VOLUME 6, ISSUE 7, JULY 2017
Loop Fusion Methods: A Critical Review
Mahsa Ziraksima, Shahriar Lotfi, Habib Izadkhah
Smart Helmet for Coal Mines Safety Monitoring and Alerting
S. R. Deokar, V. M. Kulkarni, J. S. Wakode
A Versatile Mobile Application for Quality Prediction of Wheat Grain using Machine Learning Algorithms
Priyanka S. Mankoji, Uttam Patil
Improved the Efficiency of Self Optimal Clustering Technique using Particle Swarm Optimization
Mr. Gajendra Dangi, Ms. Malti Nagle, Mr. Tarique Zeya Khan
Wireless Earthquake Alarm
Sharana Basavaraj.B, Lokesh.K.S, Manasa K C, Santosh M
Sentiment Analysis and Rating Prediction Approaches – A survey
Dr. R.PRIYA, SNEHA. R
A Survey on User Data Classification and Profile Identification Using Wi-Fi Data
MS D. PRIYADARSHINI, SREEDHANYA.C
Friend’s Location Tracker
Mayank Prakash Malviya, Gowsika R, Gowthami S
Revealing and Eliminating of Appearance Fur Blemish
Manuja M, Dr. S. Kotrappa
A Survey on Ad Hoc On-Demand Multipath Distance Vector Routing Protocol
Niharika Srivastava, Samir Srivastava
ECG Signal Based Heart Disease Prediction System using DWT and SVM
Sana S. Zadawale, Savita Bakare
A Hybrid Clustering Technique Combining ACO Algorithm with K-Means
Aarti Pardeshi, Neetesh Gupta
Routing the Historical Places with Ant Colony Algorithm
M.R. Altunkum, A. Gunes
Microblogging in Social Networks – A Survey
N. Baggyalakshmi, Dr. A. Kavitha, Dr. A. Marimuthu
Energy Efficient Power Allocation, Resource Optimization for Cognitive OFDM
Aishwarya Deelip Ingawale, Mr. Shrishail B. Mule
Aspect Level Opinion Mining on Customer Reviews using Support Vector Machine
Anju Joshi, Anubhooti Papola
Mining Order Preserving Submatrices using FP-Growth Algorithm
Yashi Bhardwaj, Anubhooti Papola
Raspberry Pi and IoT based Family Robot
Sandesh Hathwar B, Manasa M B, Fathima Afshan, Chaithra R
“Implementation of Visually Sensed Obstacles Assistance for Vision Impaired People”
Shraddha Chourasiya
An Efficient Algorithm for Throughput Maximization and Delay Minimization in Cognitive Radio Wireless Mesh Network
M. Minupriya, C. Vennila
A Proposal on Initial Remote User Enrollment for IVR-based Voice Authentication Systems
Umut Can Çabuk, Tuba Şenocak, Eyyüp Demir, Abdullah Çavdar
“Implementation and Comparative Analysis of PTP in Network Security for Malicious Misbehavior Activity Detection”
Tejaswini S. Akulwar, P. S. Kulkarni
Advanced Data Peripheral Glove with Real-time Vital Health Monitoring System
Dr. G. Mahammad Gouse, Mir Abdul Samim Ansari, Shubiya Sultana, Swathi Jha, Sruthi Krishna.U
Wireless Sensor Networks to Implement Smart Elevator System
Yashaswini Jogi
Enterprise Resource Planning (ERP) for academic Architecture Framework using Cloud Computing
Mrs. Suvarna L. Kattimani, Miss. Wangi Kanchan Mallinath
Smart Irrigation System using GSM Module
Mrs. M.S. Ghute, Mr. S. Soitkar, Mrs. K.P. Kamble
A Semantic Based Accurate Answer Retrieval Technique for Plant Diseases
Johannah Jebaraj, Dr. J.G.R Sathiaseelan
“The Split Multipath routing approach for reducing routing overhead and Energy Drainage in MANET”
Jaspreet Kaur, Jatinder Pal Sharma
Analogy of Traditional and Modern Optimization Techniques in Wireless Sensor Networks: A Review
Kritika Varma, Sahil Dalwal, Sonia Jhangra
A Review Paper on Enrichment of Data Security by using Various Cryptographic Algorithms
Varsha Gupta, Astha Gautam, Ruchi Singh
Recognizing Focal Liver Lesions (FLL) using Fuzzy C-means (FCM) Algorithm and Level Set Method (LSM)
Narasimharaju. Paka
Open Shortest Path First (OSPF) Routing Protocol and the Use of Virtual-Links
Vishesh S, Nandan AS, Lohith J, Abhishek S, Hrishikesh M, Arjuna C Reddy
Cloud Data Security and Malware Detection Techniques – A survey
Mrs. P. Sundari B.E, M.C.A., M. Phil., Ms. V. Vidhya
Balanced Clustering in Mobile Adhoc Network using Conceded Cluster Head Node
Pooja Kumari, Gurpreet Kaur
Analysis of Path Loss through the Partitions in Indoor Propagation
Saw Mon Yee Aung, Myo Myint Maw
Detection of Salient Object in a Static Image
K.P. Kamble, M.S. Ghute, Mohsina Anjum
Survey on Backup Recovery Issues and the Existing Solutions in Cloud Computing
S. Aarthi MCA., M.Phil, R. Thamari Selvi M. Sc., MCA., M.Phil, Net.,
A Comparative Study of Heuristics for Different Cloud Computing Scheduling Algorithm
R. Ganesan, Dr. S. Ravichandran Ph.D
License Plate Image Recognition from Moving Vehicles using Kernel Estimation Method
R. Nandhini, Prof. M. Jothi
Parametric Real Face Images Detection using Multiple Classifiers
H. Alebeed, M. Osman
Border Gateway Protocol- Implementation
Vishesh S, Dewarsh Diwakar Joshi, Deepthi Rao K, Manish K Yadava, Meghashree K, Eshwar S Sastry
Ranking Web Pages using Ant Rank and Bee Colony Algorithm
M. Beulah Rani, B. Sujata, M. Priyanka
Effect of Changes in Implementation of LTE-U Application in UDP and TCP/IP Protocol
Divya Kumar Gupta, Gajendra Sujediya
Part Based Image Representation for Find-Grained Category Detection
V. Saranya, Prof. M. Jothi
Distributed Cloud Data Storage using Fuzzy Authorization Framework
A.A. Arulprabha, K.M. Padmapriya
Analysis of Classification Techniques for Intrusion Detection System
Divya M S, Vinutha H P
Towards Segmenting Stereo videos in foreground Propagation in Cinematographic Optimization
Mr. P. Thangaraju, M.Sc., MCA., M.Phil., PGDCA., Mrs. R. Nanthini., M.Sc., B.Ed.,
Regression Analysis with Cloud computing Technology in the field of Agriculture
Mrs. V. Ramya, MCA., Mr. K. Mohamed Amanullah, MCA., M.Phil.,
Multilevel Security for Template Protection using RLE-RSA Algorithm
Gagandeep Kaur Bassi, Jatinder Pal Singh Raina
Dynamic Channel Allocation for Cluster Based Mobile Ad Hoc Networks
V. Chitra, Dr. S. Adaekalavan
Routing Challenges in Wireless Sensor Network: A Review
Navjot Kaur, Jatinder Kumar
Prediction of Skin Diseases using Data Mining Techniques
S. Reena Parvin
Privacy Preserving Back-Propagation Neural Network Data Security in Client and Server
C. Amirtha Rani
BAN: intra-BAN and inter-BAN
Vishesh S, Moulana Izhar Ahmed, Karthik Srinivas, Srikrishna BS, Sukruth L Babu, Veeresh Kumar U, Sachin R
Develop Dynamic File Block Level Operations of Cloud Computing Systems
R. Obulakonda Reddy, R. Nagarjuna Reddy, M. Radha, N. Sree Vani, B. Srinivasulu
An Overview and Analysis of the higher order QAM Modulation Scheme over Rayleigh Fading Channel with RSBC, Alamouti STBC and Interleaving for Wireless Communication Applications
Mr. Girish Kalse, Mr. Vijaykumar Sharma
A Study of aspect level opinion mining of Online Customer Reviews using Apriori Algorithm
V. Jayashree, M. Muthuraman
A Survey on Visual Hashing and Indexing Techniques for Content-Based Image Retrieval
Mrs. G. Maheshwari, Prajitha.P
Access Control List: Route-Filtering and Traffic Control
Vishesh S, Tejas C, Tejaswini V, Apoorva M Gowda, Siddarth S Bellur, Samarth S Kulkarni
Smart ATM Access and Security System using IRIS Recognition
Madhura Raju Lakhe, Prof. S.S. Savkare
Methodical Clustering Slant for Privacy Preserving Data Mining
Bharath H C, Poornima B, Ashoka K
Data Security on Cloud Network using Key Policy Attribute Based Encryption
Lavanya Natarajan, Sujata Kulkarni
VANETs Applications, Challenges and Possible Attacks: A Survey
Abdul Quyoom, Mohd Saleem, Mudasser Nazar, Yusera Farooq Khan
Enhanced Fingerprinting and Trajectory Prediction for IoT Localization in Smart Buildings
Swati B. Patil, Nidhi Sharma
Identification and Verification of Person Using Hand Based Biometric Features
Neha Shivajirao Tondare, Prof. S.S. Savkare
Service Rating Prediction and Recommender System-A Survey
T. Sivakumar, Sneha Prakash
Abstract
Loop Fusion Methods: A Critical Review
Mahsa Ziraksima, Shahriar Lotfi, Habib Izadkhah
DOI: 10.17148/IJARCCE.2017.6701
Abstract: Contemporary applications are much more complex than before and they need more time and resources while being executed. Investigators provide various strategies to improve the process of compiling, trying to improve execution speed. Hence, distinct transformations are proposed that are frequently used in modern compilers. One of them is loop fusion in which multiple loops merge together and form an extended one. Many studies have been done on this transformation and its impact on systems performance, reflecting the importance of this issue, each of them having its own perspective in enhancing the efficiency of loop fusion. This paper demonstrates a review of prominent researches in loop fusion and assesses the advantages and disadvantages of each.
Keywords: Optimizing Compilers; Loop transformations; Loop Fusion; Data Dependence.
