VOLUME 6, ISSUE 1, JANUARY 2017
A Community Detection and Recommendation System
Kashmira Nagwekar, Prof. Kavita Shirsat
Energy and Hop count aware Ant based Routing Protocol for Wireless Sensor Networks
Chaganti B N Lakshmi, Dr. S. K. Mohan Rao
Performance and Analysis of Interleave Division Multiple access using Turbo Encoder
Shekhar Singh, Surendra Kumar Sriwas, M. Shukla, JP Saini
A Review Paper on: Student Attendance System by Face Detection
Sneha D. Ikhar, Sagar M. Bhakre, Vaishali M. Bodhe
Anomalies and Selective Forwarding Attacks in WSN-A Survey
Arya I S, Dr Binu G S
Human Tracing using Location based System
G.S. Mate, Sumit Gahire, Rameshwar Mane, Abhay Sharma, Ravikiran Waghmare
Solid Waste Prediction using ANN in the Nagpur City
Mr. Shrikant R. Chaudhari, Dr. Chitra A. Dhawale
Socio-Economic Development Approach for Implementation of Cloud Computing in E-Governance
Mrs. Vaishali Kadu, Mr. C. P. Kadu
Intelligent Dynamic Bus Transportation System
Malan Sale, Aparna Budhawant, Manisha Bhamare, Nilam Gunjal, Saraswati Reshame
Location Sensitive Recommendations in Ad-hoc Social Network Environments Generated using Learning-to-Rank Algorithm
Mohit Satarkar, Keith Ger, Suraj Gawas, Yash Mehta, Prof. Parth Sagar
Analysis and Simulation of a Cookie Vending Machine Model based on Stochastic Petri Nets
Sofre Garevski, Emilija Spasova Kamceva
Challenges in Integration of Microelectronics & Photonics with Nano-chemistry
Mohd. Muzaffar Ahmad, Mohd. Abdul Sattar, Mohd. Anas Ali
Dynamic Traffic Control System using RFID Technology: A Systematic Review
Priyanka Nalawade, Prajakta Waghere, Nisha Vanare, Prajakta Kalbhor, A. J. Jadhav
Fast Re-Route Mechanism in Multiple Link Failure Environment in MPLS Network
Prof. Dipti Sonawane, Mr. Mangesh T. Chaudhari
Effect of Distributed Elements Filters on Transmission Lines
Shivani Rajendra Dhatrak
Bomb Diffusing Robotic Arm
Sneha Arora, Mrs Ruchi Varshney, Saksham Agarwal, Shivani, Sneha Gupta
Wireless Fuzzy Controller for Drip Irrigation
Dr. Ali Hamouda, Dr. Taj Eldain A.G, Dr. Dia Zayan, Hassan CHaib
Cloud-Based Remote Venue Recommendation Framework
Ms. K. C. Sonawane, Ms. S. S. Ponde
Content Based Vector Image Retrieval using LBG Algorithm
Rachana D. Shinde, Lima Mandal, Apeksha Kulkarni, Dr. A. C. Lomte
Review: Image Enhancement and Background Detection using Mathematical Morphology [MM]
Payal T. Gadare, Prof. Nitin Raut
Survey on Recommendation of Personalized Travel Sequence
Mayuri D. Aswale, Dr. S. C. Dharmadhikari
H-LEACH Protocol with Fault Tolerance in WSN
Ratinder Pal Kaur, Er. Rupinder Kaur
Design and Simulation of Low Power and High Speed Comparator using VLSI Technique
Ms. Aayisa Banu S, Ms. Divya R, Mr. Ramesh .K
Brain Cancer classification Based on Features and Artificial Neural Network
Nidahl K. El Abbadi, Neamah E. Kadhim
Review on Decision Support System Approach for Agriculture Field
Ms. Shweta C. Meshram, Mr. A.D. Gawande, Mrs. K.R. Ingole
Optimal AVR Control System using Particle Swarm Optimization
Ahmed J. Sultan
Review Paper on Real-Time Vehicle Classification and Counting via Low-Cost Collaborative Sensing
Prof. S. O. Dahad, Ms. Shital Tayade
The Literature survey on latest Iris Recognition Technique
Ms. Rasika P. Rahane, Prof. Deepak Gupta
Review on Learning based Interface Modelling using Augmented Reality
Akshay Indalkar, Akshay Gunjal, Rachna Satao, Mihir Ashok Dalal, Nikhil Sharma
A Comprehensive Survey of QoS-Aware Routing Protocols in Wireless Body Area Networks
Anand Kumar M, Dr. C. Vidya Raj
A Comprehensive Survey of Palmprint based Biometric Verification System
Mr. Ravindra Gupta, Mrs. Varsha Namdeo, Ms. Rashmi Chourey
Smart Traffic Congestion Control
Prof. Ranjeet S. Mote, Dharmesh A. Chhajed, Sambhav V. Dwidmuthe, Komal N. More
A Review on Secret Image Protection using Reversible Watermarking
Samrudhi S. Mamarde, Dr. Siddharth A. Ladhake
Design of Hybrid BCI using Multimodal EEG for Robotic Application
Pooja B. Kokare, Prof. K. P. Wagh, Prof. S.S. Savkare
A Review on Iris and Fingerprint Fusion Authentication Systems
Dhara Heble, Rupali Nikhare
Survey on Prediction of Kidney Disease by using Data Mining Techniques
S. Gopika, Dr. M. Vanitha
E-Proctored Model: Electronic Solution Architect for Exam Dereliction in Kenya
Edwin Omol, Dr. Silvance Abeka, Fred Wauyo
Factors Influencing Acceptance of Mobile money Applications in Enterprise Management: A Case Study of Micro and Small Enterprise Owners in Kisumu Central Business District, Kenya
Edwin Omol, Dr. Silvance Abeka, Fred Wauyo
Study of SWT-ANN Based Indoor Optical Wireless Communication System
Ramneet Kaur, Arun Bhatia
Digital License Plate Detection and Recognition with Improved Vertical Edge Detection and Template Matching
A F M Shahab Uddin, Feroza Naznin, Md. Alamgir Hossain, Md. Zahidul Islam
A Survey on the Plant Leaf Disease Detection Techniques
Arpita Patel, Mrs. Barkha Joshi
Implementation of SHCS and AONT Methods for Hiding Packets in Wireless Networks
Shaik Mahammad Rasheed, M. Giridhar Singh
A Food Recognition System for Calorie Measurement
Ms. Ankita A. Podutwar, Prof. Pragati D. Pawar , Prof. Abhijeet V. Shinde
An adaptive Second Level Hybrid Image Watermarking Technique using DWT-SVD in Low Frequency Band
Rajesh Tyagi, M. K. Pandey
Review on Compute Analysis of Routing Algorithm for Wireless Sensor Networks
Prof. S.M. Patil, Sheetal Ragit
Review on Performance Analysis of BER Using BPSK
Mrs. S.M. Patil, Miss. Prachi Zodpe, Miss. Shital Ragit
A Survey Paper on Authentication for Shoulder Surfing Resistance for Graphical Password using Cued Click Point (CCP)
Monali Pawar, Prof. G.S Mate, Soni Sharma, Sonam Gole, Snehal Patil
A Comprehensive Review on Automated Visualization Techniques for Intrusion Detection Systems
Sujata. B, Priyanka. M, Anurag De
High Efficiency Street Lightning using ZigBee based Online Control System
S. Anu Thilak, P. Narmadha, G. Yoga, B. Vijayalakshmi
A Survey on Performance Evaluation and Prediction of Teachers’, Students’ Performance Using Data Mining Techniques
Sudarshan B. Wadkar, Dr. S. C. Dharmadhikari, Santosh Kumar Dwivedi
Optimizing Call Drops in Cellular Network using Artificial Intelligence based Handover Schema
Avinash Singh, Surya Pratap Singh, Upendra Nath Tripathi, Manish Mishra
Big Data: Analyzing Map Reduce Auditing Mechanism
K. Shouryadhar, C. Gazala Akhtar, M. Anantha Lakshmi
IOT based Smart Water Supply management System
Kiran M. Dhobale, Sangmeshwar P. Gorgile, Pradnya J. Gunjal, Krushna A. Hirve, Prof. U. A. Mande
Novel Approach Based on Genetic Algorithm for Adaptive Resource Management in Software-Defined Networks
Mohammed Najm Abdullah, Afrah Salman Dawood
Advanced Monitoring of R-22 Refrigerant Leakage
Mohan M, Vidyadhara B.V, Vishesh S, Manu Srinath
Analysis of Distributed Traffic Control Schemes in Web Attacks
M. Paranthaman, Agnus S. Swarna Nishalakshmi
A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks
Shrishty Gautam, Charu Wahi, Seema Sharma
Improved Performance of CLOUDQUAL in Internet of Things
S. Saravanan, S. Sowmiya
Automatic Monitoring and Controlling of Weather Condition using Big Data Analytics
I. Karthika, K.P. Porkodi
Intrusion Detection and Prevention System in Cloud using Decision Tree Model
S. Santhiya, S. Saravanan
Mobile Application for Obtain the Traffic Violations
Ali Abdulhussian Hassan
Implementation of Hybrid Cryptosystem using AES-256 and SHA-2 256 by LabVIEW
Israa H. latif, Ergun Erçelebi
Survey on Dynamic Ownership Management for Secure Data De-duplication
Bhagyashri B. Nikam, Dr. Emmanuel M.
A Review of Weather Data Analytics using Big Data
Priyanka Chouksey, Abhishek Singh Chauhan
Quality Assessments of Various Digital Image Fusion Techniques
D.A. Deshmukh, Prof. Dr. P.V. Ingole
Multi-Feature Extraction and Matching Approach for Image Retrieval: A Review
Prof. N. R. Chopde, Miss P. A Rewaskar
Survey on Credit Card Fraud Detection using Recurrent Attributes
Navneet Jain, Vasima Khan
Efficient Route Optimization using Distance Matrices for Generation of Latin Square
Sumit A. Bhagat, Prashant M. Kakade
An Updated CLAHE Approach for Image Enhancement with Advanced Wavelets
Tarandeep, Er. Varinderjit Kaur, Dr. Naveen Dhillon
To Propose Automated Help Desk System
Samartha Agrawal, Sanket Shingate, Kaushik Yadav
IOT based Smart Waste Management
Prof. Indu Anoop, Ayush Jain, Shweta Pathak, Gauri Yadav
Simulation of Wireless BAN using Network Simulation Tool
Vishesh S, Manu Srinath, Sneha Gopinath, Pranava Karanth R
Sentiment Analysis Tool
Prof. Ajitkumar Khachane, Lakshya Kumar, Chandresh Jain, Ashay Shah
A Study on Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation
Rashmi, Vidya Kumari
An Investigation Study of Hospital Management Information System
Dr. Mohammed Najm Abdulla, Dr. Intisar Al-Mejibli, Shaimaa Khamees Ahmed
Indoor Navigation using LIFI
Prof. B. B. Gite, Pankaj Maydeo, Shubhangi Bade, Tushar Muluk
Smart Irrigation and Crop Planning System: using Arduino Microcontroller
Ekata Ghadage, Vibhavari Kharate, Parnika Mane, Samruddhi Pimpale
Review paper on Software Data Reduction for Bug Triage
Miss. Karande Rupali .D, Mr. H.P. Khandagale
Abstract
A Community Detection and Recommendation System
Kashmira Nagwekar, Prof. Kavita Shirsat
DOI: 10.17148/IJARCCE.2017.6102
Abstract: Recommendation systems play an important role in suggesting relevant information to users. Community-wise social interactions form a new dimension for recommendations. A social recommendation system using community detection approaches is proposed. I will be using community detection algorithm to extract friendship relations among users by analysing user-user social graph. I will be developing the approach using MapReduce framework. This approach will improve scalability, coverage and cold start issue of collaborative filtering based recommendation system.
Keywords: Community Detection; Recommendation System; Cold-Start; E-Commerce.
Abstract
Energy and Hop count aware Ant based Routing Protocol for Wireless Sensor Networks
Chaganti B N Lakshmi, Dr. S. K. Mohan Rao
DOI: 10.17148/IJARCCE.2017.6103
Abstract: Maximizing the lifetime of a Wireless Sensor Networks is an NP hard combinatorial optimization problem. Such problems can not be solved within polynomially bounded time. A near optimal solution can be obtained in a relatively short time by applying heuristics. Ant Colony Optimization which is a meta heuristic inspired from the behaviour of real ant colonies is applied here to find an optimal routing path and hence to increase the network lifetime. The proposed protocol finds the path to transmit the data based on the energy remained in the sensor nodes and the number of hops required to reach the node. The performance of the protocol is compared with the existing Ad hoc on demand Distance Vector routing protocol and Self Healing Routing Protocols for Wireless Sensor Network in terms of energy consumption, average delay, packet delivery ratio and packet drop.
