IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Automatic License Plate Recognition (ALPR) System Using Optical Character Recognition
Achala Singh, Ankit Mandal, Akanksha Dixit
|
Shortest Path Routing Protocol in Scalable Mobile Ad Hoc Networks on Demand Dynamic Randomized Source
Minakshee Kauraw, Aditya Sharma
|
Enhancement of Underwater Images: A Review
Sankalp Thakur, Papiya Dutta
|
Spectrum Sensing Techniques in Cr Networks: Comparative Study
Anand Dev Barman, Amit Chouksey
|
Enhancement of throughput in a Cognitive Radio System under a High Target Detection Probability Constraint
Ms. Papiya Dutta, Dr. G.C Manna
|
Analysis of Security Issues and Effectiveness for Adoption of E-Learning Management System
Mrs. Abhilasha Sankari
|
Miniaturization of Microstrip Patch Antenna using Fractal Geometry
Kanika Garg
|
Contrast Improvement of Blurred Multispectral Remote Sensing Satellite Images using SVD-DCT and Contrast Limited AHE
Preeti Singh Rajpoot, Amit Chouksey
|
An Efficient Data Security in Cloud Computing Using Encryption Algorithm
Roshni Agarwal
|
A Survey of Security and Privacy Challenges in Cloud Computing
Sakshi Nema
|
Embedded Based Vehicle Speed Control System Using Wireless Technology
Divyansh Jain, Arun Kumar Burman, Rajesh Parasere
An Automated System for Tumor Detection Using Details MRI Image
Priyanka Patel, Dr. Preeti Rai
|
Data Compression Techniques in Cloud Computing
Monika Soni, Dr Neeraj Shukla
|
Various Techniques to Secure Cloud Storage
Mandvi Mamar, Dr Neeraj Shukla
|
An Appearance Based Method for Emotion Detection from Face Image
Shashi Bala Yadav, Preeti Rai
|
Abstract
A Survey of an Online Recommender System for Social Networks
Arpita Jain, Santosh Vishwakarma
Abstract:
The latent growth of internet results the use of social Networks Such as Facebook, Linked In, MySpace or Twitter etc. which produce enormous amount of information .As a result users are faced with the problem of information overload, online Recommender System can be used to address the information overloaded problems by suggesting potentially interesting or useful items to users. Recent studies demonstrate that information from social networks can be dispirited to improve accuracy of recommendation. Online Recommender systems are intelligent tools that help on-line users to cultivated information overloaded. In this paper, we describe overview of online Recommender Systems, different techniques and social factors which influence Online Recommender System.
Keywords:
Online Recommender system, Social network, Content based filtering, Collaborative filtering, Hybrid recommender system.
Abstract:
The �Internet of things� (IoT) is becoming an increasingly growing topic of conversation. It�s a concept that not only has the potential to impact how we live but also how we work. In IoT, the tens of billions of devices that have sensing or actuation capabilities are connected to each other via the Internet. The IoT includes everything from wearable fitness bands and smart home appliances to factory control devices, medical devices and even automobiles. Security has not been a high priority for these devices until now. And this has led to some destructible cyber-attacks aimed through IoT devices seeking authentications, private data, privileges etc. Many cyber security experts have already warned that connecting real world products and appliances to the internet is setting us up for a disaster. This paper is aimed to discuss the security issues of IoT, recent attack scenarios and possible solutions to establish �Internet of Secure Things�.
Keywords:
Intrusion through IoT, Botnets, Distributed-Denial-of-Service (DDoS), IoT Design Issues.
Abstract:
Cloud computing is being used in every applications of web technology including web applications, mobile communication and remote data access oriented applications. This is also threatening for the information of the users of these cloud computing. Most important of the threats in Cloud computing is security of the data of the users as it is being posted over the cloud and can be manipulated, misused by the other cloud users, cloud service providers or hackers. Various researchers have worked on cloud computing security and many algorithms have been developed. Still because of rapidly changing technologies, devices and applications demand continuous work in the field of security of data over cloud. Conventionally data security is applied using encryption/decryption key management, Intrusion Detection and Prevention systems for the networks. Applications of these techniques over the cloud makes it secured but in parallel ill minded persons are also developing tools and techniques to crack these security measures. This work is providing detailed discussions on possible security threats, solutions developed by the other researchers and an integrated security solution for the same. It will use cryptography techniques, trust management and application of Intrusion Detection Systems collectively for applying the security.
Keywords:
Cloud Computing, Security, Intrusion Detection System, Encryption, Decryption, Authentication, Authorization, non-repudiation.
