VOLUME 6, ISSUE 6, JUNE 2017
Handwritten Character Recognition using Neural Network
Manish Kumar Sahu, Naveen Kumar Dewangan
RFID based Women Safety System with Automatic Street Light Control System
Shruthi A B, Shivanand Gowda K R, Ramachandra A C
Denoising of Additive Noise in DECT scan and MRI Image using ANW filter
Ashwini N M, Kavitha G
A New Method for Object Management in Cloud Computing Application
K Venkata Chalapathi, Hemalatha T
A Review on Trust Management in VANET
Deepa Soni, Ravindra Gupta, Varsha Namdeo
Enhancing the Network Lifetime by Deploying Mobile Sink in Wireless Sensor Networks
N. Brindha, S. Vanitha
A Secure Cloud Computing based Framework for Big Data Information management of smart Grids
Vandesh Goyal, Rishika Movva, Alekya Kunadharaju
Design of a Low Power Two Stage Operational Amplifier using MT-CMOS Technology: A New Approach
Neha Shukla
CANS Implementation using GSTEB Protocol in Wireless Sensor Network
R. Harish Kumar, M. Chandra Sekhar Rao
Home Automation using Telegram
P.N.V.S.N. Murthy, S. Tejeswara Rao, G. Mohana Rao
IoT based Monitoring and Control System for Home Automation using Prediction Algorithms
Anitha Bommana
Study on Different Image Encryption Technique
Kalyani Kadukar, Prof. R. Krishna
A Power Optimized Divide by N Prescaler Design on 50nm CMOS Process
Nityanand Urmaliya, Prof. Shravan Kumar Sable
A Study of Low Level Feature Extraction Techniques for Content based Image Retrieval Systems
Savitri Chandra, Latika Pinjarkar
Sensor Array-Architecture and Monitoring
Vishesh S, Vilas Gupta SV, Sourav HA, Saiesh R, Sahana KR, Sindhu P
Allocation of Energy Efficient Sub-Channel in Cognitive Radio Networks for Television Systems
P.N.V.S.N. Murthy, S. Vidya Sagar Appaji
Content Based Image Retrieval using Color and Shape Features
M. Arundhathi Reddy, Dr. Linganagouda Kulkarni, Dr. M. Narayana
Sender Recognition of E-mail & Email Categorization
George Philip C., Bansi R. Savaliya
A Study on High Performance Embedded Systems with Multiple Processors
Prakash H T, Dr. Srinivas M
Prediction of Heart Diseases using Artificial Intelligence
Amreen Ahmed, Prof. Shilpa Verma
Energy Efficient CO-GPS with Reduced Duty Cycle Environment Monitoring
P.D. Karale, S.B. Shinde
Review on “Energy Efficient WSN Techniques in Environmental Monitoring”
P.D. Karale, S.B. Shinde
Analysis of Mean, Standard Deviation and Global Minimum using Animal Migration Optimization
Ashish Anjana, Mr. Sachin Upadhyay
Multi hop and Multi Direction Selection Data Dissemination Technique for Road Safety in VANET
Manpreet Kaur, Navjot Bhullar
A Network-Based Asynchronous Architecture for Cryptographic Devices
Kantharaju H M, Dr. M Srinivas
Cryptanalysis of IPv6 for Secure Communication in Internet of Things
Ms. Aishwarya Ashok Akul, Prof. Mrs. Snehal Bhosale
Gravitational Search Algorithms in Data Mining: A Survey
Poonam, Saroj Ratnoo
Design 0.4v Low Power Class AB CMOS Operational Transconductance Amplifier
Aniruddha N. Bhokare, Dr. M. B. Mali
Sensing as a Service Model for Pulse Oximeter Supported by Internet of Things
Ms. Shruti Daddikar, Dr. Roshani Raut
An Effective Application and Analysis Method based on User’s Profiles in Elective Subjects
Rikeeta Mahajan, Prof. Priti Subramanium
Parallel Frequent Itemset Mining for Big Datasets using Hadoop-MapReduce Paradigm
Seema Tribhuvan, Bharti. P. Vasgi
A Comparative Performance Analysis of AODV, DSR and DSDV Protocol for Mobile Ad-hoc Networks
Sandeep Sharma, Pankaj Jagtap
A Mobile Based Crowd Management System
Wafaa M. Shalash, Aliaa Al Hazimi, Basma Al Zahrani
Distributed Vulnerability Detection, Menstruation and Measure Choice Mechanism for Zombie Detection in Cloud Computing Environment
A. Srinivas, A. Sravanthi, Shazia
A Novel Approach to Identifying the Cosine Similarity using TF-IDF
Gottapu Mohana Rao, Dr. P. Satheesh, Dr. B. Srinivas
Monitoring of Toxic Gases and Land Slide Prevention using IoT
Joshi Gunjan Shailesh, Dr. Prof. A.M. Deshmukh
Route Redistribution-A Case Study
Vishesh S, Chethan M Yadav, Nagaraj Manjunath Moger, Chiranjeevi S, Akshay Bhat, Gagan M
Enhancing Localization Accuracy and Coverage of Centroid Localization Algorithm using NS-2
Abdelhady M. Naguib
Carsharing – A Web and Mobile Application using MEAN Stack
P.V. Tergundi, Shivaratna Kumar Patil, Sumedha Inamdar, Vinayak Shinde, Vishal Bilagi
Bipolar Air Demand in Boilers using Arduino Controller
Dr. C. Esakkiappan, M.E, PhD, Anniesha J.R, Hemalatha K, Madhumathi P
MAC Implemented using TCP, UDP and HTTP Protocols in Congestion Control
Tarannum Khan, Sachin Upadhyay
A Survey of Visual Cryptographic Method for Secure Data Transmission
Dr. D. Devakumari MCA., M.Phil., PhD., K. Geetha
A Survey: Security in Patient Data Communication using Cryptographic Algorithm
Prof. Dr. R. S. Kawitkar, Nikita S. Karekar
A Survey: Digital Audio Watermark Designed Methods
Prof. Y.D. Chincholkar, Dr. S.R. Ganorkar, Shalaka Pravin Kude
Tomato Plant Disease Detection using Image Processing
Sagar Vetal, R.S. Khule
CORDIC based Architecture of FFT for Orthogonal Frequency-Division Multiplexing Receiver
Sushma. U. Bhover, Mehrunnisa .S.P
Power and Area Efficient High Speed Squaring Circuit using Vedic Mathematical Techniques
Gumpina Vakula Rani, Dr. Bhaskar Reddy
A Probabilistic Model for Object based Foreground Segmentation from Multimedia
Mr. P. Thangaraju, M.Sc., MCA, M. Phil., PGDCA, Mrs. R. Nanthini., M.Sc., B.Ed.,
Web based Clinical Data Management System
Parimal Tergundi, Prajnya Baliga, Nilam Kamble, Poonam Patil, Nikita Raval
A Machine Learning Based Approach for Early Detection of Alzheimer’s Disease by Extracting Texture and Shape Features of the Hippocampus Region from MRI Scans
Arpita Raut, Vipul Dalal
A Review on Microstrip Antennas Integrated with EBG Structure
Mrs. Kirti Varma, Prof. Atmeshkumar Patel
Advance Car Alarming System for Fatigue Detection during Driving using MATLAB
Mr. Shreyas Deshmukh, Mr. C.N. Bhoyar
Model and Fabrication of CNC Plotter Machine
Udit Pandey, Swapnil Raj Sharma
IoT Based Smart Home Automation for Windows using CoAP
Pravin Sunil Khillare, Prof. Dr. Mrs. Dipashree M. Bhalerao
Decision Support System in Corporate Intelligence
Monika Varshney, Dr. Azad Kumar Srivastava
Embedded System Development Life Cycle- An Iterative Approach
Vishesh S, Nagashree KV, Rachana BR, Poojashree AP, Rupa, Navamallika N
The NBRDETP: Neighbor Node Detection and Prediction Technique for Energy Efficient Routing with Leach Protocol in WSN
Navjot Kaur, Jatinder Kumar
Implementation of Virtual Router in User Space by Bypassing the Kernel using Snabb
Pranav Gokhale, Hrishikesh Kulkarni, Surajkumar Gunjal, Akshay Abhang
Fairness Queue for Energy Efficient Data Transmission in Wireless Sensor Network
Durga S. Nikam, Prof. M. M. Wankhade
A Systematic Literature Review on Software Reliability Estimation Model for Measuring the Effectiveness of Object Oriented Design
Surabhi Saxena, Dr. Devendra Agarwal
Key Aggregate Searchable Encryption for Group Data Sharing along with Duplication Detection on Cloud
Soniya L. Barkade, Nagaraju Bogiri
Android Application Implemented for Distance Measurement using Image Processing
Mr. Ghumare Amar Ashok, Dr. Jadhavar, Prof. Mulajkar R.M
Indoor CO2 Monitoring using Cognitive Wireless Sensor Networks
Kawaljeet Kaur, Neetu Gupta
MUCH: Multi-Criteria Cluster Head Delegation Based on Fuzzy Logic
Mohammad Houssein Ghosn, Alia Ghaddar
Comparison of Routing Algorithms using Riverbed Modeler
