@article{Ojha_2015, abstract = {No Abstract}, added-at = {2015-08-27T09:22:58.000+0200}, author = {Ojha, Vibha and Gupta, Deepak and Singh, Ravindra}, biburl = {https://www.bibsonomy.org/bibtex/2df94517d43e244c90853d3ba01b35bfd/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504153}, interhash = {659d7e4e6604ff382a5508f94907142d}, intrahash = {df94517d43e244c90853d3ba01b35bfd}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Keywords No}, month = {april}, number = 4, pages = {2483--2487}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:22:58.000+0200}, title = {{PGP} Implementation with {IDEA}}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504153}, volume = 3, year = 2015 } @article{Gurki_2015, abstract = {Image fusion which is a technique to provide the resultant and complete information when two images are combined at a single image. It is widely used application mainly for medical and multifocus imaging. Here in this paper we have proposed combination of multilevel image fusion and geometric based fusion technique. Initially fusion is carried out by multilevel image fusion technique, which includes either wavelet transform or curvelet transform, and at second level fusion is carried out by spatial or laplacian pyramid transform. Further geometric fusion technique will be applied by using the technique of Affine transform. Finally the performance will be evaluated by different quality metrics, which are used to prove the curvelet transform result better performance than wavelet transform in multilevel fusion, and affine transform will produce more resultant than both wavelet and curvelet transform. The proposed system is very unique technique in which this application will be more useful for medical, and satellite imaging.}, added-at = {2015-08-27T09:21:49.000+0200}, author = {Gurki, Laxman and Jayanthi.M.G}, biburl = {https://www.bibsonomy.org/bibtex/2f3bdb95da385bf667753eaef2df8dbe7/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504152}, interhash = {bdbd8b762f1b1ff703c102d3b375a44f}, intrahash = {f3bdb95da385bf667753eaef2df8dbe7}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Averaging Curvele Discrete Fast Fusion Image Laplacian Metrics Minimu PCA PSNR Pyramid Quality RMSE SD Transform Wavelet selection}, month = {april}, number = 4, pages = {2479--2482}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:21:49.000+0200}, title = {Comparative Analyses of Multilevel and Geometric Image Fusion Techniques}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504152}, volume = 3, year = 2015 } @article{Priyanka_2015, abstract = {Cloud Computing is a technology that provides services to users such as software as a service, platform as a service and storage as a service. These services are provided based on Pay-per-Use basis so these services are cost effective and flexible. Due to this advantage of cloud computing, the individuals as well as the enterprises are getting motivated to shift their local sensitive and huge data management system to cloud storage. But the sensitive data has to be encrypted before outsourcing in order to provide security to the data. After the data has outsourced it has to be utilized efficiently without losing the originality as it was stored. In this paper we provide a mechanism called ”Multi-keyword Ranked Search over Encrypted cloud data” that gives better and efficient searched result over the encrypted data taking multiple keywords as query, which obsoletes the tradition searching scheme based on plain text search. And we use a “Coordinate Matching” technique to find as many matches as possible and use “inner product similarity” to retrieve relevance search results. So if user wants to retrieve the data stored on cloud, he can specify the multiple keywords and rank for relevance retrieval of results. Finally results the user with top ranked files.}, added-at = {2015-08-27T09:20:01.000+0200}, author = {Priyanka, Ms. and N, Mrs. Veena}, biburl = {https://www.bibsonomy.org/bibtex/2812e688fc06858d861b91ffa48d89f6d/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504151}, interhash = {c181186af563490c007e7d2509882b74}, intrahash = {812e688fc06858d861b91ffa48d89f6d}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Cloud Coordinate Encrypted Multi Privacy Search computing keyword matching preserving}, month = {april}, number = 4, pages = {2474--2478}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:20:01.000+0200}, title = {Secure and Efficient Utilization of Encrypted Cloud Data using {MultiKeyword} Ranked Search}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504151}, volume = 3, year = 2015 } @article{S_2015, abstract = {World Wide Web is consist of large amount of information and provides it different kinds users. Everyday number of users use log on internet.. Internet information growing enormously. Users accesses are documented in web logs. As huge storage log files are growing rapidly .One of the application of Data Mining is Web Usage Mining works on users logs. It consist of various steps such as user identification ,session identification and clustering. Again removing robot entries. In previous years data preprocessing analysis system algorithm on web usage mining has been used buts algorithm lacks on scalability problem. This proposes session identification process and building transaction preprocessing ,data cleaning by using efficient data mining algorithm . The experimental results may show considerable performance of proposed algorithm.}, added-at = {2015-08-27T09:18:31.000+0200}, author = {Kontamwar, Shital S. and Warbhe, Prof. Anil and Dubey, Prof. Shyam.}, biburl = {https://www.bibsonomy.org/bibtex/2ee1eb6e9bb0122cdf6422efe41a1a761/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504150}, interhash = {1496171d03985dcde3e2554d9fef9f4f}, intrahash = {ee1eb6e9bb0122cdf6422efe41a1a761}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Apriori Clustering Data K-medoid Mining preprocessing}, month = {april}, number = 4, pages = {2471--2473}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:18:31.000+0200}, title = {A Review {\textendash} Clustering and Preprocessing For Web Log Mining}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504150}, volume = 3, year = 2015 } @article{Sharma_2015, abstract = {The “Identification of Alphanumeric pattern using Android” is a smart phone apps using Android platform and combines the functionality of Optical Character Recognition and identification of alphanumeric pattern and after processing, data is stored in server. This paper present, to design an apps using the Android SDK that will enable the Identification of Alphanumeric pattern using optical character reader technique for the Android based smart phone application. Camera, captures the document image and then the OCR is convert that image in to text (Binarization of captured data) according to the Alphanumeric (alphabetic and numeric characters) database and data stored in server.}, added-at = {2015-08-27T09:17:18.000+0200}, author = {Sharma, Anamika and Jha, Suman Kumar}, biburl = {https://www.bibsonomy.org/bibtex/2a4cd429b2816009eb5f3c3e48cf4cb88/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504149}, interhash = {83c70e3e61c5b07c443cd121754a6d72}, intrahash = {a4cd429b2816009eb5f3c3e48cf4cb88}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {ADT API Android Eclipse NDK OCR SDK Tess Tesseract Tools cloud computing engine in plug two}, month = {april}, number = 4, pages = {2466--2470}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:17:18.000+0200}, title = {Identification of Alphanumeric Pattern Using Android}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504149}, volume = 3, year = 2015 } @article{V_2015, abstract = {MANET Mobile ad-hoc networks (MANETs) is wireless network composed of various wireless equipment connected without any pre-existent infrastructure. It connects various types of equipment through wireless networking. But whenever this network has to communicate with other system it takes the help of its neighbor to send the data so it needs the corporation from other nodes of the network. Also when any node is no relation with the sending data it acts as a medium to forward the unrelated traffic. This is the ideal condition which is expected but in real world most nodes may have selfish behavior who are not corporate to forward the packet to save the resource. So in this paper we are going to study of the selfish node in MANET & their behaviors in various aspects.}, added-at = {2015-08-27T09:15:31.000+0200}, author = {Bhujade, Vaibhav V. and Chaudhary, Deepak and Raut, Suraj V.