CFP by Computer Science & Engineering: An International Journal (CSEIJ)
Papers by Computer Science & Engineering: An International Journal (CSEIJ)
Digitalization is not limited merely to business companies and high-tech industries; it has incre... more Digitalization is not limited merely to business companies and high-tech industries; it has increasingly changed families' behaviors and attitudes as they are exposed to the digital world using different technological aspects. Therefore, numerous risks can be raised between all members of the family. For example, if IoT devices in a smart home are not embedded with high-security standards, they would be vulnerable to being attacked by hackers. Cyberattacks will not be limited to attacking virtually, but also they could unlock the home's door from the phone, and accordingly, the criminal will enter the home, and they can lose much more than credit cards. In this paper we identified various types of risks, with providing an analysis about the vulnerabilities and protecting families from digital attackers.

Software-as-a-Service (SaaS) is a form of cloud computing that relieves the user from... more Software-as-a-Service (SaaS) is a form of cloud computing that relieves the user from the concern of hardware, software installation and management. It is an emerging business model that delivers software applications to the users through Web-based technology. Software vendors have varying requirements and SaaS applications most typically support such requirements. The various applications used by unique customers in a single instance are known as Multi-Tenancy. There would be a delay in service when the user sends the data from multiple applications to multiple destinations and from multiple applications to
single destination due to the use of single CSB. This problem can be overcome by using multiple CSB concepts and hence multiple senders can efficiently send their data to multiple receivers at the same time.The multiple clouds are monitored and managed by the SaaS-CSB portal. The idea of SaaS-CSB Portal is to provide a single pane of glass for the user to consume and govern any service from any cloud. Thus,SaaS-CSB application allows companies to save their IT cost and valuable time.

It has been a constant human desire to be dissatisfied with the status quo as there is always nee... more It has been a constant human desire to be dissatisfied with the status quo as there is always need to improve upon the way business is being done. As a result, Business process reengineering is introduced
into organization in order to overcome these challenges of inefficiencies and high running cost. A lot of problems were encountered during the process of reengineering programmes. One of many factors that are
identified as the possible reason for the failures in most business process reengineering is the lack of giving much emphasis on the knowledge available within the environment in which the business process is taking
place. In this paper therefore we propose a methodology that addresses this issue through the use knowledge source map and formal organizational ontology. The organization and business process are
model together to provides most efficient way of utilizing the knowledge in the organization in the event of business process reengineering.
Embedded Ethernet is nothing but a microcontroller which is able to communicate with the network.... more Embedded Ethernet is nothing but a microcontroller which is able to communicate with the network. A
design of AVR controller-based embedded Ethernet interface is presented. In the design, an existing SPI
serial device can be converted into a network interface peripheral to obtain compatibility with the network.
By typing the IP-address of LAN on the web browser, the user gets a web page on screen; this page
contains all the information about the status of the devices. The user can also control the devices interfaced
to the web server by pressing buttons provided in the web page. This creates a network for easy
communication amongst the devices.

In this paper, a design space exploration is performed aiming at developing high-performance hard... more In this paper, a design space exploration is performed aiming at developing high-performance hardware architectures for the new cryptographic hash function Skein-512. Three well-known design optimization techniques namely, the loop unrolling, the structural and functional pipeline, are applied, while several design alternatives have been explored to derive optimized FPGA implementations. The proposed architectures have been implemented and evaluated in three Xilinx technologies (Virtex-4, Virtex-5, and Virtex-6). Based on the experimental results, when all the three techniques are applied, the best architecture is the 8-round_unroll one with two functional and three structural pipeline stages. To the best of the authors’ knowledge, it is the first time that all these three techniques are studied and exploited together for the Skein algorithm. Also, the proposed architectures outperform the corresponding existing ones in terms of Throughput/Area factor from 27% up to 192%, respectively.

