VOLUME 6, ISSUE 4, APRIL 2017
Collaborative Approach based Restaurant Recommender System using Naive Bayes
Prof N G Bhojne, Sagar Deore, Rushikesh Jagtap, Gaurav Jain, Chirag Kalal
ATM Fraud Detection using Hidden Markov Model Study of Hidden Markov Model and its Application
Shrutanjay Kulkarni, Sanket Murkute, Prateek Nangare, Sameer Metkar, Prof. R S Mote
A Review on Design and Implementation of Compensated Frame Prediction & Reconstruction
Neha, Ms. Amrita Chaudhary
A Review on Implementation of Generating a Path Backup for Handling Faults in MANETs
Neelam Rani, Ms. Amrita Chaudhary
Health Prediction and Medical Diagnosis using Naive Bayes
Himdeep Bohra, Amol Arora, Piyush Gaikwad, Rushabh Bhand, Manisha R Patil
Analyzing the Performance of Interacting Spherical Tank System using Internal Model Controller (IMC) and Metaheurstic Algorithm
K. Krishnapriya, M. Rathina Devi, U. Roshini, Dr. A. Jayachitra
Braille Printer
Omkar Mulik, Kewal Gulve, Siddhesh Kathe, Prof. Nagmani K.
Review on Different Encryption Models for Data Security
Mr. K. S. Satpute, Mr. M. J. Pande
Reliblen TCP based Communication in Mobile Ad hoc Network (MANET)
Ankit Kumar Agrawal, Prof. Damodar Tiwari
Hi-Tech Bike Security using GPS and GSM
Sameer Mulla, Manish Kushwaha, Sujit Waje, Ranjana Gupta
Privacy Algorithms to Improve the Secure Framework for Cloud Computing Environment
Anshu Chaturvedi, D. N. Goswami, Rakesh Prasad Sarang
Face Detection and Face Recognition Using Raspberry Pi
Shrutika V. Deshmukh, Prof Dr. U. A. Kshirsagar
Design and Analysis of Staked Multiband Microstrip Antenna
Vinay Sharma, Deepak K. Patidar
A Review on Security Issues in Vehicular Ad Hoc Network (VANET)
Manpreet Kaur, Navjot Bhullar
Efficient Localization Techniques for WSN – A Survey
Soumya Simpi, Suresh Kuri, Praveen Kalkundri
A Survey on Performance Evaluation and Optimization of a Linear System Solver in OpenFOAM on Intel MIC
Sumeet Patil, Vikas Kumar, Vinaya Sivanandan
A Survey on Leakage-Resilient KASE for Group Data Sharing with Auxiliary Input via Cloud Storage
Payal Bhagat, Amar Buchade
Design & Development of Model Based Adaptive Testing for Software Quality Assurance
Ms. Ranjana Dalwani, Prof. Makrand Samvatsar
A Novel Rule Pruning Ensemble Learning Approach to Recognize the Risk of Impaired Glucose Tolerance
K. Suganya, Dr. L. Sankari
Multi-Keyword Search Methodology for Cloud Data
Mrs. Kavya B S, Shrilakshmi P V, Sushmitha N, Yamuna S
Design Web-based Services to Enhance Telemedicine Database Management System using Integrated-Fragmentation-Clustering-Allocation
Mashette Padma, Sapkal Trupti, Khade Sushama, Priyam Aditi, Rohit Bamane
Mobile Data Gathering using Mobile-MIMO Scheme in Wireless Sensor Networks
Madhu Priya and Himani Verma
Design of Energy Efficient Protocol for Homogeneous Mobile Wireless Sensor Network
Himani Verma and Madhu Priya
Financial Markets- Investment Strategy through Predictive and Statistical Analysis using Big Data and MATLAB
Vishal Kannan
Phone Controlled Security Lock Systems
Mohan M, Vishal Kannan, M Keshav
Dynamic Routing For Flying Ad Hoc Networks
K.G. Aarthi, Dr. K. Santhi
A Novel Group Key Management Service for Sharing Data through Wireless Network that Ensures Better Security
A. Subashini
An Indoor Navigation System using Beacons
Shruti Pokale, Shaikh Abdul, Ravi Mohabe, Sourabh Jichkar, Sanjay Ghodke, Dhiraj Devkar
Avoidance of Duplication of Encrypted Big-data in Cloud Storage
Dastagir Shaikh, Pratik Sen, Zubair Inamdar
A Survey on Vision Based Approaches for Image Description
Akanksha P. Deshmukh, Dr. A. S. Ghotkar
Android and Bluetooth Based Voice Controlled Wireless Smart Home System
R Manisha, Namitha S N, Nethravathy S, Nethra Priyadarshini S, Mrs Meenakshi
Literature Survey on Framework for Generating MS-MS Spectra for MS Spectrometry Data
Xylia Lamisa Nazareth, Shetty Mamatha Gopal
Literature Survey on Word Identification System for Kannada Language
Sushma and Madesha M
Android Phone Speech Recognition Sensed Voice Operated Notice Board Display
Rajat Agarwal, Sanjeev Singh, Sharad Yadav, Shubham Bansal
Learning Application for Road Safety
Ayush Badala, Devendra Solanki, Harshit Singh, Rahul Yadav, Bhavana Turorikar
Implementation and Analysis of Threshold Sensitive Stable Election Protocol
Shailie Rai, Pallavi Gupta
An Energy Efficient Protocol With Optimize Cluster Head Selection Approach
Pankaj Soni, Rajnish Kansal
Power Generation by Screw Type Turbine
Prof. Sagar P. Thombare, Prof. Vikrant D. Nichit, Prof. Priyanka K. Hire
Mining High Utility Itemsets using Up-Tree Algorithm
S. Kalaiselvi, M.Sc. M.Phil., B.Ed., S. Nithya Kalarani, M.Sc. M.Phil., B.Ed.,
Best Keyword Search on Spatial Database with Privacy of User
Ms. R. Padmapriya, MCA., M.Phil., Ms. M. Gokila Devi, MCA., M.Phil., B.Ed.,
Sentiment Analysis and Classification for Product Review in Social Networks
K. Selvaraj, M.Sc., M.Phil., M. Muthu Madhavan, M.CA., M.Phil.,
Design of optimized Proposed 9T SRAM Cell
Tejashwanth Polavarapu, Sai Krishna D, R Manikant Reddy, Sai Shreya Madabhushi
Data Intensive Computing using SoSE Architecture for Healthcare Information System
Hanumantha K N, Sunitha S
3-Dimensional QR Code Generator for Improving Storage Capacity
Naresh Eeni, Mahesh Gudivaka
Video Motion Analysis Techniques: A Comparative Study
Samidha Vengurlekar, Dipti Jadhav
Project Documentation for Android
Amra Ruman, Geetha M S, Gowthami K S, Nethravathi R
Online Voting System Using Biometric Verification
Prof. M.N. Annadate, Shreyans Sunil Gandhi, Nivita Ravi Kaniampal, Pushkar Satish Naral
Survey on Popularity Prediction of Movies
Prof D. D. Gatade Nishigandha Aware, Sonali Mehetre, Anjali Khaire, Prathmesh Gunavat
Protected Mobile Banking Using Location of Users
Aishwarya Nair, Ankita Devrukhkar, Karthika M.Vinod, Pallavi Lanke
Level II Vegetation Classification of Satellite Image Data using PCA Method
Mayur Kolhe, Yogesh Kadam, Ninad Chousalkar, Sunny Chordiya
Privacy Preservation Data Classification using Machine Learning Techniques
Rahul Bankar, Sudarshan Bute, Sujit Gadekar, Avinash Ghodake, Santosh Javheri
Protection against man-in-the-middle attack in Banking Transaction using Diffie Hellman key Exchange Algorithm
Mr. Ajeet Kumar Bhartee, Neha Pal, Abhishek Verma
A Secure Data Deduplication Scheme for Cloud Storage System
Bhos Komal, Ingale Karuna, Hattikatti Susmita, Jadhav Sachin, S.S. Mirajkar, S.R. Kakade
Comparative Analysis of Web Usage Mining
Adarsh Gupta, Mukul Atawnia, Rohan Wadhwa, Shreya Mahar, Vinita Rohilla
Comparative Analysis of Peak to Average Power Ratio Reduction in MIMO-OFDM
Apeksha Sonare, Dinesh Bhoyar
Use of MapReduce in Distributed Systems
Nishant Saxena, Shikha Sharma Sarkar
Integration between WSN (Wireless Sensor Networks) and IoT (Internet of Things)
Rashmi Raj, Amitesh Kumar
A Review on Prevention of Attack using SVM as well as Fuzzy Logic
Lokeshwar Singh, Ashish Sharma
A Survey on Comparison of ABC method with other Optimization methods by using PEGASIS Protocol
Chandan Verma, Ashish Sharma
Smart Cycle Share System
Akash Vatane, Mayur Yadav, Janardan Narvate, Dr. Mrs. S.D. Joshi
Survey Paper on Wayfarer: A Travel Recommendation System
Prof D.D.Gatade, Sanket Jain, Jay Chandarana, Richa Mahajan, Shweta More
Multidimensional Data Analytics with Big Data Management
Jitendra Singh Tomar
Dual-slot based Rectangular Microstrip Antenna for WiMAX, WCS and C-band Satellite Applications
Surjit Singh, Amrit Kaur
Relocalisation and Management for Smart System in WSN: A Review
Simran, Ms. Sonam Khattar
A Novel Approach to Provide Max Flow in WSN: A Review
Vimandeep, Ms. Sonam Khattar
The selected challenges in integration of Wireless Sensor Networks and the Internet of Things
Mohd Abdul Sattar, Mohd Anas Ali
Intelligent Tourist Recommendation System
Ikshita Mishra, Ankita Sharma, Tanuj Deria
A Robust Algorithm for Estimation and Compensation of Doppler Shift in Underwater Acoustic OFDM Communication Systems
Thanika Reddy, Vaishnavi Venkatesh, Nupur Jain
Reversed Sentiment Analysis on Product reviews
Mukta Raut, Mayura Kulkarni, Sunita Barve
Fabric Fault Detection using Image Processing Method
S. L. Bangare, N. B. Dhawas, V. S. Taware, S. K. Dighe, P. S. Bagmare
Survey on Recent Reliable Routing protocols in WSN
Abhay K. Meshram, Prof. Deepak C. Mehetre
Novel Approach to access Notices/ Assignments using NFC Technology
Prof Neha S Pharande, Vaishnavi Bulbule, Madhura Deshmukh, Saloni Jain
An Enhanced Load Balancing Mechanism in Cloud computing
Sahil Kumar, Pawan Luthra, Bohar Singh
Review on Different Techniques of Digital Watermarking
Dr. M. A. Rizvi, IfraIqbal Khan
Emotional Text to Speech Synthesis: A Review
Jayanta Kalita, Nabamita Deb
Sentiment Analysis of Online Reviews to Generate a Resourceful Database for Classification/Gradation of Products
Saieesh Koul, Rajat Sharma, Kumar Jeevak Nath Shahdeo, Gaurav Srivastava
Real Time Driver Fatigue Recognition Based on Image Processing
Bhuvaneshwari Ingale, Kanchan Wasnik, Megha Peddawad, Kavita Deore
Smart College System using IoT BLE Beacons
Ankit .S. Barapatre, Vishal .A. Shelake, Gurudev .Y. Pawar, D.R.Anekar
Survey on Congestion Elusion Topography in Wireless Sensor Network using K-Map
Ayesha Taranum, Dr. Reshma Banu
Maximized Congestion Control in TCP with Multi-Path Support in Wireless Cobweb Network
Dr. Reshma Banu, Ayesha Taranum
Android Application for Visually Impaired People “Secure Navigation Tool”
Rahul A. Shirsath, Mayur S. Gurav, Shubham Kathed, Mayuri B. Navale, Prof. R.B. Rathod
Domain Identification and Detection
S. S. Kulkarni, Sayali Deshmane, Rohan Chawla, Deep Vora, Pranjali Rautela
Big Data Service Architecture for E-portal
Vaishnavi Chillal, Nikita Dalvi, Bhagyashree Nagapure, Shamla Naidu, Prof. Rajesh Bharati
Integration of Battery and Super Capacitor for Energy Storage System
S. Hema Latha, M. Kaviya Selvi, R. Vinothini, Mr. S. Jegan
A Review Paper on Gabor Filter Algorithm for The application of Texture Segmentation
Sourabh Kumar Kashyap, Jitendra Kumar Mishra
Design and Fabrication of Epicyclic Gear Box
S. Senthil Kumar, J.S. Athreya, E. Ambrish Sharma, C. Dinesh
Performance Analysis on Different Permutation Algorithms for Security Applications
Nilesh Bhavsar, Tejas Shinde, Satish Narwade, Aarti Shinde
Recommendation Systems for E-Commerce: A Review
Priya S, Mansoor Hussain D
Internet of Things based Low-Cost Real-Time Home Automation and Smart Security System
Kishore. P, T. Veeramanikandasamy, K. Sambath and S. Veerakumar
A Novel Approach of Task Allocation based on K-means and QoS in Cloud Environment
Sahil Kumar, Pawan Luthra, Bohar Singh
A Novel Method of Speed Control for SRM using Pi Controller and Fuzzy Logic
Mrs. Sindhanai Arasi.C
A New Strategy using High Density PWM Converter in Single Phase to Three Phase Drive System for WECS Application
Mrs. J. Steffy
NIDS using Machine Learning Classifiers on UNSW-NB15 and KDDCUP99 Datasets
Dipali Gangadhar Mogal, Sheshnarayan R. Ghungrad, Bapusaheb B. Bhusare
Dynamic Clustering Technique for Energy Efficiency in Wireless Sensor Networks
Dr. M. Senthil Kumaran
Active Intelligent Speed Adaptation System
Dr. M.A. Rizvi, IfraIqbal Khan
A Survey on Resisting Blackhole Attacks on MANETS
Bhavana K S, Ravi P
A Revised Review on Opportunistic Routing Protocol
Shruti Pandey, Mr. Ashutosh Rastogi
Spoofing Detection for Fingerprint using Hog and Iris using Surf Descriptor
Lekshmy S Mohan, Joby James
Solar Powered E-Military
Karthikeyan N, Murugesan K.S, Senthil Kumar P, Pooranachandran S
Fingerprint Spoofing Detection using HOG and Local Binary Pattern
Lekshmy S Mohan, Joby James
An Efficient Algorithm for Shortest Situation Aware Emergency Navigation with WSN
R. Bharathi, Dr. C. Kalaiarasan
Severity Detection of Red lesion in Diabetic Retinopathy using GUI
Nasiya S K, Joby James
Performance Analysis of IEEE 80.11ac Wireless Local Area Networks
Ashraf Bourawy, Takwa Alokap
A Survey on TS-AOMDV Routing Protocol in MANET
Poornima S, D Khasim Vali
Case Study of 32nm, 22nm, 14nm and 10nm Semiconductor Process Technologies
Vishesh S, Manu Srinath, Dewarsh Diwakar Joshi, Etukala Neeruganti Sai Kaushik, Rajendra J Desai, Praveen Prasad M G
Smart Surveillance System using Raspberry Pi and Face Recognition
Chinmaya Kaundanya, Omkar Pathak, Akash Nalawade, Sanket Parode
Review on Performance Analysis of SNR Using BPSK
Prof. S.M. Patil, Miss. Prachi Zodpe
Wireless RAN and Frequency Hopping Schemes in Cognitive Radio Network, An Overview
Sonali Gupta, Sonam Rathore
Secure Off-line Micro-payment Solutions on FRoDo
Abhilasha H K, Paramesha K
Online Social Chat Application
Mrs. Hadke Seema, Karad Prajakta, Komal Raina, Raskar Shital, Valvi Aboli
Road Traffic Management using VANET
Sonali S. Pawar, Priyanka V. Chaudhari, Archana B. Deokate, Surendrapal P. Wankhede
Ultra Fast Electric Vehicle Battery Charger using Solar Panel/Mains Supply
Vaibhav Kalaskar, Rahul Kadam, Eaknath Idage, Prof. V.B. Raskar
Detecting Provenance Forgery and Packet Drop Attacks for Fire Detection System in Wireless Sensor Network
Daigo Menejis, Sudarshan Kete, Ranjeet Bhosale Patil
Online Banking System using Mobile-OTP with QR-code
Amandeep Choudhary, Shweta Rajak, Akshata Shinde, Siddeshwar Warkhade, Prof. F.S. Ghodichor
Signature Verification System
R. M. Samant, Mahendra Shilwant, Bhojraj Sarsambi, Mahesh Shelke
An Online Platform for Connecting NGO
Ms. Snehal Chaudhari, Ms. Sneha Dighe, Ms. Rucha Desai, Ms. Sofiya Mulla, Mrs. Yugchhaya Dhote
Survey on Penalty Charging Systems for Indian Number-plates
N G Bhojane, G G Chiddarwar, Gaurav Bhavalkar, Aditya Bhatia, Apurv Yadav, Ajinkya Thakare
A Review to the Stability of Discrete Time State-Space Filters using Saturation Non-Linearity
Shiva Jaiswal, Preeti Verma
Automatic Summarization for Hindi Text Documents using Bio-inspired Computing
Vipul Dalal, Dr. Latesh Malik
Development of Automatic Fire Detection and Rescue System using GSM
Nandhini P, Rathika M, Revathi L, Ragavi P
“Organic Terrace” Android application
Dhanusha.T, Dr. M. Kalpana Ph.D
A Survey on EEG Feature Extraction and Feature Classification methods in Brain Computer Interface
Mangala Gowri S G, Cyril Prasanna Raj P
A Review on Various Approaches of Data Sensing and Transmission in WSN
Gurleen, Naseeb Singh Dhillon
EAOR: Energy Aware Optimized Routing Protocol in Mobile Ad Hoc Networks
F. Vinod Alexander B.Tech., M.E, R. Vidhya M.Sc., M.Phil., M.E.
SRTD-Manet: Secured Routing and Terrific Data Delivery in Mobile Ad-Hoc Networks
C. Lavanya Prabha B.Tech., M.E., K. Anitha, BE., ME.,
Energy Efficient Routing and Data Gathering With Load Balanced Clustering in Wireless Sensor Networks
D. Mohana Divya B.E., M.E., B. Prasath B.E., M.E.,
Detection of Moving Cast Shadow and Removal for Video Surveillance using HSV Color Space
Komal Gogi, Dr. M. Uttarakumari
Unified data Embedding and Scrambling Advancement in Reversible Watermarking
P S Malage, A M Bedarkar
Emotion based Music Player
Shital Rewanwar, Siddhika Pawar, Swati Bade, Sujata Oak
Survey on Classification of Clustering Technique
Varchika Gupta, Ashutosh Rastogi
Welding Force Control of a Servo Gun
Ashwin Joshi, Hrishikesh Lele, Piyush Dongre, Prof S.B. Somani
Smart Bin Implementation for Smart City
Manish S Singh, Krishna Mohan Singh, Ranjeet Kumar Ranjeet, Karunesh Kumar Shukla
Product Recommendation Based on Customer Behaviour using Data Mining
Sourabh Joshi, Pranav Phate, Naman Jain, Abhijeet R. Raipurkar
Intelligent Laptop Lock-Unlock Security Based Application
P.S. Hanawate, Kalyani Kolte, Aishwarya Patil, Yashashri Kuchekar
Optimal Implementation of CHUD based on Association Matrix
Mr. Lalit N. Dhande, Prof. Dinesh D. Patil
Feature Extraction Mining Method for Intrusion Detection Systems based on Darpa 1999 Dataset
Karim Hashim Al-Saedi, Nazhat SaeedAbdulrazzaq, Dhiya Ibraheem Selman
Enhancing Traffic Management and Load Balancing in SDN
Prof. Swati Joshi, Arnab Dutta, Neeraj Chavan, Gaurav Dhus, Pratik Bharsakle
Removal of Power Line Interference in ECG Signal by Adaptive LMS, NLMS and RLS Algorithms
P. Pavani, N.V.R. Adithya, K. Hari Krishna, M.V. Siva Kumar
Web Page Ranking using Web Usage Mining
Asfiya Khatoon, Kuldeep Jaiswal
Artificial Intelligence Chatbot in Android System using Open Source Program-O
Sarthak V. Doshi, Suprabha B. Pawar, Akshay G. Shelar, Shraddha S. Kulkarni
Intelligent Bot: A Cross Platform Mobile Application using Machine Learning Techniques and Bot Framework
Aniket Patil, Bhushan Patil, Shubham Salunkhe, Suyog Naikwade, Prof. P. M. Kamde
A Review on Identity-Based Proxy Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Mangala L, Rajendra A B
Women Empowerment in 21st Era
Devangi Jain, Jigar Jain, Ankit P. Shah
Reappraisal of Clock Gating Methods in Different Conditions
Yamini Verma, Ravi Tiwari
A Survey of Black-hole Attack Mitigation and Prevention in MANET
Sonali Khandelwal, Amit Shrivashtav
Survey Paper on Authenticated Index for Verifiable Cloud Service Selection
Hemavathi H.S, Hamsaveni. M
Hardware Implementation of Robust Digital Image Watermarking using Neural Network– A Survey
Sneha Nyamagoud, Suresh Kuri, Praveen Kalkundri
Current Analysis Topic in Software Engineering
Sham Sunder, Sandeep Singh, C.K. Raina
Research on Security Issues and Protection Strategy of Computer Network
Gurdeep Singh, Gurjeet Singh, Gurwinder Singh, Er. Charanjit Kaur Raina
Secure and Privacy-Preserving Cloud Computing Presents Technical, Legal, and Administrative Challenges
Mr. Kandunuri Rama Krishna, Mr. Mohammed Yesuf Mohammed, Mr. Abdulahi Mahammed Adem, Mr. Suleyman Yimer Abebe
Design and Implementation of Telemedicine System
Andria Cardoza, Kshama K Vaidya, Kavya, Adarsh Shetty, Mrs. Ramya D Shetty, U Karthikeya Vaidya
Analytical Review on Textual Queries Semantic Search based Video Retrieval
Prof. Suvarna L. Kattimani, Miss. Saba Parveen Bougdadi
Dynamic Price Optimization for the Future of E-Commerce
Anusha.B, Sangeetha.H.S, Riyanka.R, Sushmitha.N, Chitra.R
An Efficient Approach to De-noising Mammogram Images
Jayant Rajurkar, Shirish Singnapure
An Attempt to Modernise Customer Practice with Ration Card at Ration Shop using Advanced Electronics Technology
N.S. Murtisarma, N. Pramada
Monitoring and Controlling of Drip Irrigation using IOT with Embedded Linux Board
Shweta Bopshetty, Mrunali Yadav, Rithvika Rai, Sheril Silvister, Prof. Parth Sagar
Implementation of Two Level QR Code (2LQR)
Pallavi Tekade, Anub Vamadevan, Sumit Sawant, Tushar Tamhane, Ganesh Khedkar
Queue less Shopping Cart with the Self Checkout
Durga Prashat, Kavya Shree.K, K. Shyamala, Sowmya.C, Sonia Maria D’souza
Review on Energy Efficient Routing Protocols in WSNs
Paramjit Singh, Tejinderdeep Singh
Congestion Avoidance for Multi-Hop Wireless Network
Nouhfa Juhiya S., Mrs. R. Divya
A Survey on Novel Framework for Enhancing Security of IoT in Transport Domain
Aakansha Naikare, Chaitali Barhate, Saili Dhadve, Chaitali Deokar
Abstract
Using Solar Units for Wireless Sensor Network Nodes Deployed at Remote Areas: Border Monitoring Application Example
Ali Elkateeb
DOI: 10.17148/IJARCCE.2017.6401
Abstract: Wireless Sensor Networks (WSNs) are used in variety of applications. The amount of power consumed to perform the processing and communications by each node of WSNs will be related to the amount of communications between nodes, the type of applications, the type of processing core used in each node, and the type of components and technology used in the design of each node. One of the challenges associate with using such nodes in remote area is the power supplied to nodes of the WSNs. Although, using batteries could help to support the power of the sensor nodes used for some basic applications and for short period of time. However, using WSN nodes used in some applications such as border monitoring, cannot use batteries and continuous power supply to support such nodes with their working environment. In this research, we investigate this challenge for boarder monitoring application when the WSN nodes used in remote areas where it is not possible to use continuous power supply and batteries for powering such nodes.