Suraj Wandile, Rohit Zende, Siddhant Sribhashyam, Mrs. M. R. Kale, Mr. R. C. Jaiswal
Approaches and Methods for Steganalysis – A Survey
L. Rathika, B. Loganathan
A Study on Detection of Misbehaving Nodes in Ad Hoc Routing
Monika Jatiwal, Parul Tomar
Optimal Design of Low Pass Filter by Hamming, Hanning and Kaiser Technique
Akanksha Mahto, Muskan Chaubey, Pranay Kumar Rahi
A Study of Phishing URL Detection using Apriori and FP-Tree algorithm
Vaishali Jaiswal, Dr. Pramod Nair
A Comparative Analysis of Clustering Approach for Predicting Road Traffic Accident Dataset
Srividhya, Mr. C. Palanichamy
Design of a Modified Carry Select Adder with Single Fault Tolerant Architecture
C M Aiswarya, Shanil Mohamed N
Comprehensive Architecture for Securing Information Disseminated by Wearable Devices in Health Informatics
Dr. Badr Almutairi, Dr. Abdulgader Almutairi
Fusion-Identity Based Encryption with the Outsourced Withdraw in the Cloud Computing
Ashwini Bhosale, S.T. Singh and Prema Sahane
A Novel Approach for Keyword-Aware Service Recommendation System using Collaborative- Filtering Algorithm to Implement in Hadoop Framework
Mr. M. Vengateshwaran M.E, T.S Janarthanan, S. Senbagam, S. Shanmugapriya
TSDT: TPA Based Secure Data Transmission of Cloud Data Storage System
Sandhya Dwivedi, Juhi Kanungo
Two-Level QR Code for Secured Message Sharing and Document Authentication
Shreya V. Uttarwar, Dr. A. M. Bagade
Security of Photo Sharing on Online Social Networks
Harshali Chandel, Dr. A. M. Bagade
A New Location based Mechanism for Indoor Environments
Prof. B.B. Gite, Swati Pandey
An Innovative Method of Power Generation using PV Technology on Solar Roadways
Monika B. Dhoke, Dr. Hari Kumar Naidu, Pratik Ghutke
Hop-to-Hop Secure Data Transmission using Cryptography and Audio Steganography Algorithm
V. Vetri Selvi, S. Gayathri
Review Paper on Big Data: Applications and Different Tools
Simranjot Kaur, Er. Sikander Singh Cheema
Implementation of Crop Simulation Model for Malwa Region Punjab
Parmeet Kaur, Er. Sikander Singh Cheema
Open Shortest Path First- A Case Study
Vishesh S, Ranjan Ravishankar, Nandhishwara BN, Hema R, Nagabhushan HS, Bhaskar V
Hide and Seek: A New Way to Hide Encrypted Data in QR Code Using the Concepts Steganography and Cryptography
M. Manimekalai, R. Bakkiyalakshmi
Automatic Classification of Hand Gesture Contours Based on Human Computer Interaction
Ms. Nayan S. Mane, Prof. Suresh S. Rode
Data Extraction and Alignment by using Combining Tag and Values Similarity
Aparna Pathak, Dr. Sadhana Chidrawar
Hybrid Approach of Spectrum-Energy Efficiency Optimization for LTE Network
Y.D. Chincholkar, Mohammed Luay Abdulmunem
Efficient Cloud Security Method for Preventing Insider Attacks in Cloud Computing Platforms
Bhushan Rathod, Prashant Yelmar
Kanban: A Definite Answer for Effective Project Execution in Uncertainties
Kamini Godbole, Dr. Jitesh Neve
Attribute Based Encryption with Anonymous Authentication of Data Stored in Cloud
Shailesh Vijay Gawai
Improvement in Prediction Accuracy using Data Mining Techniques
Pallavi D. Bagul, Prof. K. C. Waghmare
IMPROVED APPROACH FOR METEOR DETECTION & AUTOMATION: A CROSS CORRELATION METHOD
Leela Lakshmi. S, Rajani Kanth. V
Abstract
Fraud Detection using Supervised Learning Algorithms
R. Mallika
DOI: 10.17148/IJARCCE.2017.6602
Abstract: Now a days due to de-monetization everyone had started using credit cards for different types of transactions. So there will be a more chances for occurring fraud. Banks have many and enormous databases. Important business information can be extracted from these data stores. Fraud is an issue with far reaching consequences in the backing industry, government, corporate sectors and for ordinary consumers. Increasing dependence on new technologies such as cloud and mobile computing in recent years has encountered the problem. Physical detections are not only time consuming they are costly and they don�t give accurate results. Not surprisingly economic institutions have turned to automated process using numerical and computational methods. Traditional approaches relied on manual techniques such as auditing, which are inefficient and unreliable due to the difficulty of the problem. Data mining-based approaches have been shown to be useful because of their ability to identify small anomalies in large data sets. So we have used some of the supervised algorithms to detect the fraud which gives accurate results. There are many different types of fraud, as well as a variety of data mining methods, and research is continually being undertaken to find the best approach for each case. Financial fraud is a term with various potential meanings, but for our purposes it can be defined as the on purpose use of illegal methods or practices for the purpose of obtaining financial gain . Fraud has a large negative impact on business and society credit card fraud alone accounts for billions of dollars of lost revenue each year.
Keywords: Fraud detection, Financial fraud, Decision tree.
Abstract
Handwritten Character Recognition using Neural Network
Manish Kumar Sahu, Naveen Kumar Dewangan
DOI: 10.17148/IJARCCE.2017.6603
Abstract: Handwritten character recognition is an area of pattern recognition which defines an ability of a machine to analyze a pattern and identify the character. Pattern recognition is the science of making inferencas from perpatule data based on either priore knowledge or on statistical information. This paper focouses on development of software algorithm to recognize any hand written character efficiently on computer with input is either an old optical image or currently provided through touch input, mouse or pen.
Keywords: NN Neural Network, Character recognition, pattern recognition.
Abstract
RFID based Women Safety System with Automatic Street Light Control System
Shruthi A B, Shivanand Gowda K R, Ramachandra A C
DOI: 10.17148/IJARCCE.2017.6604
Abstract: Safer transportation of women employees in the night or even in the day time has been a critical issue as it is often found that if they miss the bus/cab or ride the wrong bus/cab with no way to track them. This project intends to find yet another solution to solve this problem by developing a safety system that will control the entry and exit of employees from the buses through an efficient methodology. The proposed system will control the entry and exit of employees using RFID (Radio Frequency Identification) and GSM technologies to ensure the entering and exiting of all employees in a safer manner. The system will do all the process and allow the employee to be tracked while entering and leaving the bus. If the bus journey is successful from the source to destination, it will send an SMS to the management to inform its departure and arrival. It also gives the continuous information about the bus with the help of GPS. If the driver exceeds the speed limit, a message will be sent to the management that the driver is rash driving. In case of accidents, for the safety of employees, it also has Accident Detection System to inform the Ambulance and Police of the accident site and arrange for necessary steps to control the situation. The employee can be tracked by the management and the guardian throughout the travel with the help of this system. It also has automatic street light control system that can be implemented in low density areas. It helps to automatically turn ON and OFF according to the intensity of light and the movement of any vehicles.