}, biburl = {https://www.bibsonomy.org/bibtex/24078ea81c70dd8373c5d724cfdc0b189/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504148}, interhash = {d43e615649b712b2a47e4dc4053c50fa}, intrahash = {4078ea81c70dd8373c5d724cfdc0b189}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {MANET nodes selfish}, month = {april}, number = 4, pages = {2461--2465}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:15:31.000+0200}, title = {A Review Paper on Behavior of Node in {MANET}}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504148}, volume = 3, year = 2015 } @article{Hussein_2015, abstract = {Governments' and other reports indicate the critical state of disrepair of the infrastructure and call for urgent actions. Delaying prompt actions implies catastrophic failures and probable human loss. The technological assessment and/or monitoring of the infrastructure components is one of the means to reduce the vulnerability of those systems. This approach is essential in any urban development in general and in particular when sustainability is required. Data about the health of a system is always required for engineering calculations. Nonetheless, the true conditions are challenging in many situations because of the complexity of geometry, framing systems, detailing of connections, workmanship, etc. This paper presents smart technologies to reliably assess the health condition of three selected infrastructure components: utility poles, connections, and falling impacts. The presented technologies are based on the rigorous engineering fundamentals and are demonstrated using digital tools.}, added-at = {2015-08-27T09:12:56.000+0200}, author = {Hussein, Rafaat}, biburl = {https://www.bibsonomy.org/bibtex/2c2fcdbc5754493a83c87958d0a0bbd9e/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504147}, interhash = {c519763ffe01a94b23edd414d0021095}, intrahash = {c2fcdbc5754493a83c87958d0a0bbd9e}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Connection Dynamic Falling Impacts Inspection Nondestructive Poles Soil Strength Structures Utility Vibration}, month = {april}, number = 4, pages = {2456--2460}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:12:56.000+0200}, title = {Smart Technologies for Health Assessment and Monitoring of Infrastructure Components}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504147}, volume = 3, year = 2015 } @article{Andhare_2015, abstract = {This paper focuses on the design and development of an optimization charging system for Li–Po batteries with the help of solar tracking panels. Therefore, the implementation of a complete energy management system applied to a robotic vehicle. The proposed system is to design Moving robotic Vehicle. The design concept, based on a microcontroller. On this basis, our proposal makes a dual signi?cant contribution. First upon, it presents the construction of a solar tracking mechanism aimed at increasing the robots power regardless of its mobility. Secondly, it proposes an alternative design of power system performance based on a pack of two batteries. The aim is completing the process of charging a battery independently while the other battery provides all the energy consumed by the robotic vehicle.}, added-at = {2015-08-27T09:10:38.000+0200}, author = {Andhare, Gaurav and Shelar, Sachin}, biburl = {https://www.bibsonomy.org/bibtex/2aaedeecfc4f1465b83c0c7b7881caac8/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504146}, interhash = {a098742c2938e20cb4b06fb10dc1d3aa}, intrahash = {aaedeecfc4f1465b83c0c7b7881caac8}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {(PV) Arduino Li Po battery photovoltaic robotic solar tracker vehicle}, month = {april}, number = 4, pages = {2452--2455}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:10:38.000+0200}, title = {Solar Powered Optimal Battery Charging Scheme For Moving Robotic Vehicle}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504146}, volume = 3, year = 2015 } @article{Sara_2015, abstract = {In this paper oscillometric method is used to develop an adaptive non-invasive blood pressure measurement system. To overcome the drawback of conventional oscillometric method an algorithm is developed. During the time of deflation and inflation process the step size of pressure pumped and released using pump and valve respectively is varied adaptively by continuously monitoring the feedback which in turn reduces the time required without compromising the accuracy of the output. The pressure condition of the patient is considered rather than blindly inflating till a constant set pressure. It mainly focuses on the estimation of the MAP value during process of deflation instead of waiting till the complete deflation for faster computation. Comparison of the results and the time taken were done with that of the other different methods. This is best suited for a wide range of 60/30 to 180/120}, added-at = {2015-08-27T09:09:25.000+0200}, author = {Thomas, Julin Sara and Pallavi, Dr. Andhe}, biburl = {https://www.bibsonomy.org/bibtex/2859e2c167d31d93735d2cfde765678b1/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504145}, interhash = {ae4d47d50abc312d33d1cf363e3e810c}, intrahash = {859e2c167d31d93735d2cfde765678b1}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Mean arterial deflation diastole inflation