Keywords: Wireless Sensor Networks (WSNs), Solar Units, Remote Areas, Border Monitoring Application.
Abstract
Collaborative Approach based Restaurant Recommender System using Naive Bayes
Prof N G Bhojne, Sagar Deore, Rushikesh Jagtap, Gaurav Jain, Chirag Kalal
DOI: 10.17148/IJARCCE.2017.6402
Abstract: In the past decades, people have gained a wide range of options as the availability of information expands. To help them make decisions, recommendation systems play an important role in all kinds of aspects, e.g. news, books, movies and so on. One such aspect is Restaurant where recommendations can be provided using user attributes and past activity. A noticeable similarity is found in people belonging to same categories based on attributes like age, native place, gender, work-type, etc. Using Collaborative approach these attributes of individuals can be analysed. Also the reviews and ratings given by customers to a restaurant play an important role in selection of an ideal restaurant. In this paper, we follow an approach based on the Simple Bayesian Classifier and apply it to user-based variant of the collaborative filtering, which makes predictions based on the user similarities. The recommended results are further refined by the review/rating analysis of individual restaurants using Text Mining. The review/rating analysis of predicted restaurants help to assess the current overall user experience of those restaurants which include the quality of food served, service, cost, ambience, etc. Our approach comprises counting positive and negative term scores to determine sentiment orientation, using Sentiment Analysis (SentiWordNet library). Finally more relevant results with positive reviews can be obtained which are passed as output recommendations to customers. In future we can also add content based filtering to recommend restaurant on the basis of the characteristics like dinning arrangement, facilities, working hours, etc. of restaurants that the particular user have already visited. By making hybrid of both content and collaborative we can increase the quality of recommendation result.
Keywords: Recommender System, Collaborative filtering, Naive Bayes, SentiWordNet.
Abstract
ATM Fraud Detection using Hidden Markov Model Study of Hidden Markov Model and its Application
Shrutanjay Kulkarni, Sanket Murkute, Prateek Nangare, Sameer Metkar, Prof. R S Mote
DOI: 10.17148/IJARCCE.2017.6403
Abstract: Along with great increase in ATM Card transactions, ATM card fraud has become increasingly widespread in recent years. This paper work investigates that the efficacy of applying HMM algorithm is to prevent the ATM card fraud problems. The different techniques & classification methods, i.e. HMM is tested for their applicability in counterfeit or fake detection. The proposed system provides a useful framework to detect & prevent a fraud & to choose the best model to recognize the ATM card fraud risk. This methodology uses the different security layers before entering the pin no. This authentication mechanism is useful while transaction to secure pin no. or cash card by sending OTP to user for verification in case of ATM card transactions. The main objective of this proposed system is that instead of relying on pin no. as a security no. the multiple layers of security is enhanced & implemented by HMM algorithm. This authentication mechanism is useful while transaction to secure cash card from being cloned via skimmed device& providing more security i.e. only by judging person only by its pinno.
Keywords: Hidden Markov Model, Advanced Fraud Detection System.
Abstract
Multi-Packet Reception Method for Neighbor Discovery in Wireless Network
Chaya P
DOI: 10.17148/IJARCCE.2017.6404
Abstract: Neighbor discovery is one of the first steps in configuring and managing a wireless network. Most existing studies on neighbor discovery assume a single-packet reception model where only a single packet can be received successfully at a receiver. Neighbor discovery in MPR networks is studied that allow packets from multiple simultaneous transmitters to be received successfully at a receiver. Starting with a clique of n nodes, a simple Aloha-like algorithm is analyzed and shows that it takes time to discover all neighbors with high probability when allowing up to k simultaneous transmissions. Two adaptive neighbor discovery algorithms is designed that dynamically adjust the transmission probability for each node. The friend algorithms yield improvement over the Aloha-like scheme for a clique with n nodes and are thus order-optimal.
Keywords: Wireless Networks, Multi packet Reception, Network Management, Neighbor Discovery, Friend Algorithm.
Abstract
A Review on Design and Implementation of Compensated Frame Prediction & Reconstruction
Neha, Ms. Amrita Chaudhary
DOI: 10.17148/IJARCCE.2017.6405
Abstract: This paper presents a review detecting and extracting each frame in video sequence for detecting motion between these frames. In image and video processing, the estimation of motion plays a vital role in video compression as well as multi-frame image enhancement. Disparate as they may seem, these many applications share one common thread in all such applications, the demand is high for accurate estimates of motion requiring minimal computational cost. In this, a new technique called Motion Detection using Pixel Processing is proposed. The proposed technique attempts to decrease the computation time between the current macro-block and the macro-blocks in the reference frame, by stopping the calculation of the sum absolute different between the pixels in the current and the reference frame macro-blocks when the current uncompleted sum absolute value is greater than the previous calculated one. This will use MATLAB tool for simulation.
Keywords: Motion Estimation, background Subtraction, Block Based Method, Pixel Based Method etc.
Abstract
A Review on Implementation of Generating a Path Backup for Handling Faults in MANETs
Neelam Rani, Ms. Amrita Chaudhary
DOI: 10.17148/IJARCCE.2017.6406
Abstract: Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Due to the mobility of the nodes in the network, these nodes are self-organizing and self-configuring. Not only they act as hosts, but also they function as routers. This paper presents a review on generating a backup path after handling some faults in primary path. Therefore, an efficient route between any two nodes with minimum routing overhead and bandwidth consumption should be established. The design of these routing protocols is challenging due to the mobility and the dynamic nature of the mobile ad-hoc networks. A performance comparison will be conducted to analyse the performance of system. This will use MATLAB tool for simulation.
Keywords: MANET, AODV, Shortest Path, Reactive Routing Protocol etc.
Abstract
Health Prediction and Medical Diagnosis using Naive Bayes
Himdeep Bohra, Amol Arora, Piyush Gaikwad, Rushabh Bhand, Manisha R Patil
DOI: 10.17148/IJARCCE.2017.6407
Abstract: In today�s modern world, many of us are using computer and its applications for various works. Lot of people are using it in their daily life. Use of computer applications in medical field is also significant. It can provide user an interface for medical guidance. Platform independent system can help people to use it on their computers and will provide users an instant guidance on their health issues.System will use Na�ve Bayes algorithm and depending on the symptoms will predict the diseases and for normal person it will predict the daily hygiene diet and routines which he can follow. Users will also be able to contact the specialist doctors nearby. It will help users for easy medical treatment and diagnosis.
Keywords: Na�ve Bayes, NetBeans, Java Swing, Data mining, classification, standalone application.
Abstract
Analyzing the Performance of Interacting Spherical Tank System using Internal Model Controller (IMC) and Metaheurstic Algorithm
K. Krishnapriya, M. Rathina Devi, U. Roshini, Dr. A. Jayachitra
DOI: 10.17148/IJARCCE.2017.6408
Abstract: One of the major problems in process industries is to control the liquid level in a tank. Proportional Integral Derivative (PID) controllers are commonly used controller in the process industries. Interacting Spherical Tank Liquid Level System (ISTLLS) has the characteristics of nonlinearity due to the dynamic behavior and area of cross section of tank. The time delay reduces the performance of the system that occurs when conventional controller is used. Our project aim is to analyze the performance of the Internal Model Control (IMC) based PID Controller and Metaheurstic algorithm for an Interacting spherical tank system. Using the mathematical model of the process simulation is done and their performance is analyzed under MATLAB environment. Metaheurstic algorithm like Genetic Algorithm (GA) and Firefly Algorithm (FA) are used for obtaining the best PID tuning values. The motive of Metaheurstic algorithm is to provide the auto tuning and obtaining the best solution to reduce error. Finally the performance of conventional controller (PID), Internal Model Control (IMC)-PID controller, FA-PID algorithm and GA-PID algorithm performances are compared and analyzed.
Keywords: Nonlinear system, Genetic Algorithm Optimization, and Firefly Algorithm Optimization, IMC PID Controller.
Abstract
Braille Printer
Omkar Mulik, Kewal Gulve, Siddhesh Kathe, Prof. Nagmani K.
DOI: 10.17148/IJARCCE.2017.6409
Abstract: The objective of the paper is to describe the process of printing Braille documents using a dot matrix printer. Braille Printer proves to be of a very great help for visually impaired people. They are specialized printer that is used for printing in Braille Format. Different from a normal printer they use a special type of paper for the purpose. They are noisy and expensive.
Keywords: Braille, Braille code, Braille script, Mirror image.
Abstract
Review on Different Encryption Models for Data Security
Mr. K. S. Satpute, Mr. M. J. Pande
DOI: 10.17148/IJARCCE.2017.6410
Abstract: In day to day life, the digital communication is very useful and growing faster as a need of human resources for communication. The growth of the internet and communication networks is also a developing necessity for easy and secure user-to-user message transfer. As sharing of information is an easier task due to the communication network need to concentrate on the security of information. The different model is available to provide the security on a various parameter, this paper focuses on the Conventional Encryption i.e. Public Key-Private Key Encryption, Identity-Based Encryption (IBE), Attribute Base Encryption (ABE) that provide the security.
Keywords: Encryption, Public Key, IBE, ABE.
Abstract
Reliblen TCP based Communication in Mobile Ad hoc Network (MANET)
Ankit Kumar Agrawal, Prof. Damodar Tiwari
DOI: 10.17148/IJARCCE.2017.6411
Abstract: The function of transport layer is to maintain the end to end synchronization in between sender to receiver. In this layer of network basically only one reliable protocol is working because of its having the concept of ACK (Acknowledgement). In Mobile Ad hoc Network the structure of network is not possible to define because the mobile nodes are continuously moves in limited area. In this paper we proposed the new approach of routing based on data rate and queue control scheme applied on TCP Newreno, TCP Reno and TCP Westwood protocol in network. The proposed work maintains the reliability under MANET and minimized the network delay, overhead, congestion, collision and other drop reasons. In this research we compare the performance of proposed work with existing the proxy acknowledge mechanism provide efficient TCP communication in the MANET environment and normal AODV routing with TCP variants. In Proxy technique proxy node store the information about data drop reasons and resolve some dropped condition. Through proposed approach we increased the network reliability with the help of TCP variant technique utilized under mobile Ad hoc network. The proposed scheme performance is better than normal and proxy method.
Keywords: MANET, TCP Variants, AODV, Proxy, Proposed scheme, Queue, Congestion and collision.
Abstract
Hi-Tech Bike Security using GPS and GSM
Sameer Mulla, Manish Kushwaha, Sujit Waje, Ranjana Gupta
DOI: 10.17148/IJARCCE.2017.6412
Abstract: In this current world where technology is growing up day by day and scientific researchers are presenting new era of discoveries, the need for security is also increasing in all areas. At present, the vehicle usage is basic necessity for everyone. Simultaneously, protecting the vehicle against theft is also very important. The main goal of this paper is to protect the bike from any unauthorized access, using fast, easy-to-use, clear, reliable and economical fingerprint recognition technique. This bike security system intimates the status of the vehicle to the authoritative person (owner) using Global System for Mobile (GSM) communication technology. If the person is authorized, bike access is allowed. Else alert SMS will be sent to the owner and the engine will be immobilized. The prototype model for the security system is built on the embedded platform using PIC Microcontroller which controls all the processes and cost is also very stumpy. If the thief tries to steal the bike by breaking any of the security modules, the sensor which is present on the bike will sense the action of user and notify to microcontroller and then burglar alarm starts ringing. If the thief able to steal the bike in off state then by using GPS technology we can easily get the location of vehicle.
Keywords: Systems- Admin and Guest, Security and Protection- Access controls, Authentication, Verification, Unauthorized, Computer System Organization- General, User Interfaces- Graphical User Interfaces (GUI).
Abstract
Privacy Algorithms to Improve the Secure Framework for Cloud Computing Environment
Anshu Chaturvedi, D. N. Goswami, Rakesh Prasad Sarang
DOI: 10.17148/IJARCCE.2017.6413
Abstract: Cloud computing is a new concept of the modern world. Cloud computing combines all the services models and technologies together to deliver IT enterprise. The objective of this paper is to provide the security to end user to protect files or data from the unauthorized user. Privacy is an important issue for any technology through which unauthorized user can't access your file or data in a cloud. The main aim of this paper is to design and propose an architecture that can help to encrypt and decrypt algorithm. In this paper, we are presenting an encryption algorithm to deal with the privacy problems in cloud computing and protect the data stored in the cloud.
Keywords: Cloud computing, cloud deployment model, secure framework for cloud computing, encryption and decryption algorithm.
Abstract
Face Detection and Face Recognition Using Raspberry Pi
Shrutika V. Deshmukh, Prof Dr. U. A. Kshirsagar
DOI: 10.17148/IJARCCE.2017.6414
Abstract: Nowadays the number of thefts and identity fraud has become a serious issue. In order to avoid these thefts and identity fraud, a face recognition system must be established. The scope of this project is to develop a security access control application based on face recognition. The haar-like features is used for face detection and HOG +SVM algorithm is used for face recognition. In order to achieve a higher accuracy and effectiveness we use OpenCV libraries and python computer language. Training and identification is done in embedded device known as Raspberry Pi.
Keywords: Face detection, Face recognition, raspberry pi, security.
Abstract
Design and Analysis of Staked Multiband Microstrip Antenna
Vinay Sharma, Deepak K. Patidar
DOI: 10.17148/IJARCCE.2017.6415
Abstract: A swastik slot loaded rectangular patch stacked with H-shaped patch antenna for multiband applications is presented in this manuscript. The antenna designing is done by using HFSS simulation tool. Feeding is done by using microstrip feed line (50?). The resonating behaviour of antenna depends on notch length and width of H-shaped patch as well as on separation between two patches and dielectric constants of the substrate. Finally, by considering optimum value the return loss (S11
Keywords: Swastik Slot, H-shaped patch, Stacked Microstrip antenna, Multi-band.
Abstract
A Review on Security Issues in Vehicular Ad Hoc Network (VANET)
Manpreet Kaur, Navjot Bhullar
DOI: 10.17148/IJARCCE.2017.6416
Abstract: VANETs have been appeared as a new area of data dissemination process in which vehicles provide aid to the end users. Vehicles in vehicular ad hoc network have highly unstable (dynamic) topology which produces hindrances in timely delivery of sensitive messages Vehicular Ad-hoc networks (VANETs) are very likely to be deployed in the coming years because of the safety requirements and thus become the most relevant form of mobile ad hoc networks. Security is the main issue in VANETs because of the main use of the VANETs is for safety related application and in that case the viability of the security may cause harm to human lives. In this paper, we address the security issues of this networks and its consequences overhead in VANETs.
Keywords: vehicular ad hoc network (VANETs), cluster head (CH).
Abstract
Efficient Localization Techniques for WSN – A Survey
Soumya Simpi, Suresh Kuri, Praveen Kalkundri
DOI: 10.17148/IJARCCE.2017.6417
Abstract: WSN's are widely being used in various environments to perform various monitoring tasks, node localization is one of the most important system parameters. Determining the exact position of nodes in sensor networks is one of those vital and tedious tasks. The precise location of nodes is required to perform functions such as routing, forwarding, information broadcasting, to report the origin of tasks, support group query of sensors. To localize the nodes, we need some positions of pre-known nodes, called anchor or landmark nodes. These help in finding the locations of sensing nodes. In this paper we have discussed many different localization algorithms.
Keywords: WSN, Node Localization, DV-Hop, Anchor node.
Abstract
A Survey on Performance Evaluation and Optimization of a Linear System Solver in OpenFOAM on Intel MIC
Sumeet Patil, Vikas Kumar, Vinaya Sivanandan
DOI: 10.17148/IJARCCE.2017.6418
Abstract: OpenFOAM is a scientific library popularly used for solving and simulating Computational Fluid Dynamics (CFD) problem based on the finite volume method. A most recent hardware Intel Xeon Phi coprocessor introduced by Intel which is based on many integrated core (MIC) architecture. The MIC coprocessor has numerous cores than the traditional Intel Xeon processor but each core works at a lesser frequency and is less powerful compared to the Xeon counterpart. In this paper, we studied different hybrid and heterogeneous platform and discussed various methods for achieving good scalability across nodes on Intel MIC. We have discussed a few approaches for evaluating and optimizing the performance of message passing interface (MPI) to reduce the execution time of OpenFOAM solver on Intel MIC architecture.
Keywords: Intel MIC, Linear system solver, OpenFOAM, Optimization.
Abstract
A Survey on Leakage-Resilient KASE for Group Data Sharing with Auxiliary Input via Cloud Storage
Payal Bhagat, Amar Buchade
DOI: 10.17148/IJARCCE.2017.6419
Abstract: As cloud computing becomes popular, more and more sensitive information are being centralized into the cloud nowadays. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task because all the data which we outsource are in encrypted format. In this paper, we have discussed a few approaches for sharing data on cloud with minimal usage of key. We also discuss few data searching technique over encrypted data. While enjoying the advantage and convenience of cloud storage for data sharing, users are becoming more worried about careless leak of data in the cloud. To address this problem we studied various leakage models.
Keywords: Auxiliary Input, Key Aggregate, Leakage Resilient, Searchable.
Abstract
Design & Development of Model Based Adaptive Testing for Software Quality Assurance
Ms. Ranjana Dalwani, Prof. Makrand Samvatsar
DOI: 10.17148/IJARCCE.2017.6420
Abstract: Testing is very important phase of software development lifecycle which includes verification and validation of parameters used for evaluating the software. It aims towards creation of defect free codes with better quality and reliability. Imperfection ID and forecast alongside requires reviewing of item from client end. It directs the improvements to be driven ceaselessly in nearness of testing systems. We have experienced the thorough investigation of different research articles which covers the conceivable outcomes of applying testing through various procedures like segment testing and model based testing. Subsequent to dissecting the issue connected with early era of experiments and the parceling rationales we have recommended a few changes utilizing exhaustive strategies towards test handle enhancements and quality primitives. Analytical evaluations are showing the benefits of work and its probable improvements over other traditional approaches. This paper presents a numerical evaluation of the result on different operating situations and test case conditions. For measuring the robustness of suggested approach several scenarios are made and values are taken. From these values it is clearly identified that the suggested approach is showing better in the direction of software testing and ought to have great future ahead.
Keywords: Software Testing, Automated Testing, Partition Testing, Model Based Testing, Generic Testing, Quality Assurance.
Abstract
A Novel Rule Pruning Ensemble Learning Approach to Recognize the Risk of Impaired Glucose Tolerance
K. Suganya, Dr. L. Sankari
DOI: 10.17148/IJARCCE.2017.6421
Abstract: Objective: Prediction of diabetes in patients by reducing the size of rule set. Accurate prediction of diabetes risk level Methods: Early detection of diabetes can help the patients by providing information about treatment and clinical suggestions to prevent the particular individual from dangerous condition. Machine learning techniques are thus developed for accurate diagnosis of diabetes. Support vector machine (SVM) with ensemble learning approach is used for rule extraction. A novel rule pruning ensemble learning approach using frequent patterns is implemented to reduce the rule sets and improve the diagnostic performance by recognizing the risk of impaired glucose tolerance. Finding: Diabetes is a chronic condition causes high blood sugar levels. The diabetic patients are classified into type 1 and type 2diabetes. Diabetes mellitus of type 2 is considered to be the most critical worldwide public health problems that increase the level of sugar in the blood. Application/improvements: this approach accuracy, precession, recall, F-measure of the prediction of diabetes is increased.
Keywords: Diabetes mellitus, Ensemble Learning, Rule pruning, Impaired glucose tolerance.
Abstract
Multi-Keyword Search Methodology for Cloud Data
Mrs. Kavya B S, Shrilakshmi P V, Sushmitha N, Yamuna S
DOI: 10.17148/IJARCCE.2017.6422
Abstract: Cloud computing provides a great platform to store data and provides many services on demand. This has encouraged many data owners around the world to store the data on cloud. To maintain the privacy and delicacy of the information stored on the cloud, encryption of the data must be done. Encryption is carried out before outsourcing the data. This makes it difficult to access data by the end users. Due to large number of information on the cloud and large number of users accessing it, there is a need for an efficient search scheme. This paper provides multi-keyword ranked search over the encrypted cloud data (MRSE).It is implemented using RSA algorithm through effective key generation. We implement �coordinate matching� as an efficient searching technique to synchronize pairing of query keywords. The efficiency of the searching is improved by tree-based index structure. The secure k-NN is used to encrypt index and query vector.
Keywords: Multi-keyword ranked search, coordinate matching, trapdoor, privacy preserving, secure k-NN.
Abstract
Semantic based Image Retrieval
Miss. Ritika Hirwane
DOI: 10.17148/IJARCCE.2017.6423
Abstract: Images / Videos are major source of content on the internet and the content is increasing rapidly due to the advancement in this area. Image analysis and retrieval is one of the active research field and researchers from the last decade have proposed many efficient approaches for the same. Semantic technologies offers promising approach to image retrieval as it tries to map the low level image features to high level ontology concepts. In this paper, we have proposed various Semantic Image Retrieval method for image retrieval relevant to the user query. Semantic Image Retrieval is based on hybrid approach and uses shape, color and texture based approaches for classification purpose.
Keywords: Image Retrieval, Ontology, Semantic Image, Semantic Retrieval, semantic gap.
Abstract
Secure Mailing System
Niti Sharma
DOI: 10.17148/IJARCCE.2017.6424
Abstract: Thanks to the Internet, because of which the use of E-mails have become faster and easier. More and more companies are using it for better communication. However they are not aware about the risk they are going through .Obviously when you send a letter you know about the confidentiality but when it comes to E-mail system it involves a lots of information security risks. This paper proposes a theory on secure Emails. It develops a theory of CRYPTOGRAPHY In Cryptography ,encryption is a process by which message is encoded in such a way that only authorised user can access it .Encoded message is called Plain text and anonymously decoded message is called Cipher text and the process is called Decryption. For technical reasons, encryption scheme uses a pseudo random key, that is generated by an algorithm .This paper makes use of an algorithm called RSA algorithm for security related issues.
Keywords: RSA, Cryptography, Encryption, Decryption, Information Security.
Abstract
Design Web-based Services to Enhance Telemedicine Database Management System using Integrated-Fragmentation-Clustering-Allocation
Mashette Padma, Sapkal Trupti, Khade Sushama, Priyam Aditi, Rohit Bamane
DOI: 10.17148/IJARCCE.2017.6425
Abstract: This paper will focus on the telecommunication between the patient and doctor. Telemedicine is a exchanging of information from one location to another location via electronic communication. The main purpose of the project is to transfer medical services to the patient, rather than the transport of the patient to the medical services. The main achievement by using this application it gives services which is easy to handle, faster and less expensive. This Application used three techniques data Fragmentation, website Clustering and data distribution. It reduce the communication cost between websites during the processing of application. We propose a doctor patient interaction application where admin will add the doctors (admin must have a portal to do so). Doctors can view the appointments for the day also the doctor can prescribe the medicine through web application. Patients� details can be added using web portal and also using web application. Admin can view patient details, appointments, doctor�s details and can also upload patients test reports. It's a complete doctor patient interaction application which is being automated for the ease of use. The overall result shows that these combined three approach which improves the performance of web database systems and outperforms its correlated work. An approach to manage multimedia medical database in telemedicine system is produced.
Keywords: Telemedicine, Web Telemedicine Database Systems, Data Fragmentation, Website clustering, and Data Allocation.
Abstract
Mobile Data Gathering using Mobile-MIMO Scheme in Wireless Sensor Networks
Madhu Priya and Himani Verma
DOI: 10.17148/IJARCCE.2017.6426
Abstract: In this paper, we have proposed a three-layer framework for mobile data gathering in wireless sensor networks, which includes the sensor layer, cluster head, & mobile collector layer. Distributed load balanced clustering and dual data uploading is employed in our framework. Good scalability, long network lifetime and low data collection latency are the main objectives to be achieved. A distributed load balance clustering algorithm is proposed at the sensor layer in which the sensor self-organizes themselves into clusters. In our scheme multiple cluster heads are generated in each cluster to balance the work load and preside dual data uploading. The multiple cluster heads cooperate with a cluster to perform energy saving inter-cluster communications. At the mobile layer two cluster heads are enabled simultaneously to upload data to sencar by utilizing mobile MIMO (multiple-input and multiple-output) technique. By visiting selected and associated pairs polling points, sencar can efficiently gather data from cluster heads. To evaluate the effectiveness of proposed mobile-MIMO scheme extensive simulations are conducted.
