IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Abstract:
we has represented analysis and optimization in cloud latency for the network server. Cloud services are a purpose of giving a development of more speed and access to the web and wide territory organise. We order to optimized server latency the network provides greatly reliable and low latency utilizing increment spectrum speed in the cellular network on the premise of expanding traffic demand. To accomplish a conceivable law latency with a network server, we consider the server architecture with single workload appeared in fig.2.Therefore user has low latency and in a general sense oversee limited data rates on higher bandwidth in cellular networks.Promote, we review the virtualization, essential issues in enhancement in optimization latency and server limit.We adroitly display insights as exceptionally lightweight user defined totals whose execution have interleaved with ordinary vertex preparing.
Keywords:
Cloud Computing, Low latency, Distributed server, Network throughput, Virtual Network Function (VNF).
Abstract:
The society is moving towards the use of instruments like computer and mobileand as aresult, organizations are producing and storing vast amounts of data. The data called as big data is captured, stored and processed for doing analytical analysis. These data is used for the future prediction by an organization. The big data is now not only confined to a single industry. Almost all organizations are involved in big data analysis. Big data is of vast amount and is so complex that it can�t be processed using traditional datamanagement tools or processing applications. Data mining is performed to gain information from the unstructured voluminous data. This paper discuss about the formats of the big data that is available in the stock. It reveals about the stocked big data sources which can be the web, the social media data and the black box data and also that how complicated it is for the management to capture such a high speed voluminous data.Managing and gaining insights from the produced data is achallenge and key to competitive advantage. Analytics solutionsthat mine structured and unstructured data are important as theycan help organizations gain insights not only from their privatelyacquired data, but also from large amounts of data publicly availableon the Web.
Keywords:
Analytical analysis, big data, structured data, unstructured data,big data analysis, black box, data mining.
Sanjay Rao, Rahul Kumar, Niharika Srivastava, Pragya Kamal
Abstract:
This society is moving toward the age of instruments and socialization, where instruments such as mobile phone and cameras are a vital part of it. In this age of digitization, the most common way of socialization is sharing photos on the social sites such as Facebook and Instagram and with every passing second the sharing of photos is increasing and due to this there are several factors that are needed to be taken care of. First of them is its security and second is to Image processing. This is the most essential aspect of image sharing all around the world. As sharing large and high definition of image require a lot of storage space but the larger the size the slower it gets, so we need a technique which will maintain the aspect ratio of the image as well as maintain its size for faster processing and loading using different technologies or different platforms as well. This paper is all about the different techniques required for the purpose of maintaining the security and to process and tagging methods of images shared on different social sites.
Keywords:
Socialization, Digitization, Image processing, Security.
Abhishek Tiwari, Mansi Mishra, Pragya Kamal, Mayank Deep Khare
Abstract:
Android is presently the world's most famous and generally utilized working framework in cell phones. It has increased colossal piece of the overall industry because of its open design and the prominence of its application programming interface in the engineer group. While the force of Android comes as its openness and simple to learn and execute nature. It clearly uncovered the gathering of an interconnected framework to a specific level of security dangers to the end clients. The expanded fame of the Android gadgets and related money related advantages pulled in the malware engineers, bringing about a colossal ascent of the Android malware applications. These issues could run from the customer side infusion, despicable session taking care of, broken cryptography, and inadequate transport layer insurance to uncertain information stockpiling. This study broadly covers different Android OS particular dangers and vulnerabilities.
Keywords:
Android, Security, Threats, Vulnerabilities, Malware, Smartphones, Risks, Application, Developer.
Optimal PMU Placement in 14 Bus System using Integer Linear Programming
Arindam Chowdhury, Neha Sahu, Shimi S.L
Abstract:
The Phasor Measurement Unit (PMU) is a key device for monitoring and control of the power system network. It gives real time, synchronized measurements of voltages at the buses and also current phase values which are incident to those buses where these PMUs are located. This paper presents atopological approach to determine the optimal PMU placement in order to make the system completely observable usinginteger linear programming. The proposed formulation is tested on IEEE 14 test systems and results so obtained for complete observability of system at normal condition is presented in this paper. The proposed PMU placement has been implemented on IEEE 14 bus systems.
