National Conference on ‘Advances in Computing and Communications | #NCACC-2016 | IJSRD E – Journal

National Conference on ‘Advances in Computing and Communications’ 


A Conference Organized by Guru Nanak Dev Engineering College, Bidar National Conference on ‘Advances in Computing and Communications’ NCACC-2016 in collaboration with International Journal of Scientific Research and Development (#IJSRD) on 22nd and 23rd October-2016. The aim of NCACC-2016 is to provide a platform for researchers and practitioners, in all areas of evolutionary computing and communication engineering to discuss the full spectrum of current theoretical developments, emerging technologies, and innovative applications of computing and communications in solving complex real life problems.

Best Paper Award: Outstanding papers presented at NCACC-2016 will be awarded with certificate and cash prize.


  • Communications
  • Electromagnetic Engineering
  • Computing
  • Systems and Security
  • Signal Processing
  • VLSI end embedded systems

All accepted papers from NCACC-2016 will be published in International Journal for Scientific Research & Development (#IJSRD). Impact Factor of IJSRD is 2.39.

Last date of submission: 22nd September 2016.

For more Infomation about NCACC-2016 Visit us @ IJSRD


Organized by:

Guru Nanak Dev Engineering College, Bidar, Karnataka
Mailoor Road, Bidar – 585 403
Karnataka, India
Phone: 08482 – 226949, 235214

Publication Partner:

IJSRD | International Journal for Scientific Research & Development
Website :

#IJSRD Cloud Computing : Achieve CPEL Criterion in Cloud with High Bandwidth and Cost Reduction

As we all know that cloud computing is one of the trending technology for data storage and sharing. Although its beneficial, it has to evolve more to be efficient in various models. One of the article submitted to IJSRD journal by Vishakha Om.Gupta and Prof. Yogesh Rai from Shree Institute of Science & Technology, RGPV University, Bhopal is focusing on Achieving CPEL Criterion in Cloud with High Bandwidth and Cost Reduction.

They briefly introduce their work as under…

Cloud computing implementation is fast and simple with benefits like, Cost reduction by gaining a worldclass IT infrastructure without the hardware, secure access to critical information 24/7 using only a Web browser, ability to stay mobile and many more. According to the survey 85 per cent of public sector organizations are using public cloud services, while on the other side data owner having concern about data confidentiality and query privacy due to the lost control of the infrastructure. To address these issues a criterion called CPEL is constructed; Data confidentiality, query privacy, efficient query processing, and low in-house processing cost. Satisfying these requirements will dramatically increase the complexity of constructing query services in the Cloud. Some related approaches have been developed to address some aspects of the problem. However, they do not satisfactorily address all of these aspects. We proposed the random space perturbation (RASP) approach with traffic redundancy elimination techniques, in which practical range query is constructed by using k-nearest neighbor (kNN) and range query algorithm, and to reduce redundancy in process predictive acknowledgement algorithm and redundancy aware routing algorithm is used by this way we can achieve CPEL criterion with high bandwidth of data processing with reduced cost.

#IJSRD More over this they have written in the article published at IJSRD that their proposed models would be working as under…

RASP is combination order preserving encryption, dimensionality expansion, random noise injection, and random project because of order preserving encryption confidentiality and indexing preserved by dimensionality expansion range query processing can be achieve , Random projection is mainly used to process the high dimensional data into low dimensional data representations which provides good scaling potential and performance , random noise injection used for adding noise which in result gives proper output .

In random space perturbation, the word perturbation is used to do collapsing this process will happen according to the key value that is given by the owner. In this module the data owner have to register as owner and have to give owner name and key value. And then the user have register and get the key value and data owner name from the owner to do access in the cloud. Here user can submit their query as range query or kNN query and get their answer. We analyze and show the result with encrypted and also in decrypted format of the data for the query construct by the user. kNN query cannot be directly impose on RASP perturbated data, so we have designed a kNN query processing algorithm based on range queries .We use square ranges, instead of spherical ranges, to find the approximate kNN results, so that the RASP range query service can be used.

Fig. 1: working of RASP with kNN and Range query

Fig. 1: working of RASP with kNN and Range query

As shown in below fig.1, working of RASP with kNN and Range query service, but here authorized user can upload, download, updates the similar data which increases data processing cost, to address this problem we are using predictive acknowledgement approach which is based on byte stream processing, Byte stream means it store the file as 1 byte that is 8 bit as a sequence of file, because of these increases the file download speed while transaction between the cloud and its end user’s. As shown in below fig. 2.

Fig. 2: Predictive Acknowledgment Approach.

Fig. 2: Predictive Acknowledgment Approach

From their study shown in the article published at IJSRD, they concluded that “The key vantage of this scheme is the ability to get confidential and efficient query services with high bandwidth and reduced cost.”