Keywords: Wireless sensor networks (WSNs), data collection, load balancing, mobile-MIMO.
Abstract
Design of Energy Efficient Protocol for Homogeneous Mobile Wireless Sensor Network
Himani Verma and Madhu Priya
DOI: 10.17148/IJARCCE.2017.6427
Abstract: This paper brings clustering protocol which divides the whole network to variable radiuses with virtual circles where radiuses of each virtual circles and the cluster size will increase with the increase in distance from the base station. In this protocol leader node is introduced which is responsible for collecting and compressing data in each cluster from their ordinary neighbor node and sending them to head cluster. Simulation result demonstrate that proposed protocol in comparison with protocol such as LEACH , DSBCA and TCAC increases the network lifetime and makes network energy efficient across the network.
Keywords: LEACH, DSBCA, TCAC, Wireless Sensor Network, Protocols.
Abstract
Financial Markets- Investment Strategy through Predictive and Statistical Analysis using Big Data and MATLAB
Vishal Kannan
DOI: 10.17148/IJARCCE.2017.6428
Abstract: Predicting public company stock upswing and downswing is a very complex and mathematical problem. Accurate prediction of public stock performances can be beneficial to hedge funds, private investors as well as the common public interested in investment in stock.The biotechnology industry has grown rapidly in recent years, doubling in size between 1993 and 1999. 150,800 of the US jobs were generated directly by biotechnology companies, while the remaining 286,600 jobs were generated by companies supplying inputs to the industry, or by companies providing goods and services to biotechnology employees. Biotechnology is a field of science which has enormous potential in growing into a global crisis savior with recent developments ranging from easy surgical techniques and cheap pharmaceuticals to solutions in carcinogenic problems and nanotechnology. Due to the presence of solutions to such immensely concerning humanitarian problems, Biotechnology would soon serve as a backbone to human sustenance and evolution. All this would only mean that the stock prices of such a sector would boom to great heights in the near future. Due to this reason, in depth analysis of stocks of public Biotechnology companies is very important. In this paper, an elegant real-time public stock performance prediction methodology based on an aggregation of historical stock performances and organizational stock properties using a set of top US Biotechnology public companies has been introduced. In this paper, a striking co relation between the stock price and market capitalization swings of the companies with the number of employees has been reported. With these temporal stock swings, repeater operator analysis has been used to establish a statistical veracity of the novel metric of these top biotech companies. This corresponds to a result of profit, 85% of the time. A MATLAB model has also been developed to aid automate the stock performance prediction methodology reported in this. This method lends itself to broaden a large scale statistical validation as well as development of more advanced and complex models for stock performance prediction. For this analysis, exactly 9,234 data points were considered by manual data mining.
Keywords: Earnings per share, P/E Ratio, Shares Outstanding, Market Capitalization, Innovation Potential (IP).
Abstract
Phone Controlled Security Lock Systems
Mohan M, Vishal Kannan, M Keshav
DOI: 10.17148/IJARCCE.2017.6429
Abstract: Convenience of operation along with maximal functionalityin the daily realms of life is one of the greatest concerns of humanity and is an imperative need for any consumer. Innovation in the field of home security systems has provided a unique synergy of security and technology, but they lack accessibility. This paper tries to solve this problem of accessibility by introducing the concept of �minimal human intervention� while not compromising on security. In this paper, we propose a system to access the door lock using an android application and wireless Bluetooth system and elaborate on all possible scenarios that occur in the event of accessing the door lock system.
Keywords: Micro-controller, Bluetooth module, GSM module, IR receiver and blaster.
Abstract
Dynamic Routing For Flying Ad Hoc Networks
K.G. Aarthi, Dr. K. Santhi
DOI: 10.17148/IJARCCE.2017.6430
Abstract: The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles (UAVs), unattended ground sensors, and surveillance towers equipped with camera sensors. These nodes rebroadcast the received beacon until it reaches all UAVs in the network. During their propagation, when passing by the UAVs, the beacons carry the identification of the UAVs that relay them. Like this, when a UAVs receives a beacon, it is able to update the list of its neighbors and the distance, in number of hops, to the tail node. The proposed algorithm FANET is used to improve the packet delivery and reduce delay time between sources to destination for UAVs network. In this approach, a node maintains the topology information involving its one-hop neighbors. During a reconfiguration process following a path break, improve FANET protocol has the unique property to limit the control packets to a small region of network. The implementation of FANET routing protocols in UAVs networks serves to fulfil the purpose of reservation of sufficient resources along a route so as to meet the QoS requirements of a flow. The FANET can efficiently calculate the communication delay of a packet across an UAVs network is the path selection based on score value and less delay path only selected to send by a packet to reach the destination from the source. The experimental result using NS2.34 simulator and compare the end-to-end latency of a packet at the network layer are processing delay, packetization delay, transmission delay, queuing delay and the propagation delay.
Keywords: Unmanned Aerial Vehicles (UAVs), Flying Ad Hoc Networks (FANET), Optimized Link State Routing Protocol (OLSR), Traffic Aware Routing (TAR).
Abstract
A Novel Group Key Management Service for Sharing Data through Wireless Network that Ensures Better Security
A. Subashini
DOI: 10.17148/IJARCCE.2017.6431
Abstract: In the fast growing wireless network and mobile technology, we have experienced several group based services. Group key management is an essential building function for secure multicast architecture. The existing GKM-Group Key Management Services accomplish to establish the communication within a single group and it may not fit into multiple multicast group circumstances because of inadequate use of keys. The rekeying overheads are occurred in GKM approach. In the suggested approach, the Master Key Encryption based MGKM Scheme will reduce the releasing overheads from managing multiple group key. The Key Distribution Center will generate the master key and multiple slave keys will be generated depending upon the group added or removed. This will increase the data security, where the authorized user can access data and unauthorized user may not able to access the data.
Keywords: Group Key Management, Key Distribution Center, Master Key Encryption-Multiple Group Key Management, Group Controller.
Abstract
An Indoor Navigation System using Beacons
Shruti Pokale, Shaikh Abdul, Ravi Mohabe, Sourabh Jichkar, Sanjay Ghodke, Dhiraj Devkar
DOI: 10.17148/IJARCCE.2017.6432
Abstract: In today's era of technology, everything is integrated on smart phone. Every common man has a smartphone and carries it everywhere. When people travel to any new place, in order to locate and find path to their destination, they use GPS in their smart phones. But GPS is not precise for small scale and does not work inside the buildings, therefore the need of indoor positioning arises. Our motivation behind the project is to come up with indoor navigation application that can help any new visitor to locate and find path to their destination easily inside the campus. Indoor navigation application uses BLE beacon. BLE beacon allows mobile application to determine their location on a micro-local scale. Beacon and smartphone use Bluetooth Low Energy technology for communication. Since it uses Bluetooth Low Energy for communication it consume very less battery power.
Keywords: iBeacon, BLE, Smartphone, Android Application.
Abstract
Reinforcement Learning
Merin Deora, Sumit Mathur
DOI: 10.17148/IJARCCE.2017.6433
Abstract: Support learning (RL) is accepted to be relate fitting worldview for deed administration approaches in versatile manmade brainpower. Be that as it may, in its ordinary definition (clean slate) RL ought to investigate and take in everything starting with no outside help that is neither reasonable nor viable in true undertakings. In this article we tend to propose a substitution system, known as administered Reinforcement Learning (SRL), for exploiting outside data inside this sort of learning and approve it in an exceedingly divider taking after conduct. Mechanical autonomy is one among the preeminent troublesome uses of Machine Learning (ML) systems. It's portrayed by direct collaboration with a genuine world, tactile criticism and an enormous many-sided quality of the framework. As of late many ways to deal with utilize mil to specie counterfeit consciousness undertakings are uncovered. Despite we square measure still far away from a whole self-sufficient robot framework with learning parts.
Keywords: Machine Learning; Brute force Algorithm.
Abstract
Avoidance of Duplication of Encrypted Big-data in Cloud Storage
Dastagir Shaikh, Pratik Sen, Zubair Inamdar
DOI: 10.17148/IJARCCE.2017.6434
Abstract: Cloud computing deals with the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The most important and popular cloud service is data storage. The data which is of primary importance is stored in an encrypted manner over the cloud so as to maintain its privacy. Hackers can access the data and can cause serious damages to the proprietary data and for its privacy concern data is stored in encrypted form. Now in cloud storage, deduplication technique is used by cloud service provider (CSP) to maintain the space complexity, privacy and to avoid redundancy. This is done by avoiding duplication of data and maintains a single copy of that particular file. However in the management of big data using encrypted manner for deduplication files is tedious task. Traditional deduplication scheme cannot work in encrypted manner because encrypted data are saved as different contents by applying different encryption keys. Whereas the present scenario of deduplication scheme lacks privacy or it is suffered from weakness in providing privacy. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The results show the superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage.
Keywords: Cloud Computing, Data Deduplication, System key-operations, Access Control, Big Data.
Abstract
A Survey on Vision Based Approaches for Image Description
Akanksha P. Deshmukh, Dr. A. S. Ghotkar
DOI: 10.17148/IJARCCE.2017.6435
Abstract: Automatic description from image is a challenging problem that contains interest from the domain like computer vision and natural language processing. In this survey, we represents deep learning concepts for describing a recent development in Computer Vision and Natural Languange Processing. This paper contains neural network appproaches for generating description of images, process of image decription, identified dataset and technolgies used for this framework and various evaluation metrics used for calculating scores.
Keywords: Computer Vision, Natural Language Processing, Machine Learning, Neural Network, Deep learning, Image Processing, Torch.
Abstract
Android and Bluetooth Based Voice Controlled Wireless Smart Home System
R Manisha, Namitha S N, Nethravathy S, Nethra Priyadarshini S, Mrs Meenakshi
DOI: 10.17148/IJARCCE.2017.6436
Abstract: Home automation system, is designed to assist and provide support in order to fulfil the needs of elderly and disabled people at home. It has been designed for mobile phones having android platform,to automate Bluetooth interfaced microcontroller which controls home appliances like lights, fans. It presents the automated approach of controlling the devices in a household that could ease the task of using the traditional method of the switch. The most famous and efficient technology for short range wireless communication-Bluetooth,is used here to automate the system has been around for more than a decade. In this project, a voice controlled wireless smart home system has been presented for elderly and disabled people. The proposed system consists of two components namely (1)voice recognition system, (2) wireless system. Android application has been used for voice recognition system. On the other hand, Bluetooth wireless modules have been used to implement the wireless system.
Keywords: Wireless System, Android application, Wireless Smart Home System, Bluetooth, Voice Controlled.
Abstract
Literature Survey on Framework for Generating MS-MS Spectra for MS Spectrometry Data
Xylia Lamisa Nazareth, Shetty Mamatha Gopal
DOI: 10.17148/IJARCCE.2017.6437
Abstract: It is no understatement that mass spectrometry is revolutionizing biological studies. Current mass spectrometers are capable of a tremendous throughput, and can survey thousands of proteins from complex sample mixtures. The most commonly applied mass spectrometry techniques is Tandem-MS. This high-throughput technology generates huge amounts of data. Databases are critical for recording and carefully storing this data. This project considers data acquisition performed by a vendor specific software that generates a file annotating the mass spectra and look up file. The mass spectra data file is given as an input to Hadoop. Here the file is divided into smaller chunks of large file based on the requirements. These smaller chunks are then compared with look up file and required analytics is performed. And the output is given in an interactive visualization environment.
Keywords: Mass Spectrometry, Hadoop, Database, Tandem-MS, Data Acquisition.
Abstract
Literature Survey on Word Identification System for Kannada Language
Sushma and Madesha M
DOI: 10.17148/IJARCCE.2017.6438
Abstract: Translating text form one language to another by extracting text from an image will enhance the knowledge of society without any language barrier. Text extraction from image involves detecting the text from given image, finding the presence of text location, extraction, enhancement and recognition of text from the given image. Machine translation technique is used to translate source language to target language. Machine translation plays an important role in benefiting linguists, sociologists, computer scientists. The demand of translation has become more in recent years due to increase in the exchange of information between various regions using different regional languages. A large number of techniques have been proposed to address this problem. The purpose of this paper is to review and classify various text extraction algorithms and translation techniques.
Keywords: Machine Translation, Text Location, Text Enhancement, Linguists, Sociologists.
Abstract
Android Phone Speech Recognition Sensed Voice Operated Notice Board Display
Rajat Agarwal, Sanjeev Singh, Sharad Yadav, Shubham Bansal
DOI: 10.17148/IJARCCE.2017.6439
Abstract: The notice boards are important thing to publish the notices in institutes/organization or public places like hospitals, railway stations, bus stands. The Notice boards are used to display the information in an effective way to the people. Now a day Mostly notice board are of paper sticking type but to use the paper sticking type notice board is wastage lot of time, paper and labour and using the paper notices, it is not easy to update the messages instantly on the notice board. It is tried to overcome these drawbacks in this project. This project deals about an advanced Hi-Tech wireless Notice Board. This system is enhanced to display the latest information through an Android application of smart phones or tablet.
Keywords: Speech Recognition, Sensed Voice, Android Application, Smart Phones, Hi-Tech wireless Notice Board.
Abstract
Learning Application for Road Safety
Ayush Badala, Devendra Solanki, Harshit Singh, Rahul Yadav, Bhavana Turorikar
DOI: 10.17148/IJARCCE.2017.6440
Abstract: The gathering of experience is a crucial matter in driver�s education and training. Without experience, the driver has reaction times which are longer and visual search patterns are poorly developed, mental workload is high and drivers can more easily be distracted by the ongoing things on the road. The project Learning Application for Road Safety, aims at improving the driving standards of the citizens of India. The application is web based and allows users to either login in to their existing accounts or registers them if they are new users. Once they enter the application, they will select their preferred difficulty. Once through this, they will be presented with a couple of scenarios that have been already embedded in the application. They can choose between stationary or dynamic modules. The user performance will be examined at each stage and will be evaluated. The aim is to concentrate on young novice drivers, who has very little to less experience while also encouraging them to continue formal life-long learning. The user action based counter will let users know about their performance in the simulated environment. As the driver�s behavior becomes more automatic, these abilities will gradually improve and mental resources will be freed up for safety-related tasks such as hazard detection.
Keywords: Driving standards, web based, user action based counter, hazard detection.
Abstract
Implementation and Analysis of Threshold Sensitive Stable Election Protocol
Shailie Rai, Pallavi Gupta
DOI: 10.17148/IJARCCE.2017.6441
Abstract: The multitude of possible applications supported by wireless sensor networks (WSNs) has generated much interest from the research community. The recent advancement in technology have enabled the development of low cost, energy-efficient and versatile wireless sensing devices. The wireless sensor networks (WSNs) have dynamic and distributed nature which introduces very special requirements for the routing protocols that should be fulfilled. The most significant feature of a routing protocol is the energy efficiency and the extension of the network lifetime, in order to be efficient for WSNs. The Threshold Sensitive Stable Election Protocol (TSEP) is a three level heterogeneous reactive routing protocol. The energy dissipation is reduced due to energy heterogeneity and prolongs network lifetime, increases the stability period and throughput.
Keywords: Wireless sensor networks, routing protocols, threshold sensitive stable election protocol, graphical user interface, heterogeneous environment.
Abstract
An Energy Efficient Protocol With Optimize Cluster Head Selection Approach
Pankaj Soni, Rajnish Kansal
DOI: 10.17148/IJARCCE.2017.6442
Abstract: Energy consumption is the most important aspect of designing an efficient wireless sensor network. Finite electrical energy in each sensor node is defined by the capacity of the onboard battery [1]. Due to size and cost, variations of solar radiance, and constraints imposed by the rechargeable battery, solar energy harvesting modules have to face a problem in the continuous power supply. There are various protocols that have been developed for the purpose of reducing the energy consumption such as LEACH, DEEC, TEEN etc. But all of these protocols lacks somewhere to support the network in various terms such as the lifetime of the network, energy consumption by the nodes, the number of dead nodes in the network, the number of alive nodes. The proposed work is based on the firefly algorithm which is quite efficient for increasing the lifetime of the network. This performs the cluster head selection on the basis of two parameters that is the amount of residual energy of a node and the distance between the nodes. On the basis of these two parameters the fitness parameter is evaluated and then from these fitness values best fitness value is selected and its corresponding node is selected as a cluster head. The result section shows the efficiency of the proposed work.
Keywords: LEACH, MATLAB, EEP, HEED, DEEC.
Abstract
Power Generation by Screw Type Turbine
Prof. Sagar P. Thombare, Prof. Vikrant D. Nichit, Prof. Priyanka K. Hire
DOI: 10.17148/IJARCCE.2017.6443
Abstract: The intention of any hydroelectric generating station is to convert potential energy associated with the water in a watercourse passing the station into electrical energy. Landustrie has broad experience in the field of screw pumps and screw pump installations. For nearly 100 years Micro-hydro power plants has designed, manufactured, supplied, erected and maintained many types of screw pump configurations. Since the early eighties Micro-hydro power plants has had available a fully automated screw pump selection program which is used to select the optimum screw pump for a particular application. The program is based on a large number of tests, with an equal number of variables; in the Micro-hydro power plants test facility. [1]
Keywords: SCREW Type Turbine, Landustrie.
Abstract
Mining High Utility Itemsets using Up-Tree Algorithm
S. Kalaiselvi, M.Sc. M.Phil., B.Ed., S. Nithya Kalarani, M.Sc. M.Phil., B.Ed.,
DOI: 10.17148/IJARCCE.2017.6444
Abstract: Mining high utility itemset from XML database refers to the discovery of itemsets with high utility like profits. Although a number of relevant approaches have been proposed in recent years, they incur the problem of producing large number of candidate itemset for high utility itemsets. Such a large number of candidate itemset degrades the mining performance in terms of execution time and space requirement. The situation may become worse when the database contains large number of long transactions or long high utility itemsets (HUIs).The algorithm used here is UP-Growth (Utility Pattern Growth) for mining high utility itemsets with a set of techniques for pruning candidate itemsets. The information of high utility itemsets is maintained in a special data structure named UP-Tree (Utility Pattern Tree) such that the candidate itemsets can be generated efficiently with only two scans of the database. UP-Growth not only reduces the number of candidates effectively but also out performs other algorithms substantially in terms of execution time, especially when the database contains lots of long transactions. We can efficiently store and retrieve the data�s in and from the XML databases than relational database.
Keywords: Itemset Mining, UP-Growth, LP-Tree.
Abstract
Best Keyword Search on Spatial Database with Privacy of User
Ms. R. Padmapriya, MCA., M.Phil., Ms. M. Gokila Devi, MCA., M.Phil., B.Ed.,
DOI: 10.17148/IJARCCE.2017.6445
Abstract: Databases nowadays contain large volumes of data, and they are accessed by numerous users on a daily basis. The large volume of data poses challenges to both users accessing the databases and the companies or organizations managing them. Enterprises on the other hand, need to make their content visible and accessible to the users and identify which objects in their database (e.g. products) have a significant impact on the user basis and use this information for promoting their products. The original target of increasing the visibility of the available products is thus hindered by the abundance of products contained in the database. It is therefore necessary to develop data exploration techniques that will enable users to explore large databases and provide them with a wide, yet coherent overview of objects that fit their preferences. In this paper, we propose exploratory algorithms that return to the user a small number of results, which at the same time provide a wide overview of the available content. We also propose analysis techniques are KNN algorithm used for best keyword search over spatial database(location based service), AES algorithm is implemented for secure accessing of users privacy data�s i.e..location information and Hilbert Curve algorithm used for cache maintenance, caching scheme that aims to reduce query-response times and network traffic between the clients and the server by attempting to answer queries locally from the cached tuples using associated predicate descriptions. Identifying frequent search objects that are attractive to the users. This algorithm more efficient algorithm that achieves results of comparable quality, but with significantly lower processing cost.
Keywords: Keyword Search, KNN, AES, HilbertCurve.
Abstract
Sentiment Analysis and Classification for Product Review in Social Networks
K. Selvaraj, M.Sc., M.Phil., M. Muthu Madhavan, M.CA., M.Phil.,
DOI: 10.17148/IJARCCE.2017.6446
Abstract: Opinion mining has gained increasing attention and shown great practical value in recent years. Extracting opinion words and targets is a main task in opinion mining. For the purpose of customer and business perspective, the task of scanning these reviews manually is computational burden. Hence, to process reviews automatically and summarizing them in suitable form is more efficient. The distinguished problem of producing opinion summary addresses is how to determine the mood, and opinion expressed in the review with respect to a numerical feature value. This paper proposes a novel approach with a hybrid algorithm which combines Expectation Maximation (EM) algorithm. It focus on the main task of opinion mining called as opinion summarization. The extraction of product feature, technical feature value and opinion are critical for opinion summarization as they affect the performance significantly. The proposed approach consists of a software system in which mining of product feature, technical feature value and opinion is performed. The main motto of this software system is to recognize the technical feature value depending on review, which the reviews are summarized. This software is helpful for humans to understand the technical values expressed in the reviews. It represent relations between opinion words and targets, which is employed to measure the confidence of each candidate from opinion words and targets datasets. The words or targets with high confidence are kept in their respective datasets and the rest are removed as false results which are used to refine extraction rules. k-nearest neighbor classifier - used for classify the extracted data�s in a opinion mining. Experimental results Shows the effectiveness of proposed method and finally, candidates with higher confidence are extracted as opinion targets or opinion words.
Keywords: Opinion mining, opinion targets extraction, opinion words extraction, KNN.
Abstract
Design of optimized Proposed 9T SRAM Cell
Tejashwanth Polavarapu, Sai Krishna D, R Manikant Reddy, Sai Shreya Madabhushi
DOI: 10.17148/IJARCCE.2017.6447
Abstract: For SRAM power, stability, delay and area are the major concerns. And they are trade-offs to each other. But all are important and should be in acceptable range. In this paper we mainly concentrated on power and stability and we designed an optimized proposed 9T-SRAM for low power consumption by placing an NMOS transistor between supply voltage VDD and the latches formed by cross coupled inverters. This NMOS transistor is in diode connected mode and it scales down the VDD. So total power is reduced by 98%. Because power is directly proportional to square of VDD. But this effect the stability, as stability decreases when supply voltage decreases. In order to increase stability an extra PMOS transistor is placed in between access transistor and pull down transistor. This PMOS transistor separate�s the storage node and writing node of data. It also scales the bit line voltage and prevent the flipping the contents of cell at low voltages. So stability parameters like SINM, SVNM, WTI and WTV also increased by 93%, 45%, 86% and 56% respectively. In this proposed cell static power is also reduced by 55% due to stacking effect. This all values are when compared with Sub-threshold 10T SRAM cell. This proposed circuit is also tested by giving 0.3 V power supply. Cadence Virtuoso tools are used for simulation with gpdk-90nm CMOS process technology.
Keywords: SRAM, SINM, SVNM, WTI, WTV.
Abstract
Data Intensive Computing using SoSE Architecture for Healthcare Information System
Hanumantha K N, Sunitha S
DOI: 10.17148/IJARCCE.2017.6448
Abstract: The design of tending data system is a vital framework. The design implements the last technologies of cloud computing and large knowledge in parallel and distributed computing manors. The design theme is planned in SoSE-based systems engineering paradigm. The implementation of such design for tending to process is given via multiple layers of huge knowledge implementations. This study may be a primary work that provides basic insight into the future intelligent system of HIS systems.
Keywords: Healthcare Information Systems (HIS), Big Data, Cloud Computing, Healthcare Services, System Architecture, The System of Systems, Sose, Data Intensive Computing, HPC, Parallel Computing.
Abstract
3-Dimensional QR Code Generator for Improving Storage Capacity
Naresh Eeni, Mahesh Gudivaka
DOI: 10.17148/IJARCCE.2017.6449
Abstract: QR code system is presently most popular encoding system. A QR code encodes the data by standardized encoding modes for storing the data efficiently. In this paper, a new 3-dimensional QR code generator for improving storage capacity of the encoded data is proposed. This 3-dimensional QR(Quick Response) code generator encodes three different data vectors simultaneously. When compared to the traditional greyscale QR code, the proposed QR code increases the storage capacity. In this method, for each data set a greyscale QR code is generated such a way that the three greyscale QR codes are generated. By combining these three greyscale QR codes, a new 3-dimensional QR code is generated.