Keywords: Women Safety System, accident detection, speed limit alert, automatic messaging system, automatic streetlights.
Abstract
Denoising of Additive Noise in DECT scan and MRI Image using ANW filter
Ashwini N M, Kavitha G
DOI: 10.17148/IJARCCE.2017.6605
Abstract: Noise reduction in material density images is a necessary pre-processing step for the correct interpretation of dual-energy computed tomography (DECT) images and MRI scanned images . In this paper a new method based on a local adaptive processing to reduce noise in DECT and MRI images will be described. Here the comparative study is made based on the filters used for denoising the image. The methods used to describe the systems are Adaptive Neighbourhood Wiener(ANW) filter, prewitt and anisotropic are used among this which one is best method can be determined based on the Peak Signal Noise Ratio (PSNR) value and Mean Squarer Error (MSE) value of the input image for each filters. In this we added Gaussian noise to DECT scanned images and MRI scanned images for the noisy image we apply this filters to denoise the images. Finally by taking the PSNR average value of the each filter we can conclude which filters is best.
Keywords: Noise reduction, Preprocessing, DECT, MRI, prewitt, anisotropic, PSNR, ANW filter.
Abstract
A New Method for Object Management in Cloud Computing Application
K Venkata Chalapathi, Hemalatha T
DOI: 10.17148/IJARCCE.2017.6606
Abstract: Cloud computing presents a new way to development the present use and release model for IT services based on the Internet, by providing for actively scalable and often virtualized assets as a service over the Internet. It enables extremely scalable services to be with no trouble consumed over the Internet on an as-needed basis. A major feature of the cloud services is that user�s data are normally processed vaguely in unknown machines that users do not own or operate. While enjoying the skill brought by this new budding technology, we suggest a new really decentralized in series responsibility structure to keep path of the real practice of the user�s data in the cloud. In particular, we offer an object-centered move toward that enables enclosing our sorting mechanism jointly with user�s data and policies. We leverage the sorting mechanism to both create a active and roaming object, and to ensure that any access to user�s data will start validation and automated sorting. To make stronger user�s control, we also present spread audit mechanisms. We provide broad trial studies that show the good organization and success of the planned out come.
Keywords: cloud computing, authentication, logging, audit.
Abstract
A Review on Trust Management in VANET
Deepa Soni, Ravindra Gupta, Varsha Namdeo
DOI: 10.17148/IJARCCE.2017.6607
Abstract: There is an pressing need of effective trust management for vehicular ad-hoc networks (VANETs), given the dire consequences of functioning on false data sent out by malicious peers during this context. In this paper, we have a tendency to initial discuss the protection & study of assorted attacks in VANET and comparison of assorted attacks in VANET. We tend to then survey of VANET Security needs & trustworthy computing to boost security in network. Supported these studies, we recommend desired properties towards effective trust management in VANETs, putting in clear goals for researchers during this space.
Keywords: V2V (vehicle-to-vehicle), V2I (vehicle-to-infrastructure), RSU (road side unit).
Abstract
Big Data Challenges and its Tools
A.M. Chandrashekhar, Arpitha M G
DOI: 10.17148/IJARCCE.2017.6608
Abstract: As number of user�s increases data also increases. The phrase big data refers to bulk volume of data which is complicated in nature because it involves both structured and unstructured type of data which is difficult to analyze. Many different sources like social media postings, sensors which gives climate information, digital information etc contribute huge amount of data to the big data. To extract useful patterns and readable patterns from the big data it is necessary to use data mining technique. Big data stream refers to the data stream which is large in variety, veracity and velocity. Data processing is not an easy job unless of identifying, responding and locating the data hence it is more challenging and difficult it has to be done in well automated manner.
Keywords: Hadoop, no sql, pig, spark, 3 v�s.
Abstract
Enhancing the Network Lifetime by Deploying Mobile Sink in Wireless Sensor Networks
N. Brindha, S. Vanitha
DOI: 10.17148/IJARCCE.2017.6609
Abstract: Today Wireless Sensor plays an important role in almost all the field including military surveillance, facility monitoring and environmental monitoring. Wireless Sensor Network (WSN) consists of several nodes which are used to collect and transmit data to the static sink. A static sink acts like an interface between users and the sensor network. The energy utilization of sensor node is essential in the WSN because it manage the lifetime of the sensor network. Data aggregation approach plays a fundamental role in gathering and aggregating data in an energy efficient manner. By tradition tree based approach is more efficient way in transferring the data to the sink. The Mobile sink finds several advantages over static sink. The Proposed work, called Pointed Query Area partition Algorithm with Mobile Sink approach is used. The Mobile sink follows controlled mobility pattern and it can finds the shortest path from its present location for data collection.The proposed algorithms focus on two problems such as lifetime extension and energy consumption. The experimental result of this work is illustrated with below using ns2 simulation.
Keywords: Data aggregation; Mobile sink; Controlled mobility pattern.
Abstract
A Secure Cloud Computing based Framework for Big Data Information management of smart Grids
Vandesh Goyal, Rishika Movva, Alekya Kunadharaju
DOI: 10.17148/IJARCCE.2017.6610
Abstract: A smart grid is an electricity network that uses digital and other advanced technologies to monitor and manage the transport of electricity from all generation sources to meet the varying electricity demands of end-users It possesses demand response capacity to help balance electrical consumption with supply. It is pointed out that there are tenacious economic as well as environmental urgings for the refurbishment of the conventional power systems, and its replacement with a Smart Electrical Power Grid or simply Smart Grid. The main challenges of smart grids, however, are how to manage different types of front-end intelligent devices such as power assets and smart meters efficiently; and how to process a huge amount of data received from these devices. Smart grid is an electric grid which includes a variety of operational and energy measures including smart meters, smart appliances which are used to measure the power consumption of those devices, and it consists of renewable energy resources, and energy efficiency resources which can be used by those devices. In this paper, we propose a cloud computing based framework for big data information and a security solution based on identity-based encryption, signature and proxy re-encryption to address critical security issues of the proposed framework.
Keywords: Smart Grid, Big Data, Cloud Computing, Information Management, Smart Frame, Security.
Abstract
Design of a Low Power Two Stage Operational Amplifier using MT-CMOS Technology: A New Approach
Neha Shukla
DOI: 10.17148/IJARCCE.2017.6611
Abstract: The birth of �Moore�s Law� provided a great insight to electronic industry. As a result of which so many technologies are adapted to increase the number of components on integrated circuits. One of which is Scaling .As scaling of technology is adapted, performance and efficiency of devices is improved to a great extent. But on the other hand power dissipation has become a matter of great concern. And it becomes the main constrain when it comes to portability of any electronic device. The operational amplifiers need no introduction as this device has become an integral part of fields like instrumentation, automotive and so on. So, this paper is proposing a design of a low power operational amplifier using MT-CMOS Technology. Various technologies for low power dissipation are also considered in this paper along with their advantages and disadvantages.
Keywords: MT CMOS, Cadence, VT-CMOS, Opamp.
Abstract
CANS Implementation using GSTEB Protocol in Wireless Sensor Network
R. Harish Kumar, M. Chandra Sekhar Rao
DOI: 10.17148/IJARCCE.2017.6612
Abstract: Wireless sensor network is the emerging area where we are largely depending on it, in our day to day life. The major application of the wireless sensor network is the emergency navigation service during the emergency situations, and the main goal of this service is to save the people from emergency situations by guiding them to reach a safe with small congestion and fewer detours. The existing systems are mainly focus on the safe exit to the people. But, they ignoring the problems like congestion and heavy detours caused due to people movement towards the exit on this kind of emergency situations. From this project, we propose a new existing algorithm named CANS which means Congestion Adaptive Small stretch and Emergency Navigation algorithm mainly used to control the congestion in emergency situations and guide the people to the safe locations within a short time. Because CANS doesn�t need any location information. Without any location information, guiding the users for safe path is practically impossible. So, we propose the GSTEB protocol to guide the people in dangerous situations for a safe exit. By using CANS algorithm, when any emergency situation occurs, the sensors in the wireless sensor networks take the information on overall condition of the surroundings and location information of the all the users. And then the sensors in the wireless sensor networks talk with the mobile users about the better and near way to the exit or safe path. CANS execute the technique of level set method to track the users and guide them to the exit and the boundary of the hazardous areas. So, the people near to the dangerous areas will receive a mild congestion at the cost of slight detour. While, the people away from the dangerous areas will faces a unwanted detours. Generally, when an emergency situation occurs, people look for known path to the safe exit from their location.
