Manish Tembhurkar | G.H.Raisoni College of Engineering (original) (raw)

Papers by Manish Tembhurkar

Research paper thumbnail of Energy Efficient VoIP Communication Using WSN Clustering Approach

All in-text references underlined in blue are linked to publications on ResearchGate, letting you... more All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Car Convoy Communicator: Active Control Noise Reduction in Vanet Using Wireless Sensors

The issue of noise pollution is very paramount in India, especially cites with huge traffic. One ... more The issue of noise pollution is very paramount in India, especially cites with huge traffic. One of the major reasons for noise pollution is increasing vehicular honking. Therefore we intend to aid in vehicular honking by bringing in a hardware that involves an individual vehicle to communicate with the other vehicle and blow the horn for the vehicle in front but the horn's sound will be heard only by the person inside the vehicle. The implementation of directing the horn is achieved through sensors mounted on the vehicles. The vehicles will communicate using Vehicular AdHoc Network (VANET). The use of microcontroller, LCD Display, keypad, sensors and some other electronic devices coupled together will help in accomplishment of our project. Here, we are using transmitters and receivers to form network. Each transmitter and receiver has its own power, range and angle for transmitting and receiving signals. The transmitter will send a signal to the receiver, if the signal is recei...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comparitive Analysis of EAP Authentication Mechanism for WLAN

In recent years, WLANs have been developing rapidly and are increasingly being used in many appli... more In recent years, WLANs have been developing rapidly and are increasingly being used in many applications. The extensive application of WLAN has been using an authentication framework widely called as Extensible Authentication Protocol (EAP). The requirements for EAP methods (i.e. Authentication mechanisms built on EAP) in WLAN authentication have been defined in RFC 4017 are issues also increasingly receiving widespread attention. To achieve user efficiency and robust security, lightweight computation and forward secrecy, not included in RFC 4017, are also desired in WLAN authentication. However, all EAP methods and authentication protocols designed for WLANs so far do not satisfy all of the above properties. With detailed analysis of all EAP Methods and authentication protocols designed for WLANs, this article pointed out properties of all EAP method. Keywords— EAP Method, Authentication, WLAN

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Review on High Dimensional Data Visualization

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Voice Capacity Evaluation over Wi-Fi Network

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Autonomous Aquatic Vehicle Routing Using Raspberry PI

Stereovision is 3D concept in which camera capturing the multiple images. Our purpose is to devel... more Stereovision is 3D concept in which camera capturing the multiple images. Our purpose is to develop an autonomous system which should be able to monitor the obstacle, objects, buoys etc. and it will spark off the navigation system and intimate the base station about it. We put forward to develop a system using small size computer circuit (Raspberry PI). We propose a method of two frontal stereo vision cameras (which are mounted on water navigation system) for Detection and avoidance of the object. This system monitors the object on routing path and calibrate the alternate route.[1] The final system should be capable of spot and following the destination path in a distance of over 5 meters. http://www.ijarcsse.com/docs/papers/Volume_5/4_April2015/V5I4-0682.pdf

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Voice Capacity Evaluation over Wi-Fi Network

To satisfy customer and with good market benefits, voice over Wi-Fi networks can ensure voice qua... more To satisfy customer and with good market benefits, voice over Wi-Fi networks can ensure voice quality depending on various network parameters, configurations and traffic conditions such as channel noise, capturing effects. Accuracy in voice capacity estimation model leads satisfaction to network designers. This paper reviews an analytical model which evaluate voice over Internet Protocol (VoIP) capacity and over Wi-Fi networks. ITU-T E-model is introduced to ensure good voice quality and VoIP call capacity.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Understanding WSN Routing approaches for Energy Efficient VoIP communication: A Review

VoIP refers to communications services —voice and/or voice-messaging applications— that are tran ... more VoIP refers to communications services —voice and/or voice-messaging applications— that are tran sported via the Internet, rather than the public switched telephone network (PSTN). Rate of evolution of mobile services (such as data transfer service (GPRS, EDGE, 3G, and 4G LTE), audio & video player service, camera with higher resolution, GPS) is much higher than that of energy resources or energy conservation. The wide deployment of Voice-over-IP (VoIP) over IEEE 802.11 wireless LAN causes higher rate of energy con sumption which is a major issue both in wireless sensor network as well as in mobile networks. Researchers have found out several solution to overcome this issue such as Greencall Algorithm (allows mobile station to sleep at various time interval results in energy-consu mption reduction), algorithm through trace-driven simulations as well as experiments on commodity hardware/software [Energy-Efficient VoIP over Wireless LAN s]. More efficient & effective solution is needed.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Comparative analysis on Security Techniques in VoIP Environment