Abstract
Smart Helmet for Coal Mines Safety Monitoring and Alerting
S. R. Deokar, V. M. Kulkarni, J. S. Wakode
DOI: 10.17148/IJARCCE.2017.6702
Abstract: Industrial safety is one of the main aspects of industry specially coal mine industry. Underground mining hazards include suffocation, gas poisoning, object fall, roof collapse and gas explosion. So air quality and hazardous event detection is very important factor in mining industry. This system provides a wireless sensor network for monitoring real time situation of underground mines from base station. It provides real time monitoring of harmful gases like CO, CH4 and LPG and also temperature. The main reason for death of miners is that, due to any reason miners falls down and loses consciousness also proper treatment is not provided them at that time. To overcome this problem the system provide emergency alert to the supervisor if person fall down by any reason. Some workers are not aware for safety and they are not wear helmet. A Limit switch was then used to successfully determine whether a miner has removed his helmet or not. The system uses Zigbee technology for transmission of data from underground mine to base station. There is alert switch at mines and base station for emergency purpose.
Keywords: Zigbee; helmet removal; real time monitoring; coal mine safety; air quality; person fall detection.
Abstract
A Versatile Mobile Application for Quality Prediction of Wheat Grain using Machine Learning Algorithms
Priyanka S. Mankoji, Uttam Patil
DOI: 10.17148/IJARCCE.2017.6703
Abstract: Indian agriculture field is second largest producer of wheat after china which is major backbone to Indian economy. The new innovations can be applied to this field to get new products. Manually quality prediction of wheat grain is very tedious task and it is time consuming so an automated quality prediction system is developed using mobile application and various image processing techniques. The objective of this is paper to accurately predict the quality of wheat grain without any intermediate person. Finding the quality of wheat grain is performed in MATLAB using various machine learning algorithms. Through mobile application wheat grain image is sent to server for identifying its quality. Server processes and classifies the image using various machine learning algorithms like SVM and K nearest neighbor and sends back result to mobile application which contains the quality/purity level of wheat grain and based on quality also gives the price for grain.
Keywords: Image Processing, Mobile Application, SVM, KNN.
Abstract
Improved the Efficiency of Self Optimal Clustering Technique using Particle Swarm Optimization
Mr. Gajendra Dangi, Ms. Malti Nagle, Mr. Tarique Zeya Khan
DOI: 10.17148/IJARCCE.2017.6704
Abstract: In the last decade, various methods able to detect multiple clustering solutions have been introduced. According to the survey, they can briery be categorized into methods operating on the original data-space, methods performing space transformations, and methods analysing subspace projections. The main idea is to consider each subspace as a multiple fitness constraint. For the performance evaluation of proposed algorithm used three real time dataset from UCI machine learning center. The proposed algorithm implemented in Matlab software and measures some standard parameter for the validation of proposed methodology. Our proposed method compares with two well know clustering technique such as K-means, FCM and SOC algorithm. Results shows better performance of proposed algorithm compared in existing these two algorithms.
Keywords: Clustering, GA, SOC, PSO.
Abstract
Wireless Earthquake Alarm
Sharana Basavaraj.B, Lokesh.K.S, Manasa K C, Santosh M
DOI: 10.17148/IJARCCE.2017.6705
Abstract: Earthquake happens due to the sudden release of large amount of energy from the earth�s crust. Because of this energy earth generates some destructive waves known as seismic wave. It has been found that the seismic waves include shear wave, longitudinal wave and surface wave. The longitudinal wave and shear wave are also known as P-wave and S-wave respectively. Out of all waves surface wave is the most destructive in nature, but the speed of the surface wave is slower than the other waves. The P-wave�s vibration direction and the forward motion are found to be same, which is the fastest in nature among the all waves. However, the destructive force of P-wave is found to be low. The S-wave�s vibration is perpendicular to the forward direction, whose speed is lower than P-wave but the destructive force is high.
Keywords: XBee S2, P-wave, S-wave and GSM.
Abstract
Sentiment Analysis and Rating Prediction Approaches – A survey
Dr. R.PRIYA, SNEHA. R
DOI: 10.17148/IJARCCE.2017.6706
Abstract: The vast amount of web contents in the internet arise the demand for data mining techniques. To handle this content and huge data, in recent years, researchers have proposed various approaches with the aim to discover the essential information from the web. Product or service retrieval from the huge data is became very trouble, so users reviews and ratings are considered as a major point for recommendation and filtering. But, the user�s reviews are very high and this need a lot of time to take decision from the reviews. So there is a need to summarize the reviews with finding sentiment analysis. This paper presents a survey on various Sentiment Analysis and mining techniques with different applications. From the comparative study, the new and optimal method can be detected and used for mobile app recommendation with Rating Prediction from huge set of text reviews.
Keywords: Data Mining, Text Mining, Opinion Analysis, Sentiment Analysis, Rating Prediction, Mobile App Recommendation
Abstract
A Survey on User Data Classification and Profile Identification Using Wi-Fi Data
MS D. PRIYADARSHINI, SREEDHANYA.C
DOI: 10.17148/IJARCCE.2017.6707
Abstract: Mining terrorist data and analyzing user�s profile category can be a key for different types of applications. In specific, many applications under anti-terrorism, cyber security and web security need complete user behavior and their Wi-Fi access history to improve the security by detecting abnormal web behavior. In data mining there are numerous studies with the above intentions are made a successful outcome. Classifying users profile and finding their profile category is a major task. This can be done using several data mining algorithm because the access log size is huge in size and contains more auxiliary information. Every user�s access behavior differs from one location to another location. So finding the users based on the Wi-Fi access history is important. This survey brings the overall summary of data mining techniques and tools used to analyze and classify user profiles. This helps to know the user type like abnormal, normal, abnormal-terrorist and genuine user. And this survey gives cons of existing work and this may give a new idea to empower the user profile classification and analysis framework to detect terrorist or other kinds of users.
Keywords: Data Mining, Weblog Mining, Wi-Fi Log Mining, Normal Users (NU), Abnormal Genuine Users (AGU), Abnormal Terrorist User (ATU), Access Point (AP)
Abstract
Friend’s Location Tracker
Mayank Prakash Malviya, Gowsika R, Gowthami S
DOI: 10.17148/IJARCCE.2017.6708
Abstract: Personal Tracking Systems are the tracking devices specially built up for personal information. The person takes it with him and the information of where he is presently is provided. The same system has been implemented in this mobile tracking application but various extended features that the existing system does not have. This system is GPS enabled android mobile phone whose location is tracked. Our application provides the functionality of defining the geo-fence areas as safe, risky and highly risky.
Keywords: GPS, Friend�s tracking app, geo-fence, A-GPS
Abstract
Revealing and Eliminating of Appearance Fur Blemish
Manuja M, Dr. S. Kotrappa
DOI: 10.17148/IJARCCE.2017.6709
Abstract: Facial retouching is widely used in media and entertainment industry. Professional software usually require a minimum level of user expertise to achieve the desirable results. In this present an algorithm to detect facial wrinkles/imperfection. Here believe that any such algorithm would be amenable to facial retouching applications. The detection of wrinkles/imperfections can allow these skin features to be processed differently than the surrounding skin without much user interaction. For detection, bilateral filter responses along with texture orientation field are used as image features. A bimodal Gaussian mixture model (GMM) represents distributions of Gabor features of normal skin versus skin imperfections, GMM distributions and texture orientations. An expectation-maximization algorithm then classifies skin versus skin wrinkles/imperfections. Once detected manually, wrinkles/imperfections are removed completely instead of being blended or blurred. Here it propose an exemplar-based constrained texture synthesis algorithm to inpaint irregularly shaped gaps left by the removal of detected wrinkles/imperfections. And it presents results conducted on images downloaded from the Internet to show the efficacy of our algorithms.
Keywords: Facial wrinkles, skin imperfections, Markov random field, Gaussian mixture model, bilateral features, texture orientation fields.
Abstract
A Survey on Ad Hoc On-Demand Multipath Distance Vector Routing Protocol
Niharika Srivastava, Samir Srivastava
DOI: 10.17148/IJARCCE.2017.6710
Abstract: Mobile Ad hoc Network (MANET) are wireless networks consisting of a collection of mobile nodes with no fixed infrastructure. Since mobile ad hoc networks change their topology frequently, routing is one of the challenging task. To avoid frequent route discovery and link failures, various multipath routing protocol has been proposed based on the existing single path routing protocol in ad hoc networks. Ad hoc On-demand Multipath Distance Vector (AOMDV) is one of the well-known multipath protocol which extends the prominent Ad hoc On Demand Distance Vector (AODV) to discover multiple link-disjoint paths between the source and the destination. In this paper, we survey on various protocol which improvise and modify AOMDV protocol in order to resolve various issues like route cut-off, energy efficiency and helps to achieve better performance.
Keywords: AOMDV, MANET, LOAOMDV, E-AOMDV, Routing, Multipath.
Abstract
A Review on Polar Coded Modem
Pushkar S. Gulkari
DOI: 10.17148/IJARCCE.2017.6711
Abstract: Turbo Codes are used currently for voice and data transmission in real world. Prior to them, Polar Codes were used for same purpose. Polar Codes are the first capacity achieving codes that are used for better error performance and power utilization. Due to the fact that Polar Codes has low complexity, high transmission rates can be achieved. This project proposes Polar Code based Modem to improve the Bit-Error-Rate (BER) performance and power consumption at receiver end. The experimentation will be carried on BPSK/QPSK modulated signal. The communication will be through Wi-Fi transmission Technique. It uses principle of channel polarization for encoding and Successive Cancellation (SC) Decoder for decoding. We are using raspberry pi as processor and ADC that will support the Voice/Data conversion rate of 200 KSPS speed. The range of communication is equal to Wi-Fi range of raspberry pi module respectively. This will enhance and encourage the Hot-Spot applications.
Keywords: BER, BPSK, QPSK, SC, polar codes, polar coded modem.
