VOLUME 6, ISSUE 2, FEBRUARY 2017
Analysis of field Distribution and Characteristic Performance of Induction Motor with Faults by Using Finite Element Method
Dr. Khaleel J. Hammadi
Providing security for Association Rules Mining in Distributed Databases Result analysis
Pankaj P. Joshi, Prof. R. M. Goudar
Load Balancing using Amazon Cloud Services
Prof. Vidya Chitre, Kaustubh Katkar, Shriraj Bamne, Vishwanath Prasad
Android OS for Embedded Real-Time Systems
Smita Sontakke, Jagruti Thombare, Pournima Lad
Session Passwords Using Grids and Colors for Web Applications and PDA
Pragati Patil, Nivedita Mhatre, Shobhana Gaikwad
Classification of Cancer Datasets using Artificial Bee Colony and Deep Feed Forward Neural Networks
M. Karunyalakshmi, Dr. N. Tajunisha
Weather Data Analytics using MapReduce and Spark
Priyanka Chouksey, Abhishek Singh Chauhan
Implementation to Provide Security for Data in Cloud using Huffman Compression Approach
B. Anil Babu, K. Venkateswara Rao
Design and Analysis of Track and Hold Circuit for Wireless Communication
Smita D. Waghmare, Dr. U. A. Kshirsagar
Classification of Respiration Disorders with its Effectiveness under Different Treatments for Sensor Dataset
M. Saranya, Dr. N. Tajunisha
A Survey on Software Defined Networking in IoT
Prof. Swati Joshi, Arnab Dutta, Neeraj Chavan, Gaurav Dhus, Pratik Bharsakle
An Enhanced Reliable and Protective Method for flexible distributed Storage in Cloud Computing
B. Durgalakshmi, S. Rakoth Kandan
Fuzzy Rule Based Classifier for Student Data using Map Reduce
Gayatri Nair, Shankar M. Patil
Improved Tag Cloud by Cleaning Tags using Context Free Data Cleaning
Sohil D. Pandya, Rinku Chavda
“A Secure E-voting System using Biometrics Authentication Methods for Android”
Prof. P. B. Dhamdhere, Abhishek Kasar, Nilesh Satpute, Priyanka Lekurwale
Load Frequency Control for 3 Area Interconnected Power Systems
Neha M. Tandel, Dr. Ami T. Patel
Review on a Compressor Design and Implementation of Multiplier using Vedic Mathematics
Prof. Mrs. Y.D. Kapse, Miss. Pooja R. Sarangpure, Miss. Komal M. Lokhande
Review on Business Intelligence Solutions in Healthcare Sector
S. S. Kulkarni, Neena Chaudhari, Jishan Mulla, Abha Kamble, Basit Sofi
Decentralized Access Control with Anonymous Authentication and Auto File Publishing in Cloud
Dr. A. N. Banubakode, Akshata Kulkarni, Harsha Kumble, Madhubala Chandak, Sanjana Prasad
Monitoring and Connecting Vehicles using RFID
M. Nihal Chidambaram, Ravinder Kumar, P. Srikanth
Implementation of Indoor Wireless Tracking System using Wi-Fi
Payal Tat, Manisha Nimbekar, Aboli Varpe, Sayali Gadade, Swati Khodke
A Study on Data Mining & Machine Learning for Intrusion Detection System
Rashmi Ravindra Chaudhari, Sonal Promod Patil
Review of Patient Alert System
Prof. M. P. Mahajan, Sheetal N. Shinde, Shubhada B. Ugale, Arti S. Sonawane
Multipattern Matching Algorithm on GPGPU
Bhagyashri Chhagan Wadile, Prof. N.R. Wankhade
Home Automated Smart Mirror as an Internet of Things (IoT) Implementation – Survey Paper
Jane Jose, Raghav Chakravarthy, Jait Jacob, Mir Masood Ali, Sonia Maria D’souza
An Efficient Geometric Routing using Convex Hull Tree Information in Geographic Protocol
T. Nivetha, S.R. Lavanya
“Comparative Study of Feature Extraction and Classification Techniques for Handwritten Devanagari Script”
Puja Ujwal Talole, P. E. Ajmire
Improved Pass-Matrix for Graphical Authentication
Harsha Mathur, Vijay Lokhande
Improved KNN and other Supervised Machine Learning Approaches based on Discretization
Kalpana Kushwaha, Amit Thakur
Image Enhancement of underwater Digital Image using L*A*B color space on Unsharp Masking
Shivika Saini, Pawan Kumar Mishra
Request Scheduling Techniques in Large Scale Computing Environments
R. Arokia Paul Rajan
Detection of Intrusion in Wireless Sensor Networks with Low Power Consumption
A. Saran Kumar, M. Sangeetha
An Integration of Binary Bat Algorithm and Naïve Bayes Classifier for Intrusion Detection in Distributed Environment
Varuna S, Ramya R
A Novel Cloud Based Application: Resolve
Pratik Mohapatra, Pratiba D
Survey on Online Transaction using Face Recognition
Namita Jain, Vikrant Mukkawar, Mahesh Jadhav, Prof. Shruti Sekra
A Survey on Attribute-Based Secure Data Sharing Scheme in Cloud Computing
Akshay Choudhari, Dr. Emmanuel M
Data Mining with Big Data under Cloud Environment – Opportunities, Issues and Challenges
R. Kabilan, Dr. N. Jayaveeran
Performance Enhancement of RMPA Parameters Using Circular shaped Split Ring Resonator with Rectangular Cross Strips Metamaterial Structure at 2 GHz
RamKishor. Sharma, Mahendra Kumar Pandey, Sandeep Kumar Agrawal
PDF to Excel Converter & Manipulator for Result Analysis in College Environment
Kaustubha Vaidya, Dharmesh Savaliya, Dhananjay Deshmukh
Detection of Actionable and Non-Actionable Street Bumps in Smart Cities
Rajhans Sanas, Aditya Patil, Amit Gawali, Prof. Kanchan Varpe
An Adaptive Lossy Image Compression using Singular Value Decomposition and Wavelet Difference Reduction
D. J. Ashpin Pabi, N. Puviarasan, P. Aruna
“Protection from Data Content Leak by Secured Key Generation”
Shradha V. Raghorte, Dr. Rahila Sheikh
A Comprehensive Survey on Big-Data Issues, Challenges and Management Approaches on Cloud Environment
Chetana Tukkoji, Dr. Seetharam K
Different approaches for human face detection leading to real time face analysis: A survey
V.K. Sowjanya, Anurag De, B. Sujatha, K. Harika
Real Time Video Motion Detection for Traffic Surveillance
Dr. Sachin S. Agrawal, Prof. S. A. Bhura
Architecture based on Li-Fi to enhance the working environment
Varun Shah, Sumit Chaudhary, Bhavesh Jain
Secure Network System using Honeypot
Ms. Khairkar Ashwini, Gollar Pratiksha, Kulakarni Anuja, Suryawanshi Varsharani, Swami Gayatri
Accurate Detection of Unusual Event in Network Data Stream (Outlier)
Priti G. Manekar, Prof. Pravin G. Kulurkar
Overview of Scheduling on Multi-core Processing
Hema K. Reddy, Dr. G. R. Bamnote
A Review Paper on Implementation of OFDM Transceiver using Mixed Radix 8-2 Algorithm
Prof. Y.D. Kapse, Ms. Lokhande Komal Mohan, Ms. Pooja Sarangpure
IOT Based Electric Bill Generation
Shubham Pahurkar, Subhash Diwakar, Harshal Nerkar, Sunita Patil
Hot Spot Technology in the Sport of Kabaddi
Vishesh S, Manu Srinath, Sree Sai Kiran N, Srivatsa VG, Prasad Shenoy, Chandrashekar U
Based on Matching Process Recognition of Forger Image
Mr. Kolkure V.S., Rekha H. Pawar
Named Entity Recognition Approaches and Challenges .
Sanjana Kamath, Rupali Wagh
Face and Eye Gaze scenario for person Identification using Circular Hough transform .
Rupali .S. Wagh, Prof. S.G. Kole, S.S. Savkare
Security Analysis of Various Public Key Cryptosystems for Authentication and Key Agreement in Wireless Communication Network
H T Loriya, A. Kulshreshta, D.R. Keraliya
Performance Analysis of Cooperative Sensing in Fading Channels for Wireless Communication
Prof. Divyesh R. Keraliya, Prof. Ashalata Kulshrestha, Prof. Hitesh. T. Loriya
A Literature Survey on Automatic Evaluation of Computer Programs
Priyanka Sharma, Samkitkumar Jain, Prachin Ranawat, Husain Poonawala, Pankaja Alappanavar
Large Data Turns into Batches using MRQL (Map Reduce Query Language) Technique
Pragati P. Pachghare, Prof. Pravin G. Kulurkar
Review Paper on Smart Helmet using GSM and GPS Technology
Indranil Nikose, TusharRaut, Reena Bisen, Varsha Deshmukh, Ashwini Damahe, Pranoti Ghotekar
A Weighted Control Dynamic Clustering Approach in Vehicular Adhoc Network
Navneet Kaur, Er. Sandeep Kad
Synthesis of OFDM System on FPGA
Vaibhav Bhoite, Kartik Daradmare, Pratima Mourya, Shubhangi Tumane, Darshana Sayare
Design of Milk Analysis System for Dairy Farmers using Embedded System
Abhishek M. Aware, Ujwala A. Kshirsagar (Belorkar)
Review on Student Academic Performance Prediction using Data Mining Techniques
Prateek Sakaray, Snehal Kankariya, Chandini Lulla, Yash Agarwal, Pankaja Alappanavar
Video data hiding using Video Steganography
Ms. Prachi P. Sadawarte, Prof. P. A. Tijare
Grayscale Image Compression using Bit Plane Slicing and Developed RLE Algorithms
Hassan K. Albahadily, V. Yu. Tsviatkou, V.K. Kanapelka
Demographic Estimation of Human Feature from Facial Images
Anuradha .A.Thombre, Prof. K. P Wagh, S.S. Savkare
Multifactor Authentication System
Prof. A. J. Jadhav, Diksha Shetty, Apurva Marathe, Pralay Nawasare, Roshan Ramdas
Personal Authentication System for Illegal Usage of Arms
Chhaya C Athavale, Sivaraj K R, Pratik Jain, Bhagyashri Jogdand, Ankit Sharma
Efficient Secure Data Communications for Cognitive Radio using Clustering Techniques
Padmasri Yarlagadda, Bosubabu Sambana
Design of Ration Distribution System to Stop the Corruption Using AVR: A Review
Rita R. Chaudhari, Shraddha R. Parashar, Prof. M. R. Dhotre
Design of Reliable Multiplier with an Adaptive Hold Logic
Pradnya Pagar, Prof. M. Vanjale
A Survey on Load Balancing Techniques for Wireless Sensor Networks
Tanuj Kumar Mishra and Raj Kumar Paul
Design of Vision based Gesture Controlled Interface for UAV
Avinash Kumar Bussa
“Power Quality improvement using 24 Pulse bridge Rectifier for an isolated Power generation”
Miss. Anuja V. Jagtap
IPsec the Realm for Secure Communication in Internet of Things
Ms. Aishwarya Ashok Akul, Prof. Mrs. Snehal Bhosale
A Proposal of Optimal Strategy for Emptying the Buffer at the MIMO Transmitter based Spatial Multiplexing Techniques
Svetlana Furtula, Ranko Vojinović
A Survey on Multi sensor Agriculture Interface Using Smart Data Communication
Pritee V. Raiter, Ms. S. M. Borkar
Diagnosis and Detection of Skin Burn Analysis Segmentation in Colour Skin Images
B. Sabeena, Dr. P. Raj Kumar
A Case Study on Water Marking with Implementation of Least Significant Bit coding (LSB)
N.S. Murti Sarma and Santhosh
Detection of Pavement Distress and its Types using Fuzzy C Means Algorithm
Subashri, Shajun Nisha, Mohamed Sathik
Dynamic Stability Improvement of Multi Machine Power System
Naik Pal Nileshbhai, Dr. Ami T. Patel
Employee Tracking Using GPS
Lakshita Patel, Sukanya Nair, Ruchita Gunjal, Radhika Suryawanshi, Rachana Shinde, Mrs. H.A. Shinde
Multi-Label Classification for Online Feature Selection
M. Gopi Krishna, K. Purushottama Rao
A Study on Different Data-Analysis Techniques to Detect Fine Motions
Vidya Kumari, Rashmi
Evaluation of Fault Clearing Time in 9-Bus System for Numerical Protection
Padmini Sharma, Dr. R. N. Patel
A Survey Paper on Motion Object Detection System
Trupti K. Barsagade, Prof .D.T. Salunke, Punam V. Bitake, Sandhya B. Kendre, Shubhangi J. Kambale
An Efficient Privacy-Preserving Ranked Keyword Search Method
Prof. Supriya Bhosale, Akshay Khirolkar, Rohit Gaikwad, Bhushan Mirase, Vinod Bakse
Employee Tracking and Management
Vikramdas Vaishav, Vaibhav Ghatge, Mandar Bhosale, Diptesh Raut, Akash Shinde, Vrushali Sonar
A Comparitive Study of Malicious Node Detection Scheme in MANET
Ms. N.U. Tharini, Ms. K. Devipriya
Topological Conditions for Maintaining Stabilization of Dynamic System
Prof. Dilip Budhwant, Bhagyashri Bhalekar
Research and Analysis of Energy Efficient Monet for Malware Variants Detection System for Android
Khandagale Swati M, Mr. Shyam S. Gupta, Prof Sanjay Jain
A Parameter Optimized, Automatic Threshold Selection for Enhancing Edge Preserving Denoising and Segmentation
M. Divya, Dr. E. Mary Shyla
Privacy Preserving Techniques with Novel Tree Structure and Table for Utility Mining
G. Kiruthika, Dr. V. Umarani
Association Rule Mining using Optimization Techniques
M. Sunitha, Sunita A Yadward
A Predictive Approach for Blood Distribution through Data Mining Techniques
Ms. Priyanka Sheshrao Nerkar, Prof. Leena K. Gautam
Demonstration of Queue Management with Differentiated Services in Wireless Sensor Networks (WSN)
John Munyakayanza, Evariste Twahirwa, Jane Murerwa
Intelligent Bottle Filling Pick and Place Robot-A Review
Prof G.K Andurkar, Ms. Vishakha P Borkar, Ms. Jayashri V Mohurley
Survey of Energy Efficient Spectrum Sensing in Cognitive Radio Network
N. Priya, Dr. B. Rosiline Jeetha
Modified Enhancement Method for Poor Quality Fingerprint Recognition
Mohammed Alhanjouri, Waleed Abudalal
Design of Automatic Electricity Inverter
Narendra Nanotkar, Shubham Thakre, Gaurav Nagoshe, Akshay Donode, Ashish Thakre
A Continuous Authentication Approaches for Data Security Services against Reconstruction Attacks using Multiple Biometric
Mrs. S. Gunasundari M.Sc., M.Ed., M. Phil, Miss. R. Punitha
Reliable Multi Authority Authentication and Attribute-Based Encryption System for Distributed Data Security
Mrs. S. Yoga, Mrs. Kanagavalli
Structural Boundaries Detection of Ice Floe of Sea Ice using T-Snake GVF
P. Alaguthai M.SC., M.Phil., C. Sindhuja M.SC., M. Phil.
Medical Image Segmentation of Pancreas using D-Sift Algorithm
S. Kavitha, M.Sc., M. Phil., (Ph.D), P. Anusha MCA, M. Phil
Simulation and Analysis of PBA under Vehicular Networks
S. Anugraha, K. Bhuvaneswari, J. Indumathi, S. Sona, S. Sivanesskumar M.E., Ph.D.,
Analysis of Joint Estimation of CFO, I/Q Imbalance& Channel Response for OFDM MIMO Systems
Rajat Srivastava, Mr. Mukesh Tiwari
Healthcare Analysis using Olex Genetic Algorithm
Ms. Priyanka Shivagunde, Dr. Ms. Anita R Kulkarni
Efficient Design of Low Pass Fir Filter by Rectangular, Taylor and Kaiser Window Techniques
Pramod Yadav, Shankarlal Sahu, Pranay Kumar Rahi
Data Mining and Analytics: A Proactive Model
Vishesh S, Manu Srinath, Vivek Adithya, Sumit Kumar Sourav, Ashwani Kumar Singh, Vyshnav L
Project Progress Tracking System
Pawan Khade, Heena Ramteke, Hemant Shivhare, Pranjali Chandekar, Namrata Baware
Comparitive Study of Image Compression Algorithms on Bench Mark Suite
A.J. Rajeswari Joe, N. Rama
Contrivance Planning Management System
Kiruthika P, S. Shanmugapriya, L. Priya
An Approach for Fingerprint Feature Extraction using Bit Plane and Classification with ANN
Gagandeep, Er. Harshdeep Trehan, Er. Varinderjit Kaur, Dr. Naveen Dhillon
Addressing Multilabel Classification Problem Via Co-evolutionary Learning Algorithm
Gayatri T. Urade, Prof. Pravin G. Kulurkar
Abstract
Analysis of field Distribution and Characteristic Performance of Induction Motor with Faults by Using Finite Element Method
Dr. Khaleel J. Hammadi
DOI: 10.17148/IJARCCE.2017.6202
Abstract: The basic methods of diagnosis broken rotor bars is presented in this paper. The time stepping in finite elements techniques is used and investigated in details. Widely comparison of introduced methods with another techniques shows that the suggested technique provides fast and accurate path to diagnosis the faults earlier which consider efficient way to reduce the faults in induction motors by mean of time different of torque in healthy and faulty motors and stator current waveforms. Additionally, the flux distribution is considered as the third techniques in this study. A result shows the fast extraction of faults in the induction motors and new developing techniques is founded.