VoIP is technology for transmitting voice and data over IP for communication. It has various bene... more VoIP is technology for transmitting voice
and data over IP for communication. It has various
benefits such as, voice messaging, calling, video messaging
as well as video conferencing with file sharing. VoIP is
better than Public Switched Telephone Network (PSTN)
and cellular network. We can see all the services in VoIP
based application such as Skype, Google talk. Due to the
file sharing and information transformation in VoIP, there
are more chances to loss valuable data information. For
that the security provisions must be there. To prevent
from such problem there are various techniques designed.
In this research paper we study that various techniques
proposed for security in VoIP environment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of an Efficient Initial Access Authentication over MANET

Nowadays, the importance of Mobile Ad hoc Networks (MANETs) is growing rapidly especially in mil... more Nowadays, the importance of Mobile Ad hoc Networks
(MANETs) is growing rapidly especially in military and business applications. It is crucial to have a more efficient initial link setup mechanism. In this work, we propose an efficient initial access authentication protocol, which realizes the authentications and key distribution through least roundtrip messages. We propose efficient initial access authentication mechanism over MANET that is more efficient than any message authentication method in the literature. The key idea behind the proposed method is to
provide efficient initial authentication as well as to provide secure message passing between Mobile user and authentication server. Furthermore, a simple and practical method is presented to make compatible with MANET.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Car Convoy Communicator: Active Control Noise Reduction in Vanet Using Wireless Sensors

ISSN: 2277 128X, Mar 30, 2015

The issue of noise pollution is very paramount in India, especially cites with huge traffic. One ... more The issue of noise pollution is very paramount in India, especially cites with huge traffic. One of the major reasons for noise pollution is increasing vehicular honking. Therefore we intend to aid in vehicular honking by bringing in a hardware that involves an individual vehicle to communicate with the other vehicle and blow the horn for the vehicle in front but the horn’s sound will be heard only by the person inside the vehicle. The implementation of directing the horn is achieved through sensors mounted on the vehicles. The vehicles will communicate using Vehicular AdHoc Network (VANET). The use of microcontroller, LCD Display, keypad, sensors and some other electronic devices coupled together will help in accomplishment of our project. Here, we are using transmitters and receivers to form network. Each transmitter and receiver has its own power, range and angle for transmitting and receiving signals. The transmitter will send a signal to the receiver, if the signal is received by the receiver then an acknowledgement is sent to the transmitter, which is indicated by the blinking of a light. On the receiver side, sound is generated by the speaker. If acknowledgement is not received then secondary horn is blown for the concerned person. LCD Display is used for communication between the two vehicles with a standard set of options defined.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comparitive Analysis of EAP Authentication Mechanism for WLAN

International Journal of Computer Sciences and Engineering (IJCSE), Jan 31, 2015

In recent years, WLANs have been developing rapidly and are increasingly being used in many appli... more In recent years, WLANs have been developing rapidly and are increasingly being used in many applications. The
extensive application of WLAN has been using an authentication framework widely called as Extensible Authentication
Protocol (EAP). The requirements for EAP methods (i.e. Authentication mechanisms built on EAP) in WLAN authentication
have been defined in RFC 4017 are issues also increasingly receiving widespread attention. To achieve user efficiency and
robust security, lightweight computation and forward secrecy, not included in RFC 4017, are also desired in WLAN
authentication. However, all EAP methods and authentication protocols designed for WLANs so far do not satisfy all of the
above properties. With detailed analysis of all EAP Methods and authentication protocols designed for WLANs, this article
pointed out properties of all EAP method.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of Multimedia Player based on Android