Machine Learning: A Critical Review of Classification Techniques
Dr. D. Durga Bhavani, A. Vasavi, P.T. Keshava
Abstract:
Classification is a data mining (machine learning) technique used to predict group membership for data instances. The goal of this survey is to provide a comprehensive review of different classification techniques in data mining. Evaluation of information, gathered almost everywhere in our day to day life can help devising some efficient and personalized strategies. The amount of information stored in modern databases makes manual analysis intractable. Classification is a well known datamining technique that tells the class of an unknown object. For this purpose, classification predicts categorical (discrete, unordered) labels. Many classification algorithms have been proposed by researchers in statistics, machine learning and pattern recognition. In this paper, we have described various popular classification techniques in data mining.
Keywords:
Data Mining, Machine Learning, Prediction, Affinity Grouping, Clustering, Estimation and Visualization.
Abstract:
In this paper different audio denoising techniques are discussed. Most of the audio denoising techniques reduce Gaussian white noise from audio signals. Diagonal estimation techniques and non-diagonal estimation techniques are discussed. Different audio denoising techniques and noises are shown through the taxonomy.
Keywords:
Audio denoising, Gaussian noise, Musical noise, Non-diagonal estimation, Thresholding, AWGN.
Novel Technique for Timing Offset Estimation in OFDM for Preventing Orthogonality
Ashish Kumar Nadoniya, Prof. Papiya Dutta
Abstract:
This paper deals with the symbol timing issue of an OFDM system in fast varying channel. Symbol timing offset (STO) estimation is a major task in OFDM. Most of existing methods for estimating STO used cyclic prefix or training sequences. In this paper, we consider a new system for STO estimation using constant amplitude zero auto-correlation (CAZAC) sequences as pilot sequences in conjunction with fractional Fourier transform (FRFT). This method gives good results in terms of MSE in comparison with other known techniques and it is important for fast varying channel. MATLAB Monte-Carlo simulations are used to evaluate the performance of the proposed estimator.
Keywords:
Orthogonal frequency division multiplexing (OFDM), Fractional Fourier transform (FRFT), Constant amplitude zero autocorrelation waveform (CAZAC), Signal to noise ratio (SNR), Symbol timing offset (STO).
A Comparative Study of Different Generations of Communication Networks
Priyanka Jain, Rajendra Singh Yadav
Abstract:
5G Technology stands for Fifth Generation Mobile technology. From generation 1G to 2.5G and 3G to 5G the world of telecommunication has seen a number of significant improvements. Fifth generation network provide affordable broadband wireless connectivity at very high speed. The paper throws light on different network architecture of fifth generation technology. Currently 5G term is not officially used. In fifth generation researches are being made on development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless World. Fifth generation focus on Voice over IP (VOIP)-enabled devices that user will experience a high level of call volume and data transmission. Wire-less system designers have been facing the continuously increasing demand for high data rates and mobility required by new wireless applications and therefore has started research on fifth generation wireless systems that are expected to be deployed beyond 2020. The main features in 5G mobile network is that user can simultaneously connect to the multiple wireless technologies and can switch between them. This forthcoming mobile technology will support IPv6 and flat IP.
Keywords:
5G, World Wide Wireless Web, Dynamic Adhoc Wireless Networks (DAWN), Real Wireless Communication.
Analysis of Spectrum Sensing Techniques in Cognitive Radio to enhance Spectral Efficiency
Arti Patel, Silky Pareyani
Abstract:
A cognitive radio is a smart radio that can identify the idle frequencies (also termed as spectral holes or white spaces) and allot them for the use of unlicensed secondary users. The basic functionality of a cognitive radio is to sense the spectrum accurately by avoiding any chances for interfering with primary or licensed users. Spectrum sensing can be performed either by cooperative or non-cooperative method. This paper includes co-opertive as well as non-cooperative spectrum sensing techniques. In this paper three techniques of spectrum sensing has been considered that are Energy detection technique, cyclostationary techniques and Eigen value technique. The comparison of these techniques is done on AWGN channel. Performance matrix like probability of miss, probability of detection and signal to noise ratio (SNR) are computed to measure the performance.
Keywords:
Cognitive Radio, spectrum Sensing, Dynamic spectrum, Probility of Detection, SNR.
Analysis of Digital Watermarking Schemes in Frequency Domain for Security Enhancement
Silky Pareyani
Abstract:
Digital watermarking has been widely used for copyright protection of multimedia data. It is a process to provide authenticity by hiding a data into an image or audio or document. Hiding of data in an image can be done in frequency domain or spatial domain. In this paper we have made a comparative analysis on two frequency domain watermarking schemes. The first digital image watermarking algorithm utilizes texture block and edge detection in the discrete wavelet domain in order to balance between the invisibility and robustness and improve the ability of resisting to geometric attacks of the digital image watermark. The second method is a robust watermarking method based on Hadamard Transform. The simplicity of Hadamard transform offers a significant advantage in shorter processing time and ease of hardware implementation than most orthogonal transform techniques such as DWT and DCT. The two techniques are compared for better image quality and more robustness under various attacks such as JPEG compression, cropping, sharpening, and filtering and so on. Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC) are computed to measure image quality and robustness.