Keywords: squirrel cage, induction motor, healthy and faulty motor, FEM.
Abstract
Providing security for Association Rules Mining in Distributed Databases Result analysis
Pankaj P. Joshi, Prof. R. M. Goudar
DOI: 10.17148/IJARCCE.2017.6203
Abstract: Quick change in the field of information technology raises the significant issue about gigantic data storage. To build up the connection among set of data items, likewise gets to be troublesome test. To defeat these issues in large data, association rule mining does a vital part. As of late, the vast majority of the analyst's purpose of intrigue is to increase the effectiveness of association rule mining based algorithm and accordingly expanding the speed of mining. In existing framework, association rules are applied on horizontal partitioned database and such strategy is relying on upon IDMA, EMADS communication. In this paper, we consider both horizontal and vertical partitioned database, while applying association rule mining framework likewise attempting to minimize the communications overhead. Further to upgrade the security of framework, RC4 algorithm is utilized to secure the horizontal and vertical partitions of database. At last framework uses the protocol for perceiving the fake and duplicate frequent rules.
Keywords: Data mining, Apriori, Distributed databases, Frequent item set, association rules.
Abstract
Cutomized Prediction of Heart Disease with Adaptive Neuro Fuzzy Inference System
Shanthi S
DOI: 10.17148/IJARCCE.2017.6204
Abstract: Cardiovascular Diseases are the leading cause of death globally.Cardiovascular disease is a class of diseases that involve the heart or blood vessels. It includes coronary artery diseases (CAD) such as angina and myocardial infarction (commonly known as a heart attack). There is a need for medical practitioners to predict the heart disease before they occur in the patients. Nowadays use of computer technology has in the field of medicine has highly increased. Application of Artificial Intelligence would help for the complex and uncertain medical tasks such as diagnosis of diseases [2]. The main focus of this paper is to develop a neuro fuzzy system that would analyse the various life style parameters of a person and give a feedback on the health factor related to Cardiovascular Diseases.
Keywords: ANFIS, Heart Attack, Prediction, Risk factor.
Abstract
Design and Implementation of Automated Car Parking System using RFID
Bhenesha Shree
DOI: 10.17148/IJARCCE.2017.6205
Abstract: Present industry is increasingly shifting towards the field of automation. This Project proposes an idea on the development of car parking system with its improved successful parking. It is an innovative payment system that provides the ultimate solution for drivers, municipalities and private parking lot owners. Simple and cost effective to implement, this project acts as a standalone system or alongside traditional parking payment systems to eliminate fraud and reduce cash handling.
Keywords: Smart parking system, RFID, H bridge circuit, sensor circuitry.
Abstract
Load Balancing using Amazon Cloud Services
Prof. Vidya Chitre, Kaustubh Katkar, Shriraj Bamne, Vishwanath Prasad
DOI: 10.17148/IJARCCE.2017.6206
Abstract: One of the most appealing factors about any distributed task execution system is its processing speed to process the large amounts of data presented by incoming inputs. With increasing scope and popularity of Cloud services in Industrial applications it becomes important to achieve speeds over the Cloud which should be equal to or, if possible, faster than the existing traditional computing structure. Today, most of the existing frameworks utilizing Cloud services are based on Master/Slave architecture. The limitations associated with these Master/Slave architectures include lack of scalability and a single point of failure, the point of vulnerability being the Master. Our proposed system, LoBUCS, will provide better scalability and fast processing of HPC [4] and MTC [2] workloads using a fully parallel Client-Worker based structure eliminating the single point of failure. By utilization of Amazon Web Services (Amazon EC2 [5], DynamoDB [7] and SQS [6]) we will be substituting the complexity of existing distributed job management systems while maintaining good utilization.
Keywords: Cloud Services; parallel processing; distributed scheduling; LoBUCS.
Abstract
Android OS for Embedded Real-Time Systems
Smita Sontakke, Jagruti Thombare, Pournima Lad
DOI: 10.17148/IJARCCE.2017.6207
Abstract: Since Android is recently publicly introduced, Android has taken the interest from companies and the common Audience. This software platform has been constantly enhanced either in term of features or supported hardware; these are extended to new types of devices different from the originally contracted mobile ones. However, there is a feature that has not been researched yet - its real-time capabilities. This paper proposes to remove this gap and provide a basis for discussion on the appropriateness of Android in order to be used in Open Real-Time environments. By analysing the software platform, with the main goal of the virtual machine and its underlying operating system environments, we are able to point out its current restrictions. And using this, we are able to provide a hint on different angel of directions in order to make Android suitable for the environments. It is our position that Android may contribute a suitable architecture for real-time embedded systems, but the real-time community should address its restrictions in a joint effort at all of the platform layers.
Keywords: Android, Open Real-Time Systems, Embedded Systems, Suitability.
Abstract
Session Passwords Using Grids and Colors for Web Applications and PDA
Pragati Patil, Nivedita Mhatre, Shobhana Gaikwad
DOI: 10.17148/IJARCCE.2017.6208
Abstract: In authentication, textual password methods are mostly used. But textual passwords are unsafe to eves dropping, dictionary attacks and shoulder surfing, dumpster diving. Graphical passwords are imported as different techniques. Maximum graphical schemes are unsafe to social engineering. To point this problem, text can be combined with images or colors to create session passwords for verification. Passwords can be used once and every time a new password is provoked. There are some procedure which are proposed to developed passwords using colors and text which are resistant to shoulder surfing. Personal Digital Assistance is a relevant technique.
Keywords: DAS, PDA, PIN, Color Code.
Abstract
Classification of Cancer Datasets using Artificial Bee Colony and Deep Feed Forward Neural Networks
M. Karunyalakshmi, Dr. N. Tajunisha
DOI: 10.17148/IJARCCE.2017.6209
Abstract: The improvement of microarray technology has facilitated scientists in the direction ofmonitor mRNA expression level of up toward tens of thousands of genes concurrently, inside just one single experiment on a solid surface, made of any glass or silicon. The huge amounts of dataset samples are then exploitedthrough biologists in the direction ofclassify cancer-related genes by means of comparing their expression values in healthy and cancerous tissues. Though, microarray dataset samples generally have thousands of genes or features and simply dozens of samples. Handling of huge amounts of dataset samples are most important challenging task in microarray dataset samples classification .So feature selection or reduction is akey important step in classification of microarray dataset samples with many thousands of features. As a wrapper method, Support Vector Machine-Recursive Feature Elimination (SVM-RFE) is one of the most important feature selection techniques. Though SVM-RFE is able toeliminate irrelevant features successfully, it mightn�t deal with the majority of the irrelevant features. In addition SVM-RFE also performs better than other methods by considering threshold value?. They mightbe several numbers of ways for choosing of this parameter thusresults higher performance or improved performance. But sometimes they decreases results of the classifier, to solve this problem Artificial Bee Colony (ABC) is introduced in this paper for automatic selection of threshold ? toward enhance classification results in terms of accuracy, precision and recall.This ABC algorithm is performed based on the behavior of colony of three bees: employee, onlooker and scout bees. Then, Deep Feed Forward Neural Network- Recursive Feature Elimination (DFFNN-RFE) is introduced for classification of microarray dataset samples. In DFFNN classifier is the performed based on the calculation of probability distributions that stochastically adjust small parts of the input data for the period of training phase. In addition the proposed work correlation coefficient is introduced in order to filteringof highly redundant features before performing DFFNN-RFE classifier. The experimentation results conclude that the proposed DFFNN-RFE classifier performs better when compared to a nonlinear SVM-RFE, classifier in terms of classification accuracy, precision and recall to cancer dataset.
Keywords: microarray technology, Support Vector Machine(SVM), Recursive Feature Elimination (RFE), Deep Feed Forward Neural Network(DFFNN), Artificial Bee Colony (ABC), feature selection, classification.
Abstract
Weather Data Analytics using MapReduce and Spark
Priyanka Chouksey, Abhishek Singh Chauhan
DOI: 10.17148/IJARCCE.2017.6210
Abstract: Weather data analytics is very important in every aspect of human life. Weather plays a crucial role in every sectors like agriculture, tourism, government planning, industry and many more. Weather has various parameters like temperature, pressure, humidity and wind speed. The meteorological department from every country has deployed sensors for each weather parameter at various geographical locations. From these sensors weather data is collected on a daily basis. This data is stored mostly in the unstructured format. Due to this, huge amount of data has been collected and archived. Hence, storage and processing of this data for accurate weather prediction is a big challenge. Big data technology like Hadoop and Spark have evolved to solve the challenges and issues of big data using distributed computing. Till date few studies have been reported on the processing of weather data using MapReduce. Similarly, Spark which is the emerging technology claims to be in-memory computing can be applied for weather data analytics. This project presents the analysis of weather data by calculating minimum, maximum and average values of weather parameters. The code is implemented in both MapReduce and Spark to study their relative performance for the weather data analytics.
Keywords: Big Data, Hadoop, Spark, MapReduce, Weather Data Analytics.
Abstract
Implementation to Provide Security for Data in Cloud using Huffman Compression Approach
B. Anil Babu, K. Venkateswara Rao
DOI: 10.17148/IJARCCE.2017.6211
Abstract: Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. To keep sensitive user data confidential against un-trusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. These solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine grained data access control is desired. Open issue by defining and enforcing access policies based on data attributes and allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to un-trusted cloud servers without disclosing the underlying data contents. Several schemes employing attribute-based encryption (ABE) with Huffman compression has been proposed for access control of outsourced data in cloud computing. As Cloud Computing requires additional security which is provided using HASBE and this can emerge as a new security feature for various organizational platforms. It is implemented using cipher text policy by encrypting and decrypting the data in the cloud so that the cloud system becomes more scalable and flexible by enforcing data owners to share their data with data consumers controlled by the domain authority.
Keywords: Un-trusted servers, data owner, key distribution, Cipher text, data consumer.
Abstract
Design and Analysis of Track and Hold Circuit for Wireless Communication
Smita D. Waghmare, Dr. U. A. Kshirsagar
DOI: 10.17148/IJARCCE.2017.6212
Abstract: This Paper introduces conventional track and hold circuit using Microwind 3.1 VLSI Backnend Software A very fast and linear T & H circuit is the key element in any modern wideband data acquisition system. Applications like a cable-TV or a broad variety of different radio standards require high processing speeds with high resolution. The track-and-hold (T&H) circuit is a fundamental block for analog-to-digital (A/D) converters. Its use allows most dynamic errors of A/D converters to be reduced, especially those showing up when using high frequency input signals. This paper shows the result of module of conventional track and hold circuit made by using Microwind 3.1 VLSI Backend Software. It shows that the circuit consumes less power which is 9.083 uW. Chip area will also be less as the design technology is 32 nm.
Keywords: Track and Hold circuit, low power consumption, low chip area, sampling switch.
Abstract
Classification of Respiration Disorders with its Effectiveness under Different Treatments for Sensor Dataset
M. Saranya, Dr. N. Tajunisha
DOI: 10.17148/IJARCCE.2017.6213
Abstract: Respiratory disease is a medical term that encompasses pathological conditions affecting the organs and tissues that make gas exchange possible in higher organisms, and includes conditions of the upper respiratory tract, trachea, bronchi, bronchioles, alveoli, pleura and pleural cavity, and the nerves and muscles of breathing. Respiratory diseases range from mild and self-limiting, such as the common cold, life-threatening entities like bacterial pneumonia, pulmonary embolism, and lung cancer.In Upcoming days current means of diagnosis are obtrusive and ill-suited for real time applications. The respiration disorder features classification was achieved through various classification techniques. However, Support Vector Machine (SVM) and Decision Tree Bagging (DTB) based classifier does not have better accuracy for respiration disease prediction and also for cloud services to have flexible capacity for both storage and signal processing. Artificial Neural Network (ANN) and K-Nearest Neighbor (KNN) classifiers are having high computational cost. And also the above mentioned classification techniques have high sensitivity, time complexity is high due to long training process, and also it uses only offline data loggers. So we propose effective classification techniques with convenient and low cost automatic diagnosis method that uses wearable MEMS sensor technology. This sensor technology detects different types of respiratory disorders by means of changes in diameter of chest wall during breathing and also their parameters are computed. Then features are extracted and selected by Correlation-based Feature Selection (CFS). These features are classified by using Learning Vector Quantization (LVQ) and Modified-Fuzzy min-max classifier using Compensatory Neurons(M-FMCN) to get more accuracy, to reduce sensitivity, to use online data loggers, to reduce time complexity and to reduce the computational cost compared with SVM, DTB, ANN and KNN. We also propose some effective and drug free Breathing Therapy which helps patients to recover from respiratory problems without medicines. Finally, the experimental results show that the effectiveness of the proposed classification techniques compared with the other classification techniques.
Keywords: Respiratory disease, Support Vector Machine(SVM), Decision Tree Bagging (DTB),Artificial Neural Network (ANN), K-Nearest Neighbor (KNN),Feature Selection, Feature Classification, Learning Vector Quantization (LVQ), Modified-Fuzzy min-max classifier using Compensatory Neurons(M-FMCN).
Abstract
A Survey on Software Defined Networking in IoT
Prof. Swati Joshi, Arnab Dutta, Neeraj Chavan, Gaurav Dhus, Pratik Bharsakle
DOI: 10.17148/IJARCCE.2017.6214
Abstract: The IoT will connect many of the domestic devices in the world, from smart thermostats to smart vehicles. By the end of 2015, we already had 9 billion connected things. According to the Gartner prediction the number of devices in the network will surpass 50 billion by 2020. The majority of the connected devices in the current network are based on obsolete security infrastructure and encryption, while many of them do not have provisions to update these devices remotely. Considering the number of the IoT devices, from off-the-shelf motion monitoring to bespoke instrumentation, it�s impossible to control which functions are back-ending any specific service or product. This is the problem in a nutshell: One can�t trust the integrity of the end device�s security and determine exactly where the data is being processed and stored. The architecture of SDN is designed to escalate progress in routing and networking performance for the current networks by isolating the control plane from the data plane. This basic concept of Software Defined Networkingcan be applied to IoT Multinetworks; however, the common SDN implementations designed for wired networks are not directly amenable to the distributed, ad hoc, low-power, mesh networks commonly found in IoT systems. SDN assuresadvancements in overall lifespan and performance of IoT networks.However, the SDN architecture changes the IoT network's communication patterns, which leads to a new approach to manifest the security IoT network. The centralized control of data layer and control layer will not only make the management of data packets easier but will also increase the security. As mentioned above, the quantity of data flowing in these systems is considerably huge. Proper traffic management and load balancing will help to take some extra effects towards the cause of making data flow easier. Power consumption of the total system can be reduced due to the central station, which requires lesser power than distributed control. In summation, the introduction of SDN in IoT will make IoT more useful and instigate IoT into the regular lives of people.
Keywords: Software-Defined Networking (SDN), controller, OpenFlow, OpenDayLight.
Abstract
An Enhanced Reliable and Protective Method for flexible distributed Storage in Cloud Computing
B. Durgalakshmi, S. Rakoth Kandan
DOI: 10.17148/IJARCCE.2017.6215
Abstract: Cloud applications can utilize the file management system without the trouble of fixings. We are detaching some guarantee contingency against the regularity and availability in the cloud environment. We propose in this paper to enhance the flexible distributed storage with very lightweight communication and computation cost. It does not only ensure strong cloud storage, but also achieves fast data error localization. The proposed design further supports secure and efficient dynamic operations on outsourced data including block modification, deletion, and append[3][4]. Analysis shows the proposed scheme is highly efficient and flexible against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Keywords: Trustworthy, Cloud storage, Key generation, Token Generation.
Abstract
Fuzzy Rule Based Classifier for Student Data using Map Reduce
Gayatri Nair, Shankar M. Patil
DOI: 10.17148/IJARCCE.2017.6216
Abstract: In the world of technology, enormous and complex data i.e. termed as Bigdata can be easily handled using latest processing tools and methods. One of the field dealing with such vast data is the education system for which various applications for processing, classifying and so on has been implemented. Various works include classification of student data to evaluate the performance of the student, Mining Social Media Data for Understanding Students� Learning Experiences, evaluating and predicting student performance before admission to the college as well as evaluating the suitability of the entry exams. Taking reference of these works classification of students academic dataset inorder to find which university he/she can get admission into is the focus of this paper. To be able to deal with this problem definition the usage of fuzzy rule based classification system has been proposed, using Fuzzy ID3 algorithm. This method is based on the MapReduce framework, one of the most popular approaches for big data nowadays.