Keywords: Wireless Sensor Network, GSTEB Protocol, CANS, Emergency Navigation algorithm.
Abstract
Home Automation using Telegram
P.N.V.S.N. Murthy, S. Tejeswara Rao, G. Mohana Rao
DOI: 10.17148/IJARCCE.2017.6613
Abstract: The Internet of Things (IoT) has generated excitement for a few years now, with start-ups and established businesses placing bets on the industry�s growth. Along with the business solutions, IoT has been very vital in connecting things to the internet. Thereby achieving a communication among the connected devices. In this Thesis, I have conducted a research on opportunities and challenges of IoT. In the research study, I explored the need of IoT, possible ways to implement IoT, various sensors and devices etc. The study has been well explained in this thesis. Internet of Things has >. Various implementations of IoT could be done by using both proprietary hardware and open hardware. To implement a home automation, I need to study the insides of the hardware, which could not be possible by proprietary hardware. So I found the freedom and chose open hardware for the implementation of an instance of applications of IoT. PI boards has been very cost effective and easy to implement. Upon few software instructions, the Pi board would work as per the instructions with the connected devices. I have place a PI board with an OS and an application called �Telegram� to deploy the IoT software to sense and state the temperature and humidity of a location. Accordingly, I have recorded the values against the reports generated by the bot of telegram. In mere future I see this to be connected to the entire house and can be centrally operated by the bot technology of telegram application .This implements IoT to automate the control of connected thing in a house.
Keywords: IoT, Telegram, Raspberry Pi, BOT, Home Automation.
Abstract
IoT based Monitoring and Control System for Home Automation using Prediction Algorithms
Anitha Bommana
DOI: 10.17148/IJARCCE.2017.6614
Abstract: The venture proposes a proficient usage for IoT (Internet of Things) utilized for observing and controlling the home machines through World Wide Web. Home computerization framework utilizes the convenient gadgets as a UI. They can speak with home robotization arrange through an Internet portal, by methods for low power correspondence conventions like Wi-Fi and so forth. This venture goes for controlling home apparatuses by means of Smartphone utilizing Wi-Fi as correspondence convention and Aurduino as server framework. The client here will move straightforwardly with the framework through an online interface over the web, though home apparatuses like lights, fan and entryway bolt are remotely controlled through simple site.Prediction algorithms to bring about next event recognition. Further, an Episode Discovery helps in finding the frequency of occurrence of these events and targeting the particular events for automation. The effectiveness of the Prediction algorithms used is demonstrated; making it clear how they prove to be a key component in the efficient implementation of a Smart Home architecture. An additional element that improves the aspect of security from chimney mischances is its ability of sleuthing the smoke all together that inside the occasion of any chimney, relates a cautioning message and a picture is sent to Smartphone. The server will be interfaced with transfer equipment circuits that control the apparatuses running at home. The correspondence with server enables the client to choose the suitable gadget. The correspondence with server allows the client to select the satisfactory gadget. The server speaks with the relating transfers. In the event that the web association is down or the server isn't up, the installed framework board still will oversee and work the machines locally. By this we give a climbable and cost compelling Home Automation framework.
Keywords: Auduino; Internet of Things (IOT); Home Automation; Web Server.
Abstract
Study on Different Image Encryption Technique
Kalyani Kadukar, Prof. R. Krishna
DOI: 10.17148/IJARCCE.2017.6615
Abstract: The aim of this project is related to novel scheme for separable reversible data hiding in encrypted image is proposed, which consists of image encryption, data embedding and data-extraction/image-recovery ,3D chaos generation,3D histogram equalization, row rotation, column rotation and XOR operation phases. Additional message are embed into some cover media, such as military or medical images, in a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message is called reversible data hiding. Separable reversible data hiding, the name its self indicates that it is a separable reversible data technique .That is it is reversible data technique but which is separable. The separable means which is able to separate .The separation of activities i.e. extraction of original cover image and extraction of payload is done in this method. This separation requires some basic cause to occur. In separable data hiding key explained by Xinpeng Zhang the separation exists according to keys. Digital images has increased rapidly on the Internet. Security becomes increasingly important for many applications, confidential transmission, and video surveillance, military and medical applications. The transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks.
Keywords: Encryption, 3D Chaos technique, Data Hiding, Decryption.
Abstract
A Power Optimized Divide by N Prescaler Design on 50nm CMOS Process
Nityanand Urmaliya, Prof. Shravan Kumar Sable
DOI: 10.17148/IJARCCE.2017.6616
Abstract: In this paper divide by N prescaler counter is discuss. Instead of using conventional counter design technologies, a decision logic circuit is needed to generate predictable counting states. This circuit can be design by using transmission gate logic as a basic design cell. An initial module generates predictable counting states for higher significant bit modules through the state look-ahead path. In order to attain high operating frequency a high speed parallel counter is presented. In our work the counter operating frequency is varied by using a parallel counter architecture of transmission gate base flip-flops. The operation speed is improved by reduction of the critical path delay and the low power consumption can be achieved due to less number of interconnects. Simulation results in a standard 50nm CMOS process.
Keywords: Transmission Gate, Asynchronous Counter, D Flip-flop, Demultiplxer, Frequency synthesizer, Microwind.
Abstract
A Study of Low Level Feature Extraction Techniques for Content based Image Retrieval Systems
Savitri Chandra, Latika Pinjarkar
DOI: 10.17148/IJARCCE.2017.6617
Abstract: With the development in the computer technologies and the advent of the internet, there has been bang in the amount and the difficulty of digital data being produced, stored, conveyed, analysed, and accessed. The emergence of multimedia technology and the rapidly expanding image collections on the Internet have attracted significant research efforts in providing tools for effective retrieval and management of visual data. Content-based image retrieval (CBIR) is a technique for retrieving images on the basis of automatically-derived features such as colour, texture and shape. Feature extraction is the most important step in image classification. It helps in extracting the feature of an image as ideal as possible. These methods used for content based image retrieval are classified as low-level feature extraction and High-level feature extraction. Low-level feature extractions are based on finding the points, lines, edge, etc. while high level feature extraction methods use the low level feature to provide more significant information for further processing of Image analysis.This paper discusses some of the techniques available for effective extraction of feature for CBIR systems.
Keywords: Content Based Image Retrieval (CBIR), Query by image content (QBIC), Content-based visual information retrieval (CBVIR), Feature Extraction, Low Level Feature extraction.
Abstract
Sensor Array-Architecture and Monitoring
Vishesh S, Vilas Gupta SV, Sourav HA, Saiesh R, Sahana KR, Sindhu P
DOI: 10.17148/IJARCCE.2017.6618
Abstract: A sensor is a device which detects or measures a physical property and records, indicates, or otherwise responds to it. The sensor used in a particular application is sensitive to one or more sources, and when the sensor is exposed to that stimulus/stimuli, this affects the physical, chemical or electromagnetic properties of the sensor which is further processed to a more usable and readable form. Sensor is the heart of a measurement system. It is the first element that comes in contact with environmental variables to sense and generate an output. A sensor can be classified into various categories like active and passive sensors, analog and digital sensors, mechanical sensors, bio sensors, etc. In this paper we are using an array of sensors, and reading data from the sensors simultaneously and displaying it using an android application called �sense_graph� which is a scientific third party application developed by our team. We are using an array of similar sensors- Force sensors, which are capable of measuring force applied per unit area. In this paper, we are interested in measuring force/area on the bottom of the human foot and framing conclusions. The measurements are made in N/m� at a particular time interval and a graph of N/m� v/s time (sec) is plotted. There are regions in the foot where pressure could be very high or negligible for a specific posture or movement of the human body.