ISBN No. : 978-3-643-24820-01, Dec 20, 2014

Many users like to watch video by a mobile phone, but the media player has many limitations. With... more Many users like to watch video by a mobile phone, but the media player has many limitations. With a rapid development of communication and network, multimedia based technology is adopted in media player. Different approaches shows in this paper are plug-in extension technology, multimedia based on hierarchy, media player based on file browser, media player based on FFmpeg (Fast Forward Moving Picture Expert Group), media player based on file server.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Overview on Data Mining Schemes to Design Business Intelligence Framework for Mobile Technology

www.ijarcs.info, Dec 2014

Mining is such as automated technology which facilitates us to find the relations between various... more Mining is such as automated technology which facilitates us to find the relations between various parameters and predicts the future outcomes of business sector. Mining tools (data mining, text mining, and web mining) are used to foreseen the future, profit, investment relations in large databases for BI. In this paper, we review various data mining tools and techniques and their performance in BI sectors. Finally, we shall state some of the important factors to be considered while designing & developing a BI framework using data mining techniques for various sectors.
Business Intelligence (BI) has turned out to be a predictable technological advantage in the last couple of years, for the large enterprises (especially Mobile Technology Ventures). Such ventures could afford to buy, implement and maintain BI solutions. Recently, small and medium size enterprises all over the globe have understood the competitive and financial benefits of BI. However, limited IT budgets of small companies and BI’s high total cost of ownership have created a gap between large and small enterprises where small enterprises do not become fortunate to avail the virtues of BI because of the affordability factor. This Paper provides the systematic study and analysis of various factors (Data Mining techniques, BI framework and their effects on designing a successful automated decision making system). It presents the strong knowledge foundation so that one can give a proper justice to achieve BI objectives.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Overview on Performance Testing Approach in Big Data

www.ijarcs.info, Dec 2014

Big data is defined as large amount of data which requires new technologies and architectures so ... more Big data is defined as large amount of data which requires new technologies and architectures so that it becomes possible to extract value from it by capturing and analysis process. Big data due to its various properties like volume, velocity, variety, variability, value, complexity and performance put forward many challenges. Many organizations are facing challenges in facing test strategies for structured and unstructured data validation, setting up optimal test environment, working with non relational database and performing non functional testing.
These challenges cause poor quality of data in production, delay in implementation and increase in cost. Map Reduce provides a parallel and scalable programming model for data-intensive business and scientific applications. To obtain the actual performance of big data applications, such as response time, maximum online user data capacity size, and a certain maximum processing capacity.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Review on High Dimensional Data Visualization

R S. Publication (rspublication.com),, May 2014

Large high dimensional dataset encloses billions of entries and contains different attributes and... more Large high dimensional dataset encloses billions of entries and contains different attributes and relational databases. Data cube aggregation operation is a well-known technique used to implement data-mining for larger size databases. Spatial data are sometimes assumed to have absorbed prohibitively large amount of space, which consequently requires disk storage. Thus it is required to pre-compute every possible aggregate query over the database. Modern scientific applications are generating larger and larger volume of data at ever increasing rate. As datasets become bulkier, exploratory data visualization turns out to be more difficult and complex, and data-fetching turns into a time-consuming process in small devices. Nanocubes are in-memory data structures, specifically designed to speed up queries for multidimensional data cubes, and could eventually be used as a backend for these types of applications. Nanocubes offer efficient storage and querying of large, multidimensional, spatiotemporal datasets and high dimensional datasets.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Stereo Vision for Autonomous Vehicle Routing Using Raspberry PI

International Journal of Emerging Technology and Advanced Engineering, Feb 25, 2015

- In the present scenario, stereovision deals with 3D images which calibrate the objects. The ca... more - In the present scenario, stereovision deals with
3D images which calibrate the objects. The calibration
procedure discovers the intrinsic and extrinsic parameters
of stereo rig. Stereovision captors left and right images with
or without any obstacle presence for calibration.
Our objective is to develop an autonomous system which
should be able to monitor the objects, obstacle, buoys etc.
and it will trigger the navigation system and intimate the
bus station about it. We propose to develop a system using
small size computer circuit (Raspberry PI). We propose an
approach of two frontal stereovision cameras (which are
mounted on water navigation system) for Detection and
avoidance of the object. Our system monitors the object on
routing path and calibrate the alternate route. The final
system should be capable of identifying and following the
destination path in a distance of over 5 meters.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of EAP Authentication Mechanisms for WLAN: A Review

3rd National Conference of Innovative Research Trends in Computer Science Engineering & Technology 2014, Dec 3, 2014

