrated Linear Regression (LR) to monitor the accountability of the CPU usage. For experimental results, we are implementing Apache server as the accounting load balancer to keep track of the virtual machine status. Tomcat server is installed in virtual machine to obtain the job status.

For data secure repository or data recovery in cloud storage we proposed muti-cloud architecture, where the user data is split into 2 parts and both files are encrypted and stored in Cloud 1 and Cloud 2. During the request our technique will merge the 2 parts and provide the response to the requested user. For Cloud storage we are invoking public clouds namely Dropbox and CloudMe. 

By Aswini. S | Prasanna. S"Data Storing in Multitenant Clouds using Split and Merge Method"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9609.pdf  

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/9609/data-storing-in-multitenant-clouds-using-split-and-merge-method/aswini-s

paper publication for student, paper publication for engineering, conference issue publication

Data Injection using Kalman-Like Particle Filter Based Smoother is Diagonalized into Subsystem


Web applications are typically developed with hard time constraints and are often deployed with security vulnerabilities. Automatic web vulnerability scanners can help to locate these vulnerabilities and are popular tools among developers of web applications. Their purpose is to stress the application from the attacker's point of view by issuing a huge amount of interaction within it. Two of the most widely spread and dangerous vulnerabilities in web applications are SQL injection and cross site scripting (XSS), because of the damage they may cause to the victim business. 


The most common types of software faults are injected in the web application code which is then checked by the scanners. The results are compared by analyzing coverage of vulnerability detection and false positives. Added to this it checks whether the domain or URL gives is present in any of the domain blacklist sites. It also provides I Category- the category classification for the given domain. 

So this gives the analyst an advantage of having the Domain rating for the given domain with a lookup on top blacklist providing sites and also the Category Classification for the given domain. Three leading commercial scanning tools are evaluated and the results show that in general the coverage is low and the percentage of false positives is very high. 

Sarumathy. B | Indra. E"Data Injection using Kalman-Like Particle Filter Based Smoother is Diagonalized into Subsystem"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9608.pdf  

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/9608/data-injection-using-kalman-like-particle-filter-based-smoother-is-diagonalized-into-subsystem/sarumathy-b

research publication, ugc approved journals for engineering, special issue publication

Predictive Analytics for High Business Performance through Effective Marketing


With economic globalization and continuous development of e-commerce, customer relationship management (CRM) has become an important factor in growth of a company. CRM requires huge expenses. One way to profit from your CRM investment and drive better results, is through machine learning. Machine learning helps business to manage, understand and provide services to customers at individual level. Thus propensity modeling helps the business in increasing marketing performance. The objective is to propose a new approach for better customer targeting. 


We'll device a method to improve prediction capabilities of existing CRM systems by improving classification performance for propensity modeling. 

By Supriya V. Pawar | Gireesh Kumar | Eashan Deshmukh"Predictive Analytics for High Business Performance through Effective Marketing"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9502.pdf  

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/9502/predictive-analytics-for-high-business-performance-through-effective-marketing/supriya-v-pawar

peer reviewed journals, manuscript submission, call for paper engineering

User Data Integrating with Anti-Collusion Scheme and SVC in Cloud Groups


In cloud computing, user can share data among group members with the characters of less maintenance and little management cost. Sharing data must have security guarantees, if they are out sourced. Sharing data while providing privacy preserving is still a challenging problem, when change of the membership. It might cause to the collusion attack for an unsecured cloud. For existing technique, security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. We propose a secure data sharing scheme for dynamic users. 


Key distribution done without any secure communication channels and the user can get the individual key from group manager.Data deduplication is one of the techniques which used to solve the repetition of data. Our proposed system prevents the replication of files and media file like images, videos. The deduplication techniques are generally used in the cloud server for reducing the space of the server. To prevent the unauthorized use of data accessing and create duplicate data on cloud the encryption technique to encrypt the data before stored on cloud server. 

CloudMe is proposed for cloud storage. All files of data owners are encrypted using AES algorithm and stored in real cloud. Thus we present a secure system architecture design as our initial effort towards this direction, which bridges together the advancements of video coding techniques and secure deduplication. Our design enables the cloud with the crucial deduplication functionality to completely eliminate the extra storage and bandwidth cost. 

By Meenambigai. D | Mathavan. V"User Data Integrating with Anti-Collusion Scheme and SVC in Cloud Groups"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9607.pdf  

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/9607/user-data-integrating-with-anti-collusion-scheme-and-svc-in-cloud-groups/meenambigai-d

multidisciplinary journal, submit paper online, indexed journal

Analysis and Control of Grid Connected DFIG Under Sub & Super Synchronous Modes of Operation


The most reliable system in the present scenario for effective use of the wind power is grid integrated Doubly Fed Induction Generator (DFIG). The implementation of a simple power converter arrangement in the rotor circuit for variable speeds has been proposed. Depending on wind speed, a DFIG based variable speed wind turbine is capable of operating in sub-synchronous or super-synchronous mode of operation using power electronic converters. 


The power flow in the rotor circuit is controlled for controlling the stator power in both the modes of operation by effecting rotor voltage through IGBT in sub-synchronous mode whereas in super-synchronous mode it is controlled by current sequence through LCI. The complete system has been modeled Using MATLAB/SIMULINK blocks and simulation study has been conducted, the operation of the proposed scheme is illustrated at different operating conditions i.e. above and below synchronous speeds. 

By T. Suhasini | M. Mohana Rekha"Analysis and Control of Grid Connected DFIG Under Sub & Super Synchronous Modes of Operation"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9568.pdf  

Direct URL: http://www.ijtsrd.com/engineering/electrical-engineering/9568/analysis-and-control-of-grid-connected-dfig-under-sub-and-super-synchronous-modes-of-operation/t-suhasini

peer reviewed journals, manuscript submission, call for paper engineering