Keywords: measures, indicates, responds, active and passive sensors, third party applications, analog and digital sensors, posture or movement.
Abstract
Allocation of Energy Efficient Sub-Channel in Cognitive Radio Networks for Television Systems
P.N.V.S.N. Murthy, S. Vidya Sagar Appaji
DOI: 10.17148/IJARCCE.2017.6619
Abstract: The cognitive radios those are energy efficient which are operating in the television systems that means in the television white spaces where the vacant frequencies available compares with the other cognitive radio devices because of the interference constraint which is for whole frequency band rather than per signal carrier. In this paper we considered the Ratefair channel assignment protocol which is explained in the energy efficient frequency and power allocation for cognitive radios in television systems, taken from IEEE systems journal. In this protocol the users are allocated with the sub channels which are energy efficient based on their transmission rates. Users are arranged in the descending order based on the transmission rates. The user with higher transmission rate is assigned with the sub channel on which the user obtains a larger gain. But at the same time lower transmission rate user may also get larger gain on the same sub channel which is already allocated to the higher transmission rate. Because of the low transmission rate the user cannot acquire the sub channel on which the gain is large. Low transmission rate is may be due to larger separation distance between the cognitive base station or may be because of the more interference by the secondary users. In this paper we use two algorithms, one is recursive algorithm which is used to find the shortest distance and also the most reliable path by calculating the packet loss rate and another algorithm is Dynamic threshold algorithm which is used to reduce the interference of the secondary users. As a result transmission rate of users increases , delay decreases, data will be transmitted more reliably. Simulations are compared with the existing protocol and showed that the proposed method increases the transmission rate and decreases the delay in transmission and the channels are allocated which are more Energy Efficient than the existing.
Keywords: cognitive radio, channel assignment, TV white spaces, energy efficiency.
Abstract
Content Based Image Retrieval using Color and Shape Features
M. Arundhathi Reddy, Dr. Linganagouda Kulkarni, Dr. M. Narayana
DOI: 10.17148/IJARCCE.2017.6620
Abstract: This paper proposes, a method is used for Content-Based Image Retrieval (CBIR) using color and shape features. Active research in CBIR is geared towards the development of methodologies for analyzing, interpreting, cataloging and indexing image databases. In addition to their development, efforts are also being made to evaluate the performance of image retrieval systems. The quality of response is heavily dependent on the choice of the method used to generate feature vectors and similarity measure for comparison of features. The speed of shape based retrieval can be enhanced by considering approximate shape rather than the exact shape. In addition to this a combination of color and shape based is also included to improve the accuracy of the result. We have implemented the CBIR system which takes into consideration the low level features of image which is more comprehensive when compared to high level features. Here the distance between database images and query image in found and the images with minimum distance will be displayed as output. For Shape Based Image Retrieval, the retrieved images are displayed based on the similarity of the shape of object in image with the shape of query image shape. The images are ranked depending on the similarity using Euclidean Distance i.e. more similar images are displayed at the top and the images with less similarity will be displayed later. From the comparison of Color Based Image Retrieval and Shape Based Image Retrieval result, we notice that the accuracy of Shape Based Image Retrieval is more than the accuracy of Color Based Image Retrieval. Though the complexity of Shape Based Image Retrieval is more than the Color Based Image Retrieval, Shape Based Image Retrieval consumes less time and gives more accuracy in retrieved results.
Keywords: CBIR, Shape Based Image Retrieval, Color Based Image Retrieval, Euclidean Distance.
Abstract
Sender Recognition of E-mail & Email Categorization
George Philip C., Bansi R. Savaliya
DOI: 10.17148/IJARCCE.2017.6621
Abstract: Tackling irrelevant emails have become part of every email user�s activity. Emails that seem valid are received in the inbox and, sometimes relevant emails are directed to spam. Another aspect of the problem is that due to very high number of incoming emails, it is very difficult to identify the required ones easily. In this process, users waste so much of their time, energy and efforts by sifting through irrelevant mails also in which they have no interest. Sometimes users also get frustrated getting such junk mails frequently. To support ease of access, emails are to be categorized based on the type of information they contain, which will help a person to identify required mails even before opening it. This paper involves development of a feasible solution to this problem by identifying the real sender using past email patterns and features. The proposed project uses this solution to solve the problem of email categorization also. This paper uses machine learning algorithm for detecting the actual Email composer. Different Semantic, Syntactic, and Lexical features of the incoming will be considered to implement the project. Features like Ngram, Lemmatization, creating personalized vocabulary, and observation of patterns are utilized. Algorithms like Lesk will be used to find the meaning according to the context of the text. A database like WordNet helps to find relevant words in the text. Machine learning will be used to learn the different features and create the training data. After the framework is trained, testing data will be used to assess the system. As the system is tested, it will continue to learn from the input data to make it better. Once the machine is trained, the system can start working as a fraud detection system which identifies the real sender, and categorize emails.
Keywords: Text Mining, Ngram (Unigram, Bigram, Trigram), Lemmatization, Wordnet, Enron E-mail Dataset.
Abstract
A Study on High Performance Embedded Systems with Multiple Processors
Prakash H T, Dr. Srinivas M
DOI: 10.17148/IJARCCE.2017.6622
Abstract: The progress made in growing more propelled compilers for embedded systems, programming of embedded elite computing systems in light of Digital Signal Processors (DSPs) is as yet an exceedingly talented manual assignment. This is valid for single-processor systems, and significantly more for embedded systems in light of numerous DSPs. Compilers regularly neglect to improve existing DSP codes written in C because of the utilized programming style. Parallelization is hampered by the complex various address space memory design, which can be found in most business multi-DSP arrangements. This postulation builds up a coordinated advancement and parallelization methodology that can manage low-level C codes and creates enhanced parallel code for homogeneous multi-DSP architecture with disseminated physical memory and numerous sensible address spaces. In an initial step, low-level programming phrases are distinguished and recouped. This enables the use of abnormal state code and information changes surely understood in the field of scientific computing Iterative criticism driven scan for "good" change groupings is being researched. A novel approach to parallelization in view of a bound together information and circle change structure is displayed and assessed. Execution improvement is accomplished through abuse of data locality from one viewpoint, and usage of DSP-particular building components, for example, Direct Memory Access (DMA) exchanges then again. A novel parallelization structure containing data distribution and territory improvements has been concocted and experimentally assessed against significant DSP benchmarks. Vital commitments to the improvement of novel gathering methods for superior embedded systems in view of single processors and in addition on multiple processors have been made. It is likely that we will see more research here as future Systems-On-Chip will involve bigger quantities of heterogeneous processors with non-standard memory architectures, which will challenge existing compiler technology.
Keywords: High� Performance, Embedded Systems, Multiple Processors, progress, programming, Digital Signal Processors, DSPs, memory design, architecture, memory, information, improvement, DMA, technology.
Abstract
Prediction of Heart Diseases using Artificial Intelligence
Amreen Ahmed, Prof. Shilpa Verma
DOI: 10.17148/IJARCCE.2017.6623
Abstract: Most nations face high and expanding rates of heart diseases or cardiovascular disease. There are number of factors which increase risk of heart diseases, like family history of heart disease, smoking, cholesterol, high blood pressure, obesity, lack of physical exercise etc. Heart disease is a major health problem in today�s time. A major challenge facing healthcare organization is the provision of quality services at affordable costs. Thus, there arises a need to develop a decision support system for detecting heart disease of a patient. That is, to achieve a correct and cost effective computer-based treatment and support system that can be used to make good decision. Many hospitals use hospital information systems to manage their healthcare or patient data. These systems produce huge amounts of data in the form of images, text, charts and numbers. Sadly, this data is rarely used to support the medical decision making. There is a bulk of hidden information in this data that is not yet explored which give rise to an important query of how to make useful information out of the data. So there is necessity of creating a system which will help practitioners predict the heart disease before it occurs. By providing efficient predictions, it can help to reduce costs of treatment. A hybrid system of Back-Propagation algorithm for neural network and genetic algorithm is proposed. The characteristics of Back-Propagation algorithm are that it is adaptive and tolerant towards the noisy data or other outliers present in the medical data. Back propagation networks do not need the linear relationship between the data and the target output. But it has a disadvantage of getting stuck in the local minima and thus the data is first optimized using genetic algorithm and the concepts of crossover and mutation are applied and that is then again fed into the neural network for better results. In the case of heart diseases time is precious, proper diagnosis at the right time saves life of many patients. The system can be considered assisting the doctor to come to decision making.
