IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: INFORMATION SECURED STEELTH STEGANOGRAPHY USING MMS (SSS IN MMS)
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES087
Register Paper ID - 180584
Title: INFORMATION SECURED STEELTH STEGANOGRAPHY USING MMS (SSS IN MMS)
Author Name(s): N.V.L.Neelima, D.Himabindu, Rambabu M
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 495-504
Year: March 2018
Downloads: 2783
Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography is the word derived from Greek. Stego means hiding, graphy means writing. It is the science of embedding information into the cover image viz., text, video and image without causing statistically significant modification to the cover image. If the selected image is color image, then convert the image into pixels and the pixels into cells. Read each pixel and generate the color code for that pixel. Here we use LSB(least significant bit) technique to hide the message into the image. LSB data hiding technique does not affect the visible properties of the image. For using LSB technique, we first convert the color code into binary language. Now by using LSB technique, we change the least significant bit value for the binary code generated before. So after changing the least significant bit value whatever value we get, for that number we see the color code and then we hide our text in that pixel which will contain that particular color code. Repeat this process until we hide our full message.
Licence: creative commons attribution 4.0
Steganography, Cover image, Pixels, Cells, LSBTechnique, Binary code
Paper Title: EVALUATING THE IMPACT OF STEMMING ACCURACY ON INFORMATION RETRIEVAL
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES086
Register Paper ID - 180596
Title: EVALUATING THE IMPACT OF STEMMING ACCURACY ON INFORMATION RETRIEVAL
Author Name(s): MD.Afzal, Khaza.K.B.Vali Basha.SK
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 491-494
Year: December - 2017
Downloads: 2780
In the present years, Text mining is a developing examination issue in Data Mining. Stemming is to discover stop of specific word. Stemming method is utilized to reduce words length to their resource structure, by expelling derivational and inflectional suffix. Various analysts have proposed the procedures for evaluating the quality and closeness of stemming calculations in various ways. This information the measure of the content quantity reduces by the stemming procedure however couldn't be valuable to numeral the exactness of the stemmer. In this paper, we have utilized one of them to evaluate the quality and proposed one basis for measuring the strength(WSF) and two criteria for measuring the accuracy(CSF and AWCF) of stemming calculation. The examination assesses the quality and exactness of four distinctive closes migration stemming calculations what's more, discovered that every one of the calculations allowed. in this paper are solid and heavier, yet are less precise. In any case, the precision of accurately stemmed words and conflating variation expressions of same gathering to medication source word is great, yet not edible, in Paice/Husk stemmer than alternate stemmers
Licence: creative commons attribution 4.0
Published Paper ID: - IJCRTNCES085
Register Paper ID - 180595
Title: --
Author Name(s): M. Muni Babu, K. Mamatha
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 486-490
Year: December - 2017
Downloads: 2968
The usage of buffer cache improves the system performance and throughput when buffer cache utilized very effectively. For effective use of buffer cache having many techniques in those pattern based methodology works very efficiently and enhance the system performance. Future block reference is identified from the detected pattern. Marginal gain functions are used for managing the partitions. This proposed methodology main aim is improve the buffer cache hit ratio used to enhance the performance
Licence: creative commons attribution 4.0
Buffer Cache, Cache Partition, Replacement policies
Paper Title: TWO- FACTOR DATA SECURITY PROTECTION FOR DATA STORED IN THE CLOUD STORAGE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES084
Register Paper ID - 180594
Title: TWO- FACTOR DATA SECURITY PROTECTION FOR DATA STORED IN THE CLOUD STORAGE
Author Name(s): CH.Sangeetha, P.Prashanth Kumar, A.Ravi Kumar
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 482-485
Year: December - 2017
Downloads: 2717
This Scheme proposed an upgrade information security system for cloud the use of two Components. In this framework sender sends an encoded message to a recipient with the help of cloud component. The sender requires to catch distinguishing proof of collector however no need of different data which joins declaration or open key. To decode the outline content, recipient wants components. The main information or is an exceptional non-open security device or some tools associated with the tablet framework. Second one is close to home key or discharge key put away inside the PC. Without having those issues outline message in no way, nature or form decoded. The critical part is the security apparatus lost or stolen, at that point form content can't be decoded and equipment device is rejected out to decode outline fictional matter. The execution and security assessment show that the device is secure not resisted for all reasons and purposes connected. The device makes utilization of another equipment tool. This paper proposes Identity Based and characteristic based encryption approach of distributed storage which might be implementable On cloud stage. The record investigations the attainability of the applying encryption set of arrangements for information security and privacy in distributed storage with all sort of present day calculations.