Abstract
ECG Signal Based Heart Disease Prediction System using DWT and SVM
Sana S. Zadawale, Savita Bakare
DOI: 10.17148/IJARCCE.2017.6712
Abstract: The prediction of heart diseases in the medical science world is quiet difficult even today. Human heart generates the electrical signal known as Electrocardiogram (ECG) signal which is used to identify the human heartbeat. It contains the valuable information about the human heart activities for identifying any abnormalities and also are used to measure the heart rate and regularity of heartbeat. In this paper, wavelet functions db8 and sym8 are used to predict the heart diseases such as bradycardia, tachycardia, first degree heart block and healthy person. In this context, the cycle P-QRS-T in the ECG signal which determines the amplitude and location of each peak using QRS complex to identify the cardiac disorder. Thus based on P-QRS-T peak values it is easy to predict the heart diseases. For feature extraction DWT (Discrete Wavelet Transform) is used and SVM (Support Vector Machine) is used for classification. The results are found to be encouraging in terms of detection heart disorder.
Keywords: Image Processing, DWT, SVM, ECG Signals.
Abstract
A Hybrid Clustering Technique Combining ACO Algorithm with K-Means
Aarti Pardeshi, Neetesh Gupta
DOI: 10.17148/IJARCCE.2017.6713
Abstract: Data mining is an extraction of knowledge from large data set. It is an evolving technology which is a direct result of the increasing use of computer databases in order to store and retrieve information effectively. Optimization is essential for a huge amount of data processing. So that optimization is a challenging issue in data mining. Ant colony optimization (ACO) is an evolutionary computation technique. Proposed methodology is the iterative process of ACO algorithm, inertia weight adjustment is usually expected to make particles have stronger global searching capability in early stage to prevent premature convergence and have stronger local search capability in latter stage to accelerate convergent speed. In other words, the inertia weight should vary nonlinearly along with the process of decreasing slowly, then rapid and then slowly again so as to attain fast convergence speed in prophase and have local search capability to a certain degree at the later stage, too. In this dissertation ACO based k-means clustering is applied to generate clusters. And provide multimodal and higher dimensional complicated optimization problems, and can accelerate convergence speed, improve optimization quality effectively in comparison to the algorithms of ACO K-means.
Keywords: data Mining, Clustering, Ant colony optimization, K-means.
Abstract
Routing the Historical Places with Ant Colony Algorithm
M.R. Altunkum, A. Gunes
DOI: 10.17148/IJARCCE.2017.6714
Abstract: Mobile phones, which were used just for speaking and texting once, have been giving their places to smart phones. By means of these technological developments, we can receive and send mail via our smart mobile phones, get notification before any earthquake via earthquake warning systems, we can get rapid routing while we move from one place to the other, we can make virtual shopping and we can find our friends by using social platforms. Istanbul hosts many domestic and foreign tourists. It is getting importance that these tourists can visit all the historical places that are unique for Istanbul in a limited time. In this study, a mobile solution called as �Quick Istanbul� developed. Being designed for devices with Android operating system, this mobile application called as �Quick Istanbul� provides solutions to the problems such as the information and visuals of historical places; the way to go to any historical places from the point where they are and the order to visit the related historical places. An application has been developed to route the historical places in the shortest way in visiting these historical places for using the time in time � saving manner by Ant Colony Algorithm.
Keywords: Ant Colony Algorithm, Routing, Historical Places, Mobile Application.
Abstract
Microblogging in Social Networks – A Survey
N. Baggyalakshmi, Dr. A. Kavitha, Dr. A. Marimuthu
DOI: 10.17148/IJARCCE.2017.6715
Abstract: Microblogging, which has emerged as a new and popular tool for short and frequent communication, is increasingly influential in today�s businesses and society. Sina-microblog, the most popular microblogging service in China, has established a large user base; however, different users have different using styles.Microblogging becomes popular and more and more people begin to use Twitter and Sina-microblog. We focus on properties of microblogging. As a social media, microblogging has social property and media property. This paper highlighted that survey responses and focuson social networking sites microblogging system, Micro-blogs change from conventional blogs in that their messages are characteristically shorter in terms of size. The research was conducted to understand the effect of the use of microblogging in social networks have on knowledge sharing. This research allows to have a better understanding of the conditions, intentions and behavior to share knowledge through the use of mircroblogs. This paper concludes by comparingmany existing process of the microblogging system in social network sites and some possible future research works to be conducted.
Keywords: Social networking sites; Microblogging.
Abstract
Energy Efficient Power Allocation, Resource Optimization for Cognitive OFDM
Aishwarya Deelip Ingawale, Mr. Shrishail B. Mule
DOI: 10.17148/IJARCCE.2017.6716
Abstract: The proposed framework researches a vitality productivity streamlining issue in subjective orthogonal frequency division multiplexing (OFDM) frameworks. The objective is to maximize the energy efficiency by adjusting the sensing duration, detection threshold, and transmit power energy to reduce energy consumption of the secondary network and the interference to the primary network. Initially, the instance of indistinguishable location limit for all subcarriers is considered. To go around the recalcitrance of the subsequent issue, another cycle structure is proposed to iteratively take care of the three decoupled sub-issues: sensing duration optimization, detection threshold optimization, and power allocation optimization. By exploiting the characteristics of each sub-issue, the proposed structure is ended up being merged. At that point, the case with individual location edge for each subcarrier is investigated. By demonstrating that the ideal location limit is the base of a quadratic condition with one unknown variable, the proposed system can be connected with minor alteration.
Keywords: cognitive radio, energy efficiency, power allocation, cognitive OFDM.
Abstract
Aspect Level Opinion Mining on Customer Reviews using Support Vector Machine
Anju Joshi, Anubhooti Papola
DOI: 10.17148/IJARCCE.2017.6717
Abstract: With the rapid growth in ecommerce, reviews for popular products on the web have grown rapidly. Customers are often forced to wade through many online reviews in order to make an informed product choice. Scanning all of these reviews would be tedious, time consuming, boring and fruitless. It would be good if these reviews could be processed automatically and customers are provided with the limited generalized information. Opinion Mining plays a major role to summarize customer reviews and make it easy for online customers to determine whether to purchase the products or not.In this paper, we performed aspect level opinion mining on customer reviews using supervised learning algorithm. The proposed work performs the aspect-level opinion mining by extracting product aspects from reviews on ecommerce site and produces a summarized report of the most frequently discussed product aspects with regards to the number of appearances in positive, negative and neutral reviews. Here, frequent item set mining is used for aspect extraction and supervised learning algorithm (Support Vector Machine) is used to identify the number of the positive, negative and neutral opinion of each extracted aspect.
Keywords: Customer Reviews, Aspect Level Opinion Mining, Product Aspect Extraction, Supervised Learning Algorithm, Frequent Itemset Mining.
Abstract
Mining Order Preserving Submatrices using FP-Growth Algorithm
Yashi Bhardwaj, Anubhooti Papola
DOI: 10.17148/IJARCCE.2017.6718
Abstract: Analysis of gene expression data is a significant research field in DNA microarray research. Data mining methods have proven to be beneficial in understanding gene function; gene regulation, cellular processes and subtypes of cells.Microarrays have made it possible to cheaply gather large gene expression datasets. Biclustering has become established as a popular method for mining patterns in these datasets. Biclustering algorithms simultaneously cluster rows and columns of the data matrix; this approach is well suited to gene expression data because genes are not related across all samples, and vice versa. In the past decade many biclustering algorithms that specifically target gene expression data have been published. However, only a few are commonly used in bioinformatics pipelines. To break down the gene expression information, biclustering is generally used to assemble the articles into different groups in light of similarity. Elements in a similar group are as comparative as could be expected under the circumstances. Order Preserving Sub Matrices (OPSM) is highly used these days to analyze DNA microarray data. In this paper, we are proposing a method to find out all the possible OPSM�s in the data. Then we find out all common subsequences (ACS), and for this we are going to use FP Growth algorithm to mine frequent sequential patterns.
Keywords: OPSM, microarray data, gene expression analysis, Apriori algorithm, FP-Growth Algorithm.
Abstract
Raspberry Pi and IoT based Family Robot
Sandesh Hathwar B, Manasa M B, Fathima Afshan, Chaithra R
DOI: 10.17148/IJARCCE.2017.6719
Abstract: In view of the present family security coefficient and poor family environment information control were complicated, family members can't access to environmental information conveniently, this paper proposed a Raspberry Pi as nuclear core processor used in the Internet of things of the family embedded robotic system. In this paper, a system is designed with an autonomous robot to sense environmental data such as temperature, air quality and store them on the cloud. The mobile robot is controlled and communicates with the cloud via a Raspberry Pi. The collected data are stored in a cloud server which could be viewed through a mobile app and can be used to create awareness about the environmental changes of the location under study. This work demonstrates a simple home automation system that allows the user to control home appliances through wireless. Lights and fans are among the appliances that can be used in this system. In this system, the controlling and monitoring the appliances can perform by using Smartphone based on Android application. Besides that, Android apps will exploit the services provided by restful API for controlling GPIO of Raspberry Pi. Raspberry Pi is used as the board controller to connect the appliances through input and output port. The Communication between the Smartphone and the Raspberry Pi board is wireless.
Keywords: Raspberry Pi, IoT, Family Robot, Smartphone, Mobile Robot.
Abstract
“Implementation of Visually Sensed Obstacles Assistance for Vision Impaired People”
Shraddha Chourasiya
DOI: 10.17148/IJARCCE.2017.6720
Abstract: Mobility of visually impaired people is restricted by their incapability to recognize their surroundings. According to the World Health Organization (WHO) in 2012, out of 7 billion global populations there were over 285 million visually impaired people and 39 million were totally blind out of which 19 million are children ( below 15 years). This means that someone in our world goes blind in every five seconds and a child in every minute. Over 90 percent blind children obtain no schooling. Recent survey source India is now became the world�s large number of blind people. The population of India has reached 120 Cr. of those 8.90 Cr. people are visually impaired. 90%of those cannot travel independently. In this paper, we present a implementation of navigation system of visually impaired people highlighting various technologies with their practical usefulness, design and working challenges and requirements of blind people. The aim of this paper is to provide a better understanding to identify important research directions in this increasingly important social area for future research.
Keywords: Navigation system, visually impaired, obstacle detection, mobility, localization, indoor navigation, outdoor navigation, GPS, IR Sensor, RGB sensor.