Keywords:
Phasor Measurement Unit, Optimal PMU Placement, Integer Linear Programming.
Software Production Issues: Analysis and Categorisation
Aishwarya Vatsa, Shiv Kumar
Abstract:
Issues raised at the time of software product deployment are termed as Software Production Issues (SPI). They call for encountering and prospected solution because of the involved criticality. This paper presents a proposal of advancement towards the solution of SPI. It deals with the various aspects associated with SPI and how Quality Assurance Team (QA) deals with them in the context of Agile SDLC. The Agile environment in itself carries various tools and techniques to overcome setbacks. Nevertheless, there exist issues in the deployment phase. Aim here is to analyse SPI and place them in their respective category.
Keywords:
SPI; Software Quality; Agile SDLC; Software Deployment.
Network and Transport Layer Attacks in Ad-hoc Network
Chitvan Gupta, Dr. Prashant Singh, Dr. Rajdev Tiwari
Abstract:
Security issues in Mobile Ad-hoc Networks have been a major focus in recent years. The development of fully secure schemes for these networks has not been entirely achieved till now. While a wireless network is more versatile than a wired one, it is also more vulnerable to attacks. This is due to the nature of radio transmissions, which are made on the air. On a wired network, an intruder would need to break into a machine of the network or to physically wiretap a cable. On a wireless network, an adversary is able to eavesdrop on all messages within the emission area, by operating in promiscuous mode and using a packet sniffer. The two most important security problems in MANET are Authentication and Cooperation. Due to absence of any centralized controller, the detection of problems and recovery from such issues is difficult. Different types of attacks are discussed in this paper.
Keywords:
DoS, MANET, AODV, DSR.
Concept of Rough Set Theory and its Applications in Decision Making Processes
Pooja Chaturvedi, A K Daniel, Kumari Khusboo
Abstract:
The application which deals with the uncertain or vague information, the rough set theory is a useful and major method in the decision making. Rough set theory provides a feasible approach for decision rule extraction. This paper discusses the basic concepts of rough set theory as data representation, lower approximation, and upper approximation, attribute selection and rule formation. We have also discussed some application areas of rough set theory in the field of data mining and sensor networks.
Keywords:
rough set theory, lower approximation, upper approximation, data mining, rule extraction.
Abstract:
This paper is the analysis of various factors which influence to the speed and performance of the communication network. Online games, bank transaction etc are required to be minimum time to perform because if it takes a lot of time then the player or user would be irritated and never want to use this service again. So we describe here about latency, which occur due to the queuing delay in database in the network architecture. We give elaborate to queue and queuing delay in the term of buffer, MAC buffering, scheduling, Queue management also.
Keywords:
MAC Buffering, FQ, RR, DRR.
Abstract:
SMART Adhaar card with RFID Technology paper is mainly based on the RFID technology. In this paper the technology which issued is Radio Frequency Identification technology(RFID); There is an RFID card which is issued to each and every citizen with a unique identification number in it. This card is used as unique identification number in various aspects like epassport, smart parking, hospital details and driving licence which has been explained in the following paper.
Keywords:
RFID, CPV, UART, BWI, NIC.
Paper Battery: A Biodegradable Resource for Future Generation
Aryan Sukhija, Kalpana Dwivedi, Sanjay Nayak
Abstract:
This paper presents a complete insight on this revolutionising and satisfying solution for energy storage through biodegradable and also analyse in solving the problem from unbiodegradable energy resources. After the use of unbiodegradable energy resources, a lot of pollution is caused which is contaminating the environment. It is a flexible, ultra-thin device for energy storage and production.It is composed of carbon nanotubes along with sheet of cellulose-based paper. It can be used both as a high-energy battery and super capacitor. By these two types of functioning, it allows the battery to provide both long-term steady power production as well as a lot of energy as power backup regarding capacitors. Being Biodegradable, Light-weight and Non-toxic, flexible paper batteries have potential capability to adapt as a power source for the next generation. Paper battery has the potential to be used in electronics, medical devices and hybrid vehicles(Transformers) and medical technologies. The paper is aimed at understanding & analysing the properties and characteristics of Paper Batteries for the upcoming world; to study its advantages over unbiodegradable energy resources, limitations and disadvantages. This paper also aims at highlighting the construction and since it is the biodegradable and efficient source to replace other sources so finding various methods of mass production of Paper Battery.
