IJET -Volume 4, Issue 1 , January - February 2018
S.No
|
Title/Author Name
|
Serial No
|
41 |
Migration of Cloud ERP into E-Commerce
- M.N.Nachappa, A. M. Bojamma, M.N.Varun Somanna 10.29126/23951303/IJET-V4I1P41
Abstract
E-commerce has been successful in implementing cloud computing in their websites, but there are problems faced by much small and medium E-commerce business when compared to a large industry i.e.in terms of maintaining customer relationship management (CRM), changing technology, changing employees, supplies and the expectation of their organization’s partner. The introduction of an ERP system into this E-commerce business did bring a change in maintaining the flexibility of their business process but these ERP systems alone face a lot of risks. This paper provides a framework of how the E-commerce business has been influenced by cloud computing and it also includes the implementation of a cloud ERP into small, medium and large business and how this technology has in a way improved the quality of the E-commerce business. Keyword: Customer Relationship Management (CRM), Cloud ERP, Framework.× M.N.Nachappa, A. M. Bojamma, M.N.Varun Somanna"Migration of Cloud ERP into E-Commerce" Volume 4 - Issue 1 ( 287 - 294 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P41 |
42 |
An Methodical Encroachment on Rooting out System for Networks
- T.Augusty Chandija Lincy, Mrs. S. Murine Sharmili 10.29126/23951303/IJET-V4I1P42
Abstract
Cognitive radio network is a good network, which make only users of unlicensed spectrum to use software radio.This is for making the best use of the spectrum which is available and it is unused at the network. But there are still problems to security threats for the user which are using the spectrum. In this, a Cognitive Radio Network based on wireless network on regional area.It is designed and describes that some of the security needed alerts are working against it. This function of method uses a methodical identification of distributed DOS(denial of service) algorithm to deliver the case with high mobility with speed and high protection.Hence, the Secondary user’s asked the desires are processed with very much higher probable. The behaviors of the un authorized users are safely prevent by the algorithm and packets with the packets are securely transmitted to the corresponding receiver. Keyword: Cognitive Radio Network,Denial Of Service.× T.Augusty Chandija Lincy, Mrs. S. Murine Sharmili"An Methodical Encroachment on Rooting out System for Networks" Volume 4 - Issue 1 ( 295 - 303 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P42 |
43 |
Implementation of Logistic Management System Using IOT and Open Source Hardware
- N.Sri babu, B.S.S.Tejesh, S.Neeraja, A.S.Prakash 10.29126/23951303/IJET-V4I1P43
Abstract
Managing of Logistics is a significant aspect in Real time applications. Some of the aspects like delay in delivery of goods, real time identification of cargo vehicle, overload of goods in vehicle, misplacement of goods are some of the issues that are facing by the logistics management. The Global positioning system is used to track the location of the cargo based on its latitude and longitude positions. The GSM/GPRS module facilitates the location to the administrator. The RFID system facilitates the tracking and correct placement of goods in the cargo. The Open source hardware facilitates the processing and orderly management of goods details in the webserver. If more goods are placed in the cargo, then the cargo may not move or reach at expected time due to overload of the goods in the cargo. So by the employment of weight sensor the overload of goods in the cargo is eliminated. This system also serves the security purpose as periodically updating of location on the web server the real time data of cargo are updated with the aid of Open source hardware. Integration of IoT, RFID, GPS, GSM/GPRS and open source hardware yields in good results and can perform its activities in real time. This system yields in dynamic updating of data from the cargo and delays in the delivery of goods are also eliminated, positioning of cargo vehicle is provided, overload of goods is also eliminated. Keyword: Logistics, GSM, GPS, Radio Frequency identification, Open source hardware, IoT.× N.Sri babu, B.S.S.Tejesh, S.Neeraja, A.S.Prakash"An Methodical Encroachment on Rooting out System for Networks" Volume 4 - Issue 1 ( 304 - 308 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P43 |
44 |
A Survey on Neural Network Centric Classifier and Clustering Approaches
- Dr. Nilamadhab Mishra 10.29126/23951303/IJET-V4I1P44
Abstract