Licence: creative commons attribution 4.0
Two- Factor Data Security Protection
Paper Title: SECURE AND EFFICIENT KEYWORD SEARCH IN MULTIPLE CLOUD SERVERS WITH USING PKE & SSE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES083
Register Paper ID - 180593
Title: SECURE AND EFFICIENT KEYWORD SEARCH IN MULTIPLE CLOUD SERVERS WITH USING PKE & SSE
Author Name(s): Nagarapu Urmila, P.Prashanth Kumar, A.Ravi Kumar
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 478-481
Year: December - 2017
Downloads: 2680
we explore the security of an outstanding cryptographic primitive, in particular Public Key Encryption with Keyword Search which is exceptionally valuable in numerous uses of distributed storage. Unfortunately, it has been demonstrated that the normal PEKS structure experiences a natural weakness called inside Keyword Guessing Attack forced by the harmful server. Distributed computing, huge scope of clients and measurements administrators are affected to outsource their realities to cloud servers for enormous accommodation and diminished cost required for data administration. In any case, vital actualities should be scrambled sooner than outsourcing for security necessities, which utilizes records use method like catchphrase fundamentally, based record recovery. Accessible encryption is of expanding excitement for ensuring the information insurance in quiet accessible circulated carport. In this paper, we thinks about the security of a remarkable cryptographic primitive, especially, Public Key Encryption with Keyword Search (PEKS) that is very profitable in a few usages of distributed storage. The customary PEKS structure reports an unavoidable precariousness known as inside Brute Force catchword guesses attack moved through the cruel server. To address this security helplessness, we recommend some other PEKS framework named Dual Server PEKS (DS-PEKS). Through this propose framework, we can enhance the security for distributed storage frameworks.
Licence: creative commons attribution 4.0
Paper Title: IMAGE PROCESSING IN DATA MINING BY USING COLOR K-MEANS CLUSTERING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES082
Register Paper ID - 180592
Title: IMAGE PROCESSING IN DATA MINING BY USING COLOR K-MEANS CLUSTERING
Author Name(s): KRISHNA MOORTHY, KANNEDARI GOPIKRISHNA, RAMBABU M
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 473-477
Year: December - 2017
Downloads: 2884
Now-a-days people are interested in using digital images. There is a great need for developing an efficient technique for finding an image. Image mining is a vital technique which is used to mine knowledge straight forwardly from image. Image segmentation is the primary phase in image mining. It has been a difficult task in computer vision. The role of image segmentation is to decompose an image into parts that are meaningful with respect to the particular applications. The goal of data mining process is to extract information from a data set and transform it into an understandable structure for further use. The pixel discovery is critical issue for any specialists. In this work a strategy to recognize pixels by utilizing picture preparing methods with incorporates picture pre-handling , picture division, extraction, morphological operations and grouping system is used. Abnormal pixels are identified in filtered image by using marker controlled watershed segmentation and gradient magnitude. This present work proposes a technique to identify the pixel point adequately from the filter pictures. It will minimize blunder made by the human exposed eye. MATLAB is broadly utilized programming for the investigation of data mining identification from filtered pictures. We utilized MATLAB 2017b for building up this anticipate.
Licence: creative commons attribution 4.0
picture identification, Gaussian mixture, watershed transform, morphological functions, L*a*b color based, k-means clustering, Thresholding, MATLAB 2017b
Paper Title: ENHANCING THE BUG TOSSING GRAPHS AND CHARACTERISTICS OF BUG SIMILARITIES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES081
Register Paper ID - 180591
Title: ENHANCING THE BUG TOSSING GRAPHS AND CHARACTERISTICS OF BUG SIMILARITIES
Author Name(s): T.L.N.Varaprasad, Rambabu M
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 467-472
Year: December - 2017
Downloads: 2725
A bug report is typically assigned to a single developer who is then responsible for fixing the bug. Development a new bug firstly is found by developers or users. Then the bug is described as a bug report, which is submitted to a bug repository. Finally the bug trigger checks the bug report and typically assigns a developer to fix the bug. The assignment process is time-consuming and error-prone. Furthermore, a large number of bug reports are tossed (reassigned) to other developers, which increases bug-fix time. In order to quickly identify the fixer to bug reports we present an approach based on the bug tossing history and textual similarities between bug reports. This proposed approach is evaluated on Eclipse and Mozilla. The results show that our approach can significantly improve the efficiency of bug assignment: the bug fixer is often identified with fewer tossing events.
