VOLUME 7, ISSUE 1, JANUARY 2018
Securing Digital Data using 256-bit Multimodal Biometrics based Cryptographic Key
Pooja Muthamma M.M, Lakshmisha S Krishna
Design of Wideband Fractal Antenna
P.Sivakumar, P.Kathirvel, K.Sathees Kumar
Application of an Enhanced Genetic Algorithm to Radar System
Hatem Elgothamy M.S, Mohamed A. Zohdy Ph.D, Hoda S. Abdel-Aty-Zohdy Ph.D
A Hybrid Method Based on Clustering to Improve the Reliability of the Wireless Sensor Networks
Kobra Khoshraftar*, Behnam Heidari and Milad Ghodrati
Hybrid DWT and SVD based biometric watermarking for fingerprint authentication
Komal Ramteke, Swati Ramteke
Comparative Study on Effective Approaches of Automatic Number Plate Recognition
T.Balamani, Dr.V.Kavitha
NMF and its Interdisciplinary Applications: A Review
Sumisha Kalithodi, Nandakumar Paramparambath
Hybrid Solar-A Review
Rohan Lad, Shubhangi Raut, Dhanashree Gund, Pavan Mudgade, Shweta Yadav
A Weighted Kernel Possibilistic C-Means Algorithm Based On Cloud Computing For Clustering Big Data
M.Manjula
Smart Grid Technology: Prediction and Monitoring
Sanket Junagade, Asmita Kadam, Mayank Kapadi, Jill Harsora
A Survey of Mobile Personalized Recommendation Through Social Network Trends
Pooja Chaudhari, Prof. A. R. Deshpande
Symmetric-key Accessible Encryption to Secure Geometric Range Search Over Encrypted Spatial Data
P.Karthikeyan, Prof.B.Gopinathan M.E.,(Ph.D)
An Efficient Energy Aware Secure Routing in Medical Data Transmission for Body Sensor Network
B.Yesaswini Sindhura
MIMO to Increase Channel Capacity in Mobile Satellite Communication using Dual Circular Polarized Antennas
Suresh Kumar Jindal
Augmenting Satellite Channel Capacity by Appropriate Techniques
Suresh Kumar Jindal
Embedded System Product Development: Health Monitoring-1
Vishesh S, P Srikanth Ranjan, Vishal BK, Rajath BG, Sharvani P, Akshaya VM
Mobile Self Encryption
Ms. N.S.Gurdhalkar, Ms. S.S.Gurdhalkar, Ms.P.D.Belhekar, Ms.J.S.Mane, Prof. T.R.Shinde
Cattle Health Monitoring System – A Review
Swapnil R. Kurkute, Aishwarya Thenge, Shivani Hirve, Diksha Gosavi
Reliable VLSI Technology for Design and Analysis of 12T MTCMOS AND MCAM
Ms.Sneha S. Oak, Amit A. Kale, Mr. Dhiraj S. Bhojane
Carrier Communication for Domestic AC power Line
Abhilasha Naidu, Tiksha Binekar, Meenu Nair
A Real time EEG based Drowsiness Detection with Brain Computer Interface for Vehicular System
Ashwini Mane, Prof. Minakshi Pawar
A novel approach to Real Time Human Emotion Recognition based on displacement of facial feature points
Anurag De, Dr. P. Satheesh, Dr. B. Srinivas, M. Vamsi Krishna
Review on Challenges in Multipath Routing with AODV Protocol for MANET
Anu Bhagat, Sandeep Kaur
Analysis of Intracardiac Masses in Heart by Applying Different Algorithms into Echocardiography
S. Sarmila Mercy, C. Rajarajachozhan
Intruder Detector System
Pratiksha Phulari, Aparna Parigond, Komal Mohare, Tehsina Shaikh, Prof.T.R.Shinde
Smart Bus for Smart City using IOT Technology
Mr. A J Kadam, Mr. Virendra Patil, Mr. Kapish Kaith, Ms. Dhanashree Patil, Ms. Shambhavi Bendre
Smart Share
Siddhant Gandhi, Shubham Kadam, Abhishek Taru, Akshay Mali, Prof. N. M. Karolia
Android Based Attendance Management System
Shrinivas Kendre, Samadhan Markad, Mrs S.S.Jogdand
Machine Learning Approach for Automatic Text Summarization Using Neural Networks
Meetkumar Patel, Adwaita Chokshi, Satyadev Vyas, Khushbu Maurya
A Review on Various Image Encryption Technique using AES and Random RGB Substitution
Dharna Singhai, Chetan Gupta
Virtual Desktop System
Vinayak Tilekar, Nishant Ahire, Yash Dolas, Sukanty Chakma, Prof. M.U. Sanap
Design and Optimization Low Power Adder using GDI Technique
Dolly Gautam, Mahima Singh, Dr. S. S. Tomar
Decision Support system to Maximize Profit Using Integer programming Comparing with other Techniques
Moayd Bahumayd, Mahmoud Kamel
Designing and Optimizations Of Low Power Multiplexer Using CMOS Device Modeling
Mahima Singh, Dolly Gautam, Dr. S. S. Tomar
Fruit Sorting and Packaging System
Darshana Fandade, Aboli Nugurwar, Anjali Sherekar, Jotsna Nikhade
Design and Implementation of Clustering Algorithm based on Multi-Swarm Intelligence
Priyanka Panwar, Amit Vajpayee, Harish Patidar
RYMEC Campus Navigator with Speech Assistance
Jyothi G. P, Sharada, Abhilasha .B, Sapna B Kulkarni
Path Planning and Tracking for Vehicle Collision Avoidance based on Model Predictive Control with Multi Constraints
Nandhini.G, Ranjitha Kumari.S
An Review on Firewall and its Attacks
Bavithra.G.R, Mahalakshmi.V, R.Suganya
Achieving Privacy with Secure Database using Numeric & Alphabetical SQL Queries in A Cloud
P.Vedavalli
Impact of Social Networking Applications in Academia among Pupil and Personnel
Rashmi, Vidya Kumari
A Review: Text Data Encryption Technique using DES Algorithm with Random Key Generation and Comparative Study of Different Existing Technique’s
Prashansa Shrivastava, Anita Katiyar, Neha Purohit, Chetan Gupta
College Network Scenario Implementation by using Cisco Packet Tracer
Paulami Pathak, Sayanti Majumder, Chandra Mondal, Prof. Manikandan K
Abstract
Design of Coaxial Feeding Elliptical Microstrip Patch Antenna for Wireless Communication
Hiwa Sediq
DOI: 10.17148/IJARCCE.2018.711
Abstract: In this paper, the design of a coaxial feeding elliptical microstrip patch antenna (MSA) for a device in wireless communication is presented. In this design, the technique of using rectangular and C-shaped slits for the patch has been used in order to improve the parameters of the antenna. The proposed technique has demonstrated that it is capable of increasing the gain. Using this technique not only causes the antenna gain to increase but also it leads to extending the 3-dB bandwidth of antenna and other antenna parameters as it has been mentioned in this paper. Hence, the elliptical microstrip patch antenna is designed for wireless communication application that operates at 2.45 GHz with its physical dimension (length of 138.143 mm, width of 138.143 mm and height of 3.245 mm) and its parameters (directivity of about 8.28 dBi, gain of 8.1 dB and return loss of -17.85 dB). The commercial electromagnetic software such as CST Microwave Studio has been used to analyse simulations and design structures of antenna.