In recent years, with more extensive application of WLAN has been using an authentication framew... more In recent years, with more extensive application of
WLAN has been using an authentication framework widely
called as Extensible Authentication Protocol (EAP). The
requirements for EAP methods (i.e. Authentication mechanisms
built on EAP) in WLAN authentication have been defined in
RFC 4017 are issues also increasingly receiving widespread
attention. To achieve user efficiency and robust security,
lightweight computation and forward secrecy, not included in
RFC 4017, are desired in WLAN authentication. However, all
EAP methods and authentication protocols designed for WLANs
so far do not satisfy all of the above properties. With detailed
analysis of all EAP Methods and authentication protocols
designed for WLANs, this article pointed out properties of all
EAP method.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Voice Capacity Evaluation over Wi-Fi Network

R S. Publication (rspublication.com),, May 2014

To satisfy customer and with good market benefits, voice over Wi-Fi networks can ensure voice qua... more To satisfy customer and with good market benefits, voice over Wi-Fi networks can ensure voice quality depending on various network parameters, configurations and traffic conditions such as channel noise, capturing effects. Accuracy in voice capacity estimation model leads satisfaction to network designers. This paper reviews an analytical model which evaluate voice over Internet Protocol (VoIP) capacity and over Wi-Fi networks. ITU-T E-model is introduced to ensure good voice quality and VoIP call capacity.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy Efficient VoIP Communication Using WSN Clustering Approach

The 8th IEEE International Conference on Computer Science & Education (ICCSE 2013)

VoIP refers to communications services —voice and/or voice-messaging applications— that are tran... more VoIP refers to communications services —voice
and/or voice-messaging applications— that are transported via
the Internet, rather than the public switched telephone network
(PSTN). Rate of evolution of mobile services (such as data
transfer service (GPRS, EDGE, 3G, and 4G LTE), audio & video
player service, camera with higher resolution, GPS) is much
higher than that of energy resources or energy conservation. The
wide deployment of Voice-over-IP (VoIP) over IEEE 802.11
wireless LAN causes higher rate of energy consumption which
is a major issue both in wireless sensor network as well as in
mobile networks. Researchers have found out several solutions to
overcome this issue such as Greencall Algorithm, algorithm
through trace-driven simulations as well as experiments on
commodity hardware/software [Energy-Efficient VoIP over
Wireless LANs]. More efficient & effective solution is needed.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy Efficient VoIP Communication Using WSN Clustering Approach

All in-text references underlined in blue are linked to publications on ResearchGate, letting you... more All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Car Convoy Communicator: Active Control Noise Reduction in Vanet Using Wireless Sensors

The issue of noise pollution is very paramount in India, especially cites with huge traffic. One ... more The issue of noise pollution is very paramount in India, especially cites with huge traffic. One of the major reasons for noise pollution is increasing vehicular honking. Therefore we intend to aid in vehicular honking by bringing in a hardware that involves an individual vehicle to communicate with the other vehicle and blow the horn for the vehicle in front but the horn's sound will be heard only by the person inside the vehicle. The implementation of directing the horn is achieved through sensors mounted on the vehicles. The vehicles will communicate using Vehicular AdHoc Network (VANET). The use of microcontroller, LCD Display, keypad, sensors and some other electronic devices coupled together will help in accomplishment of our project. Here, we are using transmitters and receivers to form network. Each transmitter and receiver has its own power, range and angle for transmitting and receiving signals. The transmitter will send a signal to the receiver, if the signal is recei...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comparitive Analysis of EAP Authentication Mechanism for WLAN

In recent years, WLANs have been developing rapidly and are increasingly being used in many appli... more In recent years, WLANs have been developing rapidly and are increasingly being used in many applications. The extensive application of WLAN has been using an authentication framework widely called as Extensible Authentication Protocol (EAP). The requirements for EAP methods (i.e. Authentication mechanisms built on EAP) in WLAN authentication have been defined in RFC 4017 are issues also increasingly receiving widespread attention. To achieve user efficiency and robust security, lightweight computation and forward secrecy, not included in RFC 4017, are also desired in WLAN authentication. However, all EAP methods and authentication protocols designed for WLANs so far do not satisfy all of the above properties. With detailed analysis of all EAP Methods and authentication protocols designed for WLANs, this article pointed out properties of all EAP method. Keywords— EAP Method, Authentication, WLAN

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Review on High Dimensional Data Visualization

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Voice Capacity Evaluation over Wi-Fi Network