Keywords: QR code, Storage capacity.
Abstract
Video Motion Analysis Techniques: A Comparative Study
Samidha Vengurlekar, Dipti Jadhav
DOI: 10.17148/IJARCCE.2017.6450
Abstract: Video analysis gives the detailed information about moving objects from the video. It is of great importance in the fields of sports, collision detection on road and rail routes, speed and acceleration calculation and many other fields. In this paper, we have compared four systems based on different algorithms and applied for different domains. First technique is for basketball video analysis, where semantic event extraction, slow motion replay detection methods have been introduced. Second, fire and smoke detection algorithm has been introduced. Third, the system uses surveillance cameras to detect the traffic state. Fourth, obstacle detection based railroad collision warning system. All these systems are diverse in nature with different application areas. The comparison showed that the system for sports have gained highest accuracy of all the other systems.
Keywords: Sports video analysis, fire and smoke detection, railroad obstacle detection, traffic state detection.
Abstract
Project Documentation for Android
Amra Ruman, Geetha M S, Gowthami K S, Nethravathi R
DOI: 10.17148/IJARCCE.2017.6451
Abstract:
Keywords:
Abstract
Online Voting System Using Biometric Verification
Prof. M.N. Annadate, Shreyans Sunil Gandhi, Nivita Ravi Kaniampal, Pushkar Satish Naral
DOI: 10.17148/IJARCCE.2017.6452
Abstract: This paper describes electoral system which is completely automated, unbiased and online for easing the process of voting , increasing security and reducing the counting time The project is divided mainly into two section first one is voter registration phase of voter and second one is of actual voting phase on voting console. In voter registration phase the database of voter will be saved in repository which specifically contains voter�s unique identification number and finger prints information. Project contains biometric device which will verify the identity from the database saved in repository by the communication of Wi-Fi module i.e. esp8266 and if respective voter is identified then authorization will approve to that respective voter at the same time in other section of repository it updates the database of authorized voter to register voter is qualify to vote and to uniqueness ,also it will prevent the duplication and falsification of voter ;after getting authority from the repository voting enabling signal will send from VVB by using ZigBee to voting console for enabling voting for that particular voter , when voter votes then that vote will send to repository with the help of esp8266 and the voting console will be reset after the voting of each vote.
Keywords: Electronic Voting Machine (EVM), Biometric, Voting System, Voting analysis.
Abstract
Survey on Popularity Prediction of Movies
Prof D. D. Gatade Nishigandha Aware, Sonali Mehetre, Anjali Khaire, Prathmesh Gunavat
DOI: 10.17148/IJARCCE.2017.6453
Abstract: This paper describes electoral system which is completely automated, unbiased and online for easing the process of voting , increasing security and reducing the counting time The project is divided mainly into two section first one is voter registration phase of voter and second one is of actual voting phase on voting console. In voter registration phase the database of voter will be saved in repository which specifically contains voter�s unique identification number and finger prints information. Project contains biometric device which will verify the identity from the database saved in repository by the communication of Wi-Fi module i.e. esp8266 and if respective voter is identified then authorization will approve to that respective voter at the same time in other section of repository it updates the database of authorized voter to register voter is qualify to vote and to uniqueness ,also it will prevent the duplication and falsification of voter ;after getting authority from the repository voting enabling signal will send from VVB by using ZigBee to voting console for enabling voting for that particular voter , when voter votes then that vote will send to repository with the help of esp8266 and the voting console will be reset after the voting of each vote.
Keywords: Electronic Voting Machine (EVM), Biometric, Voting System, Voting analysis.
Abstract
A New Efficient Multi-path Routing Protocol for Mobile Ad hoc Networks
Phu Hung Le
DOI: 10.17148/IJARCCE.2017.6454
Abstract: Now a day�s online social media networking used in large amount to access information, share experiances, and express opinions. As a result large amount of data are generated in every day from social media channel such as twitter, facebook, youTube etc. From that, the concept of big data has arrived with large volume, complex and growing data. It becomes important issues in many areas like data mining, computational intelligence, the semantic web and social networking. Big data is very impotant to analyse and predict the future behaviour. Analysis of data is important for identifying the valuable data and to discover the useful knowledge and it help to improve decision making of individual user and companies. The Popularity prediction of movies before thetrical release is main challange and it require high level of artifical intelligence. For that we use the data of social media like YouTube which contains large information about people�s preferences.
Keywords: Data Mining, Big Data, Sentiments, Cosine Similarity etc.
Abstract
Protected Mobile Banking Using Location of Users
Aishwarya Nair, Ankita Devrukhkar, Karthika M.Vinod, Pallavi Lanke
DOI: 10.17148/IJARCCE.2017.6455
Abstract: A Mobile Ad hoc NETwork (MANET) is a network that does not require any presence of infrastructure. Mobile nodes can move at any time and cannot predict beforehand. Each node acts as a router to communicate with other nodes in the network. The movement of nodes is a big challenge for routing. Another challenge is interference. Interference in the network is one of the most important problems to study. Some interference-aware multi-path protocols were proposed to minimize the impact of interference. However, these protocols are not highly efficient or have a very high computational complexity (NP-hard). In this paper, we propose 1) a definition of interference, 2) a formula of interference and 3) develop a novel Link-disjoint Interference-Aware Multipath protocol (LIA-MPOLSR) for mobile ad hoc networks. LIA-MPOLSR finds paths only in polynomial time. From our simulation results, we show that LIA-MPOLSR significantly improves performance in terms of packet delivery fraction, end-to-end delay, routing overhead and normalized routing load compared to the prominent protocol Ad hoc On-demand Multipath Distance Vector (AOMDV).
Keywords: Mobile Ad Hoc Networks; Multipath; Routing Protocol; OLSR
Abstract
Level II Vegetation Classification of Satellite Image Data using PCA Method
Mayur Kolhe, Yogesh Kadam, Ninad Chousalkar, Sunny Chordiya
DOI: 10.17148/IJARCCE.2017.6456
Abstract: Satellite image processing plays an important role to extract useful information about earth. Satellite image of earth can be used in various applications such as detecting land cover, ship detection, forestry, geology, meteorology etc. The traditional surveying method which requires a huge amount of manpower, money and time can be reduced by applying various image processing methods on satellite image. Our project aims in using two levels of classifications of which the first level of classification includes classification of land, water bodies and urban areas using unsupervised approach. The level two classification aims to divide the land data into vegetated and non-vegetated regions using PCA method. The result of above classification would give us the percent ratio of land under vegetation and non-vegetation
Keywords: PCA, Classification system
Abstract
Privacy Preservation Data Classification using Machine Learning Techniques
Rahul Bankar, Sudarshan Bute, Sujit Gadekar, Avinash Ghodake, Santosh Javheri
DOI: 10.17148/IJARCCE.2017.6457
Abstract: In today's world, many people interested to share the data, but they afraid about disclose of data so they want secure their data with communication so, the concept of privacy preservation of data is come in picture. Back-propagation is the most effective algorithm for training deep learning models. To protect the private data, the proposed model having the BGV encryption scheme to encrypt the private data and perform the high-order back propagation algorithm on the encrypted data. Sigmoid function as a polynomial function with the BGV encryption. The proposed algorithm helps to improve the efficiency of back-propagation. BGV is Homomorphic encryption technique that allows computations to be carried out on cipher text. Homomorphic encryption is the conversion of data into cipher text that can be help to analyse and work with as if it were still in its original form. Furthermore, the BGV encryption scheme is used to protect the private data during the learning process. Experiments show that our proposed scheme is secure and efficient.
Keywords: Privacy, Back-propagation, the BGV encryption scheme.
Abstract
Protection against man-in-the-middle attack in Banking Transaction using Diffie Hellman key Exchange Algorithm
Mr. Ajeet Kumar Bhartee, Neha Pal, Abhishek Verma
DOI: 10.17148/IJARCCE.2017.6458
Abstract: With the development of e-commerce and cloud Computing, SSL protocol is more and more widely used in all kinds of network services. SSL protocol by providing end to end authentication, message encryption, message Integrity check and other security mechanisms protects the security of the communication process.In recent years, due to the development of cloud computing, the connection security between the client and the cloud is also an extremely important issue.SSL have three protocols under it: Handshake Protocol; Record Protocol; and Alert Protocol. Handshake protocol is used to establish the secure connection between the client and the server using the cipher suites and other parameters that both have agreed upon. Record Protocol is used to encrypt the data that is to be sent through the network using the key that have been established during the handshake protocol. Alert protocol is used to send the custom messages to other whenever they detect any intrusion in the system.The goal of our proposed system is to create secure channels over insecure networks using Diffie Hellman key exchange algorithm.
Keywords: MITM, SSL, Cryptography, Security, Diffie-Hellmen-Key-Exchange Algorithm, Authorization, Attack.
Abstract
Efficient Information Retrieval System for Cloud Environments
Jyothi T
DOI: 10.17148/IJARCCE.2017.6459
Abstract: Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. The most important aspect in the cloud environment is maintaining privacy and efficiency. In this paper an efficient information retrieval query (EIRQ) scheme to reduce the querying overhead in the cloud is presented. In EIRQ, queries are classified into multiple ranks, where a higher ranked query can retrieve a higher percentage of matched files. A user can retrieve files on demand by choosing queries of different ranks. The rank shows the percentage of files that will be returned to the user.
Keywords: Cloud computing, cost efficiency, differential query services, privacy.
Abstract
A Secure Data Deduplication Scheme for Cloud Storage System
Bhos Komal, Ingale Karuna, Hattikatti Susmita, Jadhav Sachin, S.S. Mirajkar, S.R. Kakade
DOI: 10.17148/IJARCCE.2017.6460
Abstract: Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. There is only one copy for each file stored in cloud even if such a file is owned by the number of users. As a result, system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. It is Aim to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable system. We propose new distributed systems with higher reliability in which the data chunks are distributed across multiple cloud servers. The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous systems. Security analysis demonstrates that our systems are secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement the proposed systems and demonstrate that the incurred overhead is very limited in realistic environments.
Keywords: Cloud storage; deduplication; delaydedupe; replica.
Abstract
Comparative Analysis of Web Usage Mining
Adarsh Gupta, Mukul Atawnia, Rohan Wadhwa, Shreya Mahar, Vinita Rohilla
DOI: 10.17148/IJARCCE.2017.6461
Abstract: The World-Wide Web provides every internet citizen with access to a lot of information, but it is becoming increasingly difficult to identify those pieces of information that are relevant to the user. Research in areas of web mining tries to address this problem of web data by applying techniques from data mining on it. The web mining tools are generally used for scanning the HTML documents and other medias, the results are provided for the web engines. It can provide content to web engines to provide productive results in order of relevance. In this paper, we will briefly introduce concepts of web mining and then we will give overview of FP-growth and Apriori algorithm which are important usage mining algorithm and provide their comparison.
Keywords: Web Mining, FP Growth, Apriori.
Abstract
Comparative Analysis of Peak to Average Power Ratio Reduction in MIMO-OFDM
Apeksha Sonare, Dinesh Bhoyar
DOI: 10.17148/IJARCCE.2017.6462
Abstract: Multiple input multiple output (MIMO) technique, one of the multicarrier communication systems has become promising characteristics. MIMO with orthogonal frequency division multiplexing (OFDM) constitutes the MIMO-OFDM. This MIMO-OFDM systems faces the problem of non-constant large peaks results in peak-to-average power ratio which is major drawback of multicarrier systems due to which there is reduction in spectral efficiency and increased in system complexity. This paper presents analysis and comparison two PAPR reduction techniques. Selection mapping (SLM) for different route numbers which is one of efficient technique to reduce PAPR when the number of subcarriers is large. Simulation shows that PAPR problem reduces as route number increases. Partial transmit sequence (PTS) technique presents low complexity by applying new phase sequence, Simulation results shows PAPR reduction by PTS method.
Keywords: MIMO (Multiple input multiple output), OFDM (Orthogonal frequency division multiplexing), PAPR (Peak to average power ratio), SLM (Selection mapping), PTS (Partial transmit sequence).
Abstract
Use of MapReduce in Distributed Systems
Nishant Saxena, Shikha Sharma Sarkar
DOI: 10.17148/IJARCCE.2017.6463
Abstract: MapReduce is a programming model or software framework which is associated with the implementation of generating large data sets and their processing to a broad variety of real world task. Programmers computes in terms of a map and a reduce function. There are various programs written in the style that automatically functions parallel and are executed on large clusters of commodity computers. MapReduce jobs are executed on commodity computers every day, processing a total in petabytes of data per day.
Keywords: Big data, Data science, Map Reduce and Distributed Systems.
Abstract
Integration between WSN (Wireless Sensor Networks) and IoT (Internet of Things)
Rashmi Raj, Amitesh Kumar
DOI: 10.17148/IJARCCE.2017.6464
Abstract: Wireless sensor networks (WSNs) are increasingly leasing in impact in our day to day lives. They are experiencing a wide range of applications in various fields, including health maintenance, served and enhanced-living scenarios, industrial and production monitoring, control networks, and many other topics. In future, WSNs are expected to be incorporated into the �Internet of Things�, Where sensor nodes join the Internet dynamically, and use it to catch together and take out their tasks. However, when WSNs Suit a part of the Internet, we must carefully investigate and analyze the security of involved with this integration. In this paper, we evaluate different approaches to incorporate WSNs into the Internet and outline a set of challenges.
Keywords: Web; Internet of Things; Net; Security.
Abstract
A Review on Prevention of Attack using SVM as well as Fuzzy Logic
Lokeshwar Singh, Ashish Sharma
DOI: 10.17148/IJARCCE.2017.6465
Abstract: Wireless Sensor Networks are modernizing the way; the people interact with the physical world. They comprise of small sensor nodes which have many capabilities such as sensing, monitoring, computation and wireless communications. They are deployed in large amounts to collect data from the environment, perform local processing and communicate their results. In this work, we investigate the Gray Hole Attack and its variants, which is very simple to implement but difficult to detect. In Gray Hole attack the malicious node works as a normal node but refuses to forward certain selected packets and simply drop them .Due to this nature, the Gray Hole attack is very harmful for mission critical applications and can damage the whole network communication, making the network useless .So, in proposed work utilization of two AI methods will be done i.e. SVM and fuzzy logic, in which comparison of both methods will be done in mitigation of gray hole attack in WSN network in MATLAB 2010a environment within required area.
Keywords: WSN, SVM, OLSR, Gray hole, Fuzzy sets.
Abstract
A Survey on Comparison of ABC method with other Optimization methods by using PEGASIS Protocol
Chandan Verma, Ashish Sharma
DOI: 10.17148/IJARCCE.2017.6466
Abstract: Routing is the major challenge for sensor networks. It presents the trade- off between efficiency as well as responsiveness. There are various protocols existing in this category. In this work, we analyse Power Efficient Gathering in Sensor Information System (PEGASIS) hierarchical protocol for routing with the protocols on the basis of total energy consumed, sensors lifetime and provides a comparison with traditional methods. The optimization method used in this proposed work is ABC (Artificial Bee Colony) optimization method. Utilization of PEGASS is done because PEGASIS is a redirecting method, so allows good routing. This method employs some sort of greedy approach beginning from the actual furthermost node and each of the sensor nodes form some sort of string just like composition. Performance of whole simulation is being done using various metrics like Number of alive nodes, Data Packets received at base station and Energy consumption.
Keywords: WSN, PEGASIS, ABC, Sensor nodes.
Abstract
Smart Cycle Share System
Akash Vatane, Mayur Yadav, Janardan Narvate, Dr. Mrs. S.D. Joshi
DOI: 10.17148/IJARCCE.2017.6467
Abstract: This project aims to present microcontroller based security to the bicycle and made the habit to people to use the bicycle as a mode of transportation. Many people in India tried to find out the problems for reducing traffic congestion and pollution, but the easiest way to reduce that problems is to use bicycle in our daily use. Whenever the transportation is not good it makes burden to health and health may make a burden on economy. �Smart Cycle Share System� project makes people to take the cycle from one station as their transport vehicle and submit the cycle to the station which is nearer to their destination address.
Keywords: GSM, RFID Reader, GPS, DC MOTOR.
Abstract
Survey Paper on Wayfarer: A Travel Recommendation System
Prof D.D.Gatade, Sanket Jain, Jay Chandarana, Richa Mahajan, Shweta More
DOI: 10.17148/IJARCCE.2017.6468
Abstract: In tourism recommendation system, a number of users and items are very large. But traditional recommendation system uses partial information for identifying similar characteristics of users. Collaborative filtering is a primary approach of any recommendation system. We are using the SentiWordNet algorithm for giving ratings to search destinations. Social networking sites act as an interactive platform for today's generation. So a lot can be extracted from social networking sites for recommendations. In the considered system, semantic positive and negative values are being calculated from SentiWordNet. Logged user can apply different filters to search destination. Captions will be extracted through social networking site and upon that text mining will be performed and trending spots will be provided to the customer through a web portal. Real-time data from Instagram is being accessed and process through spring boot. We have created APIs using RESTful web services for a web-based application.
Keywords: Representation State Transfer, Application Programming Interface.
Abstract
Multidimensional Data Analytics with Big Data Management
Jitendra Singh Tomar
DOI: 10.17148/IJARCCE.2017.6469
Abstract: Size is the first, and at times, the only dimension that leaps out when referring to big data. The rapid evolution and adoption of big data by industry has leapfrogged the discourse to popular outlets, forcing the academic press to catch up. This paper provides an overview on issues and achievements in the field of analytics over big data. The paper�s primary focus is on the analytic methods used for big data. The study explores the views on analytics over big multidimensional data as well, by highlighting open problems and actual research trends. The current study explores several novel research directions in big data which plays a leading role in next-generation Data Warehousing and OLAP research.
Keywords: Big Data, Multidimensional Data, Analytics of Big Data, Data Warehousing, Repository, Database Management, OLAP.
Abstract
Dual-slot based Rectangular Microstrip Antenna for WiMAX, WCS and C-band Satellite Applications
Surjit Singh, Amrit Kaur
DOI: 10.17148/IJARCCE.2017.6470
Abstract: A dual-band rectangular microstrip antenna (RMSA) with two slots for wireless applications such as WiMAX (2.3 GHz), WCS (Wireless Communications Service- 2.305-2.32 GHz) and C-band (4.6480-4.8170 GHz) satellite applications is presented. The graphs for return loss, 3D radiation pattern and VSWR are obtained using Ansoft HFSS 13.0. The obtained results are satisfactory.
Keywords: Dual-band RMSA, WiMAX, WCS, C-band.
Abstract
Relocalisation and Management for Smart System in WSN: A Review
Simran, Ms. Sonam Khattar
DOI: 10.17148/IJARCCE.2017.6471
Abstract: This work provides a review on relocalization of nodes in network in wireless sensor network. It provides a review on management of smart nodes network that will help to relocate it or by the use of controller. A routing protocol designed for WSN should have the ability of adapting to different applications and different network conditions it uses the concept of dynamic reconfiguration routing protocol that achieves the need of various applications and also various network conditions. As the result, it can be widely used in a military application for battlefield surveillance wireless sensor network has been an area of active research with many civilian application, fire detection, where it is difficult for humans to reach and once they are deployed, they work on their own and serve the data for which they are deployed In disaster control. The main objective of this work is to design mobility based network relocalization system in WSN. Localization is one of the most important applications for wireless sensor networks since the locations of the sensor nodes are critical to both network operations and most application level tasks.
Keywords: WSN System, Routing protocol, Dynamic Reconfiguration System, Localization, Mobility Management.
Abstract
A Novel Approach to Provide Max Flow in WSN: A Review
Vimandeep, Ms. Sonam Khattar
DOI: 10.17148/IJARCCE.2017.6472
Abstract: The main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes. The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. The key issue in WSN is that these networks suffer from the packet overhead, which is the root cause of more energy consumption and degrade the QoS in sensor networks. We further present a meta�heuristic Wireless Sensor Networks Tabu Search (WSN-TS) algorithm to address the NP�completeness of the channel assignment problem. The main aim is to provide extra energy to nodes that helps to provide maximize flow rate at the sink. The energy constraint ensures the amount of recharged energy for each node is larger than its consumed energy.
Keywords: WSN System, Routings in WSN, Tabu Search, QoS in WSN etc.
Abstract
The selected challenges in integration of Wireless Sensor Networks and the Internet of Things
Mohd Abdul Sattar, Mohd Anas Ali
DOI: 10.17148/IJARCCE.2017.6473
Abstract: Wireless sensor networks (WSNs) are increasingly gaining impact in our day to day lives. They are finding a wide range of applications in various domains, including health-care, assisted and enhanced-living scenarios, industrial and production monitoring, control networks, and many other fields. In future, WSNs are expected to be integrated into the �Internet of Things�, where sensor nodes join the Internet dynamically, and use it to collaborate and accomplish their tasks. However, when WSNs become a part of the Internet, we must carefully investigate and analyze the issues involved with this integration. In this paper, we evaluate different approaches to integrate WSNs into the Internet and outline a set of challenges, which we target to address in the near future.
Keywords: WSN, Internet of Things, Sensors, Monitoring.
Abstract
Intelligent Tourist Recommendation System
Ikshita Mishra, Ankita Sharma, Tanuj Deria
DOI: 10.17148/IJARCCE.2017.6474
Abstract: This paper introduces a recommendation system which recommends the tourist location to the users, based on their own input preference stated. Input preference is in terms of point of interest, climate, age and budget. This recommendation system uses a dynamic database for recommending the users. Database is created out of survey conducted. Survey is taken from the diverse travelers where they fill their previous tourist trip point of interest, budget, cuisine, climate etc. By matching the user input preference against the survey data stored in database, the output location is recommended.
Keywords: Intelligent Tourist Recommendation System, Database, User Input Preference, Survey Data.
Abstract
A Robust Algorithm for Estimation and Compensation of Doppler Shift in Underwater Acoustic OFDM Communication Systems
Thanika Reddy, Vaishnavi Venkatesh, Nupur Jain
DOI: 10.17148/IJARCCE.2017.6475
Abstract: Underwater acoustic communication has currently become a popular field of research. Underwater Acoustic Channels (UACs) are characterized by severe effects like multipath propagation, Doppler shift and scaling, inter-symbol interference (ISI), frequency dependent attenuation and ocean noise. This paper addresses Doppler shift, in the presence of ocean noise and attenuation while using OFDM to transmit data. Frequency dependent attenuation, ocean noise and Doppler Effect have been simulated, on MATLAB (v2015a), to represent the UAC. At the receiver, a method to estimate and compensate this Doppler Effect has been developed. It uses two banks of parallel self-correlators for coarse followed by fine estimation and compensation. This method enables online receiver operation for multicarrier underwater acoustic communication. The same is verified on a Zynq board (ZC702).
Keywords: Underwater acoustic channels, Orthogonal Frequency Division Multiplexing (OFDM), Doppler shift and scaling, Estimation and Compensation
Abstract
Reversed Sentiment Analysis on Product reviews
Mukta Raut, Mayura Kulkarni, Sunita Barve
DOI: 10.17148/IJARCCE.2017.6476
Abstract: The Web has rapidly changed the way of gathering opinions about certain assets from word-of-mouth to browsing online feedbacks. In doing so, one has to go through a huge amount of opiniated data available on internet and analyze it to get the user reviews about a particular product or service. It becomes rather tedious for a human to manually go through each and every review in order to evaluate the product, as the volume of such data available online is huge and scattered across different sources such as websites, blogs, twitter, etc. The need for an automated system to analyze such data and generate reliable results is one of the root causes of upsurge in research on sentiment analysis and opinion mining. In this paper we propose a system which evaluates any product or service based on sentiment analysis of the online reviews. We use a dual sentiment analysis method to classify reviews into three classes- positive, negative and neutral. Classifier used is Na�ve Bayes classifier.
Keywords: Natural language processing, Machine Learning, Sentiment Analysis, Opinion Mining.
