International Journal of Distributed Computing and Technology
https://computers.journalspub.info/index.php?journal=JDCT
<p align="center"><strong>International Journal of Distributed Computing and Technology (IJDCT)</strong></p><p align="center"><strong>eISSN:</strong> <strong>2455-7307</strong></p><p align="center"><strong>Click <a href="/index.php?journal=JDCT&page=about&op=editorialTeam">here</a> for complete Editorial Board</strong></p><p align="center"> </p><p align="center"><strong>Scientific Journal Impact Factor (SJIF): <span>6.035</span></strong></p><p align="center"> </p><p><strong>International Journal of Distributed Computing and Technology (IJDCT) </strong>is a journal focused towards the rapid publication of fundamental research papers on all areas of distributed computing and technology. It's a biannual journal, started in 2015.<strong></strong></p><p><strong>Journal DOI No: 10.37628/IJDCT</strong></p><p><strong>Readership:</strong> Graduates, Postgraduates, Research Scholars, in Institutions, and IT Companies</p><p><strong>Indexing: </strong>The Journal is indexed in Google Scholar, <span>Index Copernicus </span><span>(</span><a href="https://journals.indexcopernicus.com/search/details?id=124929" target="_blank">ICV: 58.42</a><span>)</span></p><p align="left"><strong><span style="text-decoration: underline;">Focus and Scope</span></strong></p><ul><li>Decentralized computing</li><li>Distributed algorithmic mechanism design</li><li>Distributed cache</li><li>Distributed operating system</li><li>Multiprocessor and multi-core architectures</li><li>Synchronization protocols and concurrent programming</li><li>Parallel programming</li><li>Distributed sensor networks</li><li>Pervasive computing</li><li>Optical computing</li></ul><p><strong>Submission of Paper: </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration. </p><p>Papers are accepted for editorial consideration through email <strong>info@journalspub.com or nikita@stmjournals.com</strong></p><p><strong>Abbreviation: </strong>IJDCT</p><p><strong>Frequency</strong>: Two issues per year</p><p><a href="https://journalspub.com/editorial-board/IJDCT/"><strong><strong>Editorial Board</strong></strong></a><strong></strong></p><p><a href="https://journalspub.com/for-author/"><strong>Instructions to Authors</strong></a></p><p> </p>en-USInternational Journal of Distributed Computing and Technology2455-7307Intelligent Travel Card Leveraging Blockchain Technology: A Precautionary Measure Against Contagious Illnesses Such as COVID-19
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=938
<p><em>A smart card is a small, plastic card with embedded integrated circuit chips that can store and process data. These cards are used for various applications, including identification, authentication, and transactions. Smart cards resemble typical cards in appearance, being rectangular, compact, and lightweight. The difference between them lies in their intelligence. These cards incorporate a microprocessor housing a memory chip, enabling them to store significant amounts of data and facilitating both reading and writing operations. The purpose of this study is to safeguard traveller information, including their trip history, by presenting an architecture for a smart travel card that combines the smart card concept and blockchain technology. The suggested concept makes use of smart cards to hold citizen data, including an encrypted template of their biometric features for user verification, technologies for iris and fingerprint recognition, and all relevant trip information. Additionally, the advantages of a blockchain network are taken advantage of to confirm the legitimacy of user transactions and the veracity of the document's authenticity. Along with describing the block structure, transaction types, and blockchain strategy for the smart travel card, the blockchain network architecture is also described. </em></p>Ayesha Anam Irshad Siddiqui
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-10-192023-10-19924348RDTP: Reliable Delay Time Protocol with Duty Cycle Optimization in 6LoWPAN-WBAN
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=936
<p><em>Medium access control (MAC) protocols based on the adaptive duty cycle and the IEEE 802.15.4 standard have recently been proposed to address the Quality of Service (QoS) requirements of wireless body area sensor networks. These QoS requirements include time-bound data transmission services, data rate, reliability, and energy consumption. Providing a comprehensive set of QoS is difficult with the present protocols, though. Furthermore, these protocols adjust duty cycle values by considering factors such as active time intervals, buffer occupancy, and collision rates, leading to decreased energy consumption. These estimates are time-consuming and energy-intensive, making them unsuitable for use in medical settings. We present a tele-medicine protocol (RDTP) for use with IEEE 802.15.4 slotted CSMA/CA in beacon-enabled mode, optimized duty cycles based on fine-tuning MAC layer parameters. Network traffic availability, delay-reliability, and super frame duration are the three parameters that influence the RDTP's operational schedule. Patient monitoring applications necessitate a set of QoS, and the proposed protocol provides all three at once: low latency, high uptime, and low power usage. By altering the number of nodes in the network and the amount of traffic offered, we may calculate the performance of the proposed protocol according to metrics such as average end-to-end delay, dependability, packet delivery ratio, collision rate, and energy usage. When compared to other current protocols within the limitations of patient monitoring applications, the RTDP fared well in terms of delay, dependability, energy usage, and collision rate.</em></p>Illapu Sankara Srinivasa RaoM. Aswini
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-10-192023-10-19922642Data Analytics and Visualization for Unveiling Insights from Digital Twins: Trends and Challenges
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=935
<p><em>igital twins represent a paradigm shift in engineering analytics and simulations. As virtual replicas of physical assets and processes, digital twins require the confluence of massive amounts of data, predictive analytics, and visualization capabilities to unlock their full potential. This study provides a comprehensive overview of the role of data analytics and visualization techniques in extracting value from digital twin data. An in-depth literature review analyzes current research trends and developments in this emerging field. The methodological framework, results, and key findings are presented from an empirical study on the application of machine learning, statistical modeling, and interactive visualizations to generate insights from digital twin data in manufacturing systems. Core challenges related to scalability, uncertainty quantification, and dimensionality reduction are discussed. The study findings demonstrate the pivotal role data analytics and visualization play in creating actionable intelligence from digital twins. This study concludes with an outlook on promising directions for future research at the nexus of data science, visualization, and digital twin technologies.</em></p>Ushaa EswaranVishal Eswaran
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-10-192023-10-1992919General Health Check-up, Health Care Model using CNN and Internet-of-Medical Things
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=937
<p><em>Many people may believe that undergoing a comprehensive medical check-up is unnecessary when they feel perfectly healthy. However, this perception is mistaken. Regular health check-ups are essential to maintain overall well-being and to detect potential health issues early, enabling proactive steps to prevent them from worsening. Such check-ups are valuable for both individuals in good health and those with existing medical conditions, as they provide insight into the progress of ongoing treatments. Furthermore, routine health assessments aid in identifying risk factors associated with specific diseases. For instance, if elevated blood pressure or cholesterol levels are identified, individuals can receive guidance on adopting healthier lifestyles, such as dietary improvements and regular exercise, to mitigate the risk of heart disease or stroke. The integration of Internet of Things (IoT) technologies has transformed conventional healthcare services and has been pivotal in personalized healthcare and disease prevention initiatives. These advancements rely on the effective extraction of insights from lifestyle factors and activities. Intelligent data retrieval and classification models play a vital role in studying diseases and even forecasting abnormal health conditions. To predict such anomalies, the Convolutional Neural Network (CNN) model is employed, which excels in accurately identifying disease-related knowledge from unstructured medical records. Nonetheless, CNNs can be memory-intensive, especially when utilizing fully connected network structures, and adding more layers can complicate the model's analysis. To address these limitations, we propose a CNN-regular target detection and recognition model founded on the Pearson Correlation Coefficient and regular pattern behavior. Here, "regular" pertains to objects that typically appear in consistent contexts with structurally low variability. Within this framework, we develop a CNN-regular pattern discovery model for data classification.</em></p>Sharmili NukapeyiT. Narasimhappadu
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-10-032023-10-03922025A Comprehensive Survey on Optimizing Storage Models, Data Layouts, and System Catalogs
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=931
<p><em>This survey compares four papers that propose solutions for optimizing the storage model, data layout, and system catalogs in data management systems for hybrid workloads, which consist of both analytical and transactional queries. These solutions include a main memory hybrid storage engine that separates the storage of analytical and transactional data and uses a sophisticated query optimizer, a hands-free adaptive store that adjusts the storage layout based on access patterns, a hybrid storage engine that combines the strengths of row- and column- store systems and a column layout optimization method that considers both analytical and transactional access patterns and uses ghost values to support updates. These papers highlight the importance of designing storage systems specifically for hybrid workloads and the need for further research in this area.</em></p>Md. Shifatul Ahsan Apurba
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-08-172023-08-179218A Comprehensive Study of Application of Evolutionary Computing in Multi-stakeholder Recommendation Systems
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=928
<p>Recommender systems are customized data get to applications; they are universal in the present online condition, and compelling at finding things that address client issues and tastes. As the range of recommender systems has broadened, it has become clear that the resolute spotlight on the client regular to scholastic research has clouded other significant parts of suggestion results. Properties, for example, reasonableness, equalization, profitability, and correspondence are most certainly not caught by run of the mill measurements for recommender framework assessment. The idea of multi-stakeholder suggestion has risen as a binding together structure for portraying and understanding suggestion settings where the end user isn’t the sole core interest. This article portrays the usage of evolutionary computing methods for multi-stakeholder suggestions, and the scene of framework plans. Recommender systems are ordinarily intended to streamline the utility of the end client. In numerous settings, in any case, the end client isn’t the main partner and this select center might deliver unsuitable outcomes for different partners. One such setting is found in multisided stages, which unite purchasers and venders. In such stages, it very well might be important to improve the incentive for the two purchasers and merchants mutually.</p>Manas Kumar YogiCH.E.N. Sai Priya
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-08-172023-08-179215System for Predicting and Recommending Placement on Campus
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=926
The campus placement system uses classification algorithms like decision trees, random forests, support vector classifiers, and logistic regression to estimate the likelihood that an undergraduate student will be hired by a business. The placement prediction method assists in identifying students’ needs and the areas in which they fall short, allowing students to strengthen their profiles and increase their chances of being placed. The placement predictor uses a number of parameters that can be used to assess the student’s ability level. The predictor successfully predicts whether or not the student will be placed in a business using these data points. The predictor is trained using information from previous pupils.Payal BhandwalkarManasi ChikhalkarSakshi KorgaonkarAnagha SheteCharusheela Pandit
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-07-182023-07-18921825A Study on Raspberry Pi Method for Examining Personal Cloud Storage
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=927
<p>The guide explains ways to set up a personal cloud storage using a Raspberry Pi rather than using storage facilities from other companies like Dropbox, Google Drive, iCloud, and so on. In this dynamic environment and ever-changing technologies, security of our data is utmost important as well as the storage we need to store data and have control over our data. We focus on the matters mentioned above. The fact that other users can use third-party Cloud services raises questions about security. Those cloud service providers also charge us a hefty fee for using their services, provide scant storage, and have some control over our data. Employing a Raspberry Pi, we can employ an external hard drive as personal cloud storage. We can decide the amount of memory by ourselves and can have full control over our data.</p>Shobhana JoshiR. HemalathaK. Uma LakshmiS. Sai Shashank
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-07-182023-07-18922635Effective Use of Various Types of Software Testing and Its Applications to Bug Free Software
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=929