Abstract
An Efficient Algorithm for Throughput Maximization and Delay Minimization in Cognitive Radio Wireless Mesh Network
M. Minupriya, C. Vennila
DOI: 10.17148/IJARCCE.2017.6721
Abstract: The main issue in current wireless network is radio resource usage. The main goal of cognitive radio networks is to increase spectrum utilization. Cognitive Radio Network is the current wireless technology requirement as it solves the problem of spectrum scarcity. In cognitive radio, route has been established between source and destination such that route causes minimum interference to other nodes, maximum packet delivery ratio and minimum delay. This project presents an improved method for channel allocation in cognitive radio wireless mesh network based on game theory and path is chosen based on highest value of performance index. Performance gains in terms of end-to-end throughput and end-to-end delay are demonstrated in comparison to a distributed algorithm. The algorithm is implemented using MATLAB.
Keywords: Game theory, Channel allocation, Performance index, Cognitive Radio Network.
Abstract
A Proposal on Initial Remote User Enrollment for IVR-based Voice Authentication Systems
Umut Can Çabuk, Tuba Şenocak, Eyyüp Demir, Abdullah Çavdar
DOI: 10.17148/IJARCCE.2017.6722
Abstract: In the last decade, Interactive Voice Response (IVR) systems gained popularity among customer care, phone banking and many other commercial services. It helps to reduce conversation and dialing overheads, guides customers and automates call forwardings. On the other hand, many sensitive phone and online services, including banking operations and e-government applications, require strict and accurate user/customer authentication schemes. Although not being preferred so far, with regards to the recent developments on the voice recognition techniques, IVR emerges as a brilliant solution for authentication, too. When using IVR for voice authentication, all potential users must be enrolled and voiceprints (records) must be collected prior to start of the service. However, for scenarios where users are located in geographically distant places, it is very hard, if not impossible, to gather all the users in enrollment offices. So, this initial enrollment process should better be done remotely. In this study, we come up with a systematic method that allows institutions to enroll their users and record their voiceprints remotely, without compromising reliability of further authentication.
Keywords: Voice authentication, voice recognition, IVR, remote user enrollment, e-voting.
Abstract
“Implementation and Comparative Analysis of PTP in Network Security for Malicious Misbehavior Activity Detection”
Tejaswini S. Akulwar, P. S. Kulkarni
DOI: 10.17148/IJARCCE.2017.6723
Abstract: A PTP approach in network security for misbehavior detection system present a method for detecting malicious misbehavior activity within networks. Along with the detection, it also blocks the malicious system within the network and adds it to Blacklist. Malicious node defined as a compromised machine within the network that performs the task provided by i.e. it does not forward the legitimate message to another node in the network or sends some other message to a neighbor node. This system is based on Probabilistic threat propagation. This scheme is used in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) considers the task of detecting malicious node in the network. Proposed System also shows the relationship between PTP and loopy belief propagation.
Keywords: PTP, Malicious, Blacklist, Probabilistic, legitimate.
Abstract
Advanced Data Peripheral Glove with Real-time Vital Health Monitoring System
Dr. G. Mahammad Gouse, Mir Abdul Samim Ansari, Shubiya Sultana, Swathi Jha, Sruthi Krishna.U
DOI: 10.17148/IJARCCE.2017.6724
Abstract: A minimal effort remote glove controller that distinguishes finger signals was created utilizing flex sensors and biosensors. The execution of the flex sensors was contrasted with that of financially accessible ones. A virtual condition was likewise made for the virtualization of the client's hand developments identified by the glove controller. Inside this virtual condition, the client characterized finger signals likewise enabled the client to control components inside the virtual condition which can stretch out to different applications including restoration and body-situated gaming. The plan and improvement of wearable biosensor frameworks for wellbeing observing has gathered bunches of consideration in established researchers and the business amid the most recent years. Predominantly persuaded by expanding human services costs and impelled by late innovative advances in little bio-sensing gadgets, savvy textiles, microelectronics, and remote interchanges, the ceaseless progress of wearable sensor-based frameworks will possibly change the fate of social insurance by empowering proactive individual wellbeing administration and omnipresent checking of a patient's wellbeing condition. These frameworks can involve different sorts of little physiological sensors, transmission modules and handling capabilities, and can along these lines encourage minimal effort wearable subtle answers for persistent throughout the day and wherever wellbeing, mental and movement status observing. The data regarding the vital health conditions of a person is extracted from the microcontroller will be displayed on the system .These results are stored in the local database. This paper endeavors to completely audit the flow of innovative work on wearable frameworks for wellbeing checking and motion location.
Keywords: Flex sensor, Processing, Arduino, Biosensor, health monitoring, wearable systems.
Abstract
Wireless Sensor Networks to Implement Smart Elevator System
Yashaswini Jogi
DOI: 10.17148/IJARCCE.2017.6725
No abstract available.
Abstract
Enterprise Resource Planning (ERP) for academic Architecture Framework using Cloud Computing
Mrs. Suvarna L. Kattimani, Miss. Wangi Kanchan Mallinath
DOI: 10.17148/IJARCCE.2017.6726
No abstract available.
Abstract
Smart Irrigation System using GSM Module
Mrs. M.S. Ghute, Mr. S. Soitkar, Mrs. K.P. Kamble
DOI: 10.17148/IJARCCE.2017.6727
No abstract available.
Abstract
A Semantic Based Accurate Answer Retrieval Technique for Plant Diseases
Johannah Jebaraj, Dr. J.G.R Sathiaseelan
DOI: 10.17148/IJARCCE.2017.6728
No abstract available.
Abstract
“The Split Multipath routing approach for reducing routing overhead and Energy Drainage in MANET”
Jaspreet Kaur, Jatinder Pal Sharma
DOI: 10.17148/IJARCCE.2017.6729
Abstract: The Mobile Adhoc network is formed of various mobile nodes. Since the nodes are free to move in direction. The data sending from source to destination causes problem as In MANET, for sending data the path is provided by the routing protocols .The routing protocol manage path for sending data in network for mobile nodes .the multiple path are provided in the network for efficient transmission.. The proposed algorithm is suitable for route recovery process. For sending data through multiple path in comparison with simple AODV protocol. The split multipath provides various route in network for transmission with the failure of any path another path will selected for transmission instead of discovery new route for transmission due balancing load on routing.The proposed algorithm for increases Packet Delivery and reduces energy consumption and routing overhead.
Keywords: Routing Overhead, Energy Drainage, SMR.
Abstract
Analogy of Traditional and Modern Optimization Techniques in Wireless Sensor Networks: A Review
Kritika Varma, Sahil Dalwal, Sonia Jhangra
DOI: 10.17148/IJARCCE.2017.6730
Abstract: WSN�S have gained their popularity slowly and steadily since decades now because of their marvelous functionality and extreme conditions they work in. All of these became possible with the efficient usage of algorithms and protocols for their designing. Because of the inventions of so many designing algorithms and protocols in past few decades for WSN�s it has become very important to choose the best of all hence calls for the concept called �optimization�. Optimization is the action of making the best or most effective use of a situation or resource .In this paper we have discussed about the concept itself ,it�s traditional approaches and it�s modern approaches as well with main emphasis on one of its most appealing method called as �meta heuristic�.
Keywords: WSN, cluster, Traditional methods, Optimization, Heuristic, Meta-heuristic.
Abstract
A Review Paper on Enrichment of Data Security by using Various Cryptographic Algorithms
Varsha Gupta, Astha Gautam, Ruchi Singh
DOI: 10.17148/IJARCCE.2017.6731
Abstract: Cloud computing has become trend in IT industry for storing, retrieving and maintaining the data over the internet. The advantage of cloud computing is easy accessing of data, reduced hardware, low maintenance and installation cost. But it is tough to preserve the data security and privacy. Thus the security has become the major issue in cloud computing because malicious user attacks the data easily by using various hacking techniques hence in this paper we discussed about various encryption algorithm and describe how encryption algorithms protects the data from intruder.
Keywords: Cloud computing, IT industry, encryption algorithms, data security and privacy.
Abstract
Recognizing Focal Liver Lesions (FLL) using Fuzzy C-means (FCM) Algorithm and Level Set Method (LSM)
Narasimharaju. Paka
DOI: 10.17148/IJARCCE.2017.6732
Abstract: Liver cancer is one of the real death factors on the planet and furthermore known as hepatic tumor; it is a disease which begins in the liver, and not from another organ which at last goes to the liver. At the end of the day, there might be tumors which begin from elsewhere and wind up in the liver - those are not (essential) liver malignancies. By chance discovered central liver sores are a typical finding and an explanation behind referral to hepatobiliary benefit. They are frequently found in patients with history of liver cirrhosis, colorectal tumor, by chance amid work up for stomach torment or in an injury setting. The medical image segmentation and tumor detection process is done by following the three significant steps. The first step is to obtain clusters utilizing Fuzzy-C-Means(FCM) algorithm. Using FCM algorithm collecting data points and indicating the centroid then collect the number of centroids in the given images. Second step is to process and section a given medical image using level set method. The third step is to calculate area of segmented image and classify type of result.
Keywords: FCM, LSM, ZLS, AUCG, AUGI.
Abstract
Open Shortest Path First (OSPF) Routing Protocol and the Use of Virtual-Links
Vishesh S, Nandan AS, Lohith J, Abhishek S, Hrishikesh M, Arjuna C Reddy
DOI: 10.17148/IJARCCE.2017.6733
Abstract: Open Shortest Path First (OSPF) routing protocol is a dynamic routing protocol which employs link-state routing and Dijkstra�s shortest path algorithm. Using LSA�s (Link State Advertisements) the router�s local routing topology is advertised to all other routers in the same OSPF area. OSPF employs a hierarchical network design using Areas. Area 0 is called the backbone and other areas are connected to the backbone area or area 0 using virtual-Links. Hierarchical network architecture has two major advantages. Firstly, the router does not have detailed information about network topology outside of its area, which Thereby reduces the size of its database and helps in fast convergence. Secondly, there is systematic grouping and communication when the network is subdivided into areas, which is a logical collection of OSPF network, routers and links that have the same area identification. Troubleshooting is made easier. In this paper we explain in detail, the connection of other OSPF areas to the backbone area or area 0 using virtual-Links. We connect area 10 to area 0 via virtual-link. Also, a virtual-Link can be used to connect to the backbone through non-backbone area. The area through which a virtual-link is configured is known as the transit area (which will never be a stub area) and it consists of full routing information (should and must).