Keywords:
Paper Battery, hybrid vehicles, Biodegradable, Light-weight and Non-toxic.
Abstract:
Cloud computing is a way to share resources and services over internet. It is the set of services which are being provided to the customers over network on the pay per use basis. Services of the cloud computing are provided by third party provider. SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) are several services that are provided by service providers. There are many issues such as load balancing, VMM (Virtual Machine Migration), scheduling of requests. One of the major issues in cloud computing is �security�. This paper mainly focuses on the technical security issues associated with the usage of cloud services.
Keywords:
Cloud Computing, Computing Computing Security, Security Threats, VMM.
Improved Codebook design for Vector Quantization on Orthogonal Polynomials based Transform Coding
Prof. Zainul Abdin Jaffery, Dr. Laxman Singh, Nadeem Ahmad
Abstract:
In this paper, an improved algorithm for codebook design is proposed for vector quantization (VQ) in image coding. Based on proposed Orthogonal Polynomials transformation, significant features of the training image vectors are extracted. By partitioning these feature vectors into a binary tree an improved codebook design algorithm is developed Each feature vector at a non-terminal node of the binary tree is directed to one of the two descendants by comparing a single feature associated with that node to a threshold. The binary tree codebook is used for encoding and decoding the feature vectors. In the decoding process the feature vectors are subjected to inverse transformation with the help of basis functions of the proposed Orthogonal Polynomials based transformation to get back the approximated input image training vectors. The results of the proposed algorithm are compared with the VQ using Discrete Cosine Transform (DCT) and Pairwise Nearest Neighbor (PNN) algorithm. uyThe new algorithm results in a considerable reduction in computation time and provides better reconstructed picture quality.
Keywords:
Image Coding, Orthogonal Polynomials, Binary tree classifier, Vector Quantization.
Environmental Sustainability and Green Policies of ICT Industry
Krati Bansal, Pratik Kurle, Dr. Priyanka Chawla
Abstract:
Over Environmental past two decades, change in climatic condition is a worldwide concern that is affecting humans and economies all around the globe. This paper explicates qualitative study of green computing executions and environmental sustainability peculiarly by Information Communication Technology (ICT) companies. Antecedent results through a large online inspection are considered in this research work. This research study cynosure on environmental protection and scrutinizes technologies implemented for compliance with the government rules. Green Computing technologies actualizes an organization to remarkably scale down the energy consumption, evolve energy efficient products and cut down e-waste by embracing reuse and recycle policies. Efficient policies can slash down the utilization of non-renewable resources and rebate the generation of waste. This publication deliberates numerous attributes of environmental sustainability and strategies enforced or proposed to minimize the pernicious effect caused by usage of computing.
Keywords:
Environmental Sustainability, Greenhouse gases (GHG) emission, Climate Change, Sustainability, CO2e.
A Comparitive Study of different Load Balancing Algorithms for Cloud Computing
Mehak Choudhary, Dr. Deepti Gupta, Dimple Chandra, Chitvan Gupta
Abstract:
Emerging era in the field of Information Technology is Cloud Computing which provides services to the users over the internet. It is paid services which depends on the usage. The problem associated with this is load balancing which means to use minimum resources to improve the performance of the system.Load Balancing is the process of dynamically allocationg the work load among nodes so that not evena single node would be heavily loaded. In this paper, we have compared the performance of different load balancing algorithms on the basis of their response time.