<p>The significance of software testing lies in its ability to minimize errors, streamline maintenance efforts, and reduce overall costs associated with software development. For now, about the full details of any software development, there is a concept of software development life cycle. It describes the stages of the software development. The software testing process is crucial for executing a program to discover errors and evaluate the characteristics of the software. Software testing consists of multiple stages and covers essential principles that should be familiar to software engineering students and faculty, including design and development. The main objective of this article is to analyze and compare different testing techniques with determine the most effective one for identifying software bugs. Testing brings several benefits, including bug prevention, cost reduction, and performance improvement. A test management plan is also important in overseeing the testing process. Software testing involves assessing the functionality of a software program to identify errors and gaps and ensure that the application meets the desired expectations before deployment. Software Quality Assurance testing assesses the functionality, performance, usability, and security of software. It is a crucial step as it detects issues and defects in the code, allowing them to be addressed before delivering the software product. Software testing plays a crucial role in improving product quality, which is vital to ensure customer satisfaction. The software testing lifecycle is significant because it guarantees the quality and reliability of web applications. By identifying and resolving bugs or errors in the code, the testing process enables developers to deliver high-quality software that fulfills the needs and expectations of users.</p>Shubham Apparao KurudeKrishna T. Madrewar
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-07-182023-07-1892610Enhancing Hearing Accessibility Through IoT: A Review of Smart Hearing Device
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=930
<p>The challenges faced by individuals with hearing impairments extend beyond the actual loss of hearing and highlight a broader issue of communication barriers. Traditionally, it is assumed that individuals with hearing impairments would struggle with lip-reading and speaking, and therefore, they would benefit from using sign language and attending specialized schools to communicate with others. However, leveraging cutting-edge voice-to-text recognition technology could significantly narrow the gap between the hearing and deaf communities. This innovative project proposes using an online speech recognition service to automatically translate conversations into text messages and display them on a micro-LCD screen. This technology has the potential to benefit not only those with hearing impairments but also the elderly and anyone who may have difficulty communicating. Ultimately, this project aims to facilitate seamless communication and bridge the gap between the deaf and hearing world.</p>Sakshi MoreSayali PatilPrasanna SalviRajashree Gadhave
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-07-182023-07-18921117Students' and Faculty Members' Attitudes Toward Science at Urban and Rural Colleges and Universities
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=870
<p>Identifying and cultivating a favourable attitude toward science among student instructors is critical. Instructors, student teachers, and students at all levels of education should be encouraged to have a positive attitude toward science. Currently, this is an urgent need. This study examines the attitudes of student instructors toward science in relation to their college's location. Students in Hyderabad's Revenue district are included in the study's sample of 1080. Data was collected from the student instructors using a questionnaire on their attitudes toward science. We used percentage analysis, as well as mean, standard deviation, and 't' tests, to analyse the data. The results show that attitudes towards science among student teachers in urban and rural settings are not significantly different.</p>Mohammad Asif Pasha
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-03-132023-03-13923842Sentimental Analysis on Movie Review Using Artificial Intelligence and Machine Learning
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=865
<p>A recent area of study with applications in many other fields is sentiment analysis. Sentimental analysis helps to classify a subject’s sentiments (e.g., positive, negative, or neutral) automatically towards a specific topic, product, news, or any movie. Machine learning is a powerful technique of artificial intelligence (AI) to control the increasing demand for accurate sentimental analysis. Online reviews, comments, and polls are used to collect a sizable amount of textual data in the modern world. The data collected is all used to improve the products and services that are provided globally by both public and private entities. Finding the important elements that impact a movie review's tone is what we do. This is accomplished by assigning ratings to different aspects of the movie that have the most influence on its polarity. We have found that aspects with high driving factors such as cinematography and editing affect the review polarity most. The aim of this study is to shed light on how sentiment analysis works, and how it is developed and applied in the real world.</p>Divyanshu AthwaniDouli SutharMohit SoniAbhay Jindal
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-03-102023-03-10924350Health Care System Analysis Using Different Datasets
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=871
<p>In this research work, we have discussed data science and various machine learning algorithms like KNN, Support Vector Machine, Artificial neural network, Random forest etc. and the results obtained from these algorithms which can be used for the prediction of heart disease, cancer and in many other fields of medical science. Requirement of data cleaning along with various methods of data cleaning are mentioned here, along with these various issues in handling missing data, removal of duplicate data, fixing structural errors, encoding, dealing with text values etc. This study also contains the literature review of various review papers and research papers. A comparison table is also made using the research observation of various authors which includes algorithms like KNN, Support Vector Machine, Artificial neural network, Random forest, Naive Bayes Classification, Logistic Regression etc.</p>Sejal JainSonam GourSanjivani SharmaSaloni AgarwalShrishti Agarwal
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-03-102023-03-10922937Genre Classification of Music Using Machine Learning
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=867
<p>One of the most important technological advances of the 21st century is artificial intelligence (AI) and machine learning. They are revolutionizing computers, banking, healthcare, agriculture, music and travel. A strong model has mastered many difficult learning tasks. Speech analysis is one area of artificial intelligence. This includes finding information about music, creating music, and categorizing music. Music data is one of the most complex source data available today. This is primarily because it is challenging to pull relevant correlation data from it. Various methods, from classical to neural networks to hybrids, have been tested on music data and achieved excellent accuracy. This study intends to analyse and contrast various approaches to identify the musical genres. On a small sample of the Free Music Archive (FMA) dataset, the accuracy rates were as follows: 46% using Support Vector Classifier (SVC), 40% using Logistic Regression, 67% using Artificial Neural Network (ANN), 77% using Convolutional Neural Networks (CNN), 90% using Convolution-Recurrent Neural Network (CRNN), 88% using Parallel Convolution-Recurrent Neural Network (PCRNN), 73% without using Ensemble technique, and 85% using Ensemble technique of AdaBoost. We established SVC as our baseline model, which had an accuracy of 46%, and we defined the succeeding models to have an accuracy higher than that. For the test dataset, ANN provided us with a score of 67%, whereas CNN outperformed it with a score of 77%. We discovered that imagebased features performed better at categorising the labels than typical audio-extracted features. The dataset responded best to a mix of CNN and RNN, with a series CRNN model providing the highest accuracy. After that, we attempted to train an ensemble model to our dataset and investigated how it functioned. The numerous ways for classifying music genres are thoroughly examined in this research, with an emphasis on some parallel models and ensembling strategies.</p>Partha GhoshSoham MahapatraSubhadeep JanaRitesh Kr. Jha
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-03-072023-03-07921728Soft Computing Techniques for the Integration of Distributed Energy Resources (DERs)
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=863
<p>One of the most attractive uses of AI in the energy sector is the integration of Distributed energy resources. Distributed energy resources relate to grids, the more complex energy networks are becoming for utilities to operate and manage. Mechanisms such as load and generation forecasting, demand response, power quality management, and voltage regulation, which have traditionally been used to manage DERs and the grid, are not sufficient. This is where intelligent and advanced technologies including AI comes into play since it enables utilities to leverage real-time data on grid infrastructure management, market pricing, supply, demand, load profiles, and weather forecasts. The integration of DER is one of the most attractive uses of AI in the energy sector.</p>Sheetal S. PatilSuhas H. PatilAvinash M. PawarMrunal BewoorNetra S. Patil
Copyright (c) 2023 International Journal of Distributed Computing and Technology
2023-02-212023-02-2192116Development of Epidermal (TATTOO) Electronic Device with Organic Materials for Tracking Animals
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=790
<p>The objective of the study is to develop epidermal (tattoo) electronic devices for tracking domestic animals using printed organic complementary technology on flexible substrates with high performance N and P-type organic thin film transistor (OTFT) based on small molecules organic semi-conductor. The tracking device could be used to secure, monitor and locate animals. It is a wellknown fact that most animals live a nomadic life. This however leaves most of the animals vulnerable to attack and sometimes go astray with the owner not knowing about their whereabout. Hence the research project tends to proffer solutions in handling such cases. The device was based on organic electronic (OE) materials which allow for the fabrication of virtually every kind organic thin film component and battery. The device circuit incorporated several electronic modules such as GSM modules, receiver module, microcontroller as well as power supply unit. The use of ultra-thin organic field effect transistor (OFET) based circuit aids in light-weighted portable, wearable, conformal and adhesion to animal skin.</p>Joseph Etim OffiongLebe Nnanna
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-07-192022-07-19922431A Review on Crypto coin price prediction
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=789
<p>Due to its advantages over the established banking system, cryptocurrencies have experienced a sharp increase in price in<br />recent years, which has had a positive impact on the economy. As cryptocurrencies are organized by blockchain technology, it<br />inherits its properties such as Decentralization, Transparency, Immutability. In recent years, investors and stakeholders<br />have become increasingly interested in machine learning and AI-assisted trading. The effectiveness of machine learning<br />techniques in predicting the stock market leads one to believe that they may also be used to forecast cryptocurrency prices.<br />According to our initial research most papers/projects have taken ‘sentiment’ as an attribute, but we will be working on<br />real-time data. In this work, we make an effort to forecast the prices of cryptocurrencies, primarily bitcoin and ethereum.<br />For the prediction job, well be using the Long Short-Term Memory (LSTM) model. Trading cryptocurrency prices is a<br />popular kind of exchange now. Both investors and day traders will greatly benefit from using the suggested approach.<br />Facebook Prophet will be the machine learning algorithm used to predict these prices. In a Time, series prediction,<br />Facebook Prophet has a significant level of accuracy and quickness.</p>Rohit MhatreGovind GuptaAakash KadamRitu Jain
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-07-192022-07-19923742Cryptocurrency Analysis Using Python
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=788
<p class="Abstract">Investing in cryptocurrency is more popular these days than it has been in the previous few years. Since there are so many cryptocurrencies available, investing in them may be quite difficult. However, bitcoin is crucial and will not disappear or be limited to 100 years as some have prophesied. Transactions are quick, digital, secure, and international, enabling the maintenance of records without worrying about data theft. In fact, fraud is decreased. What is more challenging is keeping track of cryptocurrency investments because market values change on a daily basis, and most investors have no idea what the cryptocurrency market is like, how it works, how many coins are available, or what their current value is. So, to assist them in navigating these unfamiliar sectors, we are building a platform that will act as a one-stop source for all of their questions. It will not only assist them in learning more about cryptocurrencies, but it will also assist them in keeping track of the cryptocurrency that they have purchased.</p>Dhruv RathodShubham NaikHemalata gosavi
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-07-192022-07-19923236Online Voting Using Blockchain
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=785