Keywords: Ant Colony Optimization, Residual Energy, Transmission Range, Wireless Sensor Network.
Abstract
Performance and Analysis of Interleave Division Multiple access using Turbo Encoder
Shekhar Singh, Surendra Kumar Sriwas, M. Shukla, JP Saini
DOI: 10.17148/IJARCCE.2017.6104
Abstract: The efficiency of CDMA system is degraded with number of user increases. CDMA is limited by (MAI) and (ISI) Hence when number of user increases the BER performance also increased. The main limitation in CDMA is that it involves separate coding and spreading operations. A method to enhance the performance of IDMA System turbo codes can be applied to IDMA system, called Turbo coded IDMA System, which is presented recently for combing the advantages of turbo and IDMA. We use regular Turbo coder is used. IDMA uses repetition code. To mitigate MAI and ISI, turbo type iterative MUD (Multi User Detection) is used. In contrast to CDMA, IDMA uses the iterative chip-By-chip (CBC) detection algorithm to overcome intra-cell Interference. An interleave-division multiple-access (IDMA) system supports the presence of multiple users in a cell by resorting to a different interleaver per user. The results Show that the TURBO CODED IDMA is better than other FEC code like convolution code and LDPC code under the same Parameters. Turbo coded IDMA Provide high speed of communication services and low cost of receiver. Turbo codes are used in 3G/4G mobile communications. And in (deep space) satellite communications as well as other applications.
Keywords: AWGN Channel, BPSK Modulation, IDMA, Matrix Interlever, Random interleaver, Random inter leaver, Turbo Encoder.
Abstract
A Review Paper on: Student Attendance System by Face Detection
Sneha D. Ikhar, Sagar M. Bhakre, Vaishali M. Bodhe
DOI: 10.17148/IJARCCE.2017.6105
Abstract: The face is the identity of a person. The method to exploit this physical feature have seen a great change since the advent of image processing techniques. The attendance is taken in every school, colleges and library. Traditional approach for attendance is professor calls student name & record attendance. The system described in this paper aims to deviate from such traditional system and introduce a new approach for taking an attendance using image processing. This paper describes the working of An Automatic Attendance System in a classroom environment. There are several approaches to face recognition of which Principle Component Analysis (PCA) has been used extensively in literature. In this paper, Face Recognition based Automatic Attendance System using Principle Component Analysis is proposed. The system consists of a database of a set of facial patterns for individual. The characteristic features called �Eigen Faces� are extracted from the stored images using which the system is trained for subsequent recognition of new images.
Keywords: Face Recognition, Face Detection, Principal Component Analysis (PCA), Eigen Face.
Abstract
Anomalies and Selective Forwarding Attacks in WSN-A Survey
Arya I S, Dr Binu G S
DOI: 10.17148/IJARCCE.2017.6106
Abstract: Wireless Sensor Networks (WSN networks) are becoming an important topic in the eyes of researchers because of its vast variety of applications in various fields. WSNs are application specific networks which have a large number of small, randomly deployed self-configurable sensor nodes, capable of sensing an event, computing and communicating the event details with the neighboring sensor nodes. In many technologies, like Internet of Things (IoTs), WSNs act as a digital skin by which the information about the outside world is obtained. WSNs are used in many applications, in particular, Personal applications like home automation, Business applications like sales tracking, Industrial applications, and military applications etc. So the task of WSN is not only sensing but also the computation of data which is their responsibility and hence the quality of data is very crucial. Since there are no particular criteria for the deployment of sensor nodes, the hostile environments in which they are deployed and their energy constraints, they are very much vulnerable to anomalies and attacks. Any deviation from the normal sensing profile can be considered as an abnormality in the network. This paper gives an overview of such cases in a WSN.
Keywords: Wireless Sensor Networks, Anomalies, Selective Forwarding Attack.
Abstract
Human Tracing using Location based System
G.S. Mate, Sumit Gahire, Rameshwar Mane, Abhay Sharma, Ravikiran Waghmare
DOI: 10.17148/IJARCCE.2017.6107
Abstract: Now-a-days crimes are getting worse day by day especially when it�s comes to women and children. Nobody feels safe while travelling alone and mainly to beat abandoned place. However, we recognize that there is need to provide necessary system/devices to overcome these issues. Various applications and algorithm are proposed to overcome these issue by providing the android app to user like Abhaya, Raksha, and Fight back through which user can tap the button on app whenever they feel vulnerable at public place or when the need arises. These system uses GPS for tracing the location and these app can send the real time and continuous location of the user. Several algorithm are developed to enhance the location accuracy. All these devices has result in the reduction of crime and improve the human safety. The objective of this survey paper is to propose a system through which a vulnerable user can get help instantly.
Keywords: GPS, GSM, Location, Latitude, Longitude.
Abstract
Solid Waste Prediction using ANN in the Nagpur City
Mr. Shrikant R. Chaudhari, Dr. Chitra A. Dhawale
DOI: 10.17148/IJARCCE.2017.6108
Abstract: The objective of this paper is to predict the quantity of solid waste generated in Nagpur city. As population is increasing day by day solid waste generation is also increasing. This is very big question in front of NMC that how to tackle this problem. It is very important to predict the quantity of solid waste in the upcoming year to implement the best solid waste management system. Nagpur city is divided in to ten zones by NMC for better administration. Solid waste is collected from each zone and transferred at dumping station Bhandewadi, Nagpur. Solid waste prediction for the city like Nagpur is quite challenging as the values of the variables changes over the time rapidly. After studying the working of NMC, Nagpur city profile and literature review four factors, zone wise population, generated solid waste, slum population and electricity consumption in KWh/capita/day has been considered as most important factor in solid waste generation in the city. A radial basis function neural network mainly known for time series prediction is used in calculating the solid waste generated at Nagpur city. This work may be helpful to NMC for better implementation of solid waste management system.
Keywords: Nagpur Municipal corporation (NMC), Artificial Neural Networks (ANNs); Solid Waste Management System (SWMS); Neural Network (NN); Solid Waste (SW); kilo watt hour ( KWh); House Hold (HH).
Abstract
Socio-Economic Development Approach for Implementation of Cloud Computing in E-Governance
Mrs. Vaishali Kadu, Mr. C. P. Kadu
DOI: 10.17148/IJARCCE.2017.6109
Abstract: The Government is committed towards overall development of all sections of society. The Ministry of Social Justice and Empowerment works towards educational development, economic and social empowerment of needy people. India is a country of villages and to improve and sustain the overall prosperity, growth and development in the global competitive regime, National E-governance plan (NEGP) seeks to lay the foundation with various projects, starting from the grass-root levels, and provide impetus for long-term e-governance within the country. In this direction rural e-Governance applications implemented in the recent few years have been demonstrating the importance of Information and Communication Technologies (ICT) in the concerned areas of rural development. Indeed, some of the schemes introduced in rural India have improved the government services immensely. This paper how implementation of cloud computing will increase social and economic development of India.
Keywords: Cloud Computing, e-Governance, Socio-Economic Development.
Abstract
Intelligent Dynamic Bus Transportation System
Malan Sale, Aparna Budhawant, Manisha Bhamare, Nilam Gunjal, Saraswati Reshame
DOI: 10.17148/IJARCCE.2017.6110
Abstract: Android is the latest and a rapid growing technology available for all the users or customers in today�s market .Every Person uses smart phones to make his life luxurious. Now-a-days management of increased public transportation is one of the major issue. There are buses made available for passengers travelling distances, but not many passengers have complete information about these buses. These days Smartphone plays vital role in everyone's life. Through these Smart phones, Passenger can get complete information about buses such as accurate bus timings, correct bus numbers, GPS tracker which will improve current bus system. This application works on GPS enabled Android Phone to get exact location of bus on Google map and this data is used to update on-line bus timetable dynamically which will make easy to predict bus arrival time of bus for passengers. It will allocate bus dynamically by considering parameters such as count of persons who want to go to the same destination and number of vacant seats of bus going to the same destination. Every bus-stop will have one android application which will take mobile number and destination name as input which will be used for dynamic allocation of buses. After that server will allocate bus and calculate fare and send it to the user on specified mobile number through SMS. If there are less number of passengers than available seats then allocation will be done normally like current bus transportation system.
Keywords: GPS Device, G-Map, PMT Buses.
Abstract
Location Sensitive Recommendations in Ad-hoc Social Network Environments Generated using Learning-to-Rank Algorithm
Mohit Satarkar, Keith Ger, Suraj Gawas, Yash Mehta, Prof. Parth Sagar
DOI: 10.17148/IJARCCE.2017.6111
Abstract: Social recommendation has been popular and successful in various urban sustainable applications such as online sharing, products recommendation and shopping services. These applications allow users to form several implicit social networks through their daily social interactions. The users in such social networks can rate some interesting items and give comments. The majority of the existing studies have investigated the rating prediction and recommendation of items based on user-item bipartite graph and user-user social graph, so called social recommendation. However, the spatial factor was not considered in their recommendation mechanisms. With the rapid development of the service of location-based social networks, the spatial information gradually affects the quality and correlation of rating and recommendation of items. The selection of the best service from the ones available is a conundrum to predict as different users will follow different selection techniques. Selection of the web service is directly related to the quality of service (QoS) provided. This paper proposes a learning-to-rank algorithm to comprehend the decision strategy of users in choosing the specific web service. This paper proposes spatial social union (SSU), an approach of similarity measurement between two users that integrates the interconnection among users, items and locations. The SSU-aware location sensitive recommendation algorithm is then devised. We evaluate and compare the proposed approach with the existing rating prediction and item recommendation algorithms subject to a real-life data set. Experimental results show that the proposed SSU-aware recommendation algorithm is more effective in recommending items with the better consideration of user�s preference and location.
Keywords: Spatial Social Union (SSU), Quality of Service (QoS), Learning-To-Rank, Decision Strategy.
Abstract
Analysis and Simulation of a Cookie Vending Machine Model based on Stochastic Petri Nets
Sofre Garevski, Emilija Spasova Kamceva
DOI: 10.17148/IJARCCE.2017.6112
Abstract: Petri nets are a well-known formalism for the description of concurrency and synchronization inherent in modern distributed systems. The graphical representation of Place-Transition net is called model. In order to understand the properties of the model and to be sure that it behaves as it should, the model can be analysed and simulated. In this paper we are going to show simple model for the Cookie Vending Machine, designed with stochastic petri nets. Then we are going to analyse and simulate the model using the Petri Net Toolbox in Matlab. At the end the collected results from analyses will be discussed.
Keywords: Analysis, Simulation, Cookie Vending Machine, Petri Net, Stochastic Petri Net, Petri Net Toolbox.
Abstract
Challenges in Integration of Microelectronics & Photonics with Nano-chemistry
Mohd. Muzaffar Ahmad, Mohd. Abdul Sattar, Mohd. Anas Ali
DOI: 10.17148/IJARCCE.2017.6113
Abstract: Electronics, in particular VLSI technology, has made possible design of sophisticated, complex and powerful systems for user. Although silicon technology is evolving continuously to produce smaller, faster and reliable systems with low power, eventually the integration of Microelectronics and Photonics with Nano-chemistry as the driving force is the new area of research that spans from environmental management , smart health-care, smart energy management to new innovations in communications, processing and man-machine interfaces. This has created tremendous opportunities for realization of new systems. The co-existence of silicon technology with these emerging technologies, photonics and nano-chemistry has created new design opportunities for the designer, bringing new challenges to be solved. In this paper, some of the important challenges have been discussed.
Keywords: Photonics, nano-chemistry, VLSI Photonics, deep-submicron VLSI.
