Papers by IJCERT Publications

This paper presents an in-depth exploration of the application of smart contracts in blockchain t... more This paper presents an in-depth exploration of the application of smart contracts in blockchain technology, emphasizing their transformative potential in various domains. The primary objective of this study is to evaluate the efficacy of smart contracts in revolutionizing current systems, particularly focusing on their implementation in voting systems. Traditional voting mechanisms are fraught with challenges such as susceptibility to fraud, lack of transparency, and inefficiencies in vote tallying. The methodology adopted involves a comparative analysis of existing systems and the proposed blockchain-based model, along with a prototype development to empirically assess the performance of smart contracts in a voting context. Findings from the study indicate a significant enhancement in system performance when employing smart contracts. Notably, the blockchain-based voting system achieved a transaction throughput of 62.5 transactions per minute and maintained a system latency of only 14.5 seconds, showcasing its capability to handle high volumes of data efficiently and promptly. Furthermore, the accuracy of the vote tally was remarkably high at 99.98%, instilling confidence in the integrity of the election process. User satisfaction also stood out, with an 85% positive response, highlighting the system's user-friendliness and security. One of the key achievements of this research is the demonstration of how smart contracts can address the inherent weaknesses of traditional systems by providing a more secure, transparent, and efficient alternative. The paper concludes by outlining future work directions, such as enhancing transaction throughput and further reducing system latency, to make blockchain-based systems more scalable and responsive.
MVC) over IEEE 802.11e Wireless Local Area Networks (WLANs). To support the varying Quality-of-Se... more MVC) over IEEE 802.11e Wireless Local Area Networks (WLANs). To support the varying Quality-of-Service (QoS) requirements of emerging applications, four access categories (ACs) have been defined in the IEEE 802.11e standard. Each AC has a different transmission priority, which implies the higher the transmission priority, the better the opportunity to transmit. In order to improve the transmission of video data over IP networks, the Multiview Video Coding (MVC) extension of the H.264/MPEG 4 AVC standard has been introduced. The MVC adopts the layered video scheme. The proposed mapping algorithm utilizes a cross-layer approach and dynamically assigns packets of different layers to one of the four ACs. The experiment results demonstrate that the proposed mapping algorithm achieves better QoS than the conventional methods such as the static mapping algorithm.
MVC) over IEEE 802.11e Wireless Local Area Networks (WLANs). To support the varying Quality-of-Se... more MVC) over IEEE 802.11e Wireless Local Area Networks (WLANs). To support the varying Quality-of-Service (QoS) requirements of emerging applications, four access categories (ACs) have been defined in the IEEE 802.11e standard. Each AC has a different transmission priority, which implies the higher the transmission priority, the better the opportunity to transmit. In order to improve the transmission of video data over IP networks, the Multiview Video Coding (MVC) extension of the H.264/MPEG 4 AVC standard has been introduced. The MVC adopts the layered video scheme. The proposed mapping algorithm utilizes a cross-layer approach and dynamically assigns packets of different layers to one of the four ACs. The experiment results demonstrate that the proposed mapping algorithm achieves better QoS than the conventional methods such as the static mapping algorithm.

International Journal of Computer Engineering in Research Trends, 2017
Storage outsourcing turned into a rising trend with the advent of the cloud computing, advancing
... more Storage outsourcing turned into a rising trend with the advent of the cloud computing, advancing
the secure remote data auditing to be the future research area. Other than this research considers the
problem of data dynamics support, public verifiability and dispute arbitration simultaneously. The data
dynamics problem in auditing is solved by presenting an index switcher to preserve a mapping between block
indices and tag indices and eradicate the passive outcome of block indices in the tag computation without
incurring much overhead. We provide fairness guarantee and dispute arbitration in our scheme, which
ensures that both the data owner and the cloud cannot misbehave in the auditing process or else it is easy for
a third-party arbitrator to find out the cheating party. The framework is reaching out by executing the data
dynamically and reasonable discretion on gatherings in the future.