<p>Creating an online voting framework that fulfils the legitimate necessities of lawmakers has been really difficult task for quite a while. Blockchain technologies have been used to address all the issues underlying with electronic voting machines. It also provides the infinite number of applicants with the support to connect to the economic systems. The goal is to evaluate the use of blockchain as a service in voting systems and develop an all-new or revolutionary system called as "Online Voting Using Blockchain". It outlines the requirements for developing online voting systems and recognize its legal and technological challenges that come with using this technology as a service to implement it as a system. Begin by evaluating some of the most popular blockchain frameworks and new blockchain terms that provide blockchain as a service. We then propose a blockchain-based online voting system that addresses all of the limitations we discovered in the electronic voting system. This study looks at the possibility of distributed ledger technologies in general, as well as the electoral system and the implementation of a blockchain-based application that enhances security and reduces the election costs</p>Akash KumarAshutosh Singh DengriAnjali GuptaLakshay Rajput
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-06-272022-06-2792623Text Mining for Detecting the Viral Threats from the New Data Set
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=774
<p>There is a lot of information in daily life. The majority of countries have national government organizations that constantly monitor the media and news for new daises. Regarding the national population's health and the latest developments in health care. Local newspapers or electronic media from legitimate sources such as Sinclair Broadcasting or Tribune Media are searched by the national groups. As additional news sources were available on the internet, it became easier to electronically search for and maintain regulatory articles. Simultaneously, accessible resources, as well as increased travel and the associated importation of viruses and diseases. It has become vital to analyze news from neighboring countries and popular tourist locations.</p>Rathod BhimraoUbhe RutvikChikane PayalK. S. Khamkar
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-05-272022-05-279215Blockchain – The Future of Medicare
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=772
<p>Blockchain is a decentralized ledger system that handles data and transactions using time stamped blocks. It operates in a decentralised manner through a computer network. In Medicare, blockchain has a wide range of applications and functions. Blockchain technology aids healthcare researchers in identifying genetic code by facilitating secure patient medical record transfers, controlling the medicine supply chain, and facilitating secure patient medical record transfers. Decentralisation and cryptographic hashing are used in blockchain, also known as Distributed Ledger Technology (DLT), to secure the unalterable and transparent history of any digital asset. To comprehend Blockchain in healthcare, you must first comprehend how this type of distributed ledger technology (DLT) functions and how it can be applied to the larger healthcare ecosystem.</p>Ankita BelelAna Gadala
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-05-072022-05-0792AI for Social Networks: Applying Innovative Algorithm to Reach Mob
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=758
<p>The power of “Artificial Intelligence (AI)” can be applied to a number of platforms, including social media platforms like "Facebook" and "LinkedIn," which uses AI to understand human datasets in pools. Up to 3 billion people use social media around the world to create data in as many ways as possible. This is where AI comes in to manage the true value of vast data. In this virtual era of social media, people can rely on sites such as "Facebook, Instagram, and LinkedIn", whether it's approaching new customers or developing existing business or personal relationships. With such platforms, people can become an important part of a remote city and community. In the business world, managing a good media strategy helps to boost one’s brand potential and engagement on social media, is a great way to put millions of people to stick on social media. AI supports to examine large amounts of data to classify popular topics, hashtags, and techniques for understanding user behaviour. Such type of algorithms can look at millions of user comments without any explanation or data to understand the turbulent situation and provide a personalized experience as well as By providing seamless distribution, technology can help team members to deliver content based on internet activity and demographic behaviour. Many social media sites have acquired AI businesses to move to the next level of online work, research activity, analysis and its implementation.</p>Rahul KumarJyoti SharmaVinod ChhipaSonia Bhargava
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-03-212022-03-21922432Analytical Survey of Functionality of IoT Enabled with Renewable Power Resources
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=757
<p>Termination of energy and power resources are inevitable. All kinds of power and energy resources are vulnerable and in very limited quantity of availability. So, the alternate solutions should be explored in due time to restrain the need of industrial as well as environmental demands. The applications of IoT in renewable energy production involve sensors that are attached to generation, transmission, and distribution equipment. These devices help companies to monitor and control the working of the equipment remotely in real time. This leads to reduced operational costs and lowers our dependence on the already limited fossil fuels. The use of renewable energy resources already provides a variety of benefits over conventional ones. The implementation of IoT will help us utilize these clean energy sources to a further extent.<strong></strong></p>Amit KumarRaj Kumar
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-03-212022-03-21923338Analysis of Cloud-based System for best Performance by Data Centre
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=742
<p>Cloud Computing renders us a means by which one can access or lend the applications as utilities, over the Internet. It allows to construct, develop, configure, and personalize applications online. Cloud Computing is basically a lending system in which the investor or technically the service providers purchase the costly and expensive hardware which people couldn’t afford from the hardware creators and lends them and charges for hourly, monthly or you can say accordingly from the end users. Their performance really matters specially in case of internet-based applications. The first challenge is to run application in lowest speed of internet and second is to do fastest computation parallelly maintaining other resources. A web application as service itself includes DBMS management and thirdparty collaboration which is required to maintain for good performance of application. The Apache Organization is continuously working on open-source development and supporting many projects worldwide, this research can also club with opensource project to extend the scope of research. The Cloud Simulation is used here to estimate the workload and performance of cloud-based system. In this appropriate load balancing service is used to help cloud use resources effectively and avoid failures. Load balancing is used to distribute workloads to all nodes in the network.</p>Sanskriti GargManish Mathuria
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-02-082022-02-08921423AWS Pros & Comparative Study between top CSPs (AWS, Azure, Google Cloud)
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=741
<p>Web has become tireless in day-by-day occupation furthermore Cloud process could be a rising model wherever registering assets offered over the net as adaptable, on-request (Web) administrations. net access must utilize large measures of money on framework must serve gettable purchasers that is not a difficulty for vast endeavor but with regards to little and Medium Enterprises or Enterprise's reasonableness turns into an incredible issue with the stupendous foundation come back problems like machines disappointment, Winchester drive commotions, programming bugs, and so on. Here is also a significant issue for such a network. It’s extraordinarily arduous to settle on one cloud specialist organization from all completely different CSPs. Distributed computing could be a definitive answer to the current issue. As critical buying, introducing and dealing its own frameworks, associate degree association will rely upon a cloud provider to try to do this for them. Distributed computing key market pioneers like Google, Amazon, and Microsoft, and so on, these suppliers give new operating and plans of action that allow purchasers to get the assets they completely use, instead of creating vast forthright speculations. The motivation behind this paper is to research the foremost well-known stages, The Google App Engine, Amazon net Services, and Windows Azure Platform. This paper in addition covers an overview of the points of interest and highlights of AWS. During this paper, the correlation of various CSP is given, which is able to facilitate in taking alternatives for choosing the most effective reasonableness of Cloud supplier as indicated by association/singular stipulations.</p>Chandrika BhargavaAjay Maurya
Copyright (c) 2022 International Journal of Distributed Computing and Technology
2022-02-082022-02-0892113Study and Developing of Diversity Generation Methods in Heretogeneous Ensemble Models
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=673
The article deals with the fundamental problem of generating a diversity of ensemble predictive models. Various approaches to ensemble diversity are described based on varying the input data set, varying the models used in the ensemble, varying within the model itself, and varying the way the results of the ensemble members are combined. A hybrid method for constructing a heterogeneous ensemble based on various types of neuro-fuzzy networks with a synergistic effect of enhancing the ensemble metamodel is proposed.S. V. GorbachevA. E. ArkhipovN. N. GorbachevaS. BhattacharyyaJinde CaoSandip A. Kale
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-07-122021-07-1292815An Importance of Basic Concept Related to Cloud Network
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=677
<p>In this paper covers all the basic concepts related to network of cloud. Cloud network provides the connectivity between the users and applications where the user can access the network via cloud network. Network means collection of group of Computers connected to each other to share the information, files and all. Cloud is also type of network. Now a days technology grows very fast and one of the newest technology is cloud computing. Cloud Computing uses a various applications that executed or run on the Distributed network by using rules and regulation of the networking. There are number of cloud models, services, Applications in the cloud computing. Cloud network provides services to user means service provider offers services like if you want to access the application. Availability of the network is possible at any time that the user wants. The cloud network connection maintain very robust and secure that anyone cannot misuse. Due to Rapid Technology the term cloud is very important in various sectors just like business, Information technology, Government Sector and many more Fields that uses a cloud computing. It uses both small and big organization to store the information. This Paper discusses the concept related to cloud computing architecture, features, benefits etc.</p>Priyanka Madhukar Jagtap
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-07-122021-07-12921621A Review on Artificial Intelligence, Internet of Things and Wearable Technology for Smart Healthcare
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=679
<strong>The healthcare industry is no longer an isolated area unaffected by technology advancements. Healthcare is driven by technology more than any other force, and it will continue to evolve in spectacular ways in the future. Artificial Intelligence, Internet of Things, Big Data, Cloud Computing, Smart Wearables, and other cutting-edge healthcare technologies have transformed traditional healthcare into smart healthcare. Technology has allowed us to keep a close eye on our health in recent years. Wearable technology has transformed the way we process our biology, from bracelets that track heart rate and steps to personal blood pressure monitors and body fat weighing scales. This paper focuses on smart healthcare technologies, which have given the healthcare business a new dimension of “smartness”. It also discusses how to employ wearable devices to track user lifestyle behaviours and provide tools for better personal health management. We'll also look at some of the most important AI and IoT applications in healthcare. In addition, we look at a number of machine learning methods that can be used to provide effective decision support for healthcare applications.</strong>Neeta NathaniVijay Kumar Khatri
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-07-092021-07-09922634A Realtime Coronavirus Notifier
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=678
Fresh corona virus deadly disease has not clinically confirmed vaccine or medicines. Its tolerant are improving through the help of antibiotic drug, anti-viral treatments, over and above vitamin C supplementation. It is currently apparent that the world necessities an expedient and speedier answer for contain and tackle the further spread of COVID-19 across the world with the guide of non-clinical advance for instance data mining schemes, improved aptitude furthermore extra artificial intelligence procedures so as toward moderate the massive load happening the healthcare scheme while provided that the greatest probable income designed for patients' diagnosis along with prediction of the 2019- nCoV disease successfully. In this learning, data mining forms were urbanized on behalf of the calculation of COVID-19 tainted tolerant revitalization via epidemiological dataset of long-sufferings of South Korea. The decision tree, hold machine learning algorithms be functional straight on the dataset via python on the way to extend the representations. The model guessed a smallest and greatest amount of days intended for COVID long-sufferings headed for get better from the disease, the age cluster of patients, high danger not in the direction of get well beginning the virulent disease, those who are probable toward recuperate with persons strength be expected to pick up speedily as of COVID-19 virus.Saksham C.Ritik P.