Keywords: Big data, Fuzzy rule, Classification, Hadoop, Mapreduce, uncertainty.
Abstract
Improved Tag Cloud by Cleaning Tags using Context Free Data Cleaning
Sohil D. Pandya, Rinku Chavda
DOI: 10.17148/IJARCCE.2017.6217
Abstract: In this span of erudition of information, Universities can lead competitive advantage of searching of resources only by trained data analysis. This paper highlights context free data cleaning for improved tag cloud by correcting values of user defined �Tags�, using different string similarity metrics, where �Tags� are assigned by users which related to referenced resource. Authors propose a procedure to scrutinize suitability of value to correct other values of Tags. Several string similarity metrics were used, to find distance of two different strings and generate results. Experimental results show how the approach can meritoriously clean the data without reference data.
Keywords: Context free data cleaning; Information Retrieval; String similarity metrics; Tag Cloud.
Abstract
“A Secure E-voting System using Biometrics Authentication Methods for Android”
Prof. P. B. Dhamdhere, Abhishek Kasar, Nilesh Satpute, Priyanka Lekurwale
DOI: 10.17148/IJARCCE.2017.6218
Abstract: The android voting system is an android application that provides a new technique of casting votes using mobile phones. This application is especially developed for organizations, corporations and commercial businesses to get employees opinions whenever there is any new policy implemented or any issue being investigated or during controversies. The project provides an effective solution in resolving all the arguments that occurs in organizations by considering all employees opinions. The system has an admin login that has overall control over it. Admin feed the issues or arguments in the system along with desired options. These questions can then be visible to all the employees through android devices. Employees have to first create an account into the system for casting their votes. At the end of the voting process the system counts all the votes casted and generates a brief report of the total votes accounted for yes, no and neutral. Eventually, the report is made available to admin and he may view the maximum votes casted for. Hence the system helps admin to receive appropriate response from employees for the matters in question.
Keywords: Android Application, Biometrics, Authentication Methods, Organizations, Corporations.
Abstract
Load Frequency Control for 3 Area Interconnected Power Systems
Neha M. Tandel, Dr. Ami T. Patel
DOI: 10.17148/IJARCCE.2017.6219
Abstract: Nowadays bulk power system is consisted of multiple interconnected controllable areas. In Interconnected power system, small disturbance occurs in load at any areas that causes the fluctuation of frequency at each and every area. Also fluctuate the power flow between the different areas. So, the main objectives of LFC are to maintain the frequency to its nominal value and scheduled the power exchange between the areas. LFC scheme contain the appropriate control system for an interconnect power system, which have the capability to bring the frequency of each area and tie line power back to its specified nominal value. For this consider three hydro thermal area.
Keywords: load frequency control (LFC) scheme, Automatic generation control (AGC), battery energy storage (BES), AC/DC link .Generation rate constraint.
Abstract
Review on a Compressor Design and Implementation of Multiplier using Vedic Mathematics
Prof. Mrs. Y.D. Kapse, Miss. Pooja R. Sarangpure, Miss. Komal M. Lokhande
DOI: 10.17148/IJARCCE.2017.6220
Abstract: The Urdhva- Tiryagbhyam Sutra of Vedic mathematics and we have designed multiplier based on the sutra. Vedic Mathematics is the ancient system of mathematics which has a unique technique of calculations based on 16 Sutras which are discovered by Sri Bharti Krishna Tirthaji. We implement the basic building block: 16 x 16 Vedic multiplier based on Urdhva- Tiryagbhyam Sutra. This Vedic multiplier is coded in VHDL and synthesized and simulated by using Xilinx ISE 13.2. Further the design of array multiplier in VHDL is compared with proposed multiplier in terms of speed and memory. With the advent of new technology in the domain of VLSI, communication and signal processing, there is an ever going demand for the high speed processing and low area design. In this paper, introduces modified compressor based multiplier architecture. This modified structure uses the 4:2 compressor and 7:2 compressor architectures. In addition to that it uses Vedic mathematics to get a high speed multiplication operation and low area design. The design and experiments carried were carried out on a Xilinx Spartan 3E series of FPGA and discussed about the results of area and speed.
Keywords: High speed multiplier, 4:2 compressor, 7:2 compressor, modified architecture, vedic mathematics.
Abstract
Review on Business Intelligence Solutions in Healthcare Sector
S. S. Kulkarni, Neena Chaudhari, Jishan Mulla, Abha Kamble, Basit Sofi
DOI: 10.17148/IJARCCE.2017.6221
Abstract: Business Intelligence applications are trending now-a-days in many different fields. Recent new area of using this application is in healthcare. This paper focuses on the different approaches taken for data management and improving the outcomes of previous BI systems such as providing up to date and accurate system performance (such as data warehouse model, analysis services and reporting services) through BI applications. Also, different tools used in BI systems are discussed in the paper.
Keywords: BI (Business Intelligence), ETL (Extraction, Transformation, Loading), Data Warehouse, Healthcare.
Abstract
Decentralized Access Control with Anonymous Authentication and Auto File Publishing in Cloud
Dr. A. N. Banubakode, Akshata Kulkarni, Harsha Kumble, Madhubala Chandak, Sanjana Prasad
DOI: 10.17148/IJARCCE.2017.6222
Abstract: In today�s world, the communication network is widely developed. You can send the texts as well as files, also it can be shared in one or many form. While communicating with the other person via medium, the registered details become transparent to the third party. What if we could demolish the transparency? We propose a cloud system where user can upload, download, view and also share data by keeping his identity anonymous. The application can be an anonymous sharing system for government where user can bring into notice the certain issues of government by keeping his identity secured. It is also important to ensure that respective file is delivered to the authorities in any case.
Keywords: anonymous sharing system, decentralized, access control, timer function, double authentication.
Abstract
Crucial Role of Artificial Intelligence and Robotics in Different Field
Anupam Bonkra
DOI: 10.17148/IJARCCE.2017.6223
Abstract: With the growth of technology there are lots of changes overwriting the human effort in many field The concept of Artificial Intelligence and Robotics systems play very major role in all fields. The Artificial Intelligence is the subpart of computer science with is based on automaticity. It become the very trendy field in computer science day by day In future the concept of Artificial Intelligence will replace the human efforts in all areas. Artificial Intelligence is revealed with the help of machine or software and in today�s time the very big machine which having with AI is Robotics. The Robotics is branch of AI which explores the designing, manufacturing and working phase of all application. The AI and Robotics is act as an expert system and this expert system is used to solve the complex problem in different areas like engineering, business, medicine, weather forecasting etc. The vicinity utilizing the technology of Artificial Intelligence have seen enhance in the quality and efficiency. This paper will given the generalize view of Robotics technology and Artificial Neural Network This paper also explore the application areas of this technology is widely in use. By this paper we could also explore the locomotion process used in robotics.
Keywords: Artificial Intelligence, ANN, Bayesian ANN, Robotics, Locomotion, Back propagation Algorithm.
Abstract
Monitoring and Connecting Vehicles using RFID
M. Nihal Chidambaram, Ravinder Kumar, P. Srikanth
DOI: 10.17148/IJARCCE.2017.6224
Abstract: With the number of vehicles increasing on the road, there is always a need for smarter and safer way to travel. The present day trend in the automotive industry is to connect cars and their occupants to the outside world. The Internet of things [1] gathers data from every device and links it to the internet. The device can be anything from coffee makers, televisions, washing machines, alarm clocks, cars etc. RFID [2] bridges the gap by collecting, storing and supplying the data. RFID can be viewed as the one which provides the input to IOT. RFID uses the radio waves to transmit data. This paper focuses on uniting IOT and RFID technology together to provide solution for connecting the vehicles. This will not only lead to advancement in the automobile industry but also provide a greener, safer and cheaper mode of transportation to the users.
Keywords: IOT; RFID; electronic product code; connected cars; induction.
Abstract
Implementation of Indoor Wireless Tracking System using Wi-Fi
Payal Tat, Manisha Nimbekar, Aboli Varpe, Sayali Gadade, Swati Khodke
DOI: 10.17148/IJARCCE.2017.6225
Abstract: We typically use wireless location network for getting direction to a particular area using GPS. We can effectively track and map the location we visit, however GPS cannot be applied in the indoor environment. Hence to save the cost we use RSSI- based trilateral location algorithm. This algorithm is one of the most used algorithms in sensor based network using Wi-Fi. We can calculate the current location of the mobile devices and navigate to a particular destination and use minimum mobile battery. Indoor navigation is one of the newest innovation in the mobile technology and we use extensively.
Keywords: WiFi, Tracking, Indoor, Mapping, blueprint, navigation.
Abstract
A Study on Data Mining & Machine Learning for Intrusion Detection System
Rashmi Ravindra Chaudhari, Sonal Promod Patil
DOI: 10.17148/IJARCCE.2017.6226
Abstract: This study paper describes a literature survey focused on machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection. Descriptions of each ML/DM method are provided shortly. Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized. Because data are so important in ML/DM approaches, some well-known data sets used in ML/DM are described. The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/DM for security is presented, and some suggestions on when to use a given method are provided.
Keywords: Machine learning, data mining, intrusion detection, etc.
Abstract
Review of Patient Alert System
Prof. M. P. Mahajan, Sheetal N. Shinde, Shubhada B. Ugale, Arti S. Sonawane
DOI: 10.17148/IJARCCE.2017.6227
Abstract: The wireless monitoring of patient have a great importance in the field of medical. With the help of micro sensors which are integrated into wireless communication networks, the physiological parameters of patient can be remotely collected and monitoring using traditional medical instruments can be avoided. In this project the monitoring of the patient is done by the doctor continuously without actually visiting the patient. Here, we make use of various sensors to sense the body parameters like pulse rate, temperature, blood pressure etc. This sensed signal is transmitted to Node MCU to update the data continuously. Using ADC which will convert this analog data into digital data through internet web portal, the data is sent to the monitor screen of the doctor�s cabin wirelessly. Hence, doctor can access the patient from anywhere.
Keywords: Physiological Parameters, Data base, ADC, Various Sensors, OLED screen, Internet Web Server, Clouding.
Abstract
Multipattern Matching Algorithm on GPGPU
Bhagyashri Chhagan Wadile, Prof. N.R. Wankhade
DOI: 10.17148/IJARCCE.2017.6228
Abstract: GPU Computing have attracted lots of attention due to their large amount of data processing. The algorithm proposed in this paper is use for exact pattern matching on GPU. Among some famous algorithms, the Aho-Corasick Algorithm match multiple pattern simultaneously. a Traditional Aho-Corasick Algorithm matches the pattern by traversing state machine, known as Deterministic finite automata(DFA).Signature matching is important Technique in virus/worm detection, but Aho-corasick algorithm was developed only for string and virus/worm signature could be in regular expression . In this research work new guidelines are proposed for an efficient GPU adaptation of Aho-corasick algorithm for regular expression matching. Also several technique is introduced to optimization on GPU, including reducing global memory access, storage format for output table. To evaluate performance proposed system will use SNORT virus database. Proposed algorithm Implemented on NVIDIA GTX-680 Graphics card using CUDA.
Keywords: Aho-Corasick, CUDA, Graphics processing Unit, Pattern Matching.
Abstract
Home Automated Smart Mirror as an Internet of Things (IoT) Implementation – Survey Paper
Jane Jose, Raghav Chakravarthy, Jait Jacob, Mir Masood Ali, Sonia Maria D’souza
DOI: 10.17148/IJARCCE.2017.6229
Abstract: The future of Home Automation depends on Internet of things or IoT. Though the applications of IoT are diverse, the one that concerns the common man is how it can be used to make day to do life easier and faster. This is where Home Automation using IoT comes into the picture. In this paper, we demonstrate the function and working of a smart home mirror. The mirror will possess the ability to display date and time, the current weather condition and outside temperature, reminders, to-do lists and traffic conditions. These features of the mirror will be scraped from the Internet and implemented using the raspberry pi board. The pi board is programmed with the Raspbian operating system which is part of Linux. The mirror will also be lightweight, adjustable, durable and aesthetic. This paper presents the implementation and application of the smart mirror and how it is an integral part of home automation.
Keywords: Internet of Things, Raspberry Pi, Home Automation, Mirror, Networks, User Interface, Machine Learning.
Abstract
An Efficient Geometric Routing using Convex Hull Tree Information in Geographic Protocol
T. Nivetha, S.R. Lavanya
DOI: 10.17148/IJARCCE.2017.6230
Abstract: Geographic routing is of interest for sensor networks because a point-to-point primitive is an important building block for data-centric applications. Present a new geographic routing algorithm, Improved Greedy Distributed Spanning Tree Routing (GDSTR), which finds shorter routes and generates less maintenance traffic than previous algorithms. While geographic routing potentially scales well, it faces the problem of what to do at local dead ends where greedy forwarding fails. Existing geographic routing algorithms handle dead ends by planar zing the node connectivity graph and then using the right-hand rule to route around the resulting faces. The proposed system the definition of a new kind of spanning tree, which called hull tree, for use in networks where each node has an assigned coordinate. A hull tree is a spanning tree where each node has an associated convex hull that contains within it the locations of all its descendant nodes in the tree. Hull trees provide a way of aggregating location information and they are built by aggregating convex hull information up the tree. This information is used in routing to avoid paths that will not be productive; instead we are able to traverse a significantly reduced sub tree, consisting of only the nodes with convex hulls that contain the destination point uses new kind of spanning tree, which it calls hull tree, for use in networks where each node has an assigned coordinate. The experimental result show the best performance to reduce routing overhead and less delay compare with existing routing protocol.
Keywords: Geographic Routing, Greedy Distributed Spanning Tree Routing, Hull Tree, Routing protocol.
Abstract
“Comparative Study of Feature Extraction and Classification Techniques for Handwritten Devanagari Script”
Puja Ujwal Talole, P. E. Ajmire
DOI: 10.17148/IJARCCE.2017.6231
Abstract: The Indian Government has recognized Hindi and English both as official languages, under the VIII scheduled, along with 22 languages. Most of the optical character recognition research work has been done on Devanagari, Telgu, Arabic, and Bangla script. The selection of feature extraction and classification technique is the important to achieve the best accuracy of any recognition system. Features collect the data about the character and accordingly classifier classify the character uniquely. This paper, deals with the studied of the Feature Extraction and Classification techniques for the handwritten Devanagari script.
Keywords: OCR, Feature Extraction, segmentation and Classification techniques.
Abstract
Improved Pass-Matrix for Graphical Authentication
Harsha Mathur, Vijay Lokhande
DOI: 10.17148/IJARCCE.2017.6232
Abstract: Graphical authentication is widely used everywhere these days. Graphical authentication schemes are broadly categorized as recognition based, recall based and cued-recall techniques. All the techniques which comes under these categories are discussed in this paper. In this paper an improved pass matrix scheme is proposed and analysis is done by 50 random users and it is found that proposed scheme provides a secure and more convenient way of graphical authentication.
Keywords: Graphical Authentication, cued-recall techniques, proposed scheme, D�j� vu, Passfaces.
Abstract
Improved KNN and other Supervised Machine Learning Approaches based on Discretization
Kalpana Kushwaha, Amit Thakur
DOI: 10.17148/IJARCCE.2017.6233
Abstract: Supervised machine learning approaches have been widely used in many applications. In this paper approaches namely Na�ve Bayes, Bayesian Net, J48, Random Forest and KNN have been discussed. These algorithms are tested for sample dataset which is present in raw form. Then normalization is performed on this dataset. Precision and Accuracy has been compared for all these algorithms before and after normalization. Implementation of all these algorithms has been done using Weka. Weka is an open source tool for machine learning.
Keywords: Supervised machine learning, normalization, Weka.
Abstract
Image Enhancement of underwater Digital Image using L*A*B color space on Unsharp Masking
Shivika Saini, Pawan Kumar Mishra
DOI: 10.17148/IJARCCE.2017.6234
Abstract: The underwater digital images generally suffer from blur, low contrast, non-uniform lighting, and diminished color. Digital image filtering in an important approach towards image enhancement. It involves the manipulation and interpretation of digital images. Images may get noisy due to various factors then filtering of images is become an important operation to de-noise the noisy images. Image sharpening must be performed to achieve it. This research paper proposed a preprocessing technique based on image to improve the quality of underwater digital images. We use Unsharp masking on l*a*b color s which sharpen the underwater digital image.
Keywords: Image enhancement, MIXED CLAHE, L*A*B color space, Unsharp masking, Pre-processing Underwater Image.