In this paper we study NVIDIA graphics processing unit (GPU) along with its computational power a... more In this paper we study NVIDIA graphics processing unit (GPU) along with its computational power and
applications. Although these units are specially designed for graphics application we can employee there
computation power for non graphics application too. GPU has high parallel processing power, low cost of
computation and less time utilization; it gives good result of performance per energy ratio. This GPU
deployment property for excessive computation of similar small set of instruction played a significant role
in reducing CPU overhead. GPU has several key advantages over CPU architecture as it provides high
parallelism, intensive computation and significantly higher throughput. It consists of thousands of
hardware threads that execute programs in a SIMD fashion hence GPU can be an alternate to CPU in high
performance environment and in supercomputing environment. The base line is GPU based general
purpose computing is a hot topics of research and there is great to explore rather than only graphics
processing application.
This paper describes the development of an efficient speech recognition system using different
te... more This paper describes the development of an efficient speech recognition system using different
techniques such as Mel Frequency Cepstrum Coefficients (MFCC), Vector Quantization (VQ) and
Hidden Markov Model (HMM).
This paper explains how speaker recognition followed by speech recognition is used to recognize the
speech faster, efficiently and accurately. MFCC is used to extract the characteristics from the input
speech signal with respect to a particular word uttered by a particular speaker. Then HMM is used
on Quantized feature vectors to identify the word by evaluating the maximum log likelihood values
for the spoken word.

Software-as-a-Service (SaaS) is a form of cloud computing that relieves the user from the concern... more Software-as-a-Service (SaaS) is a form of cloud computing that relieves the user from the concern of
hardware, software installation and management. It is an emerging business model that delivers software
applications to the users through Web-based technology. Software vendors have varying requirements and
SaaS applications most typically support such requirements. The various applications used by unique
customers in a single instance are known as Multi-Tenancy. There would be a delay in service when the
user sends the data from multiple applications to multiple destinations and from multiple applications to
single destination due to the use of single CSB. This problem can be overcome by using multiple CSB
concepts and hence multiple senders can efficiently send their data to multiple receivers at the same time.
The multiple clouds are monitored and managed by the SaaS-CSB portal. The idea of SaaS-CSB Portal is
to provide a single pane of glass for the user to consume and govern any service from any cloud. Thus,
SaaS-CSB application allows companies to save their IT cost and valuable time.

This is era of information blast. A huge quantity of information is pouring in from various sourc... more This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.

It has been a constant human desire to be dissatisfied with the status quo as there is always nee... more It has been a constant human desire to be dissatisfied with the status quo as there is always need to
improve upon the way business is being done. As a result, Business process reengineering is introduced
into organization in order to overcome these challenges of inefficiencies and high running cost. A lot of
problems were encountered during the process of reengineering programmes. One of many factors that are
identified as the possible reason for the failures in most business process reengineering is the lack of giving
much emphasis on the knowledge available within the environment in which the business process is taking
place. In this paper therefore we propose a methodology that addresses this issue through the use
knowledge source map and formal organizational ontology. The organization and business process are
model together to provides most efficient way of utilizing the knowledge in the organization in the event of
business process reengineering.

For a same domain, several databases (DBs) exist. The emergence of classical web to the semantic ... more For a same domain, several databases (DBs) exist. The emergence of classical web to the semantic web has contributed to the appearance of the notion of ontology that have shared and consensual vocabulary. For a given, it is more interesting to take advantage of existing databases, to build an ontology. Most of the data are already stored in these databases. So many DBs can be integrated to enable reuse of existing data for the semantic web. Even for existing ontologies, the relevance of the information they contain requires regular updating. These databases can be useful sources to enrich these ontologies. In the other hand, for
these ontologies more than the ratio ‘size of the instances on the size of working memory’ is large more than the management of these instances, in memory, is difficult. Finding a way to store these instances in a structured manner to satisfy the needs of performance and reliability required for many applications becomes an obligation. As a consequence, defining query languages to support these structures becomes a challenge for SW community. We will show through this paper how ontologies can benefit from DBs to increase system performance and facilitate their design cycle. The DBs in their turn suffers from several drawbacks namely complexity of the design cycle and lack of semantics. Since ontologies are rich in semantic, DBs can profit from this advantage to overcoming their drawbacks.
It is A Challenging Task To Build A Cbir System Which Primarily Works On Texture Values As There ... more It is A Challenging Task To Build A Cbir System Which Primarily Works On Texture Values As There Meaning And Semantics Needs A Special Care To Be Mapped With Human Based Languages. We Have Consider Highly Textured Images Having Properties(Entropy, Homogeneity, Contrast, Cluster Shade, Auto Correlation)And Have Mapped Using A Fuzzy Minmax Scale W.R.T. Their Degree(High, Low, Medium)And Technical Interpetation.This Developed System Is Performing Well In Terms Of Precision And Recall Value Showing That Semantic Gap Has Been Reduced For Highly Textured Images Based Cbir.
Computer Science & Engineering: An International Journal (CSEIJ) , 2013
Embedded Ethernet is nothing but a microcontroller which is able to communicate with the network.... more Embedded Ethernet is nothing but a microcontroller which is able to communicate with the network. A design of AVR controller-based embedded Ethernet interface is presented. In the design, an existing SPI serial device can be converted into a network interface peripheral to obtain compatibility with the network. By typing the IP-address of LAN on the web browser, the user gets a web page on screen; this page contains all the information about the status of the devices. The user can also control the devices interfaced to the web server by pressing buttons provided in the web page. This creates a network for easy communication amongst the devices.