Keywords: Elliptical Microstrip Patch Antenna (EMSA); Gain; Slit-Slot Rectangular and C shaped slit Microstrip Patch Antenna; Coaxial Fed
Abstract
Performance evaluation of Hole Repair Algorithm in Wireless Sensor Network
Priyanka M. Taneja
DOI: 10.17148/IJARCCE.2018.712
Abstract: Network causes most of the problems of coverage due to random deployment of sensor nodes in Wireless sensor network. Severe coverage problems occur because of death nodes and serious coverage overlapping which degrade the network performance. In the proposed work, we have developed algorithm taking limited mobility of nodes, area of coverage overlapping and calculating high dense region in the area of network. For repairing the hole area of death node we have developed algorithm to select node in higher overlapped area who knows the its neighbor nodes as death node among other neighbor node which will be ready to move in the hole area without losing its connectivity and coverage with the existing nodes in that area. This cause moderate consumption of energy and increase the coverage of network despite of losing significant amount of energy. We have observe that proposed work has shown the increase of coverage area of network, significant decrement in overlapping area which causes because of random deployment, most effective ratio of recovered hole area in the scenarios.
Keywords: Wireless sensor networks, density control, coverage, mobility, hole repair.
Abstract
Securing Digital Data using 256-bit Multimodal Biometrics based Cryptographic Key
Pooja Muthamma M.M, Lakshmisha S Krishna
DOI: 10.17148/IJARCCE.2018.713
Abstract: In the current era of digitisation, digital documents are widely used. The merits of digital documents are huge while its security and privacy are at large. Hence Cryptography is used to secure digital documents. Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. In this paper a novel idea is proposed, digital documents are encrypted using 256- bit cryptographic key which is generated by multimodal biometric system. This system uses Palm print and Fingerprint as traits. The features of both traits were extracted and fused at feature level. This biometric based cryptographic key is unpredictable to an intruder as the intruder lacks the knowledge of physical traits of the user. By this proposed model confidentiality, integrity, availability mechanisms are achieved. This biometric based cryptographic security can be integrated to e-governance and e-health for efficient management.
Keywords: Securing digital documents, to stop fraudulent activities, palm print, fingerprint, Impossible to forge, Impossible to counterfeit secured data, multimodal biometric system, cryptographic security, e-governance, e-health
Abstract
Design of Wideband Fractal Antenna
P.Sivakumar, P.Kathirvel, K.Sathees Kumar
DOI: 10.17148/IJARCCE.2018.714
Abstract: Self similar arrays have frequency independent multi band characteristics. This paper presents the design of fractal antenna based on the Koch curve geometry. The antenna has been optimized to operate in multiple bands between 3-8 GHz and efficiency of 85 percentages with a peak gain of 4db. Design and analysis of fractal antenna is done by using CST software. The results show that the designed Koch Curve antenna is suitable for wireless applications.
Keywords: Wideband, Fractal, Koch curve, CST
Abstract
Application of an Enhanced Genetic Algorithm to Radar System
Hatem Elgothamy M.S, Mohamed A. Zohdy Ph.D, Hoda S. Abdel-Aty-Zohdy Ph.D
DOI: 10.17148/IJARCCE.2018.715
Abstract: This paper introduces an enhanced Genetic Algorithm (GA) that is faster and less computationally expensive than the standard GA. Four enhancements are introduced here (multiple weighted roulettes, multiple cross over points, multiple mates and utilizing the D4 wavelets). Then the new enhanced system was applied on a dynamic large optimization problem that consists of an array of sixteen radar sensors to predict the Angle of Arrival (AoA) for an approaching object. Results was obtained using the enhanced GA as well as the standard GA. The enhanced GA is able to find the AoA using the least possible number of calculations, which, means it was less expensive computationally and is robust to parameter selections. Special software was developed using Java for this purpose; also, MS-Excel was used to represent the data map as charts.
Keywords: Genetic Algorithm; bio inspired system; evolutionary algorithm; weighted roulette wheel; Daubechies wavelets.
Abstract
A Hybrid Method Based on Clustering to Improve the Reliability of the Wireless Sensor Networks
Kobra Khoshraftar*, Behnam Heidari and Milad Ghodrati
DOI: 10.17148/IJARCCE.2018.716
No abstract available.
Abstract
Hybrid DWT and SVD based biometric watermarking for fingerprint authentication
Komal Ramteke, Swati Ramteke
DOI: 10.17148/IJARCCE.2018.717
Abstract: Biometric predicated authentication system has inherently advantage over traditional personal identification techniques. A critical problem is to ascertain the security and integrity of biometric data. Digital watermarking is a technique that is utilized to solve this problem. This paper represents a hybrid DWT and SVD based biometric watermarking algorithm which is utilizable for embedding watermark i.e. binary equivalent of minutiae of fingerprint into cover fingerprint image. Here we select lower resolution band for embedding watermark as watermark detection is computationally efficient at lower resolution band. The proposed algorithm can satisfy the transparency and robustness of the watermarking system very well and even in the presence of different image processing attacks utilizable information can be extracted accurately from fingerprint images.
Keywords: Digital watermarking, DWT, SVD, Arnold transform, Copyright protection.
Abstract
Comparative Study on Effective Approaches of Automatic Number Plate Recognition
T.Balamani, Dr.V.Kavitha
DOI: 10.17148/IJARCCE.2018.718
Abstract: Programmed distinguishing proof of vehicle turns out to be more functional in numerous applications with the quick improvement of an open transportation system. The system consequently recognizes a vehicle by perusing the number plate information from a picture or a video. The Automatic number plate recognition system is utilized to distinguish the number plate under different perilous conditions like stormy, foggy climate impacts, low differentiation situations, objects like the number plate out of sight, and on a level plane tilted number plate. Diverse image processing methodologies, strategies, and calculations are utilized to construct programmed number plate recognition system technique to identify a number plate range from a picture or a video.
Keywords: Number plate, character recognition, number plate identification, image processing, classification, Template matching.
Abstract
NMF and its Interdisciplinary Applications: A Review
Sumisha Kalithodi, Nandakumar Paramparambath
DOI: 10.17148/IJARCCE.2018.719
Abstract: Non-negative matrix factorisation (NMF or NNMF) is a group of algorithms for matrix decomposition with the non-negative constraint, that is the matrix to be factorised and the factors of the matrix should be non-negative. NMF is a very popular technique for data decomposition. Some of the data�s such as image pixels, power spectra, stock indices are non- negative. NMF has found wide variety of applications mostly in pre-processing of signals and classification. So in this paper we review about the concepts of NMF and its applications in various fields.
Keywords: NMF, signal processing, power spectra, classification.
Abstract
Hybrid Solar-A Review
Rohan Lad, Shubhangi Raut, Dhanashree Gund, Pavan Mudgade, Shweta Yadav
DOI: 10.17148/IJARCCE.2018.7110
Abstract: Now a day�s electricity is very important facility for the human being. All the conventional energy resources are changing day by day. So we have to move from conventional to non-conventional energy resources. So we move toward solar energy. This process converts the sustainable energy resources without damaging the nature. Solar energy converted into electricity by using solar panels. This electrical power can utilize for various application. Generation of electricity will be takes place at low cost. Without damaging the nature balance, this paper deals with the generate electricity with affordable cost.