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-06-302021-06-30922225Smart Building using IOT
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=696
Exemplary brilliant home, web of things, distributed computing and rule-based occasion favorable to cessing, are the structure squares of our proposed progressed savvy home coordinated compound. Every part assumes a significant part in the structure of a brilliant organization. IOT contributes the web association and far off administration of portable machines joined with an assortment of sensors. Sensors can likewise be appended to home related apparatuses, for example, cooling, lights and other ecological gadgets. This would embed computer intelligence into home devices and provide ways so that we can measure home conditions and monitor home appliances’ functionality. Cloud computing provides power, storage space and applications, that can be used for developing, maintaining, running home services, and we can access home devices anywhere at any time. This project proposes an IOT architecture for automation of lighting control in smart homes. The solution binds the open software platforms available on front-end devices and the cloud server, and it also presents hardware specifications to LED lighting. Results show our design can attain low energy consumption as switching ON/OFF lights according to the occupancy and usage of the rooms and real time data keeping record on a cloud-based platform. Using this system, we can come up with more sophisticated designs of automation that could be used to reduce human interference and increase security measures and bring to use newer technologies in day-to-day work scenarios.Kunal GargArchita Kumari Shrivastav
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-06-302021-06-309217Informatization, the Informational Conscience, and the Advancement of the Internet
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=619
<p><strong> ABSTRACT</strong></p><p><strong></strong><br />The Internet has evolved from a technology for government and business use into a way of life; used around the world every day by anyone and everyone. From its humble beginnings to the prolific, advanced communications system it is today, the technology has certainly seen an ascent to become the ubiquitous network it is now. Anyone, anywhere can contact others and see what they are doing, and also find ways to improve their own lives through the vast and seemingly infinite information database. The Internet has provided a wealth of opportunities for connection, collaboration, and participation on an unprecedented scale, and many who have used the Internet have certainly found ways to advance the lives of others, including their own. However, with great power comes great responsibility, and how we use this technology is crucial to our advancement as a species and a society. There are many dimensions to observe when assessing the impact the Internet has on an individual, group, societal, and worldwide scale. It is best to make sure we are using the Internet in a way that is safe, fun, and effective for everyone. How does information, or an information-based environment, affect one’s behavior, moral philosophy or value system, and the way they interact with others?</p><p><strong>Keywords:</strong> Internet, Technology, Information, Health, Psychology, History</p>James P. Embrey
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-02-052021-02-05923545Recommendation System: An Algebraic Perspective of Machine Learning with Knowledge Endorsement
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=644
<strong><strong><span> </span></strong></strong><p><strong> ABSTRACT</strong></p><p><strong></strong><br />Learning is continual process and machine learning is innovative approach towards information management as well as knowledge management. The endorsement of knowledge in association of big data is crucial task. The machine learning algorithm and technologies gives an insight towards better expansions and consolidation of knowledge. For optimization of knowledge recommendation system plays an important role and gives ground to produce solution. The role of recommendation system is basically one of the information whose purpose is to suggest, or recommend item and action to users. The present research article is an attempt to club the basic and advance approaches which are associated with recommendation system in algebraic from.</p><p><strong>Keywords:</strong> Machine learning, Recommendation, System, Knowledge, big data, Data Mining.</p>Awanit KumarSanjay GaurRahul ShandilyaDeepak Sharma
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-02-052021-02-05923034Algorithmic Approaches for Data Mining and Machine Learning
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=643
<p><strong> ABSTRACT</strong></p><p><strong></strong><br />Trends and technology always innovative and comes with some new. Sometimes technologies are introduces in more user friendly environment. In such version of technology advancement are also incorporated. Data mining is a best widespread knowledge attainment approach for knowledge discovery. The naval trends Machine learning also have a big interfere of data mining. Infect most of the data mining algorithm and methods are utilized for machine learning with minor amendment and advancement or sometimes as it is. This paper is an attempts to presents a view of various approaches of machine learning and data mining.</p><p><strong>Keywords:</strong> Data Mining, Machine Learning, Decision Tree, Bayesian network, Nearest Neighbor, Support Vector Machine (SVM).</p><strong><span> </span></strong>Sanjay GourAwanit KumarRahul ShandilyaDeepak Sharma
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-02-052021-02-05922429A Comprehensive Study on Cloud Mining of Cryptocurrencies
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=638
<p><strong> ABSTRACT</strong></p><p><strong></strong><br />The whole world is going online. Everything is becoming fast and convenient with each passing day and we are now living in a global village, where information from around the world is available on our fingertips. The online community has also influenced the economic world with the advent of cryptocurrencies like Bitcoin. As the world is getting closer, the need for a universal, non-bureaucratic, yet trustworthy online mode of transaction has become eminent. Cryptocurrencies have arrived at the scene providing possible solutions to this requirement. At the same time, cloud computing has also expanded by leaps and bounds. The sheer convenience it provides, the ease with which one can store data and perform operations and several other factors have seen cloud computing become a hot commodity in recent times. So much so that it has spread its wings in the sector of cryptocurrencies. It makes mining easier and brings with it plenty of benefits for miners. Here, we have tried to understand how cloud mining can bring a revolution in the way we see and use cryptocurrencies and its mining.</p><p><strong>Keywords:</strong> Bitcoin, Blockchain, Cloud Computing, Cloud Mining, Cryptocurrency, E-Currency, Electronic Money, Mining of Cryptocurrency, Miners</p>Akshay GagraniAnkit RajPriyanka Mitra
Copyright (c) 2021 International Journal of Distributed Computing and Technology
2021-02-052021-02-05921823Data Security in Cloud Computing Environment-A Review
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=610
<p>This paper talks about the security of information in distributed computing. It is an investigation of information in the cloud and viewpoints identified with it concerning security. The paper will go into subtleties of information assurance techniques and approaches utilized all through the world to guarantee most extreme information insurance by minimizing dangers and security threats. Accessibility of information in the cloud is useful for some applications yet it presents hazards by presenting information to applications which may as of now have security escape clauses in them. Essentially, utilization of virtualization for distributed computing may threats information when a visitor OS is run over a hypervisor without knowing the unwavering quality of the visitor OS which may have a security proviso in it. The paper will likewise give a knowledge on information security viewpoints for Data-in-Transit and Data-at-Rest. The examination includes aspects of cc like threats of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service).</p><p>Keywords: Data Security, Cloud Computing, Risks and threats, Data Protection, SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service).</p><p>Cite this Article: Arshil Noor. Data Security in Cloud Computing Environment - A Review.International Journal of Distributed Computing and Technology.2020; 6(2): 1–17p.</p>Arshil Noor
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-08-262020-08-2692117Performance of Weibull Distribution Function on Prediction Based EH-CRN with Diverse Fusion
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=588
<p>Reduction of energy footprint and spectral underutilization are the two major challenges for communication technology. Energy harvesting (EH) enabled cooperative cognitive radio network (CRN) promises to address this pertinent issue and aspires to play the pivotal role in driving future wireless communication. The distribution function plays an important role on the performance of such model. In this paper, we introduced Weibull distribution function in characterizing the primary user activity and analyzed the performance of various parameters of a cooperative CRN with energy harvesting capability under various fusion rules. The transition between idle and busy state of a CR is modeled as two state Markov model. In this model, a CR can harvest energy either from radio frequency (RF) source or from non-RF source based on combined decision of the fusion center (FC). Impact of prediction based sensing, number of cooperative cognitive radio (CR) nodes, collision constraint, number of frames, splitting parameter on throughput performance and energy harvesting are examined. Analytical expression for detection probability, false alarm probability, improvement in spectrum reuse, harvested energy, energy penalty and normalize throughput are established. A comprehensive simulation of the system model is performed and the results are compared for various fusion rules in a cooperative EH-CRN.</p><p>Keywords: Cognitive radio, cooperative network, energy harvesting, fusion rules, throughput, Weibull distribution</p><p>Cite this Article: Banani Talukdar, Deepak Kumar, Sanjoy Debnath, Wasim Arif. Performance of Weibull Distribution Function on Prediction based EH-CRN with Diverse Fusion. International Journal of Distributed Computing and Technology. 2020; 6(1): 35–47p.</p>Banani TalukdarDeepak KumarSanjoy DebnathWasim Arif
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-06-272020-06-27923547Fault Location in Two Phase Traction System
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=585
<p>Owing to the installation of autotransformers at regular intervals along the line, distance protection relays cannot be used with the aim of locating ground faults in 2×25 kV railway power supply systems. The reason is that the ratio between impedance and distance to the fault point is not linear in these electrification systems, unlike in 1×25 kV power systems. Therefore, the location of ground faults represents a complicated task in 2×25 kV railway power supply systems. Various methods have been used to localize the ground fault position in 2×25 kV systems. The method described here allows the location of a ground fault to be economically found in an accurate way in real time, using the modules of the circulating currents in different autotransformers when the ground fault occurs. This method first needs to know the subsection and the conductor (catenary or feeder) with the defect, then localizes the ground fault’s position.</p><p>Keywords: Fault location, ground faults, protection, railways, 2×25 kV</p><p>Cite this Article: Akhil K.S., Aravind VS, Nikhil S Nair, Prabhsimran Singh. Fault Location in Two Phase Traction System. International Journal of Distributed Computing and Technology. 2020; 6(1): 28–34p.</p>Akhil K.S.Aravind V.S.Nikhil S. NairPrabhsimran Singh
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-06-272020-06-27922834Energy Generating Gymnasium System
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=586
<p>Most of the newly invented technologies entirely depend upon electricity for their proper operation. Therefore, the energy demand is increasing day by day. Energy has been a big cause for the development of human being. Conventional energy resources include fossil oil, natural gas and coal which are ultimately depleting and for this reason scientific community is shifting its attention towards renewable energy resources. In order to aid the energy crisis, we are proposing a model of Energy generating gymnasium system (EGGS) which will contribute its share in renewable energy sector. People of modern society are conscious about their health and adopt gymnasium exercises in order to achieve their desired fitness level. The idea behind smart EGGS is that the human expended energy on machines in a gymnasium should be converted into electrical energy which will be clean, renewable and sustainable. EGGS suggests that human being is also a source of renewable energy and chemical energy possessed by humans can be converted into electrical energy. Total output of all the gymnasium machines will give a sufficient amount of electrical energy needed by the gymnasium electrical appliances. The excessive electrical energy can be sold back to utility.</p><p>Keywords: EGGS, electrical energy, inverter circuit, step-up transformer, technology</p><p>Cite this Article: Bhagyasree C.S., Devika B.M., Gayathri Jayan, Haritha Chandran, Tinuu V.R. Energy Generating Gymnasium System. International Journal of Distributed Computing and Technology. 2020; 6(1): 21–27p.</p>Bhagyasree C.S.Devika B.M.Gayathri JayanHaritha ChandranTinuu V.R.
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-06-272020-06-27922127Energy Efficient Lighting System
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=587
<p>The energy is essential for the well-being of population, both economically and socially. The increasing demands of energy consumption worldwide require an increased use of energy resources, with adverse consequences for the environment. Solving problems related to lighting design is a major challenge for the 21st century. One of the main goals is to make cities more comfortable and safer, to which the lighting infrastructure plays a key role. It is clear that by adapting the lighting system, there is an attempt to produce a feeling of wellbeing and security among the population. The main aim of this paper is to reduce the energy consumption and adapt the existent lighting system to the present needs using modern and efficient technologies and also it gives basic concepts to electrical engineering students particularly those in domain of lighting design. Here, we use DIALux software for the analysis and designing of proposed lighting system.</p><p>Keywords: DIALux evo, Energy efficiency, LED lamps, lighting design, technology</p><p>Cite this Article: Amal Krishnaa P., Amina U.N., Meenakshy Anand A.G., Nikhil Satheesh, Neethu U., Deepu S.R. Energy Efficient Lighting System. International Journal of Distributed Computing and Technology. 2020; 6(1): 12–20p.</p>Amal Krishnaa P.Amina U.N.Meenakshy Anand A.G.Nikhil SatheeshNeethu U.Deepu S.R.