International Journal of Computer Engineering in Research Trends, 2017
Image compression is an important research area in an image processing system. Due to the
compres... more Image compression is an important research area in an image processing system. Due to the
compression of data rates, this finds crucial in applications of information security for the fast transmission.
Singular Value Decomposition (SVD) is a compression technique which performs compression by using a
smaller rank to approximate the original matrix of an image. SVD offers good PSNR values with low
compression ratios. Compression using SVD for different singular values (Sv) with an acceptable PSNR
increases the encoding time (ET). To minimize the encoding time, in this paper a fast compression technique
SVD-BPSO is proposed using singular value decomposition and butterfly particle swarm optimization
(BPSO). Application of the concept of BPSO towards singular value decomposition reduces the encoding
time and improves the transmission speed. The performance of the proposed SVD-BPSO compression
method is compared with SVD without optimization technique. The simulation results showed that the
method achieves good PSNR with the minimum encoding time.

International Journal of Computer Engineering in Research Trends, 2017
Now people are not interested to carry systems along with them so we introduced mobile applicatio... more Now people are not interested to carry systems along with them so we introduced mobile application "ABES" (Automatic bus enquiry system). Previously if we want to know any information about bus we should make a call to the enquiry system or by searching through internet. But now we can get all information about bus through this "ABES" app. In this application we are providing the all services related to the bus stand. We also provide the information about the bus time table and possible paths the all buses can travel. In this application user wants to find out the bus time from one place to another place. User needs to give the details of source and destination. Accordingly it will display the details of the bus going in that route .It is a time saving application to user. We are also providing the information about the source in which user are aware about the all the things related to that place. Number of time what happened passengers are going to the bus stand at that time bus may be late or passengers are late so that they are miss that bus they going to wait for next bus and time is also wasted , so to saving the time we will make this application. Most important benefit of this application is that, this application is not location restricted. User can use this application at any place. Because of that user can access all information related to bus at any time anywhere. This is an android based application.
International Journal of Computer Engineering in Research Trends, 2017
Reflection or obstruction from images is a major reason for quality degradation of images in
imag... more Reflection or obstruction from images is a major reason for quality degradation of images in
image processing. Camera Flash is frequently used to capture a good photograph of a scene under low light
conditions. However, flash images have many problems: The flash can often be blinding and too strong,
leading to blown out images. This report presents separate algorithms described in the literature that
attempts to remove obstructions computationally. The strengths and weaknesses of each algorithm outlined.

International Journal of Computer Engineering in Research Trends, 2017
Nowadays Cloud Computing is an emerging Technology which leads various primitive services like
Sa... more Nowadays Cloud Computing is an emerging Technology which leads various primitive services like
SaaS, IaaS, and PaaS. Data deduplication mechanism is widely used to improve the bandwidth and storage
space by removing duplicate copies of data from distributed cloud server.In Multi-owner manner data is stored
and shared on distributed cloud server architecture, we have noticed some of the challenging issues, i.e., Users
Privacy, Data Integrity, Load Balancing and Dynamic Ownership changes in attributes I,e User revocation
Issues. To address the above challenges, we suggested a novel framework for Secure Data Deduplication over
Distributed Cloud Server Framework with Effective User Revocation and Load Balancing Management. In our
proposed framework, Block level hashing is pragmatic for every outsourced data and distributed into chunks and
stored on distributed cloud servers, PoW protocol trappings Secured data deduplication and also provide an
optimized solution for user revocation and load balancing issues , our projected approach is effective as the
previous schemes while the added computational in the clouds is negligible.

Nowadays Cloud Computing is an emerging Technology which leads various primitive services like Sa... more Nowadays Cloud Computing is an emerging Technology which leads various primitive services like SaaS, IaaS, and PaaS. Data deduplication mechanism is widely used to improve the bandwidth and storage space by removing duplicate copies of data from distributed cloud server.In Multi-owner manner data is stored and shared on distributed cloud server architecture, we have noticed some of the challenging issues, i.e., Users Privacy, Data Integrity, Load Balancing and Dynamic Ownership changes in attributes I,e User revocation Issues. To address the above challenges, we suggested a novel framework for Secure Data Deduplication over Distributed Cloud Server Framework with Effective User Revocation and Load Balancing Management. In our proposed framework, Block level hashing is pragmatic for every outsourced data and distributed into chunks and stored on distributed cloud servers, PoW protocol trappings Secured data deduplication and also provide an optimized solution for user revocation and load balancing issues , our projected approach is effective as the previous schemes while the added computational in the clouds is negligible.