pressure systol}, month = {april}, number = 4, pages = {2447--2451}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:09:25.000+0200}, title = {Adaptive Noninvasive Blood Pressure Measurement}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504145}, volume = 3, year = 2015 } @article{Arora_2015, abstract = {Social and network computing demands effective, offering and sparing of image data, which has dependably been an incredible test. Individuals are imparting, transmitting and putting away a great many images every moment. Video coding is a process of compressing and decompressing a digital video signal. The transmission of large size video is facing limitation due to the limited bandwidth and storage capacity. The solution for this is the video compression. In video coding for compression, the basic idea is to exploit redundant data. High Efficiency Video Coding (HEVC) is currently being prepared as the newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The fundamental goal of the HEVC standardization effort is to enable significantly improved compression performance relative to existing standards. Thus, this paper reviews various standards and techniques and highlight the need for compression.}, added-at = {2015-08-27T09:08:23.000+0200}, author = {Arora, Vanshika and Saini, Hardeep}, biburl = {https://www.bibsonomy.org/bibtex/21ac14c22c6ed595c1a3df8a31871d3bd/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504144}, interhash = {891921d1f87d7973b5beec7efb49ceed}, intrahash = {1ac14c22c6ed595c1a3df8a31871d3bd}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {(AVC) (HEVC) (JCT (MPEG) 264 Advanced Coding Collaborative Efficiency Experts Group H High Joint Moving Picture Team VC) Video coding on video}, month = {april}, number = 4, pages = {2443--2446}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:08:23.000+0200}, title = {A Review on Different Video Coding Standards}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504144}, volume = 3, year = 2015 } @article{Satput_2015, abstract = {Abstract: Security has become one of the major issues for data communication over wired and wireless Network. Due to the transmission of valuable data over the network, security is the big issue for the information technology sector. For the data transmission in network may not be secure and is defenceless to many threats. The various security mechanisms have been incorporated in the recent times, which greatly improve the data security. In this paper the new way of transmission, the information using a routing algorithm such as DSDV or AODV with encryption algorithm (i.e. Reverse Encryption Algorithm (REA)) improve the data security over network}, added-at = {2015-08-27T09:06:48.000+0200}, author = {Satput, Kaustubh and Satpute, Charudatt and Tikhe, Gajanan}, biburl = {https://www.bibsonomy.org/bibtex/2c7c5e4ac5e36f1675e44effc5a802f9a/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504143}, interhash = {8d66cb2493e09eab8011560240abb2fb}, intrahash = {c7c5e4ac5e36f1675e44effc5a802f9a}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {AODV DSDV Data Encryption Protocol Routing Transmission}, month = {april}, number = 4, pages = {2440--2442}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:06:48.000+0200}, title = {Review on Data Transmission using Dynamic Routing And Reverse Encryption Algorithm}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504143}, volume = 3, year = 2015 } @article{Gehi_2015, abstract = {Abstract – Network bandwidth plays an important role in evaluating any application’s performance running on a computer. Objective of this paper is to implement a Network bandwidth simulator. This simulator would be based on various types of data patterns seen in a typical network and replicate similar patterns in the simulated data feed. Monte Carlo simulation principle would be used to implement the data simulator.}, added-at = {2015-08-27T09:05:34.000+0200}, author = {Gehi, Bhushan}, biburl = {https://www.bibsonomy.org/bibtex/28c7f12db4d6e9c512721cf9a9e10e017/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504142}, interhash = {7519563fe964442ce8ea6c764cfbc5d4}, intrahash = {8c7f12db4d6e9c512721cf9a9e10e017}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Carlo Data Monte Simulation Simulator}, month = {april}, number = 4, pages = {2437--2439}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:05:34.000+0200}, title = {Network Bandwidth Simulation using Monte Carlo Principle}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504142}, volume = 3, year = 2015 } @article{Parmar_2015, abstract = {E-commerce is increase rapidly in India