Keywords: Open Shortest Path First (OSPF) routing protocol, link-state routing, Dijkstra�s shortest path algorithm, LSA�s, OSPF area, virtual-Link and transit area.
Abstract
Cloud Data Security and Malware Detection Techniques – A survey
Mrs. P. Sundari B.E, M.C.A., M. Phil., Ms. V. Vidhya
DOI: 10.17148/IJARCCE.2017.6734
Abstract: Data outsourcing on cloud is emerging as a research area with different tools and techniques for malware detection in cloud. Data security is becoming one of the major concerns of cloud data owners. Cloud data servers use both internal and external methods to examine the outsourced data and are concerned with developing methods to explore the unique types of techniques for secure data computing. To achieve the high security on outsourced data numerous techniques were used. These tools provide various benefits for the secure data outsourcing and data verification over cloud environment. This survey focuses on the various tools and techniques used for cloud data verification and finally provide an outline to overcome the problems of those techniques.
Keywords: Cloud computing, Data security, Integrity verification, Public auditing, Privacy. Malware detection, Signature schemes, SAAS.
Abstract
Balanced Clustering in Mobile Adhoc Network using Conceded Cluster Head Node
Pooja Kumari, Gurpreet Kaur
DOI: 10.17148/IJARCCE.2017.6735
Abstract: Mobile ad-hoc network (MANETs) the network connectivity is not provided by base station. A very less infrastructure is required for MANET and it is self-configured network. The utilization of energy and stability are problem in MANET. The MANET has many disadvantages when it is used in large scale operation due to which the usage of resources increases and performance goes down. To perform better in large scale environment the clustering is proposed. In clustering the mobile node is grouped within range and one mobile node is elected as cluster head which is responsible for transmission in cluster. The various clustering algorithm are proposed for efficient transmission but dynamic behaviour of MANET, network division is difficult into cluster and cluster head election/selection operation. The conceded node cluster head for balance clustering in mobile adhoc network is proposed by calculation of energy and speed of mobile node cluster head is selected for efficient transmission.
Keywords: MANET, CH, CCH, Primitive node.
Abstract
Analysis of Path Loss through the Partitions in Indoor Propagation
Saw Mon Yee Aung, Myo Myint Maw
DOI: 10.17148/IJARCCE.2017.6736
Abstract: The indoor propagation modelling is dependent on the types of building layout designs and construction materials. The multiwall and multifloor (MWF) model operating at 2.4 GHz is applied to analyse the prediction of the received signal strength indicator (RSSI) and path loss values due to the effects of floors and walls. The experiments were measured in four corridors through multiple floors and the consecutive rooms through multiple walls with different positions of transmitter and receiver for multifloored building of Mandalay Technological University. In this research, the proposed MWF model has been evaluated based on the existing MWF model which includes the penetration loss through the brick and glass walls based on the Fresnel Transmission Coefficient (FTC). These coefficients are considered dependent on the different heights of the transmitter and receiver, the distance between the walls, the widths of the room and the types of the walls. According to the comparison of the experimental, theoretical and evaluated results, the differences of the path loss values between the evaluated and theoretical results are at least 2 dB at 5 m, 15 m and at most 7 dB at 10 m, 20 m. Therefore, the path loss values through two floors are more increased than the path loss values in other situations which are same floor and through one floor due to the partitions in multifloored building.
Keywords: Brick and Glass Walls, Indoor Propagation, Multifloored Building, Multiwall and Multifloor Model, Path Loss.
Abstract
Detection of Salient Object in a Static Image
K.P. Kamble, M.S. Ghute, Mohsina Anjum
DOI: 10.17148/IJARCCE.2017.6737
Abstract: To use the human visual attention concept to maximum benefit in the domain of image processing and thus extract important or the most prominent object in a static image. The research up till now in this area has been limited to indicating just the Focus of Attention (FOA) and not the entire region of interest. The salient object detection problem for static images is used to formulate salient object detection as one which separates a salient object from the background. In this paper a bottom up approach to compute the saliency map analogous to one calculated by human brain. The mathematical model is prepared, based on study of anatomy of physiology of visual system primates. Low level features are extracted based on color, contrast and intensity. After normalization and linear combination, a master map or a saliency map is computed to represent the saliency of each image pixel. Finally, the image is segmented out from the background. About 30 images are selected from a large database of images from Microsoft Asia which contains a salient object or a distinctive foreground object.
Keywords: salient object, static image, FOA, normalization, segmentation.
Abstract
Survey on Backup Recovery Issues and the Existing Solutions in Cloud Computing
S. Aarthi MCA., M.Phil, R. Thamari Selvi M. Sc., MCA., M.Phil, Net.,
DOI: 10.17148/IJARCCE.2017.6738
Abstract: Cloud computing provides various kinds of services to its users. Storage-as-a-service is one of the services provided by cloud infrastructure in which large amount of electronic data is stored in cloud. As valuable and important data of enterprises are stored at a remote location on cloud we must be assured that our data is safe and be available at any time. In situations like Flood, Fire, Earthquakes or any hardware malfunction or any accidental deletion our data may no longer remain available. To maintain the data safety there must be some data backup techniques for cloud platform to recover valuable and important data efficiently in such situations mentioned above. This paper provides a review on various backup techniques used for cloud computing platform.
Keywords: Cloud computing, security issues, backup, threats, risks.
Abstract
A Comparative Study of Heuristics for Different Cloud Computing Scheduling Algorithm
R. Ganesan, Dr. S. Ravichandran Ph.D
DOI: 10.17148/IJARCCE.2017.6739
Abstract: Cloud computing has gained popularity in recent times. Cloud computing is internet based computing, whereby shared resources, software and information are provided to computers and other devices on demand, like a public utility. Cloud computing is technology that uses the internet and central remote servers to maintain data and applications. This technology allows consumers and businesses to use application without installation and access their personal files at any computer with internet access. The main aim of my work is to study various problems, issues and types of scheduling algorithms for cloud workflows as well as on designing new workflow algorithms for cloud Workflow management system. The algorithms are compared with each other on the basis of parameters like Total execution time, Execution time for algorithm, Estimated execution time. Experimental results generated via simulation shown that Algorithm 2 is much better than Algorithm 1, as it reduced makes pan time.
Keywords: Cloud Computing, Min Min Algorithm, Max min Algorithm, FCFS Algorithm, Scheduling Algorithm.
Abstract
License Plate Image Recognition from Moving Vehicles using Kernel Estimation Method
R. Nandhini, Prof. M. Jothi
DOI: 10.17148/IJARCCE.2017.6740
Abstract: As a vehicle license plate identification is only found in the event of an accident or over speed involving key vehicle key accident escape. However, the instantaneous overload of the vehicle captured by the surveillance camera is often blurred due to the rapid movement, which is even unrecognizable by the person. Observation of the image of the plaque is generally a low resolution, suffered serious loss of the surrounding edge information, constitute a blinding to blur the existing method of a huge challenge. The resulting fuzzy motion blur can be viewed as a uniform linear convolution and parametric angle and length. In this paper, we present a new scheme based on the number of deficiencies to determine the core ambiguity. By analyzing several coefficients representing the restored image, we judge that the core angle corresponds to the angle of the real movement of the core when the image based on the restoration is not representative. Then, the core length of the Radon transform of the Fourier transform is estimated. Our program can handle fine motion blur, even though the board is human unrecognizable. We evaluate our focus on real-world images and solve the blind image with various algorithms. The experimental results show that the advantages of our proposed method are robust and robust.
Keywords: Blur, Kernel, license plate, restoration, vehicle.
Abstract
Parametric Real Face Images Detection using Multiple Classifiers
H. Alebeed, M. Osman
DOI: 10.17148/IJARCCE.2017.6741
Abstract: To discriminate between real genuine face and impostor printed face sample has been an important field in biometric authentication researches, recently researches were done on this particular field to improve protection on biometric systems. In this paper software-based approach is presented based on image quality assessments (IQA) to discriminate real genuine face images from impostor samples, a liveness assessment method is added to the present system to ensure friendly use, processing speed, and non-intrusive biometric system. The proposed method uses 15 image quality features to decrease the level of complexity and make the system applicable for real-time applications. The experimental results achieved from this implemented work on an available dataset generates a high degree of positive detection compared to other existing methods and that the 15 image quality measures are efficient in classifying real faces from printed impostor samples. There are some useful information�s retrieved from real images using IQA that makes the system capable enough to discriminate them from printed traits, the implemented approach uses 15 classification methods to ensure the efficiency of our introduced work.
Keywords: Genuine face, biometric authentication, IQA, non-intrusive biometric, quality features.
Abstract
Border Gateway Protocol- Implementation
Vishesh S, Dewarsh Diwakar Joshi, Deepthi Rao K, Manish K Yadava, Meghashree K, Eshwar S Sastry
DOI: 10.17148/IJARCCE.2017.6742
Abstract: An Interior Gateway Protocol (IGP) is used or configured on routers belonging to a single Autonomous System (AS). An Autonomous System (AS) is a collection of routers, whose prefixes and router policies are under common administrative control. IGPs like OSPF, RIPv1 and v2, EIGRP etc� are configured within an AS. But the internet is a collection of interconnected Autonomous Systems (ASs). BGP (Border Gateway Protocol) which is an Exterior Gateway Protocol (EGP) was built to route between AS�s. BGP is considered to be a �Path Vector� routing protocol unlike IGP�s which follow distance vector or Link-State routing protocols. In this paper we connect two or more Autonomous Systems using EBGP between the border routers. Before establishing BGP connection the routers within the AS must be configured with IGP such as OSPF. We also configure IBGP within the Autonomous System and eventually differentiate between EBGP and IBGP. The concept of synchronization is practically implemented and explained. We also stress on establishment of BGP neighborship or BGP Peers (IBGP and EBGP peers). BGP peer messages like OPEN, KEEPALIVE, UPDATE and NOTIFICATION messages are explained in brief.
Keywords: Interior Gateway Protocol (IGP), Exterior Gateway Protocol (EGP), OPEN, KEEPALIVE, UPDATE and NOTIFICATION messages.
