Time filter

Source Type

Dubey J.,Shri Vaishnav Institute of Technology and Science | Tokekar V.,Devi Ahilya University
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | Year: 2012

The Peer-to-Peer (P2P) computing systems are based on desktop computers (PCs) exists at the edge of Internet. This type of frameworks contains several thousands of computing nodes which spread all over the world and need to be organized. To achieve decentralization the P2P computing architectures classify the peers into different groups based on different peer properties. In order to improve the reliability, scalability, and performance of decentralized P2P computing systems efficient peer grouping strategy is required. Here we proposed an algorithm to identify the reliable peer groups in P2P computing systems by using the peer properties like peer availability, credibility and computation time. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.


Rajavat A.,Shri Vaishnav Institute of Technology and Science | Tokekar V.,Institute of Engineering and Technology DAVV
Communications in Computer and Information Science | Year: 2011

Maintaining legacy system to meet continual changing user and business needs is difficult. However organization must consider modernizing these legacy systems to remain viable. Variety of solutions is available for legacy system modernization. Reaching a decision about how to evolve a legacy system cannot be made spontaneously; rather it requires understanding the strengths and weaknesses of each modernization technique. Over the past few years reengineering has emerged as a popular modernization technique. Decision about when to evolve a legacy system through reengineering cannot be made spontaneously; rather it should require risk assessment of legacy application from system, managerial and technical point of view. We present a decision driven risk assessment framework ReeRisk that examines system, managerial and technical domain of legacy system in accordance with requirements of target system. The result of ReeRisk framework is used to take decision about when evolution of a legacy system through reengineering is successful. © 2011 Springer-Verlag Berlin Heidelberg.


Pandey S.,Shri Vaishnav Institute of Technology and Science | Tokekar V.,Institute of Engineering and Technology
Proceedings - 2014 4th International Conference on Communication Systems and Network Technologies, CSNT 2014 | Year: 2014

Big Data has come up with aureate haste and a clef enabler for the social business, Big Data gifts an opportunity to create extraordinary business advantage and better service delivery. Big Data is bringing a positive change in the decision making process of various business organizations. With the several offerings Big Data has come up with several issues and challenges which are related to the Big Data Management, Big Data processing and Big Data analysis. Big Data is having challenges related to volume, velocity and variety. Big Data has 3Vs Volume means large amount of data, Velocity means data arrives at high speed, Variety means data comes from heterogeneous resources. In Big Data definition, Big means a dataset which makes data concept to grow so much that it becomes difficult to manage it by using existing data management concepts and tools. Map Reduce is playing a very significant role in processing of Big Data. This paper includes a brief about Big Data and its related issues, emphasizes on role of MapReduce in Big Data processing. MapReduce is elastic scalable, efficient and fault tolerant for analysing a large set of data, highlights the features of MapReduce in comparison of other design model which makes it popular tool for processing large scale data. Analysis of performance factors of MapReduce shows that elimination of their inverse effect by optimization improves the performance of Map Reduce. © 2014 IEEE.


Choudhary K.K.,Shri Vaishnav Institute of Technology and Science
Bulletin of Materials Science | Year: 2013

The observed frequency dependent optical response of alkali.metal-doped fulleride superconductors (Tc ≈ 19 K) has been theoretically analysed. The calculations of the optical conductivity, σ(ω), have been made within the two-component schemes: one is the coherent Drude carriers (electrons) responsible for superconductivity and the other is incoherent motion of carriers from one atom to other atom of C60 molecule to a pairing between Drude carriers. The approach accounts for the anomalies reported (frequency dependence of optical conductivity) in the optical measurements for the normal state. The model has only one free parameter, the relaxation rate. The frequency dependent relaxation rates are expressed in terms of memory functions. The coherent Drude carriers form a sharp peak at zero frequency and a long tail at higher frequencies, i.e. in the infrared region. However, the hopping of carriers from one atom to the other (incoherent motion of doped electrons) yields a peak value in the optical conductivity centred at mid-infrared region. It is found that both the Drude and hopping carriers will contribute to the optical process of conduction in the K3C 60 and shows similar results on optical conductivity in the mid-infrared as well as infrared frequency regions as those revealed from experiments. © Indian Academy of Sciences.


