skip to main content
10.1145/2909067acmotherconferencesBook PagePublication PageswirConference Proceedingsconference-collections
WIR '16: Proceedings of the ACM Symposium on Women in Research 2016
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WIR '16: Women in Research 2016 Indore India March 21 - 22, 2016
ISBN:
978-1-4503-4278-0
Published:
21 March 2016

Bibliometrics
research-article
Security Issues and Trust Management in Cloud Computing

Cloud computing is the growing technology. It offers many services. The cloud service provider facilitates on demand services therefore the data on the hosting server increases significantly and so the data access. To reduce the maintenance cost of data ...

research-article
An Approach Used In Wireless Network to Detect Denial of Service Attack

The shared behavior of wireless network makes it more vulnerable to Denial of Service attack. A Denial of Service (DOS) attack is a planned attempt to make resources unable to the legitimate client. These attacks can easily launch by perpetrator ...

research-article
Nearest Neighbor Search Technique Using Keywords and Threshold

Today's applications asking for finding spatial protests nearest to a predefined area in the meantime fulfill limitation of keywords. Best answer for such questions depends on the IR2-tree, which has some inadequacies that truly affect system s ...

research-article
Errors Detection in Big Sensor Data on Cloud using Time Efficient Technique

Big sensor data is huge amount of data in both industry and scientific research application in which it generate high quantity of data. Cloud computing provides a special platform to support this challenge as it provides a flexible massive data, storage,...

research-article
Intelligent Bus stand Monitoring and Control

This paper summarizes work on the designing and application of GPS (Global positioning system) based technology clubbed with GSM (Global system for mobile communication) for Bus stand monitoring & control provided for public transportation. This system ...

research-article
Review of Machine Learning Algorithms in R software for Diagnosis of ESD Diseases

ESD is an acronym for Erythemato-Squamous Diseases, which is a set of six skin diseases [6]. The Erythemato-Squamous Diseases (ESDs) require huge computational efforts to predict the diseases because all the six diseases studied in this group have more ...

research-article
Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction

Digital information security is the field of information technology which deal with all about identification and protection of information. Whereas, identification of the threat of any Intrusion Detection System (IDS) in the most challenging phase. ...

research-article
Punjabi Stop Words: A Gurmukhi, Shahmukhi and Roman Scripted Chronicle

With advent of Unicode encoding, Punjabi language content, written using gurmukhi script as well as in shahmukhi script, is increasing day by day on internet. Processing textual information involves passing it to various pre-processing phases. Stop-word ...

research-article
Comparative Study of Optimal Clustering Techniques in Wireless Sensor Network: A Survey

Energy consumption affects Wireless Sensor Networks (WSN) lifetime and may cause network degradation. Communication distance between the sensor nodes and base station affects network energy. The more communication distance between two nodes the more ...

research-article
A Survey of various Sink Mobility based Techniques in Wireless Sensor Network

Mobility of nodes plays a key role in Wireless sensor network (WSN). It comes up with challenges like energy efficiency and improve network lifetime. WSN contain nodes which are having capability of sensing, computation, and wireless communications. ...

research-article
System Attribute Measures of Network Security Analyzer

In this paper, we have mentioned a method to find the performance of projectwhich detects various web - attacks. The project is capable to identifying and preventing attacks like SQL Injection, Cross -- Site Scripting, URL rewriting, Web server 400 ...

research-article
Computerized Forensic Approach Using Data Mining Techniques

Criminal activities are a manifestation of unseen termites that are slowly but steadily decaying the deep rooted pillars of ethics and values established in our society. The evolving technology can be very well be utilized as arms and ammunitions by the ...

research-article
Empirical relationship between Victim's occupation and their knowledge of Digital Forensic

Computer crime also popularly known as Cybercrime has escalated to such a huge extent that it is now posing a threat to various industries, educational universities and professional organizations as well. The law enforcement agencies, police departments ...

research-article
ECG Steganography to secure patient data in an E-Healthcare System

E-healthcare systems are rapidly gaining importance with the evolution of remote monitoring devices for patient diagnosis. While transmitting patient classified information, it is essential to ensure that patient confidentiality is maintained. ECG ...

research-article
Use of Internet of Things (IoT) in Healthcare: A Survey

In today's world of connectivity, with the advancement of Internet of Things (IoT) all entities are connected to each other by some communication means. The Internet of Things for the medical equipment will produce data that can go a long way in not ...