Keywords: Neural Network, Genetic Algorithm, Crossover, Mutation, Back-Propogation.
Abstract
Energy Efficient CO-GPS with Reduced Duty Cycle Environment Monitoring
P.D. Karale, S.B. Shinde
DOI: 10.17148/IJARCCE.2017.6624
Abstract: Advancements in silicon technology, embedded systems, sensors, micro electro mechanical systems and wireless communications have led to the emergence of embedded wireless sensor networks (EWSNs). System explained here is an embedded system which uses ARM & a wireless sensor network. Typical widely available GPS receivers consume high energy, which limits its usefulness in any applications. In many sensing scenarios, preprocessing of location information is adequate at the time of data uploading to a server, Cloud-Offloaded GPS (CO-GPS) solution is designed that allows a sensing device to forces to manage duty-cycle its GPS receiver and log just raw data GPS signal for post processing. Cloud can compute good quality GPS location can be derived by using publicly available information such as GNSS satellite ephemeris and an Earth elevation database service, from a few milliseconds of raw data. GPS Module give us the output in terms of Latitude & Longitude of the location. Using GPRS module at we can collect all the information from the wireless sensor nodes & we can transmit it to the server. By using webpage, all the status of the system can be monitored.
Keywords: Embedded wireless sensor networks, Cloud-offloaded GPS (CO-GPS), Coarse time navigation (CTN), Webpage, Server, GPS receiver.
Abstract
Review on “Energy Efficient WSN Techniques in Environmental Monitoring”
P.D. Karale, S.B. Shinde
DOI: 10.17148/IJARCCE.2017.6625
Abstract: Environmental monitoring is major application of Wireless sensor networks. WSNs consist of sensor nodes. Each sensor node accoutered with low cost sensor, small battery and a microcontroller. Environmental monitoring need battery powered sensor nodes active for long period, which tends to drain battery easily. Repeatedly charging or changing of batteries is not practical solution. In order to widen network lifetime, reduction in energy consumption of sensor nodes is a major challenge. So, energy efficiency of WSNs need to be improved. The different WSN energy efficient techniques used in environment monitoring are review here.
Keywords: Environmental monitoring system, Energy efficiency, Wireless sensor network, GPS, Zigbee.
Abstract
Scalable Back-Bone-Assisted Hop Greedy Routing for VANETS
Rucha Patil
DOI: 10.17148/IJARCCE.2017.6626
Abstract: In variety of application such as information sharing, navigation system, internet access vehicular area network plays an important role. To broadcast message safely, optimal routing we need more research. In such a case efficient routing plays an important role .To reach to destination we use shortest path algorithm but it can gives higher hop count. By adding mobile nodes to ad hoc network, it will deviate the path far from optimal path because it has no knowledge current topology which cause higher hop count. In this paper we propose optimize routing technique for VANET which improve routing by continuously monitoring and change the path which causes less hop count.
Keywords: Vehicular ad -hoc network (VANET), optimal path, hop count, ExBAHG.
Abstract
Analysis of Mean, Standard Deviation and Global Minimum using Animal Migration Optimization
Ashish Anjana, Mr. Sachin Upadhyay
DOI: 10.17148/IJARCCE.2017.6627
Abstract: The animal migration is constant and straightenedout movement affected by the animal�s own locomotory exertions carrying them to new habitats. It depends on some impermanent inhibition of station keeping responses but promotes their ultimate disinhibition and recurrence. Animal migration is the relatively long-distance movement of individuals, usually on a seasonal basis. It is a ubiquitous incident that can be found in all major animal groups, such as birds, mammals, fish, reptiles, amphibians, insects and crustaceans. The trigger for the migration may be local climate, local availability of food, and the season of the year, and so on. We perform Mean, Standard deviation and Global Minimum on the four techniques such as Sum, Ackley, Beale and Rosenbrock.
Keywords: Data mining, PSO, FA, CS, ABC, BA, Animal Migration Optimization.
Abstract
Multi hop and Multi Direction Selection Data Dissemination Technique for Road Safety in VANET
Manpreet Kaur, Navjot Bhullar
DOI: 10.17148/IJARCCE.2017.6628
Abstract: There is a major increase within the rates of car accidents in countries round the world and additionally the casualties concerned ever year. New technologies are explored about the Vehicular ad hoc Network (VANET) as a result of the rise in transport traffic/congestions around us. Vehicular communication is extremely vital as technology has evolved. The analysis of VANET and development of proposed systems and implementation would increase safety among road users and improve the comfort for the corresponding passengers, drivers and also other road users, and an excellent improvement within the traffic efficiency would be achieved. the security problems are described and improved with the proposed technique.
Keywords: Vehicular ad hoc networks (VANETs), next available node, MHMD AMD.
Abstract
A Network-Based Asynchronous Architecture for Cryptographic Devices
Kantharaju H M, Dr. M Srinivas
DOI: 10.17148/IJARCCE.2017.6629
Abstract: The conventional model of cryptography looks at the security of the figure as a mathematical function. In any case, figures that are secure when determined as mathematical functions are not really secure in genuine usage. The physical usage of figures can be to a great degree hard to control and frequently spill supposed side-channel data. Side-channel cryptanalysis attacks have appeared to be particularly powerful as a down to earth implies for attacking usage of cryptographic algorithms on straightforward equipment stages, for example, brilliant cards. Foes can acquire delicate data from side-channels, for example, the planning of operations, power utilization and electromagnetic outflows. A portion of the attack techniques require shockingly minimal side-channel data to break a portion of the best known figures. In compelled gadgets, for example, brilliant cards, direct usage of cryptographic algorithms can be broken with insignificant work. Avoiding these attacks has turned into a dynamic and a testing region of research. Control investigation is an effective cryptanalytic technique that concentrates mystery data from cryptographic devices by examining the power devoured amid their operation.
Keywords: Asynchronous Architecture, Cryptographic Devices, security, side-channel, data, attacks, powerful, algorithms, operations, power, techniques, effective.
Abstract
Cryptanalysis of IPv6 for Secure Communication in Internet of Things
Ms. Aishwarya Ashok Akul, Prof. Mrs. Snehal Bhosale
DOI: 10.17148/IJARCCE.2017.6630
Abstract: Network security is an important issue in internet of things. An IPv6 network interconnects computer and large number of smart devices .these devices have sensing and actuation capability. These smart devices are connected to the internet, there is possibility that these devices can come under attack. The receiver should be able to verify the sensor data generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data. There are many challenges and issues of implementing secure communication in IOT. We proposed a system, which resolves issue of secure communication. In this paper, we are using IPSec protocol (IPv6) in network .which can authenticate and encrypt the packets of data sent over the network. In this paper, we used AES algorithm for encryption and decryption of the data so attacker cannot modify the packet data. By using IPv6 and AES algorithm we provide End to End secure communication between smart devices on internet.
Keywords: Internet of things; 6LoWPAN; IPv6; AES algorithm; IPSec.
Abstract
Gravitational Search Algorithms in Data Mining: A Survey
Poonam, Saroj Ratnoo
DOI: 10.17148/IJARCCE.2017.6631
Abstract: A Gravitational Search Algorithm is a meta-heuristic search algorithm inspired by Newton�s laws of motion and gravitation force. Gravitational search based algorithms have attracted the attention of data mining community due to their ability to effectively search large and complex search spaces as is the case with the domain of data mining and knowledge discovery. Gravitational search algorithms have been applied to the data mining tasks like classification, clustering objects and mining association rules etc. This paper presents a survey on the applications of Gravitational Search based algorithms in data mining and indicates the scope of further research on using GSAs in the field of data mining.