Keywords:
Discrete wavelet transform (DWT), Hadamard transform, Arnold Transform, Peak signal-to-noise ratio (PSNR).
Congestion Window Based Roll Back Approach to Improve TCP Congestion Problem in 4g LTE Network using NS-3 Simulator
Ashish Saraf, Prof. Ruchi Kshatri
Abstract:
The Long Term Evolution (LTE) of the UMTS Terrestrial Radio Access and Radio Access Network is another correspondence standard went for business arrangement in 2010. Objectives for LTE incorporate backing for enhanced framework limit and scope, high top information rates, low idleness, lessened working expenses, multi- recieving wire support, adaptable transfer speed operations and consistent mix with existing systems. The point of this proposal is to study the effects on the end-client and framework execution when clients with high bit rates TCP administrations are traveling through the system. These effects influence the decreased end-client or framework throughput, e.g., because of clogging in the vehicle system, prompting poor usage of the vehicle and radio assets accessible. To reach such a point, it has been important (1) to make another test system with the ns-3 and perform reenactment in diverse system settings and (2) define a quick recuperation approach ready to catch the essential flow of the genuine framework and to keep away from blockage circumstance. Conceivable answers for relieve the effects are researched by contrasting the recreations consequences of TCP execution in the radio and transport system and we perform Fast recovery in TCP Stream.
Keywords:
LTE, UMTS, TCP.
IDS Criteria for Enhanced Security over Public Cloud
Ashish Saraf, Prof. Ruchi Kshatri
Abstract:
Intrusion Detection Systems are being used in every software whether it is web based or not. But application of IDS in public networks such as cloud, grid computing has many applications and has been proven to be boon. The application of IDS is used in creating an alarming system for the networks so that security measures can be applied to prevent the possible loss of data and avoiding non functioning systems. Because of the enhanced technology there are many ways of the hacking and compromising any networked system has been evolved and causing huge loses. Since direct application of security methods affects the performance of the system heavily, therefore application of IDS is increasing widely. Since IDS can be applied on gateways therefore a quick and better alarming system can be created which will prompt the administrators to apply security techniques to avoid the problems. In this work, different IDS mechanisms have been studied and list of possible criteria has been enlisted to provide IDS over the cloud. This work also proposes to take one of the IDS mechanisms to study the criteria of IDS, their behaviours, advantages and possible alarming for Cloud.
Keywords:
Cloud Computing, Security, Intrusion Detection System, Alarming criteria, abnormal behaviours, Encryption, Decryption, Authentication, Authorization, non-repudiation.
Abstract
Performance Enhancement in 5G the future of wireless communication: Review
Varun Sahu, Papiya Dutta
Abstract:
As a subscriber becomes more aware of the mobile phone technology, he/she will seek for an appropriate package all together, including all the advanced features of a cellular phone can have. Hence, the search for new technology is always the main intention of the prime cell phone giants to out innovate their competitors. The wireless industries are busy with the standardization of the �4G� cellular networks. The 4G concept shave already moved to the standardization phase, we must begin to work on the building blocks of the 5G wireless networks. The major difference from a user point of view , between current generation and expected 5G techniques must be something else than increased maximum throughput, other requirement s include low battery consumption , more secure we refer to this goal as enabling the 4 A�s paradigm that is ,�Any rate�, �Any time�, �Anywhere�, �Affordable�. 5G stands for 5thGeneration mobile technology. 5G is used to denote the next major phase of mobile telecommunication standards beyond the 4G standards. In particular, this paper focuses on the features such as broadband internet in mobile phones, with a possibility to provide internet facility in the computer by just connecting the mobile and with a speed of 10 GB/s and more.
Keywords:
4G, 5G, cloud computing, Bandwidth, Dynamic Adhoc Wireless Network.
Abstract:
This article describes five technologies that could lead to both architectural and component disruptive design changes. This paper also focuses on all preceding generations of mobile communication along with fifth generation technology. The paper throws light on network architecture of fifth generation technology. Currently 5G term is not officially used. In fifth generation researches are being made on development of World Wide Wireless Web (WWWW), Dynamic Ad hoc Wireless Networks (DAWN) and Real Wireless World. Fifth generation focus on (Voice over IP) VOIP-enabled devices that user will experience a high level of call volume and data transmission. The main features in 5G mobile network is that user can simultaneously connect to the multiple wireless technologies and can switch between them.