Keywords: Hybrid, Renewable, Less-complexity, Economical Efficient
Abstract
An Anatomy of Windows Executable File (EXE) and Linux Executable and Linkable Format File (ELF) Formats for Digital Forensic Analysis and Anti-Virus Design Purposes
Mohammed A. Saleh
DOI: 10.17148/IJARCCE.2018.7111
Abstract: The era of forensic analysis and anti-virus design requires a clear anatomy of Windows Executable File (EXE) and Linux Executable Linkable Format File (ELF) Formats, especially for beginners to these fields; thus, this research comes out. First, this research identifies data structures for both files formats, namely EXE and ELF files formats. After that, it classifies them according to headers, sections, and resources based on specific features and functionalities. Finally, this research proposes analysis guidelines for EXE and ELF files formats forensic analysis and anti-virus design purposes.
Keywords: Anatomy of EXE format file, anatomy of ELF format file, anti-virus design, digital forensic analysis.
Abstract
A Weighted Kernel Possibilistic C-Means Algorithm Based On Cloud Computing For Clustering Big Data
M.Manjula
DOI: 10.17148/IJARCCE.2018.7112
Abstract: Here we will discuss about the Privacy-preserving High-order Possibilistic c-Means Algorithm. Fuzzy C- Means is a Clustering method that allows each data point to belong to multiple clusters with varying degree is membership. PCM is one of the methods used for C-means Clustering process and image analysis. The Process find out the two types of Clustering's like normal PCM clustering and important is HOPCM like (High Order PCM) FOR Big data clustering. The HOPCM method based on Map Reduce for very large amounts of heterogeneous data. Finally, a privacy-preserving HOPCM algorithm (PPHOPCM) to protect the private data on cloud by applying the BGV encryption scheme to HOPCM. To tackle this problem, the paper proposes a high-order PCM algorithm (HOPCM) for big data clustering by optimizing the objective function in the tensor space. Clustering is designed to separate objects into several different groups according to special metrics, making the objects with similar features in the same group. Clustering techniques have been successfully applied to knowledge discovery and data engineering. With the increasing popularity of big data, big data clustering is attracting much attention from data engineers and researchers.
Keywords: Possibilistic c-means (PCM), HOPCM, Map Reduce, PPHOPCM,BGV schema.
Abstract
Smart Grid Technology: Prediction and Monitoring
Sanket Junagade, Asmita Kadam, Mayank Kapadi, Jill Harsora
DOI: 10.17148/IJARCCE.2018.7113
Abstract: Here we will discuss about the Privacy-preserving High-order Possibilistic c-Means Algorithm. Fuzzy C- Means is a Clustering method that allows each data point to belong to multiple clusters with varying degree is membership. PCM is one of the methods used for C-means Clustering process and image analysis. The Process find out the two types of Clustering's like normal PCM clustering and important is HOPCM like (High Order PCM) FOR Big data clustering. The HOPCM method based on Map Reduce for very large amounts of heterogeneous data. Finally, a privacy-preserving HOPCM algorithm (PPHOPCM) to protect the private data on cloud by applying the BGV encryption scheme to HOPCM. To tackle this problem, the paper proposes a high-order PCM algorithm (HOPCM) for big data clustering by optimizing the objective function in the tensor space. Clustering is designed to separate objects into several different groups according to special metrics, making the objects with similar features in the same group. Clustering techniques have been successfully applied to knowledge discovery and data engineering. With the increasing popularity of big data, big data clustering is attracting much attention from data engineers and researchers.
Keywords: Possibilistic c-means (PCM), HOPCM, Map Reduce, PPHOPCM,BGV schema.
Abstract
A Survey of Mobile Personalized Recommendation Through Social Network Trends
Pooja Chaudhari, Prof. A. R. Deshpande
DOI: 10.17148/IJARCCE.2018.7114
Abstract: Online social networks are experiencing an explosive growth in recent years in both the number of users and the amount of information shared. The users join these social networks to connect with each other, share, find content and disseminate information by sending short text messages in near real-time. As a result of the social networks, the users are often experiencing information overload since they interact with many other users and read ever increasing content volume. Recommendation systems have been proposed to help users cope with information overload by predicting the items that a user may be interested in. The user's preferences are shaped by personal interests. At the same time, users are affected by their surroundings, as determined by their geographically located communities. One of the approach takes into account both personal interests and local communities. A new dynamic recommendation system model that provides better customized content to the user is described provides the user with the most important tweets according to his individual interests. Study of how changes in the geographical community preferences can affect the individual user�s interests is done through this. These community preferences are generally reflected in the localized trending topics.
Keywords: Recommendation systems, social networks, topics modeling, trending topics etc.
Abstract
Energy Efficient Techniques in 5G Networks
Akshita Abrol
DOI: 10.17148/IJARCCE.2018.7115
Abstract: With the evolution of communication technology, a corresponding requirement for optimization in energy consumption is also growing. With the emergence of 5G technology the importance of energy efficiency (EE) for wireless networks has been realized even more. The major concern is to improve EE without compromising on user experience. So in this paper, we address various energy issues and provide an analysis of various techniques which will be adopted in the 5G networks to improve the energy efficiency of the devices. We have focused our attention on the following areas to improve the energy efficiency which include EE improvement using radio access techniques like Simultaneous wireless energy and power transfer, EE improvement by use of Small Cells and Massive MIMO, EE improvement by using relays and D2D communication.
Keywords: Energy Efficiency, 5G, D2D, Small cells, Massive MIMO, SWIPT.
Abstract
Symmetric-key Accessible Encryption to Secure Geometric Range Search Over Encrypted Spatial Data
P.Karthikeyan, Prof.B.Gopinathan M.E.,(Ph.D)
DOI: 10.17148/IJARCCE.2018.7116
Abstract: Nowadays, outsourcing the data to the cloud server is a natural activity auctioned by several cloud users. The outsourced data may contain sensitive information. The cloud technologies are very much improved that attracts many Location based Services companies. The overall theme of the cloud data resides at the distant server is to be managed with minimal computation by data owner and data users. The data is hired away in encrypted form to prevent anonymity activities. Reach ability is one of the issues faced between cloud users and LBS companies. Accessible encryption is a procedure to perform significant questions on encoded information without uncovering protection. Be that as it may, geometric range look on spatial information has not been completely examined nor bolstered by existing accessible encryption plans. In this we plan a symmetric-key accessible encryption conspire that can bolster geometric range inquiries on encoded spatial information. One of our real commitments is that our outline is a general approach, which can bolster diverse sorts of geometric range questions. At the end of the day, our outline on encrypted information is free from the states of geometric range questions. In addition, we additionally expand our plan with the extra utilization of tree structures to accomplish look multifaceted nature that is speedier than linear.
