Shri Vaishnav Institute of Technology and Science

Indore, India

Shri Vaishnav Institute of Technology and Science

Indore, India
Time filter
Source Type

Chaure B.,Shri Vaishnav Institute of Technology and Science | Jain P.,Shri Vaishnav Institute of Technology and Science
Proceedings of IEEE International Conference on Emerging Technological Trends in Computing, Communications and Electrical Engineering, ICETT 2016 | Year: 2017

There has been a rising interest for fast and simple shopping in the supermarkets. In routine shopping framework charging/bill counters are paralleled distributed to minimize the line yet at the same time it is tedious process so we conveys this procedure at the cart level to make it echelon free. Fundamental point of this paper is to give a programmed billing to abstain from holding up in echelon with theft control mechanism. In which we portray incorporated and automated billing system with theft control instrument. Every shopping cart is executed with an item Identification Device (IID) that contains microcontroller, LCD, standardized barcode reader, load cell and Wi-Fi module. Item data will be perused through barcode scanner on shopping cart; in the interim purchased item information will be send to base station through Wi-Fi module. Base station framework gets the cart data, and enumerates the total amount of purchasing. The focal billing framework also contents a GUI which has all the cart information with a unique id which will running in the store. © 2016 IEEE.

Yadav S.,Shri Vaishnav Institute of Technology and Science | Jain P.,Shri Vaishnav Institute of Technology and Science
ICCCCM 2016 - 2nd IEEE International Conference on Control Computing Communication and Materials | Year: 2017

Current health care organization requires manual caretakers and their heavy duties become a social problem in the modern world which is an extremely time-consuming job. We are proposing a system in which remote drip infusion monitoring and control system has been developed for hospitals. The system contains numerous Infusion monitoring devices, control system, and a central monitor. The infusion monitoring device using an IR sensor which can detect or sense the drip infusion rate(drops per minute), remaining time, an empty infusion solution bag at particular critical set level and also show remaining infusion capacity displayed on central monitor and this information will be sent wirelessly to the crucial or central monitor placed at the nurse's control room and also from central monitor, nurses can control the drip infusion rate. The central monitor receives the data from several infusion monitoring or supervising devices and then displays all the information tabular form to the host PC. The proposed system eliminates continuous on vision/sight monitoring of the patient by nurses. © 2016 IEEE.

Kothari S.,Shri Vaishnav Institute of Technology and Science | Rajavat A.,Shri Vaishnav Institute of Technology and Science
Proceedings of 2016 International Conference on ICT in Business, Industry, and Government, ICTBIG 2016 | Year: 2017

Software development and management of large scale projects are the complicated task. To support the software developers, the object oriented methodologies are used for reducing development efforts. But still a significant amount of efforts and team work is required to design and develop the systems according to the users need. Among them the testing is a one of the key components of software development life cycle. The testing assures about the quality of software development and their services. In this presented work, a new software testing model is proposed and implemented that offers the automated testing with test case generation, optimization and code evaluation. The implementation of the future method is provided using the Java based technologies and their performance is also computed with number of different experiments. During experimentations, either the LOC (line of code) increases to measure the stability of performance or optimization steps increase to find the efficiency of the proposed model. The experimental results demonstrate that the future method is capable to analyse small as well as large scale projects with the less resource consumption and more accurately. © 2016 IEEE.

Sharma S.,Shri Vaishnav Institute of Technology and Science | Rajawat A.S.,Shri Vaishnav Institute of Technology and Science
Proceedings of 2016 International Conference on ICT in Business, Industry, and Government, ICTBIG 2016 | Year: 2017

Nowadays, data mining techniques are massively used via organizations intended for converting huge amount of data into information. Due to the advancement in database technology data are present at distributed sites consequently for carrying data mining analyzing in cost effective way we need to integrate these distributed data at one site. The predicament of anxiety here is that privacy of individual is at risk and we can find out sensitive information upon integration so a secure data model is needed to accomplish this task. In this paper, a new data model is proposed which integrates vertically partitioned distributed data securely by applying encryption on desire attributes, that cause privacy leakage and data owner, can also recover their data subsequent to integration. Further we apply CART algorithm on integrated data set and compared the result with C.45 algorithm to compare various parameter and shows that proposed algorithm give better performance than C.45. © 2016 IEEE.