Abstract
Request Scheduling Techniques in Large Scale Computing Environments
R. Arokia Paul Rajan
DOI: 10.17148/IJARCCE.2017.6235
Abstract: Resource management is a crucial area of research since the emergence of large-scale computing environments. The user�s satisfaction these computing systems depends on the efficiency of resource provisioning. Request Schedulingis a key component of resource provisioning and management. Continuously improving the efficiency of request schedulingprinciples significantly enhances the performance of these systems. A detailed survey of literature presented in this paper helps to understand the course of research in this area.
Keywords: load balancing, client/server, peer-to-peer, grid, cloud.
Abstract
Detection of Intrusion in Wireless Sensor Networks with Low Power Consumption
A. Saran Kumar, M. Sangeetha
DOI: 10.17148/IJARCCE.2017.6236
Abstract: In a network or a system, any kind of unauthorized or unapproved activities are called Intrusions. An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. An IDS inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. They act as the first line of defense for our computer systems. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms with less power consumption rather than current signature-based detections are in demand. In this paper, we propose a solution using LEACH protocol to detect intrusion with low power consumption and also to increase the level of security. LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks to identify the intrusions. In Watchdog-LEACH, some nodes are considered as watchdogs and some changes are applied on LEACH protocol for intrusion detection. Watchdog-LEACH is able to protect against a wide range of attacks and it provides security and energy efficiency.
Keywords: IDS, Leach, AODV, Watch dogs.
Abstract
An Integration of Binary Bat Algorithm and Naïve Bayes Classifier for Intrusion Detection in Distributed Environment
Varuna S, Ramya R
DOI: 10.17148/IJARCCE.2017.6237
Abstract: A computer network is a collection of computer systems and other hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users. Even though static defence mechanisms such as firewalls and software updates can provide a reasonable level of security, more dynamic mechanisms such as Intrusion Detection Systems (IDSs) should also be utilized. Different detection techniques can be employed to search for attack patterns in the data monitored. Misuse detection and anomaly detection are the most widely used techniques. But they have their own drawbacks. To overcome those issues, hybrid methods are used. Hybrid classifiers are able to provide improved detection accuracy, but usually have a complex structure and high computational costs. Hence a new intrusion detection model is introduced in which feature selection is carried out and then with the selected features classification is performed. The binary bat algorithm is used for feature selection in Hadoop environment and then the samples with selected features are trained and tested using na�ve bayes classifier. Since it is carried out in a distributed environment, the execution time is greatly reduced and the detection rate is improved.
Keywords: Intrusion Detection System, Hybrid classifier, Naive bayes, Binary bat optimization.
Abstract
A Novel Cloud Based Application: Resolve
Pratik Mohapatra, Pratiba D
DOI: 10.17148/IJARCCE.2017.6238
Abstract: App Service is an integrated solution designed to streamline repeated coding functions, integrate with enterprise and SaaS systems, and automate business processes while meeting your needs for security, reliability, and scalability. App Service brings together the following existing Azure services - Websites, Mobile Services, and BizTalk Services into a single combined service, while adding powerful new capabilities. Mobile cloud computing is differentiated from mobile computing in general because the devices that run cloud-based Web apps rather than native apps. Users subscribe to cloud services and access remotely stored applications and their associated data over the Internet. Typically, mobile devices run a mix of Web-based and native apps. However, the trend is increasingly toward the mobile cloud.
Keywords: Microsoft, Microsoft Azure, HTTP, HTTPS.
Abstract
Survey on Online Transaction using Face Recognition
Namita Jain, Vikrant Mukkawar, Mahesh Jadhav, Prof. Shruti Sekra
DOI: 10.17148/IJARCCE.2017.6239
Abstract: The Increasing growth in E-Commerce market is very important in the world. During this online shopping, personal information security and Debit or Credit information increasing popularity of E-Commerce and they are major part . This paper provide the limited and necessary information for fund transfer using online transaction there by safe the customer data and confidence. A face recognition technology identify a person information through a digital image. It is automatically identify. It is mainly used in security systems. The face recognition will directly capture information about the human faces. It match the face identity in different angles. It is mostly used in airports. It will recognize the face identity and we can avoid some unwanted fraud using face recognition system .The main advantage of face recognition is used for fraud restriction and crime controlling purpose because face images that have been archived and recorded, so that it will help us to identify a person later. Face recognition is it identifies each skin tone which is individual of a human face�s surface, like the cheek, curves of the eye hole and nose etc. this technology may also be used in very dark condition and preventing identity theft.
Keywords: Online shopping, Information Security, Face Recognition.
Abstract
A Survey on Attribute-Based Secure Data Sharing Scheme in Cloud Computing
Akshay Choudhari, Dr. Emmanuel M
DOI: 10.17148/IJARCCE.2017.6240
Abstract: Cloud computing has become a booming research area due to its long-list advantages. The famous application of cloud computing is on-line data sharing. The data to be shared online is sensitive and huge. Hence, there is a need of secured data sharing scheme to prevent sensitive data from an unauthorized access. In cloud computing, data security and privacy is most important concern. Cloud computing system must maintain scalable, flexible and fine-grained data access control. Access control is a one of the finest research hot-spot and there are many access control policies that has been proposed and implemented. In this paper, we review Attribute-based Encryption (ABE) and its type KP-ABE, CP-ABE to achieve secure and efficient data sharing scheme in cloud computing. Furthermore, CP-ABE again modified into CP-ASBE, HABE and CP-WABE for lighten the access policy and relieving storage cost.
Keywords: Cloud computing, attribute-based encryption, data confidentiality, data sharing.
Abstract
Data Mining with Big Data under Cloud Environment – Opportunities, Issues and Challenges
R. Kabilan, Dr. N. Jayaveeran
DOI: 10.17148/IJARCCE.2017.6241
Abstract: We are awash in a flood of data today, the day-by-day generation of data becomes unprecedented scale. The true of it lies in collecting these data, explore and carry out some computations to get some significant information. This information can be derived using some data mining techniques. In short we can call big data as an asset and data mining is a technique that is used to provide data visualization. To perform these study data mining techniques can be used and also the big data methods under cloud environment.
Keywords: Data Mining, Big Data, Cloud Computing.
Abstract
Performance Enhancement of RMPA Parameters Using Circular shaped Split Ring Resonator with Rectangular Cross Strips Metamaterial Structure at 2 GHz
RamKishor. Sharma, Mahendra Kumar Pandey, Sandeep Kumar Agrawal
DOI: 10.17148/IJARCCE.2017.6242
Abstract: In this paper, Rectangular Microstrip Patch Antenna (RMPA) along with metamaterial which has circular Split Ring Resonator and Horizontal & Vertical Rectangular Strips structure is proposed at height of 3.2 mm from the ground plane. The RMPA with proposed metamaterial structure is designed to resonate at 2 GHz frequency. Here in this paper we mainly focused on increasing the potential parameters of microstrip patch antenna. Proposed metamaterial structure is significantly reduced the return loss and increased the bandwidth and directivity of the antenna with compare to RMPA alone. These improvements are due to the Double-Negative (DNG) properties of metamaterial structure that acts as a lens when placed in front of the RMPA. All the simulation work is done by using CST-MWS Software.
Keywords: Rectangular Micro strip Patch Antenna, Metamaterial, Bandwidth, and Return Loss.
Abstract
PDF to Excel Converter & Manipulator for Result Analysis in College Environment
Kaustubha Vaidya, Dharmesh Savaliya, Dhananjay Deshmukh
DOI: 10.17148/IJARCCE.2017.6243
Abstract: PDF (Portable Document Format) has become a lot of standard owing to its consistency of presentation between completely different underlying platforms, screens of hand-held devices. However, there's very little or no structure info in PDF documents, that makes the knowledge extraction and document understanding a difficult downside albeit later PDF supports tagging. Within the planned methodology, some table-like area are hand-picked 1st by some loose rules, so the convolution networks area unit designed and refined to work out whether or not the chosen area unitas are tables or not. Besides, the visual options of table areas are directly extracted and utilised through the convolution networks, whereas the non-visual info (e.g. characters, rendering instructions) contained in original PDF documents is additionally taken into thought to assist succeed better recognition results. The first experimental results show that the approach is effective in table detection.
Keywords: Desktop Web Applications, Centralizes Databases, PDF Document clustering, EXCEL Sheet Manipulation, Data Splitter, Table Detection and Extraction, Regular Expression.
Abstract
Detection of Actionable and Non-Actionable Street Bumps in Smart Cities
Rajhans Sanas, Aditya Patil, Amit Gawali, Prof. Kanchan Varpe
DOI: 10.17148/IJARCCE.2017.6244
Abstract: The proposed system has an infrastructure free approach for roadway detection and identification based on data collected through a smart phone application. There are very few systems available that provide detection of roadway obstacles using accelerometer. The proposed system concentrates on the problem of detecting and classifying roadway obstacles so as to differentiate between actionable and non actionable obstacles. The solution results can be obtained using machine learning algorithms which will be used to aggregate the acquired information. The proposed system is available on a social platform so that users would be able to provide indirect contributions towards development of smart city. The Data captured from the proposed system provides aggregated result of the obstacles irregularities being computed.
Keywords: Classification, machine learning, artificial intelligence, database system.
Abstract
An Adaptive Lossy Image Compression using Singular Value Decomposition and Wavelet Difference Reduction
D. J. Ashpin Pabi, N. Puviarasan, P. Aruna
DOI: 10.17148/IJARCCE.2017.6245
Abstract: Image generation, sharing and analysis play an important role for day-to-day life. An adaptive lossy image compression using singular value decomposition (SVD) and wavelet difference reduction (WDR) is proposed for the application of colour and gray scale images. The goal is to improve the quality and minimize the storage requirement. The proposed adaptive lossy image compression is composed of three main components. The first is the application of SVD to the original input image. Next the wavelet difference reduction method is applied to the original image. Both the compressed images are fused in the final step. Such fusion of two methods increases the quality of the reconstructed images. The performance of the proposed compression method is evaluated using the parameters namely compression Ratio (CR) and Peak-Signal-to-Noise Ratio. Experimental result shows that the proposed adaptive lossy image compression using fusion of SVD and WDR outperforms the cascading of SVD and WDR.
Keywords: Image Compression, Colour Images, Gray scale Images, Singular Value Decomposition (SVD), Wavelet Difference Reduction (WDR), Fusion.
Abstract
Survey of Black Hole Detection Technique in MANETs
Pooja
DOI: 10.17148/IJARCCE.2017.6246
Abstract: Mobile ad hoc network (MANETs) is emerging research field of wireless network. MANETs is temporary network in which collection of node are connected in dynamic topology without any existing central administrator. Because of self infrastructure, different types of security threats are also increasing day by day. Black hole attack is one of the security threats against MANETs routing. Black hole is malicious node in which this malicious node claim itself that shortest path from source and destination but in actual it will all packet destroyed or dropped all packet after received from source. In this paper, we discussed black hole mitigation techniques which proposed by researchers. We have also studies about pros and cons of detection techniques as based on proactive and reactive routing in MANETs.
Keywords: mobile ad hoc networks, routing protocols, black hole attack, collaborative black hole attack, AODV, DSR.
Abstract
A Review Paper on Steganography: Hiding Data within Data
Garima Malik
DOI: 10.17148/IJARCCE.2017.6247
Abstract: Steganography Combine the two greek words steganoe (covered or protected), and graphein (writing). This simply implies for data hidden within data. In today�s worlds, the most of the information kept electronically which create a fundamental issue of information security. This technique (steganography) used to hide the information in digital media ( for example a image, video file, audio file etc), just like cryptography steganography is also used to protect the data from any third party, the only advantage of steganography over cryptography is that the intended secret message does not attract attention to itself as an object of scrutiny. So steganography also concerned with concealing the fact that the secure message being sent, whereas cryptography just protect the message. In this technology, the end user receive the data in the form of a image ( which also known as carrier for data application) without anyone knowing that the image contains some critical information, so if the image is interpreted by any third party the data will not display to them, hence the data will secure during transmission. On the receiving end, the user uses a secure code to retrieve the data from the image. In this paper we discuss some application, technique of steganography, and also discuss how to detect the secret code.
Keywords: Steganography, data application, Data within Data, encryption system.
Abstract
“Protection from Data Content Leak by Secured Key Generation”
Shradha V. Raghorte, Dr. Rahila Sheikh
DOI: 10.17148/IJARCCE.2017.6248
Abstract: The information leak of sensitive data on systems has a serious threat to organization data security. Statistics show that the improper encryption on files and communications due to human errors is one of the leading causes of information loss. So there a need tools to identify the exposure of sensitive data by monitoring the content in storage and transmission. However, detecting the exposure of sensitive data information is challenging due to data transformation in the content. Transformations result in highly unpredictable leak patterns. In this paper, it is utilize sequence alignment techniques used for detecting complex data-leak patterns. This algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. The system achieves good detection accuracy in recognizing transformed leaks. It implement a parallelized version of our algorithms in graphics processing unit to achieves high analysis data. In the case of collective privacy preservation, organizations have to cope with some interesting conflicts. For instance, when personal information undergoes analysis processes that produce new facts about users' shopping patterns, hobbies, or preferences, these facts could be used in recommender systems to predict or affect their future shopping patterns. In general, this scenario is beneficial to both users and organizations. However, when organizations share data in a collaborative project, the goal is not only to protect personally identifiable information but also sensitive knowledge represented by some strategic patterns. To demonstrate the high multithreading scalability of the data leak detection method required by a requirement of organization.
Keywords: Information leak detection, content inspection, sampling, alignment, dynamic programming.
Abstract
A Comprehensive Survey on Big-Data Issues, Challenges and Management Approaches on Cloud Environment
Chetana Tukkoji, Dr. Seetharam K
DOI: 10.17148/IJARCCE.2017.6249
Abstract: The explosion of data in volume, variety and velocity is catalyzing new business models and reshaping industries. Business leaders can no longer amble their way forward in the age of Big Data. The question that arises now is how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data. To deeply discuss this issue, this paper begins with a brief introduction to big data, followed by issues of big data analytics, challenges of big data, and the various tools associated with it and further research directions will also be presented for the next step of big data analytics.
Keywords: Big data analytics, Hadoop, MapReduce, MOA.
Abstract
Different approaches for human face detection leading to real time face analysis: A survey
V.K. Sowjanya, Anurag De, B. Sujatha, K. Harika
DOI: 10.17148/IJARCCE.2017.6250
Abstract: Now a day�s recognition of faces is very popular to identify or recognize a person. Face recognition plays a major role for security, surveillance and in forensics. Before recognizing the faces, first we need to detect the face and extract the vital features from the face image and then classification is performed on the face image for recognition process. Face detection is the initial step forface recognition. In this paper we discussed about some of the methods used for face detection and also face recognition. In addition to this, the advantages and disadvantages of the surveyed methods are also stated which will help for further development and improvement of the system leading to improved face analysis works.
Keywords: Face Detection, Face Recognition, Feature Extraction, Image Processing
Abstract
Real Time Video Motion Detection for Traffic Surveillance
Dr. Sachin S. Agrawal, Prof. S. A. Bhura
DOI: 10.17148/IJARCCE.2017.6251
Abstract: Visual analysis of human motion is currently one of the most active research topics in computer vision. This strong interest is driven by a wide spectrum of promising applications in many areas such as virtual reality, smart surveillance, perceptual interface, etc. Human motion analysis concerns the detection, tracking and recognition of people, and more generally, the understanding of human behaviors, from image sequences involving humans. It provides a comprehensive survey of research on computer vision based human motion analysis. The emphasis is on three major issues involved in a general human motion analysis system, namely human detection, tracking and activity understanding. Various methods for each issue are discussed in order to examine the state of the art.
Keywords: Human motion analysis; Detection; Tracking; Behavior understanding; Semantic description.
Abstract
Architecture based on Li-Fi to enhance the working environment
Varun Shah, Sumit Chaudhary, Bhavesh Jain
DOI: 10.17148/IJARCCE.2017.6252
Abstract: This paper depicts the significance of the Li-Fi innovation in universities and different instructive premises and the ranges where it can be advantageous. Li-Fi can turn out to be a boon to our society as it not just spares money and resources of users, but in the meantime likewise empowers the users to take the upside of high information rate transmission that is around 1000 times more efficient than existing Wi-Fi information exchange innovation which utilizes radio frequency. This paper likewise emphasizes how it gets to be distinctly conceivable to utilize a light source as transmitter of information.
Keywords: LED (Light emitted diode), Wi-Fi (Wireless Fidelity), VLC (Visible Light Communications), IR (Infra-Red), Li-Fi(Light Fidelity).
Abstract
Secure Network System using Honeypot
Ms. Khairkar Ashwini, Gollar Pratiksha, Kulakarni Anuja, Suryawanshi Varsharani, Swami Gayatri
DOI: 10.17148/IJARCCE.2017.6253
Abstract: Honeypot is new concept used in the network security. Honeypot can detect the attack as well as the attacker�s information. Honeypot block out the access to the real system. Honeypot is physical system which acts as original server in the network to make client fool. Honeypot can used with IDS system to make network more secure. This paper consist the honeypot architecture which contains honey net. It also contains how honeypot works in the network for security purpose? Advantages, disadvantages of honeypot. This paper also consist all information about Honeypot and types of honeypot on level of interaction in the network.