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-06-272020-06-27921220Design of Dual-Band Wide Slot Monopole Antenna
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=584
<p>A wide slot dual band rectangular microstrip antenna with an L-shaped notch on radiating monopole antenna is presented in this paper. A wide rectangular shaped slot is etched from the ground in order to minimize the volume of the ground plane impact for portable devices. The performance of antennae for portable devices is commonly excited by the ground plane to result in variation in terms of operating frequency, impedance bandwidth and radiation pattern. This in turn increases the current distribution on the ground plane. It is also noticed that the impedance matching level is also stronger with the reduction of ground plane excitation. The antenna features bidirectional radiation pattern across all the operating centre frequencies. Antenna exhibits a dual band simulated impedance bandwidth (-10 dB, IBW) at a centre frequency 1.45 GHz and 4.05 GHz, respectively, ranging from 1.2–1.7 GHz (i.e. 33.5%) and 2.3–5.8 GHz (86.4%) respectively. The peak gain is 5.41 dBi at 2.5 GHz frequency. This antenna operates at GPS, LTE band 1.4/1.5 GHz, also covering the 2.4/5.2/5.8-GHz WLAN bands and 2.5/3.5/5.5-GHz WiMAX bands.</p><p>Keywords: Impedance bandwidth, LTE, sot antenna, WiMAX, WLAN</p><p>Cite this Article: Reshmi Dhara, Sarita Kumari Gupta, Sanjay Kumar Jana. Design of Dual-band Wide Slot Monopole Antenna. International Journal of Distributed Computing and Technology. 2020; 6(1): 1–11p.</p>Reshmi DharaSarita Kumari GuptaSanjay Kumar Jana
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-06-272020-06-2792111Using Hyperledger in IOT Applications
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=540
<p>Abstract: Internet of Things (IOT) refers to smart devices which can collect, process and transfer data without the need of human. The system of interconnected smart devices form Internet of things. Modern buildings are equipped with smart thermostats, doorbells, appliances such as alarm clock, coffee maker, sprinklers and much more. These devices can be programmed such that time or conditions like someone walked on the front lawn, trigger these devices to start on their own and communicate with each other. Large amount of data needs to be transferred while they communicate; blockchain technology offers decentralized and distributed backend optimizing the communication.</p><p>Keywords: IOT, hyperledger network, blockchain, distributed network, EVM address</p><p>Cite this Article: Arushi Arya, Aatesh Arya. Using Hyperledger in IOT Applications. International Journal of Distributed Computing and Technology. 2019; 5(2): 50–54p.</p>Aatesh AryaArushi Arya
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-01-132020-01-13925054Modelling and Analysis of Five Phase AC Motor in D-Q Axis
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=538
<p>Abstract: In this paper, a quinary phase induction machine is dynamically modelled in D-Q axis. The quinary phase voltages are being converted into two component voltages, one along the direct axis and the other along the quadrature axis. The Speed and torque of quinary phase induction is then derived. The speed of the quinary phase induction motor is estimated using sensor-less method thereby reducing rate and increasing the reliability of the speed guesstimation. The speed guesstimation of the quinary phase induction machine is being done using Direct Synthesis method, Model Reference Adaptive System Method, Luenberger observer method and Extended Kalman Filter method. Direct synthesis method uses a current model block or voltage model for obtaining the direct axis and quadrature rotor fluxes which is being used for speed guesstimation. One of the disadvantages of the Luenberger observer is that it is a deterministic in nature, it does not take into account the noises present in the machine model and also the modelling inaccuracies present in the system. Whereas Kalman Filter takes into account the noises present in the machine model, while estimating of speed. The estimated speed in the four methods revealed above are analysed and the best method suitable for speed guesstimation of quinary phase induction motor is being identified.</p><p>Keywords: AC motor, component, Model Reference Adaptive System Method, insert, D-Q axis</p><p>Cite this Article: Boney Joseph, Linss T Alex, Jineeth Raju, Jerin George K. Modelling and Analysis of Five Phase AC Motor in D-Q Axis. International Journal of Distributed Computing and Technology. 2019; 5(2): 20–42p.</p>Boney JosephLinss T AlexJineeth RajuJerin George K
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-01-132020-01-13922042Intelligent Supply Chain using IoT
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=535
<p>Abstract: With the emergence of the new technologies like – Big Data, Internet of Things, Blockchain, Artificial Intelligence, the way in which business are working today are fast changing. These technologies are making a huge impact in every sector of the industries, be it a manufacturing, retail, aerospace, Oil and Gas and others. The core process of any industry like supplies, product manufacturing or selling of a product to a customers are getting changed and is becoming smart with these technologies. This paper will give more emphasis on the core business process “Supply chain management” and how it is becoming smarter using the various digital technologies with a special emphasis on the technology called “Internet of Things”. Intelligent technologies like internet of things are poised to automate and optimize the entire supply chain from design to manufacturing, to asset management, to after-sale services. These are delivering customer values in product, services and brand experience in an agile and responsive fashion.</p><p>Keywords: Supply Chain Management, Internet of things, Big Data Analytics, Intelligent Technologies, Business Processes, Architectur, automation</p><p>Cite this Article: Devinderpal Yadav. Intelligent Supply Chain using IoT. International Journal of Distributed Computing and Technology. 2019; 5(2): 8–19p.</p>Devinderpal Yadav
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-01-132020-01-1392819Dynamic Game Based CAPTCHA-A New Approach to Tackle Web Robots
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=530
<p>Abstract: "CAPTCHA" stands for Complete Automated Public Turning Test [1], is a security mechanism designed to differentiate between online bots and human. It is a challenged- response test for computing to determine whether the user is human or not. It is used to defend against the malicious bots programs. As use of Internet has been become vital issue and many web application facing a threat of web bots (Robots). Web Bots or, Robots is an automated script which executes over an Internet and occupy web space and increases the network traffic [6] [7]. The complication with currently used CAPTCHA i.e., text-based CAPTCHA or, graphic-based CAPTCHA is that, it is it is troublesome to read even for the human and Image based or, voice-based CAPTCHA has been broken many times. In this CAPTCHA, We can store 3-4 GUI game on our server. If the user successfully completes the game then only he/she will login. This CAPTCHA game will change as many times user login. As the game will change randomly, so for the web bots it would be difficult to solve this CAPTCHA but for the human it would be easy. This paper discusses the existing CAPTCHA and dynamic game-based CAPTCHA.</p><p>Keywords: CAPTCHA, Text-Based/Graphic-Based CAPTCHA, Image-Based/Audio-Based CAPTCHA, Face-Recognition CAPTCHA, Dynamic Game Based CAPTCHA</p><p>Cite this Article: Megha Saloni. Dynamic Game Based CAPTCHA - A New Approach to Tackle Web Robots. International Journal of Distributed Computing and Technology. 2019; 5(2): 1–7p.</p>Megha Saloni
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-01-132020-01-139217Research Survey of Mobile Cloud Computing with Services of Cloud Computing
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=510
<p>Abstract: Mobile cloud computing (MCC) is a grouping of mobile computing and cloud computing. Mobile computing is a system, in which all mobile nodes are connected to one too one and one too many for data and information sharing on mobile networks. Cloud computing is a system that provides IaaS, SaaS PaaS and BPaaS services to users in network. Mobile cloud computing is a structure of mobile computing on mobile networks, consisting using three layers as mobile user layers, mobile network operator layer and cloud service provider layer, in this type of network cloud computing provide the services to mobile users. Applications MCC in various fields on mobile computing as m-commerce, m-learning, m-healthcare and m-gaming for mobile users.</p><p>Keywords: Mobile computing, cloud computing, mobile cloud computing, architecture, applications</p><p>Cite this Article: Vinay Bhatt, Pradeep Pokhriyal. Research Survey of Mobile Cloud Computing with Services of Cloud Computing. International Journal of Distributed Computing and Technology. 2019; 5(2): 43–49p.</p>Vinay BhattPradeep Pokhriyal
Copyright (c) 2020 International Journal of Distributed Computing and Technology
2020-01-132020-01-13924349IoT Smart Waste Monitoring and Collection Framework
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=467
Abstract - Solid waste management is one amongst the present challenges in urban areas and it's turning into a vital issue thanks to the fast increase in applicable solid waste management systems area population unit vital for up the setting and also the well-being of this paper, an Internet of Things(IoT) design for real-time residents. during waste watching and assortment has been proposed; able to improve and optimize solid waste assortment in an exceeding town. Netlogo Multi-agent platform has been wont to simulate real-time watching and sensible choices on waste management. Waste filling level in bins and truck assortment method area unit abstracted to multi-agent model and national area unit concerned paying the price for waste collection services. What is more, waste level knowledge area unit updated and recorded endlessly and area unit provided to call algorithms to work out the vehicle optimum route for waste assortment to the distributed bins within the town. Many simulation cases dead and result valid/the bestowed resolution provide substantial benefits to all or any waste stakeholders by sanctioning the waste assortment method to be additional efficient. Keywords-Solid Waste Management, Internet of Things (IoT), wireless sensor community (WSN), Real Time Monitoring, Waste Collection Cite this Article: Roshni Dobaria, Abhishek Chilka. IoT Smart Waste Monitoring and Collection Framework. International Journal of Distributed Computing and Technology. 2019; 5 (1): 27–32p.Roshni DobariaAbhishek Chilka
Copyright (c)
2019-07-092019-07-09922732A Design of Mobile Application for Food Waste Management (On the way towards Zero Food Wastage)
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=468
Abstract— Food is the most important material on which humans survive. In this paper, a mobile food waste management application is developed to recommend waste food management referring on the Android Smart Phone. This application has been designed to provide food for the needy i.e. food for those in need if there is waste or excess of food in some place. Moreover, this application has been designed to store information about where there is excess food and the ability to enable users to get notification for collection of food for distribution. Keywords— Mobile Application, Android, IOS, Food Waste Management. Cite this Article: Anthony Gracias, K. Ajith Krishnan. A Design of Mobile Application for Food Waste Management (On the way towards Zero Food Wastage). International Journal of Distributed Computing and Technology. 2019; 5 (1): 21–26p.K Ajith KrishnanAnthony Gracias
Copyright (c)
2019-07-092019-07-09922126Trucks Overload Detector and Controlling
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=493
Trucks going beyond the legal mass bounds upsurge the danger of traffic accidents and damages to the structure. They likewise result in out-of-line rivalry between transport modes and organizations. It is important to guarantee a truck compilation to weight guideline. New innovations are being created for increasingly productive overload screening and requirement. Motion is the new innovation which enables trucks to be said something the traffic stream, with no disturbance to activities. Much advancement has been made recently to improve and execute intelligent overloading detection system which can add to a more secure and increasingly proficient activity of trucks. Keywords: Electric motor, Transistor, Relays, Resistors, Sensors, Weight Cite this Article: T. Kalavathi Devi, V. Selva Vignesh. Trucks Overload Detector and Controlling. International Journal of Distributed Computing and Technology. 2019; 5 (1): 15–20p.V. Selva VigneshT. Kalavathi Devi
Copyright (c)
2019-07-092019-07-09921520Hardware Protection of Design Data for Integrated Circuits: A Review
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=494
Due to globalization of integrated circuit (IC) design flow, the supply chain elements can pirate ICs, overbuild ICs and insert hardware Trojans. Ending piracy of ICs is locked by inserting additional keys and only a correct key makes the design to produce correct outputs. Test of ICs is essential to ensure their quality; the test is meant to prevent defective ICs from entering into the supply chain. Due to the ever-increasing complexity of constructing and maintaining a foundry with advanced fabrication capabilities, many semiconductor companies are becoming fabless. Hardware obfuscation refers to countermeasures which used to prevent IC counterfeiting and illegal overproduction. Traditionally, obfuscation encrypts semiconductor circuits to operate the circuit correctly by using key inputs which must be set to a correct value. This study presents a review of research on the protection of design data. Many research works propose to protect design data and it includes functional locking, hardware obfuscation and IC/IP identification in different ways. It concludes with the need to design an efficient protection scheme based on several properties. Keywords: Counterfeiting, Hardware Security, Intellectual Property, Integrated Circuit Cloning, Logic Obfuscation Cite this Article: K.N. Baluprithviraj, S. Vijayachitra. Hardware Protection of Design Data for Integrated Circuits: A Review. International Journal of Distributed Computing and Technology. 2019; 5 (1): 9–14p.K. N. BaluprithvirajS. Vijayachitra