Abstract
Dynamic Traffic Control System using RFID Technology: A Systematic Review
Priyanka Nalawade, Prajakta Waghere, Nisha Vanare, Prajakta Kalbhor, A. J. Jadhav
DOI: 10.17148/IJARCCE.2017.6114
Abstract: Internet of Things (IoT) links the real world objects to the virtual world, and enables every time, everywhere connectivity for anything that can be switched ON/OFF. It constitutes to a world where physical things and human beings, as well as virtual data and environments, interact with each other. Traffic in urban areas is increasing day by day which leads to most critical issues of traffic management. Traffic congestion often causes loss of time, time delay, missed opportunities, etc. To overcome these problems proposed system uses the RFID technology where RFID tag is attached to each vehicle and as and when vehicle reach the traffic junction the RFID reader will read those RFID tags. Depending upon the count of vehicles green passage will be set dynamically and the proposed system provides special privileges for emergency vehicles like police vehicle, ambulance, VIP vehicles, etc. RFID also enforces law against stolen vehicles.
Keywords: RFID tag, RFID reader, Ardunio microcontroller, IR sensor.
Abstract
Fast Re-Route Mechanism in Multiple Link Failure Environment in MPLS Network
Prof. Dipti Sonawane, Mr. Mangesh T. Chaudhari
DOI: 10.17148/IJARCCE.2017.6115
Abstract: Multiprotocol Label Switching (MPLS) is switching network and provides significant benefits to the network by fast forwarding Internet Protocol (IP) packets. MPLS is scalable network and which provides end-to-end quality of service (QoS), also it enables efficient utilization of existing networks. MPLS is implemented in Mobile Ad-hoc Network (MANET) environment, then there is need to control over this network because the nodes in the network can be move at any point of time in MANET environment. If link failure occur in the network, then there is need to tolerate this failed link packet. For to tolerate this failed link use MPLS Fast Re-route (FRR) mechanism. The MPLS FRR mechanism based two types local and global. The local FRR mechanism which tolerate single link instead of path of network which is in global. The MPLS FRR mechanism is based on preplanned established link in the network. If link failures occur then packet of failed link is switch-over to the backup path that is created initially. In the proposed system, existing link or local based restoration with fast re-routing (FRR) mechanism for MPLS network is used and then analyses the problem such as packet loss, packet reordering, delay and overhead in the network after link failure. This FRR mechanism provides fast traffic recovery when a link failure occurs, MPLS-FRR uses link based local restoration mechanism for each failure. The main focus of the proposed work is to select optimal backup link with FRR mechanism and bellman ford algorithm during link failure. The FRR mechanism with bellman ford algorithm can reduce packet loss ratio and delay in the network and this can be simulated through network simulator version 3(ns3).
Keywords: MPLS, FRR, ns3, MANET, etc.
Abstract
Effect of Distributed Elements Filters on Transmission Lines
Shivani Rajendra Dhatrak
DOI: 10.17148/IJARCCE.2017.6116
Abstract: Electrical Energy is the life stream of progress for any nation and it is all the more vital in a developing country like India. The energy in electrical form is most widely used since it can be converted into any other form efficiently. A power System Network consists of variety of apparatus for generation, transmission and distribution spread over a large area serving to number of Industrial & Commercial consumers. When the power system is polluted with harmonics due to non linear load, unbalance prevailing between phases and bad voltage profile the quality of power supply becomes very inferior which hampers the power apparatus of both the utilities and the customers. Filters have gained a great attention owing to their applications as a solution to above issues. To make it distortion and ripple free filters are used at receiving end. These filtered signals may be used for further processing. This work is an attempt to simulate various filters such as Butterworth and Chebyshev Type I and Type II using MATLAB/SIMULINK. For flat band response Butterworth filter is used. Error probability will be less in Chebyshev filter.
Keywords: Filters, transmission lines, ripple, Butterworth filter, and Chebyshev filter.
Abstract
Bomb Diffusing Robotic Arm
Sneha Arora, Mrs Ruchi Varshney, Saksham Agarwal, Shivani, Sneha Gupta
DOI: 10.17148/IJARCCE.2017.6117
Abstract: This paper presents an application of bomb diffusion. This robot moves in four directions like forward, backward, right and left. Here the robot receives the signal from color sensor and then move accordingly. The signal received by robot is in the form of light. This robot contains a camera at the receiver end. The display of the view captured by the camera is on transmitter end which contains LCD. The main application of this robot is to diffuse the metallic bombs which are placed inside the digs and the places where human can�t reach. A robotic arm is a type of mechanical arm, usually programmable, with similar functions to a human arm.
Keywords: Microcontroller (at 89s52), Light to frequency converter, Camera, LCD, DC servo motor and Robotic arm.
Abstract
Wireless Fuzzy Controller for Drip Irrigation
Dr. Ali Hamouda, Dr. Taj Eldain A.G, Dr. Dia Zayan, Hassan CHaib
DOI: 10.17148/IJARCCE.2017.6118
Abstract: This paper cover the design of fuzzy irrigation system based on AVR microcontroller Atmega 32 to design and develop a low cost feature which is based on embedded platform for water irrigation system. The project designed using MATLAB 10, fuzzy logic and Simulink tools books the temperature and soil moisture sensors are used for detect the water quantity present in agriculture and water level sensor used for detecting water level in tank the level gauge interfaced by electronic circuit worked as signal conditioner circuit the water from tanks controlled by solenoid valve which actuated by relay circuit open and close as the microcontroller output then the water transmitted to roots zone using pipes line for irrigation process . The data from plant farms transmitted to control room by wireless networks in which temperature and soil moisture sensors and water level can be monitored and controlled.
Keywords: Temperature, Soil Moisture, Sensors, Irrigation System, Wireless Sensor Network (WSN).
Abstract
Cloud-Based Remote Venue Recommendation Framework
Ms. K. C. Sonawane, Ms. S. S. Ponde
DOI: 10.17148/IJARCCE.2017.6119
Abstract: Now a days, recommendation systems have seen outstanding evolution in the field of knowledge engineering. Most of the existing recommendation systems based their models on collaborative filtering approaches that make them simple to implement. Still, performance of most of the existing collaborative filtering. Based recommendation system suffers due to the challenges, like: (a) cold start, (b) data sparseness, and (c) scalability. But, recommendation problem is often characterized by the presence of many conflicting objectives or decision variables, such as users� preferences and venue closeness. In this work, introduced Cloud-based Bi-Objective Recommendation Framework (BORF) for mobile social networks. These utilizes multi-objective optimization approaches to generate personalized recommendations. To address the issues pertaining to cold start and data sparseness, the BORF performs data pre-processing by using the Hub-Average (HA) inference model. Moreover, the Weighted Sum Approach (WSA) is implemented for Pyramid Maintenance Algorithm (PMA) is applied for vector optimization to provide optimal suggestions to the users about a venue. The results of comprehensive experiments on a large area real dataset confirm the accuracy of the proposed recommendation framework. In the future, we would like to increase our work by incorporating more contextual data in the form of objective functions, such as the check-in time, users� profiles, and interests in our proposed framework. Moreover, we intend to integrate other concepts, such as machine learning, text mining, and artificial neural networks to refine our existing framework.
Keywords: Context-Aware Web Services, MOPNAR, Multi-objective Optimization, Collaborative Filtering.
Abstract
Content Based Vector Image Retrieval using LBG Algorithm
Rachana D. Shinde, Lima Mandal, Apeksha Kulkarni, Dr. A. C. Lomte
DOI: 10.17148/IJARCCE.2017.6120
Abstract: There are many image retrieval and image compression techniques. Most of the image retrieval techniques are not capable to fastest relevant image retrieval. CBVIR is also known as Content based vector image retrieval or Query based image content. In CBIR, user gives image as an input to the system and after processing system returns similar images of Output. In this work, we present CBVIR using VQ. VQ is a classical quantization technique. VQ captures the spatial relationship between pixel. VQ contains codebook generation, encoding and decoding. Effective image indexing and retrieval technique are essential using codebook. Using CBVIR , retrieval performance is faster than the color based image retrieval. In this paper, we present a snapshot of the recent developed schemes. The discussed schemes include LBG, Enhance LBG (ELBG).
Keywords: CBVIR, Vector Quantization (VQ), LBG, ELBG, Image Indexing, Image Retrieval, Image Compression.
Abstract
Review: Image Enhancement and Background Detection using Mathematical Morphology [MM]
Payal T. Gadare, Prof. Nitin Raut
DOI: 10.17148/IJARCCE.2017.6121
Abstract: This paper deals with analysis of image Enhancement and background detection used in Mathematical Morphological [MM]. In this paper, Low intensity images have been processed through Block Analysis and Morphological Transformation. Basically, Weber�s Law Operator is used to analyze Low intensity images which are carried out by two methods such as Image background detection by block analysis while second operator utilize opening by reconstruction to define multi background notion. Basic Morphological Transformations are like Erosion, Dilation, Compound operation such as Opening by reconstruction, closing by Reconstruction and Block Analysis is used to detect the background of images. Analysis of above mention methods illustrated through the processing of images with filtering techniques along with different dark background images.
Keywords: Block Analysis, Opening by Reconstruction, Opening operation, Morphological Transformation.
Abstract
Survey on Recommendation of Personalized Travel Sequence
Mayuri D. Aswale, Dr. S. C. Dharmadhikari
DOI: 10.17148/IJARCCE.2017.6122
Abstract: Now a day, traveling recommendation is important for user who is the plan for traveling. There are many existing techniques which are used for travel recommendation. In this paper explain a personalized travel sequence recommendation system using travelogues and users contributed photos with metadata of this photo by comparing existing different technique. It recommends personalized users travel interest and recommend a sequence of travel interest instead of an individual point of interest. The existing system cannot complete the requirement i.e. personalized and sequential recommendation together. To solve the problem of providing personalized and sequential travel package recommendation, a topical package model is created using social media data in which automatically mine user travel interest with another attribute like time, cost, and season of traveling. The proposed system uses the travelogues and photos of social media which map each user and routes description to the topical package area to induce user topical package model and route topical package model. To suggest personalized POI sequence, first famous routes are stratified as per the similarity between user package and route package. Then high stratified routes are more optimized by using social similar users travel records for more accuracy.
Keywords: Travel recommendation, Geo-tagged photos, and Social media.
Abstract
H-LEACH Protocol with Fault Tolerance in WSN
Ratinder Pal Kaur, Er. Rupinder Kaur
DOI: 10.17148/IJARCCE.2017.6123
Abstract: The wireless sensor network is the type of networks in which sensor nodes sense the network information and pass the sensed information to the base station. Due to small size of the sensor nodes, the battery of the sensor nodes is very limited. In the recent times, various techniques has been proposed which will reduce energy consumption of the wireless sensor networks. In this paper, we evaluate and analyze H-LEACH protocol which is the combination of HEED and LEACH protocol. In this we apply Boltzmann learning technique to select intermediate node between Cluster Head and the Base Station for fault tolerance and to increase the network lifetime. The simulation results show that our method has less delay, energy consumption, less packet loss and high throughput.
Keywords: H-LEACH, Wireless Sensor Network.
Abstract
Design and Simulation of Low Power and High Speed Comparator using VLSI Technique
Ms. Aayisa Banu S, Ms. Divya R, Mr. Ramesh .K
DOI: 10.17148/IJARCCE.2017.6124
Abstract: In Digital Wireless Communication application, the design of Low Power and High Speed Analog to Digital Converter (ADC) is the nee d-of- the -day. This paper explores the design of low power and high s pee d comparator us e d in all available ADC architectures. The proposed architecture includes two stage CMOS Operational Amplifier (Op-Amp) circuit. The comparator described here is designed and implemented with 0.18�m technology operate d on 1Volt power supply using Cadence Virtuoso Tool. The functional verification of the comparator is carried out which in turn consumes 0.953 �W of power with propagation delay(s pee d) of 1.561ns. The overall improvement in the results in accordance with the literature is the s cope of this paper.
Keywords: Comparator, Cadence tool, Low power, High Speed, ADC, CMOS.
Abstract
Brain Cancer classification Based on Features and Artificial Neural Network
Nidahl K. El Abbadi, Neamah E. Kadhim
DOI: 10.17148/IJARCCE.2017.6125
Abstract: MRI (Magnetic resonance Imaging) brain tumor images Classification is a difficult task due to the variance and complexity of tumors. This paper proposed techniques to classify the MR human brain images. The proposed classification technique consists of three stages, namely, pre-processing, feature extraction and selection, and classification. Features are extracted by using the gray level co-occurrence matrices and the gray level run length matrices (GLCM & GLRLM), 18 features were determined from the image, then selected the most important features that saved to the database. In the final stage, the classifier based on probabilistic neural network (PNN) have been used to classify MRI brain images, the proposed algorithm is trained with 50 images of (Sarcoma, Anaplastic Astrocytoma, Meningioma, and Benign) and tested with 65 images. The accuracy of this method was up to 98%.