Keywords:
5G, features, cellular networks, architecture, Ad hoc Wireless Networks.
Abstract:
Data Mining Techniques have been deployed in extracting solutions for Business problems. This paper is an attempt to explore the world of Data Mining techniques and how it can be effectively used in the field of Text Steganography for Information Exchange. This paper explores various DM Techniques like Clustering, Classification, Machine Learning, and Neural Networks to get an insight into the effectiveness of these techniques. This paper proposes an algorithm titled �K-Means Text Steganography� which uses k-Means clustering for embedding Text in Text. This algorithm has been found to be satisfying performance parameters like Similarity Measure and Embedding Capacity.
Keywords:
Text Steganography, k-Means Clustering, Embedding Capacity, Similarity Measure, Machine Learning, Neural Networks, Classification, Data Mining Techniques, Information Exchange.
Security in Data Storage and Transmission in Cloud Computing
Anupriya Dubey, Mr Sourabh Sharma
Abstract:
Cloud computing has been envisioned as the next generation architecture of IT Enterprise. In the cloud, the data is transferred among the server and client. High speed is in important issues in networking. Cloud security is the current discussion in the IT world. Secure the data without affecting the network layer and protecting the data from unauthorised into the server. The data is secured in server based on choice of security method so that data is given high secure priority. Cloud computing has been fancied as the next generation architecture of IT enterprise .traditional solution, where the IT service are under proper physical, logical and personal controls cloud computing moves the application software and database to the large data centre, where the manager of the data and services may not be fully trustworthy.
Keywords:
Cloud computing, IT Enterprise, Public model, Private model, Hybrid cloud, Community cloud.
A study on various attacks and Intrusion Detection Systems in Cloud
Miss. Prachi Tembhare, Dr. Neeraj shukla
Abstract:
Cloud computing is the most emerging technology today. It is providing solution to various resources either software or hardware to its users� on-demand in pay-as-you go strategy. Now-a-days every IT companies are focusing on adoption of this latest innovative computing trend. Using virtualization technique, network and storage, this computing provides number of services using shared pool of resources in distributed environment. Due to its advent over the Internet, this computing is also vulnerable to various attacks like Man-in-the middle attack, DoS attack, Session Hijacking, etc. and hence arises number of security concerns. This paper elaborates various security concerns and popular attacks in cloud. Beside this it also focus on various Intrusion Detection System available in cloud computing.
Keywords:
cloud security, attacks, Intrusion Detection System (IDS), Denial of Service (DoS), Anomaly Based IDS, knowledge base IDS.
Abstract:
An electrostatic precipitator (ESP) is an air cleaner device that removes fine particles, like dust and smoke, from a flue gas using the force of an induced electrostatic charge minimally impeding the flow of gases through the device. The Electrostatic Precipitator has become known for its efficiency and reliability but there are some advantages and disadvantages. An electrostatic precipitator is a large industrial emission and air pollution control unit.
Keywords:
Electrostatic precipitator, Electrodes, Air pollution, Flue gas.
A Review of Software Architecture Metrics Extracted using UML
Zafar Shareef, Rishabh Ojha
Abstract:
Unified Modeling Language was introduced in late 90�s, since than software industries and practitioners have been adopting this language for detecting design deficiencies at the early stage in the design phase. UML has now become the de facto design document being used in the early design phase. It has gained wide popularity being able to systematically represent artifacts for software architecture. For Component Based Software Development (CBSD), metrics have been proposed by authors, for understanding complexity so that deficiencies in the design phase can be eliminated, which can cause problems in the later phases of the SDLC. A variety of tools has been proposed for extracting metrics, CAME tool has been proposed for extracting metrics for Software Component assembly from UML design documents. Components being black box in nature; interacts only through their interfaces. The complexity of these interactions can be studied through metrics. The XMI (XML Meta Data Interchange) standard is now part of the UML tools. Using XMI file, the component metrics can be extracted. This paper presents a systematic literature review of metrics extraction for CBSD using UML tool. This paper addresses the software architecture metrics which includes object oriented metrics as well as component based metrics extracted using design document UML.
Keywords:
Component Based Software Development, Component diagram, Component Assembly Metrics Extractor, Software metrics, Software Architecture, XMI.
Visual Tracking Robot Using Computational Sensors in VLSI
Sumit Bose, Tanu Mishra, Vibha Mishra
Abstract:
Self target aiming and pre-processing of visual data is one of the biggest challenges in solving red-world problem using autonomous robots. Conventional methods generally depend on CCD cameras and computers associated with base station which doesn�t implies real world interaction. Our approach attempts to solve this problem by using computational sensors and small/inexpensive embedded processors. The computational sensors are custom designed to reduce the amount of data collected, to extract only relevant information and to present this information to the microcontroller , in a format which minimizes post-processing latency. Consequently, the post-processors are required to perform only high level computation and decision making on given data. The computational sensors, however, have wide applications in many problems that require image pre-processing such as edge detection, motion detection, centroid localization and other spatiotemporal processing.