Abstract
Fabric Fault Detection using Image Processing Method
S. L. Bangare, N. B. Dhawas, V. S. Taware, S. K. Dighe, P. S. Bagmare
DOI: 10.17148/IJARCCE.2017.6477
Abstract: Quality control is an important feature in textile industry. In textile industry, fabric pre-processing is important to maintain quality of fabric. In modern world most of the fabric pre-processing is still carried out manually using human visual inspection. This process is costly, time consuming and needs more labour work. Therefore, automated fabric inspection is required to identify fault present in the fabric. The main objective of this project is to create real time automated fabric fault detection system which will reduce industrial cost by 15-16%. Proposed system will find out fault using the technique of segmentation.
Keywords: Gaussian Blur, Segmentation, Thresholding, HSV, Fabric fault.
Abstract
Survey on Recent Reliable Routing protocols in WSN
Abhay K. Meshram, Prof. Deepak C. Mehetre
DOI: 10.17148/IJARCCE.2017.6478
Abstract: In wireless sensor network (WSN) technology has offered the accessibility of small as well as low-cost sensor nodes with capability of sensing different types of physical and environmental conditions, data processing, and wireless communication. Various types of sensing capabilities results in large amount of application domain. Moreover, the characteristics of wireless sensor networks need more effective techniques for data forwarding along with processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. For managing the routes in the network and to ensure reliable multi-hop interaction under these conditions routing protocols in wireless sensor networks are responsible. This paper, studies the different types of recent routing protocols in Wireless Sensor Network and compare their strengths and limitations.
Keywords: Wireless sensor networks, routing protocols, energy efficient, multi hop, data forwarding.
Abstract
Novel Approach to access Notices/ Assignments using NFC Technology
Prof Neha S Pharande, Vaishnavi Bulbule, Madhura Deshmukh, Saloni Jain
DOI: 10.17148/IJARCCE.2017.6479
Abstract: Smart posters are a promising new use case for NFC-enabled mobile devices. A secure smart poster system consisting of three parts: an administrative web interface for managing posters, a backend server for storing and serving data, as well as an Android application for end-users. This project enforces and integrity of smart poster data as well as authentication/authorization of administrators and end-users, thus ensuring that only authorized users can access the content. This project is useful for secure sharing of college assignments. First the NFC Smart Poster is designed by admin. NFC tag contains information; the tag can be embedded into the object. For example, the poster is created for first year student and it contains information about assignment. The object can be placed to notice board. When the first year student touch his android mobile phone to tag, it will connect to server. After that authentication server will check the details of student and also check whether the student is first year student. If yes, then it will share that assignment information with student. We present S-SPAN - a secure smart poster system consisting of three parts: an administrative web interface for managing posters, a backend server for storing and serving data, as well as an Android application for end-users. S-SPAN enforces confidentiality and integrity of smart poster data as well as authentication/authorization of administrators and end-users, thus ensuring that only authorized users can access the content.
Keywords: Near field communication, secured smart poster authentication using NFC.
Abstract
An Enhanced Load Balancing Mechanism in Cloud computing
Sahil Kumar, Pawan Luthra, Bohar Singh
DOI: 10.17148/IJARCCE.2017.6480
Abstract: Cloud computing is the means of accessing a shared pool of configurable computing resources (including hardware, software, networks, servers, storage applications and services) that can be rapidly provided, used and released with minimal effort on the part of users or service providers. But it has some of the main concerns like load management and fault tolerance. In this paper we have put forward a load balancing approach in cloud computing. Load balancing is helped to distribute the workload across multiple nodes to ensure that no single node is overloaded. It helps in proper utilization of resources .It also improves the performance of the system.
Keywords: Cloudlets; Clusters; Data Center Broker; Data Center; Virtual Machine.
Abstract
Review on Different Techniques of Digital Watermarking
Dr. M. A. Rizvi, IfraIqbal Khan
DOI: 10.17148/IJARCCE.2017.6481
Abstract: Digital Watermarking is the process in which message can be sent to a desired personnel or organization without being hacked or distorted. Malware attacks are zero in digitally watermarked signals. This watermarking can be applied to still images, audio signals and video files. The main idea behind the digital watermarking is to provide data security; the host image is used as a carrier signal which carries the embedded signal that is known as watermarked image. An owner identification key is used which recognizes the sender and the recipient to which the message has to be sent is known as key, without it the message cannot be decrypted. Steganography and cryptography are the two other processes which provide data security. Steganography is the origin of digital watermarking that is securing data by embedding it into other media and then sending it to the desired destination to confirm secure transmission.
Keywords: Digital Watermarking, LSB, DCT, robustness.
Abstract
Emotional Text to Speech Synthesis: A Review
Jayanta Kalita, Nabamita Deb
DOI: 10.17148/IJARCCE.2017.6482
Abstract: Several attempts have been done to add emotional effects to synthesized speech and several prototypes and fully operational systems have been built based on different synthesis techniques. Butfor Indian languages, there is still a lack of fully operational text to speech synthesis system with emotional effects. This paper aims to give an overview of what has been done in this field for some of the Indian Languages and highlights different issues faced during the development.
Keywords: Indian Language Scripts, IPA, MaryTTS, Emotional Speech Database.
Abstract
Sentiment Analysis of Online Reviews to Generate a Resourceful Database for Classification/Gradation of Products
Saieesh Koul, Rajat Sharma, Kumar Jeevak Nath Shahdeo, Gaurav Srivastava
DOI: 10.17148/IJARCCE.2017.6483
Abstract: With the massive development of the social media content on the Internet in the bygone few years, folks now rapid their outlook on almost no matter what in discussion. Discovery the outlook sites and observing them on the web is tough task. Therefore there is a necessity for automatic opinion. Sentiment Analysis is the region of study that examines customer comment, opinions , sentiments, evaluations, attitudes, and from written language. It is one of the supreme suitable research areas in Natural Language Processing and is also extensively studied in data mining. The significance of sentiment analysis overlaps with the evolution of social media such as reviews, discussion forums, blogs, and social networks.
Keywords: Sentiment Analysis, Opinion Mining, Text Classification, Data Mining.
Abstract
Real Time Driver Fatigue Recognition Based on Image Processing
Bhuvaneshwari Ingale, Kanchan Wasnik, Megha Peddawad, Kavita Deore
DOI: 10.17148/IJARCCE.2017.6484
Abstract: Driver fatigue is the main reason of serious damages among all other road accidents. Thus, a new system is proposed with a modern approach which will detect driver fatigue by considering most of the fatigue symptoms such as eye closure, yawning, head tilting. Inattentive vehicle movement on the road under fatigue condition is also considerable for driver fatigue. The approach of this system is to detect these symptoms for the best driving condition on the road. These symptoms are monitored by using two cameras. Thus, a robust system is proposed where head tilting, facial expressions and lane departure for fatigue will be detected collectively. First step of this system is to visualize the face of the driver from one camera while another camera is used to track the road. Then face, eye and mouth (check for yawning) detections of the driver are performed. Facial detection of our method is free from any kind of wrong or bogus detection. Besides, the detection process can strongly determine the desired part of the face in spite of poor light intensity of camera and more realistic to implement. Head tilting detection makes this approach more promising. Lane departure detection in the approach gives this system an advanced level. Lane detection measures the distance of the vehicle between two lanes. Alarm system has been made which will be activated if any fault is found through these detection procedures.
Keywords: Driver fatigue, Fatigue detection, Fatigue monitoring, Head tilting, Lane departure, OpenCV.
Abstract
Smart College System using IoT BLE Beacons
Ankit .S. Barapatre, Vishal .A. Shelake, Gurudev .Y. Pawar, D.R.Anekar
DOI: 10.17148/IJARCCE.2017.6485
Abstract: The traditional systems does marking of attendance, handling lectures by paper signing pattern which disturbs the concentration of students but on research, proposedidea does task like automated marking attendance by use of BLE (Bluetooth Low Energy) Eddystone beacons and the involves usage of automated tools like Selenium which will be reducing the paper work and error like proxy, missing attendance. The system also gives the idea about many events and programs by advertising their details and providing details of examinations in the college campus on reaching the place so system alerts the students if the lecture starts and they are outside the classroom. For making better decisions and keeping eye on everyone and to save students time and reduce their disturbance in lectures. It is using �concept of proximity analysis solution using BLE 4.0Technology� which results to digitizing college activities and reduction of disturbance in concentration and also reduction in workload of staff for attendance manipulation and other activities, we can make use of this proposed technology using BLE 4.0 beacons. This system solves all the problem occurred in college indoor area. The previous system uses more hardware device for college activities like marking attendance, managing events and instructing for exam location which takes a long time for all the students to do that type of work.
Keywords: BLE4.0, Eddystone, IOT, beacon, proximityanalysis, Indoor Navigation.
Abstract
Survey on Congestion Elusion Topography in Wireless Sensor Network using K-Map
Ayesha Taranum, Dr. Reshma Banu
DOI: 10.17148/IJARCCE.2017.6486
Abstract: Wireless Sensor Network (WSN) is an ad-hoc net-work consisting of sensor nodes having limited computational power fitted with a radio transceiver. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application�s design objectives, cost, hardware, and system constraints. Main constraint of a sensor node is the limitation of its energy resource in the form of a short battery life. Battery power conservation is very important in a sensor device since battery life is usually one of the critical components in extending the life time of sensor nodes and its network. Therefore energy optimization techniques must be performed while designing a network system. Problems of how to reduce energy consumption to maximize network lifetime has been studied extensively. But most of the approaches focus on selecting the shortest or energy-efficient routing path, often change in leader nodes based on residual energy, packet size optimization to prolong network lifetime. Work has been done on congestion control and minimization of packet Percussion, however congestion Elusion in sensor network has not received serious study until recently. The paper describes a network using congestion Elusion Topography or PETopography where every wireless sensor is deterministically deployed throughout the sensing area. A congestion Elusion data retrieval strategy is proposed by forming an optimal congestion Elusion tree or PETree of sensor nodes using K-map and K-graph. Network ensures congestion free multi-hop data routing that significantly reduces packet Percussion and retransmission. As a result sink packet loss ratio and network end-to-end delay improves and maximizes energy efficiency and network lifetime.
Keywords: packet loss; packet retransmission ,wireless sensor network; sensor nodes; stationary sink; network lifetime; energy efficiency; congestion detection; congestion Elusion.
Abstract
Maximized Congestion Control in TCP with Multi-Path Support in Wireless Cobweb Network
Dr. Reshma Banu, Ayesha Taranum
DOI: 10.17148/IJARCCE.2017.6487
Abstract: Wireless Cobweb Network (WCN)[1] is a group of wireless devices that has function to transfer all data over wireless channel and it is able to self-organized, self-configure network path itself by optimize routing protocol over Layer 2 (MAC Layer). The WCN can be installed by using computer or device with interface base on IEEE 802.11 forming to the WCN. This network can provide services with any content as wiring network. In IEEE 802.11s [2] is standard for Wireless Cobweb Network (WCN) which improve the communication protocol in Layer-2 (MAC Layer), using the Hybrid technic from the advantage of ad-hoc base and tree base for routing with path in WCN. With the wireless network standard came from IEEE 802.11a/b/g/n standard which does not define to build for the WCN and is different from the wireless access network (2G/3G Cellular systems,WLAN hotspot) [1].Wireless Cobweb Network is consisted of three type of node; Cobweb Portal (CPP), Cobweb Point (CP), Cobweb Access Point (CAP) [1]. All devices came with IEEE802.11 Standard and beyond - i.e., the physical layer link base on CSMA/CA[3] and standard TCP that work well with Wire Topology but may not suitable with WCN and optimize is in required. Regarding TCP/IP Model, many researches are focused to optimize any layers from physical to application. This research would be focused on the method to optimized congestion control in TCP with Multi-Path support over wireless Cobweb network.
Keywords: TCP, Congestion control, 802.11s Wireless Cobweb network, Multi-path, Optimization.
Abstract
Android Application for Visually Impaired People “Secure Navigation Tool”
Rahul A. Shirsath, Mayur S. Gurav, Shubham Kathed, Mayuri B. Navale, Prof. R.B. Rathod
DOI: 10.17148/IJARCCE.2017.6488
Abstract: This paper describes the technologies for blind peoples using Android. It is designed to provide dynamic interaction and the ability to change to fit changed circumstances guided with the use of Audio instructions, Face detection, Locationtracker, Red zone alert, Text to Speech conversion, Image reading. Eventually, the project focused on challenging task for these people is independent navigation new spaces, buildings, environments. The environment is usually signaled and labeled with visual marks and signs which are not appropriate for blind persons. With the purpose of balancing the access to services and spaces among all persons, this work proposes an innovative navigation and information system to help the navigation of blind people within new environments e.g. shopping center, public office building.
Keywords: Visually Impaired Persons, Navigation System, GPS, Android Location,OCR, TTS
Abstract
Domain Identification and Detection
S. S. Kulkarni, Sayali Deshmane, Rohan Chawla, Deep Vora, Pranjali Rautela
DOI: 10.17148/IJARCCE.2017.6489
Abstract: In this internet era, vast amount of data is available and is generated on a continuous basis. For a variety of purposes, identifying the area to which a particular piece of text belongs is very crucial. This enables various data mining tools to better handle the text in terms of information extraction/mining. In this project we aim to provide that preliminary meta-information about a particular piece of text. In the virtual world, this automation is manifested through the evolution of efficient algorithms. Part of the process of automation in the virtual world is also dependent on enabling machines to do the tasks that humans naturally do. Domain identification is one such technique. In this paper, we plan to highlight the efficient use of "Natural Language Processing" (NLP) techniques to identify the domain of a given piece of text.
Keywords: URL, keyword matching, domain, database storage.
Abstract
Big Data Service Architecture for E-portal
Vaishnavi Chillal, Nikita Dalvi, Bhagyashree Nagapure, Shamla Naidu, Prof. Rajesh Bharati
DOI: 10.17148/IJARCCE.2017.6490
Abstract: The system is being designed in such a way that the E-banking portal is being used by the user to do the multiple transactions on the system, as the bank application works.Tha Data being collated is being stored onto Hadoop as storage as well as for Analytics using MapReduce. Huge data is being collated all the predictive results has been acquired using hadoop. In this context, the ability to apply promising state-of-the-art big data technologies to extract the maximum value from the vast amounts of the data generated is generating a lot of interest in the financial services industry. The main motivation of the system is to permit advanced trace information analysis, the unreal cloud design ought to accommodate the access to capricious sets of the trace information.
Keywords: Hadoop, MapReduce, Big Data.
Abstract
Integration of Battery and Super Capacitor for Energy Storage System
S. Hema Latha, M. Kaviya Selvi, R. Vinothini, Mr. S. Jegan
DOI: 10.17148/IJARCCE.2017.6491
Abstract: Battery based applications are often used in our day to day life. Batteries can only be supplied for the limited period of time. Often usage of batteries, will lead to the reduction in the life span of the batteries. Super-Capacitor is a new technology which has several advantages in energy storage capacity. Super capacitors are becoming increasingly popular alternatives for the conventional and traditional battery sources. Because of its flexibility, Super Capacitors can be adapted where electrochemical batteries are used. Here the Super Capacitor is interfaced with that Battery based system to deliver maximum power output required for the load, so the life of the Battery will also be extended. The interfacing of Super Capacitors with Battery based applications are done for the appropriate Battery ranges. The reduction in Battery stresses by using super capacitors are used as high power storage devices to smoothen the peak power applied to the Battery during backup time and to deliver full power during outage.
Keywords: Super capacitor; Battery source; Energy storage; High power storage.
Abstract
A Review Paper on Gabor Filter Algorithm for The application of Texture Segmentation
Sourabh Kumar Kashyap, Jitendra Kumar Mishra
DOI: 10.17148/IJARCCE.2017.6492
Abstract: In applications of image analysis and computer vision, Gabor filters have maintained their popularity in feature extraction. The reason behind this is that the resemblance between Gabor filter and receptive field of simple cells in visual cortex. Being successful in applications like face detection, iris recognition, fingerprint matching; where, Gabor feature based processes are amongst the best performers. The Gabor features can be derived by applying signal processing techniques both in time and frequency domain In this paper basically we did the comparative study about the previous existing approach of Gabor filter and their applications.
Keywords: Gabor filter, Gabor energy, image quality assessment, Gabor features.
Abstract
Analysis of CT Image Denoising Techniques
Anam Kazi, Roshni Padate
DOI: 10.17148/IJARCCE.2017.6493
Abstract: Effective technique for denoising is necessary for medical images particularly in Computed Tomography, which is a significant and most general modality in medical imaging. In this work denoising of Computed Tomography (CT) images is performed which generally gets degraded by the presence of Additive White Gaussian Noise (AWGN). This work presents three techniques to denoise CT images namely Discrete Wavelet Transform (DWT) Thresholding, Non-local (NL) means filter and wavelet thresholding and joint NL means filtering. In this report, we explore wavelet denoising of images using several thresholding techniques such as SURE Shrink, Visu Shrink, Bayes Shrink and Neigh Shrink. NL-means filter assumes that the image contains an extensive amount of redundancy and therefore it uses the concept of self-similarity in an image to denoise it. The third technique is a combination of the above two methods. Data evaluations are accomplished by using two criterions; namely, peak signal to noise ratio (PSNR) and mean square error (MSE). It is observed that NL means performs better Wavelet denoising.
Keywords: CT image denoising, AWGN, Wavelet Thresholding, NL means, PSNR, Computation time.
Abstract
Design and Fabrication of Epicyclic Gear Box
S. Senthil Kumar, J.S. Athreya, E. Ambrish Sharma, C. Dinesh
DOI: 10.17148/IJARCCE.2017.6494
Abstract: Planetary Gear Trains are extensively used for the power transmission and are the most critical component. Planetary gearboxes are used frequently to match the inertias, lower the motor speed, boost the torque, and at the same time provide a sturdy mechanical interface for pulleys, cams, drums and other mechanical components. This paper presents the advantages of planetary gear systems over other, consideration to be given while determining the reduction ratios of gear box, minimum and maximum reductions per stage of planetary gear pairs. Also the case study to determine the reduction ratio of two stage gear box is discussed. The comparison of planetary gear system over helical gears systems is done on the basis of volume, weight and torque density. An epicyclic gear train consists of three gears mounted so that the centre of one gear revolves around the centre of the other. A carrier connects the centers of the two gears and rotates to carry one gear, called the planet gear, around the other, called the sun gear. The planet and sun gears mesh so that their pitch circles roll without slip. A point on the pitch circle of the planet gear traces an epicycloid curve. In this simplified case, the sun gear is fixed and the planetary gear(s) roll around the sun gear. An epicyclic gear train can be assembled so the planet gear rolls on the inside of the pitch circle of a fixed, outer gear ring, which is called an annular gear. In this case, the curve traced by a point on the pitch circle of the planet gear is a hypocycloid. The combination of epicycle gear trains with a planet gear engaging both a sun gear and an annular gear is called a planetary gear train. In this case, the annular gear is usually fixed and the sun gear is driven.
Keywords: Epicyclic Gear Box, Planetary Gear Trains, planet gear, epicycloid curve.
Abstract
Performance Analysis on Different Permutation Algorithms for Security Applications
Nilesh Bhavsar, Tejas Shinde, Satish Narwade, Aarti Shinde
DOI: 10.17148/IJARCCE.2017.6495
Abstract: Permutation is different arrangements that can be made with a given number of things taking some or all of them at a time. The notation P(n,r) is used to denote the number of permutations of n things taken r at a time. Permutation used in the pattern analysis, Databases and data mining, simulation, accumulation of electronic communication data, Homeland security, wireless networks. Bottom-Up, Lexicography, Johnson-Trotter, Back-tracking, Heap algorithm, Brute-Force are of the most popular permutation algorithms that emerged during the past decades. Lexicography used in graph colouring. Backtracking are used in Sudoku. A performance analysis in terms of time complexity is done by implementing algorithms in different programming languages on different platforms. In cryptography, cipher text is the result of encryption performed on plain text using an algorithm called cipher which is used in client-server application.
Keywords: Permutation, Time complexity, Pseudo Random generator, Authentication, Passkey.
Abstract
Recommendation Systems for E-Commerce: A Review
Priya S, Mansoor Hussain D
DOI: 10.17148/IJARCCE.2017.6496
Abstract: Recommendation as a social process plays ansignificant role wherepeople rely on external knowledge to make decisions about an artifact of interest. Recommendation system is an intelligent system that generates a ranked list of items on which a user might be interested. Nowadays, there is a big variety of different approaches and algorithms for data filtering and recommendation giving.Recommendation techniques can be classified into three major divisions: Collaborative Filtering, Content Based and Hybrid Recommendations.This paper compares and elaborates these approaches and discusses their limitations by describing the problems suffered by recommendation techniques.
Keywords: Recommendation system, Content-Based Recommendation, collaborative filtering, coldstart, scalablility.
Abstract
Internet of Things based Low-Cost Real-Time Home Automation and Smart Security System
Kishore. P, T. Veeramanikandasamy, K. Sambath and S. Veerakumar
DOI: 10.17148/IJARCCE.2017.6497
Abstract: Many people today prefer smart devices which can be controlled remotely by the Internet rather than the manual control to improve the standard of living. The home appliances are expected to fully automatic and Internets of Things (IoT) is projected to provide dramatic improvements in smart home appliances. The internet technology is growing day by day and the internet connection is accessible everywhere in the world. The IoT is going to rule the world within a few years. This paper presents an Internet of Things based real-time home automation and security system using Arduino UNO and ESP8266 WiFi module which makes the system cost-effective and portable. It is used for controlling and monitoring home appliances (Fans, Lights, etc.) from anywhere in the globe using MQTT server. The home automation system includes an integrated temperature and humidity sensor module to control the air conditioning unit. The human motion detection is achieved by the PIR sensor for security purpose.
Keywords: Internets of Things (IoT); Home Automation; Arduino UNO; ESP8266 WiFi module; MQTT server; PIR Sensor.
Abstract
Brain Storm Optimization for Sensors’ Duty Cycle in Wireless Sensor Network
Ahmed Y Khedr
DOI: 10.17148/IJARCCE.2017.6498
Abstract: Wireless Sensor Networks (WSNs) became one of the emergent networks that are used in many real life applications. They are also used in many of the critical applications such as battle field monitoring and health care. Therefore, sensor nodes are required to survive for long time. However, such nodes suffer from low memory, limited storage, limiting sensing and communication ranges, limited energy sources, and limited processing capabilities. One of the effective methods to save the nodes� energy is the duty cycling where some of the nodes can go to sleep while others can perform the required monitored field tasks. In this paper, we propose a new algorithm that utilizes the concept of the people thinking which the Brain Storming Optimization (BSO) for sensor nodes duty cycle management. Through extensive set of experiments using homogenous and heterogeneous WSNs, BSO seems to outperform the Non-duty cycle algorithm.
Keywords: Brain Storming Optimization (BSO), Duty Cycle, energy saving, Wireless sensor networks.
Abstract
A Novel Approach of Task Allocation based on K-means and QoS in Cloud Environment
Sahil Kumar, Pawan Luthra, Bohar Singh
DOI: 10.17148/IJARCCE.2017.6499
Abstract: Cloud computing is a paradigm of distributed computing to provide the customers on-demand, utility based computing services. Cloud users aim at providing more reliable, available and updated services to their clients in turn. Since cloud computing stores the data and widely spread resources in the open environment. So the amount of data storage increases quickly. Cloud itself consists of physical nodes in the data centers of cloud providers and there are number of applications that run on cloud which a user uses on a basis of pay per use. Therefore, the system that incurs a cost for the user should function properly .So as to make the system function properly it should have the proper algorithms implemented. In this paper, a load balancing algorithm has been put forward and implemented in CloudSim toolkit andalso simulation results have been computed andanalysed.
Keywords: Cloudlets; Data Center Broker; Clusters.
Abstract
A Novel Method of Speed Control for SRM using Pi Controller and Fuzzy Logic
Mrs. Sindhanai Arasi.C
DOI: 10.17148/IJARCCE.2017.64100
Abstract: The problem of Closed loop speed control and controller design of Switched Reluctance Motor is a topic of research interest in recent years. In this paper a simple speed control scheme for switched reluctance motor using microcontroller is proposed. This scheme is based on PI control algorithm. Firstly the simulation of the proposed speed controller scheme is executed using Matlab 7.0. Secondly the performance of the machine is analyzed. Finally implementation of the proposed controller is performed using PI controller, 18F2550.
Keywords: Closed loop, Switched Reluctance Motor, Matlab 7.0., PI control algorithm.