Keywords: Spatial data, geometric range queries, encrypted data, privacy
Abstract
An Efficient Energy Aware Secure Routing in Medical Data Transmission for Body Sensor Network
B.Yesaswini Sindhura
DOI: 10.17148/IJARCCE.2018.7117
Abstract: The Body Sensor Network (BSN) technology is one of the most imperative technologies used in IoT-based modern healthcare system. Then, we process a secure IoT based healthcare system using BSN, called BSN-Care, which can guarantee to efficiently accomplish those requirements. BSN architecture composed of wearable and implantable sensors. These sensors collect the physiological parameters and forward them to a coordinator called Local Processing Unit . The LPU works as a router between the BSN nodes and the central server called BSN-Care server, using the wireless communication mediums such as mobile networks 3G/CDMA/GPRS. We adopt a Time Division Multiple Access (TDMA)-based protocol and dynamically adjust the transmission order and transmission duration of the nodes based on channel status and application context of WBAN. The Body Sensor Network technology is one of the core technologies of IoT developments in healthcare system, where a patient can be monitored using a collection of tiny-powered and lightweight wireless sensor nodes. In this process, at first, we highlight the major security requirements in BSN-based modern healthcare system. Subsequently, we propose a secure IoT-based healthcare system using BSN, called BSN-Care, which can efficiently accomplish those requirements.
Keywords: Body Sensor Network(BSN), Time Division Multiple Access(TDMA), Local Processing Unit(LPU), Internet of Thinkings (IoT)
Abstract
MIMO to Increase Channel Capacity in Mobile Satellite Communication using Dual Circular Polarized Antennas
Suresh Kumar Jindal
DOI: 10.17148/IJARCCE.2018.7118
Abstract: Multiple-Input Multiple-Output (MIMO) technologies has recently emerged as one of the most significant technical breakthroughs in modern digital communications due to its promise of very high data rates at no cost of extra spectrum and transmit power. MIMO-based systems take advantage of what is probably the last unexploited frontier in wireless communications, the spatial domain. No doubt the MIMO gain is achieved only when the signal reaches at the receiver via two or more independent paths resulting in multipath fading, which otherwise is an impediment to communication using Non Line of Sight (NLOS) mode of communication. MIMO technology offers many advantages and degrees-of-freedom, such as: (a) space and multiuser diversity gain, (b) spatial multiplexing gain, (c) array and coding gain, and (d) interference reduction. MIMO is of less or of no advantage in LOS (Line of Sight) communication. Mobile satellite communication channel can be modelled as a multipath fading channel in the case when the receiver with multiple antennas is moving on the road side with long trees on both sides of the road in urban areas and moving through vegetation in rural areas. Since there is limitation of increased volume and weight on board satellite due to which having two independent antennas is a difficult proposition, it is suggested to use Dual Circular Polarised Antennas on board satellite and two or more antennas on moving platform/s on ground. It has been found in simulates results that at high signal to noise ratio a multiplexing gain of nearly 1.6 has been achieved by using single antenna on board satellite but transmitting and receiving signal with dual polarised (Right Hand Circular Polarised (RHCP) & Left Hand Circular Polarised (LHCP) wave. The phenomenon of multipath fading is more pronounced at higher frequencies like Ku and Ka band compared to L or S bands, but for mobile satellite mobile communication the band L & S band (having frequency well below 10 GHz) is used. The only disadvantages of MIMO systems are basically its designing, multichannel synchronization, DSP engineers are required to implement more sophisticated baseband processing algorithm to better interpret the channel model. (1), (2)
Keywords: Multiple Input Multiple Output (MIMO), Dual Polarisation Per Beam (DPPB), Multiplexing Gain, Array Gain. Multipath Fading, Line of Sight (LOS), Low Elevation Angel, Channel Capacity, Non Line of Sight (NLOS).
Abstract
Augmenting Satellite Channel Capacity by Appropriate Techniques
Suresh Kumar Jindal
DOI: 10.17148/IJARCCE.2018.7119
Abstract: The satellite channel capacity depends on available bandwidth (Bw), transmit power, receiver sensitivity, sometimes referred as gain-to-noise temperature ratio (G/T), ambient noise density etc. The other parameters which dictate channel capacity are type of modulation scheme, access technique, use of FEC (forward error correction) technique, area illuminated by the satellite beam at a particular period of time, required probability of bit error rate, under identical assumption of channel conditions. Digital information transmission and reception is being considered for study and analysis purpose. The satcom. Network throughput optimization depends on many techniques like using proper Modulation scheme to optimally use the power equivalent bandwidth of the transponder, the frequency allocation to allot the central BW of transponder to location falling beyond 3 dB. BW contour, use of spot beams with on board satellite switching, adaptive bit rate to reduce the fade margins which sometimes are of the order of 10 dB. Or so. , appropriate access schemes like carrier-in-carrier (CnC), also called paired carrier multiple access (PCMA) for satellite where enough onboard power generation capability is available. Techniques like MIMO, which in the form of Dual-Circular polarization for one onboard antenna and multi antennas on ground stations fits best into requirement as on today�s limitations of satellite having constraints of less space, weight and available DC power still exists. MIMO is more suitable for Power limited satellite channel. The access techniques like TCP/IP accelerator, firewall, virtual private network (VPN), traffic shaping, intrusion prevention system (IPS) � antivirus/antispyware/antimalware, web filter and antispam for internet application will further optimize the capacity of a given satellite channel. Some of the techniques like modulation and FEC (Forward Error Correction), PCMA, frequency allocation for optimal communication can be implemented by configuration of modem or changing the itself but the few of them demand on board hardware change. These techniques are MIMO and SSTDMA Satellite Switched TDMA.
Keywords: PEMA, Paired Carrier Multiple Access, MIMO, Multi Input Multi Output, TCP, Transmission Control Protocol, EB/NO- Bit energy-to-noise Power spectral density, IP, Internet Protocol, PCMA, Power equivalent bandwidth
Abstract
Embedded System Product Development: Health Monitoring-1
Vishesh S, P Srikanth Ranjan, Vishal BK, Rajath BG, Sharvani P, Akshaya VM
DOI: 10.17148/IJARCCE.2018.7120
Abstract: Human foot takes a lot of weight, the actual mass of the human body and the downward force on the human feet due to the gravitational pull [1]. Most foot pain is the result of faulty relationship between the bones and the muscles of the foot caused by very high pressure exertions at particular points of the foot. It is very essential to monitor the actual pressure at points on the foot and there is a need for custom made orthotics. As the subjected feet rests on the orthotics it is gently and consistently directed in to the correct position during walking, running and standing. In this paper, we have briefly explained the concept of monitoring of pressure points of the foot using android application. Force sensors are used to monitor the force per unit area at different pressure points of interest on the foot. The region on the foot which has to be subjected to lesser pressure or corrected is noted and a custom made orthotics is used as the shoe sole. It is blessing in disguise to diabetic patients to monitor and correct every foot movement.
Keywords: Diabetic patients, EEPROM, Bluetooth module (HC-05) and monitoring of pressure points of the foot using android application
Abstract
Mobile Self Encryption
Ms. N.S.Gurdhalkar, Ms. S.S.Gurdhalkar, Ms.P.D.Belhekar, Ms.J.S.Mane, Prof. T.R.Shinde
DOI: 10.17148/IJARCCE.2018.7121
Abstract: Day by day, the mobile user are rapidly increased that�s why, the chances of mobile losses are also increased. Apple, Sony, OnePlus5, LG, Moto z having more security like face recognition, finger print, voice recognition. But they having high cost. Because of high cost middle class people cannot afford these phones. But some mobile have low cost. Due to low cost, it doesn�t provide that much security as compare to high cost mobile phones. Mobile Self Encryption allows users to store sensitive data on their mobile phones without having to worry about is confidentiality even if the mobile is lost. This Application concentrates on securing data on mobile phones by storing it an encrypted form.User is install app on their phone and it performs various operations.If user mobile device is lost it login on portal and update status with lost for deleted secrete key.