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Autonomous Aquatic Vehicle Routing Using Raspberry PI

Stereovision is 3D concept in which camera capturing the multiple images. Our purpose is to devel... more Stereovision is 3D concept in which camera capturing the multiple images. Our purpose is to develop an autonomous system which should be able to monitor the obstacle, objects, buoys etc. and it will spark off the navigation system and intimate the base station about it. We put forward to develop a system using small size computer circuit (Raspberry PI). We propose a method of two frontal stereo vision cameras (which are mounted on water navigation system) for Detection and avoidance of the object. This system monitors the object on routing path and calibrate the alternate route.[1] The final system should be capable of spot and following the destination path in a distance of over 5 meters. http://www.ijarcsse.com/docs/papers/Volume_5/4_April2015/V5I4-0682.pdf

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Voice Capacity Evaluation over Wi-Fi Network

To satisfy customer and with good market benefits, voice over Wi-Fi networks can ensure voice qua... more To satisfy customer and with good market benefits, voice over Wi-Fi networks can ensure voice quality depending on various network parameters, configurations and traffic conditions such as channel noise, capturing effects. Accuracy in voice capacity estimation model leads satisfaction to network designers. This paper reviews an analytical model which evaluate voice over Internet Protocol (VoIP) capacity and over Wi-Fi networks. ITU-T E-model is introduced to ensure good voice quality and VoIP call capacity.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Understanding WSN Routing approaches for Energy Efficient VoIP communication: A Review

VoIP refers to communications services —voice and/or voice-messaging applications— that are tran ... more VoIP refers to communications services —voice and/or voice-messaging applications— that are tran sported via the Internet, rather than the public switched telephone network (PSTN). Rate of evolution of mobile services (such as data transfer service (GPRS, EDGE, 3G, and 4G LTE), audio & video player service, camera with higher resolution, GPS) is much higher than that of energy resources or energy conservation. The wide deployment of Voice-over-IP (VoIP) over IEEE 802.11 wireless LAN causes higher rate of energy con sumption which is a major issue both in wireless sensor network as well as in mobile networks. Researchers have found out several solution to overcome this issue such as Greencall Algorithm (allows mobile station to sleep at various time interval results in energy-consu mption reduction), algorithm through trace-driven simulations as well as experiments on commodity hardware/software [Energy-Efficient VoIP over Wireless LAN s]. More efficient & effective solution is needed.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Comparative analysis on Security Techniques in VoIP Environment

VoIP is technology for transmitting voice and data over IP for communication. It has various bene... more VoIP is technology for transmitting voice
and data over IP for communication. It has various
benefits such as, voice messaging, calling, video messaging
as well as video conferencing with file sharing. VoIP is
better than Public Switched Telephone Network (PSTN)
and cellular network. We can see all the services in VoIP
based application such as Skype, Google talk. Due to the
file sharing and information transformation in VoIP, there
are more chances to loss valuable data information. For
that the security provisions must be there. To prevent
from such problem there are various techniques designed.
In this research paper we study that various techniques
proposed for security in VoIP environment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of an Efficient Initial Access Authentication over MANET

Nowadays, the importance of Mobile Ad hoc Networks (MANETs) is growing rapidly especially in mil... more Nowadays, the importance of Mobile Ad hoc Networks
(MANETs) is growing rapidly especially in military and business applications. It is crucial to have a more efficient initial link setup mechanism. In this work, we propose an efficient initial access authentication protocol, which realizes the authentications and key distribution through least roundtrip messages. We propose efficient initial access authentication mechanism over MANET that is more efficient than any message authentication method in the literature. The key idea behind the proposed method is to
provide efficient initial authentication as well as to provide secure message passing between Mobile user and authentication server. Furthermore, a simple and practical method is presented to make compatible with MANET.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Car Convoy Communicator: Active Control Noise Reduction in Vanet Using Wireless Sensors