Mandge T.,Shri Vaishnav Institute of Technology and Science | Choudhary V.,Shri Vaishnav Institute of Technology and Science
2013 International Conference on Information Communication and Embedded Systems, ICICES 2013 | Year: 2013

Information technology is growing day by day, at the same time security of information is major concern. There are various users and organizations who want to prevent their crucial data from attackers and hackers. Various cryptographic systems are developed in past years. A new field of cryptography is emerging based on DNA computing due to high storage capacity, vast parallelism and exceptional energy efficiency of biological DNA. This field is in initial stage so a lot of research has to be done yet. In this paper we are presenting a DNA encryption technique based on matrix manipulation and secure key generation scheme. © 2013 IEEE.


Nagendra R.,Shri Vaishnav Institute of Technology and Science
IEEE International Conference on Computer Communication and Control, IC4 2015 | Year: 2015

Web Architectures are generally designed with particular functional and nonfunctional requirements. Organizations often need to choose Software Architecture for future development from several competing candidate architectures. There are several stakeholders such as client, manager, architect, developers etc, involved in software architecture life cycle. For every stakeholder their own requirements are there in terms of quality attributes. To choose any web architecture, it is very difficult task to identify which is better. Existing system have some limitations. In this paper, we have taken three web architectures Client-server web architecture (CWA), Distributed web architecture (DWA), Service-oriented architecture (SOA). With mathematical approach, according to requirement we are going to select the suitable web architecture from CWA, DWA and SOA. It means that the process software architecture have some scenario in term of quality attribute. In this paper we have used the return of investments (ROI)for test the cost of the web architecture. © 2015 IEEE.


Sharma N.,Shri Vaishnav Institute of Technology and Science
Proceedings of the 2014 Conference on IT in Business, Industry and Government: An International Conference by CSI on Big Data, CSIBIG 2014 | Year: 2014

Health depiction and image are indispensable for patient instruction and self-care. Images characterize an imperative feature of the entire medical knowledge. Presently there is hardly any attempt in automatically construction inclusive image bases for universal health information customers. We proposed an approach to automatically construct a consumer -leaning image library contain images of individual organs, diseases, drugs and other medical entities. Health check imaging has become an important tool not simply in document patient presentation and clinical findings, but also considerate and managing various diseases. Image data present tangible visual evidence of disease manifestation. The number of digital images that needs to be acquired, analyzed, classified, stored and retrieved in the medical centers is exponentially growing with the advances in medical imaging technology. The goal of this work we proposed medical image retrieval technique for pathology images that implements recent improvements in feature representation, efficient indexing, and similarity matching. © 2014 IEEE.


Sharma S.,Shri Vaishnav Institute of Technology and Science | Rajawat A.S.,Shri Vaishnav Institute of Technology and Science
ACM International Conference Proceeding Series | Year: 2016

Nowadays, with the improvement of internet technology and advancement in distributed computing data is increasing rapidly. There is a need of information sharing between organizations. Ideally, we wish to share data from multiple private databases and want to extract information or knowledge from it. For this reason, organizations integrate their data to carry decision making task. The integration should be done in such a way that privacy of individual should not be at risk. There are many techniques such as privacy preserving data mining, k-anonymity, l-diversity and other techniques are developed for preventing the privacy of data owner. In this paper, we present a survey of various privacy preserving models and suggest a new technique for privacy preservation in multi-party data release framework that improving the privacy with minimum cost requirements and suitable for both numerical and categorical sensitive attributes. © 2016 ACM.


Choudhary K.K.,Shri Vaishnav Institute of Technology and Science
Journal of Physics and Chemistry of Solids | Year: 2012

The temperaturedependent electrical resistivity ρ(T) in metallic and semiconducting phase of ZnO nanostructures is theoretically analysed. ρ(T) shows semiconducting phase in low temperature regime (140 K


Shukla S.,Shri Vaishnav Institute of Technology and Science
The Scientific World Journal | Year: 2014

The purpose of this paper is to introduce the concept of partial rectangular metric spaces as a generalization of rectangular metric and partial metric spaces. Some properties of partial rectangular metric spaces and some fixed point results for quasitype contraction in partial rectangular metric spaces are proved. Some examples are given to illustrate the observed results. © 2014 Satish Shukla.

Loading Shri Vaishnav Institute of Technology and Science collaborators
Loading Shri Vaishnav Institute of Technology and Science collaborators