Keywords: Cloud, Encryption, Decryption, Confidentiality
Abstract
Cattle Health Monitoring System – A Review
Swapnil R. Kurkute, Aishwarya Thenge, Shivani Hirve, Diksha Gosavi
DOI: 10.17148/IJARCCE.2018.7122
Abstract: Productive online cattle health monitoring can help those farmers who regularly suffer due to the poor health condition of their cattle and unavailability of good veterinary. Hence it is difficult for farmers to monitor and compare the present health parameters with the standard reference healthy parameters. By such comparison they would be able to spot any health issues in the cattle's health. To prepare such a system for real time application, very few researchers are working through use of Node MCU, Node MCU is an open source IoT platform, Step Counter and different types of sensors. This paper focuses mainly on existing different types of system used for monitoring the health parameters such as counting foot step, temperature, rumination and body humidity of the cattle.
Keywords: Node MCU, Step Counter, Rumination, Humidity & Temperature.
Abstract
Reliable VLSI Technology for Design and Analysis of 12T MTCMOS AND MCAM
Ms.Sneha S. Oak, Amit A. Kale, Mr. Dhiraj S. Bhojane
DOI: 10.17148/IJARCCE.2018.7123
Abstract: Memories are an main part of most of the digital devices and hence reducing power consumption and area reduction of memories is very important issue as of today to improve system performance, efficiency, reliability. A transistorized SRAM cell is conventionally used as the memory cell and memristor behaves as a switch, much like a transistor. However, unlike the transistor, it is a two-terminal device and does not require power to retain either of its two states, they save the data when the power supply is lost, ensuring preservation of critical information. Note that a memristor change its resistance between two values and this is achieved via the movement of mobile ionic charge within an oxide layer, furthermore, these resistive states are non-volatile. This project focuses on new approach towards the design and modeling of Memristor based CAM (MCAM) and 12T MTCMOS SRAM cell. Our proposed work is, new memory model have been determined and compared with existing models and proposed cell design dissipates less power at different temperatures than existing models. Simulation did on the basis of Microwind 3.1 Back End CMOS technology to reduce power consumption and enhance data stability and system efficiency.
Keywords: SRAM, MOS, CAM, MTCMOS, nMOS, BSIM4
Abstract
Carrier Communication for Domestic AC power Line
Abhilasha Naidu, Tiksha Binekar, Meenu Nair
DOI: 10.17148/IJARCCE.2018.7124
Abstract: This paper aims at introducing an old technology in a new way. Now-a-days the most common thing for control systems is the power line carrier communication. The main aim of our paper is transmission and reception of digital data from one place to another place with the help of PLCC modem through transmission lines without installing new wiring. A power line carrier system includes three basic elements transmission lines, transformers and coupling devices. Our main motto is that it can be established in remote areas with existing power lines with high data rate and less cost. Using the existing AC power lines as a medium to transfer the information/data it becomes easy to connect houses, offices etc with a high speed network access point.
Keywords: Latest Technology, PLCC, Communication, EHV.
Abstract
A Real time EEG based Drowsiness Detection with Brain Computer Interface for Vehicular System
Ashwini Mane, Prof. Minakshi Pawar
DOI: 10.17148/IJARCCE.2018.7125
Abstract: Drowsiness is becoming a severe issue in case of traffic accident. Normally, sleepy condition can be identified from several factors like eye blink level, yawning, gripping force on steering wheel and so on, but all these measuring techniques will check only the physical activities of the human. We proposed a real time EEG based drowsiness detection with brain computer interface system for drowsiness detection. The proposed BCI system consists of a wireless physiological signal acquisition module. Here, BCI system is used to collect brain signal and transmit them to the embedded signal processing module wirelessly. The embedded systems supports various peripheral interfaces, is used to real time detection of drowsiness and trigger a warning tone and stop the vehicle to prevent traffic accidents when drowsy state occurs.
Keywords: Drowsiness detection, Electroencephalogram (EEG), Brain Wave Sensor, Brain Computer Interface (BCI).
Abstract
A novel approach to Real Time Human Emotion Recognition based on displacement of facial feature points
Anurag De, Dr. P. Satheesh, Dr. B. Srinivas, M. Vamsi Krishna
DOI: 10.17148/IJARCCE.2018.7126
Abstract: Human emotion recognition is one of the vital areas of research in the broad field of image processing and human-computer interaction. In this paper, an implementation methodology is proposed for designing a real-time emotion recognition system through facial expression detection. In implementing this system, a webcam is used to capture the frontal face of the person and the YCbCr color model is used to detect the face part in the captured image and then various facial features are extracted from the face image and based on the distances measured between the various feature points of the face, the facial expression is detected and eventually classified into six basic emotions such as happiness, surprise, anger, fear, sorrow and neutral. The classification results varies in a time function thus reducing the latency between the man and machine making the system behave in a real-time manner.
Keywords: Real-time, YCbCr color model, Facial Expression, Emotion Recognition, Human-Computer Interaction.
Abstract
Review on Challenges in Multipath Routing with AODV Protocol for MANET
Anu Bhagat, Sandeep Kaur
DOI: 10.17148/IJARCCE.2018.7127
Abstract: MANET is a standalone infrastructure for self-configuring networks and wirelessly connected mobile devices. One of the biggest challenges is guidance. the routing is a way of sending packets in the network . Routes in MANET differ from traditional network infrastructure because the contract serves not only as a terminal device but also as a router. Without any security infrastructure and ever-changing network topology, routing protocols are vulnerable to various attacks. the various improved to techniques are used to decrease the current recovery time with good working of the system. the optimized route will be provided in an existing routing protocol for efficient routing in Ad Hoc mobile networks.
Keywords: MANET, AODV, Routing Protocol
Abstract
Analysis of Intracardiac Masses in Heart by Applying Different Algorithms into Echocardiography
S. Sarmila Mercy, C. Rajarajachozhan
DOI: 10.17148/IJARCCE.2018.7128
Abstract: : Generally, humans are suffered from various types of diseases. In recent years most of the people affected by cancer. Image processing is the key stage to recover the cancer patients at an early stage. The exact position of the tumor and thrombus using image processing techniques are found. According to the location of the tumor and thrombus, various diagnostic techniques are used. Various image processing techniques are helpful to automatically identify the intracardiac masses such as tumor and thrombus present in the heart. In this paper, various classification algorithms, various segmentation techniques, various denoising methods are analyzed. The comparative study was taken from various locations of the tumor and thrombus, present in the human�s heart. Similarly, this paper gives the usage of different segmentation techniques and denoising approaches. In this study gives the knowledge about various filters, for reducing the noise in the images.
Keywords: Classification, intracardiac masses, sparse representation, tumor, denoising filters, thrombus.