Keywords:
Cloud Computing, Computing Computing Security, Security Threats, VMM.
Abstract:
Mobile Adhoc network (MANET) is a collection of mobile node that can communicate with each other via radio or infra without any fixed infrastructure. MANET is a wireless network so to connect with internet any interface is needed that is called gateway which provide route to the internet. Due to dynamic topology packets are loss which degrade network operation. So, to achieved high throughput security scheme are applied on internet gateway which helps to out from adversarial environment. There is some security goal are discussed (confidentiality, integrity, authentication and non-repudiation) which enhanced adhoc network operation. In this paper, we survey on the gateway discovery scheme with security and without security based on various performance parameter like packet delivery ratio, end to end delay, routing overhead and throughput and then conclude which one is better.
Keywords:
Mobile adhoc network(MANET) ; Secure and Non- secure Gateway discovery ; Attacks; Security goal ; Rabin signature scheme.
Recent Advancements in EEG Signal Acquisition and Processing Techniques: A Review
Anurag Verma, Dr. Laxman Singh, M. Hari
Abstract:
This paper discusses the recent developments in EEG signal acquisition and processing for the detection of various neurological disorders like Epileptic Seizure, Stroke, tetraplegia and Alzheimer etc. Meanwhile a brief study is also made with MEG signal processing as the future detection method. This paper also discusses integration of EEG with other neuroimaging techniques like ECG, NIRS, and FEM.
Keywords:
Electroencephalogram (EEG), ECG, NIRS, FEM and Magnetoencephalography (MEG).
Abstract:
Health analytics encompasses the technologies and skills used to deliver business, clinical and programmatic insights into the complex interdependencies that drive medical outcomes, costs and oversight. Our main objective is to design a system to analyze health issues on location basis and analyze past history and future planning to overcome the issues in terms of medicine requirement, precautions, govt.policy reformation and future planning. Government and private organizations can gain insights to strengthen financial and budgetary performance, and improve the way health care is conceived and delivered for better outcomes across the entire spectrum of health industries. In this paper, we analysis regarding the past trend of diseases in 35 states and union territories of India. For better, fast and accurate analysis, we proposed and implemented geographical health analysis software using wavelet tree.
Keywords:
Epidemiology, Wavelet Tree.
Abstract:
A circularly polarized antenna with large axial ratio bandwidth has been proposed in this work. The antenna is designed by a 45o slot cut and a circular opening in the center of the square patch anda square metallic ring around it. It can achieve a 3-dB axial ratio Bandwidth of 110 MHz with impedance B.W of 56 MHz as compared to the antenna without a metal square ring is 35MHz.This antenna can be successfully applied for wireless application.
Keywords:
Microstrip Antenna, Axial ratio bandwidth, return loss, circular polarization.
Analysis of Various threats to online transactions
Shama Parveen, Amrendra Singh Yadav
Abstract:
Web based managing an account has turned out to be progressively critical to the benefit of money related establishments and in addition including accommodation for their clients. As the quantity of clients utilizing web based saving money increments, internet keeping money frameworks are turning out to be more attractive focuses for hackers to attack. To keep up their clients' trust and trust in the security of their online ledgers, money related establishments must distinguish how attackers trade off records and create techniques to ensure them. Because of the quick increment in the use of advanced gear and web based managing an account exchanges, there is compulsory need of secure login. In this paper, our commitment is twofold. We give a brief and far reaching review of the cutting edge attacks in various figuring situations as well as their possible countermeasures.
Keywords:
phishing, keylogger, MITM, backdoor, rootkits.
Texture and Color based Image Retrieval using Gray Level Co-Occurrence Matrix
Ayushi Jain, Hemlata Agrawal
Abstract:
Content Based Image Retrieval (CBIR) allows us to retrieve most similar image/images from the database based on the visual content of the image. The major steps being feature extraction and computing similarity. In this paper we extracted 17 color and texture features of image. To extract color feature we use F-Norm and to extract texture feature we use statistical measures (mean, standard deviation) and GLCM that is being applied at four different angles. The features thus extracted are then subjected to similarity measures using Euclidean distance. This technique showed a significant improvement in retrieval performance when compared to other methods such as Weighted Standard Deviation (WSD), Gradient operation using Sobel operator.