International Journal of Computer Engineering in Research Trends, 2017
Nowadays distinctions of sensing facilities equipped with mobile wireless devices. Likewise, diff... more Nowadays distinctions of sensing facilities equipped with mobile wireless devices. Likewise, different service provider named participatory sensing system made available which gives outstanding life experience to users. Nevertheless, there are many challenges like privacy and multimedia data quality. There is no any earlier system that can resolve problems of confidentiality and quality, preserving participatory sensing system with multimedia data. Slicer is a K-anonymous privacy preservation scheme for participatory sensing with multimedia data over cloud framework. It combines data coding methods and message transfer strategies. To get the secure protection of user’s high data quality and also maintains privacy. Minimal Cost Transfer and Transfer On Meet-up, these are two data transfer strategies. For Minimal Cost Transfer, two parallel algorithms used. i.e., approximation algorithm and Heuristic algorithm. Slicer provides data quality with low communication.
International Journal of Computer Engineering in Research Trends, 2017
In today's world the number of mobile users is increasing day by day with the limited capacity th... more In today's world the number of mobile users is increasing day by day with the limited capacity there is a need for intelligent techniques that can provide same QOS (Quality of Service) across mobile users. In this paper existing methods namely Bartlett Method, Maximum Likelihood and MUSIC (Multiple Signal Classification) Method are described and simulated for various combinations of antenna elements and mobile separation configurations.

International Journal of Computer Engineering in Research Trends, 2017
In the current era of cloud computing, the distinct enterprise information technology (IT) and
bu... more In the current era of cloud computing, the distinct enterprise information technology (IT) and
business decision makers analyze the security implications of cloud computing to their business for the benefit
of improving the business agility. Cloud has been playing a major role in the various multidisciplinary domains.
Recent survey stated that 70% research issues are focusing on cloud security domain. Although, cloud is
providing the huge amount of services to the users, still the client end level security problem is not completely
eradicated. So, there is a major focus on improving and finding the solution for cloud security to know the
various potential risks in the customer end. Several large cloud vendors have signaled practical
implementations of the security mechanism, primarily to protect the cloud infrastructure from insider threats
and advanced persistent threats. So, the proposed model brings the solution for giving the guaranteed type of
cloud services in an attack free manner to the web clients. This could be achieved through the technique of
client level guaranteed security system defensive approach. This mechanism will majorly operates on how to
protect the user authentication procedures, security,policies, security layered approach from the client level
transactions. The proposed work will be simulated on the cloud sim tool, through which end-users will obtain
the better security solution in the public cloud environment.
International Journal of Computer Engineering in Research Trends, 2017
In Imaging Science, Image processing is processing of images using mathematical operations by
usi... more In Imaging Science, Image processing is processing of images using mathematical operations by
using any form of signal processing for which the input is an image, a series of images, or a video, such as a
photograph or video frame; the output of image processing may be either an image or a set of characteristics or
parameters related to the image. These image processing techniques can be used to perform applications in
real-world. This image processing technique helps to improve various aspects related in the real- world. Some
of these applications are in the field of health science, security assurance and augmented reality and also this
can be applied in real-time applications. All these applications are performed by using image processing as its
basic platform.

International Journal of Computer Engineering in Research Trends, 2017
With the exponential increase in the number of vehicles and world population day by day, vehicle ... more With the exponential increase in the number of vehicles and world population day by day, vehicle availability and usage on the road in recent years, finding a space for parking the bike is becoming more and more difficult with resulting in the number of conflicts such as traffic problems. This is about creating a reliable system that takes over the task of identifying free slots in a parking area and keeping the record of vehicles parked very systematic manner.This project lessens human effort at the parking area to a great extent such as in case of searching of free slots by the driver and calculating the payment for each vehicle using parking area. The various steps involved in this operation are vehicle identification using RFID tags, free slot detection using IR sensors and payment calculation is done on the basis of period of parking and this is done with the help of real time clock.
International Journal of Computer Engineering in Research Trends, 2017
In this paper, the IEPSO-ARM technique used Eclat algorithm for generating the association rules.... more In this paper, the IEPSO-ARM technique used Eclat algorithm for generating the association rules. With help of
Eclat algorithm, IEPSO-ARM technique initially estimates the support value to find the frequent items in the dataset and
then determines correlation value to generate the association rules. Finally, the IEPSO-ARM technique designed an Eclat
based Particle Swarm Optimization (E-PSO) algorithm for generating the optimized association rule to analyze the
frequently buying products by customer in supermarkets and to improve sales growth maintenance of supermarkets. The
performance of IEPSO-ARM technique is tested with the metrics such as running time for frequent itemset generation,
memory for association rule generation and number of rules generated.
International Journal of Computer Engineering in Research Trends, 2017
Developing a virtual classroom system to promote a more preponderant count of students to splurge... more Developing a virtual classroom system to promote a more preponderant count of students to splurge into the
field of inculcation. It integrates the benefits of a physical classroom with the accommodation of a ‘no-physical-bar’ virtual
learning environment, minus the commuting hazards and expenses. It will usher in the immense flexibility and
sophistication in the subsisting learning platform structures, with the impeccable coalescence of synchronous and
asynchronous interaction. It provides an expedient of collaborative learning for the students.