Abstract
A New Strategy using High Density PWM Converter in Single Phase to Three Phase Drive System for WECS Application
Mrs. J. Steffy
DOI: 10.17148/IJARCCE.2017.64101
Abstract: The proposed system permits to reduce the rectifiers switching currents, the harmonics distortion at the input converter side, and improvements on the fault tolerance characteristics. Single phase to three phase drive system composed of High density PWM rectifier, a three phase inverter and PMSG. The feed-forward method can help the auxiliary active energy storage circuit working as a parallel active power filter for filtering out the low frequency ripple current from the H-bridge rectifier. The total energy loss of the proposed system may be lower than that of a conventional one. Suitable control strategy including the pulse width modulation technique is developed.
Keywords: Ac-dc-ac power converter, drive system, parallel converter.
Abstract
NIDS using Machine Learning Classifiers on UNSW-NB15 and KDDCUP99 Datasets
Dipali Gangadhar Mogal, Sheshnarayan R. Ghungrad, Bapusaheb B. Bhusare
DOI: 10.17148/IJARCCE.2017.64102
Abstract: The benchmark KDD dataset for intrusion detection system generated a decade ago has become outdated as it does not reflect modern normal behaviors and contemporary synthesized attack activities. In this paper we have used a new UNSW-NB15 data set for NIDS. Pre-processing on this datasets is done using Central Points of attribute values with apriori algorithm to select high ranked feature and remove irrelevant features which causes high false alarm rate. The evaluation of the dataset is performed using machine learning classifiers algorithm: Na�ve Bayes and Logistic Regression. The results show that the decrease in false alarm rate and detection accuracy is improved even after reducing the dataset by eliminating the features and further more reduce in the processing time.
Keywords: Central Point (CP) of attribute values, Apriori, Na�ve Bayes (NB), and Logistic Regression (LR).
Abstract
Design of Binary Band Pass Filter
Prof. Abhijit G. Kalbande
DOI: 10.17148/IJARCCE.2017.64103
Abstract: This paper deals with band pass filter which is located between up converter and modulator of uplink model for C band small satellite communication system that work digitally. The main theme of designing a digital FIR filter is to provide the better settlement solution, to improve an efficiency of the desired signal of the system and to allow adjustment of the compromise between the over shoot reduction and transition region width for practical application of the small satellite uplink system. Digital filter can be applied in speech processing applications, such as speech filtering, speech enhancement, noise reduction and automatic speech recognition among others. In this paper MATLAB Program is used to implement a band-pass FIR filter using adjustable window function based on blackmann window. The realization structure of this filter with a specific and symmetric filter coefficient is analysed and the symmetric coefficients of the filter structure are that this filter is stable, it is also linear and it has a constant group delay. And then the magnitude response and phase response of this filter are analysed and the simulation results are also described using FDA tool that is one of the Computer Aided Design tool available with MATLAB which enables design of the digital filter blocks faster and more accurate.
Keywords: uplink model, small satellite, C-band, FIR equiripple band pass digital filter, MATLAB.
Abstract
Prediction of Heart disease using Neural Network
Pramila Nagar
DOI: 10.17148/IJARCCE.2017.64104
Abstract: The coronary illness records to be the main reason for death around the world. It is troublesome for medicinal experts to foresee the heart assault as it is a mind boggling assignment that requires experience and learning. The health sector today contains hidden information that can be important in making decisions. Data mining algorithms such as J48, Na�ve Bayes, REPTREE, CART, and Bayes Net are applied in this research to predict the disease, But most conveniently we can use neural network to determine the accurate results that can predict the Heart disease.
Keywords: Heart Disease, Data Mining, Neural Network.
Abstract
Dynamic Clustering Technique for Energy Efficiency in Wireless Sensor Networks
Dr. M. Senthil Kumaran
DOI: 10.17148/IJARCCE.2017.64105
Abstract: Dynamic clustering technique is adapted with the sensor network for organizing the sensor nodes in an effective manner to form network and it spends less energy expenditure for data transmission. Effective communication is achieved by applying maximum distance method to form cluster between nodes in a wireless sensor network. This approach is essential for the workload balance among the nodes, updating new nodes in the network, increasing the network lifetime and effective resource utilization in wireless sensor network. Dynamic clustering technique is suitable for streaming of data, scalable to large size networks, partitions the sensor nodes in to reasonable sets faster and significantly speeds up the communication among nodes compared to the K-Means cluster algorithm. Simulation results show that the performance of dynamic clustering technique provides higher throughput and energy consumption.
Keywords: Cluster Head, Energy Expenditure, Scalability, Aggregation, Resource Utilization.
Abstract
Active Intelligent Speed Adaptation System
Dr. M.A. Rizvi, IfraIqbal Khan
DOI: 10.17148/IJARCCE.2017.64106
Abstract: This study focuses on the speed controlling technique which involves the transmission of speed controlling signals to the vehicle in which receiver of these signals is installed as the inappropriate speed is a significant factor in serious road accidents. Road safety authorities around the world devote considerable resources to addressing the speeding problem particularly compliance with speed limits. In the system the speed is automatically reduced to the speed specified in a particular area and also an information system is also incorporated which display information in the vehicle about the route. Microcontroller PIC16F876A which is RISC based controller it has 35 set of commands set. Has various peripheral inbuilt such as USART, TIMER, ADC, SPI and many more features.
Keywords: ISA, Microcontroller PIC16F876A, PID Loop, RF Module, USART.
Abstract
A Survey on Resisting Blackhole Attacks on MANETS
Bhavana K S, Ravi P
DOI: 10.17148/IJARCCE.2017.64107
Abstract: As the technology is advancing the communication medium is also changing. The wired medium of communication is getting transformed into wireless technology. One of the main wireless technologies used today is mobile ad-hoc networks (MANETS). One of the main issues is the security. Blackhole is one of the major attacks on the MANETS. This paper provides a survey how the blackhole attack is resisted using various protocols.
Keywords: MANETS, AODV, Malicious, Blackhole resisting mechanism.
Abstract
A Revised Review on Opportunistic Routing Protocol
Shruti Pandey, Mr. Ashutosh Rastogi
DOI: 10.17148/IJARCCE.2017.64108
Abstract: Opportunistic routing is a new archetype in routing for wireless sensor network, designate the node closest to the target node to route the data. Opportunistic routing has recently fascinated much amenity as it is considered a promising proclivity for enhancing the performance, throughput and fidelity of wireless ad hoc sensor networks. It takes prevalence of the broadcast nature of Wireless sensor network for augmentation of transmission fidelity and network throughput. In this paper, we elucidate the foundation of opportunistic routing and the different regions where it is claimed to be better performer, then we discuss some of the popular routing protocols along with their metrics and contrasting drawbacks. Finally we conclude our paper with the existing issues and their possible remedies.
Keywords: WSN, Opportunistic Routing.
Abstract
Spoofing Detection for Fingerprint using Hog and Iris using Surf Descriptor
Lekshmy S Mohan, Joby James
DOI: 10.17148/IJARCCE.2017.64109
Abstract: Now a days for security applications like identification and verification Biometric authentication systems are used. Biometric features are unique in nature, so this can be used to avoid typical problems of the system based on the use of password which can be stolen or forgotten. The research in this field is very active with local descriptors based on analysis of micro textural features in order to keep good level of security, gaining more and more popularity because of their excellent performance and flexibility. And this paper aims for accessing these descriptors for liveness detection in security systems based on various biometric traits: fingerprint, iris and face. In this work implements and evaluate two different feature extraction techniques for fingerprint and iris detection: - HOG and SURF descriptor respectively. Both the techniques were used in conjunction with a SVM classifier.
Keywords: HOG, LBP, SURF, SVM.
Abstract
Solar Powered E-Military
Karthikeyan N, Murugesan K.S, Senthil Kumar P, Pooranachandran S
DOI: 10.17148/IJARCCE.2017.64110
Abstract: Soldiers are the Army�s most important resource. Soldiers play a vital role to protect one�s country. The term soldiers include service men and women from the Army, Air force, Navy and Marines. They will always be the one responsible for taking and holding the duty in extreme weather conditions throughout the year. While providing security to the nation, they may face troubles in extreme hot/cold weather conditions. Both very cold and very hot temperatures could be dangerous to health. Excessive exposure to heat referred to as heat stress and excessive exposure to cold referred to as cold stress. In a very hot environment, the most serious concern is heat stroke. At very cold temperature, the serious concern is the risk of hypothermia or dangerous overcooling of the body. In this project we are going to design an E-Uniform which gives better protection to the soldiers who are working in extreme weather conditions. This uniform will make the soldiers to work in any kind of environment. And we are going to design a refrigerator cum oven in this project. By harnessing solar energy, this refrigerator cum oven is able to keep perishable goods and dairy cool in hot climates and warm in cold climates. It is also used to keep much needed vaccines at their appropriate temperature to avoid spoilage. The portable devices can be constructed with simple components and are perfect for areas of the developing world where electricity is unreliable or non-existent.
Keywords: Microcontroller, Solar panel, Rechargeable battery, Peltier plate.
Abstract
Fingerprint Spoofing Detection using HOG and Local Binary Pattern
Lekshmy S Mohan, Joby James
DOI: 10.17148/IJARCCE.2017.64111
Abstract: Nowadays for biometric authentication system are used for security applications like verification and identification. Fingerprint, face and iris are the various biometric traits. Since the biometric traits are unique in nature, it is possible to avoid problems like password stolen or forgotten. Biometric has the capability to distinguish between real and fake. In this for software based fingerprint liveness detection we use Local Binary Pattern (LBP) for texture classification and Histogram of Oriented Gradient (HOG) for object detection and uses Support Vector Machine (SVM) classifies for classification. Through classification it is possible to distinguish between real and fake.
Keywords: Local Binary Pattern, Histogram of oriented gradients (HOG), Support Vector Machine (SVM).
Abstract
An Efficient Algorithm for Shortest Situation Aware Emergency Navigation with WSN
R. Bharathi, Dr. C. Kalaiarasan
DOI: 10.17148/IJARCCE.2017.64112
Abstract: Large number of sensors in an Emergency navigation can serve as a safety service in emergencies. Recent studies have focused on navigation protocols to safely guide people to exits while helping them avoid hazardous areas. Recently, many applications in wireless sensor networks (WSNs) have been discussed. Navigation with WSNs is the most heated debated ones. Existing navigation algorithms are used to find safe and efficient escape paths for individuals under various environmental dynamics while ignoring possible congestion, cause the individuals rushing for the exits. Previous routing mechanisms for WSN are not well suited for building fires, especially they do not consider critical and dynamic network scenarios. The propose an efficient Shortest Situation-Aware Emergency Navigation Algorithm based ant colony path selection by treating WSNs as navigation infrastructure. It takes the hazard levels of emergencies and the evacuation capabilities of exits into an account and provides the mobile users for the safest navigation paths accordingly. We formally model the situation-aware emergency navigation problem and establish a hazard potential field in the network, which is theoretically free of local minima. It was performed by extensive simulations under WSN environments to evaluate the effectiveness and response time of our work. Simulation result shows that, with our strategy, people in emergency are evacuated by less congestion and much faster to exit is observed.
Keywords: Wireless sensor network; Emergency Saving Navigation system; Ant Colony Optimization Algorithm.
Abstract
Severity Detection of Red lesion in Diabetic Retinopathy using GUI
Nasiya S K, Joby James
DOI: 10.17148/IJARCCE.2017.64113
Abstract: In modern world, Diabetic Retinopathy (DR) is the leading cause of blindness. DR is a common reason for blindness in the age group of 20-74 years. The main reason for red lesion in working age population is micro aneurysms (MA) and hemorrhages(HE).The first clinical observable lesion indication of diabetic retinopathy are red lesions. So that the detection of red lesions are the main problem for the prescreening system. Here the proposed work gives the automatic detection of red lesion using the new set of shape features, known as dynamic shape features (DSF). DSF parameter gives shape of flooding blood in images and by using this the severity can be analyzed. Another aim of this paper is developing a MATLAB based Graphical User Interface (GUI) which helps to find out the abnormality and severity by the ophthalmologist easily and accurately.
Keywords: Fundus image, MA, HE, Graphical User Interface, Support Vector Machine.
Abstract
Performance Analysis of IEEE 80.11ac Wireless Local Area Networks
Ashraf Bourawy, Takwa Alokap
DOI: 10.17148/IJARCCE.2017.64114
Abstract: The introduction of the IEEE 802.11 standard in late 1990s sparked a whole new promising area in wireless communications, allowing computer users to have untethered access to the Internet. Recently, the IEEE 802.11ac amendment for wireless local area networks (WLANs) has been released that achieves very high throughput (VHT) to approximately 6.933 Gbps. Enhancements to the physical and MAC layers are introduced in the IEEE 802.11ac amendment. These enhancements include exploiting wider channel bandwidths, enhancing modulation and coding schemes, using explicit beamforming, and increasing spatial streams along with the breakthrough of multi-user multi-input multi-output (MU-MIMO). This paper presents a performance analysis in terms of throughput of IEEE 802.11ac. Simulation is conducted to examine different features defined in the 802.11ac amendment. We calculate the aggregate system throughput of several proposed simulation scenarios. Results show that 802.11ac system throughput increases with the enhancement of channel size, modulation schemes, and spatial streams.
Keywords: 802.11ac, modulation schemes, MU-MIMO, performance analysis, spatial streams.
Abstract
A Survey on TS-AOMDV Routing Protocol in MANET
Poornima S, D Khasim Vali
DOI: 10.17148/IJARCCE.2017.64115
Abstract: MANET (A Mobile Ad-hoc Network) is a network where nodes are not connected that is it is a wireless network where nodes are configured dynamically. Wireless network means there will be issues with network security that is an intruder get into the network and does flooding attack, black hole attack and a gray hole attack. To provide network security a better approach called TS-AOMDV-Trust-based Secured Ad-hoc On-demand Multipath Distance Vector is used than Ad hoc On-Demand Multipath Distance Vector (AOMDV) Routing protocol. TS-AOMDV uses Intrusion detection system and a trust-based routing factor so this provides a better security and a routing performance.
Keywords: Mobile Ad-hoc Network, TS-AOMDV, AOMDV, Intrusion detection system.
Abstract
Case Study of 32nm, 22nm, 14nm and 10nm Semiconductor Process Technologies
Vishesh S, Manu Srinath, Dewarsh Diwakar Joshi, Etukala Neeruganti Sai Kaushik, Rajendra J Desai, Praveen Prasad M G
DOI: 10.17148/IJARCCE.2017.64116
Abstract: Moore�s law or Moore�s prediction is an observation that, the number of transistors in a dense integrated circuit doubles approximately every two years. [1] The period is now often quoted as 18 months by Intel executive David House. This study will examine the development and evolution of semiconductor electronics. Since semiconductors increasingly comprise a larger portion of electronic components and systems, either used directly by customers or incorporated into end use items purchased by consumers, the impact of �Moore�s law� has led users and consumers to come to expect a continuous stream of faster, better and cheaper high-technology products. This paper attempts to describe the origin, nature and implications of �Moore�s law� in a comprehensive manner. Intel�s 32nm, 22nm, 14nm and 10nm technology is examined and studied in detail. Also a retrospective approach to dealing with or coping up with Moore�s law is explained. Finally we draw limelight on how Moore�s observation transformed computing from a rare and expensive venture into a pervasive and affordable necessity. From internet, to social media and modern data analytics, which are innovations to stem directly from Moore and his findings.
Keywords: Moore�s law, semiconductor technologies, faster, better and cheaper high-technology products, Intel�s 32nm, 22nm, 14nm and 10nm technology.
Abstract
Smart Surveillance System using Raspberry Pi and Face Recognition
Chinmaya Kaundanya, Omkar Pathak, Akash Nalawade, Sanket Parode
DOI: 10.17148/IJARCCE.2017.64117
Abstract: This paper proposes the Smart Surveillance System using Raspberry Pi and Image Processing. This system will serve as smart security module for monitoring. Traditional surveillance systems only records the activities based on motion, but this system serves the purpose of facial recognition so as to reduce the error caused due to motion detection .Raspberry Pi camera module is used to capture images once the motion is detected by the PIR Sensor. This system will monitor when motion detected and checks for the faces in the image captured and with the help of face recognition alerts if the face detected is not stored in the database.
Keywords: Computer Vision, Local Binary Pattern, PIR Sensor, Raspberry Pi-Camera, Raspberry Pi.
Abstract
Review on Performance Analysis of SNR Using BPSK
Prof. S.M. Patil, Miss. Prachi Zodpe
DOI: 10.17148/IJARCCE.2017.64118
Abstract: Relay technologies have been studied & considered in the standardization process of the next generation of MIMO system, such as LTE 8, Advance LTE 10, IEEE 802.16e, IEEE 802.16m. Presently two wireless technologies, WiMax & LTE both based on IEEE standard, are two rival technologies nevertheless, are technically very similar but deployment is differ. This introduces and compare features of two advance technologies in physical layer, and also gives performance analysis of different modulation schemes (BPSK, QPSK, and 16-QAM) in WiMAX & LTE technologies.
Keywords: BPSK, QPSK, 16-QAM, LTE 8, Advance LTE 10, IEEE 802.16e, IEEE 802.16m.
Abstract
Wireless RAN and Frequency Hopping Schemes in Cognitive Radio Network, An Overview
Sonali Gupta, Sonam Rathore
DOI: 10.17148/IJARCCE.2017.64119
Abstract: The IEEE 802.22 WRAN is the first standard which is based on the cognitive radio network. WRAN basically uses unused or white spaces within the television bands between 54 and 862 MHz, especially within rural areas where usage may be lower. One of the major challenges for WRAN is how to efficiently schedule both the spectrum sensing and data transmission simultaneously. This problem for signal transmission is termed as coexistence. In this paper we give an overview of WRAN and discuss some techniques to reduce coexistence.
Keywords: Cognitive radio Network (CRN), white space, spectrum sensing, coexistence.
Abstract
Secure Off-line Micro-payment Solutions on FRoDo
Abhilasha H K, Paramesha K
DOI: 10.17148/IJARCCE.2017.64120
Abstract: Online shopping Payment scheme is one of the popular in recent years. Attackers often aim at stealing such customer data by targeting the Point of Sale (for short, PoS) system, i.e. the point at which a retailer first acquires customer data. In many scenarios malware that can steal card data as soon as they are read by the device has flourished. As such, in cases where customer and vendor are persistently or intermittently disconnected from the network, no secure on-line payment is possible. This paper describes FRoDO, a secure off-line micro-payment solution that is resilient to PoS data breaches. FRoDO is the first solution that can provide secure fully off-line payments while being resilient to all currently known PoS breaches.
Keywords: Fraud resilience, secure payments, PoS system, Architecture.
Abstract
Online Social Chat Application
Mrs. Hadke Seema, Karad Prajakta, Komal Raina, Raskar Shital, Valvi Aboli
DOI: 10.17148/IJARCCE.2017.64121
Abstract: Social media could be a nice medium for exploring developments that matter most to a broad audience and it's the suggests that of interactions among individuals during which they produce, share, and exchange info and ideas in virtual communities and networks. Social media technologies defy many alternative forms together with magazines, net forums, weblogs, social blogs, small blogging, wiki, social network, podcasts, pictures or photos, video, rating and social bookmarking. Social networking websites like facebook, gmail even have giant numbers of users wherever individuals chat with one another and share their views and issues over varied things. Social chat through mobile is additionally effective means for communication.
Keywords: Online social network; Misinformation; Disinformation; Cognitive Psychology.
Abstract
Road Traffic Management using VANET
Sonali S. Pawar, Priyanka V. Chaudhari, Archana B. Deokate, Surendrapal P. Wankhede
DOI: 10.17148/IJARCCE.2017.64122
Abstract: With the constant increase in transport traffic, existing traffic management solutions have become inefficient. Urbanization has diode to a rise in traffic jams and accidents in major cities. So as to accommodate the growing wants of transport systems today, there's a desire for an Intelligent Transport System. Vehicular Adhoc Network (VANET) may be a growing technology that assists in Intelligent Transport Systems. Vanets modify communication between vehicles similarly as fastened infrastructure known as Road side Units (RSU). We tend to propose a distributed, cooperative traffic congestion detection and dissemination system that uses VANET. Every of the driver�s sensible phones is equipped with a Traffic App that is capable of location detection through Geographic Position primarily based System (GPS). This info is relayed to a foreign server that detects traffic jam. Once congestion is confirmed the congestion info is disseminated to the tip user phone through rsus. The Mobile App transmits the placement info at periodic intervals. Victimization the latitude, line of longitude and the current time, the placement of every vehicle is traced. Victimization location info, the space moved by the vehicle at a given time is monitored. If the value is below a set threshold, congestion is suspected during a specific space. If several vehicles within the same space send similar messages, traffic jam is confirmed. Once traffic jam is confirmed, the vehicles approaching the engorged space area unit well-read about the traffic through show boards that area unit available within the nearest rsus (traffic signals). The congestion info is additionally created accessible through the Mobile App gift in vehicles approaching the engorged space. The approaching vehicles might take diversion and alleviate congestion.
Keywords: Provenance Model, Security, Sensor Networks, Bloom Filter Packet generation, Fault location.
Abstract
Ultra Fast Electric Vehicle Battery Charger using Solar Panel/Mains Supply
Vaibhav Kalaskar, Rahul Kadam, Eaknath Idage, Prof. V.B. Raskar
DOI: 10.17148/IJARCCE.2017.64123
Abstract: In this system we are charging the battery by using our design. Since battery packs take DC power, the supply power needs to be processed by the battery charger. The manner in which power is delivered to the batteries is crucial to battery life; hence a charger also includes a control circuit for battery power management. From main supply we used step down transformer to get desired output voltage for our battery charger. We needed rectifier to convert AC to DC .Since we needed pure form of DC we design filter and obtained pure form of DC voltage .To get regulated voltage we uses regulator IC with a current controller .This system use to recharge our rechargeable battery. Similarly from solar panel we have used the solar tracker, polarity corrector and stabilizing capacitor. Concatenate it with regulator and supply coming from regulator given to the current controller to adjust the current according to increase speed to charge the battery after that auto cutoff is used for switching of the circuit from ON state to OFF state depending on battery status And this current supply is given to rechargeable battery and the charging status battery is displayed on LCD display.
Keywords: PIC16F877A Microcontroller, Relay, Solar panel, Rechargeable battery, LM317 voltage regulator.
Abstract
Detecting Provenance Forgery and Packet Drop Attacks for Fire Detection System in Wireless Sensor Network
Daigo Menejis, Sudarshan Kete, Ranjeet Bhosale Patil
DOI: 10.17148/IJARCCE.2017.64124
Abstract: Packet loss is possible in wireless sensor network. So that the intruders can be easily capture the data. Identifying the dropping packet and misbehaving activities are the most necessary measures for secure transmission in it. Without a certificate a node cannot participate in the transmission. In our project, we present Sensors which can senses the Data From environment and data will send by using Arduino to other computer .In that system we provide an efficient and secure approach for transmitting provenance information about sensor data. Our approach uses packet Bloom filters that are encoded as sensor data travels via intermediate sensor nodes, and are decoded and verified at the Receiver. Thus Information Gain by Receiver will Trace out the data Path through which it comes .We can used this system in Fire detection Application .In this Application Whatever the fire detection Sensors For EX., Flame Sensors, Smoke Sensors senses the Information from Environment .this Information need to transfer at Authorized persons or else want to send at Server. In between this transmission attacker can attack any of packets of Data or Data may loss due to collusion occurred. In this situation we proposed the this model to trace the Attackers and find out the data path from where the data is going .
Keywords: Provenance Model, Security, Sensor Networks, Bloom Filter Packet generation, Fault location.
Abstract
Online Banking System using Mobile-OTP with QR-code
Amandeep Choudhary, Shweta Rajak, Akshata Shinde, Siddeshwar Warkhade, Prof. F.S. Ghodichor
DOI: 10.17148/IJARCCE.2017.64125
Abstract: As a high-speed internet infrastructure is being developed and people are information zed, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking method such as Phishing or Pharming beyond snatching a user�s ID and Password. Several techniques have been developed that help to protect transactions performed over insecure channel. Like which provides security by generating passwords. However, this technique is not that much beneficial for user. To provide more secure channel, we are implementing security on Banking transaction by using OTP with QR code. QR Code is a 2D matrix Bar Code where the information is stored both in horizontal and vertical dimensions. QR Code can hold a larger amount of data in a compact space and can perform error-correction at higher speed and has faster response time. QR Code is versatile and is used in various fields such as online banking, managing attendance, help visually impaired people, security applications such as different kinds of cryptography and steganography as well. Secure authentication, is achieved using data-hiding algorithms with the embedded QR Code.
