Sunday, April 1, 2018

Transformational Planning for Artificial Intelligence


AI - Artificial Intelligence has a considerably different meaning, unique things and diverse functions. Each person looks at it as a distinct theory, an artificial human created core and computer development program, and a system that requires human intelligence and performs special tasks beyond human capacity, such as decision-making, speech recognition, visual perception, and translation of languages.The theory and practice of AI have an origin dating back to 1950 and thereafter, a gradual progress was made to substantiate its precise meaning and performance. 


Considering the rising number of virtual world providing an implicit significance to its theory and practice for the last several decades, an acute interest in AI has now reignited. The dynamic and rapid technological and scientific development pace of AI has created difficulty to predict precisely what path we should take to enable us to alter this world in ways we need to comprehend it, resulting in policies and laws to remain one step at the back of all the technological development.The human beings are very sophisticated and robust intellectual living gadgets on the mother earth, as we have our own intelligence to take decisions, and therefore, we ruled and controlled other living creatures of this planet. 

In the course of time, we learned and acquired various dynamic skills, necessary for survival, yet, our search process went further to explore more than what we have and wanted. The infinite intelligence having no boundaries started to visualize and invent means to help us save more time and to ensure better health, more security and safety and thus ventured to formulate and devise machines that can extend our intellectual capacity for the multitask activities, and memorizing more information than available presently. 

Hence, while imagining the ways to improve our functioning, the first Analytical Engine, Turing-Complete computing machine was invented in 1833 by Charles Babbage, and from that time, the computer machines have transformed Analog era towards the Digital Era. In short, AI is a computational human behavior model, which programs and externally behaves like humans. It is a human extended thought of the computational model, with specific programs that internally operates like humans do. 

By Prachi Shah | Praveen Gautam"Transformational Planning for Artificial Intelligence"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11666.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11666/transformational-planning-for-artificial-intelligence/prachi-shah

paper publication for student, paper publication for engineering, conference issue publication

Using Docker for Containerization in High Performance Computing Applications


Virtualization technology plays a vital role in cloud computing. In particular, benefits of virtualization are widely employed in high performance computing (HPC) applications. Containers have a long and storied history in computing. Unlike hypervisor virtualization, where one or more independent machines run virtually on physical hardware via an intermediation layer, containers instead run user space on top of an operating system's kernel. As a result, container virtualization is often called operating system-level virtualization. Container technology allows multiple isolated user space instances to be run on a single host. In this paper we explain how to deploy high performance applications using docker. 


by Pradeep Murugan | Suraj Subramanian | V. Pandarinathan | Dr. D. Rajinigirinath"Using Docker for Containerization in High Performance Computing Applications"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11591.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11591/using-docker-for-containerization-in-high-performance-computing-applications/pradeep-murugan

research publication, ugc approved journals for engineering, special issue publication

Blockchain beyond cryptocurrencies


A new model for building massively scalable and profitable applications is emerging. Bitcoin paved the way with its cryptographically stored ledger, scarce-asset model, and peer-to-peer technology. These features provide a starting point for building a new type of software called decentralized applications, or dapps. They are more flexible, transparent, distributed, resilient, and have a better incentivized structure than current software models. Centralized systems are currently the most widespread model for software applications. 


Centralized systems directly control the operation of the individual units and flow of information from a single center. Blockchain, a massively replicated database of transactions that's able to avoid Sybil attacks. For the first time, the blockchain lets us achieve decentralized consensus without the use of a centralized server. 

By Pradeep Murugan | Suraj Subramanian | Mr. V Pandarinathan | Dr. D. Rajinigirinath"Blockchain beyond cryptocurrencies"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11589.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11589/blockchain-beyond-cryptocurrencies/pradeep-murugan

multidisciplinary journal, submit paper online, indexed journal

Expert Finding System


Current education system turning to the digital learning technique. E-learning is one of the most widely used methods for the education. E-learning gives experience as individual learning at any time as well as anywhere, so user get more interest, flexibility at learning. In this paper we have introduced e-training platform which has divided into two important part; first part is learning data has to be secured, for securing data we has used file encryption and decryption technique, and second part comes use of data mining techniques and concepts for huge data storage. 


By Nalawade Priyanka | Mane Gayatri | Jankar Priyanka | Kurde Ashwini | Prof. Balwante Shrikrishna Shivrai"Expert Finding System"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11594.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11594/expert-finding-system/nalawade-priyanka

review papers, ugc approved journals for engineering, special issue publication

ATM Security System by using Hybrid Authentication


In current ATM process there is lot of ATM fraud Malicious money transaction and theft are happens by means of lack of privacy protection in current scheme. We address the problem of shoulder-surfing attacks on authentication schemes by proposing Illusion PIN (IPIN), a PIN-based authentication method that operates on touch screen devices. IPIN uses the technique of hybrid images to blend two keypads with different digit orderings in such a way, that the user who is close to the device is seeing one keypad to enter her PIN, while the attacker who is looking at the device from a bigger distance is seeing only the other keypad. 


The user's keypad is shuffled in every authentication attempt since the attacker may memorize the spatial arrangement of the pressed digits. To reason about the security of Illusion PIN, we developed an algorithm which is based on human visual perception and estimates the minimum distance from which an observer is unable to interpret the keypad of the user. In addition, we estimated the minimum distance from which a camera is unable to capture the visual information from the keypad of the user. 

Based on our analysis, it seems practically almost impossible for a surveillance camera to capture the PIN of a Smartphone user when IPIN is in use. In current scheme we also implement the OTP authentication mechanism. This will enhance more security which is attached with virtual Keyboard of ATM machine. So we proposed the concept of ATM protection including shuffling keyboard with OTP authentication. 

By V. Saravanan | M. Sathishkumar | M. Babu"ATM Security System by using Hybrid Authentication"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11535.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11535/atm-security-system-by-using-hybrid-authentication/v-saravanan

research papers, paper publication for engineering, conference issue publication

Fishermen Nautical Border Alert System


The assessment is done on a variety of methods of tracking and alerting the fishermen in maritime using GPS. Navigation in marine is the most important factor used by the fishermen. The tracking system uses the electronic scheme installed on the boat and with software design which allows the client or holder to track the boat location based on latitude and longitude data. Today global positioning system (GPS) technology is becoming the safe tool for navigation purpose. The position and location in sequence can be viewed in electronic map via GPS receiver. 


By Ms. M. Florence Dayana | M. Vengadeswari | G. Keerthana | M. Vinothini"Fishermen Nautical Border Alert System"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11653.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11653/fishermen-nautical-border-alert-system/ms-m-florence-dayana

best journal, manuscript submission, call for paper engineering

Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing


In the developing technologies in the computers the cloud computing is one the way to provide services through the internet to the users in the efficient manner. Cloud based services not only provide users with convenience, but also bring many security issues. The user can store his data in the cloud service. Although cloud computing brings great convenience to enterprises and users, the cloud computing security has always been a major hazard. For users, it is necessary to take full advantage of cloud storage service, and also to ensure data privacy. 


The system proposed a fine-grained two-factor authentication (2FA) access control system, 2FA access control system, an attribute-based access control mechanism is implemented with the necessity of both user secret key and a BBS+ Signatures. The mechanism implemented using CP-IBE(cipher text identity based encryption) and digit signature authority, compare to existing method which provide the paranoid security and achieving the secure data access in cloud computing. 

By Sowmiya. S | Dr. T. Priyaradhikadevi"Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11633.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11633/key-aggregate-based-vulnerable-data-access-control-in-cloud-computing/sowmiya-s

manuscript publication, submit paper online, indexed journal