Abstract
Ranking Web Pages using Ant Rank and Bee Colony Algorithm
M. Beulah Rani, B. Sujata, M. Priyanka
DOI: 10.17148/IJARCCE.2017.6743
Abstract: Page rank plays an important role in displaying results list. Many factors are considered to assign rank for web pages. In traditional page ranking web page references for high weight, low quality and there by increases in its position of ranking. Page Rank is what some search engines are used to find the priority of a web page. It's one of many factors used to determine which pages appear in search results. The reason for this is people prefer to link to relevant content and pages with more links to them are usually better resources than pages with inactive links. Ranking the page works by counting the number and quality of links to a page to roughly estimate the importance of the website. The underneath assumption is that more important websites are likely to receive more links from other websites. This phenomenon of one page referring another page is called as Referential Concept of web pages. This Referential Concept of web pages results in hindering the retrieval of more relevant web pages. There is depiction that there is more relevant information available on the web. To achieve best results in displaying proper results this paper is implemented upon using Ant Rank and Bees Colony Algorithms.
Keywords: Page rank, Ant rank, ant colony, bee colony.
Abstract
Effect of Changes in Implementation of LTE-U Application in UDP and TCP/IP Protocol
Divya Kumar Gupta, Gajendra Sujediya
DOI: 10.17148/IJARCCE.2017.6744
Abstract: The demand of internet is rising in exponential manner and it will increase more as advent of internet of things. With respect to demand the cost of running services will become high. So as to decrease the operational cost and traffic among different subscribers, the sharing will be a last option in order to reduce traffic and demand. In this paper there is sharing of LTE bands with Wi-Fi in order to reduce the traffic and increase the throughput of system. All the calculation are undergo through ns3 simulator. This paper also brings out the application of LTE bands using unlicensed with Wi-Fi bands by implementing it as FTP model in TCP model. The quantity and quality of licensed and unlicensed network differ from each other in an abnormal way. The demand of future is to use fast and safe internet in a cheap way. For this, various industries are trying to adapt LTE-U so that cheap and highly access Internet will be provided to users. This paper involves the application of LTE-U with Wi-Fi and analyzes the effects on UDP and TCP protocols.
Keywords: LTE-U, FTP, SDL, Unlicensed Spectrum, UDP, TCP.
Abstract
Performance Analysis of Patch and PIFA Antenna for WCS and SDR Applications
Anjali, Amrit Kaur
DOI: 10.17148/IJARCCE.2017.6745
Abstract: The performance analysis of Patch antenna and PIFA (Planar Inverted F Antenna) for operating frequency of 2.4 GHz is presented in this paper. The proposed antenna structure covers WCS (Wireless Communications Service- 2.305-2.32 GHz and 2.345-2.36 GHz) and SDR (Satellite Digital Radio- 2.32-2.325 GHz) bands. The design steps and the detailed dimensions for the antenna structures are discussed. The results for return loss and VSWR are simulated with the help of Ansoft HFSS v13.0. The comparison of Patch antenna and PIFA antenna in terms of return loss is also discussed.
Keywords: HFSS, PIFA, SDR, WCS.
Abstract
Part Based Image Representation for Find-Grained Category Detection
V. Saranya, Prof. M. Jothi
DOI: 10.17148/IJARCCE.2017.6746
Abstract: In this work, propose a system that can be sorted easily with fine-grained images. Do not use any comment objects / parts (weak supervisors) during training or testing, but only the training images of class labels. Sorting fine-grained target images for classification, only subtle differences between objects (e.g. dog's two breeds that look). Most of the existing works rely on the detector items / components to construct the correspondence between the parts of the object, At the very least, you need to train the exact annotation object or part of the object in the image. It points out the need for expensive items to prevent the widespread use of these methods. Instead, we propose to generate useful parts for the proposed size of the proposed component from the object, choose the recommended useful parts and the overall image representation for the calculation of the classification. This is specifically designed for classification fine-grained supervision because it has proven useful to play a key role in dependent works, but the exact detector is difficult to obtain part of the task. With Delegate suggestions can detect and visualize key parts (more discernible) Different types of object images. In the experiment, the proposed method of weak supervision to achieve a considerable or relatively weak advanced control method is more accurate, most of the existing methods Comments on the dependency of the three groups of challenging data. Its success shows that it is not always necessary to learn the expensive detector items / parts fine-grained image classification.
Keywords: classification, fine-grained, image, widespread, visualize key.
Abstract
Distributed Cloud Data Storage using Fuzzy Authorization Framework
A.A. Arulprabha, K.M. Padmapriya
DOI: 10.17148/IJARCCE.2017.6747
Abstract: Database is a service paradigm poses several research challenges in terms of security and cost evaluation from a tenant�s point of view. The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. A novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the tradeoff between the required data confidentiality level and the flexibility of the cloud database structures at design time. This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. The paper demonstrates the feasibility and performance of the proposed solution through a software prototype. Mobile cloud computing provides a novel ecommerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in open environment, it is important to provide secure keys to share the data for developing cloud computing applications. To ensure a correctness of users� data in the cloud, we propose an effective and secure distributed model including a Self-Proxy Server (SPS) with self-created algorithm. The model resolves a communication bottleneck due to re-encryption of a shared data in the cloud whenever users are revoked. It offers to reduce security risks and protect their resources because a distributed SPS dynamically interacts with Key Manager (KM) when the mobile users take on cloud services. To avoid this type of the situation fuzzy authorization uses the technique if the entered password partially matches the user can get the video that is the fake video. After that hacker stop retrying the username and the password. The original data is taken after real password is given by the real user.
Keywords: Cloud Database, Adaptive Encryption, SQL operations, Metadata, Distributed SQL operation, Multi key Distribution, Self Proxy Server.
Abstract
Analysis of Classification Techniques for Intrusion Detection System
Divya M S, Vinutha H P
DOI: 10.17148/IJARCCE.2017.6748
Abstract: Duplicate and unimportant features exist in dataset will cause a long-term problem in classification of network traffic. The existing duplicate features not only reduce the processing speed of classification but they also prevent the classifier from classifying the data, and also losses the trust of providing accurate decisions especially when working with huge collection of data. By considering all these drawbacks a novel system is designed, this system uses two algorithms FMIFS and FLCFS for feature selection and for the classification of data. Here KDD Cup 99 dataset is used for selecting and classifying of dataset. The LS-SVM classification algorithm is used by the two algorithms and it is evaluated for KDD dataset. The evaluation result shows the most relevant features for classification of the dataset and classifies the dataset by sorting out normal data and attacked data.
Keywords: Intrusion Detection System, FMIFS, FLCFS, Feature Selection, Classification, LS-SVM.
Abstract
Towards Segmenting Stereo videos in foreground Propagation in Cinematographic Optimization
Mr. P. Thangaraju, M.Sc., MCA., M.Phil., PGDCA., Mrs. R. Nanthini., M.Sc., B.Ed.,
DOI: 10.17148/IJARCCE.2017.6749
Abstract: A main encounter in video segmentation is that the foreground object may move rapidly in the scene at the same time its presence and shape changes over time. While pairwise potentials used in graph-based algorithms support smooth labels between neighboring (super) pixels in space and time, they proposal only a myopic view of consistency and can be misled by inter-frame optical flow errors. We propose a higher order supervoxel label consistency potential for semi-supervised foreground segmentation. Given an initial frame with manual annotation for the foreground object, our approach propagates the foreground region through time, leveraging bottom-up supervoxels to guide its evaluations towards long-range coherent regions. We endorse our approach on three challenging datasets and complete state-of-the-art results.
Keywords: video segmentation, foreground region, semi-supervised foreground segmentation, coherent regions.
Abstract
Regression Analysis with Cloud computing Technology in the field of Agriculture
Mrs. V. Ramya, MCA., Mr. K. Mohamed Amanullah, MCA., M.Phil.,
DOI: 10.17148/IJARCCE.2017.6750
Abstract: Nowadays, in India transformation tools are necessary in agronomic field sector to increase the economy. Internet of Things (IoT) is the efficient way to growth the productivity of agriculture. Development in internet has leads to the growth in data which results in emergence of cloud and IoT environment. In recent decades, pulling out of useful knowledge based content and recognizing the patterns in dataset are understood. Meaningful data need to be investigate and applied various self-restraints for identifying the significant features in agricultural domain. Understanding of suitable techniques in cloud computing and IoT requires for examining large datasets. The aim of this research is to build an information system for educating interaction between farmer and purchaser. The focus of this paper is to analyze and use of agri-cloud and IoT particularly by using Multiple Linear Regression (MLR) analysis to predict the crop manufacture to have decision making process easier.
Keywords: Regression analysis, Internet of Things (IoT), cloud computing.
Abstract
Multilevel Security for Template Protection using RLE-RSA Algorithm
Gagandeep Kaur Bassi, Jatinder Pal Singh Raina
DOI: 10.17148/IJARCCE.2017.6751
Abstract: The behavioral characteristics are used to identify the person in biometric recognition systems. Every person has different traits which are used to authenticate their identity. Similarly, In the IRIS recognition system, the human eye is used to identify the identity of the individual. But these systems are suffering from the problems of security which is a big concern in recognition. Several mechanisms have been developed by different researchers in last few years that provide protection to the IRIS template. Likewise, a new method has proposed in this thesis, which is acquired by combining the RLE and RSA algorithm together. The RLE provides compression of data and RSA provides encryption of images for security. The proposed method provides high level of security by compressing the template, encrypting the template with RSA and then acquired template is hiding under another cover image. With the application of the proposed technique, template becomes more protected and secure. In order to conclude the efficiency of the proposed approach, experimental analysis has done in terms of different performance parameters such as SSIM, PSNR, MSE, BER and correlation coefficient. The approach has been compared with the traditional LSB technique over 10 different images. From the results analysis, it has been concluded that the proposed RLE-RSA algorithm outperforms the traditional approach regarding efficiency, proficiency and security.
Keywords: Template Protection, RLE algorithm, RSA algorithm, Correlation Coefficient, PSNR.