Keywords: Honey pot, IDS, SQL injection attack, XSS attack, data leakage attack.
Abstract
Accurate Detection of Unusual Event in Network Data Stream (Outlier)
Priti G. Manekar, Prof. Pravin G. Kulurkar
DOI: 10.17148/IJARCCE.2017.6254
Abstract: Outlier Mining is an important task of discovering the data records which have an exceptional behavior comparing with other records in the remaining dataset. Outliers do not follow with other data objects in the dataset. There are many effective approaches to detect outliers in numerical data. Most of the earliest work on outlier detection was performed by the statistics community on numeric data. But for categorical dataset there are limited approaches By using memory efficient incremental local outlier (MiLOF) detection algorithm and ROAD (Ranking-based Outlier Analysis and Detection algorithm).
Keywords: Outlier detection, Stream data mining, Local outlier, Memory efficiency.
Abstract
Overview of Scheduling on Multi-core Processing
Hema K. Reddy, Dr. G. R. Bamnote
DOI: 10.17148/IJARCCE.2017.6255
Abstract: The Multi-core processors are requirement of recent needs. As the computers laptops and mobiles emerged with the need of high end computing as well as battery drainage problem it is much more necessary to work on scheduling. With the evolution of multiprocessors there is increase in battery consumption. Effective utilization of multi-cores of processors will ultimately enhance battery life. ARM�s big. LITTLE architecture provides a way to efficiently schedule the tasks on the multiprocessors. This paper explores study on dynamic real time scheduling using Global task scheduling algorithms. This paper illustrates scheduling on current systems and various factors which contribute to the performance up gradation of the system.
Keywords: Multi-core processors, big. LITTLE, Real Time Systems.
Abstract
A Review Paper on Implementation of OFDM Transceiver using Mixed Radix 8-2 Algorithm
Prof. Y.D. Kapse, Ms. Lokhande Komal Mohan, Ms. Pooja Sarangpure
DOI: 10.17148/IJARCCE.2017.6256
Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is a Frequency Division Multiplexing (FDM) technique used as a digital multi-carrier modulation method. A large number of closely spaced sub carriers which are orthogonal are used to carry data on several parallel data streams. OFDM uses the spectrum efficiently compared to Frequency Division Multiple Access (FDMA) by spacing the channels much closer and creating all the carriers orthogonal to one another. Due to rapid growth of wireless and multimedia communication, there is a tremendous need for high-speed data transmission. Telecommunication industry provides variety of services ranging from voice to multimedia data transmissions, in which speed ranges several Kbps to Mbps. Existing system, may fail to support high speed efficient data transmission. To improve the speed and maximum amount of data transmission Orthogonal Frequency Division Multiplexing (OFDM) system may be used. Orthogonality of the carriers prevents interference between the closely spaced carriers and provides high bandwidth efficiency. This work focuses on design and implementation of OFDM transmitter and receiver.
Keywords: OFDM, FPGA, Orthogonality, IFFT.
Abstract
IOT Based Electric Bill Generation
Shubham Pahurkar, Subhash Diwakar, Harshal Nerkar, Sunita Patil
DOI: 10.17148/IJARCCE.2017.6257
Abstract: World of technology is developing very fast in which devices are expected to perform work automatically and at real time.The world is moving towards information technology and different automation systems which are expected to be more integrated and complex, which are the use to develop better quality services in any fashion. In this paper we are using Internet of things which seems to connect devices to the internet. In this paper we are connecting electric meter to the internet to ease the human life. Meter reading is done for the electricity, gas or water consumption where meter is used to record the consumption of this energy. In this paper we will talk about electricity as it is the essential need of today�s world. In today�s scenario the electricity proving company generate bill by taking snapshot of the meter reading. Submit the reading to the office where bill is generated on basis of snapshot. Now the generated bill is send to the users address. In this whole process due to human intervention the error rate is more. Due to this accuracy is not achieved. For this purpose we are proposing a IOT based electric bill generation where collection of units consumed, generation of bill and sending of bill to the user will be done automatically. In this paper for reference we are showing consumption of laptop batter. Based on consumption of battery we will generate bill. This bill will be send to the user by company. This model is more portable, flexible and can integrated with different architecture.
Keywords: AMR, Image segmentation, zee bee, GSM.
Abstract
Hot Spot Technology in the Sport of Kabaddi
Vishesh S, Manu Srinath, Sree Sai Kiran N, Srivatsa VG, Prasad Shenoy, Chandrashekar U
DOI: 10.17148/IJARCCE.2017.6258
Abstract: In the sport of Kabaddi, which is a contact sport, any touch and the number of touches by a raider will reward him with points. These touches are judged by the online referee and the team is rewarded with certain points accordingly. The main problem that crops up in this sport is the slightest of touches which go undetected by human eye and can cost the game for an attacking side. In this case, the technology can replace manual umpiring decisions. Hot spot is one such technology which is an infrared imaging system used in sports like cricket, where infrared cameras are placed in opposite directions and record the images of the ongoing match continuously. These cameras sense the heat from the friction generated by a collision, such as tap on the body, ground, etc. Using a subtraction technique a series of black and white negative frames are generated into a computer, precisely locating the point of contact.
Keywords: Hot spot, infrared imaging system, friction, series of black and white negative frames.
Abstract
Based on Matching Process Recognition of Forger Image
Mr. Kolkure V.S., Rekha H. Pawar
DOI: 10.17148/IJARCCE.2017.6259
Abstract: In today�s environment seeing importance of digital data which is continuously increasing. The improvement in the digital data processing which leads to a low cost internet. With these improvement the copied image of forger can be detect. The copied image of forger can be detected by using segmentation and matching process. With these segmentation methods and matching process the copy move region can be detected. These two methods provide effective security and authentication to an image so that the misuse of images avoided. In this paper we detect the forger image.
Keywords: copied image, forger, segmentation, matching process, detection, etc.
Abstract
Named Entity Recognition Approaches and Challenges .
Sanjana Kamath, Rupali Wagh
DOI: 10.17148/IJARCCE.2017.6260
Abstract: With the increase in availability of data, extraction of useful information from this data has become most important activity across all domains. When the data is available as documents written in natural language, information extraction becomes more challenging. Named Entity recognition (NER) is a technique used extensively for automatic extraction of useful information from unstructured natural language document collections. Used both, for web applications as well as stand-alone systems, NER is considered as one of the major step in Natural Language Processing (NLP) for analysis of text. This paper discusses basics of NER, various algorithms used for NER and major applications and challenges in the field of NER.
Keywords: Named Entity Recognition, Information Extraction, Natural Language Processing, Part of Speech.
Abstract
Face and Eye Gaze scenario for person Identification using Circular Hough transform .
Rupali .S. Wagh, Prof. S.G. Kole, S.S. Savkare
DOI: 10.17148/IJARCCE.2017.6261
Abstract: This paper presents system based on recognition algorithm for face recognition and Circular Hough transform is used to localize circular iris and pupil region Eye Gaze Tracking (EGT) and face recognition allows us to estimate the way of eye gaze and the Point of Regard (POR) on the screen and also recognize the face of the person which is stored in database. This method has been successfully use in different discipline, but more technical improvement are still required to make EGT suitable to be useful in wider range of real world applications or research tools. In this paper a review on recent issues associated with EGTs is conducted and presented. Four issues are: accuracy, comfort ability, reaction time, and cost; but accuracy and comfort ability are the most two difficult problems which are discussed here. At the end, based on the conducted review, new orders for future research are stated. This technique has been effectively used in special disciplines, but more technical development are still required to make EGT suitable to be applied in broad range of real world applications or research tools. In this paper a review on recent issues associated with EGTs is directed and accessible. Four properties are: accuracy, comfort ability, response time, and cost; but accuracy and comfort ability are the most two inspiring problems which are discussed here. At the end, based on the conducted survey, new guidelines for future researches are stated.
Keywords: Eye Gaze Tracking (EGT), face detection, face recognition Human Computer Communication (HCC), Eye Tracking.
Abstract
Security Analysis of Various Public Key Cryptosystems for Authentication and Key Agreement in Wireless Communication Network
H T Loriya, A. Kulshreshta, D.R. Keraliya
DOI: 10.17148/IJARCCE.2017.6262
Abstract: Cryptography is the learning of system to transfer information securely among users. The security of information is the main concern in the wireless communication network. Cryptography is mainly used for confidentiality, key distribution, authentication, integrity and non repudiation. Private key cryptosystem and public key cryptosystem are commonly used crypto systems to transfer information securely. In this paper, we have compared five public key cryptosystem i.e. Elliptical Curve Cryptography (ECC), Diffie Hellman (DH), Elgamal Cryptographic System (ECS), RSA, and NTRU. Implementation of public key algorithms in very constrained devices such as mobile phones smart cards, PDA etc. demands faster cryptosystems. We have analyzed above public key cryptosystem and concluded that NTRU is the most efficient public key cryptosystem. NTRU public key cryptosystem is the fastest public key cryptosystem to provide different security levels at high speed with very constrained resources.
Keywords: Cryptography, Security, Encryption, Decryption, Asymmetric Encryption, AKA.
Abstract
Performance Analysis of Cooperative Sensing in Fading Channels for Wireless Communication
Prof. Divyesh R. Keraliya, Prof. Ashalata Kulshrestha, Prof. Hitesh. T. Loriya
DOI: 10.17148/IJARCCE.2017.6263
Abstract: Cognitive radio (CR) is a new era of wireless communication system in which the use for efficient spectrum utilization of radio frequency (RF) band or RF channel for future wireless communication. Cooperative spectrum sensing is the very important key component of cognitive radio technology in which the sensing information from CR users combines at the Fusion center (common receiver) by soft combination or conventional hard combination techniques. Soft combination has excellent performance but, it requires a lot of overhead for feedback observation. In contrast, the conventional hard combination scheme requires only one bit of overhead, but it has worst performance because of loss of sensing information. Softened hard (quantized)decision fusion based cooperative spectrum sensing is optimum choice between overhead and detection performance. In this paper we mainly concentrate on the quantized (softened) cooperative spectrum sensing in environment of different fading channel like Rayleigh, Rice an and Nakagami. Centralized detection approaches are considered for the analysis of different data fusion rules of quantized cooperative sensing. The simulation result indicates the various types of analysis and comparison which can be very useful for analysis of fading in quantized cooperative spectrum sensing research and development.
Keywords: Cognitive radio, cooperative spectrum sensing, energy detection, fading channel.
Abstract
A Literature Survey on Automatic Evaluation of Computer Programs
Priyanka Sharma, Samkitkumar Jain, Prachin Ranawat, Husain Poonawala, Pankaja Alappanavar
DOI: 10.17148/IJARCCE.2017.6264
Abstract: Today, due to a large number of online courses there is a need for automatic evaluation of computer programs. Grading of computer programs is also helpful for the companies in their recruitment process where a set of programming statements are to be solved by the students. Thus, automatic grading of open-ended responses has increasingly become a subject of research. Existing systems which are used for such assessments provide a score on the basis of a number of test cases which are passed by the computer program. This does not reflect the overall abilities of the programmer. Blending the existing systems with machine learning and considering the programming styles can prove to be more useful for the evaluation of computer programs. This paper gives a review of the literature survey done on Automatic Evaluation of computer programs.
Keywords: Program, Automatic grading, Machine Learning, Natural Language Processing.
Abstract
Large Data Turns into Batches using MRQL (Map Reduce Query Language) Technique
Pragati P. Pachghare, Prof. Pravin G. Kulurkar
DOI: 10.17148/IJARCCE.2017.6265
Abstract: Online query processing for large-scale, incremental data analysis on a distributed stream processing engine (DSPE). Our goal is to convert any SQL-like query to an incremental DSPE program automatically. In contrast to other approaches, we derive incremental programs that return accurate results, not approximate answers, by retaining a minimal state during the query evaluation lifetime and by using a novel incremental evaluation technique, which, at each time interval, returns an accurate snapshot answer that depends on the current state and the latest batches of data. Our methods can handle many forms of queries on nested data collections, including iterative and nested queries, group-by with aggregation, and equi-joins. Finally, we report on a prototype implementation of our framework, called MRQL Streaming, running on top of Spark and we experimentally validate the effectiveness of our methods.
Keywords: Outlier detection, Stream data mining, Local outlier, Memory efficiency.
Abstract
Review Paper on Smart Helmet using GSM and GPS Technology
Indranil Nikose, TusharRaut, Reena Bisen, Varsha Deshmukh, Ashwini Damahe, Pranoti Ghotekar
DOI: 10.17148/IJARCCE.2017.6266
Abstract: Now a days most of the countries are enforcing their citizen to wear helmet while riding bike and not to ride bike when the person is under the influence of alcohol, but still rules are being violated. In order to overcome this problem, �Accident Detection, Alcohol Detection, protection using GSM based Smart Helmet�.
Keywords: GPS, GSM, Alcohol Sensor, Tilt Sensor.
Abstract
A Weighted Control Dynamic Clustering Approach in Vehicular Adhoc Network
Navneet Kaur, Er. Sandeep Kad
DOI: 10.17148/IJARCCE.2017.6267
Abstract: VANETs have been appeared as a new area of data dissemination process in which vehicles provide aid to the end users. Vehicles in vehicular ad hoc network have highly unstable (dynamic) topology which produces hindrances in timely delivery of sensitive messages. The best panacea to stabilize the highly unstable networks is clustering process. Unfortunately stable clustering does not minimize the overhead of cluster reorganization to great extent. Thus to tackle the overhead problem of cluster reorganization process, dynamic clustering is an effective way. In this paper, dynamic clustering is proposed and cluster head is defined on weighted control factor and further the cluster reorganization process is minimized by calculating NACH (next available cluster head) factor.
Keywords: vehicular ad hoc network (VANETs), cluster head (CH), NACH.
Abstract
Synthesis of OFDM System on FPGA
Vaibhav Bhoite, Kartik Daradmare, Pratima Mourya, Shubhangi Tumane, Darshana Sayare
DOI: 10.17148/IJARCCE.2017.6268
Abstract: OFDM is a multicarrier communication system and it is extensively used because of its immunity to frequency selective fading channels.The aim of this project is to design and implement an OFDM system on FPGA. The system is design using VHDL which is a high level synthesis tool. The design of OFDM system is realize on FPGA kit. FPGA implementation has a advantage to modify the changes and improve the system performance which rebuts a OFDM system which reduces the bit error rate and also reduces the LUT�s in the VHDL code.
Keywords: Orthogonal frequency division multiplexing (OFDM) ,Field programmable gate array (FPGA), Intercarrier interference (ICI), Inter symbol interference (ISI).
Abstract
Design of Milk Analysis System for Dairy Farmers using Embedded System
Abhishek M. Aware, Ujwala A. Kshirsagar (Belorkar)
DOI: 10.17148/IJARCCE.2017.6269
Abstract: In recent years the National Dairy Development Board-initiated cooperative movement has led to a substantial increase in milk production in India. The two main reasons for this increase are the efficient collection of milk and higher profit for the producers, both of which have to some degree been influenced by information technology. The appropriate information technology will help to make information symmetric in the market, thereby minimizing problems of adverse selection and tedious work. It is only recently that automation has been introduced into agriculture. In many dairy farms, computer aided control of physiological and sanitary parameters are already used and lead to a productivity increase and the elimination of some tedious operations. Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing. An embedded system can be defined as a control system or computer system designed to perform a specific task. Embedded systems are playing important roles in our lives every day, even though they might not necessarily be visible. Here I describes one of the applications of embedded system MILKOTESTER. It is Small compact, embedded in a single unit, requires less power and measure milk parameters like SNF (Solid but Not FAT), FAT, CLR, WEIGHT, PH, with less cost. Also with the help of IOT(Internet of Things) process the milk industry should be able to send the real time reading information of milk to the government so that it helps to overcome the illegal things such as milk quality during the production of milk pocket.
Keywords: Fast analysis-allows a large number of measurement to be done, Simple and light weight design, Low cost, Low power consumption, Easy to operate.
Abstract
Review on Student Academic Performance Prediction using Data Mining Techniques
Prateek Sakaray, Snehal Kankariya, Chandini Lulla, Yash Agarwal, Pankaja Alappanavar
DOI: 10.17148/IJARCCE.2017.6270
Abstract: Educational Data Mining is an emerging discipline, concerned with student�s performance prediction. In this paper student�s performance is evaluated by selecting some attributes which generates rules for forming the classification of the instances in the dataset. Data from various sources of college can provide valuable knowledge to predict student�s result at institutional level as well as it can provide insights to each individual performance. The process involves various steps, firstly pre-processing has to be carried out on the set of data secondly apply the classification rules on the data that has been processed in the previous step after which we test the results on the different categorical data input. Emerging institutions are using data mining approach to predict their results and also enhance the level of education in the society. The most commonly used algorithm is machine learning technique to predict performance is called Na�ve Bayes and Neural Networks. This work presents a methodology on how student�s information can provide insights into education at institutional level.
