Model based mostly Testing is one amongst the foremost crucial areas to be addressed with efficie... more Model based mostly Testing is one amongst the foremost crucial areas to be addressed with efficiency to make sure effective testing of the given project. The system enforced combines UML with FSM to hide all situations with all doable methods. As Finite Machine additionally works on the trigger wherever conditions are framed and if these conditions are glad then next action is executed; this development motivates to create a framework for generating the take a look at cases mechanically covering all methods (activity diagram in UML helps to hide all paths) and conditions (Finite State Machine helps to border set of conditions). Model based mostly Testing designed considering all methods and conditions to ascertain all situations to come up with elaborated take a look at cases for given project or application. IndexTerms: Model Based Testing, Extended File System, Finite State machine, Activity Diagram, Coverage of paths and conditions. _______________________________________________...
International Journal of Scientific Research in Science and Technology, 2021
Nowadays Automated Teller Machines (ATMs) are widely used by people. People are dependent upon AT... more Nowadays Automated Teller Machines (ATMs) are widely used by people. People are dependent upon ATMs to conveniently meet their day-to-day needs. As it is an important factor there comes security. ATMs are electronic machines that are operated by customers to deposit or withdraw cash from banks. It is observed that the number of crimes related to ATMs is increased hence there is a need to provide better security to ATM machines. There are different technologies that are used to provide security to ATM machine which includes – RFID technology, fingerprint, face recognition, iris scan, OTP, reference number, random keypad, etc. In a traditional ATM system card and PIN numbers are used for authentication, where security plays a big concern, such as losing cards, stolen pin numbers, card cloning, shoulder surfing, fake keyboard, skimming, etc. In order to overcome these issues, this paper discusses various systems where ATM cards and pins are replaced by biometrics and how they made ATMs...
Testing of software package is a vital innovate the SDLC. This part facilitates to envision the s... more Testing of software package is a vital innovate the SDLC. This part facilitates to envision the standard the software package. This method of testing is split in 2 classes, one is Model based mostly technique and therefore the different is code driven testing. Code driven testing relies on the testing complete code (each and each line). Code driven testing relies on a knowledge flow and management flow that's flow is ordered. In model, based mostly testing approach, focus is on workable module not on each line of code; reason for this approach is to support third party elements, APIs, modules. One needn't to be associate skilled altogether domains, the tester can think about the practicality of individual element not on the small print of a code employed in that element. During this paper the mixture of extended finite state machine and sequence diagram is mentioned.
This paper aims in developing an Android Application which will enable a user to find anything & ... more This paper aims in developing an Android Application which will enable a user to find anything & everything nearby his/her location-whether it is a Cafe, Restaurant, Social Gathering Spot, Hotel, Eateries, a new Start Up Venture, all type of Properties and other places to visit which are trending in the user's city with respect to the event or occasion. The application is customized in such a way that a user just has to choose properties or places among the dynamic event oriented genre. The search results will be displayed as pin points on the map on the User Interface. A user can have a 360 virtual view of interior as well as exteriors of a property of his/her choice using a VR enabled device and VR headsets. A user can also add his/her personal real time reviews to the already existing property.
ARTICLE INFO Time is an important factor in providing medical aid, in case of emergencies. Timely... more ARTICLE INFO Time is an important factor in providing medical aid, in case of emergencies. Timely help can save a person’s life. We are going to develop real time system which provide medical data about patient in moving ambulance. These details can further be used to care the victim and thus provide an easy and reliant system to the medical department. The proposed system is based on biometric matching of identification parameters for retrieval of medical data of patient. On research of long period of time biometric system has shown advanced future. Biometric should be in the ambulance so driver or nurse could get information about victim and send respective hospital which would help the doctor’s to be ready for their treatment. This would also help to make phone call to their relatives which are nominated by the victim at the time of filling information. This information is stored at cloud in authorized hospital. For fingerprint recognition biometric is used and for fingerprint ma...