Keywords:
CBIR, Gray Level Co occurrence Matrix (GLCM), F-Norm.
Abstract:
Sorting is an essential data structure operation, which performs easy searching, arranging and locating the information. I have deliberated about various sorting algorithms with their performance analysis to each other. I have also strained to show this why we have required another sorting algorithm; all sorting algorithm have some advantage and some disadvantage. This paper also illustrations how to find the running time of an algorithm with the help of C Sharp Programming language. I have compared five sorting algorithms (Heap Sort, Shell Sort, Bubble Sort, Merge Sort and Quick Sort) by performance analysis their running times calculated by a Program developing in C Sharp Language. I have analyze the performance of sorting algorithms by numerous essential factors, like complexity, memory, method, etc.
Keywords:
Sorting, Heap Sort, Shell Sort, Bubble Sort, Merge Sort, Quick Sort, Stop Watch, Performance Analysis.
Quality Estimation based Multi-Sensors Data Fusion in Wireless Sensor Network: Review
Soni Chaurasia, Renu Chaurasia, Bhupendera Kumar, Rahul Kumar Sharma
Abstract:
The main purpose of wireless sensor networks is data gathering. The sensor is sense environment and then network aggregation (fusion) of data packets after that sends back to the base station. The data fusion is applying on intermediate nodes because of take a deep knowledge about an event. An intermediate node is deciding the sequence of data packet which it sends the neighbours node. The data fusion is used on intermediate nodes when all incoming data packet arrived. At the same time reduce the total traffic on a sensor. Therefore maximize the lifetimes of sensor networks and supporting the QoS. The different sensors in deployed in an area and cooperate transmission of data with each other, this network is known as multi-sensor network. In this review paper is based on maximizing the network lifetime using different algorithm. These algorithm is based on traffic planning, traffic scheduling and traffic management in multi-sensor environment improve the network lifetime.
Keywords:
WSN, Routing protocol, QoS, homogeneous WSN, multi sensor, data fusion.
Abstract:
Vehicular ad-hoc network (VANET) is an advanced technology that uses vehicles (represented as nodes) to create a self creating network without any infrastructure and has provided an emerging platform for researchers and industrialists. VANET rely only on vehicles themselves in order to provide basic functionality of networks. The security of VANET has drawn a kind attention in today�s world, because of wireless medium it is vulnerable to several attacks which affect the operations, so security is one of the main challenging issues and is mandatory for successful deployment of such technology. A robust VANET network strongly depends on secure communication and other privacy features .This article provides a brief description of various challenging issues in VANET and also presents some existing solutions for these problems. Later, we discussed current status of research and future goals. With this article, researchers and academicians can have more detailed perceptive of VANET and research trends in this emerging field.
Keywords:
Vehicular Ad-hoc network, Authentication, threats and attacks, DSRC, OBU, RSU, Ad Hoc networks, Privacy.
Data Validation by FIS for Heavy Metal Ions Removal Using Husk of Cajanus Cajan in Aqueous Solution
Amrita Kaushik, B.S. Chauhan, Rajdev Tiwari
Abstract:
Ever rising demands of electric and electronic appliances in the era of urbanization has increased the production of e-waste and menacing aqueous metallic wastes world-wide. The aqueous metallic waste contains high level of lethal ionic metals and compounds which need to be reduced to a level as suggested by various standards. In presented work; process of adsorptive removal of heavy metals mainly; Cr(VI), Cu(II) and As(III) by Husk of Cajanus Cajan (HCC) biosorbent; is used. To analyze the adsorptive efficiency of the HCC a batch mode experiment was conducted with the process parameters; pH of the solution (pH0 = 1.0�7.0), Adsorbent Dose (AD = 0.1-0.7mg/50ml), Initial Metal Ion Concentration (IMC = 1�30 gm/L) and Temperature (Temp = 295-325 K). The results obtained through laboratory experimental setup were analyzed and it was observed that the removal of Cr(VI) is maximum in acidic pH range (pH0=1), while the removal of Cu(II) and As(III) is maximum at neutral or near to neutral pH range (pH0=6.0-7.0). The maximum removal of Cr(VI), Cu(II) and As(III) from the aqueous solution was done at high adsorbent dose (AD=0.7 gm/50 ml). The analysis also reveals that the pH of the solution is the most significant factor among all the experimental factors. To validate the obtained experimental results rules were induced using decision tree method and a Fuzzy Inference System (FIS) was designed and trained on the basis of rules thus obtained. Inferences given by the FIS, when applied on the same data, shows close accordance to the experimental results which validates the results and inferences obtained from laboratory experiments.