International Journal of Computer Engineering in Research Trends, 2018
This paper presents a comparative study on clustering methods and developments made at various ti... more This paper presents a comparative study on clustering methods and developments made at various times. Clustering is defined as unsupervised learning where the objects are grouped on the basis of some similarity inherent among them. There are different methods for clustering objects such as hierarchical, partitioned, grid, density based and model-based. Many algorithms exist that can solve the problem of clustering, but most of them are very sensitive to their input parameters. Therefore it is essential to evaluate the result of the clustering algorithm. It is difficult to define whether a clustering result is acceptable or not; thus several clustering validity techniques and indices have been developed. Cluster validity indices are used for measuring the goodness of a clustering result comparing to other ones which were created by other clustering algorithms, or by the same algorithms but using different parameter values. The results of a clustering algorithm on the same data set can vary as the input parameters of an algorithm can extremely modify the behaviour and execution of the algorithm the intention of this paper is to describe the clustering process with an overview of different clustering methods and analysis of clustering validity indices.

International Journal of Computer Engineering in Research Trends, 2018
This paper provides a survey on plant leaf disease detection technique by using image processing.... more This paper provides a survey on plant leaf disease detection technique by using image processing. Plants play a vital role in a humans life; they fulfil our daily needs from food to breathing, We must take care of plants. India is an agricultural country, and about 70% of people depend on agriculture. Plant disease detection is an emerging field in India as agriculture is an important sector that affects the economy and social life, so leaf disease detection is a significant research topic. Fungi, bacteria, and viruses cause most of the diseases on plants. Due to the diseases on the plant the quality and quantity of agriculture product are reduced. To detect the disease on plants, there is a need of experts, but it is the very costly procedure and time-consuming too. To reduce the cost and for the better results, we are using the automation techniques, which will be very helpful in detecting the disease at early stage. The paper discusses an automatic disease detection technique using soft computing.
International Journal of Computer Engineering in Research Trends, 2018
Clustering is the grouping of a particular set of objects based on their characteristics, aggrega... more Clustering is the grouping of a particular set of objects based on their characteristics, aggregating them according to their similarities. Regarding data mining, this methodology partitions the data implementing a specific join algorithm, most suitable for the desired information analysis. Clusters will obtained by using density-based clustering and DBSCAN clustering. DBSCAN cluster is a fast clustering technique, large complexity and requires more parameters. To overcome these problems uses the OPTICS Density-based algorithm. The algorithm requires single factor, namely the least amount of points in a cluster which can necessary as input in density- based technique. Using random projection improving the cluster quality and runtime.
International Journal of Computer Engineering in Research Trends, 2018
The Quick Response (QR) code was designed for storing information and high-speed reading applicat... more The Quick Response (QR) code was designed for storing information and high-speed reading applications. With the wide application of QR code, the security problem of a QR code is severe, such as information leakage and data tampering. The QR code contains a secret message. To solve the QR information security problem, this paper proposed visual secret sharing schemes for QR code message. Invisible secret sharing scheme the QR code message is divided into several parts called shares, which separately reveals no knowledge about the QR code message. By stacking two or more shares one another, QR code message can be revealed and visually recognized. It improves the security of the data transmission and also improves the clarity of a secret image.
Uploads
Papers by IJCERT Publications
the secure remote data auditing to be the future research area. Other than this research considers the
problem of data dynamics support, public verifiability and dispute arbitration simultaneously. The data
dynamics problem in auditing is solved by presenting an index switcher to preserve a mapping between block
indices and tag indices and eradicate the passive outcome of block indices in the tag computation without
incurring much overhead. We provide fairness guarantee and dispute arbitration in our scheme, which
ensures that both the data owner and the cloud cannot misbehave in the auditing process or else it is easy for
a third-party arbitrator to find out the cheating party. The framework is reaching out by executing the data
dynamically and reasonable discretion on gatherings in the future.
compression of data rates, this finds crucial in applications of information security for the fast transmission.