Now a days cloud computing is a very popular method. Cloud storage means the storage of data onli... more Now a days cloud computing is a very popular method. Cloud storage means the storage of data online in the cloud. Cloud computing is a model of cloud storage in which data is put in storage on remote servers which is retrieved from the internet. Cloud storage services are very popular. In this survey, two algorithm are studied Ramp Secret Share Algorithm and Chunking Algorithm. Ramp Secret Share Scheme follow the Sharmir polynomial function. In secret share scheme there is distribution to no of server and reconstruction again. Chunking algorithm splits the big data into small part or chunks. Chunking algorithm are very important to Deduplication technique. Chunking algorithm is used to increase efficiency of data deduplication ratio and data deduplication throughput.
Artificial Intelligent Systems and Machine Learning, 2016
Online data sharing applications provide a way to share information between users. There are many... more Online data sharing applications provide a way to share information between users. There are many application domains in which users create and share the textual information about their products, services. This textual information contains more structured information merged into unstructured information. A User who wants to retrieve this structured, shared information, uses information retrieval algorithms which are inaccurate and expensive when text does not contain any example of targeted information. This data annotation is very important to facilitate finding subsequent information from shared data. In this paper, a framework is represented through which user can insert metadata during insertion time, so that identifying the data will be easy using a novel algorithm is presented that identify the metadata that really exist in documents by using content and query value and probabilistic method computation. Additionally, devise propose algorithms that mapping attribute-value to ma...
There is a tremendous growth of the mobile users everywhere which in turn leaded to high bandwidt... more There is a tremendous growth of the mobile users everywhere which in turn leaded to high bandwidth requirements of new cellular services. But the bandwidth scenario is dependent on limited spectrum resources that have been allocated for mobile communications. Basically, three caching strategies have been discussed in this paper. An adaptive cache invalidation algorithm known as Bit Sequence for client server mobile environment; the next approaches discussed are:1. Asynchronous Invalidation Message technique 2. Caching using data replication from servers at the Mobile Host’s Home Location Cache, abbreviated as HLC, during the network is wholly disconnected from the network & apparently, it delivers it back the invalidations details to the Mobile Host when it is reconnected; and the final approach is using the fundamentals of Data Replication for Caching strategies. Past few decades have given tremendous growth of research in caching technology of mobile computing. This particular pap...
Today’s data is rapidly and continuously growing and is not constant in nature. To deal with such... more Today’s data is rapidly and continuously growing and is not constant in nature. To deal with such kind of extracting data, as it is to annotate data, mapping attribute value is a solution. In Number of organization or company generate and share their textual information of their products, facilities, and services. Such collections of textual data contain a significant amount of structured data, which is hidden in the unstructured text document. Whereas information extraction systems simplify the extraction of structured associations, they are frequently expensive and incorrect, particularly when working on top of text that does not comprise any examples of the targeted structured data. Projected an alternative methodology that simplifies the structured metadata generation by recognizing documents that are possible to contain information of awareness and this data will be beneficial for querying the database. Additionally, we propose an algorithm that mapping attribute-value pair to ...
Many Computer applications enable to enter the annotations on, presentations, text documents etc.... more Many Computer applications enable to enter the annotations on, presentations, text documents etc. It is an effectiveuse of computers in a social work environment to modify andscrutinywork. To present a unique accession that facilitates the procreation of the systematic metadata by recognizes documents which contain the information of scrutiny and this information is used for querying the database consequently. If the system allows the users to annotate the data with keywords pairs, the users are unready to perform the particular function. The function not only requires appreciable drill, but it has unclear usualness for consequent searches. In this system even if itproduces all relevant annotations, a large number of such annotations may also give something to the user who must examine, modify, and approve all the suggestions. To provide the security from searching query at the time when the user will try to download the important data. For resolving issue of data security to add a ...