in the form of online shopping. An IT firm Accel Partners has released some data’s on online shopping in India. According to them Indian online shopping industry have a turnover of 700 crore Rs. by 2015 and around 30 lacs Indian shopper used online shopping. The main objective of this research is to study, especially what is the major option for payments in online shopping. There is several option of payment in online purchasing such as credit card, debit card, cash on delivery, EMI option, gift voucher or wallet Rs. of particular site. To this end, a survey was conducted and the 120 questionnaires were distributed among the people of different markets and the general public in Bikaner. The replies have been analyzed by table analysis.The results of study reveal that on-line shoppers in India are significantly affected by various payment options which are describe above. The results of the study could be further used by the researchers and practitioners for conducting future studies in the similar area.}, added-at = {2015-08-27T09:04:33.000+0200}, author = {Parmar, Chirag}, biburl = {https://www.bibsonomy.org/bibtex/211022d3ba76a9eb30d7c1a45573fc495/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504141}, interhash = {8c1939278389b0716aa96359a5b23f35}, intrahash = {11022d3ba76a9eb30d7c1a45573fc495}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {E commerce online option payment shoppers}, month = {april}, number = 4, pages = {2433--2436}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:04:33.000+0200}, title = {A Comparative Study on Various Payment Options in Online Shopping}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504141}, volume = 3, year = 2015 } @article{Geetha_2015, abstract = {As wireless sensor network is an emerging technology nowadays, it is prone to many attacks like denial of service, wormhole, clone, Sybil etc. Sybil attack is a harmful attack which affects the sensor network in routing the information. It is a malicious device that it takes multiple fake identities. This malicious device make the sensor node into Sybil node and get the information from other sensor node and send the different information to receiver or it keep the information with itself and delay the information to reach the receiver. To detect the Sybil node, we proposed a TIME-TO- TIME MESSAGE (TTM) model to detect the Sybil attack in wireless sensor network. In this method, each and every node in the sensor network will maintain an observation table for storing node id and location which is useful to detect the Sybil attack. The approach is simulated in a sensor network and the result shows a very good detection rate comparing with other existing algorithms.}, added-at = {2015-08-27T09:03:31.000+0200}, author = {Geetha, C. and Ramakrishnan, M.}, biburl = {https://www.bibsonomy.org/bibtex/217d41b6f540192be3f12b9066fc080a6/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504140}, interhash = {5173353bf5351fbe7a3a23f5177dc14b}, intrahash = {17d41b6f540192be3f12b9066fc080a6}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Attack Message Network Path Sensor Sybil Time To Tracing Wireless}, month = {april}, number = 4, pages = {2428--2432}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:03:31.000+0200}, title = {Detection of {SYBIL} Attack using Neighbour Nodes in Static {WSN}}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504140}, volume = 3, year = 2015 } @article{Srimathi_2015, abstract = {Increased use of the Internet and progress in Cloud computing creates a large new datasets with increasing value to business. Data need to be processed by cloud applications are emerging much faster than the computing power. Hadoop-MapReduce has become powerful computation model to address these problems. Nowadays many cloud services require users to share their confidential data like electronic health records for research analysis or data mining, which brings privacy concerns. K-anonymity is one of the widely used privacy model. The scale of data in cloud applications rises extremely in agreement with the Big Data tendency, thereby creating it a dispute for conventional software tools to process such large scale data within an endurable lapsed time. As a consequence, it is a dispute for current anonymization techniques to preserve privacy on confidential extensible data sets due to their inadequacy of scalability. In this project, we propose an extensible two-phase approach to anonymize scalable data sets using dynamic MapReduce framework, Top Down Specialization (TDS) Algorithm and k-Anonymity privacy model. The resources are optimized via three key aspects. First, the under-utilization of map and reduce tasks is improved based on Dynamic Hadoop Slot Allocation (DHSA). Second, the performance tradeoff between the single job and a batch of jobs is balanced using the Speculative Execution Performance Balancing (SEPB). Third, data locality can be improved without any impact on fairness using Slot Pre Scheduling. Experimental evaluation results demonstrate that with this project, the scalability, efficiency and privacy of data sets can be significantly improved over existing approaches.