Keywords: Education, dataset, machine learning, Na�ve Bayes, Neural Network.
Abstract
Video data hiding using Video Steganography
Ms. Prachi P. Sadawarte, Prof. P. A. Tijare
DOI: 10.17148/IJARCCE.2017.6271
Abstract: Internet is behaved as a backbone for the current modern technologies; it is globally connected, unsecure network. We can transfer the data through internet for data accurate and faster to the destination. Besides this, anyone can modify and misuse the valuable information through hacking at the time. Steganography is an art of hiding the secret data or information inside the digitally covered information. The hidden message can be text, image, speech or even video and the cover scan be chosen accordingly from either a text, an image, an audio or video. Steganography is a type of cryptography in which the secret message is hidden in a digital picture but here in this project video steganography is applied on video which is transfer from sender side to receiver side. Nowadays, the use of a video based steganography is common and numbers of steganalysis tools are available to check whether the video is stego-video or not. Most of the tools are checking for information hided by LSB, DCT, Frequency Domain Analysis etc. Here consider video as set of frames or images and any changes in the output image by hidden data is not visually recognizable.
Keywords: Steganography, LSB technique, Discrete Wavelet Transform, Discrete cosine Transform.
Abstract
Grayscale Image Compression using Bit Plane Slicing and Developed RLE Algorithms
Hassan K. Albahadily, V. Yu. Tsviatkou, V.K. Kanapelka
DOI: 10.17148/IJARCCE.2017.6272
Abstract: New suggested RLE compression algorithms to compress grayscale images with bitplane slicing technique to reduce the size of the encoded data by separating image into 8 binary layers, then use our modified RLE algorithms to compress bitplanes. Our modified algorithms designed perfectly to compress bitplane. The proposed methods achieved very good compression ratio especially with the MSB layer.
Keywords: image compression; bitplane; quantization.
Abstract
Demographic Estimation of Human Feature from Facial Images
Anuradha .A.Thombre, Prof. K. P Wagh, S.S. Savkare
DOI: 10.17148/IJARCCE.2017.6273
Abstract: Recognition of most facial variation like shape texture based on different algorithm estimate the automatic estimation of age, gender and race of a person from his face image, which has many applications automatic age estimation can prevent minor from purchasing alcohol or cigarate from vending machine. In Automatic demographic estimation, age estimation remains a complicated problem because of the persons belonging to the same group can be different in their facial appearances due to some of the internal and external factors. In this paper, we demonstrate that a generic framework for automatic demographic estimation of age, gender and race. Given a face image, we ?rst extract demographic informative features via a different boost algorithm, and then employ a hierarchical approach consisting of between-group classi?cation, and within-group regression. Quality assessment is also developed to identify low-quality face images that are dif?cult to obtain reliable demographic estimates.
Keywords: Demographic estimation, hierarchical approach age estimation.
Abstract
Multifactor Authentication System
Prof. A. J. Jadhav, Diksha Shetty, Apurva Marathe, Pralay Nawasare, Roshan Ramdas
DOI: 10.17148/IJARCCE.2017.6274
Abstract: Radio Frequency Identification (RFID) is used to track tags attached to the objects using electromagnetic fields. RFID is a short range wireless communication system which uses radio frequency technology for automatic target recognition. RFID consists of three parts: labels, antennas and readers. The technology used to identify every individual uniquely is known as biometrics. In paper[], this technique is consumed along with RFID and image processing for identity authentication. Biometrics also refers to the pattern recognition system where the users� bio data is being referenced from the database. The use of a cellular network known as GSM (Global System for Mobile Communications) is applied where mobile phones connect to other cells in the immediate locality. The paper[] shows an intelligent usage of GSM technology to generate one time password (OTP). GSM is highly used in making intelligent control and decisions in reference to sending relief supplies [].
Keywords: RFID, GSM, Biometrics, Image processing.
Abstract
Personal Authentication System for Illegal Usage of Arms
Chhaya C Athavale, Sivaraj K R, Pratik Jain, Bhagyashri Jogdand, Ankit Sharma
DOI: 10.17148/IJARCCE.2017.6275
Abstract: Authentication system has become necessary to overcome the security threats faced by many armed personnel these days. Nowadays, there is increase in unethical usage of weapons by stealing it from armed personnel. A result of this is the use of these weapons for various crimes. It is not uncommon to see these weapons of law enforcement being used to break the law instead. The problem is that the pistols do not recognize their rightful owner and thus anybody who has the gun can use it freely. The need of the hour is of a system that checks the identity of the person who holds the gun before he can fire it. Hence there is only one alternative i.e. authentication system which includes RFID security and biometric technology. The system uses RFID technology and biometrics to identify the rightful owner of the gun. The RFID reader is installed on the weapon to detect the tags placed on the authorized person (installed on wrist watch, belt, etc.) then the system captures the fingerprint image and scans the database for a match. If both the object and captured image belong to a registered user, access is granted and the trigger can be pulled for a definite time period; otherwise the system remains locked and the user will not be able to pull the trigger. Thus this paper describes the design of authentication system for unethical usage of arms.
Keywords: RFID, Fingerprints, Arduino, Solenoid lock.
Abstract
Efficient Secure Data Communications for Cognitive Radio using Clustering Techniques
Padmasri Yarlagadda, Bosubabu Sambana
DOI: 10.17148/IJARCCE.2017.6276
Abstract: Secure communication of Data in cognitive radio networks is one of the challenging tasks to increase the lifetime of the network is a major constraint. The life time of the network is determined by the energy consumed by the each node and protect the data from an intrudes. In this research work we introduce a secure cluster based communication to reduce the overheads and provide the security. A special node called as centralized node collects the data from clusters and forwards them to Base station. The data is secured which authenticates the Cluster head using the shared secret key and the Digital Signature. The simulation results prove that our algorithm is more efficiently secure the data and achieves more energy savings.
Keywords: Clustering, Communication, Networks, Security, DBMS, Data Mining, Data Ware House.
Abstract
Design of Ration Distribution System to Stop the Corruption Using AVR: A Review
Rita R. Chaudhari, Shraddha R. Parashar, Prof. M. R. Dhotre
DOI: 10.17148/IJARCCE.2017.6277
Abstract: In this project, the proposed concept is to replace the manual work in public distribution system. The ration distribution system is automated by using embedded system technology, which is similar to the ATM. This automated ration system replaces the conventional ration card system by smart card. In addition, the finger print smart card is placed in the machine in order to check the correct user access. If the user is correct user, the next process takes place. As soon as the input is given, the products are obtained from the automated ration shop and the amount is taken from account of the particular person. The embedded controller is pre-programmed in such a way to perform the similar operations. In this automated ration shop government have control over all transaction that occurs in ration shop. In order to involve government in the process, the proposed ration shop system is connected to the government database via GSM modules, which further sends the up-to-date information to the government and the consumer. For the efficient operation and economic constraints of the system, the power supply unit is fully made alternate to solar power.
Keywords: Ration Distribution System, Finger Print Module, RFID, GSM Module, Microcontroller, LCD.
Abstract
Design of Reliable Multiplier with an Adaptive Hold Logic
Pradnya Pagar, Prof. M. Vanjale
DOI: 10.17148/IJARCCE.2017.6278
Abstract: Digital multipliers are one of the most critical arithmetic functional units. The overall performance of this system depends on the throughput of the multiplier. Meanwhile, the NBTI effect occurs when PMOS transistor is under negative bias (Vgs = - Vdd), increasing the threshold voltage of the PMOS transistor and reducing transistor speed. A similar phenomenon, positive bias temperature instability occurs when a PMOS transistor is under positive bias. Both temperature effects degrade transistor speed, and in the long term, the system may fail due to timing violations. Thus, it is important to design reliable high performance multipliers. In this paper, we propose an aging-aware multiplier design with the novel adaptive hold logic (AHL) circuit. The multiplier is able to improve higher throughput through the variable latency and can adjust the AHL circuits to mitigate performance degradation that is due to the aging effect. The proposed design can be allied to the column bypass multiplier.
Keywords: Adaptive hold logic (AHL), negative bias temperature instability (NBTI), positive bias temperature instability (PBTI), reliable multiplier, variable latency.
Abstract
A Survey on Load Balancing Techniques for Wireless Sensor Networks
Tanuj Kumar Mishra and Raj Kumar Paul
DOI: 10.17148/IJARCCE.2017.6279
Abstract: Wireless sensor network is energy constraint network. The lifetime of a network is defined by the life of first specified percentage of dying nodes. Load balancing is a method to equalize energy consumption of all nodes and this way all nodes will degrade together. By load balancing, the lifetime of the network does not depend only on the life of weak node but depends on the life all nodes in the network which helps to increase the life of the network. In this paper, we examine the proposed load balancing algorithms for wireless sensor networks. Load balancing can be used to extend the lifetime of a sensor network by reducing energy consumption. Load balancing using clustering can also increase network scalability. Wireless sensor network with the different energy levels nodes can prolong the lifetime of the network and also its reliability. We discuss the improvement to be made for future proposed load balancing schemes. This paper provided the reader with the basis for research in load balancing schemes for wireless sensor networks.
Keywords: Wireless sensor network, aggregation, data precision, residual energy, network lifetime
Abstract
Design of Vision based Gesture Controlled Interface for UAV
Avinash Kumar Bussa
DOI: 10.17148/IJARCCE.2017.6280
Abstract: In the present scenario drones are buzzing in the skies all over the world. This paper presents the new interface apart from all familiar controlling methods of drones as Computer keyboard, smart phone, gaming controller or a RC transmitter. Hand Gesture Signals sensed by an open source SDK consists of stereo cameras which uses infrared emitters as positional references controls the drone which gives a hands-free flying experience. We also propose a vision based hand gesture driven UI control system that enables the user an intuitive way of working with the system with on-air hand movement and gesture. The system can also be used in a wide range of applications like UAV control, operating ground robots and Assembly lines in production lines of factories.
Keywords: Intel� RealSense�; Machine Vision; Gesture Control; UAV.
Abstract
“Power Quality improvement using 24 Pulse bridge Rectifier for an isolated Power generation”
Miss. Anuja V. Jagtap
DOI: 10.17148/IJARCCE.2017.6281
Abstract: This paper deals with the power quality improvement in a conventional electronic load controller (ELC) used for isolated Pico-hydropower generation based on an asynchronous generator (AG). The conventional ELC is based on a six-pulse uncontrolled Diode bridge rectifier with a chopper and an auxiliary load. It causes harmonic currents injection resulting distortion in the current and terminal voltage of the generator. The proposed ELC employs a 24-pulse rectifier with 14 diodes and a chopper. A polygon Wound autotransformer with reduced kilovolts ampere rating For 24-pulse ac�dc converter is designed and developed for harmonic Current reduction to meet the power quality requirements As prescribed by IEEE standard-519. The comparative study of Two topologies, conventional ELC (six-pulse bridge-rectifier-based ELC) and proposed ELC (24-pulse bridge-rectifier-based ELC) is carried out in MATLAB using SIMULINK and Power System Block set toolboxes. Experimental validation is carried out for both ELCs for regulating the voltage and frequency of an isolated AG driven by uncontrolled pico-hydroturbine.
Keywords: Electronic load controller (ELC), isolated asynchronous generator (IAG), pico-hydroturbine, 24-pulse bridge rectifier.
Abstract
IPsec the Realm for Secure Communication in Internet of Things
Ms. Aishwarya Ashok Akul, Prof. Mrs. Snehal Bhosale
DOI: 10.17148/IJARCCE.2017.6282
Abstract: Internet of Things (IoT) provides many services in Industrial, Medical, commercial areas etc. Therefore, implementing secured communication in the IoT is essential among many other issues. An IPv6 network interconnects multiple computers and a large number of smart devices. IPsec is secured network therefore it is reasonable to explore the option of using IPsec as a security mechanism for the IoT. Smart devices are generally added to the Internet using IPv6 over Low-power Wireless Personal Area Networks (6LoWPAN). Therefore, to provide security for the IoT IPsec mechanism and IPsec extension of 6LoWPAN is important. In this paper, we discussed such a 6LoWPAN/IPsec mechanism and its extension of this approach. We describe our 6LoWPAN/IPsec mechanism with IEEE 802.15.4 link-layer security. This paper shows that IPsec is a feasible option for securing the IoT in terms of packet delivery, packet size, energy consumption, memory usage, processing time and network lifetime.
Keywords: Internet of Things; 6LoWPAN; IPv6; IEEE 802.15.4 Security.
Abstract
A Proposal of Optimal Strategy for Emptying the Buffer at the MIMO Transmitter based Spatial Multiplexing Techniques
Svetlana Furtula, Ranko Vojinović
DOI: 10.17148/IJARCCE.2017.6283
Abstract: In this paper, weanalyse the buffer behaviour in MIMO transmitter, depending on the traffic incoming intensity and service discipline of the outgoing process, respectively, depending on the buffer filling and emptying processes. Using a mathematical study and a simulation model w? propose an optimal strategy for employing the buffer at the MIMO transmitter based spatial multiplexing techniques.
Keywords: MIMO, spatial multiplexing, buffers, M/M/1/c.
Abstract
A Survey on Multi sensor Agriculture Interface Using Smart Data Communication
Pritee V. Raiter, Ms. S. M. Borkar
DOI: 10.17148/IJARCCE.2017.6284
Abstract: This system is the implementation of agriculture automation using smart data communication .This embedded system is develop and design low cost basically based on embedded platform for agriculture automation. This system uses multiple sensors to detect temperature water level, IR based movement, gas detection and light intensity in agriculture environment and take a decision based on there values on went to trigger the water relays i.e. water flow relay, ground relay, water outlet relay .The current agriculture system is based on limited sensor technology which make it unusable in real time agriculture environment by using our system inefficiency of existing system is reduced. Here temperature, soil moisture, water level can be monitored on web page through smart data communication.
Keywords: Embedded platform, water relay, ground relay, water outlet relay.
Abstract
Diagnosis and Detection of Skin Burn Analysis Segmentation in Colour Skin Images
B. Sabeena, Dr. P. Raj Kumar
DOI: 10.17148/IJARCCE.2017.6285
Abstract: Skin image is in that the burned skin and non- burned images has to be classified. It is a deadly form of burning. Skin burn may appear as malignant or benign form. Skin cancer at its early stages can be cured. But when it is not recognized at its early stages, it begins to spread to other parts of the body and can be deadly. Benign Melanoma is simply appearance of moles on skin. A normal mole is usually an evenly colored brown, tan, or black spot on the skin. It can be either flat or raised. Skin burns are the deadly form of cancers in humans. If skin burns is detected at early stages, it can be cured completely. So an early detection of skin cancer can save the patients. Skin burns are of two types- Benign and Malignant Melanoma. Benign melanoma is not a deadly condition, but malignant melanoma is a deadly form. Both resemble same in appearance at the initial stages. Only an expert dermatologist can classify which one is benign and which one is malignant. The SVM based Classification methodology uses Image processing techniques. Main advantage of this computer based SVM classification is that patient does not need to go to hospitals and undergo various painful diagnosing techniques like Biopsy.
Keywords: Skin lesion, Melanoma, Features detection, Classification, Segmentation.
Abstract
A Case Study on Water Marking with Implementation of Least Significant Bit coding (LSB)
N.S. Murti Sarma and Santhosh
DOI: 10.17148/IJARCCE.2017.6286
Abstract: Watermarking technique is considered to compare the statistical performances of the retrieved images after inserting visible and invisible water marking. The results found are encouraging.
Keywords: Digital media, illegal duplication, statistical performances, water marking, normalized cross correlation.
Abstract
Detection of Pavement Distress and its Types using Fuzzy C Means Algorithm
Subashri, Shajun Nisha, Mohamed Sathik
DOI: 10.17148/IJARCCE.2017.6287
Abstract: Pavements are broad spectrum of traffic levels, from two-lane rural routes to multilane interstate highways. It needs reformatory measures to restore safety. The common distresses on pavements are cracks, rutting, Potholes and some distresses. It causes the more accidents because of bad Pavement design. In this paper two steps are involved. The first step deploys the image enhancement that helps to enhance the image quality. Histogram Equalization is the one of the technique in image enhancement. That acts as a graphical representation of the digital image. The second step deploys Image clustering is a high-level description of image content FCM is one of the clustering technique and it separate the data into number of partitions. In this paper FCM is used to determine the pavement cracks. Using Otsu thresholding finds the distress types and lastly finds its severity level. Finally the performance parameter shows it gives a better result to identify the distress types and its level.
Keywords: Histogram Equalization, FCM, Otsu Thresholding, Crack Types.