The inflaming use of current digital technology has transformed the life of people. Unlike the cu... more The inflaming use of current digital technology has transformed the life of people. Unlike the current electoral system, there are various applications as such. Security is an outmost priority which is predominant in the election with the offline system. The existing electoral system still uses a Centralized system in which an organization has full access grant. The problems encountered are mostly due to outdated electoral systems with the organization that has total control over the system as well as the database. Database tampering is a major reason which causes huge problems in the system. Our answer to this problem is Block Chain Technology. Block chain Technology is an ideal solution as it holds a decentralized system and the database is owned by various users. Examples like Bit coin can be taken as a good example of Block Chain Technology application as it uses a decentralized bank system. By applying the concept of block chain in the existing electoral system, it can reduce t...
As technology advances, it makes life easy and straightforward by solving many of the real-life p... more As technology advances, it makes life easy and straightforward by solving many of the real-life problems which are faced by people in their daily life. This also applies to the education system, which has made drastic improvements because of the use of new and advanced technology. But despite the advancement in technology, there are a large number of institutes that follow the traditional approach in marking the attendance as well as monitoring the classroom. Using a conventional method can cause intentional or unintentional mistakes and also wastage of the valuable time that can be utilized in the practice of teaching. Recent studies show that the behavior of the students in the classroom affects their results tremendously. Using the interaction between students and teachers in the ongoing lecture, student's attention and the understanding level can be estimated. Better interaction in the class results in an improvement in the performance of the student in academics. The main g...
The tools and technology used in organizations and enterprises to improve analytics method has be... more The tools and technology used in organizations and enterprises to improve analytics method has been described. Various developing organizations, enterprises and companies yield tremendous amount data everyday. Companies require to understand costumer’s necessities from the information available to it. This paper explains the tools and technologies which can help in analyzing the data by finding hidden patterns behind it. General Terms Big Data Analytics, Digital 2.0
Cloud storage is an online data storage and it is located as centrally.Cloud data ownerprovidethe... more Cloud storage is an online data storage and it is located as centrally.Cloud data ownerprovidethe facility for users to online store their data and access from any location. Though it has reliable for the user to achieve a secure and dependent cloud storage service. Ina key aggregate crypto-systemkey is generated fordifferent attributes of data in different cipher text classes and its associated keys. It derived aggregate key on the basis of attribute and identitywhich, depending on the different classes according to cloud data owner. By using this technique aunique cryptographic key achieves. It is optimallysecure for cloud data and privacy preserving key generating process.The cloud data ownerdecidesthe access levelof the data, such as public, private and hierarchyaccess level in order toenhance the data access capability in a data sharing cloud mechanism.Blowfish is thebest data security algorithm. It is higher security and faster execution as compared toother cryptographic algor...
Understanding the long-term outlook on a particular stock is very important for investors to see ... more Understanding the long-term outlook on a particular stock is very important for investors to see the growth of their investment. This paper will give the idea about how to predict the fair price of the shares using DCF method and understanding short term outlook of that investment. The various technologies used in the paper are free cash flow, the terminal value, net present value, ARIMA, Linear Regression. Traditional techniques lack in covering long term stock price movements and so new approaches have been developed for analysis of stock price variations.
International Journal for Research in Engineering Application & Management
As technology advances, it makes life easy and straightforward by solving many of the real-life p... more As technology advances, it makes life easy and straightforward by solving many of the real-life problems which are faced by people in their daily life. Various types of technologies are used to improve the life of humans. Hence, this paper has used one of the technologies to ease the life of humans i.e. IoT. This paper represents IoT (Internet of Things) for the smart home automation system. There are many proposed systems which make the home easy to live in. But this paper tells about the newer advanced system. This paper tells the usage of motion detection technique to perform light on/off, MQ2 sensor for gas detection, machine learning for facial expression detection, motor for facade opening/closing, motor for room rotation and last the website “Things Board” to collect the whole data at one place. The main goal of this paper is to provide full security with innovation at home.