To know more about such articles with innovative ideas please visit ijsrdscholarticles website.

To download more of such type of articles helping you in your research work please visit

nearest neighbor (kNN) and range query algorithm, and to reduce redundancy in process predictive acknowledgement algorithm and redundancy aware routing algorithm is used by this way we can achieve CPEL criterion with high bandwidth of data processing with reduced cost

#ijsrd #Google discovers another web threat but not as bad as Heartbleed & Shellshock

Illustration file picture shows a man typing on a computer keyboard in Warsaw

Three researchers from Google have discovered a security bug in widely used web encryption technology. The bug that according to them could allow hackers to take over accounts for email, banking and other services in an attack called ‘Poodle’ as dubbed by them.

Poodle that stands for Padding Oracle On Downloaded Legacy Encryption, is the third this year following April’s ‘Heartbleed’ bug in OpenSSL and last month’s ‘Shellshock’ bug in a piece of Unix software known as Bash. This time when researchers have again uncovered vulnerability in widely used web technology, they have prompted makers of web browsers and server software to advice users to disable use of the source of the security bug: an 18-year old encryption standard known as SSL 3.0.

By stealing browser cookies through ‘Poodle’ attacks, hackers could potentially take control of email, banking and social networking accounts. Still, experts say the threat is not as serious as the prior two.

#ijsrd journal update : HP Labs is working on a glass 3D printer

HP isn’t content to just 3D print in plastic. A job ad for a “robotics scientist for 3D printing” sounds normal enough until you dive into the text and read this:

“HP Labs’ research into printing of inorganic materials is working towards hybrid printing of glass (and other inorganic materials) onto items that are already mass produced,” the ad reads.

3D printing is generally reserved for working with plastic and metal. Glass is unusual. But HP has its reasons. According to a 2012 HP Labs paper:



HP is due to release its first-ever 3D printer in October. We don’t know much about it except that it will be aimed at businesses and a potential boost for the ailing company. It’s unlikely it’s a glass printer though. This is a project that still lives within HP Labs.

Reference :

What Is the Difference Between a Thesis and a Dissertation?

Learn some tips on how to write the best thesis or dissertation.

So you are beginning your graduate program, reading over all the material and trying to prepare yourself as best as possible for the next two to three years. You’re already looking forward to graduation and figuring out exactly what will be required in order to receive your degree on time. What you’ve probably discovered is that whether you are pursuing a masters degree or a doctoral degree, the main goal in graduate school is to complete original research or projects, depending on your degree program.

The words “thesis” and “dissertation” are often used interchangeably, leading to some confusion in academia about what each individual word actually means. The main similarity between the dissertation and the thesis is the structure. Both have an introduction, literary review, main body, conclusion, bibliography and appendix. But that is the extent in which they are similar.

Differences Between a Masters Thesis and Doctoral Dissertation

Generally in the US, a thesis is the final project for the masters degree and a dissertation leads to a doctoral degree. Those pursuing a masters degree must perform research on a specific subject that demonstrates their knowledge acquired through their program. Seeking a PhD is different in that your dissertation must contribute something completely new and undiscovered to your field. In other words, you have to contribute original knowledge to the subject. So the main difference between a thesis and a dissertation is the depth of knowledge you must attain in order to write the paper.

A masters degree thesis is more closely related to a research paper that you would have completed during college. You are expected only to use the research of others and provide your own analysis on your discoveries. It demonstrates your level of critical and analytical thinking and defines the subject that you are most interested in pursuing within your field. With a dissertation, you are expected to use the research of others only to guide you in your own research to come up with a completely new hypothesis.

Another way in which the thesis and dissertation differ are in length. A masters degree thesis is typically over 100 pages. However, the dissertation is usually at least double and sometimes triple the length of a thesis. To determine the length of your thesis or dissertation, remember you should always first consult your grad school.

Tips For Writing a Thesis or Dissertation

The first step in writing your thesis or dissertation (or any other academic paper) is setting a deadline. You don’t want your deadline to be the due date of the paper because you need to leave enough time to get it proofread and to make any additional changes. You should keep a journal of your ideas to help with the writing process. The next step is to create a detailed outline of your paper.

When beginning to write your thesis or dissertation, keep in mind that you are writing an academic paper. Not many people besides your professors and academic advisors will read your thesis, so make sure to keep your writing style formal.

Consult a scholarly text to see how your thesis or dissertation should be structured. Once you have written and edited your thesis or dissertation, you should find an editor. Some editors will only check spelling and grammar issues, while others will check for overall continuity and flow. Determine what you need before searching for an editor.

source :