Copyright (c)
2019-07-092019-07-0992914A Review of Various Sensors for Measurement of Methane
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=495
This article clearly gives the description of various types of sensors that are used for the detection of methane gas, along with the working principles and operation. Methane measurement is essential as it a toxic gas, and its measurement is essential in order to control its emissions from coal mines, wastewater treatment plants, bio-plants, etc. There are several instruments that detect methane at the field or by remote detection techniques. By measuring the methane we can take necessary actions to reduce its emissions. Keywords: Gas Sensors, Greenhouse Gases, Hydrocarbons, Methane Cite this Article: M. Karthikeyan, S. Vijayachitra, R. Suganesh, B. Vinosha. A Review of Various Sensors for Measurement of Methane. International Journal of Distributed Computing and Technology. 2019; 5 (1): 1–8p.M. KarthikeyanS. VijayachitraR. SuganeshB. Vinosha
Copyright (c)
2019-07-092019-07-099218Design and Implementation of Trans-Z-Source Inverter
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=436
ABSTRACT This paper presents the impedance-source (Z-source) inverters concept to the transformer-based Z-source (trans-Z- source) inverters. The original Z-source inverter (ZSI) contains an impedance network of two inductors and two capacitors connected in a unique arrangement to interface the dc source and the inverter. It has buck and boost function that cannot be achieved by traditional voltage-source inverters and current- source inverters. In the proposed trans-Z-source inverter, the impedance network consist of a transformer and one capacitor. While retaining the main features of the previously presented Z-source network, the new networks exhibit some unique advantages, such as the increased voltage gain and reduced voltage stress in the voltage-fed trans-ZSIs .when the turns ratio of the transformer windings is over 1. Simulation and experimental results of the voltage-fed trans-ZSIs are provided to verify the analysis. Keywords- dc–ac conversion, voltage-source inverter, Z-source inverter.O. B. HeddurshettiJyotsna ChavanSantosh SanadiVijaykumar PatilKartik Magadum
Copyright (c)
2019-06-142019-06-14921726Information Management System: A Review
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=439
ABSTRACT There were various issues related with received manual techniques to oversee understudy data in schools, universities, and so on., these pursued controls made delay in the conveyance of administrations understudies, mistakes in the consummation of undertakings, etc. Another framework structured and actualized to tackle most of the issues and impediments coming about because of the utilization of the old strategies and systems. Keywords: Database management system, Student Information Management System (SIMS)Shikha SarafPragati Mishra
Copyright (c)
2019-06-142019-06-14921416Cloud Computing Data Storage
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=438
ABSTRACT: Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from the same domain (intra-domain) are considered. We note that one of the main applications of identity-based proxy re-encryption schemes is in the cloud computing scenario. Nevertheless, in this scenario, users in different domains can share files with each other. Therefore, the existing solutions do not actually solve the motivating scenario, when the scheme is applicable for cloud computing. Hence, it remains an interesting and challenging research problem to design an identity-based data storage scheme which is secure against collusion attacks and supports intra-domain and inter-domain queries. In this paper, we propose an identity-based data storage scheme where both queries from the intra-domain and inter-domain are considered and collusion attacks can be resisted. Furthermore, the access permission can be determined by the owner independently. Keywords: Database-as-a-service (DAS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS).Trinaini Zalpuri
Copyright (c)
2019-06-142019-06-14921013A Review on the Advantages of the Use of IT Applications
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=437
ABSTRACT Information Technology applications are becoming essentially quick for as long as decade. Numerous Business associations with underscore on IT applications are attempting to increase upper hands. Emrical considers additionally exhibit that IT increments upper hand when it acts with HR. In this paper we examined and audit how different IT applications can be used to furnish an organization with key preferences over the worldwide commercial center focused powers. KEYWORDS: Information Technology, Information System, IT Applications, Just in time, Strategic information systems, Competitive advantages.Rajan Kumar SharmaVishwas Shekhawat
Copyright (c)
2019-06-142019-06-149259Object Detection Technique by Using Support Vector Machines
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=408
We portray the FCNN-SVM classifier, which combines the help vector machine (SVM) approach and the speedy nearest neighbor development course of action administer (FCNN) with a particular ultimate objective to make SVMs rational on immense gatherings of data. As an essential responsibility, it is probably exhibited that, on huge and multidimensional instructive accumulations, the FCNN-SVM is a few solicitations of significance faster than SVM, and that the amount of help vectors (SVs) is more than split concerning SVM object identification (i.e., confinement) in video is a standout amongst the most critical and testing assignments in PC vision and example acknowledgment. By and large, question location is the preface of protest following and acknowledgment. The crucial objective of question location is to get high speculation capacity (i.e., the capacity to accurately recognize protests in the inconspicuous pictures) and high preparing and identifying speed.Prashant Kumar ShrivastavaManoj Niwariya
Copyright (c)
2018-12-042018-12-049214A Study on OpenMP and Irregular Programming
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=374
Programmers need better, more reliable techniques to build parallel programs. In the task-parallel programming paradigm, the programmer defines independent pieces of work, called tasks that may run in parallel. Geometric algorithms are wonderful examples for programming, because they are deceptively easy to do with your eyes, yet much harder to implement for a machine. The goal of parallel algorithm design is to develop parallel computational methods that run very fast with as few processors as possible. OpenMP(Open Multi-Processing) uses shared memory architecture to implement parallel programming in dual core machines. A proper implementation expected to give a speedup around 1.5 in dual core machine and 2.8 in a quad core machine. Writing irregular parallel algorithms with OpenMP has been rarely practiced in the past. Yet it is possible, and in this paper we will study the implementation of irregular parallel geometry algorithms to show a possible stepping stone and deficiency of OpenMP specification.Kalyan Kumar JenaAnisur RahmanSasmita MishraS. N. Mishra
Copyright (c)
2018-09-202018-09-20923239An Efficient Gigantic Sensor Network Data Access Method Based on Topology
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=363
This paper considers the distributed access and management downside of huge wireless device networks’ information access center for the web of Things that is Associate in nursing extension of wireless device networks and part of its topology structure. within the context of the arrival of huge service access requests at a virtual information center, this paper styles a colossal sensing information access and management mechanism to boost the access potency of service requests and makes full use of the offered resources at the information access center for the web of things. Firstly, this paper proposes a synergistically distributed buffer access model that separates the knowledge of resource and placement.N Siranjeevi
Copyright (c)
2018-09-092018-09-099216Structured P2P multidimensional HyperCube system
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=366
Peer-to-peer systems enable access to data spread over an extremely large number of machines. Today’s peer-to-peer systems are limited in scope in terms of data in multidimensional range. The project creates an ‘n’-dimensional hypecube p2p system which supports nodes with threads connecting them in a cube like structure. Each Node generates random character strings thus adding a data storage feature. Eventually it will look for retrieval and lookup of the data while evaluating the model with regressing different parameters to check its reliability and how the model fares when introduction of a kind of self-destroying threads are implemented on the system.Waarengeye V. Vikram
Copyright (c)
2018-08-022018-08-02922531`A Survey on Propagation Models, Routing Protocol Models and Mobility Models of Wireless Networks
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=365
In this paper, authors have provided a detailed categorization of various propagation model, different routing and mobility techniques currently used in wireless networks. This paper presents different propagation models, their path loss behavior and propagation techniques. Different routing techniques with distinguishing feature have been proposed, where numbers of parameters are selected for comparison to suggest which protocol may perform best in different wireless networks. Finally, highlighting operation and analysis of different mobility techniques are discussed. This organization and description provide ideas to select best models depending upon its applicability in a particular application.Gaurav Choudhary
Copyright (c)
2018-07-222018-07-22921224Security in Mobile Ad Hoc Networks an Improvement to MAODV
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=350
Wireless unplanned networks may be an assortment of communication devices (laptops, PDAs, mobile phones etc.) or nodes that want to speak with none fastened infrastructure and preset organization of accessible networks. Unplanned networks will be used for knowledge transfer, conference, Bluetooth, multimedia system communication so on. However, at constant time there is an absence of centralized network management functionally, these networks tend to be prone to variety of security attacks within the type of knowledge loss, privacy problems, interference eavesdropping, session hijacking so on. Conjointly countermeasures aren't embedded, thus external mechanisms are used. Authentication access management, encryption amp; digital signatures, statistics verification are some preventive measures.B JaffarM PrakashM Saranya
Copyright (c)
2018-06-122018-06-1292711An Efficient Gigantic Sensor Network Data Access Method Based on Topology
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=349
This paper considers the distributed access and management downside of huge wireless device networks’ information access center for the web of Things that is Associate in nursing extension of wireless device networks and part of its topology structure. within the context of the arrival of huge service access requests at a virtual information center, this paper styles a colossal sensing information access and management mechanism to boost the access potency of service requests and makes full use of the offered resources at the information access center for the web of things. Firstly, this paper proposes a synergistically distributed buffer access model that separates the knowledge of resource and placement.R VaralakshmiD Praveen KumarP Vignesh
Copyright (c)
2018-06-122018-06-129216FOG Computing
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=329
Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise’s network. Also known as edge computing or fogging, fog computing facilitates the operation of compute, storage and networking services between end devices and cloud computing data centers. The cloud is a clusters of multiple servers attached within a network. The cloud computing is a network based environment that focuses on sharing computations or resources. The main problem that accours in cloud computing is security.And now a days security and privacy both are the main concern that needed to be considered. To overcome the problem of security the new technique which is called as Fog Computing was introduced .Fog Computing is not a replacement of cloud computing it’s just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to enhance the cloud experience by isolating users data that need to live on the edge. The main aim of fog computing is to place the data close to the end user.Foziya Rizwan
Copyright (c)
2018-04-122018-04-12924550Analytical approach of design LIFE BAND for human
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=294