Model based mostly Testing is one amongst the foremost crucial areas to be addressed with efficie... more Model based mostly Testing is one amongst the foremost crucial areas to be addressed with efficiency to make sure effective testing of the given project. The system enforced combines UML with FSM to hide all situations with all doable methods. As Finite Machine additionally works on the trigger wherever conditions are framed and if these conditions are glad then next action is executed; this development motivates to create a framework for generating the take a look at cases mechanically covering all methods (activity diagram in UML helps to hide all paths) and conditions (Finite State Machine helps to border set of conditions). Model based mostly Testing designed considering all methods and conditions to ascertain all situations to come up with elaborated take a look at cases for given project or application. IndexTerms: Model Based Testing, Extended File System, Finite State machine, Activity Diagram, Coverage of paths and conditions. _______________________________________________...
International Journal of Scientific Research in Science and Technology, 2021
Nowadays Automated Teller Machines (ATMs) are widely used by people. People are dependent upon AT... more Nowadays Automated Teller Machines (ATMs) are widely used by people. People are dependent upon ATMs to conveniently meet their day-to-day needs. As it is an important factor there comes security. ATMs are electronic machines that are operated by customers to deposit or withdraw cash from banks. It is observed that the number of crimes related to ATMs is increased hence there is a need to provide better security to ATM machines. There are different technologies that are used to provide security to ATM machine which includes – RFID technology, fingerprint, face recognition, iris scan, OTP, reference number, random keypad, etc. In a traditional ATM system card and PIN numbers are used for authentication, where security plays a big concern, such as losing cards, stolen pin numbers, card cloning, shoulder surfing, fake keyboard, skimming, etc. In order to overcome these issues, this paper discusses various systems where ATM cards and pins are replaced by biometrics and how they made ATMs...
Testing of software package is a vital innovate the SDLC. This part facilitates to envision the s... more Testing of software package is a vital innovate the SDLC. This part facilitates to envision the standard the software package. This method of testing is split in 2 classes, one is Model based mostly technique and therefore the different is code driven testing. Code driven testing relies on the testing complete code (each and each line). Code driven testing relies on a knowledge flow and management flow that's flow is ordered. In model, based mostly testing approach, focus is on workable module not on each line of code; reason for this approach is to support third party elements, APIs, modules. One needn't to be associate skilled altogether domains, the tester can think about the practicality of individual element not on the small print of a code employed in that element. During this paper the mixture of extended finite state machine and sequence diagram is mentioned.
This paper aims in developing an Android Application which will enable a user to find anything & ... more This paper aims in developing an Android Application which will enable a user to find anything & everything nearby his/her location-whether it is a Cafe, Restaurant, Social Gathering Spot, Hotel, Eateries, a new Start Up Venture, all type of Properties and other places to visit which are trending in the user's city with respect to the event or occasion. The application is customized in such a way that a user just has to choose properties or places among the dynamic event oriented genre. The search results will be displayed as pin points on the map on the User Interface. A user can have a 360 virtual view of interior as well as exteriors of a property of his/her choice using a VR enabled device and VR headsets. A user can also add his/her personal real time reviews to the already existing property.
ARTICLE INFO Time is an important factor in providing medical aid, in case of emergencies. Timely... more ARTICLE INFO Time is an important factor in providing medical aid, in case of emergencies. Timely help can save a person’s life. We are going to develop real time system which provide medical data about patient in moving ambulance. These details can further be used to care the victim and thus provide an easy and reliant system to the medical department. The proposed system is based on biometric matching of identification parameters for retrieval of medical data of patient. On research of long period of time biometric system has shown advanced future. Biometric should be in the ambulance so driver or nurse could get information about victim and send respective hospital which would help the doctor’s to be ready for their treatment. This would also help to make phone call to their relatives which are nominated by the victim at the time of filling information. This information is stored at cloud in authorized hospital. For fingerprint recognition biometric is used and for fingerprint ma...