ISSN: 2277 128X, Mar 30, 2015

The issue of noise pollution is very paramount in India, especially cites with huge traffic. One ... more The issue of noise pollution is very paramount in India, especially cites with huge traffic. One of the major reasons for noise pollution is increasing vehicular honking. Therefore we intend to aid in vehicular honking by bringing in a hardware that involves an individual vehicle to communicate with the other vehicle and blow the horn for the vehicle in front but the horn’s sound will be heard only by the person inside the vehicle. The implementation of directing the horn is achieved through sensors mounted on the vehicles. The vehicles will communicate using Vehicular AdHoc Network (VANET). The use of microcontroller, LCD Display, keypad, sensors and some other electronic devices coupled together will help in accomplishment of our project. Here, we are using transmitters and receivers to form network. Each transmitter and receiver has its own power, range and angle for transmitting and receiving signals. The transmitter will send a signal to the receiver, if the signal is received by the receiver then an acknowledgement is sent to the transmitter, which is indicated by the blinking of a light. On the receiver side, sound is generated by the speaker. If acknowledgement is not received then secondary horn is blown for the concerned person. LCD Display is used for communication between the two vehicles with a standard set of options defined.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comparitive Analysis of EAP Authentication Mechanism for WLAN

International Journal of Computer Sciences and Engineering (IJCSE), Jan 31, 2015

In recent years, WLANs have been developing rapidly and are increasingly being used in many appli... more In recent years, WLANs have been developing rapidly and are increasingly being used in many applications. The
extensive application of WLAN has been using an authentication framework widely called as Extensible Authentication
Protocol (EAP). The requirements for EAP methods (i.e. Authentication mechanisms built on EAP) in WLAN authentication
have been defined in RFC 4017 are issues also increasingly receiving widespread attention. To achieve user efficiency and
robust security, lightweight computation and forward secrecy, not included in RFC 4017, are also desired in WLAN
authentication. However, all EAP methods and authentication protocols designed for WLANs so far do not satisfy all of the
above properties. With detailed analysis of all EAP Methods and authentication protocols designed for WLANs, this article
pointed out properties of all EAP method.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of Multimedia Player based on Android

ISBN No. : 978-3-643-24820-01, Dec 20, 2014

Many users like to watch video by a mobile phone, but the media player has many limitations. With... more Many users like to watch video by a mobile phone, but the media player has many limitations. With a rapid development of communication and network, multimedia based technology is adopted in media player. Different approaches shows in this paper are plug-in extension technology, multimedia based on hierarchy, media player based on file browser, media player based on FFmpeg (Fast Forward Moving Picture Expert Group), media player based on file server.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Overview on Data Mining Schemes to Design Business Intelligence Framework for Mobile Technology

www.ijarcs.info, Dec 2014

Mining is such as automated technology which facilitates us to find the relations between various... more Mining is such as automated technology which facilitates us to find the relations between various parameters and predicts the future outcomes of business sector. Mining tools (data mining, text mining, and web mining) are used to foreseen the future, profit, investment relations in large databases for BI. In this paper, we review various data mining tools and techniques and their performance in BI sectors. Finally, we shall state some of the important factors to be considered while designing & developing a BI framework using data mining techniques for various sectors.
Business Intelligence (BI) has turned out to be a predictable technological advantage in the last couple of years, for the large enterprises (especially Mobile Technology Ventures). Such ventures could afford to buy, implement and maintain BI solutions. Recently, small and medium size enterprises all over the globe have understood the competitive and financial benefits of BI. However, limited IT budgets of small companies and BI’s high total cost of ownership have created a gap between large and small enterprises where small enterprises do not become fortunate to avail the virtues of BI because of the affordability factor. This Paper provides the systematic study and analysis of various factors (Data Mining techniques, BI framework and their effects on designing a successful automated decision making system). It presents the strong knowledge foundation so that one can give a proper justice to achieve BI objectives.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Overview on Performance Testing Approach in Big Data

www.ijarcs.info, Dec 2014

Big data is defined as large amount of data which requires new technologies and architectures so ... more Big data is defined as large amount of data which requires new technologies and architectures so that it becomes possible to extract value from it by capturing and analysis process. Big data due to its various properties like volume, velocity, variety, variability, value, complexity and performance put forward many challenges. Many organizations are facing challenges in facing test strategies for structured and unstructured data validation, setting up optimal test environment, working with non relational database and performing non functional testing.
These challenges cause poor quality of data in production, delay in implementation and increase in cost. Map Reduce provides a parallel and scalable programming model for data-intensive business and scientific applications. To obtain the actual performance of big data applications, such as response time, maximum online user data capacity size, and a certain maximum processing capacity.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Review on High Dimensional Data Visualization