Keywords:
Computational sensor, Pre-processing, Motion centroid computation, Weapon identification.
Analysis of Filters for the Reduction of Speckle Noise in Images
Bhawna Ondela, Silky Pareyani
Abstract:
This paper represents a novel approach to improve de-speckling in SAR images. The main issue in imaging technique is presence of grainy noise termed as �speckle�, which will affect the overall quality of image, hence it is highly required to use effective speckle reduction techniques to suppress speckle. Various filtering techniques are available to reduce the speckle noise and to enhance the quality of the image. As Speckle noise is multiplicative in nature which is very much difficult to remove. So this paper presents a review on different spatial and transform methods such as spatial domain technique and wavelet domain techniques.
Keywords:
Synthetic aperture radar (SAR), speckle noise, statistical parameter.
Transistor Leakage Mechanisms and Power Reduction Techniques in CMOS VLSI Design
Akanksha Dixit
Abstract:
A rapid growth in semiconductor technology and increasing demand for portable devices powered up by battery has led the manufacturers to scale down the feature size, resulting reduced threshold voltage and thereby enabling integration of extremely complex functionality on a single chip. In CMOS circuits, increased sub-threshold leakage current refers static power dissipation is the result of low threshold voltage. For the most recent CMOS technologies static power dissipation i.e. leakage power dissipation has become a challenging area for VLSI chip designers. According to ITRS (International technology road-map for semiconductors), leakage power is becoming a dominant part of total power consumption. To prolong the battery life of portable devices, leakage power reduction is the primary goal. The main objective of this paper is to present the analysis of leakage components, comprehensive study & analysis of leakage components and to present different proposed leakage power reduction techniques.
Keywords:
CMOS, Leakage power, VLSI circuits, multimedia applications, Static power, Nano Scale, LSSR.
High-Speed Optical Transmission with Coherent Detection Based on DSPs
Sunita Shukla, Akanksha Dixit
Abstract:
The recently reported the high spectral efficiency and high-baud-rate signal transmission are all based on digital signal processing (DSP). DSP simplifies the reception of advance modulation format and also enable the major electrical and optical impairments to be processed and compensated in the digital domain, at the receiver or transmitter side. In this paper we summarize the research progress on high speed signal detection.
Keywords:
DSP, FDM, Coherent system, SDM, Optical communication, Advanced DSP.
Intelligent Wireless Communication System Using Cognitive Radio
K. M. Pragati, Jayshree Kanojiya, Akshay Khatri, Silky Pareyani
Abstract:
The increasing demand for wireless communication introduces efficient spectrum utilization challenge. To address this challenge, cognitive radio (CR) is emerged as the key technology; which enables opportunistic access to the spectrum. CR is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones. This optimizes the use of available radio-frequency (RF) spectrum while minimizing interference to other users. In this paper, we present a state of the art on the use of Multi Agent Systems (MAS) for spectrum access using cooperation and competition to solve the problem of spectrum allocation and ensure better management. Then we are discussing an approach which uses the CR for improving wireless communication for a single cognitive radio mobile terminal (CRMT).
Keywords:
Cognitive Radio, wireless communications, mobility, Artificial Intelligence, Multi Agent Systems.
Different Routing Techniques in Free Space Optics for Quality Based Network
Priya Lodhi, Aditya Sharma, Vibha Dhurvey
Abstract:
FSO is communication system where free space acts as a medium between transceivers and they should be in LOS (line of sight) for successful transmission of optical signal. Medium can be air, outer space or vacuum. This system has many advantages like high bandwidth, no spectrum license and economically less. The transmission in FSO is dependent on the medium because the presence of foreign elements like rain, fog and haze, physical obstruction, scattering and atmospheric turbulence are some of these factors. There are many routing techniques available for the transmission of light wave in free space. A comparative study of different routing techniques used in FSO is discussed in this paper.
Keywords:
FSO, Link margin, RWA, modulation, routing, nodes, routing techniques.
Abstract:
This paper set about to elucidate the various modulation techniques for Light-Fidelity (LiFi). Digital modulation techniques generally used for LiFi are summarised, and some special issues and requirements are discussed. In principle, LiFi also relies on electromagnetic radiation for information transmission. Therefore, typically used modulation techniques in RF communication can also be applied to LiFi with necessary modifications. Moreover, due to the use of visible light for wireless communication, LiFi also provides a number of unique and specific modulation formats.