Abstract
Intruder Detector System
Pratiksha Phulari, Aparna Parigond, Komal Mohare, Tehsina Shaikh, Prof.T.R.Shinde
DOI: 10.17148/IJARCCE.2018.7129
Abstract: Nowadays, every different organization face security problem in the form of malicious insider or other people trying to steal organization sensitive information. So, it is necessary to provide security to this sensitive data. To overcome the problem faced by lab managing staff, and to improve the management of computers in a lab, Intruder Detector System was developed. The monitor port of the switch is connected to monitoring server to monitor a LAN when multiple switches are installed, the monitoring server should be connected to them all. This connection can either be a LAN specifically configured for monitoring traffic or it can be a physical cable. Our project aims to provide a solution to the lab managing staff by altering them if anyone tries to connect an external device/s.
Keywords: Java, My SQL 5.5, JSP, HTML.
Abstract
Smart Bus for Smart City using IOT Technology
Mr. A J Kadam, Mr. Virendra Patil, Mr. Kapish Kaith, Ms. Dhanashree Patil, Ms. Shambhavi Bendre
DOI: 10.17148/IJARCCE.2018.7130
Abstract: Trustworthiness in public transport is of great importance today. Citizens who uses public buses waste a lot of time waiting for the bus at bus stop. In daily operation of a bus system, the movement of buses is affected by unknown conditions as the day progresses such as traffic or dispatching buses at irregular time from the depo. If people travelling by bus get exact location of bus and the approximate arrival time based on normal traffic conditions and also the count of passengers in bus it will increase the trustworthiness in the public transport. This paper proposes a system to track public bus using GPS (Global Positioning System), tell the count of number of passengers in bus and also the estimated time arrival to the user. The Location of Bus can be tracked by public using Android Application. The Android application will also contain the details of all the bus like Bus number, Bus routes, Bus Stops, Bus timings or the frequency.
Keywords: Internet of things, IR sensors, GPS, GPRS, public transport, bus tracking, Android
Abstract
Smart Share
Siddhant Gandhi, Shubham Kadam, Abhishek Taru, Akshay Mali, Prof. N. M. Karolia
DOI: 10.17148/IJARCCE.2018.7131
Abstract: As of late, there has been a blast of enthusiasm for mining time series databases. Similarly, as with most software engineering issues, a portrayal of the information is the way to productive and viable arrangements. A standout amongst the most usually utilized portrayal is a piecewise direct estimate. This depiction has been used by various investigators to help with bunch, arrangement, ordering and information sharing methodology of time arrangement information. An assortments portrayal, with few calculations, has been freely rediscovered few times. In this venture, we attempt the primary broad audit and experimental examination of all proposed methods. We demonstrate that every one of these calculations has lethal defects from an information sharing point of view. We present a novel calculation that we experimentally show to be better than all others in the writing.
Keywords: SRB, P2P, Global data, GridFTP, HYPERCBR, ADTS, GRAM, Data transfer, Java Object Router.
Abstract
Android Based Attendance Management System
Shrinivas Kendre, Samadhan Markad, Mrs S.S.Jogdand
DOI: 10.17148/IJARCCE.2018.7132
Abstract: Over the years the manual attendance management has been carried across most of educational institutions. To overcome the problems of manual attendance, We have developed �Android Based Attendance Management System�. Android Based Attendance Management System is based on Android, which can be implemented on any Android Phone. In This application, PHP is server side language, MySQL and PHP is used as back-end design and HTML, CSS and JavaScript are used as front-end tools. The system communicates with database residing on a remote server. It calculates automatically, the attendance percentage of students without any manual paper-based work. Managing the attendance using traditional approach is really a cumbersome process. The person has to be maintain the attendance record in registers and file using pen and paper. The problem with this approach is that it requires lots of paper which are the part of our non-renewable natural resources. We are in the age, where we have to think about sustainable development. Managing the attendance using mobile phones, provide an alternative way in this direction. Communication between teachers and the parent is also an important issue that should also be considered, because parent can only get the information about their ward after the interaction with teachers. So, we also tried to bring the system which enables parent to receive the information of their ward of regularity on daily basis.
Keywords: HTML, CSS, Java Script, PHP, SMS, .Net, SQL Server.
Abstract
Machine Learning Approach for Automatic Text Summarization Using Neural Networks
Meetkumar Patel, Adwaita Chokshi, Satyadev Vyas, Khushbu Maurya
DOI: 10.17148/IJARCCE.2018.7133
Abstract: Machine learning and deep learning, as we know, have started ruling over almost every field in the computing industry and so, has revolutionized the process of text summarization too. Automatic text summarization is an advancing realm of the natural language processing research in which concise textual summaries are generated from lengthy input documents. Extensive research has been carried out on how automatic summarization can be prosecuted through various extractive and abstractive techniques. In this paper, we address all the approaches to text summarization and present the modus operandi of an Architecture called Encoder-Decoder, under the machine learning approach. Moreover, we propose several novel implementation models for this architecture, in Keras and TensorFlow that consists of various machine learning and deep learning neural network libraries.
Keywords: Machine Learning, Text Summarization, Neural Networks, Deep Learning, Keras, TensorFlow.
Abstract
Comparison between MIMO & SISO System in Capacity & Performance
Haitham Al Fatli
DOI: 10.17148/IJARCCE.2018.7134
Abstract: At this time the world must reliably use a better system for wireless network and that is the reason why it should be generally advanced to be improved the wireless network. And that due to limited range, and limits information rates in the wireless devices which have (multiple-input multiple-output) antenna is introduced to beat these limitations. This paper is focused on the MIMO executive investigation and how can increase the data rate capacity of the communication which it uses the wireless system, in addition, the basic thoughts on SISO, SIMO and MISO framework. It allows numerous receiving devices on the sending side and the receiving side to provide various possibilities in the center of the transmitting and receiving end for radio connections. The (multiple-input multiple-output) MIMO to perform the multiplexing gain, Finally, these systems are run in MATLAB-2013 and reenacted hypothetical sequences of SISO and MIMO, have collapsed and looked through QPSK regulation procedures using.
Keywords: MIMO, QPSK, SISO, MISO, SIMO
Abstract
A Review on Various Image Encryption Technique using AES and Random RGB Substitution
Dharna Singhai, Chetan Gupta
DOI: 10.17148/IJARCCE.2018.7135
Abstract: Security is the major concerns when the transmission of the data is perform over the network because intruders/attackers of the network steal most of the information from it. So before transmission of the data sender must make secure it by using some of the encryption techniques from the various security techniques available such as DES, AES, MD5, SHA etc. Most of the encryption technique uses secret key to prevent the data from an unauthorized access. In this paper we have discussed various encryption algorithms after study various researches paper and also compare them. Here we suggested AES Encryption algorithm with RGB substitution techniques for the encryption of our data. To provide the strength of our algorithm hidden key is also sent along with data which solves the problem of key exchange which arises in encryption techniques.