Licence: creative commons attribution 4.0
bug assignment, bug reports, bug tossing, information retrieval, software engineering
Paper Title: A COMPARATIVE STUDY ON BIGDATA WITH DTA MINING AND ITS APPLICATIONS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES080
Register Paper ID - 180590
Title: A COMPARATIVE STUDY ON BIGDATA WITH DTA MINING AND ITS APPLICATIONS
Author Name(s): Ganga Patur
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 462-466
Year: December - 2017
Downloads: 2728
Licence: creative commons attribution 4.0
Big data, big data architecture, Data mining issues
Paper Title: IMPROVING DATA SECURITY IN AUDIO STEGANOGRAPHY WITH PADDING LSB TECHNIQUES AND AUDIO FILES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES079
Register Paper ID - 180589
Title: IMPROVING DATA SECURITY IN AUDIO STEGANOGRAPHY WITH PADDING LSB TECHNIQUES AND AUDIO FILES
Author Name(s): G.Srikanth, K.Ganesh Kumar, K.Shivangini Reddy, Rambabu M
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 456-461
Year: December - 2017
Downloads: 2756
The project entitled Audio Steganography is the application developed to embed an audio file in another audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of stenography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of stenography.The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations .Thus it is necessary that the hidden message should be encrypted.
Licence: creative commons attribution 4.0
Audio Steganography , Padding LSB Techniques
Paper Title: DESIGNING OF CONTENT BASED IMAGE RETRIEVAL USING BOTH COLOR AND SHAPE FEATURES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES078
Register Paper ID - 180587
Title: DESIGNING OF CONTENT BASED IMAGE RETRIEVAL USING BOTH COLOR AND SHAPE FEATURES
Author Name(s): Raghu Kumar Lingamallu
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 451-455
Year: December - 2017
Downloads: 2662
Content-Based image acts to get back (CBIR) uses the seeing what is in of an image such as color, form, feeling of a material, and spatial general design to represent and list of words in a book the image. action-bound make observations in CBIR is geared in the direction of the development of methodologies for getting at details, interpreting price listing and giving pointer image knowledge-bases. In addition to their development, efforts are also being made to value the operation of image acts to get back systems. The quality of move is heavily dependent on the good quality of the careful way used to produce point gives directions to be taken and likeness measure for comparison of points. In this paper we offered an algorithm which makes into company the more chances of different other algorithms to get well the having no error and doing a play of acts to get back. The having no error of color histogram based matching can be increased by using Color soundness guide (CCV) for coming one after another polish. The rate of motion of form based acts to get back can be gave greater value to by giving thought to as rough form rather than the certain, errorless form. In addition to this a mix of color and form based acts to get back is also included to get well the having no error of the outcome
Licence: creative commons attribution 4.0
CBIR, Shape, Color Coherence Vector, Centroid
Paper Title: ONLINE PAYMENT SOLUTIONS FULLY OFF-LINE FUNCTIONS ON FRODO
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES077
Register Paper ID - 180586
Title: ONLINE PAYMENT SOLUTIONS FULLY OFF-LINE FUNCTIONS ON FRODO
Author Name(s): Bala koti Reddy Putluri
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 447-450
Year: December - 2017
Downloads: 2681
Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. perused by the gadget. In that capacity, in situations where client and merchant are relentlessly or irregularly separated from the system and there is no safe amid on-line installment. We proposed work is to give secure completely disconnected work is intelligence between various customer - server. This server is recognized from legitimate to unlawful control is given to client key approach. When gather the points of interest at client side are client record is debilitate consequently by erasable PUFs . It incorporate that restricted movement is guaranteed alluded as server to customer exchange is secured. Promote, a comprehensive examination of FRODO utilitarian and security properties is given, showing its feasibility and credibility.