Dubey J.,Shri Vaishnav Institute of Technology and Science | Tokekar V.,Devi Ahilya University
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | Year: 2012

The Peer-to-Peer (P2P) computing systems are based on desktop computers (PCs) exists at the edge of Internet. This type of frameworks contains several thousands of computing nodes which spread all over the world and need to be organized. To achieve decentralization the P2P computing architectures classify the peers into different groups based on different peer properties. In order to improve the reliability, scalability, and performance of decentralized P2P computing systems efficient peer grouping strategy is required. Here we proposed an algorithm to identify the reliable peer groups in P2P computing systems by using the peer properties like peer availability, credibility and computation time. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.

Mandge T.,Shri Vaishnav Institute of Technology and Science | Choudhary V.,Shri Vaishnav Institute of Technology and Science
2013 International Conference on Information Communication and Embedded Systems, ICICES 2013 | Year: 2013

Information technology is growing day by day, at the same time security of information is major concern. There are various users and organizations who want to prevent their crucial data from attackers and hackers. Various cryptographic systems are developed in past years. A new field of cryptography is emerging based on DNA computing due to high storage capacity, vast parallelism and exceptional energy efficiency of biological DNA. This field is in initial stage so a lot of research has to be done yet. In this paper we are presenting a DNA encryption technique based on matrix manipulation and secure key generation scheme. © 2013 IEEE.

Nagendra R.,Shri Vaishnav Institute of Technology and Science
IEEE International Conference on Computer Communication and Control, IC4 2015 | Year: 2015

Web Architectures are generally designed with particular functional and nonfunctional requirements. Organizations often need to choose Software Architecture for future development from several competing candidate architectures. There are several stakeholders such as client, manager, architect, developers etc, involved in software architecture life cycle. For every stakeholder their own requirements are there in terms of quality attributes. To choose any web architecture, it is very difficult task to identify which is better. Existing system have some limitations. In this paper, we have taken three web architectures Client-server web architecture (CWA), Distributed web architecture (DWA), Service-oriented architecture (SOA). With mathematical approach, according to requirement we are going to select the suitable web architecture from CWA, DWA and SOA. It means that the process software architecture have some scenario in term of quality attribute. In this paper we have used the return of investments (ROI)for test the cost of the web architecture. © 2015 IEEE.

Sharma N.,Shri Vaishnav Institute of Technology and Science
Proceedings of the 2014 Conference on IT in Business, Industry and Government: An International Conference by CSI on Big Data, CSIBIG 2014 | Year: 2014

Health depiction and image are indispensable for patient instruction and self-care. Images characterize an imperative feature of the entire medical knowledge. Presently there is hardly any attempt in automatically construction inclusive image bases for universal health information customers. We proposed an approach to automatically construct a consumer -leaning image library contain images of individual organs, diseases, drugs and other medical entities. Health check imaging has become an important tool not simply in document patient presentation and clinical findings, but also considerate and managing various diseases. Image data present tangible visual evidence of disease manifestation. The number of digital images that needs to be acquired, analyzed, classified, stored and retrieved in the medical centers is exponentially growing with the advances in medical imaging technology. The goal of this work we proposed medical image retrieval technique for pathology images that implements recent improvements in feature representation, efficient indexing, and similarity matching. © 2014 IEEE.

Choudhary K.K.,Shri Vaishnav Institute of Technology and Science
Journal of Physics and Chemistry of Solids | Year: 2012

The temperaturedependent electrical resistivity ρ(T) in metallic and semiconducting phase of ZnO nanostructures is theoretically analysed. ρ(T) shows semiconducting phase in low temperature regime (140 K

Shukla S.,Shri Vaishnav Institute of Technology and Science
The Scientific World Journal | Year: 2014

The purpose of this paper is to introduce the concept of partial rectangular metric spaces as a generalization of rectangular metric and partial metric spaces. Some properties of partial rectangular metric spaces and some fixed point results for quasitype contraction in partial rectangular metric spaces are proved. Some examples are given to illustrate the observed results. © 2014 Satish Shukla.

Loading Shri Vaishnav Institute of Technology and Science collaborators
Loading Shri Vaishnav Institute of Technology and Science collaborators