}, added-at = {2015-08-27T09:01:26.000+0200}, author = {Srimathi, E. and Apoorva, K. A.}, biburl = {https://www.bibsonomy.org/bibtex/28787bc6f51fd0786cef9c6d0c9d67e10/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504139}, interhash = {d3ebfb9bff5481a07ae89996ab9b4aaf}, intrahash = {8787bc6f51fd0786cef9c6d0c9d67e10}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Anonymity Anonymization BigData Data Down MapReduce Specialization Top k}, month = {april}, number = 4, pages = {2421--2427}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T09:01:26.000+0200}, title = {Privacy Preservation in Analyzing {EHealth} Records in Big Data Environment}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504139}, volume = 3, year = 2015 } @article{Manohar_2015, abstract = {Contemporary growths in the field of microelectronics and network communications which make it achievable to organize in a wide range of Wireless sensor network. These sensor networks have recently come into prominence because they have hold the potential to revolutionize many segments. As we know that wireless sensor network suffers from excessive packet loss, over hearing, retransmission of the packet due to node mobility and constant energy dissipation. Routing protocol techniques is one of the research area in wireless sensor network. So by crafting an efficient routing algorithm to improve the network lifetime. In this paper, we are drawing a new technique for cluster-head selection by analyzing the lasting energy of the node and also considering the type of communication between the nodes and cluster-head. This technique is compared with the conventional LEACH. The work is simulated in MATLAB, and the result will shows increasing in the network lifetime by increasing the number of alive node and decreasing the number of dead node.}, added-at = {2015-08-27T08:59:49.000+0200}, author = {Manohar, Khushboo and Darvadiya, A. I.}, biburl = {https://www.bibsonomy.org/bibtex/22b0b19a423d1ec42fc989c4aff185083/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504138}, interhash = {80c930f221f4d870d3cda64a523e2f83}, intrahash = {2b0b19a423d1ec42fc989c4aff185083}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {LEACH WSN energy hard lasting lifetime soft threshold}, month = {april}, number = 4, pages = {2416--2420}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T08:59:49.000+0200}, title = {Lifetime improvement with {LEACH} Protocol}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504138}, volume = 3, year = 2015 } @article{S_2015, abstract = {In this paper, the construct Authentication of automatic data processing system by Mouse Gestures was summarized and its significance towards its Methodologies was illustrated. The Authentication of ancient ways that like victimization text parole or image parole results in less secure and harder to user to recollect. Based on Neural Network formula and its analysis has been user to attain the Biometric Authentication based on user behavior on Neural Network and is additionally surveyed. This paper conjointly conducts a review of the realm of Artificial Neural Network and biometric methods that add another layer of security to computing system.}, added-at = {2015-08-27T08:58:24.000+0200}, author = {Patil, Mr. Vishal S. and Devale, Prof. P. R.}, biburl = {https://www.bibsonomy.org/bibtex/25741f0d1c8c9946e722ec3fbdd6da232/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504137}, interhash = {18cc8e5e1890d55b77a7fc1f916a39a1}, intrahash = {5741f0d1c8c9946e722ec3fbdd6da232}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Authentication Mouse Network Neural authentication behavioral dynamics human interaction pc re statistics user}, month = {april}, number = 4, pages = {2413--2415}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T08:58:24.000+0200}, title = {Biometric Validation by Storing different Patterns using Mouse Gesture Signatures}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504137}, volume = 3, year = 2015 } @article{Jyoti_2015, abstract = {Diabetes is a rapidly increasing illness around the world. It can further cause diabetic rethinopathy(DR). If not treated properly it can make a person blind. Therefore a early detection system for (DR) is required which can be done by detecting abnormalities in eye known as microaneurysms. The main objective of this paper is to find out how different supervised classifiers responds to our morphological operation algorithm of detection of microaneurysms. The performances of the classifiers are examined by the images obtained from databse DIARETDB1 which also gives ground truths.