Keywords:
Li-Fi, VLC, LED, OOK, PPM, OFDM, CSK.
Abstract:
The Atacama Large Millimeter/Submillimeter Array (ALMA) is an interferometer array of 54_12m and 12_7m antennas, ALMA science will transform our vision of the cold, dusty, and gaseous universe, from extrasolar planets to the youngest galaxies. Receivers for the ALMA are designed to include 10 frequency bands. (ALMA) is an international effort to construct an instrument capable of matching the exquisite imaging properties of optical space telescopes at millimeter and submillimeter wavelengths. So this paper presents a review on different observatories of telescope.
Keywords:
Telescopes, submillimeter, high angular resolution, interferometric.
Abstract:
Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. The unique characteristics of the underwater acoustic communication channel and the differences between underwater sensor networks and their ground-based counterparts require the development of efficient and reliable security mechanisms. In this seminar, a complete survey of security for UWCNs is presented, and the research challenge for secure communication in this environment is outlined.
Keywords:
Underwater wireless communication networks ground-based counterparts require the development
Cognitive Radio Wireless sensor Network and its Efficient Spectrum Utilization
Nandini Upadhyay, Papiya Dutta, Ekta Deshmukh
Abstract:
Cognitive radio has been considered as a key technology for future wireless communications and mobile computing. We note the cognitive radios can form cognitive radio networks (CRN) by extending the radio link features to network layer functions and above. A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, and its efficient spectrum utilization.
Keywords:
Cognitive Radio, Cognitive Radio Network, Ubiquitous Computing, Wireless Networks, Heterogeneous Wireless Networks
Abstract:
Now days purchasing and shopping at big malls is becoming a daily activity in metro cities. We can see huge rush at malls on holidays and weekends. The rush is even more when there are special offers and discount. People purchase different items and put them in trolley. After total purchase one needs to go to billing counter for payments. At the billing counter the cashier prepare the bill using bar code reader which is a time consuming process and results in long queues at billing counters. Our aim is to develop a system that can be used in shopping malls to solve the above mentioned challenge. The system will be placed in all the trolleys. It will consist of a RFID reader. All the products in the mall will be equipped with RFID tags. When a person puts any products in the trolley, its code will be detected and the price of those products will be stored in memory. As we put the products, the costs will get added to total bill. Thus the billing will be done in the trolley itself. Item name and its cost will be displayed on LCD. Also the products name and its cost can be announced using headset. At the billing Counter the total bill data will be transferred to PC by wireless RF modules.
Keywords:
Reader, RFID tags, wireless RF modules, IR rays.
Abstract:
Image fusion is a process to merge the information from two or more images to obtain a resultant image of higher quality and information. There are numerous techniques available to fuse the images. These techniques are categorized into spatial domain, transform domain and statistical based methods. This paper contains the review of some of the techniques under each type and draws a conclusion from their performance analysis.
Keywords:
Image Fusion, Types of image fusion, Entropy(En), Peak Signal to Noise Ratio(PSNR)
Automatic License Plate Recognition (ALPR) System Using Optical Character Recognition
Achala Singh, Ankit Mandal, Akanksha Dixit
Abstract:
Intelligence surveillance is an important commodity in traffic based system. Automatic License Plate Recognition (ALPR) is a challenging area of research. This works deals with problems related to artificial intelligence , neural networks and machine vision in the construction of an automatic license recognition (ALPR)system. These intelligence system helps in traffic monitoring during rush hours, road safety and commercial applications like car parking lots and law enforcements .In this paper a license plate recognition system is proposed which uses captured digital image of front or rear of the vehicles and can be easily applied to commercials car park systems to access the parking spaces and also it prevent car theft issues.
Keywords:
ALPR: Automatic license plate recognition, Sobel operators, License plate region, Bounding box and OCR: Optical character recognition
Shortest Path Routing Protocol in Scalable Mobile Ad Hoc Networks on Demand Dynamic Randomized Source
Minakshee Kauraw, Aditya Sharma
Abstract:
Increasing the number of nodes in any wireless and mobile ad hoc network environment give birth to various issues such as higher power consumption, minimized data security, degraded QoS (quality of service) and security. Especially networks without having a centralized system (MANETS) is facing severe security issues. There is a major security issue in the malicious nodes while finding the shortest path. In our proposed paper, a simple hybrid AODSR algorithm is developed to find the shortest path routing in a dynamic network. The algorithm used is an efficient coding scheme which traces the malicious nodes length, which depends on the number of nodes in the network. The aim of this paper is to propose an algorithm to find a secure shortest path against malicious nodes.
Keywords:
MANET, Shortest Path, routing protocol, malicious nodes, PDR, End-to-End delay etc.