Keywords: MRI, brain tumor, classification, image processing, PNN.
Abstract
Review on Decision Support System Approach for Agriculture Field
Ms. Shweta C. Meshram, Mr. A.D. Gawande, Mrs. K.R. Ingole
DOI: 10.17148/IJARCCE.2017.6126
Abstract: Decision Support Systems are computerized systems, which include models and databases and they are used in decision making. It has been applied to solve variety of agricultural problems. Process of taking a decision is so complex as there are several factors affecting entire farming process. The environmental data plays a vital role in agriculture decision, which changes at a rapid rate. Keeping these data updated can be done by using a Service Oriented Approach (SOA). At present, irrigation decision-making systems applied to the field of agriculture were mostly aimed at a given area and specific crops. It was difficult to be applied in different areas and different crops. In this paper, a precision irrigation decision-making system has done something to solve this problem. This paper presents that SOA used to get precise irrigation schedule for different crops. In addition, it shows a good reflection and wide use.
Keywords: Decision Support System (DSS), Service Oriented Approach (SOA).
Abstract
Optimal AVR Control System using Particle Swarm Optimization
Ahmed J. Sultan
DOI: 10.17148/IJARCCE.2017.6127
Abstract: This paper proposed a PSO with the constriction factor algorithm was used to tune PID-gains for an automatic voltage regulator (AVR) system. In the proposed approach, optimal tuning of PID-gains has very significant issue to perform the target value. Thus, a proposed algorithm has been used to get a better performance. The superiority of the PSO-PID controller is demonstrated through comparing the results with other techniques like Ziegler-Nichols method. Numerical results reveal that the PSO-PID controller has better dynamic response, fast convergence, and high-quality-solution than the other approaches based on rise and settling time of terminal voltage signal of generator.
Keywords: AVR system, PID-controller, PSO, constriction factor.
Abstract
Review Paper on Real-Time Vehicle Classification and Counting via Low-Cost Collaborative Sensing
Prof. S. O. Dahad, Ms. Shital Tayade
DOI: 10.17148/IJARCCE.2017.6128
Abstract: In the field of traffic-information acquisition, one pervasive solution is to use wireless sensor networks (WSNs) to realize vehicle classification and counting. By adopting heterogeneous sensors in a WSN, the potential of using complementary physical information to perform more complicated sensing computation can be explored. However, the collaboration among heterogeneous sensors, such as the collaborative sensing mechanism (CSM), is not well studied in current state-of-the-art research. In this paper, the authors design and implement EasiSee, a real-time vehicle classification and counting system based on WSNs. Contributions are as follows. First, the authors propose a CSM, which coordinates the power-hungry camera sensor and the power-efficient magnetic sensors, reducing the overall system energy consumption and maximizing system lifetime. Second, a robust vehicle image-processing algorithm, i.e., a low-cost image processing algorithm (LIPA), is proposed. LIPA reduces environment noise and interference with low computation complexity. In the verification section, the vehicle detection accuracy turned out to be 95.31%, which pave the way for CSM. The time of image processing is around 200 ms, which indicates that the LIPA is computationally economical. With the overall energy consumption reduced, EasiSee achieves classification accuracy of 93%. Based on these experiments and analysis, the authors conclude that EasiSee is a practical and low-cost affordable solution for traffic-information acquisition. Vehicle identification or classification is one of the application areas that come under real time image processing. Vehicle recognition is having the significance in various applications including the traffic monitoring, load monitoring, number plate recognition, vehicle theft prevention, traffic violation detection, management of traffic etc. As the images are captured as primary data source, it can have number of associated impurities which include the background inclusion, object overlapping etc. Because of this, object detection and recognition is always a challenge in real time scenario. In present work, a robust feature based model is presented for feature extraction and classification of vehicle images. The presented model is applied on real time captured image to categorize the vehicle in light, medium and heavy vehicle. Firstly, the vehicle area segmentation is performed and later on the Gaussian filter is applied to extract the image features. This featured dataset is processed under Support Vector Machine (SVM) based distance analysis model for vehicle recognition and vehicle class identification.
Keywords: Support Vector Machine (SVM), low-cost image processing algorithm (LIPA), CSM, WSN.
Abstract
The Literature survey on latest Iris Recognition Technique
Ms. Rasika P. Rahane, Prof. Deepak Gupta
DOI: 10.17148/IJARCCE.2017.6129
Abstract: With use of advanced image processing methods and tools, it becomes very easy to perform recognition and identification of humans using iris images. There are two main types of images such as Image Captured in Visible Light and Image Captured in NIR Lights. The iris technique is mostly used to human identification and recognition. In the iris recognition system use images are captured under NIR light. Hence identify such image parameters, curves and important location; it is required to automatic identification of human which can improve the identification and recognition of biometric machines. The image processing based methods are mainly three important phases such as image pre-processing, iris segmentation and feature extraction. This paper scope is limited to study on identification and recognition methods. In this paper, aim is to present the study on different recent techniques of human identification using biometric system and different approaches like 1-D DWT (Discrete Wavelet Transform) filter execution, matching and recognition and circular normalization. The outcome of this paper is to find the current research challenges based on study of different methods of iris recognition system through the comparative study of all recent methods studied.
Keywords: Iris, Image Captured in NIR Light, 1-D DWT Filter Execution.
Abstract
Review on Learning based Interface Modelling using Augmented Reality
Akshay Indalkar, Akshay Gunjal, Rachna Satao, Mihir Ashok Dalal, Nikhil Sharma
DOI: 10.17148/IJARCCE.2017.6130
Abstract: Augmented Reality (AR) is a widely growing field with a lot of scope in future. The learning aspects of AR have been widely studied from student�s perception and learning effectiveness using AR. Making use of interactive concepts involving user involvement (via speech, actions, gestures) such as AR based User Interfaces(UIs) increases the efficiency of user learning. Augmented Reality can be used as learning element where user interacts with the developed augmented reality based Graphical user interface (GUI) to understand the different concepts which the user wants to learn. It helps the user for easy learning and better understanding of various concepts to be learned.
Keywords: Augmented Reality, Hand Gestures, Shader Effects, Unity, Vuforia
Abstract
A Study and Survey on Sentiment Analysis
Kajaree Das
DOI: 10.17148/IJARCCE.2017.6131
Abstract: In essence, Sentiment Analysis (SA) is detection and determination of the response of the targeted consumers to a certain brand or product or maybe even a situation. But there are much more potential in SA and emerging re-search in this area has attracted and involved many brilliant academic minds till date. Human mind is biased with preferences and judgements. So, automated machine to identify and clarify opinions presented in electronic unstructured text has come into picture and became the main focus of present research. There are also some challenges present in this field, such as, accuracy. Further ongoing researches are focusing on solving these problems and creating more efficient tool for SA.This paper tried to cover the study and research on SA that has been done so far. It also talks about the challenges and future aspects of SA.
Keywords: Sentiment, Analysis, Opinion, Data, Lexicons, Level.
Abstract
A Comprehensive Survey of QoS-Aware Routing Protocols in Wireless Body Area Networks
Anand Kumar M, Dr. C. Vidya Raj
DOI: 10.17148/IJARCCE.2017.6132
Abstract: Recent developments in wireless communications, MicroElectroMechanical Systems (MEMS) technology and integrated circuits have enabled low-power, intelligent, miniaturized, invasive/non-invasive micro sensor nodes strategically placed in or around the human body which forms Wireless Body Area Networks (WBANS) to be used in various applications including remote health monitoring. Due to inherent issues and specific challenges, routing protocols designed for Mobile Adhoc Networks (MANETs) and Wireless Sensor Networks (WSNs) are not applicable to WBANs. QoS-Aware Routing protocols mainly provide a modular approach by presenting separate modules for different QoS metrics that operate in coordination with each other. These approaches aim at providing higher reliability, lower end-to-end delay and higher packet delivery ratio. In this paper various issues and challenges in pursuit of effective QoS-Aware routing are identified and detailed literature survey of the various existing QoS-aware routing protocols, their strengths and weaknesses are discussed.
Keywords: Wireless Body Area Networks, Wireless Sensor Networks, Mobile Adhoc Networks, Quality-of-Service (QoS)-Aware Routing Protocols, Bio-Medical Sensors (BMSs).
Abstract
A Comprehensive Survey of Palmprint based Biometric Verification System
Mr. Ravindra Gupta, Mrs. Varsha Namdeo, Ms. Rashmi Chourey
DOI: 10.17148/IJARCCE.2017.6133
Abstract: As an emerging biometric technology, palmprint recognition technology has been researched widely and developed rapidly, which is well known for its high verification accuracy, low-price capture device, high reliability and user acceptance. During this instance of time, several different glitches related to palmprint recognition have been addressed. Furthermost of the studies has been done in palmprint recognition due to its stability, reliability and exclusivity. Furthermore, it has been used for law enforcement, civil applications and access control applications. Researchers have proposed a variety of palmprint pre-processing, feature extraction and matching approaches. This paper deliberates and review about the number of investigation works introduced to overcome the difficulties confronted in each stage of palm print verification. Our study on palm print recognition focuses on verifying the palm print in different types of schemes involved.
Keywords: Palm Print Recognition, biometric authentication system, person verification, Biometrics, security.
Abstract
Smart Traffic Congestion Control
Prof. Ranjeet S. Mote, Dharmesh A. Chhajed, Sambhav V. Dwidmuthe, Komal N. More
DOI: 10.17148/IJARCCE.2017.6134
Abstract: Traffic congestion has been one of predominant troubles that most metropolises are going through. It is assumed that identification of congestion is the first step for choosing appropriate mitigation measures. Congestion - each in belief and in reality - impacts the motion of people. Traffic congestion wastes time, strength and causes pollution. _ere are broadly two factors, which impact the congestion .congestion is �induced� on the �micro� stage (e.g. on the road), and �pushed� on the �macro� stage. _e micro degree elements are, as an example, many humans want to transport on the same time, too many motors for constrained avenue area. On the opposite facet, macro stage elements are e.g. land-use styles, vehicle possession traits, nearby monetary dynamics, and so on. Street traffic jams preserve to remain a first-rate problem in most cities round the sector, especially in growing regions ensuing in large delays, improved gasoline wastage and financial losses. Because of the poorly planned road networks, a common final results in many developing areas is the presence of small critical areas that are commonplace hot-spots for congestion; bad site traffic management around these hotspots potentially results in elongated visitors jams. in this paper, we first present a easy automatic photo processing mechanism for detecting the congestion tiers in street visitors by processing cctv digital camera photograph feeds. Our algorithm is especially designed for noisy visitors feeds with terrible picture first-class. Based on stay cctv camera feeds from multiple traffic signals in kenya and brazil, we show evidence of this congestion fall apart behaviour lasting long time-intervals across more than one places.
Keywords: traffic congestion, data collection methods, congestion measurement.
Abstract
A Review on Secret Image Protection using Reversible Watermarking
Samrudhi S. Mamarde, Dr. Siddharth A. Ladhake
DOI: 10.17148/IJARCCE.2017.6135
Abstract: In this modern world of Internet with the increasing use of digital data, sharing images over internet requires security of images from unauthorized use. So image security has become an important concern in storage and communication. A cryptography technique provides security to image and watermark provides authentication to images. In this paper we are going to proposed a technique in which first the secret image is encrypted using a key image, then encrypted image is watermarked using the watermark image, then it is passed through encryption function, after that we get our final encrypted watermarked image. For decoding, we have to go in reverse order; hence our secret image will be recovered.
Keywords: Image Security, Encryption, Cryptography, Watermarking.
Abstract
Design of Hybrid BCI using Multimodal EEG for Robotic Application
Pooja B. Kokare, Prof. K. P. Wagh, Prof. S.S. Savkare
DOI: 10.17148/IJARCCE.2017.6136
Abstract: Over the past decade, many laboratories have begun to explore brain�computer interface (BCI) technology as a radically new communication option for those with neuromuscular impairments that prevent them from using conventional augmentative communication methods. BCI�s provide these users with communication channels that do not depend on peripheral nerves and muscles. Moving something without touching. It has always something attractive for every person, speech recognition & head movement is being the common methods. In recent technology consider imagination of people. The main thing has to control peripheral by brain activities. Electrical activity of brain is magic. A brain (BCI) is a system which allows direct translation of brain state into action. A BCI system works by extracting user brain signals, applying machine learning algorithm to classify the users brain state &performing a computer controlled action.