R S. Publication (rspublication.com),, May 2014

Large high dimensional dataset encloses billions of entries and contains different attributes and... more Large high dimensional dataset encloses billions of entries and contains different attributes and relational databases. Data cube aggregation operation is a well-known technique used to implement data-mining for larger size databases. Spatial data are sometimes assumed to have absorbed prohibitively large amount of space, which consequently requires disk storage. Thus it is required to pre-compute every possible aggregate query over the database. Modern scientific applications are generating larger and larger volume of data at ever increasing rate. As datasets become bulkier, exploratory data visualization turns out to be more difficult and complex, and data-fetching turns into a time-consuming process in small devices. Nanocubes are in-memory data structures, specifically designed to speed up queries for multidimensional data cubes, and could eventually be used as a backend for these types of applications. Nanocubes offer efficient storage and querying of large, multidimensional, spatiotemporal datasets and high dimensional datasets.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Stereo Vision for Autonomous Vehicle Routing Using Raspberry PI

International Journal of Emerging Technology and Advanced Engineering, Feb 25, 2015

- In the present scenario, stereovision deals with 3D images which calibrate the objects. The ca... more - In the present scenario, stereovision deals with
3D images which calibrate the objects. The calibration
procedure discovers the intrinsic and extrinsic parameters
of stereo rig. Stereovision captors left and right images with
or without any obstacle presence for calibration.
Our objective is to develop an autonomous system which
should be able to monitor the objects, obstacle, buoys etc.
and it will trigger the navigation system and intimate the
bus station about it. We propose to develop a system using
small size computer circuit (Raspberry PI). We propose an
approach of two frontal stereovision cameras (which are
mounted on water navigation system) for Detection and
avoidance of the object. Our system monitors the object on
routing path and calibrate the alternate route. The final
system should be capable of identifying and following the
destination path in a distance of over 5 meters.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of EAP Authentication Mechanisms for WLAN: A Review

3rd National Conference of Innovative Research Trends in Computer Science Engineering & Technology 2014, Dec 3, 2014

In recent years, with more extensive application of WLAN has been using an authentication framew... more In recent years, with more extensive application of
WLAN has been using an authentication framework widely
called as Extensible Authentication Protocol (EAP). The
requirements for EAP methods (i.e. Authentication mechanisms
built on EAP) in WLAN authentication have been defined in
RFC 4017 are issues also increasingly receiving widespread
attention. To achieve user efficiency and robust security,
lightweight computation and forward secrecy, not included in
RFC 4017, are desired in WLAN authentication. However, all
EAP methods and authentication protocols designed for WLANs
so far do not satisfy all of the above properties. With detailed
analysis of all EAP Methods and authentication protocols
designed for WLANs, this article pointed out properties of all
EAP method.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Voice Capacity Evaluation over Wi-Fi Network

R S. Publication (rspublication.com),, May 2014

To satisfy customer and with good market benefits, voice over Wi-Fi networks can ensure voice qua... more To satisfy customer and with good market benefits, voice over Wi-Fi networks can ensure voice quality depending on various network parameters, configurations and traffic conditions such as channel noise, capturing effects. Accuracy in voice capacity estimation model leads satisfaction to network designers. This paper reviews an analytical model which evaluate voice over Internet Protocol (VoIP) capacity and over Wi-Fi networks. ITU-T E-model is introduced to ensure good voice quality and VoIP call capacity.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy Efficient VoIP Communication Using WSN Clustering Approach

The 8th IEEE International Conference on Computer Science & Education (ICCSE 2013)

VoIP refers to communications services —voice and/or voice-messaging applications— that are tran... more VoIP refers to communications services —voice
and/or voice-messaging applications— that are transported via
the Internet, rather than the public switched telephone network
(PSTN). Rate of evolution of mobile services (such as data
transfer service (GPRS, EDGE, 3G, and 4G LTE), audio & video
player service, camera with higher resolution, GPS) is much
higher than that of energy resources or energy conservation. The
wide deployment of Voice-over-IP (VoIP) over IEEE 802.11
wireless LAN causes higher rate of energy consumption which
is a major issue both in wireless sensor network as well as in
mobile networks. Researchers have found out several solutions to
overcome this issue such as Greencall Algorithm, algorithm
through trace-driven simulations as well as experiments on
commodity hardware/software [Energy-Efficient VoIP over
Wireless LANs]. More efficient & effective solution is needed.

Bookmarks Related papers MentionsView impact