Abstract
Dynamic Stability Improvement of Multi Machine Power System
Naik Pal Nileshbhai, Dr. Ami T. Patel
DOI: 10.17148/IJARCCE.2017.6288
Abstract: As Power systems become more interconnected, analysis of dynamic performance of such systems become very important. Due to its increasing complexity, the stabilization of system is recent interest of area. Power system mostly subjected to low frequency oscillations due to disturbances. The stability analysis of synchronous generator under small disturbances is examined for multi machine system. The multi-machine system is predominant in inter area mode oscillations. These disturbances occur due to large reactive power, weak ties or large AVR gain with low time constant. The main function of AVR is to maintain constant terminal voltage of Generator and hence improving transient stability. However, it produces negative damping to the system which leads to electromechanical oscillations. To overcome the effect of negative damping, a supplementary control loop is provided by Power system stabilizers. The PSS can increase the damping of the system and transmission capability. Conventional Power system stabilizers (CPSS) is widely used for enhancing system stability, but CPSS design can�t guarantee its performances under heavy loading conditions.
Keywords: stability analysis, automatic voltage regulator (AVR), power system stabilizer (PSS), convention power stabilizers (CPSS).
Abstract
Employee Tracking Using GPS
Lakshita Patel, Sukanya Nair, Ruchita Gunjal, Radhika Suryawanshi, Rachana Shinde, Mrs. H.A. Shinde
DOI: 10.17148/IJARCCE.2017.6289
Abstract: Nowadays tracking employee using a separate GPS device is becoming outdated. In the world of smart phones and any other technologies it is difficult to handle a separate GPS device for tracking the location instead we can use the smartphones for tracking the location of the employee as smartphones already has a built in GPS features installed in it. Our proposed system is going to tracking the employee using GPS which is built in their smart phone device. This can be user friendly and it can be handled easily by the employee. This system is going to track the call history of the employee which is the owner of the device. It tracks the details of Incoming and Outgoing call and SMS detail of the employee.
Keywords: User friendly, tracking of an employee using smartphones, it uses latest technologies and in built features of the smartphones.
Abstract
Multi-Label Classification for Online Feature Selection
M. Gopi Krishna, K. Purushottama Rao
DOI: 10.17148/IJARCCE.2017.6290
Abstract: Location of rising themes is presently accepting recharged interest persuaded by the quick development of interpersonal organizations. Traditional term-recurrence based methodologies may not be suitable in this setting, on the grounds that the data traded in interpersonal organization posts incorporate content as well as pictures, URLs, and features. We concentrate on rise of themes motioned by social parts of these systems. In particular, we concentrate on notice of clients�connections between clients that are created progressively (deliberately or inadvertently) through answers, notice, and re-tweets. We propose a likelihood model of the saying conduct of an interpersonal organization client, and propose to distinguish the rise of another theme from the peculiarities measured through the model. Amassing inconsistency scores from many clients, we demonstrate that we can identify rising subjects just in view of the answer/notice connections in informal organization posts. We exhibit our procedure in a few genuine information sets we assembled from Twitter. The trials demonstrate that the proposed notice irregularity based methodologies can distinguish new subjects in any event as ahead of schedule as content inconsistency based methodologies, and at times much prior when the point is inadequately recognized by the printed substance in post.
Keywords: Word based approach, Online Feature Selection, Information Exchange, and URLS.
Abstract
A Study on Different Data-Analysis Techniques to Detect Fine Motions
Vidya Kumari, Rashmi
DOI: 10.17148/IJARCCE.2017.6291
Abstract: In this study of different data analysis techniques to detect fine motions, we will be analysing how different techniques are implemented. Also how RADAR can be used instead of cameras in gesture recognition techniques and how SOLI is superior to all the techniques that use camera.
Keywords: SOLI, hand gesture techniques, RADAR, gesture sensing.
Abstract
World Laying Steps towards Smart Ideas
Ravi Gorli
DOI: 10.17148/IJARCCE.2017.6292
Abstract: Smart is the popular word which has become a general taught in every human brain. The Acronym of the word Smart refers to Specific Measurement Achievable Relevant Time-Oriented. The world is moving towards future technologies by laying different steps to be smarter in the future generations. A Smart World is a collection of different technologies which are getting improved better and better with the invention of Automation in every sector with wide range of application step by step. As the automation is improving day by day in each sector, with the advancement of technologies, resulting in advantages such as time reduction, efficiency, producing accurate results, scalability, and flexibility and so on. This paper shows how the world is moving into smarter technologies, with their roles in different sectors. Focusing on the types of sensors and the applications that the smarter is entering.
Keywords: IoT, Smart, Sensor, Actuator.
Abstract
Evaluation of Fault Clearing Time in 9-Bus System for Numerical Protection
Padmini Sharma, Dr. R. N. Patel
DOI: 10.17148/IJARCCE.2017.6293
Abstract: This paper present an approach for maintain system stability in case of power oscillation in power system network by using numerical relay for protection. Fault clearing time plays an important role for maintain system stability. Variation in load angles due any disturbance in huge interconnected network may cause power swing .By keeping fault clearing time as small as possible in case of, any large variation in load angles system stability can be enhance. Setting of fault clearing time is only possible in case of numerical relay haying very fast and accurate response .The proposed approach was tested for 3 phase fault in IEEE 9 bus system .Electromagnetic Transient program (EMPT) and Power System Computer Aided Design (PSCAD)were used for simulation purpose. The results show the variation in power swing with different fault clearing time.
Keywords: Critical Clearing Time (CCT), PSCAD/EMTDC, Transient Stability, IEEE 9-Bus system, Test system.
Abstract
A Survey Paper on Motion Object Detection System
Trupti K. Barsagade, Prof .D.T. Salunke, Punam V. Bitake, Sandhya B. Kendre, Shubhangi J. Kambale
DOI: 10.17148/IJARCCE.2017.6294
Abstract: The security is most vital aspects for everyone. In security, there are some issues arising due to increase in criminal acts. There are so many systems which help everyone to be safe. The goal of this paper is to prevent social problems like woman and child-related sexual offenses or common place criminal acts. The next step in the path would be to come up with a batter explanation to solve this problem definitely the following conversed techniques are very good. A combined approach using few of them can be a better solution.
Keywords: Motion detection, video frames, background difference, real time application.
Abstract
An Efficient Privacy-Preserving Ranked Keyword Search Method
Prof. Supriya Bhosale, Akshay Khirolkar, Rohit Gaikwad, Bhushan Mirase, Vinod Bakse
DOI: 10.17148/IJARCCE.2017.6295
No abstract available.
Abstract
Employee Tracking and Management
Vikramdas Vaishav, Vaibhav Ghatge, Mandar Bhosale, Diptesh Raut, Akash Shinde, Vrushali Sonar
DOI: 10.17148/IJARCCE.2017.6296
No abstract available.
Abstract
A Comparitive Study of Malicious Node Detection Scheme in MANET
Ms. N.U. Tharini, Ms. K. Devipriya
DOI: 10.17148/IJARCCE.2017.6297
No abstract available.
Abstract
Topological Conditions for Maintaining Stabilization of Dynamic System
Prof. Dilip Budhwant, Bhagyashri Bhalekar
DOI: 10.17148/IJARCCE.2017.6298
No abstract available.
Abstract
Research and Analysis of Energy Efficient Monet for Malware Variants Detection System for Android
Khandagale Swati M, Mr. Shyam S. Gupta, Prof Sanjay Jain
DOI: 10.17148/IJARCCE.2017.6299
Abstract: The most popular mobile Operating System is Android. Due to its popularity it attracts many malware attacks. In fact people have uncover around one million new malware samples per quarter and it was reported that over 98 % of these new malware samples are in fact variants from existing malware families. In this paper we first show that runtime behaviors of malware�s core functionalities are in fact similar within a malware family. We propose a framework to combine runtime behavior with static structures to detect malware variants. We present the design and implementation of MONET which has a client and backend server module. The client module is a light-weight in device app for behavior monitoring and signature generation and we expound these using two novel interception techniques. The backend server is responsible for excellence scale malware detection. Our analysis shows that MONET can achieve accuracy in detecting malware variants. This paper examines the problem of malware in android and recent progress made in detection techniques. We first present a detailed analysis on how malware has evolved over the last years for the most popular stage. We identify show behaviors pursued goals infection and distribution strategies and provide numerous examples through case studies of the most relevant specimens. We next survey classify and ventilate efforts made on detecting both malware and other suspicious software.
Keywords: Code Offload Malware Detection, Android, Runtime Behavior, Mobile Computing, Energy Management, Jade System, Distributed Computing.
Abstract
A Parameter Optimized, Automatic Threshold Selection for Enhancing Edge Preserving Denoising and Segmentation
M. Divya, Dr. E. Mary Shyla
DOI: 10.17148/IJARCCE.2017.62100
Abstract: Image denoising is the most challenging issue in the field of image processing. The main task experienced during image denoising process is to categorize the components of original image from the noisy image. Hence, efficient segmentation mechanisms are needed for categorizing the noise. In Image Denoising With Edge-Preserving and Segmentation Based on Mask Non Harmonic Analysis (ID-EPS), image denoising was done in spatial domain by preserving the edges with fuzzy boundaries. The information in edges was preserved from the input image by edge detection and segmentation with the help of fixed threshold and segmentation parameters values. But in general, Performance of denoising depends on the values of these parameters. Hence optimization of threshold and parameter values is required. In proposed Enhanced Image denoising with Edge Preserving segmentation (EID-EPS) method, performance of image denoising and segmentation result is improved by using frequency domain coefficients like Discrete Cosine Transform (DCT) which segments the similar frequency patches from the input image. Moreover, Iterative Threshold Selection method is introduced for automatically selecting the threshold value for every successive iteration. Parameter values are also optimized by using Servo Parameters Optimization Algorithm in which values of parameters are selected from the input images based on the target image. Experiments are conducted to analyze the performance of denoising with the existing system.
Keywords: Image denoising; Mask Non Harmonic Analysis; Segmentation; Frequency Domain coefficients; Optimization Algorithm.
Abstract
Privacy Preserving Techniques with Novel Tree Structure and Table for Utility Mining
G. Kiruthika, Dr. V. Umarani
DOI: 10.17148/IJARCCE.2017.62101
Abstract: Utility pattern mining is to identify the item sets with highest utilities, by considering profit, quantity, cost or other preferences. Mining high utility item set from a transaction database is finding item sets that have utility above a user-specified threshold. It extracts highly utilized items accurately, but it suffers due to the privacy breaches. Privacy preserving data mining preserves the sensitive data by modifying the structure of the data. A PPUM algorithm requires a significant amount of time to protect the privacy of data holders because they conduct database scanning operations excessively many times until all important information is hidden. The algorithm becomes inefficient in case of larger application. To overcome this drawback FPUTT(Fast Perturbation algorithm using Tree structure and Table) algorithm minimize the scanning to three times, two time for constructing tree and one time for updating On comparing FPUTT with PPUM in terms of time complexity, privacy preservation and the execution time , FPUTT is efficient than HUM-UT. The existing FPUTT algorithm uses perturbation technique for securing sensitive items which offers a low level security. The proposed work HUM-UT (High Utility itemsets Mining based on Utility Tree) algorithm handles the data streams. In order to enhance the security level, HUM-UT uses anonymization technique for protecting sensitive items The MWS (Maximal frequent pattern mining with weight conditions over data streams )Maximal frequent pattern mining rule and closed frequent pattern rule is applied, to extract maximal itemset and closed item set MMCAR(Minimal non redundant Multilevel and Cross-level Association Rules) from the given item sets. The implementation of the above techniques s increased security to item set and also extracts maximal and closed item sets from data stream. The experimental results show the proposed algorithm outperforms the existing in terms of execute time, memory of usage and number of candidates.
Keywords: Fast Perturbation, closed frequent pattern rule, High utility item set, Maximal frequent pattern mining rule.
Abstract
Association Rule Mining using Optimization Techniques
M. Sunitha, Sunita A Yadward
DOI: 10.17148/IJARCCE.2017.62102
Abstract: Data mining is a hot topic of research for past many years. Amongst the various algorithms popular and the researchers in progress in data mining Association rule mining (ARM) plays an important role due its tremendous publicity. It aims at extraction, discovery of hidden relation, exploration of interesting association between the existing items in a transactional database. It is used to generate frequent items and a set of rules to find frequent items. The entire purpose of this study is to highlight the fundamentals of association rule mining, compare the various modifications proposed to association rule mining approaches. The results generated by apriori algorithm can be further optimized using optimization algorithms. The study intends to determine the minimum support and minimum confidence values for mining association rules using the optimization algorithms. These algorithms are mainly defined for improving the performance of the Apriori algorithm. They minimize the quantization errors and fitness value to be improved. The algorithm improves the result produced by apriori algorithm. The major area of concentration is to optimize the rules generated by association rule mining (apriori method).
Keywords: Data mining ,Association RuleMining, Apriori Algorithm,Optimization Algorithms.
Abstract
A Predictive Approach for Blood Distribution through Data Mining Techniques
Ms. Priyanka Sheshrao Nerkar, Prof. Leena K. Gautam
DOI: 10.17148/IJARCCE.2017.62103
Abstract: Blood is extremely important thing for any hospital. But getting it on a right time is one of the difficult task for any hospital. Many times lack of blood results into delay in emergency operation. This problem can be solved by predicting the need of blood for any hospital in advance. This can be achieved by using data mining technique. Data mining will help to predict need of blood in any hospital for any duration of time. Predicted information will help to distribute blood which is mainly concentrated at few places in hospital across a country. This entire infrastructure will help us to keep right amount of blood at right place. Traditionally, blood record is usually managed by blood banks and hospitals in the form of hand written documents manually. These blood banks are located across different areas/cities in a country. Telephone is the only way of communication for these blood banks. So, in the case of any urgent requirement, blood has to carry from one blood bank to another and this process takes hours or days. Ultimately, this results into delay in operations or emergency can be produced. Solution to above problem is a proposing framework in which record is collected from sources and stored in a system then by prediction system will determine which hospital or blood banks need how much amount of blood. So, this system will definitely remove the problems come in traditional way, By using this system need of blood will definitely can be predicted in advance and it will help in emergencies.
Keywords: Data mining, Prediction analysis, K Means algorithm, Bulk Data Entry, Single Data Entry, REST web services.
Abstract
Demonstration of Queue Management with Differentiated Services in Wireless Sensor Networks (WSN)
John Munyakayanza, Evariste Twahirwa, Jane Murerwa
DOI: 10.17148/IJARCCE.2017.62104
Abstract: Determining the optimal arrival rate to the microcontroller to balance the trade-off between arrival rate and blocking Probability is one of the fundamental issues in WSN. Due to that fact, the bigger the data, the more computation and energy required to deliver the data packets.In an attempt to overcome this challenge, we have extended the model to determine the optimal arrival rate to the Microcontroller with both real time and non- real time traffic to balance the trade-off between arrival rate and blocking probability.Numerical results conducted for various loads, Average arrival rates, service rate of server, Average waiting time and probability of blocking show that real time traffic class experiences lower blocking Probability than non- real time, also results showed that Real time traffic experiences lower average waiting time than non- real time traffic.
Keywords: WSN, Differentiated Services, Blocking Probability, Real&Non-Real Time Traffics.
Abstract
Intelligent Bottle Filling Pick and Place Robot-A Review
Prof G.K Andurkar, Ms. Vishakha P Borkar, Ms. Jayashri V Mohurley
DOI: 10.17148/IJARCCE.2017.62105
Abstract: The pick and place robot will be designed so that User are going filled the liquid in bottle according to volume occupied in the bottle and after filling the liquid robot will do pick and place operation by mechanical devices such as gripper and robotic arm and filled the liquid by solenoid valve .The design will be on a low-cost robot platform for intelligent pick up and place up the things. There is establishment of both wireless communication between the mobile Robot and the remote Base Station, and serial communication between the remote Base Station and the GUI Application. The Base Station requires the serial communication with the GUI Application and also needs to be hardwired with the radio packet controller,PL2303 for wireless control. Our aim is to be able to command and control the Robot wirelessly by the GUI Application. The main task of this project is two parts: (1) to program the ATmega16 microcontroller on both the Base Station and the Robot interfaced to the radio packet controller module which would enable us to wirelessly control the Robot; (2) to program the GUI Application which would enable us to serially control the Base Station. Theoretical system limitation for the packet transmission is evaluated and analyzed. The wireless parts were evaluated with CRC error checking. As a result, we achieved control both wireless communication between the mobile Robot and the remote Base Station, and serial communication between the remote Base Station and the GUI Application. This level of completely was successfully tested on groups at up to four Robots. Hence the wireless communication and the serial communication were successful in the downlink.
Keywords: GUI graphics user interface, CRC cyclic redundancy.
Abstract
Survey of Energy Efficient Spectrum Sensing in Cognitive Radio Network
N. Priya, Dr. B. Rosiline Jeetha
DOI: 10.17148/IJARCCE.2017.62106
Abstract: Energy Efficient scheme in Cognitive radio networks (CRNs) has many advantages compared to the traditional networks. But the dynamic allocation of spectrum by enabling unlicensed users to use the licensed spectrum in a proficient manner is difficult for dynamic spectrum access. In this paper , we analyze and compare some of the existing works on energy efficient spectrum sensing in CRNs, We categorize the works as Energy based spectrum sensing scheme, Energy based MAC Scheme, Clustering,Resource allocation,green energy powered CR and Quality of service.We also present the advantages and disadvantages of these techniques and suggest a best energy efficient approach based on the observation.