Query sensitive summarization aims at providing the users with the summary of the contents of sin... more Query sensitive summarization aims at providing the users with the summary of the contents of single or multiple web pages based on the search query. This paper proposes a novel idea of generating a comparative summary from a set of URLs from the search result. User selects a set of web page links from the search result produced by search engine. Comparative summary of these selected web sites isgenerated. This method makes use of HTML DOM tree structure of these web pages. HTML documents are segmented into set of concept blocks. Sentence score of each concept block is computed with respect to the query and feature keywords. The important sentences from the concept blocks of different web pages are extracted to compose the comparative summary on the fly. This system reduces the time and effort required for the user to browse various web sites to compare the information. The comparative summary of the contents would help the users in quick decision making
A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol ... more A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol reduces energy consumption quite significantly and prolongs the life time of sensor network. It is found that CBHRP performs better than other well accepted hierarchical routing protocols like LEACH in term of energy consumption and time requirement
Phonetic matching plays an important role in multilingual information retrieval, where data is ma... more Phonetic matching plays an important role in multilingual information retrieval, where data is manipulated in multiple languages and user need information in their native language which may be different from the language where data has been maintained. In such an environment, we need a system which matches the strings phonetically in any case. Once strings match, we can retrieve the information irrespective of languages. In this paper, we proposed an approach which matches the strings either in Hindi or Marathi or in cross-language in order to retrieve information. We compared our proposed method with soundex and Q-gram methods. We found better results as compared to these approaches.
Speaker indexing (tracking) is the task of recognizing the multiple speakers from the given speec... more Speaker indexing (tracking) is the task of recognizing the multiple speakers from the given speech signal. Speaker indexing is a pattern recognition task. Every pattern recognition task is classified into three phases namely, feature extraction, training and testing phases. In this paper, we analyse and study about the major
feature extraction techniques that exist and propose robust source features for text-independent speaker indexing system. A comparative study is carried out with each existing feature extraction techniques available with source features for speaker indexing task. Finally, we propose, source features are better than the other feature extraction techniques.
Conference by Computer Science & Engineering: An International Journal (CSEIJ)
Conference Presentations by Computer Science & Engineering: An International Journal (CSEIJ)
Uploads
CFP by Computer Science & Engineering: An International Journal (CSEIJ)
Papers by Computer Science & Engineering: An International Journal (CSEIJ)
single destination due to the use of single CSB. This problem can be overcome by using multiple CSB concepts and hence multiple senders can efficiently send their data to multiple receivers at the same time.The multiple clouds are monitored and managed by the SaaS-CSB portal. The idea of SaaS-CSB Portal is to provide a single pane of glass for the user to consume and govern any service from any cloud. Thus,SaaS-CSB application allows companies to save their IT cost and valuable time.
into organization in order to overcome these challenges of inefficiencies and high running cost. A lot of problems were encountered during the process of reengineering programmes. One of many factors that are
identified as the possible reason for the failures in most business process reengineering is the lack of giving much emphasis on the knowledge available within the environment in which the business process is taking
place. In this paper therefore we propose a methodology that addresses this issue through the use knowledge source map and formal organizational ontology. The organization and business process are
model together to provides most efficient way of utilizing the knowledge in the organization in the event of business process reengineering.
design of AVR controller-based embedded Ethernet interface is presented. In the design, an existing SPI
serial device can be converted into a network interface peripheral to obtain compatibility with the network.
By typing the IP-address of LAN on the web browser, the user gets a web page on screen; this page
contains all the information about the status of the devices. The user can also control the devices interfaced
to the web server by pressing buttons provided in the web page. This creates a network for easy
communication amongst the devices.
applications. Although these units are specially designed for graphics application we can employee there
computation power for non graphics application too. GPU has high parallel processing power, low cost of