This idea promises to provide a whole new infrastructure for the security of citizens of a particular city by bridging the gap between them and cops/police in case of danger situations, with the help of a life Band that can be worn on wrists which is going to be connected to a central city server. It’s a kind of a device connected to a central cloud server which will look like a digital wrist watch and will be worn on wrists and if some dangerous situation arises to the person wearing it, it will send the location of a person to the central city server and that server will send the information to the police headquarters and police patrol cars that are near to him alerting them that person is in danger and requires immediate help. Now the patrol cars that are in the person’s vicinity can come in time, help him and catch the troublemakers. It’s a device which can be worn like a digital wrist watch. In fact in normal scenario, it will work as a wrist watch. But it’s main purpose would be to continuously keep track on the pulse rate and heart rate of the person wearing this device to monitor the changes and then function accordingly. Keywords: Global Positioning System, Operating System, Heart Rate Monitor,Devendra Kumar
Copyright (c)
2018-01-052018-01-05924144Distributed computing and agent technology
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=277
The technology of intelligent agents and multi-agent systems has fundamentally transformed distributed computations and software development changing the way in which complex, distributed computing and communicating systems are conceptualized, designed, assembled and implemented. In this paper, we study distributed computations in the context of agent organizations and principal-agent relation making emphasis on the organizational structure of agent functioning and interaction. To achieve higher generality and at the same time, better precision, agents are studied as special types of actors operating within principal-agent relations. At first, the concept of an agent is specified and extended. Then we study properties of actors involved in the principal-agent relations. Finally, we describe and explore agent organizations specifying different types of their structures.Mark Burgin
Copyright (c)
2017-12-202017-12-20923040Cellular automata Signature Based Data Sharing in Cloud Computing
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=281
Information sharing plan by utilizing credit based to decrease the key escrow issue yet additionally builds up the expressiveness of trait, as a result of that the subsequent plan is more easy to understand to distributed computing. In our proposed structure, we are introducing an improved two-party key issuing tradition that can guarant1ee that neither key pro nor cloud advantage executive can exchange off the whole riddle key of a customer independently. We exhibit the possibility of property with weight, being given to enhance the assertion of value, which can't simply extend the enunciation from twofold to optional state, yet what's more help the multifaceted idea of access approach. So that, both cutoff cost and encryption complexities for a figure content are calmed. The issue of noxious cloud insider still proceeds on. Envision the setting of an electronic success records structure. An embraced client can get to the thriving record fulfilling their self-decided requirements depict by the information proprietor.Kiran Sree
Copyright (c)
2017-12-052017-12-05922629A Review Based on Proactive Routing Protocols in MANETs
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=274
With wireless devices increasing in popularity and ad-hoc wireless networks receiving larger, scalable routing protocols are needed. For the future of wireless mobile computing, recent advances in portable computing and wireless technology are opening up exciting possibilities. With time, the network topology in ad-hoc network usually changes. Hence, there are novel challenges for routing protocols in ad-hoc network. In this review, we will focus our attention on current protocols which provides connectivity in ad-hoc network, such as routing protocols. In particular, in ad-hoc network, any node may compromise the routing protocol functioning by upsetting the route discovery process. Routing in the ad-hoc network is a challenging task and has received a tremendous amount of attention from researches. In this manuscript, an overview of a wide range of routing protocols can be seen. The ad-hoc routing protocols can be divided into two classes. They are table-driven (Proactive) and ondemand (Reactive). This manuscript discusses about table-driven routing protocols belonging to each category.Arvind Kumar Shukla
Copyright (c)
2017-08-282017-08-28921425A Review Based on Reactive Protocols in MANETs
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=273
Mobile ad hoc network (MANETs) are networks which routing is based on multi-hop routing from a source to a destination node or nodes. These networks have quite many constraints because of uncertainty of radio interface and its limitations. For instance, in available bandwidth. There are various applicable protocols for ad hoc networks, but one confusing problem is the vast number of separate protocols. Each of these protocols is designed to perform its task as well as it’s possible according to its design criteria. In the past years, the wireless networking community designed numbers of new routing protocols which are based on scenarios of this design space. The main aim of this seminar report is to create a broad sense and knowledge of the ad hoc routing protocols, and to survey and compare representative examples for each category of these protocols. So that we can use routing protocols for the number of designs and we strive to uncover the resource limitations. This review is based on reactive protocols. But here the problem is high routing protocols overhead in ad hoc networks. So, we driven this issue, propose the reactive routing protocols. Reactive routing is fine matched for a large scale with moderate or low mobility. This manuscript provides an overview of reactive protocols. (e.g., AODV, DSR, TORA, LAR, etc.).Arvind Kumar Shukla
Copyright (c)
2017-08-282017-08-2892113DataBase: Food Waste Management
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=252
Food waste management helps to prevent surplus amount of food wastages in the world. One third of the food produced in the world every year approximately 1.3 billion tones gets lost or wasted. The amount of food lost or wasted every year is equivalent to more than half of the world’s annual cereals crop. There are several steps to control food waste such as shop smart, buy exactly what you need, etc. Out of these methods the best anticipated way is “Donate what you won’t use.” This work describes how surplus food can be consumed in requisite beneficents. Where donors will post the excess consumable food with quantity and location. The application finds the registered receivers near the donors and sends a notification message. It is acceptable then the receiver sends a request message to the donor. Then the delivery is done through any means. This avoids the food wastage in a smart way.B DharaniJ RajuK PriyadharshiniC Santhosh
Copyright (c)
2017-05-122017-05-129220243D Printing for Cake Designing Using Raspberry PI
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=255
The use of advanced 3D printing technology improved with component placement and electrical interconnect deposition can offer electronic prototypes that now can be rapidly fabricated illuminate light-emitting diodes for a striking effect. By applying 3D printing of structural electronics to accelerate prototyping, the development cycle was reduced from weeks to hours. Rapid in comparable time frames as traditional 2D bread-boarded prototypes; however, these 3D prototypes include the advantage of being embedded within more appropriate shapes in order to authentically prototype products earlier in the development cycle. The fabrication freedom offered by 3D printing techniques, such as stereo lithography and fused deposition modelling have recently been discovered in the context of 3D electronics integration referred to as 3D structural electronics or 3D printed electronics. Enhanced 3D printing may eventually be employed to manufacture end-use parts and thus offer unit-level customization with local manufacturing; however, until the materials and dimensional accuracies improve (an eventuality), 3D printing technologies can be the die includes a microprocessor and accelerometer, which together detect motion and upon halting, identify the top surface through gravity and illuminate light-emitting for a striking effect. By applying 3D printing of structural electronics to expedite prototyping, the development cycle was reduced from weeks to hours.P KarthikeyanN KarthickS KarthikeyanS Revathi
Copyright (c)
2017-05-122017-05-12921419Detection of Stego from Motion Vector Patterns Using Steganalysis
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=256
The ultimate goal of this paper is to detect a stego (encrypted message) in the compressed video using various steganalysis techniques. Although there are many steganalysis methods, in this paper we concern more about the detection accuracy so that no stego will be escaped. To capture all the deviations in the video we use the filters of higher orders. The temporal dependency of the motion vector planes is also considered along with the spatial dependency which is very rare in most of the previous papers. The proposed method is tested against the most prominent MV steganalysis and steganography methods. Experimental results show that the proposed method yields around 20% detection accuracy increase in low payloads and 5% in higher payloads.R SoundaryaS SuganyaJ Sophia
Copyright (c)
2017-05-122017-05-1292913Efficient and Enhanced Attribute-Based Encryption for Cloud Computing
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=257
Cloud computing is a web-based computing that provides shared resources on demand. Resources utility can be increased or decreased as per demand. Cloud computing offers users to pay only for what they use and work load they use. Cloud computing mainly aims to cut down the cost by sharing the resources. Clouds are used in real time application like Google Email Communication, Google Docs, Microsoft Sky Drive and Amazon S3, Google Drop box. Nowadays highly confidential data like healthcare and military records are stored in cloud. There are many security issues while storing the data in clouds. Data are stored in third-party cloud service provider which user may not fully trust. So, we propose an efficient attribute-based encryption method to encrypt the data and store it in cloud.A RojapriyadharshiniD Kalaiselvi
Copyright (c)
2017-05-122017-05-129258i18n Framework in C++
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=203
Internationalization is the process to make software to be well adaptable of different languages and more regional across the world without changing its core details. This internationalization, alternatively abbreviated as i18n which signifies the number of letters in between i and n of the former term. As most users prefer to interact with systems using their own regional languages and cultural conventions. This creates a challenge for the software developers to build the applications according to the above mentioned specification. It requires, making the program code generic and flexible so that the application can be easily understood by common people as well as customers around the world. Hence the software needs to be localized by adding locale-specific components (e.g. Currency, Time zone, Calendar etc.) and translating text. In this paper we have described of how i18n is being implemented using C++ and what things have been considered in developing the software application.Kalyan Kumar Jena
Copyright (c)
2017-02-102017-02-109214Parallel and Distributed Computing—A Review
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=179
Parallel and dispersed registering is an intricate and quick developing exploration territory. In its short 50-year history, the standard parallel PC engineering has developed from Single Instruction Multiple Data stream (SIMD) to Multiple Instructions Multiple Data stream (MIMD), and further to approximately coupled PC bunch; now it is going to enter the Computational Grid period. The calculation research has additionally changed as needs be throughout the years. In any case, the fundamental standards of parallel registering, for example, between procedure and between processor correspondence plans, parallelism techniques and execution model, continue as before. In this paper, a short presentation of parallel and conveyed processing will be given, which will cover the definition, inspiration, different sorts of models for reflection, and late pattern in standard parallel registering.Avinash Chauhan
Copyright (c)
2016-11-022016-11-02923546Use Case Specifications and their Basic Flow Design for Village Information System Management through Web based Application
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=178
Village Information System helps in the management of village related information’s in a technological environment, which will help the rural planners for the planning and implementation of plans in rural areas. It basically reduces the time and cost involved with the creation of data base for the planning. It comprises of all the information related to the facilities, infrastructure, education, health, population, building type, etc.R.K. Nirmala
Copyright (c)
2016-11-022016-11-02921834Socket Web-Server Technology
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=177
The aim of the paper is to introduce sockets, how it can be implemented for network programming. An important role is played by Sockets in client server applications. The communication between the client and server takes place by writing to or reading from these sockets. Linux functions such as printing, connecting to databases, and serving web pages as well as network utilities for remote login and ftp for file transfer usually use sockets to communicate. A “socket” or a "logical endpoint” is defined as combination of a specific network address and a port. A socket structure is utilized for storing the TCP-specific information for each connection, and there is an array of such type of structures to reflect the maximum number of simultaneous Connections. We have implemented socket for communication using TCP/IP protocol to serve the request and access the file using HTTP protocol. Two processes communicate through TCP sockets. A full-duplex byte stream/two way communication path between two individual processes is provided by the socket model.Manish Kr. Dixit