Keywords: Brain computer interface (BCI), Mind machine interface (MMI), Electroencephalogram (EEG).
Abstract
A Review on Iris and Fingerprint Fusion Authentication Systems
Dhara Heble, Rupali Nikhare
DOI: 10.17148/IJARCCE.2017.6137
Abstract: There are many combinations possible for the multi biometric fusion authentication systems. In this paper, we focus our study on Iris and Fingerprint fusion authentication systems. With advancement in technology, now a days, more biometric combinations are possible for better precision. Some references quoting combinations of face and ear are also discussed to quote these advancements compared to the traditional and usual biometric combinations of iris and fingerprints.
Keywords: Iris, Fingerprint, Fusion, Multimodal, Biometric Authentication.
Abstract
Survey on Prediction of Kidney Disease by using Data Mining Techniques
S. Gopika, Dr. M. Vanitha
DOI: 10.17148/IJARCCE.2017.6138
Abstract: Data mining is the process of extracting interesting patterns of huge database hiding. The medical domain contains heterogeneous data as text, figures and images that can be suitably removed to provide various useful medical information. The obtained medical data may be useful to the doctor to detect the pattern of the disease, the predicted survival of the patient after the illness, the severity of the disease, and the like. The main objective of this paper is to analyze the application of data mining in the medical field and some of the techniques used in predicting kidney disease. Today, kidney disease is a major medical problem mining. Key medical industry mining data are used to predict data sets in kidney disease. Thus, different techniques are used to identify the DM-related kidney disease related conditions.
Keywords: Classification, Data Mining, Kidney Disease, Prediction.
Abstract
E-Proctored Model: Electronic Solution Architect for Exam Dereliction in Kenya
Edwin Omol, Dr. Silvance Abeka, Fred Wauyo
DOI: 10.17148/IJARCCE.2017.6139
Abstract: The paper after reviewing various relevant literature proposes effective and efficient model to curb exam derelictions in pre-university exams in Kenya. Since all irregularities, including fraudulent results, have a devastating impact on public confidence in local public examinations, it is vital, and that over and above the application of detailed policy, the use of new technologies and information systems should be instrumental in minimizing and even preventing this menace from undermining the credibility of examination authorities. As academics, we strive to link assessment with the sorts of learning activities in which students and pupils engage and to employ a variety of assessment methods. ICT provides a link between learning, teaching and assessment. Examination computer systems should be designed in such a way that it not only supports the administration of examinations, but that it also becomes instrumental as a verification and validation system. This research therefore proposes e-Proctored in order to support current educational goals in pre-university exam test especially for primary schools in Kenya having been the beneficiaries of the governments� free laptop project. The study argues that developing and infusion of e-Proctored solution architecture by the Kenya National Examination Council (KNEC) remains the answer to curb examination malpractices in Kenyan primary schools especially acknowledging the efforts by the Government to introduce laptops in Kenya primary schools.
Keywords: Exam dereliction, e-Proctored Model, Exam Irregularity electronic Solution Architecture, e-Assessments.
Abstract
Factors Influencing Acceptance of Mobile money Applications in Enterprise Management: A Case Study of Micro and Small Enterprise Owners in Kisumu Central Business District, Kenya
Edwin Omol, Dr. Silvance Abeka, Fred Wauyo
DOI: 10.17148/IJARCCE.2017.6140
Abstract: The research aimed at determining factors influencing acceptance of mobile applications in enterprise management specifically testing whether relationship exists between demographic features, Perceived Usefulness (PU), Perceived Ease of Use (PEOU) and Perceived Risk (PR); and acceptance of mobile money payment among micro and small enterprises in Kisumu City, Kenya. The research exhibited descriptive correlational research design enabling the researcher to determine the strength of relationship between the variables of the study and the study employed simple random and purposive sampling technique for selection of the samples. The questionnaires were administered by the researcher with the help of two research assistants to the MSE�s Owners in Kisumu City CBD. A total of 271 respondents returned their questionnaires, resulting in a response rate of 95.8% which was considered satisfactory for subsequent analysis. Due to the quantitative nature of the study, the results were analyzed with statistical tools using mean, mode, median, frequency tables and multiple regression. The results indicated that Demographic features, PU, PEOU and PR are significantly related to acceptance of MMP. PEOU was found to be the most influential determinant of acceptance with r= 0.872, p- value= 0.013 at 0.05% significant level. The analysis also revealed that PR on MMP was the major hindrance of users accepting the technology with a negatively strong relationship of r value =-0.548 and p value =0.003. The study also established joint contributions of the four independent variables on acceptance of MMP but failed to establish the individual contribution of each independent variable on MMP hence there is need for further studies.
Keywords: Mobile Money Payment, Demographic features, Perceived Usefulness, Perceived Ease of Use, Perceived Risk, TAM, Micro and Small Enterprise.
Abstract
Study of SWT-ANN Based Indoor Optical Wireless Communication System
Ramneet Kaur, Arun Bhatia
DOI: 10.17148/IJARCCE.2017.6141
Abstract: This work presents the concept of SWT based optical wireless communication system. It provides the concept of artificial neural network for minimizing the error on receiver side. The different types of errors are getting introduced in the system which are ISI, artificial light interference and Bit error. The main challenge faced by this work is to seek the most optimized modulation scheme that can provide maximum system throughput while capable of withstanding most if not all of the intense channel interferences at a target BER requirement. The use of SWT helps to transform received data into another form that helps to provide better BER value. The results are implemented in MATLAB and calculate the BER value.
Keywords: SWT, Wireless Communication, Artificial Neural Network, Wavelets etc.
Abstract
Digital License Plate Detection and Recognition with Improved Vertical Edge Detection and Template Matching
A F M Shahab Uddin, Feroza Naznin, Md. Alamgir Hossain, Md. Zahidul Islam
DOI: 10.17148/IJARCCE.2017.6142
Abstract: Digital License Plate Detection and Recognition is one of the most common and important technology for the intelligent world, where our trend is to automate everything. Now a days, Digital License Plate Detection and Recognition is widely used in traffic control, toll-pay, real-time monitoring and parking systems in many developed countries. Different standards and styles for license plate exist all over the world. So there is a clear absence of standardization of number plate. Therefore it is hard to detect and recognize all of them by a single algorithm. The techniques used in this project are Vertical Edge Detection with Ratio Verifying method for number plate detection and Template Matching for license number recognition. Vertical Edge Detection is performed for detecting the possible plate regions and Ratio of each region is verified for extracting the actual number plate. After the detection process, the detected plate is further processed for recognizing the license number. Recognition is carried out by segmentation and Template Matching algorithm. The new system is examined for several car images and is capable of recognizingvarious license numbers at a satisfactory level.
Keywords: License plate recognition, improved template matching, character recognition, Pattern Recognition, computer vision.
Abstract
A Survey on the Plant Leaf Disease Detection Techniques
Arpita Patel, Mrs. Barkha Joshi
DOI: 10.17148/IJARCCE.2017.6143
Abstract: Plant disease detection is an interesting field in India a. Plants are the way to live. We are completely dependent on plants from our daily life factors to breathing. So, there should be proper care of plants. Many studies show that quality of agricultural products may be reduced due to various factors. The plant diseases are such as fungi, bacteria, and viruses. The leaf diseases not only restrict the growth of the plant but also destroy its crop. There is the need of some expert to identify plant diseases but manual identification is time consuming. So, some automatic methods required. In this paper, we have presented a survey on the existing methods of plant leaf disease detection.
Keywords: Image Processing, Leaf Disease, Feature Extraction, Disease Identification.
Abstract
Bio Cloud – A Method to Generate Sensible Word Clouds for Biological Patterns
Ayush Pareek
DOI: 10.17148/IJARCCE.2017.6144
Abstract: Text mining works widely in the field of research techniques, which allows an individual to store text and its important terms in form of electronic document (.doc, .txt). It is difficult to remember such huge amount of text; moreover the manual approach is more time taking, unreliable and accessible to that person only. Text mining techniques optimize this approach by extracting and storing this data. Computational comparison, file read, file write are done more efficiently. With the help of Bio-Cloud, we generated more semantically similar, related and significant patterns. The give, generate and get sequence modeling is adopted. Over the other available web applications, we present our application with improved stemming, relation and average case consideration. This approach do not limit the displayed number of words as all the generated sets can be traversed with the GUI, with opted size of patterns. This method is highly applicable in bioinformatics, related information retrieval from document, sentimental analysis using social websites (Twitter and Facebook), query expansion (Google) and many more.
Keywords: Word cloud, biological pattern analysis, bioinformatics, text mining.
Abstract
Implementation of SHCS and AONT Methods for Hiding Packets in Wireless Networks
Shaik Mahammad Rasheed, M. Giridhar Singh
DOI: 10.17148/IJARCCE.2017.6145
Abstract: The open nature of wireless medium makes it vulnerable to intentional interference attacks, which are typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launching pad for mounting denial of service attacks in wireless networks. Usually, the interference has been addressed in one form of external threat. However, adversaries with inner knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this paper the problem of selective jamming attacks in wireless networks are addressed. In these attacks, the adversary is active only during a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective blockade in terms of degradation of network performance and adversary effort by presenting two case studies; a selective attack on TCP and one in the routing. We show that selective jamming attacks can be initiated by performing packet classification in real time at the physical layer. To mitigate these attacks, two schemes which prevent the classification of packets in real time by combining the cryptographic primitives physical layer attributes are developed. The security of our method is analyzed and evaluated its computational overhead and communication.
Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, Packet Classification.
Abstract
A Food Recognition System for Calorie Measurement
Ms. Ankita A. Podutwar, Prof. Pragati D. Pawar , Prof. Abhijeet V. Shinde
DOI: 10.17148/IJARCCE.2017.6146
Abstract: Food is one of the most important requirements of every living being on earth. The human beings require their food to be fresh, pure and of standard quality. The standards imposed and automation carried out in food processing industry takes care of food quality. Now a day, people across the universe are becoming more sensitive to their diet. Unbalanced diet may cause many problems like weight gain, obesity, diabetes, etc. So different systems were developed so as to analyze food images to calculate calorie and nutrition level. This system proposes a effective way to measure and manage daily food intake of patients and dietitians. The system will take the images of food and using image processing, segmentation and classification it calculates the nutrition and calorie content in the food. The proposed system will certainly improve and facilitate the current calorie measurement techniques. In this paper, food portion recognition system use for measuring the calorie and nutrition values. The user just to take a picture of the food image then to recognize the image to detect the type of food portion and classify using support vector machine. we are performing segmentation, food portion recognition using skull striping and classification using support vector machine to calculate the calorie along with the type of energy in accurate way.
Keywords: Calorie and Nutrition estimation, Segmentation by Fuzzy C Means, Classification using Support Vector Machine.
Abstract
An adaptive Second Level Hybrid Image Watermarking Technique using DWT-SVD in Low Frequency Band
Rajesh Tyagi, M. K. Pandey
DOI: 10.17148/IJARCCE.2017.6147
Abstract: Day by day the increase in technology and other multimedia systems has created an urgent need for copyright ownership of multimedia contents. Digital Image Watermarking is one such technology that has been developed to protect digital images from illegal manipulations. To achieve this goal, here we present a hybrid image watermarking algorithm based on Discrete Wavelet Transforms and Singular Value Decomposition to protect the watermark image information or hide such that assumption made like visible image is cover image and other is watermark image for content ownership. The singular value is going to embedded with watermark singular values making use of scaling factor (a). The experimental results show the effectiveness of hybrid image watermarking scheme. Performance of methodology is evaluated using different fidelity parameters like as peak signal noise ratio (PSNR) and normalized cross correlation (NCC).
Keywords: Image watermarking, discrete wavelet transforms, SVD, PSNR; CC.
Abstract
Review on Compute Analysis of Routing Algorithm for Wireless Sensor Networks
Prof. S.M. Patil, Sheetal Ragit
DOI: 10.17148/IJARCCE.2017.6148
Abstract: Recent significant research on wireless sensor networks (WSNs) has led to the widespread adoption of software defined wireless sensor networks (SDWSNs), which can be reconfigured even after deployment. In this paper, we propose an energy-efficient routing algorithm for SDWSNs. In this algorithm, to make the network to be functional, control nodes are selected to assign different tasks dynamically. The selection of control nodes is formulated as an NP-hard problem, taking into consideration of the residual energy of the nodes and the transmission distance. To tackle the NP-hard problem, an efficient particle swarm optimization (PSO) algorithm is proposed. Simulation results show that the proposed algorithm performs well over other comparative algorithms under various scenarios.