computation and less time utilization; it gives good result of performance per energy ratio. This GPU
deployment property for excessive computation of similar small set of instruction played a significant role
in reducing CPU overhead. GPU has several key advantages over CPU architecture as it provides high
parallelism, intensive computation and significantly higher throughput. It consists of thousands of
hardware threads that execute programs in a SIMD fashion hence GPU can be an alternate to CPU in high
performance environment and in supercomputing environment. The base line is GPU based general
purpose computing is a hot topics of research and there is great to explore rather than only graphics
processing application.
techniques such as Mel Frequency Cepstrum Coefficients (MFCC), Vector Quantization (VQ) and
Hidden Markov Model (HMM).
This paper explains how speaker recognition followed by speech recognition is used to recognize the
speech faster, efficiently and accurately. MFCC is used to extract the characteristics from the input
speech signal with respect to a particular word uttered by a particular speaker. Then HMM is used
on Quantized feature vectors to identify the word by evaluating the maximum log likelihood values
for the spoken word.
hardware, software installation and management. It is an emerging business model that delivers software
applications to the users through Web-based technology. Software vendors have varying requirements and
SaaS applications most typically support such requirements. The various applications used by unique
customers in a single instance are known as Multi-Tenancy. There would be a delay in service when the
user sends the data from multiple applications to multiple destinations and from multiple applications to
single destination due to the use of single CSB. This problem can be overcome by using multiple CSB
concepts and hence multiple senders can efficiently send their data to multiple receivers at the same time.
The multiple clouds are monitored and managed by the SaaS-CSB portal. The idea of SaaS-CSB Portal is
to provide a single pane of glass for the user to consume and govern any service from any cloud. Thus,
SaaS-CSB application allows companies to save their IT cost and valuable time.
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
improve upon the way business is being done. As a result, Business process reengineering is introduced
into organization in order to overcome these challenges of inefficiencies and high running cost. A lot of
problems were encountered during the process of reengineering programmes. One of many factors that are
identified as the possible reason for the failures in most business process reengineering is the lack of giving
much emphasis on the knowledge available within the environment in which the business process is taking
place. In this paper therefore we propose a methodology that addresses this issue through the use
knowledge source map and formal organizational ontology. The organization and business process are
model together to provides most efficient way of utilizing the knowledge in the organization in the event of
business process reengineering.
these ontologies more than the ratio ‘size of the instances on the size of working memory’ is large more than the management of these instances, in memory, is difficult. Finding a way to store these instances in a structured manner to satisfy the needs of performance and reliability required for many applications becomes an obligation. As a consequence, defining query languages to support these structures becomes a challenge for SW community. We will show through this paper how ontologies can benefit from DBs to increase system performance and facilitate their design cycle. The DBs in their turn suffers from several drawbacks namely complexity of the design cycle and lack of semantics. Since ontologies are rich in semantic, DBs can profit from this advantage to overcoming their drawbacks.
feature extraction techniques that exist and propose robust source features for text-independent speaker indexing system. A comparative study is carried out with each existing feature extraction techniques available with source features for speaker indexing task. Finally, we propose, source features are better than the other feature extraction techniques.
Conference by Computer Science & Engineering: An International Journal (CSEIJ)
Conference Presentations by Computer Science & Engineering: An International Journal (CSEIJ)
single destination due to the use of single CSB. This problem can be overcome by using multiple CSB concepts and hence multiple senders can efficiently send their data to multiple receivers at the same time.The multiple clouds are monitored and managed by the SaaS-CSB portal. The idea of SaaS-CSB Portal is to provide a single pane of glass for the user to consume and govern any service from any cloud. Thus,SaaS-CSB application allows companies to save their IT cost and valuable time.
into organization in order to overcome these challenges of inefficiencies and high running cost. A lot of problems were encountered during the process of reengineering programmes. One of many factors that are
identified as the possible reason for the failures in most business process reengineering is the lack of giving much emphasis on the knowledge available within the environment in which the business process is taking