Keywords: Data Mining, Gravitational Search Algorithm (GSA), Classification, Clustering, Association Rule Mining, Feature Selection.
Abstract
Design 0.4v Low Power Class AB CMOS Operational Transconductance Amplifier
Aniruddha N. Bhokare, Dr. M. B. Mali
DOI: 10.17148/IJARCCE.2017.6632
Abstract: Importance of low voltage low power analog design techniques is increased due to modern trends towards use of battery operated portable electronics. This paper presents the low voltage power efficient class AB CMOS operational transconductance amplifier with enhanced gain and bandwidth operating at 0.4V. Complementary NMOS and PMOS differential pair is used to achieve rail to rail input stage are biased using two level shifter adaptive bias techniques to improve slew rate. Low voltage low power operation is achieved by operating transistors in weak inversion region. Class AB output stage, in which transistors connected in common source configuration, is employed. High CMRR is obtained by CMFF circuit which also biases the output stages. Operational transconductance amplifier (OTA) is designed in LTSPICE using 90nm DSM technology.
Keywords: OTA, weak inversion, adaptive bias, CMRR.
Abstract
Sensing as a Service Model for Pulse Oximeter Supported by Internet of Things
Ms. Shruti Daddikar, Dr. Roshani Raut
DOI: 10.17148/IJARCCE.2017.6633
Abstract: The purpose of this paper is an approach to recognize oxygen level in people�s blood. Our method uses SPO2 sensor (Blood oxygen saturation level) and msp432. By using SPO2 sensor to sense oxygen level in the blood and Beer�s Lambert Laws to get oxygen level value and that oxygen level value display in LCD. The proposed method require less no of hardware so it reduced the production cost.
Keywords: SPO2, MSP432, Power supply, LCD module, Readings.
Abstract
An Effective Application and Analysis Method based on User’s Profiles in Elective Subjects
Rikeeta Mahajan, Prof. Priti Subramanium
DOI: 10.17148/IJARCCE.2017.6634
Abstract: Every educational institute generates huge bulky data related to all the students getting education from the institute. Though much data produced may be worthless, the institute can use some valuable information to provide better education. Data mining can be employed for such purposes so that key knowledge can be extracted for future use. Difficulty arises for the engineering students when they reach the final year. They are made to choose electives as their subjects. Students may know nothing about what the knowledge the subject represent for. This may create choice for them as the electives have considerable values in the grading system too and if the student fails to choose the appropriate elective then it may affect the final grades. To eliminate this trouble, a beneficial system is planned to develop using fuzzy logic system (FLS). The main objective is to help the pupils select the right our electives in their final year of engineering and data mining concepts would be useful to gain key information about the students on the basis of which the proper elective can be pointed out.
Keywords: Final Grades, FLS, Elective Subject, Data Mining.
Abstract
Parallel Frequent Itemset Mining for Big Datasets using Hadoop-MapReduce Paradigm
Seema Tribhuvan, Bharti. P. Vasgi
DOI: 10.17148/IJARCCE.2017.6635
Abstract: Frequent Itemset Mining is one of the classical data mining problems in most of the data mining applications. There are various parallel mining algorithms available for frequent itemsets mining, such as Apriori, Fp-Growth algorithms. However, these parallel mining algorithms lack features like automated parallelization, fine load balancing, and distribution of data on large clusters. To address these issues the most effective recent method is using the enhanced version of Apriori algorithm (EA). In this technique three MapReduce tasks are implemented to complete the mining of big datasets by using the parallelism among computing nodes of clusters to improve the performance of frequent pattern mining on hadoop clusters. After third map reduce job, frequent patterns will be produced as a final outcome.
Keywords: frequent item sets, Enhanced Apriori, Hadoop, MapReduce.
Abstract
A Comparative Performance Analysis of AODV, DSR and DSDV Protocol for Mobile Ad-hoc Networks
Sandeep Sharma, Pankaj Jagtap
DOI: 10.17148/IJARCCE.2017.6636
Abstract: The quick growth of mobile communication in current years is especially observed in the field of mobile system, wireless local area network, and ubiquitous computing. In this vast of time, ad-hoc networks are extremely active networks characterized by the lack of physical infrastructure. Hubs of this system�s capacity as switch which find and keeps up the route to different hubs in the system. Therefore, for ad-hoc network, routing protocol plays a significant task for building an efficient network. The plan of efficient routing protocols is a basic problem in a Mobile Ad-Hoc Network (MANET). Lots of different protocols have been proposed in the literature, each one based on dissimilar characteristics and properties. In this paper, an attempt has been complete to compare three well known routing protocols Ad-hoc on demand distance vector (AODV), Dynamic Source Routing (DSR) and Destination Sequenced Distance Vector (DSDV) by using three presentation metrics packet delivery ratio (PDR), Routing Overhead and Remain Energy by using the NS-2.34 simulator.
Keywords: AODV, DSR, DSDV, NS2, MANET, Routing Protocol.
Abstract
Double Storage in Cloud Using DS-PEKS
Mubashareen
DOI: 10.17148/IJARCCE.2017.6637
Abstract: Accessible encryption is of increasing enthusiasm forfending the information protection in secure accessible distributed storage. In this paper, we examine the security of an all around kenned cryptographic primitive, in particular, open key encryption with catchphrase seek (PEKS) which is extremely auxiliary in numerous uses of distributed storage. Haplessly, it has been demonstrated that the customary PEKS system experiences an intrinsically instability called inside watchword guessing assault (KGA) propelled by the threatening server. To address this security weakness, we propose a nascent PEKS system named double server PEKS (DS-PEKS). As another principle commitment, we characterize a beginning variation of the smooth projective hash capacities (SPHFs) alluded to as direct and Homomorphic SPHF (LH-SPHF). We at that point demonstrate a bland development of secure DS-PEKS from LH-SPHF. To outline the possibility of our early system, we give an effective instantiation of the general structure from a Choice Diffie�Hellman-predicated LH-SPHF and demonstrate that it can accomplish the energetic security against inside the KGA.
Keywords: Keyword Search, Secure Cloud Storage, Encryption, Inside Keyword Guessing Attack, Smooth Projective Hash Function, Diffie-Hellman language.
Abstract
A Mobile Based Crowd Management System
Wafaa M. Shalash, Aliaa Al Hazimi, Basma Al Zahrani
DOI: 10.17148/IJARCCE.2017.6638
Abstract: Modern technology aims not only to make people�s life easier but also more safely. Being in a highly crowded place like stadium, metro stations or holy places on Hajj affects not only the human level of comfort but mainly the human level of safety. Very high Crowd may result on pushing, mass panic, stampede, crowd-crush and causing an overall control loss. The current work introduced a mobile based crowd management system. The system consists of two main parts, the first one is a server side application connected to IP cameras to detect crowd level in certain location(s) while the other one is a mobile application with different users rights to receive alarm from the server side application. The suggested frame work provides an effective method to connect and alert all of the system users immediately, preventing high crowd level danger.
Keywords: Crowd detection, Crowd Management, People Counting, Commercial Crowd Detection Applications, Surveillance system.
Abstract
Distributed Vulnerability Detection, Menstruation and Measure Choice Mechanism for Zombie Detection in Cloud Computing Environment
A. Srinivas, A. Sravanthi, Shazia
DOI: 10.17148/IJARCCE.2017.6639
Abstract: Cloud security is one in every of most significant problems that has attracted lots of analysis and development effort in past few years. Notably, attackers will explore vulnerabilities of a cloud system and compromise virtual machines to deploy any large-scale Distributed Denial-of- Service (DDoS). DDoS attacks typically involve early stage actions like multistep exploitation, low-frequency vulnerability scanning, and compromising known vulnerable virtual machines as zombies, and eventually DDoS attacks through the compromised zombies. Among the cloud system, particularly the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extraordinarily troublesome. This is often as a result of cloud users might install vulnerable applications on their virtual machines. To stop vulnerable virtual machines from being compromised within the cloud, I tend to propose a point in time distributed vulnerability detection, menstruation, and measure choice mechanism known as NICE, that is constructed on attack graph-based analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow schedule Apis to make a monitor and management plane over distributed programmable virtual switches to considerably improve attack detection and mitigate attack consequences. The system and Security evaluations demonstrate the potency and effectiveness of the planned answer.