research-article
Key Management Techniques for Securing MANET

A Mobile Ad hoc Network (MANET) is a spontaneous network consisting of wireless nodes which are mobile and self-configuring in nature. Devices in MANET can move freely in any direction independently and change its link frequently to other devices. MANET ...

research-article
Image Visualization as per the User Appeal through Deep Learning

Visualization is a term used in the wide area of research to visualize the things as per the human vision. Mostly these terms are used to optimize the data, file format, multimedia format to clarify the concept of human understanding and acceptance in ...

research-article
Execution and Analysis of Topology Based Routing Protocols in VANET

Vehicular Ad Hoc Network (VANET) is the special branch of the Mobile Ad Hoc Network. MANET has un-controlled moving patterns of a number of nodes where as VANET has restricted node movement by factors like a road course, traffic and traffic regulations ...

research-article
Design and Implementation of Kerberos using DES Algorithm

Security is playing a very important and crucial role in the field of network communication system and Internet. Kerberos Authentication Protocol is designed and developed by Massachusetts Institute of Technology (MIT) and it provides authentication by ...

research-article
Narrow Band LNA Design Using OGMOSFET for Noise and Gain Analysis

LNA is the first building block of any receiver circuit. In this paper, a narrow band LNA operating at 2.4 GHz is designed in ADS CAD tool. Device used for LNA design is Optically Gated MOSFET (OGMOSFET). For DC bias, gate voltage is 1.5 V and drain ...

research-article
Techniques and Approaches for Disease Outbreak Prediction: A Survey

As on today, due to rise in pollution and dense population in India, there has been an increase in health related issues with respect to spreading disease. The recent outbreak of diseases like HINI, dengue, malaria etc. have made people to focus on ways ...

research-article
Extending Storage Life of Pears Using a Formulation Developed from a Terpenoidal Oligomer from Lac

A novel edible coating formulation developed from a terpenoidal oligomer P-104 has been used as postharvest treatment to maintain pear quality. The changes in weight, color, texture, pH, total soluble solids and microbial populations of coated and ...

research-article
Double Layer Anti-Reflective Coating of SiO2/ZnO for Photovoltaic Cell

In this paper silicon based photo voltaic (PV) cells has been designed using double layer (SiO2/ZnO) anti-reflective coating (ARC). Here reflection spectrum of single layer anti-reflective coating (SLAR) of SiO2&ZnO individually and double layer anti-...

research-article
Gesture Recognition for VW & VO: Virtual Writing and Virtual Operation

Modern era of research is motivated to optimize the hardware parts involved during the process of interaction. The idea is to deploy virtual environment for performing the daily routine tasks and social aspects of people. Virtualization provides the ...

research-article
The Study of the Usage of Data Analytic and Clustering Techniques for Web Elements

Clustering various web elements facilitates data analysis, which plays an important role in our day-to-day life. Due to massive use of internet and huge electronic data access, some useful technique is needed for web element analysis. Grouping the data ...

research-article
Analytical Trends and Practices of Web Intelligence

The web has undergone major transformation during last few years and revolutionized the world we live in. The amount of information and user-generated data on the web is increasing day by day. The major challenge of web research and development is in ...

research-article
Significance of Ticket Analytics in Effective Software Maintenance: Awareness

Software even though intangible should undergo evolution to fit into the ever changing real world scenarios. In this context software maintenance is an inevitable activity; further optimizing the activities related to maintenance is not possible due to ...

research-article
Implementation of an Emergency Evacuation System Using Intelligent Routing Using QualNet Simulator

Sensors are wireless devices used for monitoring and recording the surrounding physical and environmental parameters. The data collected is transmitted continuously to a base station. A collection of such wireless sensors form a network called Wireless ...

research-article
A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set

Association discovery finds closely correlate sets so the presence of some components in an exceedingly frequent set can imply the presence of the remaining components (in identical set). Closed item sets are a solution to the problems described above. ...

research-article
Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm

Network Security has become imperative in the contemporary scenario and subsequently an assortment of modus operandi is being espoused to evade it. Network administrators need to adhere with latest advancement in both hardware and software field to ...

Contributors
  • Acropolis Institute of Technology & Research, Indore
  • Mewar University
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

WIR '16 Paper Acceptance Rate35of117submissions,30%Overall Acceptance Rate35of117submissions,30%
YearSubmittedAcceptedRate
WIR '161173530%
Overall1173530%