Singular Value Decomposition (SVD) is a compression technique which performs compression by using a
smaller rank to approximate the original matrix of an image. SVD offers good PSNR values with low
compression ratios. Compression using SVD for different singular values (Sv) with an acceptable PSNR
increases the encoding time (ET). To minimize the encoding time, in this paper a fast compression technique
SVD-BPSO is proposed using singular value decomposition and butterfly particle swarm optimization
(BPSO). Application of the concept of BPSO towards singular value decomposition reduces the encoding
time and improves the transmission speed. The performance of the proposed SVD-BPSO compression
method is compared with SVD without optimization technique. The simulation results showed that the
method achieves good PSNR with the minimum encoding time.
image processing. Camera Flash is frequently used to capture a good photograph of a scene under low light
conditions. However, flash images have many problems: The flash can often be blinding and too strong,
leading to blown out images. This report presents separate algorithms described in the literature that
attempts to remove obstructions computationally. The strengths and weaknesses of each algorithm outlined.
SaaS, IaaS, and PaaS. Data deduplication mechanism is widely used to improve the bandwidth and storage
space by removing duplicate copies of data from distributed cloud server.In Multi-owner manner data is stored
and shared on distributed cloud server architecture, we have noticed some of the challenging issues, i.e., Users
Privacy, Data Integrity, Load Balancing and Dynamic Ownership changes in attributes I,e User revocation
Issues. To address the above challenges, we suggested a novel framework for Secure Data Deduplication over
Distributed Cloud Server Framework with Effective User Revocation and Load Balancing Management. In our
proposed framework, Block level hashing is pragmatic for every outsourced data and distributed into chunks and
stored on distributed cloud servers, PoW protocol trappings Secured data deduplication and also provide an
optimized solution for user revocation and load balancing issues , our projected approach is effective as the
previous schemes while the added computational in the clouds is negligible.
business decision makers analyze the security implications of cloud computing to their business for the benefit
of improving the business agility. Cloud has been playing a major role in the various multidisciplinary domains.
Recent survey stated that 70% research issues are focusing on cloud security domain. Although, cloud is
providing the huge amount of services to the users, still the client end level security problem is not completely
eradicated. So, there is a major focus on improving and finding the solution for cloud security to know the
various potential risks in the customer end. Several large cloud vendors have signaled practical
implementations of the security mechanism, primarily to protect the cloud infrastructure from insider threats
and advanced persistent threats. So, the proposed model brings the solution for giving the guaranteed type of
cloud services in an attack free manner to the web clients. This could be achieved through the technique of
client level guaranteed security system defensive approach. This mechanism will majorly operates on how to
protect the user authentication procedures, security,policies, security layered approach from the client level
transactions. The proposed work will be simulated on the cloud sim tool, through which end-users will obtain
the better security solution in the public cloud environment.
using any form of signal processing for which the input is an image, a series of images, or a video, such as a
photograph or video frame; the output of image processing may be either an image or a set of characteristics or
parameters related to the image. These image processing techniques can be used to perform applications in
real-world. This image processing technique helps to improve various aspects related in the real- world. Some
of these applications are in the field of health science, security assurance and augmented reality and also this
can be applied in real-time applications. All these applications are performed by using image processing as its
basic platform.
Eclat algorithm, IEPSO-ARM technique initially estimates the support value to find the frequent items in the dataset and
then determines correlation value to generate the association rules. Finally, the IEPSO-ARM technique designed an Eclat
based Particle Swarm Optimization (E-PSO) algorithm for generating the optimized association rule to analyze the
frequently buying products by customer in supermarkets and to improve sales growth maintenance of supermarkets. The
performance of IEPSO-ARM technique is tested with the metrics such as running time for frequent itemset generation,
memory for association rule generation and number of rules generated.
field of inculcation. It integrates the benefits of a physical classroom with the accommodation of a ‘no-physical-bar’ virtual
learning environment, minus the commuting hazards and expenses. It will usher in the immense flexibility and
sophistication in the subsisting learning platform structures, with the impeccable coalescence of synchronous and
asynchronous interaction. It provides an expedient of collaborative learning for the students.