}, added-at = {2015-08-27T08:57:04.000+0200}, author = {Talukdar, Nayan Jyoti and Manohar, Prof. P.}, biburl = {https://www.bibsonomy.org/bibtex/20b64dd447ecc9440a251548452d8edca/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504136}, interhash = {115610de96a2b6e1d17de851264b71bf}, intrahash = {0b64dd447ecc9440a251548452d8edca}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {classifiers diabetic mathematical microaneurysms morphology preprocessing retinopathy supervised}, month = {april}, number = 4, pages = {2408--2412}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T08:57:04.000+0200}, title = {Comparison of Different Supervisied Classifiers in Detection of Microaneurysms}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504136}, volume = 3, year = 2015 } @article{Lakshmi_2015, abstract = {As the technology increases the various attacks to the world also increases in form of diseases which cannot be cure in days. So they should be under the observation of doctor which will be some risk to the doctor for continuous observation. So to hold this condition we provide a system with an architecture of smart health protection using the WS Networking by which the sick people will be treated remotely and can be monitored without any interrupt. In this paper we are briefing about the working of this system, cons and pros of the system. This WS networking system will be designed by using the Adhoc Networking with deployment of sensors to get a good quality of the medical treatment with very less expenses for consulting.}, added-at = {2015-08-27T08:54:15.000+0200}, author = {Mounika, Manne Lakshmi and Umar, Dr. Syed and Silpa, Popuri}, biburl = {https://www.bibsonomy.org/bibtex/2e403709fd997c3e57b42cd5e9df9e1ae/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504135}, interhash = {0dc1fcce514dd80a4a23f9ff6e137a58}, intrahash = {e403709fd997c3e57b42cd5e9df9e1ae}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {D2H E Health Remote WSN surveillance}, month = {april}, number = 4, pages = {2404--2407}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T08:54:15.000+0200}, title = {Architectural Design of D2H Medicare}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504135}, volume = 3, year = 2015 } @article{Yadav_2015, abstract = {Virtual Network Computing or VNC is a largely used client application for accessing ?les and applications on remote computers. When there is high latency between the client and the server, VNC can undergo from major losses in throughput. These losses become obvious in the case of video, where updates are both large and continuous. Message Accelerator proxy for VNC is simple but highly effective solution for video performance while maintaining the advantages of a client-pull system. By operating on the server, it sends updates to the client at a rate corresponding to proxy-server interactions which are quicker than client-server interactions. When testing using video, our Message Accelerator design results in frame rates superior than plain VNC when running under high latency circumstances. Message Accelerator uses the pipelining system for updating the frames, which increases its performance to a great extent. Message Accelerator here is not a hardware part but software that we have to just apply in our video streaming program.}, added-at = {2015-08-27T08:52:48.000+0200}, author = {Yadav, Luvish and Jadhav, Prof. A. J. and Pol, Chaitanya and Teke, Akshay and Yeramwar, Saurabh}, biburl = {https://www.bibsonomy.org/bibtex/2bf1a51dc80ef7fd1b06466a8734e3157/ijritcc}, doi = {10.17762/ijritcc2321-8169.1504134}, interhash = {ed95d2929625b7ee05e37ad9426e50c9}, intrahash = {bf1a51dc80ef7fd1b06466a8734e3157}, journal = {International Journal on Recent and Innovation Trends in Computing and Communication}, keywords = {Accelerator Clients Latency Message Networking VNC Video}, month = {april}, number = 4, pages = {2398--2403}, publisher = {Auricle Technologies, Pvt., Ltd.}, timestamp = {2015-08-27T08:52:48.000+0200}, title = {Video Streaming using Message Accelerator}, url = {http://dx.doi.org/10.17762/ijritcc2321-8169.1504134}, volume = 3, year = 2015 }