The data mining process takes data from a data warehouse as input and identifies the hidden patterns. It also extracts hidden predictive information from data warehouse through the Neural Networks tools. The progressive statistical and computational deep data mining process attract the business enterprise towards transforming their huge data into business goldmines. Normally, classification is done through supervised learning mechanism and clustering through unsupervised learning mechanism. In this work, a review is prepared based on the pattern credentials through classifier and clustering methods. Some experimentation has been done to learn and train the neural network architecture for the predefined data set with different activation functions. The review and discussion inspect only the neural based classification and clustering methods. Keyword: classification, clustering, neural network, activation function, data mining, learning algorithm.× Dr. Nilamadhab Mishra"A Survey on Neural Network Centric Classifier and Clustering Approaches" Volume 4 - Issue 1 ( 309 - 316 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P44 |
45 |
Application of Wiener Filtering Techniques for Extraction of Evoked Potential
- Dr. P H S Tejo Murthy, Prasanna A V 10.29126/23951303/IJET-V4I1P45
Abstract
In the present study, the performances of two well-known linear filtering techniques are compared for extraction of auditory Evoked Potential (EP) from a relatively small number of sweeps. Both experimental and simulated data are filtered. Our filtering method consists of Wiener filtering (WF) applications, where conventional WF and Coherence Weighted WF (CWWF)) have been assessed in combination with the Subspace Method (SM). The application of the SM before filtering improves the performance of WF where the CWWF works better than the conventional WF in that case. In conclusion, most of the linear filters show definitely better performance compared to EA. WF effectively reduces the experimental time (to half of that required by EA). The SM that has recently been revealed in EP estimation is found to be a meaningful pre-filter as it significantly reduces the noise level of raw data. Keyword: - - - .× Dr. P H S Tejo Murthy, Prasanna A V"Application of Wiener Filtering Techniques for Extraction of Evoked Potential" Volume 4 - Issue 1 ( 317 - 322 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P45 |
46 |
Detection of Mental Stress using EEG signals
- Natasha P, Nikitha T, Shreyansh Bhatter, Subhashish K, Harshitha R 10.29126/23951303/IJET-V4I1P46
Abstract
Stress is defined as a state of mental or psychological strain or tension resulting from unpleasant or demanding circumstances. These circumstances can be psychological or social. Electroencephalogram (EEG) is a tool to record the electrical activity over the scalp. This technique is widely used in clinical and research setting. In clinical setting, the EEG signal is used to diagnose the disease related to brain. In research setting, the EEG signals are used in rehabilitation; mental stress study. In this paper, detection of stress and identifying of stress levels using electroencephalogram (EEG) analysis in MATLAB using Machine Learning framework is proposed. We discuss several methods that can be used to investigate EEG signals. The features can be obtained via Discrete Cosine Transform and Discrete Wave Transform. The different classifiers that can be used are – Support Vector Machine, Linear Discriminant Analysis, K-Nearest Neighbour, Artificial Neural Network, Naïve Bayes. Keyword: Electroencephalography (EEG), MATLAB, Mental Stress, Machine Learning.× Natasha P, Nikitha T, Shreyansh Bhatter, Subhashish K, Harshitha R"Detection of Mental Stress using EEG signals" Volume 4 - Issue 1 ( 323 - 331 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P46 |
47 |
Managing Immaculate India Dreck Management System Using Sensor with IOT
- N. Ashwini, M. Indra, P. Monisha, R. Salini. 10.29126/23951303/IJET-V4I1P47
Abstract
An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. Modern embedded systems are often based on microcontrollers (i.e. CPUs with integrated memory and/or peripheral interfaces) but ordinary microprocessors (using external chips for memory and peripheral interface circuits) are also still common, especially in more complex systems. In either case, the processor(s) used may be types ranging from rather general purpose to very specialized in certain class of computations, or even custom designed for the application at hand. A common standard class of dedicated processors is the digital signal processor (DSP). We introduce the Smart receptacle framework that recognizes totality of wastage canister. The framework is intended to gather information and to convey the information through remote work arrange. The framework additionally utilizes obligation cycle method to decrease control utilization and to boost operational time. The rain sensor module is a simple device for rain recognition. It can be utilized as a switch when raindrop falls through the sprinkling board and furthermore to measure precipitation power. We present the new idea for shutting the receptacle naturally when the rain sensor sense rain identification. The Smart receptacle framework was tried in an open air condition. Through the proving ground, we gathered information and connected sense-production techniques to acquire litter container use and litter canister day by day regularity data. With such data, wastage canister suppliers and cleaning contractual workers can settle on better choice to build efficiency. Keyword: Buzzer, arduino board, sensor, SPI protocols.× N. Ashwini, M. Indra, P. Monisha, R. Salini"Managing Immaculate India Dreck Management System Using Sensor with IOT" Volume 4 - Issue 1 ( 332 - 338 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P47 |