Abstract
Dynamic Channel Allocation for Cluster Based Mobile Ad Hoc Networks
V. Chitra, Dr. S. Adaekalavan
DOI: 10.17148/IJARCCE.2017.6752
Abstract: Mobile ad hoc networks (MANETs) are becoming increasingly common, and typical network loads considered for MANETs are increasing as applications evolve. This, in turn, increases the importance of bandwidth efficiency while maintaining tight requirements on energy consumption delay and jitter. Coordinated channel access protocols have been shown to be well suited for highly loaded MANETs under uniform load distributions. However, these protocols are in general not as well suited for non-uniform load distributions as uncoordinated channel access protocols due to the lack of on-demand dynamic channel allocation mechanisms that exist in infrastructure based coordinated protocols. In this paper, we present a lightweight dynamic channel allocation mechanism and a cooperative load balancing strategy that are applicable to cluster based MANETs to address this problem. We present protocols that utilize these mechanisms to improve performance in terms of throughput, energy consumption and inter-packet delay variation (IPDV). Through extensive simulations we show that both dynamic channel allocation and cooperative load balancing improve the bandwidth efficiency under non-uniform load distributions compared to protocols that do not use these mechanisms.
Keywords: Band width, Dynamic Allocation, IPDB, Protocol, MANETs.
Abstract
Routing Challenges in Wireless Sensor Network: A Review
Navjot Kaur, Jatinder Kumar
DOI: 10.17148/IJARCCE.2017.6753
Abstract: The wireless sensor network consists of sensor network. The various applications in today world are providing information with the help of wireless sensor network. The wireless sensor network is auto configurable and is useful on different locations where it difficult to implement applications. The wireless senor network is important for today�s world it is beneficial for many industries military, weather forecasting the review on various routing protocol is discussed.
Keywords: WSN, TWSN, CH.
Abstract
Prediction of Skin Diseases using Data Mining Techniques
S. Reena Parvin
DOI: 10.17148/IJARCCE.2017.6754
Abstract: Skin Disease prediction has become important in a variety of applications such as health insurance, tailored health communication and public health. Due to the costs for dermatologists to monitor every patient, there is a need for an computerized system to evaluate a patient�s risk of melanoma using images of their skin lesions captured using a standard digital camera. The traditional diagnosis technique aims at improving the quality of existing diagnostic systems by proposing advanced feature extraction and classification methods. In the Proposed method, 40 digital images collected from AOCD unit database and another 40 digital images from MIT unit database. These images are subjected to pre-processing the images using Gaussian Filter technique. Then these images are undergone image segmentation using K-means clustering algorithm to partitioning the disease affected area and non-affected area. Feature extraction is performed using Grey Level Co-occurrence Matrix (GLCM) for examining texture which gave the statistical parameters, for better classification efficiency. The multi-SVM (Support Vector Machine) classifier is supervised learning models with associated algorithms that analyze database images for classification analysis. The diagnosis system involves two stages of process such as training and testing, the Features values of the training data set are compared to the testing data set of each type. Finally the performance analysis compared three algorithms such as Multi-SVM classifier, K-NN and Na�ve Bayesian classifier. The overall accuracy of using Multi-SVM classifier is 97% to 98%.
Keywords: Skin disease prediction, GLCM, Gaussian Filter, Multi SVM, K-NN, Na�ve Bayesian, K-means.
Abstract
Privacy Preserving Back-Propagation Neural Network Data Security in Client and Server
C. Amirtha Rani
DOI: 10.17148/IJARCCE.2017.6755
Abstract: Now-a-days there is lots of security that promises to provide excellent security, but in spite of that many of them fail to deliver when it comes to real time testing. Each authorized party easily identified the data and message. We use the many ways needed to prevent. So encrypt all data and message only use the authority person knowing the data and message. One or more persons communicate and the computation of participants. So secure the data and message very secretly. To prevent use neural network methods every data give the secret key and give some weighted also when it sends the message to the server. In this paper, we present a privacy preserving algorithm for the neural network learning, when the dataset in arbitrary partitioned between the two parties. We show that our algorithm in very secure and leak no knowledge about the other part�s data. We demonstrate the efficiency of our algorithm by experiment on real world data. The computation and communication costs on each party minimal and independent to the number of participants. To support flexible operations over cipher texts, Numerical analysis and experiments on commodity show that our scheme is secure, efficient and accurate. The neural networks are distributed between two parties, which are quite common nowadays. Existing cryptographic approaches such as secure scalar product protocol provide a secure way for neural network learning when the training data set is vertically partitioned. In this algorithm after each round of training both the parties just hold the random shares of weights and not the exact weights, this guarantees more security and privacy against the intrusion by the other party.
Keywords: Back Propagation, Neural network, Data Security, Client and Server.
Abstract
BAN: intra-BAN and inter-BAN
Vishesh S, Moulana Izhar Ahmed, Karthik Srinivas, Srikrishna BS, Sukruth L Babu, Veeresh Kumar U, Sachin R
DOI: 10.17148/IJARCCE.2017.6756
Abstract: Body Area Networking (BAN) is a field of networking in which communication takes place between different sensors or network elements or other electronic equipment at the nodes within the body called intra-BAN and between two or more bodies called inter-body BAN. The movement of data or information or packets between nodes is mainly wireless or through the length, breadth and height of the body (this is still a challenge as the human body is a very good conductor of electricity and acts as a short between an electronic component and ground). There are many other types of networks like PAN (Personal Area Network), LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network) and global network. The above classification is mainly based on the scale of distance or area (Spatial scope). Body Area Network (BAN) is a special type of network used to facilitate communication within a single body/autonomous body or between two or more autonomous human bodies. BAN is a new type of network architecture made feasible by novel advances on lightweight, small size, ultra-low-power, and intelligent monitoring wearable sensors. In this paper we have made serious efforts to simulate both inter-BAN and intra-BAN using wireless technologies, Routing protocols and Network Simulator tools (NS tools). Each human body is considered to be an Autonomous System as compared to another body with its own autonomous BAN. In this paper we have made successful attempts to connect logically divided areas together using Virtual-Links thereby enabling packet transmission between two autonomous areas running their own IGP and using wireless protocols like Bluetooth, IR or Wi-Fi. We have also carried out experiments/trails to make both intra-BAN and inter-BAN secure and data encrypted.
Keywords: PAN (Personal Area Network), LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network) and global network, Network Simulator tools, intra-BAN, inter-BAN and wireless.
Abstract
Develop Dynamic File Block Level Operations of Cloud Computing Systems
R. Obulakonda Reddy, R. Nagarjuna Reddy, M. Radha, N. Sree Vani, B. Srinivasulu
DOI: 10.17148/IJARCCE.2017.6757
Abstract: Now a day�s many organizations are store their data in cloud computing systems, so organizations are opting for outsourcing data to remote cloud service providers (CSPs). Particularly little associations are not having that much cash for set up servers, so their exclusive open door is CSPs for putting away information in cloud. The CSP (Cloud Service Provider) give distributed storage to clients by lease premise and gather lease in light of information estimate. The Existing PDP (Provable Data Possession) conspire concentrate just on static information, once information was put away in cloud the clients won't change. The proposed Dynamic File Block level operations of Cloud Computing Systems show utilizes a Map-Based Provable Multi-Copy Dynamic Data Possession (MB-PMDDP) strategy, so it concentrate on unique information. It underpins record piece operations, for example, inclusion, adjustment, erase and annex erase at powerfully.
Keywords: Cloud service providers, provable data possession, MB-PMDDP.
Abstract
An Overview and Analysis of the higher order QAM Modulation Scheme over Rayleigh Fading Channel with RSBC, Alamouti STBC and Interleaving for Wireless Communication Applications
Mr. Girish Kalse, Mr. Vijaykumar Sharma
DOI: 10.17148/IJARCCE.2017.6758
Abstract: The aim of the paper is to analyze the performance under various schemes and coding techniques for one of the most widely used modulation technique for wireless & mobile communication applications i.e. QAM (Quadrature Amplitude Modulation) in Rayleigh fading channel. First of all, we observe and analyze the effect of Rayleigh fading on the communication channel using QAM (Quadrature Amplitude Modulation) technique that can provide the higher rate of transmission without any incremental changes or variation in the bandwidth of the utilizing wireless communication systems. Whereas the performance of any modulation technique is measured on the basis of or in terms of its bit error probability therefore we find the performance of QAM in fading channel in terms of its bit error probability then we will try to improve & observe the effect on the value of bit error rate for the QAM technique by employing various schemes and coding techniques like Reed-Soloman block coding, interleaving and almouti STBC. In order to overcome the fading which is one of the major problems in the wireless communications, a diversity modulation technique is used for the efficient transfer of message signals whereas for error detection and correction the Reed-Solomon codes are used and the error rate is improved by the interleaver.
Keywords: Bit error probability, QAM, STBC, and Interleaver.
Abstract
A Study of aspect level opinion mining of Online Customer Reviews using Apriori Algorithm
V. Jayashree, M. Muthuraman
DOI: 10.17148/IJARCCE.2017.6759
Abstract: This work focuses on how to improve the level of online customer reviews. First, we recommended generating a new model of the subject this model combines the aspect / emotional (JAS), common aspects and emotional vocabulary of the online customer reviews related aspects. The vocabulary of the sensory dependency refers to the aspect of the particular aspect of the view, with respect to the particular aspect of their sensual sense of appearance. And then applied vocabulary dependent mood appearance to extract some of the task, opinions mining aspects of the level, including implicit aspects of identification, mining views based on emotional aspects and classification summary level. The experimental result shows that the model of JAS is dependent on the appearance of the dictionary and the validity of the actual value of the vocabulary applied to these actual tasks.
Keywords: Opinion mining, Aspect, sentiment analysis, SentiWordNet, Reviews.
Abstract
A Survey on Visual Hashing and Indexing Techniques for Content-Based Image Retrieval
Mrs. G. Maheshwari, Prajitha.P
DOI: 10.17148/IJARCCE.2017.6760
Abstract: Interest in the potential data and multimedia content retrieval has increased enormously over the last few years. Users in many professional fields are exploiting the opportunities offered by the ability to access and manipulate remotely-stored data�s in all kinds of new and exciting ways. Visual data hashing and indexing is an important technique for content based image and information retrieval, which is a part of information retrieval system. Content-based image retrieval (CBIR) systems are very effective in many types of applications. Despite extensive research efforts for decades, how to discover and incorporate semantic information of images still poses a formidable challenge to real-world CBIR systems. In this paper, we surveys the tools and techniques are used to perform content based image and information retrieval.