Keywords: Hidden Key, Intruders, Symmetric key, Asymmetric key, Encryption, Decryption, AES, DES, MD5, SHA, RGB
Abstract
Virtual Desktop System
Vinayak Tilekar, Nishant Ahire, Yash Dolas, Sukanty Chakma, Prof. M.U. Sanap
DOI: 10.17148/IJARCCE.2018.7136
Abstract: : Today the world is rapidly changing the statement �We are in the world� to �world is in our hand�. Today is the World of technology. Information technology is the technology used to store, manipulate, distribute or create information. All these activities are handled by the System Administrator. In the previous system they can store the Activity of the one system and monitor on one machine so the proposed of previous system we can develop a Virtual Desktop system. A System Administrator is a person who manages a computer network. He maintains and manages all the machines in the network, usually a LAN or Local Area Network. The machines may be server machine or client terminals. The System Administrator deals with various operations while monitoring/network. He has to physically as well as logically keep a check on all the machines in a network. So, the job of administrator increases. They should know all the details of the client. Our system, Virtual Desktop helps the System for Administrator to monitoring the network and the clients in it. The Virtual Desktop is a fast, easy and efficient way for Administrator check and Monitor the clients Machine.
Keywords: LAN, Wifi, Remote retrieval.
Abstract
Design and Optimization Low Power Adder using GDI Technique
Dolly Gautam, Mahima Singh, Dr. S. S. Tomar
DOI: 10.17148/IJARCCE.2018.7137
Abstract: The main objective of this paper is to provide new low power solutions for Very Large Scale Integration (VLSI) Designers. This works focuses on power dissipation reduction. Due to which growth increases with the scaling down of the technologies. Addition is a fundamental arithmetic operation widely used in many VLSI systems, such as application specific DSP architectures and microprocessors. The adder is one of the most critical components of a central processing unit. The object of the adders not only adding of bits but also involves in address calculation, subtraction, division and multiplication, the adders are critical components to determine the speed, delay and power of the overall system, low power adders are always preferable.
Keywords: Adder, GDI, Low Power VLSI, Leakage current.
Abstract
Decision Support system to Maximize Profit Using Integer programming Comparing with other Techniques
Moayd Bahumayd, Mahmoud Kamel
DOI: 10.17148/IJARCCE.2018.7138
Abstract: I have written this paper to my confidence that decision support systems and technologies can help traders and business owners in develop their business especially in making decisions related with investments. The paper give readers overview on techniques used in business and especially those they work in medium institution and those they interested in investment decisions. The results of research illustrate the best techniques can use in investments decisions and the best ways to use every technique. The scope of the work was in one of medium size enterprise, i use their data for the year of 2016 and make the study on this data. In this research, I argue that the use of scientific methods is better than relying on traditional methods such as the experience of people and others. In particular, I believe that the use of linear programming method is the best way to make investment decisions. The experiments in the research on two methods assuming stability of sold quantities in 2017 as 2016 and the second method by forecast o sold quantities in 2017 after studying time series of every item. The techniques that we use are traditional method as experience of persons our case study use it, data calculations but not rely on scientific method, linear programming and ABC XYZ analyse. The way the experiments were conducted was to focus on the highest return on profitability, taking into account the available financial resources of the institution as well as the expected period of return of profits.
Keywords: Decision support system, linear programming, medium sized enterprise, investment decisions
Abstract
Designing and Optimizations Of Low Power Multiplexer Using CMOS Device Modeling
Mahima Singh, Dolly Gautam, Dr. S. S. Tomar
DOI: 10.17148/IJARCCE.2018.7139
Abstract: In today�s world power consumption is become major power concern in VLSI designing. Portable devices like laptops, cell phones, and computers require a circuitry that consumes less power. Also large power dissipation is directly associated with cost and complexity of the devices. High speed multiplier plays a dominant role in designing of digital circuits. The low power CMOS devices can be used in real time image, speech processing and 3D computers graphics application, mainly the fields where high speed is required.
Keywords: MUX, MTCMOS, CMOS, Low Power VLSI, Leakage current.
Abstract
Modern Security System With Message Transmitter
Anand Kiran
DOI: 10.17148/IJARCCE.2018.7140
Abstract: The main objective of this project is to provide security to places such as banks, museums, shops etc. during non working hours. Security of valuables at such places can be assured by installing this system during non business hours especially night hours when there is none to safeguard the property. This system senses the presence of a person who tends to loot and immediately activates the system which provokes the security station or a police station by initially transmitting an alarm tone and then immediately transmitting pre-recorded information stating where the theft has broken down. The control of this mechanism is provided by a microcontroller and transmission is done using FM techniques. Infrared sensors are used to detect the presence of a person who breaks the place during non working hours. For this purpose two sensors are used, namely signal generator and signal receiver. From the signal generator infrared rays are emitted through the infrared LED and these rays are detected by the receiver infrared LED. These two infrared LED�s are arranged parallel to each other at the entrance. The distance between these two sensors can be increased to the required length, by increasing signal delivering power of the transmitter depending up on the area of the Room. The output of the signal receiver circuit is fed to microcontroller, such that whenever any person passes between the sensors, the controller gets high signal. On receipt of a high signal from the infrared sensor, the microcontroller energizes the relays, and the program is prepared such that one of the relays will be active for 20 seconds (relay-1) and the other for 70 seconds. The relay-1 contact is used to energize the alarm while the relay-2 contact is used to energize the cassette player mechanism, and the recorded information produced by the tape head amplifier is super imposed over the carrier and transmitted as a modulated wave using F.M transmitter. In the audiocassette, address of the system is recorded. In this project, condenser MIC amplifier is also used, and this is very sensitive MIC amplifier, which picks-up very low sounds also perfectly. The idea of using this MIC amplifier is, to transmit the voice or conversion of the intruders through the F.M. transmitter. The output of MIC amplifier, Tape head amplifier and 1 kHz signal generator is connected to the input of carrier generator. Two digits digital display system is designed with 7-segment displays and it is connected at the output of the microcontroller, therefore whenever the controller receives interrupted signal, the display shows 90 and starts counting in decrementing mode, finally when display shows zeros, controller de-energizes both the relays automatically. The receiving Module of the project work is, supposed to be installed at police station or security office, where the system alerts the police officials or security guards for taking the necessary action immediately. In the receiver the receiv
Abstract
Fruit Sorting and Packaging System
Darshana Fandade, Aboli Nugurwar, Anjali Sherekar, Jotsna Nikhade
DOI: 10.17148/IJARCCE.2018.7141
Abstract: This paper aims at presenting the automatic system of fruit sorting and packaging which detects the fruits on the basis of spot detection by the Matlab software by the aid of the image processing. Image capturing and detection and packaging are key factors on which this system depends. This system will lead to the relaxation from the monotonous human work, will also minimize the error and speed up the process of sorting and packaging.
Keywords: sorting system, spot detection, image processing, sensors, conveyer belts, packaging, Matlab.
Abstract
Design and Implementation of Clustering Algorithm based on Multi-Swarm Intelligence
Priyanka Panwar, Amit Vajpayee, Harish Patidar
DOI: 10.17148/IJARCCE.2018.7142
Abstract: Clustering remains an active field of different domain research currently. No single algorithm is identified, which can group every real world datasets resourcefully and without error. Our proposed technique be different from the classical ant system in the sense that here the pheromone trail are simplified in behaviour. The capability of Multi Swarm Optimization (MSO), heuristic technique for search of optimal solutions based on the perception of swarm, to powerfully face classification of multiclass database instances. it is evident that the proposed method outperforms other methods compared. The experimental result show the proposed technique is efficient.
Keywords: Ant Colony Clustering Algorithm, Swarm Intelligence Algorithm, multi Swarm Optimization.