Keywords: SDWSNs, sensing tasks, control nodes, residual energy, transmission distance, PSO.
Abstract
Review on Performance Analysis of BER Using BPSK
Mrs. S.M. Patil, Miss. Prachi Zodpe, Miss. Shital Ragit
DOI: 10.17148/IJARCCE.2017.6149
Abstract: Relay technologies have been studied & considered in the standardization process of the next generation of MIMO system, such as LTE 8, Advance LTE 10, IEEE 802.16e, IEEE 802.16m. Presently two wireless technologies, WiMax & LTE both based on IEEE standard, are two rival technologies nevertheless, are technically very similar but deployment is differ. This introduces and compare features of two advance technologies in physical layer, and also gives performance analysis of different modulation schemes (BPSK, QPSK, and 16-QAM) in WiMAX & LTE technologies.
Keywords: LTE 8, Advance LTE 10, IEEE 802.16e, IEEE 802.16m, MIMO system, WiMax.
Abstract
A Survey Paper on Authentication for Shoulder Surfing Resistance for Graphical Password using Cued Click Point (CCP)
Monali Pawar, Prof. G.S Mate, Soni Sharma, Sonam Gole, Snehal Patil
DOI: 10.17148/IJARCCE.2017.6150
Abstract: In today�s world authentication plays a vital role. The most common method used for authentication is textual password. There are various limitations for textual passwords, they are exposed to shoulder surfing attack however strong textual passwords are tough to memorize. Shoulder surfing and hotspot attack are two main problems in graphical passwords. So as an alternative Graphical Passwords are introduced to resist the Shoulder surfing attack. In order to address the above mentioned attacks the new scheme highlights cued click point (CCP), Using graphical password as input and grid lines for image point verification. The objective of this system is to provide security using normal login and graphical password. This system can be used in the field such as banking application, military application, civilians, forensic labs, etc.
Keywords: Authentication, Graphical password, Shoulder surfing, Hotspot, Cued click point.
Abstract
G-Energy: Route to Future Roads
Yash Bhan Singh, Rachna Gera
DOI: 10.17148/IJARCCE.2017.6151
Abstract: As we move forward with increasing demands of energy generation, it has become very necessary to optimize the systems where in the energy consumption is either very large or is inefficient. The objective of this paper is to provide an overview of how roads of future can be built using self-healing solar technology using phospholipid cells and how the electrical energy transfer will take place using cordless systems for electric vehicles i.e. in-motion charging using green energy as it is known that carbon emissions due to transportation has left adverse effects on wildlife and environment around the globe. Once come into effect Green energy can play vital role in decreasing carbon emission further conventional wind turbines could be used along with bladeless vortex Technology for generation of electricity. Also the advanced electric vehicles charging system using inductive power transfer will altogether help in reduced emission levels.
Keywords: Bladeless vortex, Electric vehicles [EV] charging through IPT, In-motion wireless power transfer, Self-healing solar-phospholipid cells.
Abstract
A Comprehensive Review on Automated Visualization Techniques for Intrusion Detection Systems
Sujata. B, Priyanka. M, Anurag De
DOI: 10.17148/IJARCCE.2017.6152
Abstract: The Intrusion Detection Systems (IDS), applied with visual analysis has now become an advantage for intrusion detection. With more information systems being attacked and attack techniques evolving, the task of intrusion detections is becoming an increasingly difficult job in current scenario. Efficient information visualization is an important portion required for detection of intruders. In this paper a survey on using some of the visualization techniques in intrusion detection system is presented.
Keywords: Intrusion detection, Visualization, Statistical analysis, Real time monitoring.
Abstract
High Efficiency Street Lightning using ZigBee based Online Control System
S. Anu Thilak, P. Narmadha, G. Yoga, B. Vijayalakshmi
DOI: 10.17148/IJARCCE.2017.6153
Abstract: This paper proposed online control system can optimize management and efficiency of street lighting systems. It uses ZigBee based wireless devices which enable more efficient street lamp-system management. In this work an advanced interface and control architecture are used. It uses a sensor based ZigBee combination to control and guarantee the desired system parameters. The information is transferred point by point using ZigBee transmitters and receivers and is sent to a control terminal used to check the state of the street lamps and to take appropriate measures in case of failure.
Keywords: Automation, ZigBee network, sensor, emergency devices, control units.
Abstract
A Survey on Performance Evaluation and Prediction of Teachers’, Students’ Performance Using Data Mining Techniques
Sudarshan B. Wadkar, Dr. S. C. Dharmadhikari, Santosh Kumar Dwivedi
DOI: 10.17148/IJARCCE.2017.6154
Abstract: Making use of Data mining (DM) in education is a rising interdisciplinary research field often referred as educational data mining (EDM). The principal objective of any educational institute is to provide excellent education to its students. One method to gain perfect level of quality in higher education is discovering knowledge that evaluates teachers� and students� performance and tries to predict areas of improvements and strengths. To satisfy this objective, EDM plays a vital role. The proposed work offers an effective approach for evaluation and prediction of teachers� and students� performance in institutions of learning using data mining technologies. The proposed system also acknowledges improvement areas of student as well as teachers� and is able to recommend respective training to them.
Keywords: Data Mining, Educational Data Mining, Performance Prediction, Evaluation, Training Recommendation.
Abstract
Optimizing Call Drops in Cellular Network using Artificial Intelligence based Handover Schema
Avinash Singh, Surya Pratap Singh, Upendra Nath Tripathi, Manish Mishra
DOI: 10.17148/IJARCCE.2017.6155
Abstract: The heavy traffic load at peak time cause frequent congestion and call dropping in wireless cellular network which demands an intelligent way of handover management schemes for various calls in load balancing and resource sharing. The cellular network service provider currently facing certain obstacle in load balancing and resource sharing for mobile users. So for various call handover management schema that have been proposed for load balancing and sharing scheme are not efficient to minimizing the call drop in cellular communication. In this paper, we proposed an intelligent schema for load balancing and sharing in handover. The simulation results shows that the proposed scheme would able achieve satisfactory level in call drop optimization through handover management that concerning load balancing and sharing under heavy peak traffic load.
Keywords: Cellular network, call drop, call block, handoff, fuzzy logic, neuro-fuzzy logic.
Abstract
Big Data: Analyzing Map Reduce Auditing Mechanism
K. Shouryadhar, C. Gazala Akhtar, M. Anantha Lakshmi
DOI: 10.17148/IJARCCE.2017.6156
Abstract: Apache hadoop is a distributed system for storing large amount of data and processing the data in parallel. This apache hadoop contains HDFS and MAP REDUCE as a core components .HDFS is as file system that can store very large data sets by scaling out across hosts of clusters .Map Reduce is a huge scalable, parallel processing framework that works in concurrent with HDFS.MAP REDUCE contains two main steps map and reduce. Map collects all the jobs carry out by job tracker and reduce module reduces all the map jobs which is carry out by task tracker. Developers use MapReduce for objects like filtering documents by tags, counting words in documents, and takeout links to related data. This paper describes about all the map reduce audit log events for counting the words that are being carry out during the execution of process. Logs are vital part of any computing system, supporting potential from audits to error management. As logs extends and the number of log origin increases (such as in cloud environment), a scalable system is compulsory to efficiently process logs. This procedure explores processing logs with Apache Hadoop from a distinctive Linux system. AUDITING for mapreduce mechanisms is a major concern, how tracing and logging significant events that could take place during a system run. These auditing mechanisms of map reduce audit logs are efficient, scalable, reliable. Map reduce audit logs have been one of the key enabling feature for security auditing.
Keywords: job tracker audit logs, task tracker audit logs, hadoop counter logs.
Abstract
IOT based Smart Water Supply management System
Kiran M. Dhobale, Sangmeshwar P. Gorgile, Pradnya J. Gunjal, Krushna A. Hirve, Prof. U. A. Mande
DOI: 10.17148/IJARCCE.2017.6157
Abstract: Water supply management system needs data regarding water storage present in Dam. Satisfying the increasing demand for water supply has been major challenge for many countries around the world. Water is one of the major requirements for human survival, conservation and management of the water resources must be given most importance. The system can measure the water level and give measurement report to the central office. This system use sensors to measure the water level of Dam and updates are provided to Corporation on daily basis. Supply of water to the particular area according to the water level in the dam, and it will be informing to the customer about water level and the time period of water supply using GSM message service. Next part contains Water meter which monitors water usage and calculate appropriate bill according to usage. It provides facility of online bill payment system.
Keywords: Internet of Things (IOT), Water, Wireless, GSM, Short message service (SMS), Smart aqua meter (SAM).
Abstract
Novel Approach Based on Genetic Algorithm for Adaptive Resource Management in Software-Defined Networks
Mohammed Najm Abdullah, Afrah Salman Dawood
DOI: 10.17148/IJARCCE.2017.6158
Abstract: Resource management in Software-Defined Networking (SDN) is an important aspect in this brand new approach of networking. Implementing an efficient resource management with high Quality-of-Service (QoS) requirements like low delay or high bandwidth is a big challenge. Dynamic and adaptive solutions can be benefit for improving the performance of these networks. In this paper, we propose a novel approach of using genetic algorithm with SDN architecture and FNSS toolchain for better optimization of adaptive resource management with testbeds on datacenter topologies with video streams run on VLC media player to evaluate the performance of our solution. We explained the testbeds on the test video (delay and bandwidth) by implementing the adaptive solution using Genetic Algorithm (GA) for adaptively selecting the capacity according to link delay which then reduces the overall timeof packet delivery and increases the bandwidth. The final results shows an improvementin reducing the average delay values of 94.4% when using OVS controller and 90.1% when using Floodlight controller, and an improvement in bandwidth of 950 Mbps- 1.82 Mbps to 37.075 Mbps- 42.9 Mbps in OVS controller and 952 Mbps- 1.7 Mbps to 22.97 Mbps- 27.45 Mbps in Floodlight controller.
Keywords: SDN, Adaptive Resource Management, Fast Network Simulation Setup (FNSS), OVS Controller, Floodlight Controller, Mininet, Genetic Algorithm, Datacenter topology.
Abstract
Prediction of Stock Market Price using Neural Network
Navpreet Kaur
DOI: 10.17148/IJARCCE.2017.6159
Abstract: In the modern Digital time, Data Mining is the powerful area for analyze the large data sets to get unexpected results. Text mining is the application of data mining techniques which are used to extract knowledge from Text documents. Interest in Text mining has grown in very short time. In this paper our approach is to extract structured text from unstructured text and predict stock prices using neural network. It also explains how text mining plays an important role by getting large set of contents and uses those contents in decision making which will be useful in particular environment like business, education and research. In stock market prediction we will predict all upcoming ups and down in stock market. We will predict stock market prices and also check the parameters due to which stock prices can be increase or decrease like Political Parties, Economic Effects, Increasing demands etc. In stock market prediction we make a hypothesis for getting desired results. We will also design some useful parameters to optimize our system which will obtain good predictive performance.
Keywords: Text Mining, Time Series analysis, Stock market prediction, Support Vector Machine, Accuracy, Remove noisy data.
Abstract
Advanced Monitoring of R-22 Refrigerant Leakage
Mohan M, Vidyadhara B.V, Vishesh S, Manu Srinath
DOI: 10.17148/IJARCCE.2017.6160
Abstract: Chlorodifluoromethane and difluoromonochloromethane is a Hydro-Fluoro-Chloro-Carbon (HCFC). It is a colourless gas and is better known as HCFC-22 or R-22. It is used as a refrigerant in medium and low temperature commercial and industrial refrigeration and freezer rooms, and also in cold stores, cabinets, water chillers and process cooling. R-22 is often used as an alternative to the highly ozone depleting R-11 and R-12 because of its relatively low ozone depletion potential of 0.055 among the lowest of chlorine containing halo-alkanes. In this paper, we propose a system to detect the leakage of R-22 in domestic and industrial refrigeration applications. We have proposed a low cost, portable and wireless detection system using android application and automated responses to cease the leakage of refrigerant.
Keywords: Chlorodifluoromethane, difluoromonochloromethane, Hydro-Fluoro-Chloro-Carbon (HCFC), HCFC-22, R-22, R-11, R-12, halo-alkanes, portable, wireless detection system, android application, automated responses.