Keywords: Content-based Image Retrieval, Information Retrieval, Data Mining, Semantics Modeling, Hashing, Indexing.
Abstract
Access Control List: Route-Filtering and Traffic Control
Vishesh S, Tejas C, Tejaswini V, Apoorva M Gowda, Siddarth S Bellur, Samarth S Kulkarni
DOI: 10.17148/IJARCCE.2017.6761
Abstract: The third layer of the Open System Interconnect (OSI) reference model is the Network Layer. The Network layer handles traffic, addressing and accounting. The network Layer controls the operation of the subnet, deciding which physical path the data should take based on the network conditions, priority of service and other factors. It translates logical addresses, or names into physical address. A router is a layer 3 device and is a networking device that forwards data packets between computer networks. A network is configured with routing protocols- static or dynamic routing because these routing protocols define/specify how the communication packets are forwarded and the route selection process (optimum route selection). In this paper we have considered a network topology in which a certain part of the network is configured with OSPF protocol and enclosed within area 0 and the other part, with routers configured with RIP, version 2. Route redistribution is carried out at the boundary routers of the two sections of the network. Since, OSPF and RIP v2 are entirely different routing protocols; route redistribution is done on the boundary routers belonging to both the sections. Route redistribution [1] allows routes from one routing protocol to be advertised into another routing protocol. Finally, in this paper we configure Access Control List (ACL) on the network. ACL also called Access-List can be configured for all routed network protocols to filter the packets of those protocols as the packets pass through a router. Main function of ACL is to filter network traffic by controlling whether router packets are forwarded or blocked at the router�s interfaces and also provide security in the network on which it is configured.
Keywords: Open System Interconnect (OSI) reference model, traffic, addressing and accounting, Access Control List (ACL), packets are forwarded or blocked at the router�s interfaces and also provide security in the network.
Abstract
Smart ATM Access and Security System using IRIS Recognition
Madhura Raju Lakhe, Prof. S.S. Savkare
DOI: 10.17148/IJARCCE.2017.6762
Abstract: The main aim of this paper is to provide security for ATM Centers by using IRIS Recognition. For the traditional ATM terminal, customer recognition systems rely only on bank cards, passwords and such identity verification methods which measures are not perfect and functions are too single. For solving the bugs of traditional ones, there is need to designs new ATM terminal recognition systems to verify the IRIS of the Acc holder of the bank at ATM Center. The use of Biometric ATM�s based on IRIS recognition technology providing a safe and paperless banking environment. The iris recognition system completely eliminates the chances of fraud due to theft and duplicity of the ATM cards. This project will detect the iris of the user and allows the person to make transactions, by using matlab it detects the human IRIS and allows person for the transaction and sends the message automatically. Once we receive the OTP we need to enter that key and then it allows the transactions, plus when the attacker try to damage the ATM machine vibration detection sensors gets activated. A message is passed to the nearby police stations with the help of GSM modem and door will get lock. We can remotely monitor the user accounts for Authorized or unauthorized Access by using Internet of Things (IOT).
Keywords: IRIS recognition, One-Time Password (OTP), ATM Security, Biometric, GSM, Vibration sensor.
Abstract
Methodical Clustering Slant for Privacy Preserving Data Mining
Bharath H C, Poornima B, Ashoka K
DOI: 10.17148/IJARCCE.2017.6763
Abstract: This paper presents a clustering based k-anonymization technique to minimize the information loss while at the same time ensuring data utility. In privacy preserving data mining, anonymization based approaches have been used to preserve the privacy of an individual. However, the anonymization based approaches suffer from the issue of information loss. To minimize the information loss and ensure data quality we produce new approach called systematic clustering along with equal combination of quasi-identifier and sensitive attributes. The proposed approach first generates sub-databases by equal combination of quasi-identifier and sensitive attributes and adopts group-similar data together and then anonymizes each group individually. We also evaluate our approach empirically focusing on the information loss and execution time as vital metrics.
Keywords: quasi-identifier, sensitive attribute, sub-databases, systematic clustering, anonymization, PPDM.
Abstract
Data Security on Cloud Network using Key Policy Attribute Based Encryption
Lavanya Natarajan, Sujata Kulkarni
DOI: 10.17148/IJARCCE.2017.6764
Abstract: The advent of technology in healthcare ensures medical services to be provided more efficiently. Medical services are now provided through online assistance as well and the patients can maintain their health-related data in the cloud network. Personal health record (PHR) is deployed on the public cloud network. So, the data has to be stored on a central server which is guarded by the access control mechanism. But the data owners lose control on the data from the moment the data is stored in the server. Therefore, these systems do not fulfil the requirements of data outsourcing scheme. It is essential to ensure that the third party storing the data does not gain access to the plain data. In order to enhance security to the personal health records, attribute based encryption is used to encrypt the data before outsourcing it to the cloud. Personal health record users are divided into public and private domains. This will reduce the key management problem for owners and users. The proposed scheme will give personal health record owners full control of his/her data using Attribute based Encryption (ABE). In the proposed Key Policy Attribute Based Encryption (KP-ABE) scheme, the keys are only associated with the policy which have to be satisfied by the attributes to decrypt the data. Immense security and performance analysis based on computation time and key generation speed shows that the proposed scheme is highly efficient.
Keywords: Personal Health record, Attribute based Encryption, Key Policy Attribute Based Encryption.
Abstract
VANETs Applications, Challenges and Possible Attacks: A Survey
Abdul Quyoom, Mohd Saleem, Mudasser Nazar, Yusera Farooq Khan
DOI: 10.17148/IJARCCE.2017.6765
Abstract: Vehicular Ad hoc Network (VANET) is an emerging sub-class of MANET. Recently VANET have emerged to turn the attention of researchers in the field of wireless and mobile communications. It is distinguished from other kinds of ad hoc networks by their hybrid network architectures, node movement characteristics, challenges and new application scenarios. It cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. Intelligent transportation and active security are important applications of VANET, which need suitable vehicle-to-vehicle communication and vehicle and roadside infrastructures technology, especially routing technology. It poses many unique networking research challenges and the design of an efficient routing protocol for VANETs is very crucial. The mobility models are used during the simulation of protocols. Routing protocols are design to address challenges, which includes heterogeneous networks, random topology and high mobility of nodes. They should generate movement pattern which reflects real world behaviour of vehicles on the roads. It has a very high dynamic topology and constrained mobility which makes the traditional MANET protocols unsuitable for it. In this article, we discuss some challenges, applications and various kind of attack with respect to security principles.
Keywords: VANET, routing protocols, possible attacks, Security.
Abstract
Enhanced Fingerprinting and Trajectory Prediction for IoT Localization in Smart Buildings
Swati B. Patil, Nidhi Sharma
DOI: 10.17148/IJARCCE.2017.6766
Abstract: Location service is the primary services in smart automated systems of Internet of Things (IOT). So accurate localization has become a key issue. A novel localization utilizes the neighbor relative received signal strength(NRSS) to build the fingerprint database and adopts a Markov chain prediction model to assist positioning called as novel localization method (LNM) .In the LNM, the history data of the pedestrian�s locations are analyzed to further lower the unpredictable signal fluctuations in a smart building environment, meanwhile enabling calibration-free positioning for various devices The performance evaluation conducted in a realistic environment demonstrates superior localization performance compared with existing schemes, when the problems of device heterogeneity and WiFi signals fluctuation exist.
Keywords: Internet of Things (IOT), Novel localization method (LNM), Location Base Services (LBS).
Abstract
Identification and Verification of Person Using Hand Based Biometric Features
Neha Shivajirao Tondare, Prof. S.S. Savkare
DOI: 10.17148/IJARCCE.2017.6767
Abstract: In recent years for recognition of person no. of methods are available, out of which Biometric system becomes most reliable one .Unimodal biometric system is one type of biometric system which is widely used in different industry and organizations for authentication of purpose. Even though unimodal biometric system widely accepted for recognition purpose, it has its own limitations. Because of this it is mostly used in those organizations where middle level of security is essential. To overcome limitations of biometric system which is used single biometric traits for identification purpose, there is need of such better performed system. This can be achieved by combining results of multiple unimodal system .So, because of this combining effect, multimodal system has all characteristics of that unimodal systems from which it is build. By considering this advantage of multimodal system over unimodal system objective of proposed system is to build multimodal biometric system which has characteristics as high level accuracy, reliable results of person recognition and robust in nature. It uses finger knuckles, palm print and finger geometry as inputs (biometric traits) for authentication of person. Image of hand acquired through Image acquisition system is used in preprocessing stage to get ROI of fingers and palm. In extraction stage finger geometry and finger knuckles of ring, middle and index fingers are extracted. And also key points which represent palm print features are also extracted to get ROI of palm. KNN classifier is used for classification of purpose. To boost speed of matching process a hierarchical method is used. To get high accuracy of features AND rule fusion is used. With help of thermal and PIR sensors aliveness of person is detected to avoid spoofing in biometric system.
Keywords: Biometric system, unimodal, multimodal, palm print, finger geometry finger knuckles, KNN classifier, AND rule, ROI, Aliveness detection, PIR sensor, Thermal sensor
Abstract
Service Rating Prediction and Recommender System-A Survey
T. Sivakumar, Sneha Prakash
DOI: 10.17148/IJARCCE.2017.6768
Abstract: Recommendation systems help users with convenient access to the products and services they might be interested in the real world. Due to the needs of effective prediction and efficient recommendation, it is beneficial for the location-based services (LBS), to find out the user�s next movable location that the user might visit. So in this paper, different types of approaches used to find, predict, and analyze location based services are discussed. The service prediction based on the implicit and explicit feedback is a trending one. It is necessary to deploy those prediction and recommendation services for real-time mobile application with trajectory mapping. While considering location information�s, then the data size became huge and dynamic. Finding optimal solution to predict the rating based on the location and explicit behavior is surveyed. At last the suggestions for further process also given in this paper.
Keywords: Big data, Geographical location, Recommender systems, Web mining, social network services, Rating prediction, Predictive models, Point of Interest.