Now a days cloud computing is a very popular method. Cloud storage means the storage of data onli... more Now a days cloud computing is a very popular method. Cloud storage means the storage of data online in the cloud. Cloud computing is a model of cloud storage in which data is put in storage on remote servers which is retrieved from the internet. Cloud storage services are very popular. In this survey, two algorithm are studied Ramp Secret Share Algorithm and Chunking Algorithm. Ramp Secret Share Scheme follow the Sharmir polynomial function. In secret share scheme there is distribution to no of server and reconstruction again. Chunking algorithm splits the big data into small part or chunks. Chunking algorithm are very important to Deduplication technique. Chunking algorithm is used to increase efficiency of data deduplication ratio and data deduplication throughput.
Artificial Intelligent Systems and Machine Learning, 2016
Online data sharing applications provide a way to share information between users. There are many... more Online data sharing applications provide a way to share information between users. There are many application domains in which users create and share the textual information about their products, services. This textual information contains more structured information merged into unstructured information. A User who wants to retrieve this structured, shared information, uses information retrieval algorithms which are inaccurate and expensive when text does not contain any example of targeted information. This data annotation is very important to facilitate finding subsequent information from shared data. In this paper, a framework is represented through which user can insert metadata during insertion time, so that identifying the data will be easy using a novel algorithm is presented that identify the metadata that really exist in documents by using content and query value and probabilistic method computation. Additionally, devise propose algorithms that mapping attribute-value to ma...
There is a tremendous growth of the mobile users everywhere which in turn leaded to high bandwidt... more There is a tremendous growth of the mobile users everywhere which in turn leaded to high bandwidth requirements of new cellular services. But the bandwidth scenario is dependent on limited spectrum resources that have been allocated for mobile communications. Basically, three caching strategies have been discussed in this paper. An adaptive cache invalidation algorithm known as Bit Sequence for client server mobile environment; the next approaches discussed are:1. Asynchronous Invalidation Message technique 2. Caching using data replication from servers at the Mobile Host’s Home Location Cache, abbreviated as HLC, during the network is wholly disconnected from the network & apparently, it delivers it back the invalidations details to the Mobile Host when it is reconnected; and the final approach is using the fundamentals of Data Replication for Caching strategies. Past few decades have given tremendous growth of research in caching technology of mobile computing. This particular pap...
Today’s data is rapidly and continuously growing and is not constant in nature. To deal with such... more Today’s data is rapidly and continuously growing and is not constant in nature. To deal with such kind of extracting data, as it is to annotate data, mapping attribute value is a solution. In Number of organization or company generate and share their textual information of their products, facilities, and services. Such collections of textual data contain a significant amount of structured data, which is hidden in the unstructured text document. Whereas information extraction systems simplify the extraction of structured associations, they are frequently expensive and incorrect, particularly when working on top of text that does not comprise any examples of the targeted structured data. Projected an alternative methodology that simplifies the structured metadata generation by recognizing documents that are possible to contain information of awareness and this data will be beneficial for querying the database. Additionally, we propose an algorithm that mapping attribute-value pair to ...
Many Computer applications enable to enter the annotations on, presentations, text documents etc.... more Many Computer applications enable to enter the annotations on, presentations, text documents etc. It is an effectiveuse of computers in a social work environment to modify andscrutinywork. To present a unique accession that facilitates the procreation of the systematic metadata by recognizes documents which contain the information of scrutiny and this information is used for querying the database consequently. If the system allows the users to annotate the data with keywords pairs, the users are unready to perform the particular function. The function not only requires appreciable drill, but it has unclear usualness for consequent searches. In this system even if itproduces all relevant annotations, a large number of such annotations may also give something to the user who must examine, modify, and approve all the suggestions. To provide the security from searching query at the time when the user will try to download the important data. For resolving issue of data security to add a ...