Keywords:
Adsorpiton, FIS, Heavy metals, HCC.
Abstract:
This paper explains an alternative technology for automation, increased use and safety of vehicles. The concept of Thermography aided with Associative memory can be used to provide an object detection technique. The use of RADAR along with this method can provide a better driving experience.
Keywords:
Autonomous vehicles, RADAR, LIDAR, Thermography, Associative Memory.
On the Performance of the Python Programming Language for Serial and Parallel Scientific Computations
Samriddha Prajapati, Chitvan Gupta
Abstract:
In this paper the performance of scientific applications are discussed by using Python programming language. Firstly certain techniques and strategies are explained to improve the computational efficiency of serial Python codes. Then the basic programming techniques in Python for parallelizing scientific applications have been discussed. It is shown that an efficient implementation of array-related operations is essential for achieving better parallel [11] performance, as for the serial case. High performance can be achieved in serial and parallel computation by using a mixed language programming in array-related operations [11]. This has been proved by a collection of numerical experiments. Python [13] is also shown to be well suited for writing high-level parallel programs in less number of lines of codes.
Keywords:
Numpy, Pypar, Scipy, F2py.
A Review of Feature Extraction Techniques for Image Analysis
Rajkumar Goel, Vineet Kumar, Saurabh Srivastava, A. K. Sinha
Abstract:
Feature extraction is the most important step in image classification. It helps in extracting the feature of an image as ideal as possible. Feature extraction techniques are applied to get the feature that will be useful in classifying and recognizing the images. In this paper, we reviewed various feature extraction techniques. These methods are classified as low-level feature extraction and High-level feature extraction. Low-level feature extractions are based on finding the points, lines, edge, etc while high level feature extraction methods use the low level feature to provide more significant information for further processing of Image analysis. Mostly high-level feature extraction method uses the Artificial Neural Network (ANN) to extract the feature in multiple layers.
Keywords:
Feature extraction, Image classification, ANN.
Opinion Mining and Sentiment Analysis on Customer Review Documents- A Survey
Surya Prakash Sharma, Dr Rajdev Tiwari, Dr Rajesh Prasad
Abstract:
People beings express themselves by giving opinions, feedback, suggestions or ideas about any object. Opinions can be expressed in many ways such as it can be expressed on twitter, facebook, reviews, blogs etc. World and technology is growing the faster rate so for taking decisions such as buying a product, voting for a politician etc. people are using opinion present on blogs, social networking sites or shopping websites. Nowadays, if someone has to buy a online product then he/she can first view other buyer�s reviews on the product site and take the right decision accordingly. There are many opinions on the web about an product so taking decisions might be difficult. Therefore, opinion mining is used for classifying the reviews according to their polarity. Opinion mining (OM) is a process of the mining opinion from the review. Analyzing customers review is more important for any user in making right purchasing decision product and organization. Opinion mining is also known as sentiment analysis. In this paper we survey on Opinion mining with respect to their different levels, architecture, techniques applied, tools used, comparative study of techniques and challenges.
Keywords:
Opinions, Polarity, Opinion Mining, Sentimental Analysis, Data Mining, Web Mining.