place. In this paper therefore we propose a methodology that addresses this issue through the use knowledge source map and formal organizational ontology. The organization and business process are
model together to provides most efficient way of utilizing the knowledge in the organization in the event of business process reengineering.
design of AVR controller-based embedded Ethernet interface is presented. In the design, an existing SPI
serial device can be converted into a network interface peripheral to obtain compatibility with the network.
By typing the IP-address of LAN on the web browser, the user gets a web page on screen; this page
contains all the information about the status of the devices. The user can also control the devices interfaced
to the web server by pressing buttons provided in the web page. This creates a network for easy
communication amongst the devices.
applications. Although these units are specially designed for graphics application we can employee there
computation power for non graphics application too. GPU has high parallel processing power, low cost of
computation and less time utilization; it gives good result of performance per energy ratio. This GPU
deployment property for excessive computation of similar small set of instruction played a significant role
in reducing CPU overhead. GPU has several key advantages over CPU architecture as it provides high
parallelism, intensive computation and significantly higher throughput. It consists of thousands of
hardware threads that execute programs in a SIMD fashion hence GPU can be an alternate to CPU in high
performance environment and in supercomputing environment. The base line is GPU based general
purpose computing is a hot topics of research and there is great to explore rather than only graphics
processing application.
techniques such as Mel Frequency Cepstrum Coefficients (MFCC), Vector Quantization (VQ) and
Hidden Markov Model (HMM).
This paper explains how speaker recognition followed by speech recognition is used to recognize the
speech faster, efficiently and accurately. MFCC is used to extract the characteristics from the input
speech signal with respect to a particular word uttered by a particular speaker. Then HMM is used
on Quantized feature vectors to identify the word by evaluating the maximum log likelihood values
for the spoken word.
hardware, software installation and management. It is an emerging business model that delivers software
applications to the users through Web-based technology. Software vendors have varying requirements and
SaaS applications most typically support such requirements. The various applications used by unique
customers in a single instance are known as Multi-Tenancy. There would be a delay in service when the
user sends the data from multiple applications to multiple destinations and from multiple applications to
single destination due to the use of single CSB. This problem can be overcome by using multiple CSB
concepts and hence multiple senders can efficiently send their data to multiple receivers at the same time.
The multiple clouds are monitored and managed by the SaaS-CSB portal. The idea of SaaS-CSB Portal is
to provide a single pane of glass for the user to consume and govern any service from any cloud. Thus,
SaaS-CSB application allows companies to save their IT cost and valuable time.
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
improve upon the way business is being done. As a result, Business process reengineering is introduced
into organization in order to overcome these challenges of inefficiencies and high running cost. A lot of
problems were encountered during the process of reengineering programmes. One of many factors that are
identified as the possible reason for the failures in most business process reengineering is the lack of giving
much emphasis on the knowledge available within the environment in which the business process is taking
place. In this paper therefore we propose a methodology that addresses this issue through the use
knowledge source map and formal organizational ontology. The organization and business process are
model together to provides most efficient way of utilizing the knowledge in the organization in the event of
business process reengineering.
these ontologies more than the ratio ‘size of the instances on the size of working memory’ is large more than the management of these instances, in memory, is difficult. Finding a way to store these instances in a structured manner to satisfy the needs of performance and reliability required for many applications becomes an obligation. As a consequence, defining query languages to support these structures becomes a challenge for SW community. We will show through this paper how ontologies can benefit from DBs to increase system performance and facilitate their design cycle. The DBs in their turn suffers from several drawbacks namely complexity of the design cycle and lack of semantics. Since ontologies are rich in semantic, DBs can profit from this advantage to overcoming their drawbacks.
feature extraction techniques that exist and propose robust source features for text-independent speaker indexing system. A comparative study is carried out with each existing feature extraction techniques available with source features for speaker indexing task. Finally, we propose, source features are better than the other feature extraction techniques.