Abstract
Analysis of Distributed Traffic Control Schemes in Web Attacks
M. Paranthaman, Agnus S. Swarna Nishalakshmi
DOI: 10.17148/IJARCCE.2017.6161
Abstract: A novel distributed traffic control service is used, which will help us to improve Internet security significantly. At its core is a safe delegation of network management capabilities. It is based on adaptive network traffic processing devices that can be deployed incrementally in the Internet close to routers. Our service can help to stop attack traffic within the network as close to the internet uplink of an attacker as possible. The common aim of DDoS attacks is to deny certain services or resources to prospective users. The mitigation schemes even strengthen the belongings of an attack as genuine servers or widespread networks are cut off from the network.
Keywords: DDoS attacks, Digital Signature, Network management, Traffic control.
Abstract
Image Enhancement using Modified Histogram Equalization with DSIHE
Ribana K
DOI: 10.17148/IJARCCE.2017.6162
Abstract: Enhancing is the process can be done in many ways for obtaining more details from the images that can be attain by image extraction, contrast enhancement, denioising and dehazing are the various techniques for the image enhancement. In our paper the enhancement is obtain with the help of contrast enhancement technique. Improving the contrast is the process of introducing necessary difference between the pixel values of an input image to obtain more informative output image. The proposed algorithm is done by modifying the original image histogram and performs histogram equalization then the final image obtained by combining the histogram equalized image with DSIHE image.
Keywords: contrast enhancement, dehazing, filtering, denioising.
Abstract
A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks
Shrishty Gautam, Charu Wahi, Seema Sharma
DOI: 10.17148/IJARCCE.2017.6163
Abstract: Identity Based Encryption (IBE) is an encryption technique that was developed, keeping in mind, the wireless sensor networks. IBE is an encryption mechanism that makes use of the user�s identity, such as, e-mail ID, phone number, date of birth, or their combination as the key. IBE was developed for cases where pre-distribution of the public key was infeasible or not possible due to certain technical issues. Thus, using IBE, encryption can be performed, without the recipients public key. In this paper, we survey the various Identity based encryption techniques that have been proposed till now. We present a comparative analysis of the work done till now. We also provide a view on the relative advantages and drawbacks of the provided schemes. We also give a look into the futuristic scope of IBE online/offline encryption systems. These algorithms have been proposed and are currently being widely used in Wireless Sensor Networks. We provide an overview of why IBE is highly secure and suitable to WSN.
Keywords: Identity Based Encryption (IBE), Random Oracle, Diffie-Hellman Assumption, Bilinear Diffie-Hellman Assumption (BDH), Decision Bilinear Diffie-Hellman Assumption (DBDH), Decision Bilinear Diffie-Hellman Inversion Assumption (DBDHI), Public Key Generator (PKG).
Abstract
A Survey on Polarization Agile Antennas
M. Paranthaman
DOI: 10.17148/IJARCCE.2017.6164
Abstract: Antennas with dynamically choosing functionalities are the future demand for an efficient wireless communication system. Reconfigurable antennas are having such function to satisfy the need. It provides flexibility in frequency, pattern and diverse polarization. When compared to frequency and pattern reconfigurable antennas, polarization reconfigurable antenna provides better results while considering extenuating the losses due to multi channel transmission. Latest researches based on polarization diversity antennas are described in this paper to present the classifications.
Keywords: Circular patch; Polarization; Reconfigurable antennas; Switching.
Abstract
Improved Performance of CLOUDQUAL in Internet of Things
S. Saravanan, S. Sowmiya
DOI: 10.17148/IJARCCE.2017.6165
Abstract: Distributed computing is an essential component of the foundation of the Internet of Things (IoT). Mists will be expected to bolster enormous quantities of communications with variable quality necessities. Benefit quality can accordingly be an imperative soul among cloud providers. in order to distinguish themselves from their rivals, cloud provider looked to give predominant administrations that live up to clients' desires. a top quality model are regularly acclimated speak to, measure, and think about the standard of the providers, such a shared fondness are frequently settled among cloud partners. amid this paper, we tend to take an administration point of view and start a top quality model named CLOUDQUAL for cloud administrations. it's a model with quality measurements and measurements that objectives general cloud administrations. CLOUDQUAL contains six quality dimensions, i.e., ease of use, accommodation, dependableness, responsiveness, security, and snap, of that convenience is subjective.
Keywords: Internet of Things, CLOUDQUAL, usability, convenience, dependableness.
Abstract
Automatic Monitoring and Controlling of Weather Condition using Big Data Analytics
I. Karthika, K.P. Porkodi
DOI: 10.17148/IJARCCE.2017.6166
Abstract: Objective: To monitor and control the weather condition of the state, by scrutinizing each home's weather condition. Analysis: Data which is collected from the sensor is send to the spark analytical streaming for processing, home which is not under the control of normal temperature is update in graph, which is shown by using Thing span, control abnormal temperature by using HVAC system. Findings: In existing system weather condition is only monitored automatically and controlled manually, more energy consumption, whereas In proposed system ,sensor receives data and stream data process using spark a, historical data process using Apache hadoop. Improvement: Advance big data analytics tool is used for processing data and automatically controls the weather condition by using HVAC system.
Keywords: Apache spark, Apache hadoop, HVAC, Thing Span, Sensor.
Abstract
Intrusion Detection and Prevention System in Cloud using Decision Tree Model
S. Santhiya, S. Saravanan
DOI: 10.17148/IJARCCE.2017.6167
Abstract: Distributed and open structure of Cloud Computing model and its services makes it attractive for potential intruders. Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. Distributed model of Cloud makes it vulnerable and prone to sophisticated distributed intrusion attacks like Distributed Denial of Service (DDOS). The conventional Intrusion detection and prevention systems are not sufficient to be deployed in Cloud environment because of its openness and service structures. The objective of this project is to analyze or investigate possible solutions to detect and prevent intrusions in Cloud Computing Systems. Based on the survey and experiences with traditional intrusion detection systems, decision tree based models is proposed for IDPS implementation.
Keywords: Intrusion Detection System, Intrusion Prevention System, J48, Cloud environment, Jetty Server, WEKA.
Abstract
Mobile Application for Obtain the Traffic Violations
Ali Abdulhussian Hassan
DOI: 10.17148/IJARCCE.2017.6168
Abstract: The evolution in the field of communication and information technology should overshadow on the various aspects of life, whether in the economic, education, health, police and other public services. Obtaining traffic violations as soon as possible would increase government revenue, and contributes to support the economy, especially those that rely on its economy on one source of income (economic rent). Most of the owners of cars do not pay traffic fines her time specified and this obscures great deal of money from the government in addition to the accompanying owing to the cancellation of financial corruption offenses after its edit by the field officers. In this paper, researcher designed an electronic program that helps the traffic police to obtain legal wages on traffic violations through the use of Android platform. The scope of this study is Karbala city border.
Keywords: traffic violation, traffic police, mobile application, fines.
Abstract
Implementation of Hybrid Cryptosystem using AES-256 and SHA-2 256 by LabVIEW
Israa H. latif, Ergun Erçelebi
DOI: 10.17148/IJARCCE.2017.6169
Abstract: In This paper, the software implementation of the hybrid cryptosystem which consists of the Symmetric-key algorithm AES-256 and the secure hash algorithm SHA-2 256 is presented using the VI LabVIEW environment toolkit. The idea of the proposed Hybrid Cryptosystem is to use the SHA-256 bit as a key generation for AES-256 in order to improve the data security to a greater extent because it provides higher security in terms of complexity. The proposed hybrid cryptosystem is implemented using LabVIEW 2013, and from the simulation results obtained, we see the simplicity in modeling AES-256,SHA-256 and the complete hybrid cryptosystem, the results show two cases, the first case is how we can use the same input messages(plain text of AES-256 is the same as the input message to SHA-256), and the second case with different input messages (plain text of AES-256 is not the same as the input message to SHA-256). And from these results we see that the output results will be the same for the compelete hybrid cryptosystem in the two cases.
Keywords: Advanced Encryption Standard (AES-256), Cryptography, Hash function (SHA-2 256), key Generation, LabVIEW.
Abstract
Optimization of Log Periodic Dipole Array using Genetic Algorithm : A Review
Rakhi Dua
DOI: 10.17148/IJARCCE.2017.6170
Abstract: This paper emphasis on the optimization of Log Periodic dipole array using Genetic Algorithm. The algorithm can be implemented on the physical size of the antenna and its gain. The proposed design is being compared with the conventional LPDA design in terms of length, diameter and spacing between dipole elements. The results reveal that the presented approach may improve the antenna gain and reduce its dimensions. The size of the antenna can be reduced up to 12% as compared to the conventional design. Also the gain can be improved from 9.1, 9.5, 9.2 and 8.5 dB to 10.7, 11.2, 9.9 and 9.1 dB for the desired communication bands. That is why; this approach makes an antenna an attractive choice for wireless applications.
Keywords: Genetic Algorithm (GA), Optimization Techniques, Log Periodic Dipole Antenna (LPDA).
Abstract
Survey on Dynamic Ownership Management for Secure Data De-duplication
Bhagyashri B. Nikam, Dr. Emmanuel M.
DOI: 10.17148/IJARCCE.2017.6171
Abstract: Data de-duplication is used in cloud storage to save bandwidth and reduce the storage space by keeping only one copy of same data. But it raises problems involving data ownership and security when multiple users upload the same data to cloud storage. Since encryption preserves privacy, yet its randomization property hampers de-duplication. Hence, there is a need of secure data deduplication scheme to prevent unauthorized access and data leakage. In recent times, a number of de-duplication schemes have been proposed to solve this problem. However, many systems suffer from security flaws because they do not reflect the dynamic changes in the ownership of outsourced data. In this paper, we review several deduplication techniques over encrypted data to achieve secure and efficient cloud storage service. Furthermore, proposed scheme uses RCE and group key management mechanism to ensure that only authorized access to the shared data is possible, which is considered to be the most important challenge for secure and efficient cloud storage service in the environment where ownership changes dynamically.
Keywords: De-duplication, cloud storage, encryption, proof-of-ownership.
Abstract
A Review of Weather Data Analytics using Big Data
Priyanka Chouksey, Abhishek Singh Chauhan
DOI: 10.17148/IJARCCE.2017.6172
Abstract: Weather plays an important role in every aspect of human life. It has direct impact on every section of human society. Weather forecast has lot of importance in agriculture sector, tourism sector and government agencies. Prior knowledge of weather can be very helpful for human to prepare themselves for any undesirable condition of climate. Various weather parameters like temperature, pressure, humidity, wind speed etc. plays an important role in the analysis of whether condition. Weather data from various sensors for various weather parameters are being generated at huge scale and in future this data will continue to grow. Big Data Analytics technology like Hadoop MapReduce and Spark are playing great role in handling huge amount of data. MapReduce has proven to be useful for batch processing while Spark has proven to be highly efficient in In-Memory Computing. This project aims to study the analytics of weather data using MapReduce and Spark.
Keywords: Hadoop, MapReduce, HDFS, Spark, Weather Data Analytics.
Abstract
Quality Assessments of Various Digital Image Fusion Techniques
D.A. Deshmukh, Prof. Dr. P.V. Ingole
DOI: 10.17148/IJARCCE.2017.6173
Abstract: Image Fusion is a process of combining the relevant information from a set of images into a single image, where the resultant fused image will be more informative and complete than any of the input images. The goal of image fusion (IF) is to integrate complementary multisensory, multitemporal and/or multiview information into one new image containing information the quality of which cannot be achieved otherwise. It has been found that the standard fusion methods perform well spatially but usually introduce spectral distortion, Image fusion techniques can improve the quality and increase the application of these data. In this paper we use various image fusion techniques using discrete wavelet transform and discrete cosine transform and it is proposed to analyze the fused image, after that by using various quality assessment factors it is proposed to analyze subject images and will draw a conclusion. In this results of several applications and comparisons between different fusion schemes and rules are addressed.
Keywords: image fusion, wavelet transform, discrete cosine transform, fused image.
Abstract
Multi-Feature Extraction and Matching Approach for Image Retrieval: A Review
Prof. N. R. Chopde, Miss P. A Rewaskar
DOI: 10.17148/IJARCCE.2017.6174
Abstract: For finding the images has become a great need to developing an efficient technique. Image Retrieval (IR) is a significant and increasingly popular approach that helps in the retrieval of image data from a huge collection. Image representation based on certain features helps in retrieval process. Three important visual features of an image include Color, Texture, Frequency,color histogram is most commonly used color representation color histogram gives better retrieval accuracy.When these features are extracted then various matching techniques are discussed,by using this techniques get the accurate image related to a query image.