Abstract
RYMEC Campus Navigator with Speech Assistance
Jyothi G. P, Sharada, Abhilasha .B, Sapna B Kulkarni
DOI: 10.17148/IJARCCE.2018.7143
Abstract: We suggest a solution for students, their parents and visitors who visit the campus. It is very difficult to reach destination without navigation It will be waste of time in searching destination It may be overhead to the guards to guide continuously to the strangers or visitors. We are designing RYMEC Campus Navigator with Speech Assistance in smart phones and an embedded device for additional information. Campus navigator is a mobile application which is based on Bluetooth/GSM technology. The data from Bluetooth/GSM gets transmitted and it can be monitored in Smartphone. Our project is more suited for campus environment of manufacture industries, software companies, college and universities, government campus etc. We are concentrating on visitor assistance and security for the campus. Both concepts are achieved successfully. Speech output is embedded in the device which provides better assistance for the visitor.
Keywords: Navigator, GSM, RFID Reader, Microcontroller, LDR.
Abstract
Path Planning and Tracking for Vehicle Collision Avoidance based on Model Predictive Control with Multi Constraints
Nandhini.G, Ranjitha Kumari.S
DOI: 10.17148/IJARCCE.2018.7144
Abstract: A collision warning scheme is one which makes use of data, including communication between vehicles, to enhance vehicle safety and warn drivers of potentially dangerous situations. The propose systems have mostly been cast-off to provide warning information for the driver and do not suggest possible actions. These systems notify the following vehicle about the potential collision condition, but do not provide rerouting selections for the driver which can help avoid traffic congestion. The propose system ant colony based decision making algorithm provides an alternative route for vehicles approaching the accident location in order to decrease waiting and travel time and avoid traffic path. The ant colony algorithm is one of the best decision-making methods for a select the best path rerouting system in VANET. The decision-making system to avoid the congestion path to select the best routing path. This algorithm vehicle send request messages to other vehicles in order to find out about traffic congestion based on the responses message. The propose ant colony algorithm there is no need to continue sending redundant messages and this reduces channel bandwidth by not sending unnecessary messages. The specific �resending� accident messages alongside the propagating messages for one hop by receivers in order to make sure that all needed vehicles are aware of the accident and can take action to reroute to avoid the traffic jam caused by the accident.
Keywords: VANET � Vehicle Ad-hoc Networks, OBU - On-Board Units, RSU- Road Side Units.
Abstract
An Review on Firewall and its Attacks
Bavithra.G.R, Mahalakshmi.V, R.Suganya
DOI: 10.17148/IJARCCE.2018.7145
Abstract: The computer networks and internet networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. This paper discusses the security of computing systems and shows how to protect computer-related assets and resources. The paper highlights different security threats and concerns across computer networks and shows how firewalls detect these threats. At last, dissimilar firewalls similar to Packet filter submission Gateways and individual Firewall are summarized and compared according to different network scenarios. The paper also proposes a new framework for the compulsion, threat management and safeguard of network environments.
Keywords: Security system, firewalls, threats, packet filtering, application gateways. ident.
Abstract
Achieving Privacy with Secure Database using Numeric & Alphabetical SQL Queries in A Cloud
P.Vedavalli
DOI: 10.17148/IJARCCE.2018.7146
Abstract: Reasoning handling is a new form of internet-based handling that provides distributed computer handling sources and data to computer systems and other gadgets on requirement. It is the distribution of organised solutions over the world wide web. Reasoning handling solutions can be public, private or multiple. The growing industry of cloud has provide something model of storage/computation free lancing minimizes users� pressure of IT facilities servicing, and decrease the cost for both the businesses and individual customers. The three main benefits of cloud handling are self-service provisioning, flexibility, pay per use. The three wide groups of cloud handling are Infrastructure as a Support, System as a Support and Software as a Support.
Keywords: Data source, range query, privacy preserving, reasoning processing
Abstract
Secure Image Data Storage using Hybrid Cloud
M. Elakkiya
DOI: 10.17148/IJARCCE.2018.7147
Abstract: In IoT, increasing usage of image sensors and devices has led to a concern for storing the captured images and securing it, especially for big images. We make use of hybrid cloud structure for providing the framework for efficiently storing the images. The concept is to partition the image into most significant and less significant (remaining) image parts. The most significant part which is very less in size is stored in private cloud. The less significant part which constitutes major storage space is stored in public cloud. The two partitions are merged to form a full actual image when the user wants to retrieve the actual image. Sobel edge operator is used to partition the image. Encryption and compression schemes are employed to ensure privacy and reduce transmission bandwidth respectively.
Keywords: Hybrid cloud, private cloud, public cloud, image storage.
Abstract
Impact of Social Networking Applications in Academia among Pupil and Personnel
Rashmi, Vidya Kumari
DOI: 10.17148/IJARCCE.2018.7148
Abstract: Here we analysed the merits and demerits of the social media applications like whatsapp, face book and others. We analysed the time spent on this applications and time wasted on those days. Also the time required fetching or getting the information through these applications and the time utilized during the day. However it can be at least judged on the basis of student�s whatsapp and face book usage to some extent and its impact on their academic performance can be analysed.
Keywords: Social network, Facebook, Whatsapp, Academics.
Abstract
A Review: Text Data Encryption Technique using DES Algorithm with Random Key Generation and Comparative Study of Different Existing Technique’s
Prashansa Shrivastava, Anita Katiyar, Neha Purohit, Chetan Gupta
DOI: 10.17148/IJARCCE.2018.7149
Abstract: With the progression of digital data exchange in electronic way, network security has become an important issue. Encryption algorithm plays a major role in the information security systems. The main objective of encryption algorithms is to protect data and information in order to achieve privacy. Encryption is the process of encoding plain text into cipher text. Encryption algorithms are mainly divided into two categories which are symmetric and asymmetric key encryption algorithm. In Symmetric key encryption, both sender and receiver uses the same key whereas, in asymmetric key encryption, both sender and receiver uses the different keys.DES is a strong block cipher encryption standard that operates on a 64-bits plain text block and returns a 64-bits cipher text. The DES algorithm provides security against various attacks in an effective, efficient and essential way by implementing security parameter counting Confidentiality, Authentication, accountability, and accuracy. In this paper we discussed about various encryption technique for secure data transmission and also compare different encryption techniques like AES, RSA, DES and Triple DES on the basis of various parameters, here we also suggested to encrypt text data using DES algorithm using random key generation to improve strength of encryption algorithm.
Keywords: Encryption, plain text, cipher text, confidentiality, accountability, accuracy, authenticity, DES, RSA, AES.
Abstract
College Network Scenario Implementation by using Cisco Packet Tracer
Paulami Pathak, Sayanti Majumder, Chandra Mondal, Prof. Manikandan K
DOI: 10.17148/IJARCCE.2018.7150
Abstract: Different users are there for the project; the users are present in different groups at different places. By this, a request is induced by one of the other user to interface with other user/users or sharing some data with them. There can be a condition where a message is to be broadcasted to entire college by a user. So this paper is about communication among divergent users present at different sites, sharing this common network. CNS Stands for the college network scenario.
Keywords: CNS, CCNA, CISCO, IP, ROUTER, VLAN.