Keywords: Privacy Preserving, QR Code, Encryption, OTP Generation, Integrity.
Abstract
Signature Verification System
R. M. Samant, Mahendra Shilwant, Bhojraj Sarsambi, Mahesh Shelke
DOI: 10.17148/IJARCCE.2017.64126
Abstract: Offline signature confirmation is one of most difficult region of personal authentication. Numerous strategies have been acquainted in literature to find whether a given signature is certifiable or phony. Signature is a vital part of distinguishing proof and validation of a object in this digitized world. Offline signature verification is a critical and troublesome procedure of signature verification. Signature is required by a specific client as a sender to presented himself in computerized world and also to make an impression on an element arranged at an alternate remote areas. With the goal that message can't be access to or modified by anybody other then whom the message to be intended to be accessed . As signature can be utilized as validation means by many organizations and association to secure there classified information and also for safeguard there protection because of which is less measure of information is accessible which is not adequate for acknowledgment of pattern utilized as a part of signature. This paper portrays a novel approach for signature verification and recognizable proof in a offline environment. In proposed work, A Signature picture is taken through some kind of sources like camera caught picture of signature or might be a transcribed signature then it will be actualized by executing picture through various techniques like signature acquisition, signature input ,signature thinning, boundary detection, feature extraction, signature recognition.
Keywords: Signature verification, Authentication, Signature acquisition, Feature extraction, Thinning.
Abstract
An Online Platform for Connecting NGO
Ms. Snehal Chaudhari, Ms. Sneha Dighe, Ms. Rucha Desai, Ms. Sofiya Mulla, Mrs. Yugchhaya Dhote
DOI: 10.17148/IJARCCE.2017.64127
Abstract: Paper proposes an online web portal which will be looked up as a hub for non-Government organizations and their needs. The main advantage of developing such portal is to remove the tedious task of NGO�s of finding donors or finding volunteers in order to fulfill the requirement of NGO. Another advantage is that we can easily find NGO or volunteer over the Internet rather than a manual system such as by giving an advertisement in Newspaper etc. It will be also beneficial for not only to the volunteers or donors, but also for the NGOs and conducting other social events such as Blood donation campaign, Awareness Workshops etc. It will also give ease in maintaining records. Overall it will prove as an essential tool for the smooth functioning of the NGOs and a great assistance for its users.
Keywords: Common platform for NGO, Online NGO organizing, Small-scale industry, Crowdfunding.
Abstract
Survey on Penalty Charging Systems for Indian Number-plates
N G Bhojane, G G Chiddarwar, Gaurav Bhavalkar, Aditya Bhatia, Apurv Yadav, Ajinkya Thakare
DOI: 10.17148/IJARCCE.2017.64128
Abstract: In our daily life, we come across many problems caused due to traffic rule violation by some people. M-governance is a sub-domain of e-governance. Electronic services are made available to people because of m-governance, with help of mobile phones. Mobile services are cheap and easily accessible in rural areas of India as well. This project strives towards improving the traffic discipline by proposing advanced technological solutions. In this project, we are designing a system which will help the traffic police officer to penalize the vehicle driver for violation of traffic rules. The penalty will be imposed to the vehicle owner if the PUC of the vehicle has expired, if the car is standing on a zebra crossing, for illegal signal crossing, crossing the prescribed speed limit and parking the car in no parking zone. The traffic police officer will have to click a picture of the vehicle number plate and select the type of complaint. A complaint will be registered against the vehicle owner and he/she will be informed about the complaint details via SMS service. The vehicle owner will be required to pay his/her fines within a stipulated time period.
Keywords: Android Based, m-governance, ANPR, Penalty System, Traffic Police, Law Enforcement.
Abstract
A Review to the Stability of Discrete Time State-Space Filters using Saturation Non-Linearity
Shiva Jaiswal, Preeti Verma
DOI: 10.17148/IJARCCE.2017.64129
Abstract: The problem concerning the elimination of overflow oscillation in fixed-point state-space digital filter employing saturation arithmetic is considered by various researchers. In this paper a review is done to the finite procedure proposed by T. Oba [1] to test the stability of digital filters under saturation arithmetic.
Keywords: Digital filters, finite wordlength, asymptotic stability, nonlinear system.
Abstract
Automatic Summarization for Hindi Text Documents using Bio-inspired Computing
Vipul Dalal, Dr. Latesh Malik
DOI: 10.17148/IJARCCE.2017.64130
Abstract: Summarizing given text document automatically using an intelligent algorithm is an important text mining task in the field of data mining. In this paper, we are proposing an approach for automatic summarization of Hindi text documents using bio-inspired computing. The paper mainly focuses on pre-processing, machine learning and summary evaluation phases of summarization process. Employability of bio-inspired computing for summarization gives a new dimension especially in the domain of Hindi text summarization.
Keywords: text summarization, summary evaluation, machine learning, bio-inspired computing.
Abstract
Development of Automatic Fire Detection and Rescue System using GSM
Nandhini P, Rathika M, Revathi L, Ragavi P
DOI: 10.17148/IJARCCE.2017.64131
Abstract: Train transport is major role in everyone�s life. So people�s expectation will be a safe journey. Train journey will be more comfortable than any other means of transport, so most of the people prefer travelling through train. Fire accidents may occur at unexpected situations in train and so handling those problems will be difficult to humans. In this paper, we introduce automatic fire detection and rescue system based on Wireless Sensor Network (WSN) technology to monitor continuously and observe the range of temperature and gas from respective sensors. When the fire is detected, the information gathering unit reports the monitored information to the surveillance centre via Global System for Mobile Communication (GSM) and necessary help is arrived at the site. Using an automatic sprinkler system the fire can be put off automatically and the emergency window will be opened automatically with the help of the motor interfaced with the module. Therefore, passengers can be rescued through this window.
Keywords: WSNs, GSM, Automatic Sprinkler System, Temperature Sensor, Gas sensor.
Abstract
“Organic Terrace” Android application
Dhanusha.T, Dr. M. Kalpana Ph.D
DOI: 10.17148/IJARCCE.2017.64132
Abstract: This paper expresses the idea about the creation of �Organic Terrace� an android application. Nowadays many people have smartphones, which everyone use in a resourceful manner. In recent trends, people upgrade their knowledge by mobile enabled information services. The growing trends in Agricultural Automation has led to a tremendous development of software and applications to foster and enhance the information dissemination. �OrganicTerrace�app helps the users by giving them information regarding organic methodof cultivation of vegetables and green leafy vegetables in their terrace. In this modern world, most of the people live in urban and sub urban areas. This application will be very much helpful for the people who are interested in cultivating their own vegetable cropsbut don�t have a proper land area to cultivate them. The specialty of this application is to guide the users in the cultivation of crops in their terracewithout the use of any kind of synthetic (inorganic) fertilizers, pesticides, etc.
Keywords: Organic farming, Rooftop or terrace gardening, Android application, Expert advice, notifications.
Abstract
A Survey on EEG Feature Extraction and Feature Classification methods in Brain Computer Interface
Mangala Gowri S G, Cyril Prasanna Raj P
DOI: 10.17148/IJARCCE.2017.64133
Abstract: Brain Computer Interfacing (BCI) is a methodology which provides a way for communication from outside world using brain signals. It detects the specific patterns in a person�s ongoing brain activity which relates to the person�s intention to initiate control. The BCI system translates these patterns into meaningful control command. To develop BCI system, various signal processing algorithms are proposed. Electroencephalogram (EEG) signals are used to extract the features and further it is classified. A survey of different Classification algorithms is used in EEG-based BCI research and to identify their critical properties. This paper is organized with a recent methodology of feature extraction and feature Classification algorithms. It also aims at addressing the methods and technology adapted in each phase of the EEG signal processing. It also highlights the pros and cons by reviewing literatures, books and other related documents. This survey helps in designing a suitable algorithm for the development and implementation of further classification of signals.
Keywords: Brain Computer Interface (BCI), Electroencephalogram (EEG), Feature Extraction, Wavelet Transform, Feature Classification.
Abstract
A Review on Various Approaches of Data Sensing and Transmission in WSN
Gurleen, Naseeb Singh Dhillon
DOI: 10.17148/IJARCCE.2017.64134
Abstract: WSN is the branch of sensing information from the external environment where human interaction is not possible. In WSN various approaches have been used for data sensing and transmission over the networks. In this paper various researches has been reviewed for extraction of valuable information for efficient energy management and data transmission in WSN. In this paper various approaches that are cluster based, relay based and chain based has been illustrated. Relay based WSN use a relay node for receiving information from the sensor node that cause problem in large scale networks. On the basis of analysis of these different approaches dynamic clustering approach provides efficient energy utilization in WSN.
Keywords: LEACH, BEC, LEACH-M, C-LEACH, MWSN and Radio Propagation.
Abstract
EAOR: Energy Aware Optimized Routing Protocol in Mobile Ad Hoc Networks
F. Vinod Alexander B.Tech., M.E, R. Vidhya M.Sc., M.Phil., M.E.
DOI: 10.17148/IJARCCE.2017.64135
Abstract: Mobile Ad hoc Networks (MANETs) in terms of resources, robustness and efficiency for replicated service applications. Most of the anycast routing protocols select unstable and congested intermediate nodes, thereby causing frequent path failures and packet losses. We propose a mobility and quality of service aware routing scheme in MANETs that employs three models: node movement stability, channel congestion, and link/route expiry time. These models are used in the route discovery process to select nearest k-servers. A server among k-servers is selected based on less congestion, route expiry time, number of hops, and better stability. The simulation results indicate that proposed method demonstrates reduction in control overheads, path delays and improved packet delivery ratio compared to existing methods such as queue utilization, residual energy and node degree.
Keywords: Mobile Ad-Hoc Networks, Anycast routing, Energy Efficiency, Channel Congestion.
Abstract
SRTD-Manet: Secured Routing and Terrific Data Delivery in Mobile Ad-Hoc Networks
C. Lavanya Prabha B.Tech., M.E., K. Anitha, BE., ME.,
DOI: 10.17148/IJARCCE.2017.64136
Abstract: Mobile Ad-Hoc Networks presume that nodes spontaneous cooperate in order to work correctly. This collaboration process is based on performance and quality.And then some nodes can rubbish to this performance, finding to effecient node processing. Thus, the whole network process could be affected. The use of previous framework is well to find effective nodes. However in this process more energy used for detecting process and lack of network lifetime, to overcome this above problem, we propose a new method based on a secret parameterallocation for major precaution in all type of Networks. In Mobile Ad-Hoc Networks, the estimation load and complication for key management is mainly subject to limitation of the node�s accessible resources and the aggressive personality of network. In this proposed work, we present an efficient and secure key management framework (ESKM) for Mobile Ad-Hoc Networks that builds keys by applying a classified dissemination technique and an elemental multicast cluster group. In ESKM, the cluster group creates a view of the certification less key and provides key update process for all nodes, including the clusters themselves.
Keywords: Mobile Ad-Hoc Networks, Clustering, efficient and secure key management, multicast routing, data sharing.
Abstract
Energy Efficient Routing and Data Gathering With Load Balanced Clustering in Wireless Sensor Networks
D. Mohana Divya B.E., M.E., B. Prasath B.E., M.E.,
DOI: 10.17148/IJARCCE.2017.64137
Abstract: Data gathering is a common but critical operation in many applications of wireless sensor networks. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks, which can increase network scalability and lifetime. The framework employs distributed load balanced Clustering and dual data uploading, which is referred to as LBC. A distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. We used mobile divider for split the data about cluster and cluster head calculation. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. The trajectory planning for Mobile collector is optimized to fully utilize dual data uploading capability by properly selecting polling points in each cluster. By visiting each selected polling point, Mobile collector can efficiently gather data from cluster heads and transport the data to the static data sink. Extensive simulations are conducted to evaluate the effectiveness of the proposed LBC schemes.
Keywords: Wireless Sensor Networks, Load balanced Clustering, Energy Data Gathering.
Abstract
Detection of Moving Cast Shadow and Removal for Video Surveillance using HSV Color Space
Komal Gogi, Dr. M. Uttarakumari
DOI: 10.17148/IJARCCE.2017.64138
Abstract: Shadow Detection and Removal is the procedure to enhance the execution, reliability and accuracy of the computer vision applications including image segmentation and object recognition, object tracking, reconnaissance and so forth. Shadow area causes false recognition for moving objects. Shadow is also reason for false connectivity and the texture loss of background of independent blobs. We separate the moving object by subtraction algorithm in light of the distinction of pixels. Variance property, Texture and intensity in HSV color space are utilized to distinguish the shadow region and shadow removal is based on the data from the reference frame. Background data is initially stored in reference frame. The next incoming frames with shadow object are compared with this reference frame. The main objective to review this paper is to show better performance.
Keywords: shadow detection, shadow removal, subtraction algorithm, HSV color space.
Abstract
Unified data Embedding and Scrambling Advancement in Reversible Watermarking
P S Malage, A M Bedarkar
DOI: 10.17148/IJARCCE.2017.64139
Abstract: In general, a data hiding technique for digital content can be classi?ed into data embedding and perceptual encryption (Scrambling). Data embedding techniques focuses on high-output image quality so that the difference between the original and the embedded images is imperceptible to the naked eye. As a new trend some researcher explores the reversible data embedding technique to get higher payload on the cost of degradation in perceptual quality of the output image. This paper proposed a unique technique i.e Uni?ed data embedding-scrambling technique called UES to achieve two objectives simultaneously, namely, high payload and adaptive scalable quality degradation. First Checkerboard based prediction method is proposed for pixel intensity value prediction. In this method 75% of the pixel is predicted with reference to information obtained from 25% of the image. Then based upon prediction error calculated, locations of predicted pixels are vacated to embed information. In addition, the prediction errors are stored at a predetermined precision using the structure side information to perfectly reconstruct or approximate the original image. The precision of the stored prediction errors can be adjusted to control the perceptual quality of the reconstructed image. Experimental results confirm that the proposed UES algorithm is able to reconstruct the original image after completely degrading its perceptual quality.
Keywords: Data hiding, Embedding, Scrambling, Precision error.
Abstract
Emotion based Music Player
Shital Rewanwar, Siddhika Pawar, Swati Bade, Sujata Oak
DOI: 10.17148/IJARCCE.2017.64140
Abstract: Emotion based music retrieval is a music player based on user�s emotion. Many music devices and mobile music players are used to listen to music. A practical problem is selection of desired music. Nowadays many devices are integrated with cameras. This paper gives how to take advantage of these one camera systems. In this proposed system emotion is derived automatically from hand gestures where hand gestures are captured by camera. The data recorded from hand gestures are coupled with musical emotion. Users can search through music collection based on emotional character of music which expressed from hand gestures. The main aim of this project is to design emotion based user interface for music retrieval.
Keywords: Music player, finger recognition, camera, background.
Abstract
Survey on Classification of Clustering Technique
Varchika Gupta, Ashutosh Rastogi
DOI: 10.17148/IJARCCE.2017.64141
Abstract: Wireless Sensor Networks (WSNs) in the zone time alter to more engaging and broaden their way into immense variance of exercising in different domains. Elevation in wireless sensor network technologies provide the affability of small and low-cost sensor nodes with the adequacy of sensing, processing, computing the physical and environment circumstances. Due to inhibitionin transmission range, processing and energy resources it is requisite to design impressive and energy aware protocol to enhance network lifetime.Routing techniques are develop to increase life cycle of sensor network and enhance throughput performance. This paper gives, an analysis of different routing strategies used in wireless sensor networks further importance of cluster based routing, types of cluster, classification of cluster based routing are discussed. The study concludes with the issues and the resent researchers on cluster based routing.
Keywords: Wireless Sensor Network, Routing Schemes, Clustering-based Routing.
Abstract
Welding Force Control of a Servo Gun
Ashwin Joshi, Hrishikesh Lele, Piyush Dongre, Prof S.B. Somani
DOI: 10.17148/IJARCCE.2017.64142
Abstract: This paper shows the implementation of a system to control the force of a servo gun while welding using a Programmable Logic Controller [PLC], a servo motor and a servo drive. The system depends on the software provided by Rockwell i.e. Ultraware to control the servo motor through the servo drive. By controlling the welding force we can improve the quality of the weld and hence the efficiency will also increase.
Keywords: PLC: Programmable Logic Controller, SCADA: Supervisory Control and Data Acquisition, Squeeze and Hold time, OPC server.
Abstract
Smart Bin Implementation for Smart City
Manish S Singh, Krishna Mohan Singh, Ranjeet Kumar Ranjeet, Karunesh Kumar Shukla
DOI: 10.17148/IJARCCE.2017.64143
Abstract: In our town persistently we tend to see that the garbage bins or dustbins placed at public places are overflowing. It creates unsanitary conditions for people. Conjointly it creates ugliness to it place. At a similar time unhealthy smell is additionally unfold. To avoid all such things we are attending to implement a project referred to as garbage collection bin overflow indicator mistreatment GSM and IOT technology. During this project we tend to area unit attending to place level detector within the ash-bin. Once the dirt reaches to the threshold value, a SMS will be sent to the several Municipal / Government authority person with location of that dirt bin by mistreatment GPS. Or usually we tend to see that they need a daily schedule of finding out these garbage bins or dustbins. This schedule varies as per the population of that place. But we tend to see that just in case there's some competition or some perform, a lot of garbage material is generated by people therein specific space. In such cases the garbage dustbin gets at once full so it overflows that creates several issues. Therefore in things, with facilitate of our project the govt. authority person will get SMS at once. So that they can get SMS before their periodic interval visit of finding out the dustbin.
Keywords: ARM 7, GSM, GPS, Level sensor, Garbage overflow indicator etc.
Abstract
Product Recommendation Based on Customer Behaviour using Data Mining
Sourabh Joshi, Pranav Phate, Naman Jain, Abhijeet R. Raipurkar
DOI: 10.17148/IJARCCE.2017.64144
Abstract: Product Recommendation involves suggesting prospective customers to purchase additional products by analyzing their purchase history, similarity of buying pattern with respect to other customers, and items in their shopping basket. This process of recommending products comes under the domain of �Market Basket Analysis� and �Data Mining�. The proposed system will be handled by an e-commerce website admin, wherein the admin will input the name of a customer for whom the e-commerce site wants to recommend products based on similar customer behaviour using data mining.
Keywords: Product Recommendation, E-commerce Market Basket Analysis, Data Mining.
Abstract
Intelligent Laptop Lock-Unlock Security Based Application
P.S. Hanawate, Kalyani Kolte, Aishwarya Patil, Yashashri Kuchekar
DOI: 10.17148/IJARCCE.2017.64145
Abstract: �Intelligent Laptop Lock-Unlock Security Based Application� is designed for the security purpose of the laptop. The application is helpful when someone tries to unlock the laptop at the same time the application act as a trigger to the camera and camera captures the image of person which sat in front of the laptop otherwise send the default image after specific time and it also send the notification on the mobile phone with captured image. By using this application owner can take actions from mobile phone. The framework is outlined with the end goal that the runtime operations captures which performed by client and the client will be identified and afterward just he will be given a key to lock or unlock the system. The application is intended to permit the client to likewise check the status of the entryway. The cell phone requires a password to expand the security of the framework. Security is primary support toward taking care of such archived data in laptop, tablets, cell phones, PCs. We don't have that much good security with these gadgets. The security we have is making lock for system as a secret word however anybody can hack the password and mischief our information to maintain security and avoid hacking such a variety of security functions are given like thumb print, retina acknowledgment and so on. In any case, there is no security for watching that who is attempting to crack the password. That security is given in our proposed system.
Keywords: Laptop security, Embedded security, Face detection.
Abstract
Optimal Implementation of CHUD based on Association Matrix
Mr. Lalit N. Dhande, Prof. Dinesh D. Patil
DOI: 10.17148/IJARCCE.2017.64146
Abstract: An implementation always has different set of issues, though we have an algorithm or any sort of blueprint ready to solve the problem. This paper describes how CHUD [1] is implemented in C#.Net. Overall four to five main modules we have to form, namely, Connection Module, CHUD Module, DAHU [1] Module, Dataset Population Module and Result Analysis module. Each of the modules has its own significance and contribution. The Connection Module allows us to connect our software to our database file CHUD.accdb as well as to the dataset on which utility mining should be performed. This module will collect the information about columns like ItemSold (which actually contains the itemnames/itemids sold in transaction), transaction Id, item quantity, profit unit etc. As we know CHUD works on promising items only, we need to extract promising items from the given dataset. At the same time while we scan whole dataset we build an association matrix/table which is a vertical representation of given dataset. CHUD module discovers closed high utility itemsets, and records these itemsets in PhaseIOutput table in CHUD.mdb. DAHU later on uses each itemset from PhaseIOutput table and work from the top. Work from the top suggest that it operates on the itemsets of maximum length �k� and discovers all possible high utility itemsets of length �k-1�, which not present in PhaseIOutput table. All high utility itemsets discovered by DAHU recorded in PhaseIIOutput. The both the tables PhaseIOutput and PhaseIIOutput combinely form a final result set which have all the high utility itemsets for the given dataset. C= {X1, X2���...Xn} where Xi ?PhaseIOutput. D= {Y1, Y2���. Ym} where Yi ?PhaseIIOutput. Suppose R is the final result set, then, R=C ? D Finally, we represent the result with result pattern module, which use the data of both the table PhaseIOutput and PhaseIIOutput, and represent the items and itemsets with their utility value in Bar chart, PI Chart or any other representation style element. One can make a good analysis with these results.
Keywords: closed high utility itemsets, utility Mining, Concise and lossless representation, data mining.
Abstract
Feature Extraction Mining Method for Intrusion Detection Systems based on Darpa 1999 Dataset
Karim Hashim Al-Saedi, Nazhat SaeedAbdulrazzaq, Dhiya Ibraheem Selman
DOI: 10.17148/IJARCCE.2017.64147
Abstract: Intrusion Detection Systems (IDSs) have turned into an important security system for managing dangers and a needful aspect of global security architecture.The IDS is triggering alerts for any suspicious activity which means thousand alerts that the analysts should take care of it. These Alerts has contained irrelevant and redundant features and most of them don�t require big attention by researches. Deleting the alert attributes or reducing the amount of them from the entire amount alert attributes lead the researchers to create many methods such as principle component analysis. Feature ExtractionMining Method in IDS is an important data mining step.In this paper, we focus on an approach of feature selection based on Darpa 1999. The first step that based on data preprocessing and configuration for the next stage and guides the initialization of search process for the second step that based on principle component analysis whose outputs the final feature subset.
Keywords: Intrusion Detection system(IDS), Feature Extraction, Data Mining(DM), Principle Component Analysis.
Abstract
Enhancing Traffic Management and Load Balancing in SDN
Prof. Swati Joshi, Arnab Dutta, Neeraj Chavan, Gaurav Dhus, Pratik Bharsakle
DOI: 10.17148/IJARCCE.2017.64148
Abstract: This document The Internet has connected many of the devices in the world. By the end of 2015, we already had9 billion connected things. And some predict that by 2020, the number of Internet-connectedthings will reach or even exceed 50 billion. Many network connected devices can�t be updated.Considering the range of applications, it�s impossible to determine exactly which services areback-ending any particular product or service. This is the problem in a nutshell: One can�tdetermine exactly where the data is being processed and stored.Load balancing and Traffic management methods are adopted in the design of switching androuting algorithms. However, the requirement of load balancing in conventional networks cannotbe fully satisfied by traditional approaches. The quantityof data flowing in these systems isconsiderably high. The network topology and switching mechanism can affect the performanceand latency significantly. The layer 2 switching has some significant disadvantages which includelack of hardware which increase their susceptibility to broadcast storms. The main reasonis the lack of efficient ways to obtain network traffic statistics from network devices. Propertraffic management and load balancing will help take some extra effects towards the cause ofmaking data flow easier. SDN separates the control plane from the data plane and this centralizedcontrol of data layer and control layer will make the management of data packets easier.As a solution, applications to manage the traffic and balance the load at switch based uponSDN architecture is developed to provide improved routing and networking performance fornetwork.