Abstract:
Underwater image pre-processing is absolutely necessary due to the quality of images captured under water. When capture such images, quality of images degrade due to many factors like ripples in water, lack of availability of light, organic matter dissolved in water etc and also such images are captured from a very small distance, so the images must be pre processed before applying any kind of operation on these images. Different filtering techniques are available in the literature for pre-processing of underwater images. The filters used normally improve the image quality, suppress the noise, preserves the edges in an image, enhance and smoothen the image. In this paper comparative analysis of various Filters for such underwater images is presented.
Keywords:
Underwater image preprocessing, Homomorphic Filter, Anisotropic Filter, Wavelet filter.
Spectrum Sensing Techniques in Cr Networks: Comparative Study
Anand Dev Barman, Amit Chouksey
Abstract:
In this paper we have discuss about overview of all existing spectrum sensing techniques and comparison is evaluated on the basis of their capacity of detecting the presence of primary users. In present day wireless communication has become the most popular communication. Cognitive radio is widely expected another field in wireless communications. Spectrum sensing allows cognitive radios to be aware of the surroundings by determining which frequencies are in use. The spectrum sensing is the focal point of CRs allowing them to detect vacant spectrum holes and use them without harmful interference to other CRs or licensed users.
Keywords:
Cognitive Radio, Spectrum Sensing Techniques, Sensing Performance, Non-cooperative System.
Enhancement of throughput in a Cognitive Radio System under a High Target Detection Probability Constraint
Ms. Papiya Dutta, Dr. G.C Manna
Abstract:
Cognitive radio is a new promising technology that aims to alleviate the spectrum scarcity problem in wireless communications by allowing access of unlicensed (secondary) users to frequency bands that are allocated to licensed (primary) users, in a way that does not affect the quality of service (QoS) of the licensed networks [1], [2].In this paper we propose to enhance the sensing-throughput tradeoff in opportunistic spectrum access cognitive radio networks by performing spectrum sensing and data transmission at the same time. We also compare the average achievable throughput of the proposed cognitive radio system with the respective throughput of the conventional opportunistic spectrum access cognitive radio system in [12]. Finally it is shown that the proposed cognitive radio system exhibits improved throughput under a single high target detection probability constraint imposed for the protection of the primary users.
Keywords:
Cognitive radio, opportunistic spectrum access, optimal power allocation, spectrum sensing, throughput maximization.
Analysis of Security Issues and Effectiveness for Adoption of E-Learning Management System
Mrs. Abhilasha Sankari
Abstract:
Learning Management Systems using cloud computing technologies are a growing and they are addressing the University and Institution need for access to the study material and courses to raise the standard of education system within the educational system. The purpose of this paper is to evaluate the two factors that can influence the Universities and/or Institution decision to adopt e-learning management systems as a part of their facilities. Factors related to e-learning being considered include its effectiveness and its security. This paper addresses these factors from the viewpoint of decision maker of the Institute who determine the adoption of e-learning system in their Institute. The two independent factor that is cost effectiveness and security issues was analyzed in comparison to the management interest in adopting e-learning systems. A positive relationship was found between the independent variables: cost-effectiveness and the dependent variable the management interest in adopting e-learning systems for the Universities and/or Institution. And no significant relation was seen between security and adoption of e-learning systems.
Keywords:
Online Learning, E-Learning, Learning Management System
Miniaturization of Microstrip Patch Antenna using Fractal Geometry
Kanika Garg
Abstract:
The development of communication engineering with compact technology demands size reduction of low frequency antennas as an important design perspective. In this work, a microstrip patch antenna with different shaped fractal slots has been implemented. Due to the introduction of the fractal geometry a 20-80% reduction in size and thereby miniaturization of an ordinary microstrip patch antenna for the same resonant frequency is achieved. However size reduction reduces the gain of designed antenna which is then enhanced to a sufficient level by using 4- element array of the same antenna structure as an element reducing the size reduction to 33 %. A 2-element array is then designed to achieve good gain as well as appreciable size reduction of 66 %.The radiation characteristics were simulated.
Keywords:
Microstrip, Fractal slots, ADS, DGS
Contrast Improvement of Blurred Multispectral Remote Sensing Satellite Images using SVD-DCT and Contrast Limited AHE
Preeti Singh Rajpoot, Amit Chouksey
Abstract:
In this paper we proposed a methodology for satellite images. The proposed calculation has the limit enhance contrast also it has the limit keep up mean brightness of given data image. In the proposed method information image is rotted into two repeat sub-gatherings using Discrete Cosine Transform (DCT) and after that it uses the Singular Value Decomposition. We examine that the states of workmanship calculations have the ability to redesign contrast of given satellite image however these methods are not prepared to ensure the mean wonder in the readied image. The test outcomes show that the proposed calculation has the limit redesign many-sided quality of given satellite image without much impacting its mean wonder image.