Keywords: Cognitive Radio, MAC protocol, Spectrum Sensing, Quality of Service.
Abstract
Modified Enhancement Method for Poor Quality Fingerprint Recognition
Mohammed Alhanjouri, Waleed Abudalal
DOI: 10.17148/IJARCCE.2017.62107
Abstract: Reliable feature extraction from poor quality fingerprint images is still the most challenging problem in fingerprint recognition system. It needs a lot of pre-processing steps to improve the quality of images, then it needs a reliable feature extractor to extract some distinctive features. Segmentation is one of the most important pre-processing steps in fingerprint identification followed by alignment, and enhancement. We improved the segmentation technique which based on thresholding the energy map, with another one based on morphological operation. Recently, Multiresolution techniques have been widely used as a feature extractor in the field of biometric recognition. We use modern multiresolution techniques; Curvelet, Wave Atoms, Shearlet transforms in extracting distinctive features from the enhanced fingerprint images in a new methodology. The selected features are matched throw K-Nearest neighbor classifier technique. We test our methodology in 114 subjects selected from a very challenges database; CASIA; we achieved a high recognition rate of about 99.5%.
Keywords: Fingerprint Recognition, Multiresolution Feature Extraction, Wave Atom, Shearlet, Curvelet, Real Noisy Database, Fingerprint Image Enhancement.
Abstract
Design of Automatic Electricity Inverter
Narendra Nanotkar, Shubham Thakre, Gaurav Nagoshe, Akshay Donode, Ashish Thakre
DOI: 10.17148/IJARCCE.2017.62108
Abstract: The main purpose of this project is to design and verification of a 1000 Watts 220 Volts inverter at a frequency of 50Hz. The inverter is one of the most important and most important components in an independent energy system. It provides power supply when there is cut in government power supply. It plays very important role in areas where there is regular cuts in power supply. It works on the basic principal of charging and discharging of battery. This device is constructed with locally sourced components and materials of regulated standards. The basic principle of operation is a simple conversion of 12V DC into 220V AC from a battery using integrated circuits and semiconductors at a frequency of 50Hz, across the windings of a transformer. Our aim behind this project is to provide an additional power supply at and with the same power output.
Keywords: Integrated Circuits, Pure Sine Wave Inverter, Transformer, Power Supply, Microcontroller.
Abstract
A Continuous Authentication Approaches for Data Security Services against Reconstruction Attacks using Multiple Biometric
Mrs. S. Gunasundari M.Sc., M.Ed., M. Phil, Miss. R. Punitha
DOI: 10.17148/IJARCCE.2017.62109
Abstract: Internet Security and data privacy is preserved by the appropriate authentication schemes. User name and password based authentication is the fundamental step to access internet services. The conventional authentication system follows initial session verification rather than continuous verification. The continuous authentication is referred as the detection of authorized users and authenticating them even after successful login. This type of continuous authentication technique plays vital role in internet security as it performed by various types of authentication schemes. In this paper, a complete authentication protocol is used, which focuses on the throughout authentication scheme that is from login to logout time. This system about the authorized person�s face detection for throughout session (From login time to logout time).The Web camera placed in front of the system in which they are working that camera will capture the face of the authorized person if the person start to move from the camera the capturing process will struck and the transaction will not allow the unauthorized persons to work. This application is fully applied with the camera. Once the person wants to do the transaction then he should sit in front of the camera and the face is authenticated for further steps. The camera will continuously monitor the face to avoid in authenticate transactions. If the user tries to move from the camera then the transaction will not be continued. It will get struck. So, user should be there until he/she finishes the transactions. This project utilizes face matching algorithm and canny and sobal algorithm for edge detection.
Keywords: Face matching, Finger print recognition, authentication, Internet Security, biometric techniques, continuous authentication.
Abstract
Reliable Multi Authority Authentication and Attribute-Based Encryption System for Distributed Data Security
Mrs. S. Yoga, Mrs. Kanagavalli
DOI: 10.17148/IJARCCE.2017.62110
Abstract: Data storing and sharing is an imperative functionality in distributed networks. We propose a secure and reliable multi-owner data sharing scheme in cloud environment. It implies that any user in the group can securely share data with others in the distributed systems. The proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners directly. The size and computation overhead of encryption are constant and independent with the number of revoked users.
Keywords: Cloud security, Hybrid Cloud, Attribute Based Encryption, Private Cloud.
Abstract
Structural Boundaries Detection of Ice Floe of Sea Ice using T-Snake GVF
P. Alaguthai M.SC., M.Phil., C. Sindhuja M.SC., M. Phil.
DOI: 10.17148/IJARCCE.2017.62111
Abstract: Image processing is one of the upgrading research areas to find out the relevant pattern. It can be applied in many fields of medical, satellite records, analyzing data. Satellite records of image plays an important role in image processing. Satellite view of Sea ice image has been taken to detect the boundaries of the ice floe. Sea ice is a formation of sea water freezing. When the sea ice is broken ice floes were formed from them and ice floe is large pack of floating ice. Detecting the ice floes many Image Processing techniques has proposed. But they prove some of the drawbacks like missing data, inaccurate structural analysis because of difficulties in ice floe identification, separation of boundaries connected ice floes, it is an important issue for the climate and wave and structural ice analysis. To solve these problems here proposed a T-Snake algorithm on GVF, which provide an accurate identification of related pattern and structural boundaries for ice floe.
Keywords: Image processing, Ice floe, Weak boundary solving and T-Snake on GVF.
Abstract
Medical Image Segmentation of Pancreas using D-Sift Algorithm
S. Kavitha, M.Sc., M. Phil., (Ph.D), P. Anusha MCA, M. Phil
DOI: 10.17148/IJARCCE.2017.62112
Abstract: Analyzing the medical image in image processing is the most important research area. Capturing the image are analyzed to identify different medical imaging problems is the common factor in this field. Robust organ segmentation is a prerequisite for computer-aided diagnosis (CAD), quantitative imaging analysis, pathology detection and surgical assistance. Some of the organs in the human body have high anatomical variability, so segmentation of such organs is very complex. The proposed system segments the pancreas with the considerations of spatial relationships of splenic, portal and superior mesenteric veins with the pancreas. The proposed system uses macro super-pixels for fast and deep labeling and segmentation process. The proposed system is an automated bottom-up approach for pancreas segmentation with the consideration of spatial relationships with the veins in abdominal computed tomography (CT) scans. The method generates dynamic cascaded and macro super-pixel segmentation information�s by classifying image patches at different resolutions. Fast organ analysis using Dense-SIFT algorithm.
Keywords: Image processing, medical image, pancreas segmentation, CT and Dense-SIFT algorithm.
Abstract
Simulation and Analysis of PBA under Vehicular Networks
S. Anugraha, K. Bhuvaneswari, J. Indumathi, S. Sona, S. Sivanesskumar M.E., Ph.D.,
DOI: 10.17148/IJARCCE.2017.62113
Abstract: In this paper, we propose an efficient broadcast authentication scheme called Prediction-Based Authentication (PBA) to not only defend against computation-based DOS attacks, but also resist packet losses caused by high mobility of vehicles. Our PBA is an efficient and lightweight scheme since it is primarily built on symmetric cryptography. To further reduce the verification delay for some emergency applications, PBA is designed to to predict future beacons in advance. In addition, to prevent memory-based DS attacks, PBA only stores shortened re-keyed Message Authentication Codes (MACs) of signatures without decreasing security. We analyze the security of our scheme and simulate PBA under varying vehicular network scenarios.
Keywords: cryptography; denial of service attacks; PBA scheme; tesla scheme; VANET.
Abstract
Analysis of Joint Estimation of CFO, I/Q Imbalance& Channel Response for OFDM MIMO Systems
Rajat Srivastava, Mr. Mukesh Tiwari
DOI: 10.17148/IJARCCE.2017.62114
Abstract: In this project we are going to analyse the joint estimation of inphase and quadrature-phase (I/Q) imbalance and carrier frequency offset (CFO). The channel response for multiple-input multiple output (MIMO) orthogonal frequency division multiplexing (OFDM) systems is done using training sequences. The CFO,I/Q imbalance are caused due to mismatch of carrier frequency at the transmitter and local oscillator frequency at the receiver. This paper presents a novel approach for joint estimation of I/Q imbalance, CFO and channel estimation for Multiple Input Multiple Output (MIMO) OFDM systems. A new energy is introduced called channel residual energy (CRE). The proposed method uses OFDM block for training. In this paper, we show that by minimizing the CRE, we can jointly estimate the I/Q imbalance and CFO without knowing the channel response. The results show that the mean-squared error (MSE) of the proposed method is close to the Cramer-Rao bound (CRB).
Keywords: MIMO, OFDM, Carrier Frequency Offset.
Abstract
Healthcare Analysis using Olex Genetic Algorithm
Ms. Priyanka Shivagunde, Dr. Ms. Anita R Kulkarni
DOI: 10.17148/IJARCCE.2017.62115
Abstract: Health is the most valuable factor affecting our life. People are highly focused on the health care with high preference. Now-a-days there are so many fatal diseases occurring in individuals, Cancer is one of those fatal diseases which is the cause of death of the several peoples in a year and in those people, breast cancer is a major cause of women death. According to the recent survey, about 1 in 8 women (about 12 percent) have breast cancer. Diagnosis of disease is usually done in the last stage and hence cannot be cured by treatment. [6]Early diagnosis of this disease is essential and which needs regular check-up should be done by women above 40 years of age. This paper provides a methodology for automatic diagnosis of disease which is more feasible to be used by the individual person, caretaker, friends and family members which is more feasible. A system analyses patient's biomedical data and find out an existence of breast cancer in the patient. The genetic algorithm Olex GA used to classify patient in different stages as per her symptoms and test reports. The genetic Olex algorithm is a text-based classification algorithm. The visual report of diagnosis is generated which is easy to be understood by an individual from non-medical background. Also, one more feature of this system is the adaptation. New symptoms ant tests are saved in a database and those will train manually. This approach helps the patients, doctors and family members to find out.
Keywords: Text based classification, Data Mining, Supervised learning, Olex GA.
Abstract
Efficient Design of Low Pass Fir Filter by Rectangular, Taylor and Kaiser Window Techniques
Pramod Yadav, Shankarlal Sahu, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.62116
Abstract: The aim of this paper is to design FIR filter of the order �30� using various window function methods. Digital filter are widely used in the world of communication and computation. On the other hand to design a Digital Finite Impulse Response (FIR) Filter that satisfies. This paper presents the importance of filter in signal processing. Digital filter are two type 1. FIR and 2. IIR. These are various methods for filter designing. This paper discuss the window method low pass fir filter designing rectangular, taylor and Kaiser window function methods are presented. Design of FIR filter is done in MATLAB by FDATOOL low pass filter is designed with sampling frequency 48000Hz and cut-off frequency 10000Hz magnitude, phase impulse, step response and pole, zero plot. We found that filter designing by window method is easy and fast.
Keywords: FIR Digital filter, DSP, low pass filter, window function, MATLAB, FDATOOL in MATLAB, rectangular window, taylor window, and Kaiser window techniques.
Abstract
Data Mining and Analytics: A Proactive Model
Vishesh S, Manu Srinath, Vivek Adithya, Sumit Kumar Sourav, Ashwani Kumar Singh, Vyshnav L
DOI: 10.17148/IJARCCE.2017.62117
Abstract: Data mining is the automated extraction of hidden predictive data from huge databases. It is a prospective approach rather than the traditional retrospective approach followed in many other applications. The main goal of data mining is simplification and automation of overall statistical process, from data source(s) to model application. In this paper, we present to you the importance, goals, applications, advantages and techniques of data mining. We also draw limelight on the improvement on the three major technologies which have enabled data mining to become more apt and productive in the present day scenario.
Keywords: Data mining, hidden predictive data, automation, techniques of data mining.
Abstract
Project Progress Tracking System
Pawan Khade, Heena Ramteke, Hemant Shivhare, Pranjali Chandekar, Namrata Baware
DOI: 10.17148/IJARCCE.2017.62118
Abstract: In today's life it has likewise turned out to be imperative to be upgraded constantly. It might be news, business, way of life, and so forth. Extend updation has turned into a cardinal issue in IT industry. Till now in the product organizations there was no office of giving current redesigns of the project to customer along these lines, to take care of this issue we are making a web application named �PROJECT ESTADO QUO'. 'ESTADO QUO' is a Spanish word utilized for alluding current status. This web application will be solely for project administration done in the organizations, which will be fit for demonstrating the advance of the project of various modules(through UI). This app will provide a client retention , save time of a client as well as developers, also client will be relax of checking e-mails, calls and meetings.
Keywords: Project Status, Current, Estado Quo, Percentage, Progress.
Abstract
Comparitive Study of Image Compression Algorithms on Bench Mark Suite
A.J. Rajeswari Joe, N. Rama
DOI: 10.17148/IJARCCE.2017.62119
Abstract: The digital image processing is exponentially increasing in today�s world which leads to storage and transmission problems. Many methods have been introduced in last decay that focuses on lossy and lossless compression. In digital network field the image compression does not tolerate the loss of data so lossless compression is preferred. Lossless compression reduces the size of image only to certain limit which is less than lossy compression. This paper compares the compression of bench mark images with various image compression algorithms that compress the images better than previous lossless image compression technique. The proposed algorithm (SEGC-N-D) is compared with DCT, DWT, Fractal, and JPEG. This process focus on identifying the non uniform areas which has high occurrence of gray level images and then segment that image using neural network. The segmented image is send to pre-compress process. In Pre-compress technique each pixel value is converted into binary and arranged in a data file as compressed using our proposed technique. Run length encoding is applied to compress the image further. To get the original image this process is reversed.
Keywords: DCT, DWT, FRACTAL, JPEG, SEGC-N-D Compression Techniques.
Abstract
Contrivance Planning Management System
Kiruthika P, S. Shanmugapriya, L. Priya
DOI: 10.17148/IJARCCE.2017.62120
Abstract: This project aims at developing a suitable information system to coordinate the activities of the employer, jobseeker and admin. The project titled �Contrivance Planning Management System� aims at automating the information system. This project is mainly created to make the job searching work in an easy way. The process carried out in the project are, the collection of resumes, verification of resumes, filtering of resumes, requirement specification of the companies, comparison of requirement and available resumes, selecting the suitable candidate and finally developing a report to intimate the selection to the candidate. Here jobseekers will send their resumes to the admin. Employers also send their requirements to admin. After collecting all these information�s admin will compare the resumes of the jobseekers and the requirements of the employer and select qualified candidates. After that they send the selected list to the appropriate employers. Those employers will do their selection process. The user can give their feedback which is helpful to enhance the contrivance planning management website.
Keywords: Resume, Report, Jobseekers, Employers.
Abstract
An Approach for Fingerprint Feature Extraction using Bit Plane and Classification with ANN
Gagandeep, Er. Harshdeep Trehan, Er. Varinderjit Kaur, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2017.62121
Abstract: Fingerprint recognition is one of the Secure and reliable method of the biometric identification as each individual has unique and unmatched fingerprint pattern. A fingerprint image is treated as a textured image. The important part of the recognition system is the extraction of the features. So in fingerprint recognition the extraction of the feature for further matching and verifying the person identity plays an important role .Traditionally various techniques like Minutiae, Orientation maps, Pattern Matching etc were used for the feature extraction process. Still the accuracy of the system was that much improved. The technique used for the feature extraction should be accurate so that the identification is done accurately. So in this research work a new approach is proposed for the recognition of the fingerprint for the authentication purpose. This method is considered to be efficient and more accurate than the traditional methods. In this Bit plane feature extraction is used to extract the features from the image that are further used for the matching the features .Along with this the ANN is used for obtaining the results. From the results obtained it is concluded that this method is accurate and efficient than the traditional methods of fingerprint recognition system.
Keywords: Biometric system, fingerprint recognition system, Artificial Neural Network, Bit Plane Feature Extraction.
Abstract
Addressing Multilabel Classification Problem Via Co-evolutionary Learning Algorithm
Gayatri T. Urade, Prof. Pravin G. Kulurkar
DOI: 10.17148/IJARCCE.2017.62122
Abstract: Multi-label classification refers to the task of predicting potentially multiple labels for a given instance. Conventional multi-label classification approaches focus on the single objective setting, where the learning algorithm optimizes over a single performance criterion (e.g.Ranking Loss) or a heuristic function. The basic assumption is that the optimization over one single objective can improve the overall performance of multi-label classification and meet the requirements of various applications. However, in many real applications, an optimal multi-label classifier may need to consider the tradeos among multiple conflicting objectives, such as minimizing Hamming Loss and maximizing Micro F1.
Keywords: Muti Label, Web, Learning, Memory efficiency.