Keywords: Software-Defined Networking (SDN), controller, OpenFlow, OpenDayLight.
Abstract
Removal of Power Line Interference in ECG Signal by Adaptive LMS, NLMS and RLS Algorithms
P. Pavani, N.V.R. Adithya, K. Hari Krishna, M.V. Siva Kumar
DOI: 10.17148/IJARCCE.2017.64149
Abstract: Filtering of power line interference is very meaningful in the measurement of biomedical events recording, particularly in the case of recording signals as weak as the ECG signal. ECG is a biomedical signal which gives electrical activity of heart. This ECG signal is corrupted by various noises like power line interference, baseline wandering, channel noise, contact noise, muscle artifacts etc. Frequency range of ECG signal is nearly same as the frequency of power line interference. ECG signal has frequency range from 0.5 Hz to 80 Hz and power line interference introduces 50 to 60 Hz frequency component in that signal which is the major cause of corruption of ECG. From various artifacts contaminate electrocardiogram (ECG) recording, the most common are power line interference. Power line interference is not easily recognizable since the interfering voltage in the ECG may have frequency 50 Hz. The most common cause of 50 Hz interference is the disconnected electrode resulting in a very strong disturbing signal, and therefore needs quick action. Electromagnetic interference from the power lines also results in poor quality tracings. Electrical equipment�s such as air conditioner, elevators and X-ray units draw heavy power line current, which induce 50 Hz signals in the input circuits of the ECG machine. This project focuses on a technique for de noising of such non stationary ECG signal using adaptive filter algorithms like LMS, NLMS, RLS and compares their performance characteristics using MATLAB.
Keywords: ECG, LMS, NLMS, RLS, MATLAB, Power Line Interference.
Abstract
Web Page Ranking using Web Usage Mining
Asfiya Khatoon, Kuldeep Jaiswal
DOI: 10.17148/IJARCCE.2017.64150
Abstract: Nowadays World Wide Web is a popular and interactive medium to distribute the information which develops increasingly. Web Mining is the extraction of interesting and potentially useful patterns and implicit information from artifacts or activity related to the World Wide Web. This extracted information can be further used to improve web usage mining, like next page prediction i.e. prediction of next page accessed by the user, improve web personalization, fraud detection and future prediction accessed by user, user profiling, and also to know about user browsing behavior. For predicting and identifying extracted information, it is needed to process Web Usage Mining. Web Usage Mining processing steps are explained in brief.Due to the difficulty in identifying unique sessions, additional prior knowledge is required. Different Web Usage Mining techniques are described for this knowledge and pattern discovery. Pattern analysis is needed to filter out uninterested rules or patterns from the set found in the pattern discovery phase.
Keywords: Web Mining, Web Usage mining, Web log files, fp growth, Association rules mining.
Abstract
Artificial Intelligence Chatbot in Android System using Open Source Program-O
Sarthak V. Doshi, Suprabha B. Pawar, Akshay G. Shelar, Shraddha S. Kulkarni
DOI: 10.17148/IJARCCE.2017.64151
Abstract: A chatbot is a conversational agent where a computer program is designed to simulate an intelligent conversation. It can take user input in many formats like text, voice, sentiments, etc. For this purpose, many open source platforms are available. Artificial Intelligence Markup Language (AIML) is derived from Extensible Markup Language (XML) which is used to build up a conversational agent (chatbot) artificially. In this paper, we use �program-o� which is an AIML interpreter for the generation of the responses of users input. We have used this method for developing an android application chatbot which will interact with user using text and voice responses.
Keywords: Artificial Intelligence, Chatbot, Android, Program-o, AIML.
Abstract
Intelligent Bot: A Cross Platform Mobile Application using Machine Learning Techniques and Bot Framework
Aniket Patil, Bhushan Patil, Shubham Salunkhe, Suyog Naikwade, Prof. P. M. Kamde
DOI: 10.17148/IJARCCE.2017.64152
Abstract: Now-a-days to do the day-to-day tasks like searching on Internet, finding an optimized results, getting the right product, getting a minimum cost of any product, one needs to search a lot which leads waste of time and frustration. Every time it is not possible to get result as per requirement. An artificial intelligent personal assistant is needed to increase efficiency of doing such tasks. This project proposes a bot on cross platform mobile applications using machine learning algorithms. The purpose of bot is to recognize text, voice, image input, doing data analysis on the same and providing optimized result.
Keywords: Optimized result, Application Program Interface, K-Nearest Neighbor, Naive Bayes.
Abstract
A Review on Identity-Based Proxy Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Mangala L, Rajendra A B
DOI: 10.17148/IJARCCE.2017.64153
Abstract: Impact of advanced technology has highly effected in our society. The economic view of world has completely changed with changes in technology. Cloud computing is the new range in wireless world. One of the major challenging issues is data integrity/security. This paper gives entire information to overcome these problems using various protocols.
Keywords: Cloud computing, identity based cryptography, proxy public key cryptography, remote data integrity checking.
Abstract
Women Empowerment in 21st Era
Devangi Jain, Jigar Jain, Ankit P. Shah
DOI: 10.17148/IJARCCE.2017.64154
Abstract: In 21st Century concept of women empowerment is a burning issue in the present situation in India. In the field of science and technology we can see constant growth. at earlier time they were getting equal status with men. but they had faced some difficulty during post vedic and epic ages. Woman constitutes the family, which leads to society and Nation. Social and economic development of women is necessary for overall economic development of any society or a country. The role of women has also changed in the 21st century People who exercise a great deal of choice in their lives may be very powerful, but they are not empowered, because they were never disempowered in the first place. Today women is leading in every field and society whether it be sports, commerce and industry, education, health, politics, technology, navy, army, agriculture. Due to advancement in the field of science and technology and the active involvement of women in it we have been able to overcome the evils of our society which were prevalent in our religion, caste and territory and were danger for the world's peace. yet they not absolutely free some discrimination and harassment of the society.
Keywords: concept of women empowerment, historical background, constitutional provision, scheme of women empowerment, empowerment of women in India.
Abstract
Reappraisal of Clock Gating Methods in Different Conditions
Yamini Verma, Ravi Tiwari
DOI: 10.17148/IJARCCE.2017.64155
Abstract: Nowadays digital concept is used in all fields; every multimedia and DSP based devices are clock based synchronous and asynchronous devices. Clock signals with large frequency are on demand but as frequency of clock increases, power consumption of modules also increases, since power dissipation is directly related to clock frequency. Clock gating method is used to reduce dynamic power, which is due to clock frequency. In this paper review of existing clock gating methods is performed at 90nm technology with different frequency and voltage by applying it on synchronous design like 16-bit FIFO. The proposed architecture is designed using verilog language. The synthesis and simulation work is performed in Xilinx ISE Design suite 14.2 tool and power analysis is done by XPOWER ANALIZER.
Keywords: DSP, Clock gating, Power dissipation, 16-bit FIFO.
Abstract
A Survey of Black-hole Attack Mitigation and Prevention in MANET
Sonali Khandelwal, Amit Shrivashtav
DOI: 10.17148/IJARCCE.2017.64156
Abstract: Mobile Ad-hoc Networks features such as open medium, mobility of nodes, lack of back bone system and lack of infrastructure contribute various security attacks. Black hole attack is one type of attack that is more common in MANET reactive routing protocols. Black hole attack takes advantage of route discovery process in reactive routing protocols. In Black-hole attack, a malicious node misguide other nodes in the network by pretending to have the shortest and fresh route to a target node whose packets it wants to attack. This paper analyses the cooperative Black-hole attack detection and prevention. In this scenario, Ad-hoc on demand multipath distance vector routing protocol is configuring to provide multiple path for data communication. For this, we have listed various research carried out to discover and mitigate the single and cooperative Black-hole attack in MANETs.
Keywords: MANET, AODV, AOMDV, Security, Black-hole, Routing Protocol.
Abstract
Survey Paper on Authenticated Index for Verifiable Cloud Service Selection
Hemavathi H.S, Hamsaveni. M
DOI: 10.17148/IJARCCE.2017.64157
Abstract: Cloud computing has emerged as a popular paradigm that offers computing resources as scalable of cloud service provider(CSP) and efforts towards intelligent cloud service selection. Cloud brokers as an additional layer to facilitate cloud service selection and services management task for cloud consumer.Although the issue of data privacy can be solved by database encryption techniques. In outsource database model, the cloud broker sever provider query services to user on behalf of the data owner. The user�s data are shared and maintained with it concerns of security vulnerability for all the services. this paper survey on how brokerage system provide authenticated CSP�s profile to cloud broker and broker to cloud client.
Keywords: cloud computing, service selection, cloud brokers, database, brokerage system.
Abstract
Hardware Implementation of Robust Digital Image Watermarking using Neural Network– A Survey
Sneha Nyamagoud, Suresh Kuri, Praveen Kalkundri
DOI: 10.17148/IJARCCE.2017.64158
Abstract: Watermarking is the process of hiding the digital information, such as image, audio and video. It is typically used for authentication and copyright. Communication is a major part in our day-to-day life, now a day�s exchanging of information in the form of image, audio and video takes place through internet. There are some issues or threads associated with internet transformation with respect to intellectual property rights (IP rights) like forgery, authentication and copyrights. In this paper we limit the survey to images only and we present a detailed survey of existing and newly existing watermarking techniques.
Keywords: Classification of Watermarking, Properties, Neural network, Performance matrices, Applications and Watermarking techniques.
Abstract
Current Analysis Topic in Software Engineering
Sham Sunder, Sandeep Singh, C.K. Raina
DOI: 10.17148/IJARCCE.2017.64159
Abstract: Software engineering processes are complicated, and also the connected activities typically manufacture an oversized variety and type of artifacts. This paper describes some factors that analysis in software engineering firm or business. There are rather more topics and fields in software engineering state of affairs. Analysis in SE was involved with supporting persons to develop better software quicker. Nowadays many analysis directions of each discipline come back nearer along and are starting to build new analysis areas. However this paper I will be able to short summary some vital problems that are handling terribly hardly and consciously.
Keywords: Aspects of software Engineering, Artificial Intelligence and software Engineering, Natural Language Processing, Mining software system engineering data.
Abstract
Research on Security Issues and Protection Strategy of Computer Network
Gurdeep Singh, Gurjeet Singh, Gurwinder Singh, Er. Charanjit Kaur Raina
DOI: 10.17148/IJARCCE.2017.64160
Abstract: Development and improvement has brought a very great impact to the network technology of the computer, besides the security of the network information has become a focus of the social safety questions. In this paper, through the analysis of security threats to computer network information and protective factors conducted, a strategy for a common computer network information security and protection strategy has been proposed, and useful lessons for our computer network and information security and protection reference have been provided. A series of questions such as security and dependability regarding the computer network system arise, which has been taken into consideration in proposing the strategy. This paper puts forward proposals with respects to the importance of the computer network system, existing problems of the online security of the computer, and precautionary measures. The detailed discussion will help the mass users to become conscious regarding network security and take precautionary measures while using the network.
Keywords: Computer Network, Network Security, Preventive Measures, Security protection system.
Abstract
Secure and Privacy-Preserving Cloud Computing Presents Technical, Legal, and Administrative Challenges
Mr. Kandunuri Rama Krishna, Mr. Mohammed Yesuf Mohammed, Mr. Abdulahi Mahammed Adem, Mr. Suleyman Yimer Abebe
DOI: 10.17148/IJARCCE.2017.64161
Abstract: In this paper, in this Project We Proposed Securely encryption schemes have proven to offer a high level of security, but they require lengthy computations; more efficient and scalable security solutions are thus needed. Traditional distributed architectures uphold trust by enforcing security policies. However, in cloud deployment models, data and application control is delegated, hence traditional policy-based enforcement presents a number of challenges. Reliable enforcement is a critical aspect of cloud service dependability. A trusted third party within a cloud environment is often used together with cryptographic methods to ensure the integrity, authenticity, and confidentiality of both data and communication. Protecting a user�s account from misuse is an important part of the larger problem of controlling access to cloud-based resources (such as objects, memory, devices, and soft ware). Cryptographic authentication solutions can help facilitate secure resource utilization. Secure and privacy-preserving cloud computing presents technical, legal, and administrative challenges. Our focus here is on the technical issues. The main aspects of security, confidentiality, integrity, and availability must be addressed at the client side, the connection, and the server side. The major issue is that all three operate in and are part of shared environments; hence their security and privacy requirements must be combined. The importance of cloud security has been widely acknowledged, and several organizations, such as the Cloud Security Alliance have been looking at it from different perspectives. Cloud services have three basic models: software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). Although these models have major differences, they share many security- and privacy-related issues.
Keywords: network of nodes, Data Sanitization, Denial of Service, software as a service, data computation, infrastructure as a service, Securely encryption, Software metrics, platform as a service.
Abstract
Design and Implementation of Telemedicine System
Andria Cardoza, Kshama K Vaidya, Kavya, Adarsh Shetty, Mrs. Ramya D Shetty, U Karthikeya Vaidya
DOI: 10.17148/IJARCCE.2017.64162
Abstract: WebRTC is a protocol that extends common browser capabilities, making it hassle-free for browsers to exchange real time media. In this paper, we have developed a Telemedicine System which works using Web RTC protocol. The implementation of this system provides rural areas access to specialised consultations and treatments. In a developing country like India where the rural community is gravely neglected, the use of Telemedicine in healthcare can aid in bridging gaps between urban and rural areas. A simple browser that supports WebRTC like Firefox, Safari, web camera and a stable Internet Connection are sufficient to make it work on any computer.
Keywords: Telemedicine; WebRTC; Rural Healthcare; e-Health.
Abstract
Analytical Review on Textual Queries Semantic Search based Video Retrieval
Prof. Suvarna L. Kattimani, Miss. Saba Parveen Bougdadi
DOI: 10.17148/IJARCCE.2017.64163
Abstract: Semantic search based video retrieval is hard problem due to limited set of vocabulary. Textual queries semantic search based video retrieval is able to detect object from video frames, first the sentence is converted into parse tree than noun, verb, adverb present in that sentence is converted into semantic graph. And construct the semantic meaningful graph gives the semantic structure and matches the nouns, verb and adverb detected in the video frame and also detect the action and position of the object by using semantic meaningful graph. The developed approach is to first sentence is converted into parse tree and object detection takes place. First textual query is matched to concept. The advantage of textual queries approach is object appearance and motion by using structure prediction. Textual queries semantic search can contain temporal and spatial information about multiple objects like trees and building present in the scene.
Keywords: Parse tree, Textual queries, Semantic graph, Semantic structure, Structure prediction.
Abstract
Dynamic Price Optimization for the Future of E-Commerce
Anusha.B, Sangeetha.H.S, Riyanka.R, Sushmitha.N, Chitra.R
DOI: 10.17148/IJARCCE.2017.64164
Abstract: Every organisation faces a problem of setting the prices of products. The main aim of marketing strategy of an organisation is to attain marketing objectives and satisfy the targeted market. The marketing decisions affect the prices of products to a great extent. The topic of dynamic price optimization for the future of e-commerce has received a considerable amount of attention in recent years, from different scientific communities. This paper provide a brief introduction to the historical origins of quantitative research on pricing and demand estimation, point to different subfields in the area of dynamic pricing, and provide an in-depth overview of the available literature on dynamic pricing and learning. Our focus is on the operations research and management science literature, but we also discuss relevant contributions from marketing, economics, econometrics, and computer science. The topic of dynamic pricing and learning has received a considerable amount of attention in recent years, from different scientific communities. We survey these literature streams: we provide a brief introduction to the historical origins of quantitative research on pricing and Demand estimation, point to different subfields in the area of dynamic pricing, and provide an in-depth overview of the available literature on dynamic pricing and learning. Our focus is on the operations research and management science literature, but we also discuss relevant Contributions from marketing, economics, econometrics, and computer science. We discuss Relations with methodologically related research areas, and identify directions for future research.
Keywords: Dynamic Pricing, Demand Estimation; Learning, Optimization, Neural Network.
Abstract
An Efficient Approach to De-noising Mammogram Images
Jayant Rajurkar, Shirish Singnapure
DOI: 10.17148/IJARCCE.2017.64165
Abstract: The noisy nature of digital mammograms and low contrast of doubtful areas which make medical images de-noising a challenging problem. In the field of image processing, different types of denoising algorithm are used to remove the unnecessary noise such as additive white Gaussian noise, salt and pepper noise, impulsive noise, as well used to smoothen the image. In the existing work, a novel gradient histogram preservation (GHP) algorithm was developed to improve the texture which exhibits the reduced quality in recognition of human image experiments. To remove the noise, Discrete Wavelet Transform (DWT) algorithm is used to eliminate the noisiness present in the medical image to preserve the texture structures. Proposed approach will efficiently calculate peak signal noise ratio (PSNR) parameters and make the enhanced image without noise and obtains the quality of image without any loss of data.
Keywords: Image Denoising, Discrete Wavelet Transform (DWT), Gaussian Filter, Mammogram image, Peak Signal-to-Noise Ratio.
Abstract
An Attempt to Modernise Customer Practice with Ration Card at Ration Shop using Advanced Electronics Technology
N.S. Murtisarma, N. Pramada
DOI: 10.17148/IJARCCE.2017.64166
Abstract: In this paper an attempt to use the electronic technology at fair price shop level is shown. This requires further modifications with several implications to make it in to practice. Embedded systems and keil software were used to develop a hard ware proto model to realize the concept.
Keywords: Ration shop, groceries, open market, RFID tag, GSM module, keil software.
Abstract
Monitoring and Controlling of Drip Irrigation using IOT with Embedded Linux Board
Shweta Bopshetty, Mrunali Yadav, Rithvika Rai, Sheril Silvister, Prof. Parth Sagar
DOI: 10.17148/IJARCCE.2017.64167
Abstract: This paper presents automation in farming system in terms of remote monitoring and controlling of drip irrigation using Embedded Linux board. Our system takes into consideration the soil moisture, temperature and humidity of environment. We are also considering the water level of tank using ultra-sonic sensor. This system provides a web interface to the user so that the user can monitor the system remotely. In order to control drip irrigation system, we propose an approach for collecting environment data and sending control command to turn on/off irrigation system. Monitoring valves and switches operation, and remote area control will efficiently improve the productivity of crops in all season. In this paper, Arduino-Uno is used as an embedded Linux board which makes the communication with the soil moisture sensor and ultra sonic sensor. The Node MCU is used to monitor the environmental parameters of temperature and humidity using DHT11 sensor. Based on these, the water is supplied to crops as per requirement. Thus, the water consumption will be reduced giving uniform water to the crop resulting in increased yield.
Keywords: Internet of Things, Drip Irrigation, Sensor Network, Embedded Systems, Web-Service.
Abstract
Implementation of Two Level QR Code (2LQR)
Pallavi Tekade, Anub Vamadevan, Sumit Sawant, Tushar Tamhane, Ganesh Khedkar
DOI: 10.17148/IJARCCE.2017.64168
Abstract: Quick response codes are machine readable optical label which was first created in the automated industry of Japan. Quick response codes are capable enough to store vital information in it by converting into various black and white patterns. QR codes have many applications especially in the field of message sharing and document authentication. We must lay our emphasis on the security and privacy of the QR code as there are chances of it getting into wrong hands. In this paper, we have proposed a technique known as 2-level QR code which consists of two layers of security provided to the QR code. The first level is known as public level and the second level is known as private level. We will be using Reed Solomon algorithm. Our 2-level design is capable enough to supply ample security and privacy as way as personal message sharing and document authentication are involved. During this paper, we've got studied numerous state of the art existing techniques of planning QR code at the side of their comparison with our projected two level QR code technique. In this paper, we've got studied numerous state of the art existing techniques of coming up with QR code in conjunction with their comparison with our planned two level QR code technique.
Keywords: QR Code; Reed Solomon, 2-level QR, Cryptography, Barcode.
Abstract
Queue less Shopping Cart with the Self Checkout
Durga Prashat, Kavya Shree.K, K. Shyamala, Sowmya.C, Sonia Maria D’souza
DOI: 10.17148/IJARCCE.2017.64169
Abstract: In general the shopping and billing of each and every products or a commodity is done by scanning the Barcode or the QR code which is present on the tag of each commodity. Here our concern is about the customer who love shopping but are frustrated by the long queues at the billing counter, this absolutely waste of time and if the particular product is not available at the shopping center the customer have to move to another shopping destination which again increases the time complexity and there is also increase in the Traffic as user have to travel again and the parking problem. In this paper we have come up with an Android application. The application helps the user and the retailer in the easy shopping and reducing the conjunction at the billing area.
Keywords: Mobile Communication, QR code scanner, Wifi, Semantics, User Interface.
Abstract
Review on Energy Efficient Routing Protocols in WSNs
Paramjit Singh, Tejinderdeep Singh
DOI: 10.17148/IJARCCE.2017.64170
Abstract: Wireless Sensor Network is a highly distributed network of small and lightweight sensing nodes which are deployed in a large number at multiple locations. These networks are helpful in monitoring the system or environment. These sensor nodes performs sensing, processing and then communicating. Now a day�s these networks are applied in various fields like military, defence, forest fire, medical, crisis management etc. In this paper it has been discussed about sensor network architecture and major factors affecting the wireless sensor networks. Routing is a major challenge faced by wireless sensor networks due to the dynamic nature of WSNs. Since energy efficient routing protocols are of major concern in the field of wireless sensor network. Therefore in further sections of this paper it has presented a brief review of different energy efficient routing protocols proposed for wireless sensor networks.
Keywords: Clustering, Energy efficient routing, LEACH, Sensor Nodes, Wireless Sensor Networks, WSNs.
Abstract
Congestion Avoidance for Multi-Hop Wireless Network
Nouhfa Juhiya S., Mrs. R. Divya
DOI: 10.17148/IJARCCE.2017.64171
Abstract: Congestion is one of the major problem in Wireless Sensor Network which occurs when large number of nodes sending data to a common node. Because of this congestion, the node�s buffer gets overloaded which either increases the packet service time or starts dropping the packets which in turn degrades the packet delivery ratio and also increases the node�s energy consumption and end to end delay in the network. In healthcare applications, there is a need for continuous data transmission to the monitoring location and also the delay should be minimized. Also when the sensing parameters gets increased then the number of nodes in the network also gets increased, in such case the remote nodes cannot reach the central location in single-hop manner so there is a need for multi-hop forwarding. In order to overcome the above mentioned issues, multi-hop based congestion avoidance technique has been proposed. The objective of the proposed work is to avoid the congestion and thereby improving the performance metrics such as packet delivery fraction, average remained energy and average end to end delay. Initially performance analysis of different routing protocols like AODV, DSR and DSDV has been done, in order to select a best routing protocol for a multi-hop network. The topology used in the proposed work is clustered topology as multi-hop routing and it is evaluated in NS-2 simulator.
Keywords: Congestion avoidance; Wireless Sensor Network (WSN); multi-hop; routing protocols; clustered topology.
Abstract
A Survey on Novel Framework for Enhancing Security of IoT in Transport Domain
Aakansha Naikare, Chaitali Barhate, Saili Dhadve, Chaitali Deokar
DOI: 10.17148/IJARCCE.2017.64172
Abstract: Today, as the numbers of vehicles are increasing, it results in more traffic congestion and crashes and thus being one of the major issues in developing countries which are to be effectively addressed by improving the current transportation systems, by considering the needs which are necessary of reducing the road traffic congestion and improving road safety. Transport security System is an advanced application which provides web enabled services for transport and traffic system, which results in a safer, coordinated traffic network system. This system can be used very efficiently in network and traffic analysis, which is a spontaneous creation of wireless network of vehicles for exchanging information about on road traffic, for improved traffic and transport management and to enable various users to be sufficiently informed about the road and make safer and smarter decisions on road by using transport networks. As the technology has to be used widely, there is a high need for a low cost traffic analysis technology with high security and QoS. To go for any further developments, a thorough analysis on the available technologies are essential to get a closer view on the current scenario. Proposed system is using android application to send data to server. Server will analyze incoming data for any attacks. Attacks like Brute Force, GPS Spoofing, DDOS attack and message tempering will be detected using this proposed system.
Keywords: GPS Spoofing, DDOS attack, Brute Force attack, Message Tempering.