Licence: creative commons attribution 4.0
Secure payments, PoS system, erasable PUFs , fraud resilience, cybercrime
Paper Title: ENHANCED HONEY CIPHER STRUCTURE WITH MULTIPLE CIPHER STRUCTURES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES076
Register Paper ID - 180585
Title: ENHANCED HONEY CIPHER STRUCTURE WITH MULTIPLE CIPHER STRUCTURES
Author Name(s): M.RAMBABU, N. Ramana, Dr. M. Sadanandam
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 441-446
Year: December - 2017
Downloads: 2682
Licence: creative commons attribution 4.0
Honey Structure, Honey Cipher Structure, ASCII Values, ASCII Character Representation
Paper Title: MODE CONVERTOR
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES074
Register Paper ID - 180582
Title: MODE CONVERTOR
Author Name(s): S CHANDANA, RAMBABU M
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 436-440
Year: December - 2017
Downloads: 2687
Now a day, all people are very familiar with mobiles. To make them free from work tensions, they will keep their mobile in silent. When they keep their mobiles in silent they may miss some important calls. Which will make them regret in future? So, to avoid this situation we came up with MODE CONVERTOR. By using this, if a mobile is in silent and a same mobile number is calling continuously 5 times then at the 6-time call of the same mobile number will automatically convert into ring mode. By this a person will not lose their valuable information. Mobile learning management systems are very important for training purpose. But considering the present scenario, the learners are equipped with a number of mobile devices that run by different operating systems with diverse device features. Therefore, developing a mobile application for different platforms is a cumbersome task if appropriate tools and techniques are not practiced. There are three categories of mobile application namely native, web based and hybrid. For mobile learning system, hybrid is an appropriate choice. In order to avoid re-implementation of the same hybrid application for different platform separately, several tools are proposed for example: Phone Gap, Adobe Air, Sencha Touch and QT, each with their own strength. With proper use of the strength of individual framework or the combination of frameworks, more compatible and more stable, cross-platform mobile learning application specifically for quizzes and assignments can be developed
Licence: creative commons attribution 4.0
cross-platform; mobile devices; framework; mobile learning; hybrid mobile app
Paper Title: AUTHENTICATION PRIVACY POLICY PRESERVING OF USER UPLOADED IMAGES ON SOCIAL MEDIA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES073
Register Paper ID - 180581
Title: AUTHENTICATION PRIVACY POLICY PRESERVING OF USER UPLOADED IMAGES ON SOCIAL MEDIA
Author Name(s): BBTS MRUNALINI, C Venkatesh, G. Sneha
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 432-435
Year: December - 2017
Downloads: 2709
Licence: creative commons attribution 4.0
privacy policies, authentication, A3P, Social network, policy prediction
Paper Title: EFFECTIVE DATA MINING ASSOCIATION RULES AND CLASSIFICATION TECHNIQUES FOR HEART DISEASE PREDICTION SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES071
Register Paper ID - 180579
Title: EFFECTIVE DATA MINING ASSOCIATION RULES AND CLASSIFICATION TECHNIQUES FOR HEART DISEASE PREDICTION SYSTEM
Author Name(s): K. Sudheer Kumar, MD Afzal
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 428-431
Year: December - 2017
Downloads: 2702
In a Human Life Span Heart disorder is a significant reason for spitefulness also, humanity in the advanced society. Beneficial study is a critical yet complicated responsibility that must to be performed precisely and productively and its robotization would be extremely helpful. All specialists are shockingly not similarly able in each sub declare to fame and they are in many spots a rare benefit. A framework for computerized medicinal determination would improve beneficial mind and reduce costs. This paper expects a study of current procedures of information disclosure in databases utilizing information mining procedures that are being used in the present therapeutic seem into especially in Heart Disease Prediction. The human services industry gathers massive measures of social assurance information, which are not mined to find profitable data for effective basic leadership. The medicinal services segment is still data prosperous yet learning poor. Although, there is an absence of productive examination tools to find hidden examples and patterns in medicinal dataset. In the medical services industry, the information mining Procedures is principally utilized for grouping and anticipating the difficulties from medicinal datasets.
Licence: creative commons attribution 4.0
Heart disease prediction system
Paper Title: NOVEL AND TIME EFFICIENT INDEX AT SEARCH NEAR-OPTIMAL QUERY RESULTS WITH BETTER EFFICIENCY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES070
Register Paper ID - 180578
Title: NOVEL AND TIME EFFICIENT INDEX AT SEARCH NEAR-OPTIMAL QUERY RESULTS WITH BETTER EFFICIENCY
Author Name(s): A. Rajya Lakshmi
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 424-427
Year: December - 2017
Downloads: 2698
An increasing number of uses need the productive execution of nearest neighbor (NN) queries thankful by the properties of the spatial objects. Because of the significance of key-word hunt, mainly at the Internet, a widespread lot of these applications permit the purchaser to give a rundown of key phrases that the spatial objects (from this time forward alluded to simply as items) must include, in their portrayal or other pleasant. We targeted on multi-dimensional dataset in which each information factor has set of key phrases in function space allows for the development of latest gear to question and explore these multidimensional dataset. Here we observe nearest key-word set Queries on textual content rich multidimensional dataset. We recommend a brand new approach known as ProMiSH (Projection and Multi scale Hashing) that uses random projection and hash-primarily based index shape. Our experimental result shows that ProMiSH has Speedup over nation-of-art-tree-primarily based techniques
Licence: creative commons attribution 4.0
multi-dimensional dataset, ProMiSH
Published Paper ID: - IJCRTNCES069
Register Paper ID - 180577
Title: --
Author Name(s): Jayabharathi Gaddale
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 419-423
Year: December - 2017
Downloads: 2722
Nowadays the field of Big Data plays a vital role in various spheres. Big data is a term for massive data sets having a huge volume of data from different organizations, enterprises, and other businesses; healthcare data is continued data which has more varied and complex structure with the difficulties of data privacy, security, transformation, storing, analyzing, knowledge extraction, and visualization. In this paper our proposed work focuses on big data analytics to evaluate the quality of the research evidence on the smarter healthcare system using an augmented big data analytics with Outsmart-FGAC Cloud framework, which addresses the challenges with smart health care system and proves that how such information impacts the quality of attention on the smarter health care system.
