Proceedings of the International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 2018)

Session: Advanced Computing

12 articles
Proceedings Article

Performance Comparison of Privacy Preserving Perturbation algorithms in Association Rule Mining

Ms Vigneswari, N Komal Kumar, G.V Bharath Kumar, M Vamsi Krishna
This paper depicts the performance comparison of Non-Synthetic and Synthetic privacy preserving data perturbation algorithms. The perturbation algorithms are applied on different kinds of medical dataset which are then deployed on to the ARM(Association Rule Mining) and the experimental results are evaluated...
Proceedings Article

Classification Analysis for Musical Instrument Signal

A. Muthumari
The automatic musical instrument classification taking place in a recording of music has many applications, together with music search through classes, music recommender methods and transcribers. Automatic instrument classification and identification of musical streams has become a difficulty research...
Proceedings Article

Accelerated Simulation of Cell Biological Systems Using Heterogeneous Parallel Processing Platforms- A Survey

K. Abhishek, N. Sreenivasa, S Balaji
Simulation is a handy toolkit of scientists and engineers of all disciplines. Modeling and simulation helps in overall reduction of cost, increases the quality of products and systems, and documents and archives lessons learnt. This paper reviews modeling and simulation of cell biological systems in...
Proceedings Article

Secure on Demand Multicast Routing for Network Attacks in Wireless Mesh Network

S. Balaji, T Sasilatha
Multicast routing in wireless mesh networks can be accomplished based on link quality metrics to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and...
Proceedings Article

Improved Data Dissemination using Intelligent Stimulus Mechanisms in IoT Network

R. Radhika, Dr.K Kulothungan
Internet of Things (IoT) is virtually connecting object in the physical world to the internet, where a huge number of embedded devices relays on communication service offered by the internet protocols and these devices are termed as smart objects. Since the smart devices have low configuration it has...
Proceedings Article

Resilience Secured Architecture by Deploying Overlay Network in Cyber Physical Systems

S Prayla Shyry, SL Jany Shabu, J Refonaa, CL Steffi Sterlin
Communication networks in Cyber Physical Systems exchange the data between different devices or participants within a system. In those networks, nodes are not only used for transmitting and receiving the data, but also for deciding the path of data flow. As the nodes must store the routing table and...
Proceedings Article

Personalized Testimonial System Using Cardio Signals

SL Jany Shabu, S Prayla Shyry, J Refonaa, CL Steffi Sterlin
In general, the heart cardio sound is used to predispose the heart's physical conditions. The review says that the idiosyncrasy extracted from heart helps in finding out the disorder that has occurred, and this idiosyncrasy is attained using ECG (electro cardio gram). This signal can be used in a better...
Proceedings Article

Healthcare recommender system based on Smart–health Routes

M Sandeep Kumar, J Prabhu
Recommender systems have proved more significant area of research and outstanding to the technology progress in mobile devices like smartphone and tables. Mobile technology is grown quickly due to social networking. The concept of a recommender system to provide item feedback to the user in which it...
Proceedings Article

Detection of Mobile Replica Node Attacks in Mobile Computing Environment using GUIDE Technique

M Subathira Devi, G Sakthigopalan, S Santhoshkumar, D Karunkuzhali
Mobile computing is a term used to refer to a variety of devices that allow accessing data and information from anytime, anyplace, anywhere. The mobile networks are often deployed in complex environments in which to provide a secure transmission and also to detect the hackers. An adversary can capture...
Proceedings Article

Managing Interclass Variation In Human Action Recognition

K Akila, S Chitrakala
Background: Human action recognition encompasses a scope for an automatic analysis of current events from video and has varied applications in multi-various fields. Recognizing and understanding of human actions from videos still remains a difficult downside as a result of the massive variations in human...
Proceedings Article

Psoriasis Severity Assessment of 2-D Psoriasis Skin Images

S Raaghavi, M Ragini
Psoriasis, meaning "itchy condition", is a chronic skin disease that is characterized by scaly, reddened patches. It is a recurring disease with varying severity ranging from slight limited flakes to entire body. Psoriasis Area and Severity Index (PASI) is the most conventional method for measuring the...
Proceedings Article

Secured Storage for Cloud Based Relational Database Management Systems

S Muthurajkumar, S Murugesan, A Kannan
The Cloud database system is a new trend which anticipated to reshape all developments in computer technology. The data outsourced may be confidential which results in encryption of the documents. The proposed system applies encryption techniques for storage with security. This system considers structured...