Keywords: Color, Texture Frequency and Histogram.
Abstract
Survey on Credit Card Fraud Detection using Recurrent Attributes
Navneet Jain, Vasima Khan
DOI: 10.17148/IJARCCE.2017.6175
Abstract: It is very important to extract the right features from transactional data in implementing a credit card fraud detection model. It is normally done by combining the transactions in order to observe the spending patterns of the customers. We propose to create a new set of features based on analyzing the periodic behavior of the time of a transaction using the von Mises distribution in this paper. We compare credit card fraud detection models, and evaluate how the different sets of features have an impact on the results with the help of a real credit card fraud dataset provided by a large European card processing company. The results show an average increase in savings of 13% by including the proposed periodic features into the methods. The methodology proposed in this paper is currently being incorporated into the fraud detection system of aforementioned card processing company.
Keywords: Fraud detection; von Mises distribution; Cost sensitive learning.
Abstract
Efficient Route Optimization using Distance Matrices for Generation of Latin Square
Sumit A. Bhagat, Prashant M. Kakade
DOI: 10.17148/IJARCCE.2017.6176
Abstract: Distance matrices are used for measuring the distance between two matrices. Using Distance matrices we can generate a Latin square which is also called as Sudoku code. Latin squares have a variety of different practical applications, for example they can be used to code messages, design tournaments or generate magic squares. The prime objective is to investigate the baseline multistage interconnection network and to measures the distance for their applicability to generate a Latin square. It is to identify, how a distance measure can be chosen, either offline or online again which distance measure take more time to compute. In detail, to show that the selection of distance measure can be decided by its algorithm complexity and time required to compute.
Keywords: Efficiency, Time to execute, Cost, Latin square, Permutation.
Abstract
An Updated CLAHE Approach for Image Enhancement with Advanced Wavelets
Tarandeep, Er. Varinderjit Kaur, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2017.6177
Abstract: Image enhancement is a process which performs some operation on the image in order to obtain high contrast images with better quality by suppressing the noisy pixels. Quality of the image is a satisfactory part of any image enhancement technique. Consequently, several techniques till now have been proposing to acquire high quality image while performing different operations. Traditional techniques are not able to preserve the edges of the image which degrades the quality of the image and no longer able to use for other purposes. Owing to this a new technique has proposed which makes quality oriented image after enhancing contrast. A hybrid technique has applied on the image which considers every part of the image and preserves edges too. The proposed method provides good result in terms of different images i.e. gray scale or RGB color images as compared to traditional techniques. Experiments have performed to estimate the performance of the proposed technique visually.
Keywords: Image enhancement, CLAHE, SWT, color space.
Abstract
To Propose Automated Help Desk System
Samartha Agrawal, Sanket Shingate, Kaushik Yadav
DOI: 10.17148/IJARCCE.2017.6178
Abstract: Working along with traditional help desk requires manpower. In traditional help desk, there is an interaction between two humans, one with the query and the other responsible for giving an appropriate response to the query. Traditional help desk is thoroughly dependent on human. Traditional system works in a structured predefined format which puts constraints on the user�s activities. Our proposed system focuses on removing the structured middleware approach by introducing a fully automated help desk which would be responsible for the processing and answering of the user query in an appropriate manner; thus, making it a human-technology based interaction. Our proposed system allows user to interact with the database with the help of Natural Language Processing (NLP). User query is taken in its natural form and is converted into a SQL (Structured Query Language) query with the help of NLP, which is then executed in order to retrieve data from the database. Our system acts an interface between the database and the user; also, it is flexible in its working due to the use of NLP allowing users to interact with the database in their own way.
Keywords: Speech-to-text; Text-to-Speech; NLP (Natural Language Processing); Morphological Analysis; Lexical Analysis; Syntactic Analysis; Semantic Analysis.
Abstract
A Study on Zero Day Malware Attack
Abhay Pratap Singh
DOI: 10.17148/IJARCCE.2017.6179
Abstract: A popular class of threats known as zero day malware has drawn increasing attention from researchers primarily from the organization sector. The term �zero day� refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. In order for the vendor to rectify the vulnerability, the software company must release a patch. Traditional based antivirus are unable to detect these kind of threats,For cybercriminals, unpatched vulnerabilities in popular software, such as Microsoft Office or Adobe Flash, represent a free pass to any target they might want to attack,so its better to keep update your software feature as well.In this paper our prime focus on getting information new kind of malware and what are the ways we can avoid that kind of threat as well.
Keywords: Zero day malware,Antivirus Evasion techniques,Zero day attack,Spear phishing.
Abstract
IOT based Smart Waste Management
Prof. Indu Anoop, Ayush Jain, Shweta Pathak, Gauri Yadav
DOI: 10.17148/IJARCCE.2017.6180
Abstract: Many times, in our city we see that the garbage bins or dustbins placed at public places are overloaded. It creates unhygienic conditions for people as well as ugliness to that place leaving bad smell. To avoid such situations the proposed project will be implemented for efficient waste management using IOT. These dustbins are interfaced with arduino based system having ultrasonic wireless systems along with central system showing current status of garbage, on mobile web application with Android app by Wi-Fi. Hence the status will be updated on to the App. Major part of the proposed project depends upon the working of the Wi-Fi module; essential for its implementation. The main aim of this project is to reduce human resources and efforts along with the enhancement of a smart city vision.
Keywords: Ultrasonic Sensor, Djikstra�s Algorithm, IOT, Notify, Android.
Abstract
Simulation of Wireless BAN using Network Simulation Tool
Vishesh S, Manu Srinath, Sneha Gopinath, Pranava Karanth R
DOI: 10.17148/IJARCCE.2017.6181
Abstract: A BAN (Body Area Networking) is a wireless network of wearable computing devices along the body. Advances in wireless communication technologies such as wearable and implantable biosensors, and with recent developments in embedded computation area are making way for design, development and implementation of Body Area Networks. This paper presents to you the simulation of the idea proposed in our previous paper titled �Conceptual Study of Wireless BAN using Bluetooth/IEEE 802.11n�[1] we have successfully simulated the proposal using GNS3 tool and drawn conclusions in this paper. OSPF is used to interconnect the routers/sensors at various parts of the body, either placed at the nodes or as stubs (at the body endings). Heart is the central and the most powerful router and all the nodes are connected to it in a star topology. Many interface loops are created which act as the body endings or information/data/multimedia exchangers. The BAN on a person who is transmitting the data is enclosed under area 0 (backbone of the OSPF). Area 0 is interconnected to various other BAN�s enclosed by different areas n, where n=1,2,3,.... and n is not �0� via virtual links. Communication between two BAN�s is possible only by handshaking. Also the information/data/multimedia to be exchanged is encrypted, password protected using encryption and network security protocols.
Keywords: OSPF, Area 0, information/data/multimedia exchanges, encrypted, password protected, encryption and network security protocols.
Abstract
Sentiment Analysis Tool
Prof. Ajitkumar Khachane, Lakshya Kumar, Chandresh Jain, Ashay Shah
DOI: 10.17148/IJARCCE.2017.6182
Abstract: Since the advent of Internet, and later on Social Media and E-commerce websites, people have started expressing themselves more and more online instead of on paper. This give businesses and organizations an opportunity to analyze views and interests of people in accordance with a set of provided keywords, time duration, geographic locations, age group and thus. Following the human nature of curiosity, collecting a selected set of opinions and sentiments and then topic-oriented analysis allows extraction of rich information that would help make smarter business decisions, political campaigns and better product consumption.
Keywords: Sentiment Analysis; Natural Language Processing.
Abstract
A Study on Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation
Rashmi, Vidya Kumari
DOI: 10.17148/IJARCCE.2017.6183
Abstract: In the recent generation aged/young people are suffering from various health issues like respiratory problem, blood sugar, blood pressure, heart related diseases, the current medical techniques fails to overcome these situations. Recent technological advances in integrated circuits, wireless communications, and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices. A number of these devices can be integrated into a Wireless Body Area Network (WBAN). This is a study on the applications of Wireless Body Area Network in physical rehabilitation and to study the existence of Wireless Body Area Network in and around the city.
Keywords: Wireless Body Area Network (WBAN), Physical Rehabilitation, Intelligent Motion Sensors.
Abstract
An Investigation Study of Hospital Management Information System
Dr. Mohammed Najm Abdulla, Dr. Intisar Al-Mejibli, Shaimaa Khamees Ahmed
DOI: 10.17148/IJARCCE.2017.6184
Abstract: Healthcare is so interesting for our society. Generally Hospital Management Information System(HMIS) is a computer-based system that has the ability to coordinate all information for enable healthcare providers to do their works effectively and efficiently. According to using these systems across the globe, this requires a strong need to understand such systems and its capabilities. This work conducts investigation study about hospital management information system encompasses historic view of the system and its evolution stage, the most important functionalities services , stakeholder of such systems ,components of HIS, three layer graphic based model(3LGM), architecture design style of HIS and standard communication of HIS. This work will give a comprehensive picture to the reader about available HMIS.
Keywords: Hospital Information System (HIS), Health Management, Heath level 7(HL7), 3LGM.
Abstract
Indoor Navigation using LIFI
Prof. B. B. Gite, Pankaj Maydeo, Shubhangi Bade, Tushar Muluk
DOI: 10.17148/IJARCCE.2017.6185
Abstract: The LI-FI is the most up to date innovation in the Field of remote correspondence. These days many individuals are utilizing web to satisfy their undertaking through wired or remote. As the quantity of clients is expands the rate of information transmission in the remote system gets consequently diminishes. WI-FI gives us speed close around 150mbps.11n yet steel it is not ready to satisfy the necessity of the client due to such reason we are presenting the LI-FI. As per the German physicist Harald Hass LI-FI gives more speed (10megabits every second) information transmission by utilizing obvious light. So here in this condition we are dissect the LI-FI/WI-FI.It's a similar thought band behind infrared remote controls yet significantly more capable. Haas says his innovation, which he calls D-LIGHT, can create information rates speedier than our normal broadband association. In this we will look at and broke down the speed of LI-FI and WI-FI and furthermore organize sticking issue amid the expansion the expanding of clients.
Keywords: Wi-Fi, Radio Spectrum, Li-Fi, Visible Spectrum.
Abstract
Smart Irrigation and Crop Planning System: using Arduino Microcontroller
Ekata Ghadage, Vibhavari Kharate, Parnika Mane, Samruddhi Pimpale
DOI: 10.17148/IJARCCE.2017.6186
Abstract: Developing water shortage, because of growing populations and varying natural conditions, places stress on irrigation structures, which frequently are the primary consumptive water users. Therefore, water resources control to enhance the allocation of restrained water materials is critical. With the effect of weather alternate in India, majority of the agricultural vegetation are being badly affected in terms in their performance over duration of final two decades. Predicting the crop yield nicely beforehand of its harvest might help the coverage makers and farmers for taking appropriate measures for advertising and marketing and garage. Such predictions will also help the associated industries for planning the logistics of their business. Several strategies of predicting and modeling crop yields have been evolved in the beyond with varying fee of achievement, as those don�t take into account traits of the climate, and are mainly empirical. In this proposed system we are Using Discrete Cuckoo Search Algorithm in which we are planning and water allocation to crop in any whether condition , we checking weather environment and depend on that we are give a water supply to our crops.
Keywords: Climate, agricultural productivity, Crop Production, prediction.
Abstract
Review paper on Software Data Reduction for Bug Triage
Miss. Karande Rupali .D, Mr. H.P. Khandagale
DOI: 10.17148/IJARCCE.2017.6187
Abstract: Bug is a very essential factor which is occur in software. Almost every company facing problem to solve issues related bug, software companies spends over 40-45 percent of cost in dealing with software bugs. Very important step to handle bug is bug triage, which aims to correctly assign a developer to a new bug. To lower the time price in guide work, text category strategies are implemented to behavior computerized bug triage. In this paper, we address the problem of facts reduction for bug triage, i.e., a way to reduce the scale and enhance the satisfactory of bug records. We integrate instance selection with feature selection to simultaneously lessen facts scale on the malicious program dimension and the word measurement. To determine the order of making use of example selection and function choice, we extract attributes from historic malicious program information units and build a predictive model for a new computer virus information set.
Keywords: Mining software repositories, application of data preprocessing, data management in bug repositories, bug data reduction, feature selection, instance selection, bug triage, prediction for reduction orders.