Licence: creative commons attribution 4.0
Big Data Analytics, Smarter healthcare, Outsmart FGAC Cloud Framework, Cloud Computing
Paper Title: A SECURE PUBLIC KEY BROADCAST ENCRYPTION (PKBE) FOR COOPERATIVE GROUPS IN MANET
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES068
Register Paper ID - 180569
Title: A SECURE PUBLIC KEY BROADCAST ENCRYPTION (PKBE) FOR COOPERATIVE GROUPS IN MANET
Author Name(s): Krushima Soma
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 414-418
Year: December - 2017
Downloads: 2668
Licence: creative commons attribution 4.0
Broadcast encryption; Group key agreement; Public key broadcast encryption (PKBE)
Paper Title: A GRID SYSTEM FOR NEVER ENDING LOCATION-BASED SERVICES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES067
Register Paper ID - 180568
Title: A GRID SYSTEM FOR NEVER ENDING LOCATION-BASED SERVICES
Author Name(s): Shaik Shakeera, Shaik Asha
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 408-413
Year: December - 2017
Downloads: 2698
The major aim of Location Based Services (LSB) is based on the location, it is used to provide services like food ordering system, Google map and some kind of e-shopping websites are completely based on locations. Based on the user location LSB provide continuous report to the un trusted server to obtain the services which can avoid privacy risks.LBS have existing privacy-preserving techniques as requiring a fully-trusted third party, it offers limited privacy guarantees and incurring high communication overhead. In this paper, we propose a user-defined privacy grid system which is called as dynamic grid system (DGS). Privacy-preserving snapshot and continuous LBS have four effective requirements. . (1) A semi-trusted third party is responsible for matching operations correctly and it does not have any information about a user's location. (2) Secure snapshot and continuous location privacy is guaranteed to defined adversary models. (3) The communication cost for the user does not depend on the user's desired privacy level; it depends on the number of relevant points of interest in the domain of the user. (4) The system can be easily enlarged to support other spatial queries without changing the algorithms run by the semi-trusted third party and the database server. Experimental results show that the DGS is more efficient than the state-of-the-art privacy-preserving technique for continuous LBS.
Licence: creative commons attribution 4.0
Grid system, Location Based services (LBS), Location privacy, Dynamic Grid system
Paper Title: A BIG IMAGE DATA DISTRIBUTED PROCESSING FRAME WORK IN STATIC AND DYNAMIC IMAGE CLOUD PROCESSING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNCES066
Register Paper ID - 180567
Title: A BIG IMAGE DATA DISTRIBUTED PROCESSING FRAME WORK IN STATIC AND DYNAMIC IMAGE CLOUD PROCESSING
Author Name(s): Shaik Asha, Shaik Shakeera
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 402-407
Year: December - 2017
Downloads: 2795
In this paper suggesting a functional processing frame work nominated Image Cloud processing (ICP) to powerfully subsist with the data in Image processing field. The image processing algorithms to increase greater proficiency, it focuses on giving a general structure to the algorithms that can be executed in parallel to achieve the goal The ICP framework consist of two processing systems i.e.; Static ICP (SICP) and Dynamic ICP (DICP). SICP is handling the image information pre-stored in the distributed system; DICP is initiate for dynamic information. To Manage SICP, two new data representations named as P-Image and Big-Image are implemented to coordinate with Map Reduce to attain more optimized marshalling and higher coherence. DICP is enact into a parallel processing schedule working with the standard technique of the proper framework. Image Net dataset are used to authorize the capacity of ICP framework over the traditional state-of-the-art methods, both in time efficiency and quality of results.
Licence: creative commons attribution 4.0
Big data, Image processing, MapReduce, Distributed system, Cloud computing
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 13 | Issue 11 | Month- November 2025)