Copyright (c)
2016-11-022016-11-02921217Blue Eye Technology–A New Emergence in the Field of Technology
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=176
Is it conceivable to make a PC, which can connect with us as we communicate each other? For instance envision in a fine morning you stroll on to your PC room and switch on your PC, and after that it lets you know "Hello companion, great morning you appear to be an awful state of mind today. And afterward it opens your letter drop and demonstrates to you a portion of the sends and tries to cheer you. It is by all accounts a fiction, yet it will be the life lead by "BLUE EYES" in the exact not so distant future. The fundamental thought behind this innovation is to give the PC the human force. We as a whole have some perceptual capacities. That is we can see each other's emotions. For instance we can comprehend ones passionate state by breaking down his outward appearance. In the event that we include these perceptual capacities of human to PCs would empower PCs to cooperate with individuals as private accomplices. The "BLUE EYES" innovation goes for making computational machines that have perceptual and tactile capacity like those of people.Nitin Singh
Copyright (c)
2016-11-022016-11-0292611Computer Based Information System for the Automation of Centralized Library Activities
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=175
To centralize the library there is processing system for measuring and reporting actual performance against the plan, so this article is depicting that information system which is required for the automation of centralized library activities.Roger Ahongshangbam
Copyright (c)
2016-11-022016-11-029215Location Search with Mobile Images Using Spatial Data
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=114
This paper describes a method to do location recognition based on images taken from mobile devices. Its usefulness emerges out when we are in a foreign land and because of language barrier we fail to collect relevant information regarding popular monuments or structures. Now searching a matching image would mean comparing earth’s moon with billions of stars in the entire galaxy. It is computationally very expensive to match with billions of images from web. So we devise a hybrid image-keyword-spatial data mechanism for searching.Anirudh Mathur
Copyright (c)
2016-06-262016-06-26922526Short Communication: Human Resource Management System
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=113
Every Organization has numerous types of resources like office equipments, finance, raw material etc. Human Resource is one of these resources. It is the most vital among all the resources of an organization. So HR functions are common to all type of organizations. These HR functions may include recruitment, time management, and management of payroll and many more. In the scenario of handling thousands of employees, their recruitment procedure, their time scheduling and their salary slip generation according to their packages and their working days may become difficult to handle manually. Here comes the need of a system which can help the administration to do all the above said jobs in an automated and efficient manner. We call our proposed system as HRMS (Human Resource Management System), which is being developed for the management of Human of Human Resource.Kshitij Singh Raghav
Copyright (c)
2016-06-262016-06-26922324Analysis of Fingerprint Image Enhancement by Different Methods
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=112
The fingerprint enhancement method using directional filter/Rotational filter is effective in both dry fingerprint images and wet fingerprint images. It removes noise in between the ridge and filling the white hole in the ridge. This leads to decrease the False Acceptance Rate (FAR) and False Rejection Rate (FRR), in fingerprint minutiae extraction. In fingerprint image enhancement, for the image matching there are used various filters likes Gabor filter, FFT filter etc. By using these filters the noise is reduced and image is cleared. Then this image is matched with stored image.Mayur Patil
Copyright (c)
2016-06-262016-06-26921422An Improved Approach for Edge Detection of Noisy Images
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=95
Edge detection of images is a very serious challenge to the researchers till date. Several techniques can be implemented to detect the edges of different images. But a single edge detection methodology is not enough to perform very well in each and every possible image context. In this paper, an innovative edge detection methodology is presented, that computes the edges of different images using the combination of Bergholm-Rothwell-Sobel-Prewitt edge detectors (BRSP). Here the edge detection of images using B-R-S-P technique is compared with each Operator individually.Kalyan Kumar Jena
Copyright (c)
2016-06-262016-06-2692713CSPC: A New Approach for Edge Detection of Gray-Scale Images
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=94
We can define an edge of an image as a set of connected pixels that creates boundaries of several objects in an image. Generally, Edge detection is a process of segmenting an image into regions of discontinuity. Edge detection takes a greater role in digital image processing as well as practical aspects of our life.Edges of an image can begenerated by implementingseveral edge detector mechanisms.In this paper, anew edge detectionmechanismthat computes edges of different images using the quantitative combination of Canny-Sobel-Prewitt-Canny (C-S-P-C) edge detectors is presented.Here the proposed methodology is compared with Canny, Sobel and Prewitt edge detectors separately.Kalyan Kumar Jena
Copyright (c)
2016-06-222016-06-229216Recent Trends in Computational Optimization: A Note
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=59
Abstract This paper has investigated about the optimization techniques. It is record from the traditional techniques used in Optimization and Global Optimization to the recent techniques. This paper has given the special emphasis on the heuristics and meta-heuristics used in Global Optimization. It is also a record of the solution of the real-life problem in the field of Operation Research, Computer Science, Mathematics, Statistics, Economics, Management and Engineering Optimization Problem. These papers also record the solution of various optimization problems in the field of science and technology and development of the Global Optimization Techniques to solve those problems. In short, paper will have two fold, first, different type of Global Optimization Problem which arises in the field of Science, Technology, Economics and Management and Second, the development of Global Optimization techniques in the recent days. Keywords: Artificial immune system, DNA computing, estimation of distribution algorithm, genetic algorithm, global optimizationSanjeev Kumar Singh
Copyright (c)
2015-08-102015-08-109215Satellite Image Processing Using Erdas Imagine
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=32
Abstract Pictures are the most effective means of conveying information. A picture is worth a thousand words. Pictures in short convey data regarding positions, sizes and interrelationships between objects. People in general area unit sensible at explanation data from such pictures, thanks to our innate visual and mental skills. Regarding seventy fifth of the knowledge received by human is in pictorial kind. The paper describes the essential technological aspects of digital image process with special regard to satellite image process. Primarily all satellite pictures process data will be sorted into three classes; (1) Image rectification and restoration, (2) Image sweetening, and (3) Information extraction. The previous deals with initial process of raw image information to correct for geometric distortion, the sweetening procedures area unit applied to image information so as to effectively show the info for resulting visual interpretation. The intent of classification method is to reason all pixels in a very digital image into one among many land cowl categories or themes. This classified information could also be accustomed turn out thematic maps of the land cowl gift in a picture. Keywords: Satellite image process, image rectification and restoration, image sweetening, information extractionN. SiranjeeviB. M. Alaudeen
Copyright (c)
2015-07-282015-07-28921724Segmentation Refers to the Process of Partitioning a Digital Image into Multiple Regions
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=33
Abstract Image segmentation is a very important tool in image processing and might function as Associate in Nursing economical face to classy algorithms and thereby alter subsequent process. A typical drawback in segmentation of a monochrome image happens once a picture contains a background of variable grey level like step by step ever-changing shades, regions or categories assume some broad vary of grey scales. This drawback is inherent since intensity is the solely obtainable data from monochrome pictures. The thesis style, Associate in Nursing extended hidden Markoff Gauss mixture models (HMGMMs) for multi-class noisy image segmentation. The system evaluates noise removal for context based, mostly image blocks mistreatment convolution filters. The developed hybrid model combines the dimensions area filter (SSF) and Markoff random field (MRF) for color image segmentation. The basic plan of the SSF is to use the convolution of mathematician functions and image-histogram to come up with a scale area image in order to notice the right interval delimited by the native extreme of the derivatives. Keywords: Image segmentation, image processing, HMGMMs, SSFN. SiranjeeviB. M. Alaudeen
Copyright (c)
2015-07-282015-07-28922533Construction of Interval-Valued Fuzzy Relations Using R-P-B Methodology: A Survey on Edge Detection of Images
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=41
Edge detection is a very crucial part of image processing and computer vision. Edge detection of images has become a serious challenge to the research personnel. In this paper, an emerging edge detection methodology which computes edges of different images using the technique of combination of Rothwell-Prewitt-Bergholm (R-P-B) operators is presented. Here, the edge detection of images using R-P-B Methodology is compared with each operator separately. Keywords: Edge detection, image processing, computer vision, Rothwell-Prewitt-Bergholm (R-P-B) operatorsKalyan Kumar JenaSasmita Mishra
Copyright (c)
2015-07-202015-07-20921116SMS: An Improved Approach Specifically for Edge Detection of Gray-Scale Images
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=82
Abstract Edges of an image can be represented by using various edge detectors with different approaches. Edge detection is a very fundamental part in image processing and computer vision. In this paper, an emerging edge detection approach which computes edges of different images using the programmatic combination of Sobel-Morphological-Sobel (SMS) edge detectors is presented. This approach can be used as framework for multi-scale edge detectors for a very wide range of images in the field of image processing and computer vision. Here the proposed approach is compared with each edge detector separately. Keywords: computer vision, edge detection, image processing, multi-scale edge detector, sobel-morphological-sobel edge detectorsSasmita Mishra
Copyright (c)
2015-07-102015-07-10921620Characteristics of Photovoltaic Modules Under Uniform Insolation and Partially Shaded Conditions
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=75
Abstract The maximum power that could be generated by a Photovoltaic (PV) System is depends on temperature and irradiance variations. Often, the PV arrays get shadowed by clouds, towers, trees and telephone poles. In order to obtain full utilization from the PV array, it is necessary to analyze the characteristics of PV system. This study deals with a MATLAB based modeling and simulation of a photo voltaic cell under normal (without partial shading) and partially shaded conditions to analyze the electrical characteristics. This study also investigates the reverse bias characteristics since it is significant during fault conditions and high frequency applications. Keywords: choppers, DC–DC converter, inverters, maximum power point tracking, photovoltaic cellsR. Reshma GopiS. Sreejith
Copyright (c)
2015-07-102015-07-1092615Optimal Power Flow Incorporating Static Var Compensator using PSO Algorithm
https://computers.journalspub.info/index.php?journal=JDCT&page=article&op=view&path%5B%5D=30
Abstract This paper presents a Particle Swarm Optimization based algorithm for Optimal Power Flow (OPF) incorporating Static VAR Compensator (SVC). Optimal power flow is an essential tool for the proper operation and planning of modern power systems. The main objective of an OPF is to find a stable operation point which minimizes the active power generation cost while satisfying the system and network constraints as generator capacity limits, power balance, line flow limits, bus voltages and transformer tap setting. OPF is carried out by incorporating SVC into the system for injecting required reactive power to maintain the voltage profile. Here, Particle Swarm Optimization technique, a population based stochastic optimization technique is used as the optimization tool. The ability of SVC to improve the system voltage is also analyzed here. The proposed methodology is tested and validated in a standard 5 bus system and an IEEE 30 bus test system. Keywords: Optimal power flow, static VAR compensator, particle swarm optimization, generation CostBaiju R Naina
Copyright (c)
2015-07-032015-07-0392110