48 |
CRM through Mining of Customer Online Reviews and Touch Points
- A.Arokia Marshal Roach , G.Raja Raja Cholan. 10.29126/23951303/IJET-V4I1P48
Abstract
Merchants selling products on the web often ask their customers to review the products that they have purchased and the associated services. As e-commerce is becoming more and more popular, the number of customer reviews that a product receives grows rapidly. For a popular product, the number of reviews can be in hundreds or even thousands. This makes it difficult for a potential customer to read them to make an informed decision on whether to purchase the product. It also makes it difficult for the manufacturer of the product to keep track and to manage customer opinions is transferred into a feature-opinion pair and mining is then performed on the formatted comments utilizing the algorithm of association classification. For the manufacturer, there are additional difficulties because many merchant sites may sell the same product and the manufacturer normally produces many kinds of products. In this research, I have used mining to summarize all the customer reviews of a product. There have been several approaches developed based on the concept of discovering different change patterns in patents, news and consumer purchase data. This summarization task is different from traditional text summarization because we only mine the features of the product on which the customers have expressed their opinions and whether the opinions are positive or negative. We do not summarize the reviews by selecting a subset or rewrite some of the original sentences from the reviews to capture the main points as in the classic text summarization. Our task is performed in three steps: (1) mining product features that have been commented on by customers; (2) identifying opinion sentences in each review and deciding whether each opinion sentence is positive or negative; (3) summarizing the results. This paper proposes CRM strategic techniques to perform these tasks. Our experimental results using reviews of a number of products sold online demonstrate the effectiveness of the techniques. The summarized results can help consumers and marketing managers to make decision. Keyword: CRM, Touch points, feedbacks.× A.Arokia Marshal Roach , G.Raja Raja Cholan"CRM through Mining of Customer Online Reviews and Touch Points" Volume 4 - Issue 1 ( 339 - 344 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P48 |
49 |
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
- K Durga Prasad, M.Suresh kumar. 10.29126/23951303/IJET-V4I1P49
Abstract
In this paper, an exportable application-specific instruction-set elliptic curve cryptography processor based on redundant signed digit representation is proposed. The processor employs extensive pipelining techniques for Karatsuba–Of man method to achieve high throughput multiplication. Furthermore, an efficient modular adder without comparison and a high through put modular divider, which results in a short data path for maximized frequency, are implemented. The processor supports the recommended NIST curve P256 and is based on an extended NIST reduction scheme. The proposed processor performs single point multiplication employing points in affine coordinates in 2.26 ms and runs at a maximum frequency of 160 MHz in Xilinx Virtex 5 (XC5VLX110T) field-programmable gate array. Keyword: ASIP, ECC, field-programmable gate array, RSD.× K Durga Prasad, M.Suresh kumar"A High-Speed FPGA Implementation of an RSD-Based ECC Processor" Volume 4 - Issue 1 ( 345 - 350 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P49 |
50 |
Design of Radix- 4 Signed Digit Encoding for Pre- Encoded Multipliers Using Verilog
- V.Indumathi, P.Nagaraju. 10.29126/23951303/IJET-V4I1P50
Abstract
In this paper, we introduce an architecture of pre-encoded multipliers for digital signal processing applications based on off-line encoding of coefficients. To this extend, the Non-Redundant radix-4 Signed-Digit (NR4SD) encoding technique, which uses the digit values f1; 0; þ1; þ2g or f2; 1; 0; þ1g, is proposed leading to a multiplier design with less complex partial products implementation. Extensive experimental analysis verifies that the proposed pre-encoded NR4SD multipliers, including the coefficients memory, are more area and power efficient than the conventional Modified Booth scheme. Keyword: Multiplying circuits, modified Booth encoding, pre-encodedmultipliers, VLSI implementation.× V.Indumathi, P.Nagaraju"Design of Radix- 4 Signed Digit Encoding for Pre- Encoded Multipliers Using Verilog" Volume 4 - Issue 1 ( 351 - 356 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P50 |