The inflaming use of current digital technology has transformed the life of people. Unlike the cu... more The inflaming use of current digital technology has transformed the life of people. Unlike the current electoral system, there are various applications as such. Security is an outmost priority which is predominant in the election with the offline system. The existing electoral system still uses a Centralized system in which an organization has full access grant. The problems encountered are mostly due to outdated electoral systems with the organization that has total control over the system as well as the database. Database tampering is a major reason which causes huge problems in the system. Our answer to this problem is Block Chain Technology. Block chain Technology is an ideal solution as it holds a decentralized system and the database is owned by various users. Examples like Bit coin can be taken as a good example of Block Chain Technology application as it uses a decentralized bank system. By applying the concept of block chain in the existing electoral system, it can reduce t...
As technology advances, it makes life easy and straightforward by solving many of the real-life p... more As technology advances, it makes life easy and straightforward by solving many of the real-life problems which are faced by people in their daily life. This also applies to the education system, which has made drastic improvements because of the use of new and advanced technology. But despite the advancement in technology, there are a large number of institutes that follow the traditional approach in marking the attendance as well as monitoring the classroom. Using a conventional method can cause intentional or unintentional mistakes and also wastage of the valuable time that can be utilized in the practice of teaching. Recent studies show that the behavior of the students in the classroom affects their results tremendously. Using the interaction between students and teachers in the ongoing lecture, student's attention and the understanding level can be estimated. Better interaction in the class results in an improvement in the performance of the student in academics. The main g...
The tools and technology used in organizations and enterprises to improve analytics method has be... more The tools and technology used in organizations and enterprises to improve analytics method has been described. Various developing organizations, enterprises and companies yield tremendous amount data everyday. Companies require to understand costumer’s necessities from the information available to it. This paper explains the tools and technologies which can help in analyzing the data by finding hidden patterns behind it. General Terms Big Data Analytics, Digital 2.0
Cloud storage is an online data storage and it is located as centrally.Cloud data ownerprovidethe... more Cloud storage is an online data storage and it is located as centrally.Cloud data ownerprovidethe facility for users to online store their data and access from any location. Though it has reliable for the user to achieve a secure and dependent cloud storage service. Ina key aggregate crypto-systemkey is generated fordifferent attributes of data in different cipher text classes and its associated keys. It derived aggregate key on the basis of attribute and identitywhich, depending on the different classes according to cloud data owner. By using this technique aunique cryptographic key achieves. It is optimallysecure for cloud data and privacy preserving key generating process.The cloud data ownerdecidesthe access levelof the data, such as public, private and hierarchyaccess level in order toenhance the data access capability in a data sharing cloud mechanism.Blowfish is thebest data security algorithm. It is higher security and faster execution as compared toother cryptographic algor...
Understanding the long-term outlook on a particular stock is very important for investors to see ... more Understanding the long-term outlook on a particular stock is very important for investors to see the growth of their investment. This paper will give the idea about how to predict the fair price of the shares using DCF method and understanding short term outlook of that investment. The various technologies used in the paper are free cash flow, the terminal value, net present value, ARIMA, Linear Regression. Traditional techniques lack in covering long term stock price movements and so new approaches have been developed for analysis of stock price variations.
International Journal for Research in Engineering Application & Management
As technology advances, it makes life easy and straightforward by solving many of the real-life p... more As technology advances, it makes life easy and straightforward by solving many of the real-life problems which are faced by people in their daily life. Various types of technologies are used to improve the life of humans. Hence, this paper has used one of the technologies to ease the life of humans i.e. IoT. This paper represents IoT (Internet of Things) for the smart home automation system. There are many proposed systems which make the home easy to live in. But this paper tells about the newer advanced system. This paper tells the usage of motion detection technique to perform light on/off, MQ2 sensor for gas detection, machine learning for facial expression detection, motor for facade opening/closing, motor for room rotation and last the website “Things Board” to collect the whole data at one place. The main goal of this paper is to provide full security with innovation at home.
Uploads
Papers by Bhagyashree Dhakulkar