Keywords:
Sub-gatherings using Discrete Cosine Transform (DCT), Contrast Limited AHE
An Efficient Data Security in Cloud Computing Using Encryption Algorithm
Roshni Agarwal
Abstract:
Cloud computing is a new era of the modern world. Reasons for development of cloud computing are different people and different purpose depends upon the demand. The improvement of the cloud technology also increases the security issues twice. So we need to solve the security issues in the cloud technology. In this paper, we have discussed about cloud computing security mechanisms and presented the comparative study of several algorithms. In future we are going to propose a new plan to solve security issues for both cloud providers and cloud users.
Keywords:
Cloud, Security, Encryption algorithms, Security issues
A Survey of Security and Privacy Challenges in Cloud Computing
Sakshi Nema
Abstract:
While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.
Keywords:
Cloud, Security, Privacy, Survey
Embedded Based Vehicle Speed Control System Using Wireless Technology
Divyansh Jain, Arun Kumar Burman, Rajesh Parasere
Abstract:
The research focus on unifying the Global Positioning system with embedded wireless system is the new approaches in intelligent vehicle control for critical remote location application using ARM. In conventional system they are designed to control the speed of vehicles in all days. The main objective of the proposed system is to operate the vehicle in safe speed at critical zones. The base station having the transmitter which is designed for Frequency Modulation (FM), the receiver part is implemented in Vehicle. The ARM processor is implemented at receiver side, which receives the critical frequency, and then it is activated in critical mode. Speed Control Driver (SCD) can be custom designed to fit into a vehicle�s dashboard, and displays information on the vehicle. Once the information is received, it automatically alerts the driver, to reduce the speed according to the time and zone. The novel system is implemented with the support of embedded processor and the simulation is achieved through Kiel, C software and results are discussed.
Keywords:
ARM Processor, GPS, Frequency Modulation, RTC, Kiel, C Software.
Abstract
An Automated System for Tumor Detection Using Details MRI Image
Priyanka Patel, Dr. Preeti Rai
Abstract:
Brain tumor in human occur when abnormal cells collect within the brain. This paper proposed an appearance based method for Tumor detection using MRI. In this appearance based method wavelet is followed by the PCA. The wavelet is embedded with the PCA (Principal Component Analysis) to overcome the limitations of PCA and improve the tumor recognition rate. DWT is applied on image to extract the important information (Detail image) and to remove the irrelevant information of the MRI. Then PCA is applied on the detail MRI image to find the uncorrelated feature vector. After extracting features from the MRI, classification is done by k-nearest neighbor (KNN). The Classification rates for the proposed feature extraction techniques are analyzed with different classifier pairs. To compare these feature extraction techniques for correct tumor recognition, an experiment is conducted on datasets which is collect from Anant hospital Jabalpur. The experimental result shows the acceptable rate for detection of tumor.
Keywords:
Wavelet; MRI; Detail MRI; Principal Component Analysis; k-nearest neighbor
Abstract:
Cloud Computing has become an important aspect in today's world as technology has grown past all the boundaries and there is a need to connect resources and users without having physical connection. The high demand for data processing and leads to high computational requirement which is usually not available at the user's end Compression algorithms reduce the redundancy in data representation thus increasing effective data density. Data compression is a very useful technique that helps in reducing the size of text data and storing the same amount of data in relatively fewer bits resulting in reducing the data storage space, resource usage or transmission capacity.
Keywords:
Compression algorithms, increasing effective data density, data storage space, resource usage or transmission capacity
Abstract:
When it comes to cloud data protection methods, no particularly new technique is required. Protecting data in the cloud can be similar to protecting data within a traditional data centre. Authentication and identity, access control, encryption, secure deletion, integrity checking, and data masking are all data protection methods that have applicability in cloud computing. This paper will briefly review few methods and will note anything that is particularly unique to when these are deployed in a cloud.
Keywords:
Protecting data, control, encryption, secure deletion, integrity checking, and data
An Appearance Based Method for Emotion Detection from Face Image
Shashi Bala Yadav, Preeti Rai
Abstract:
Humans can use vision to identify objects quickly and accurately through their Emotion. Computer vision trying to emulate human Expression from Digital Image Inputs. In this paper an appearance based method is proposed for emotion detection using face image. In this appearance method DWT (Discrete Wavelet Transform) and PCA (Principle Component Analysis) is applied for feature extraction and SVM (support vector machine) is used for emotion classification. The experiments are conducted on a well-known face image datasets (FERET and Indian Face dataset) and achieved acceptable classification rate.
Keywords:
Image Pre-processing, Enhancement, Segmentation, Classification, Feature Extraction