Keywords: Attack Graph, Intrusion Detection, Cloud Computing, Network Security, Zombie Exploration Attacks.
Abstract
A Novel Approach to Identifying the Cosine Similarity using TF-IDF
Gottapu Mohana Rao, Dr. P. Satheesh, Dr. B. Srinivas
DOI: 10.17148/IJARCCE.2017.6640
Abstract: An expanding number of database applications today require modern inexact string coordinating abilities. Cases of such application ranges incorporate information coordination and information cleaning. Cosine closeness has turned out to be a strong metric for scoring the comparability between two strings, and it is progressively being utilized as a part of complex questions. A quick test confronted by current database analyzers is to discover precise and productive techniques for evaluating the selectivity of cosine comparability predicates. To the best of our insight, there are no known techniques for this issue. In this paper, we display the principal approach for assessing the selectivity of TF-IDF based cosine likeness predicates. We assess our approach on three diverse genuine datasets and demonstrate that our technique regularly delivers gauges that are inside 40% of the real selectivity. The cosine likeness is a measure of similitude between two nonzero vectors of an inward item space. This cosine comparability can be utilized to look at the string from the given archives, the term recurrence is utilized to think about the given string from the diverse reports we have. The converse report recurrence is to discover significant archives coordinating the question.
Keywords: Cosine Similarity, Term Frequency, Inverse Document Frequency.
Abstract
Monitoring of Toxic Gases and Land Slide Prevention using IoT
Joshi Gunjan Shailesh, Dr. Prof. A.M. Deshmukh
DOI: 10.17148/IJARCCE.2017.6641
Abstract: Mining activities releases toxic and very harmful gases. This causes a lots of pressure in the mining industry. Thus to increase the productivity and reduce the cost of mining along with the consideration of the safety of workers, an innovative approach is required. A real time monitoring system that using WSN, in which there are multiple sensors. This system monitors surrounding some environmental parameters such as moisture, toxic gases and land sliding with the help of two wireless sensor nodes using IoT. This system displays the parameters on the Monitor at the underground section, where sensor units will be install as well as on the monitoring unit. It will be helpful to all miners who present inside the mine to save their life before any causality occurs. An alarm will triggers when the sensor values crosses the threshold level. This system also stores all the data in the computer for future inspection.
Keywords: Internet of Things (IoT), Wireless sensor Network (WSN), Microcontroller, Raspberry pi.
Abstract
Route Redistribution-A Case Study
Vishesh S, Chethan M Yadav, Nagaraj Manjunath Moger, Chiranjeevi S, Akshay Bhat, Gagan M
DOI: 10.17148/IJARCCE.2017.6642
Abstract: Network layer is the third layer in the OSI model [1]. The network layer provides connectivity and path selection between two host systems. It is responsible for routing data packets and selecting the best path to deliver data. The network layer prioritizes data known as Quality of Service (QOS) [2]. Routers [3] and Layer 3 switches operate at the network layer. A Router can also act as a Layer 2 and Layer 1 device. A routing protocol [4] specifies how routers communicate with each other. A routing protocol is a set of rules used by routers to determine the most appropriate path into which they should forward packets towards their intended destination. In this paper we give you a brief introduction on redistribution. Using a routing protocol to advertise routes that are learned by some other means, such as by another routing protocol, static routes or directly connected routes, is called redistribution. This situation never arises in the case of single protocol routing environment but multi-protocol routing is common for a number of reasons like company mergers, multiple departments managed by multiple network administrators, and multi-vendor environments. Route redistribution allows different routing protocols to exchange routing information. In this paper we have considered one such situation of route redistribution. Redistribution is done at the boundary routers at the boundary of two merged companies- company A and company B, adapting OSPF and EIGRP routing protocols respectively in their respective AS.
Keywords: Network layer, OSI model, Quality of Service (QOS), Routers and Layer 3 switches, multi-protocol routing, redistribution, OSPF and EIGRP.
Abstract
Enhancing Localization Accuracy and Coverage of Centroid Localization Algorithm using NS-2
Abdelhady M. Naguib
DOI: 10.17148/IJARCCE.2017.6643
Abstract: Localization gets more interest because it is very important for many applications of a wireless sensor networks (WSNs). This paper presents three contributions according to centroid localization algorithm (CLA). The first one is improving the localization accuracy of sensor nodes using the nearest three anchors technique; this proposed algorithm is called enhanced centroid localization algorithm (ECLA). The second contribution which is called centroid localization algorithm using reference nodes (CLAR), aims to increase the percentage of localized sensor nodes (i.e. Coverage) by using reference nodes (localized sensor nodes) broadcasting their estimated position to all unknown sensor nodes (i.e. non-localized nodes). But from simulation results CLAR has higher localization error than CLA, so that the objective is to have low localization error and high coverage which is done by applying the nearest three anchors and/or reference nodes. The final proposed algorithm is called enhanced centroid localization algorithm using reference nodes (ECLAR). The work done in this paper is based on NS-2 simulation by applying different scenarios then measuring the performance of the proposed algorithms. Simulation results show that enhanced centroid localization algorithm using reference nodes (ECLAR) has a better performance (lower localization error and higher percentage of localized sensor nodes) than the conventional centroid localization algorithm (CLA).
Keywords: Centroid, Localization, NS-2, WSNs.
Abstract
Carsharing – A Web and Mobile Application using MEAN Stack
P.V. Tergundi, Shivaratna Kumar Patil, Sumedha Inamdar, Vinayak Shinde, Vishal Bilagi
DOI: 10.17148/IJARCCE.2017.6644
Abstract: Using Carsharing concept, people can share cars that are travelling to same destination. The Carsharing is a web and mobile application which will provide the best way to share rides by creating and browsing or searching rides through this application. With the help of this application number of vehicles on road will be reduced. Thus this application will help to reduce the problems of traffic jams. Fuel combustion also will be reduced. Application also helps to control the pollution and maintains green environment.
Keywords: Carpool, MEAN Stack, Efficient travel, Go-Green initiative.
Abstract
Bipolar Air Demand in Boilers using Arduino Controller
Dr. C. Esakkiappan, M.E, PhD, Anniesha J.R, Hemalatha K, Madhumathi P
DOI: 10.17148/IJARCCE.2017.6645
Abstract: While it is possible to operate and control a boiler with indicators and recorders alone, efficient and reliable operation through simple control is not optimal these days. Early boilers were smaller and operated with simple, but rising demand for, and cost of, steam production has resulted in larger boilers with increased output. More careful boiler control calls for process instrumentation. Air control is inaccurate and unreliable, particularly when flow rates drop below 25% of maximum load. Traditional control methods set the fuel-air ratio .This solution cannot correctly compensate for process variables and is slow to respond to varying load conditions. This control element cannot be solely depended on for accurate control. The goal of airflow optimization is to minimize thermal losses and prevention of a starved boiler. Minimizing excess air reduces stack temperature and thermal loss and can only be done utilizing high accuracy airflow measurement devices. The fuel saving potential in a boiler can exceed 20% in some cases and can lead to substantial savings. Airflow is one of the most important components of boiler control and is critical for safe, reliable, and efficient operation. Incorrect air control can result in toxic gas production, flame outs, fuel-rich conditions and explosion, inefficient operation, erratic cycling, and other issues. Boiler operators need continuous information to adjust the firing rates and distribution of fuel and air to the burners. This can sometimes be difficult to obtain particularly when the air flow is lesser than the demand. It�s common to feed excess air to the boiler at all loads to ensure complete combustion of the fuel. However, this practice can reduce efficiency. Too much air means excess fan power and stack loss from unused oxygen. Lesser air means unburnt fuels in stack. A careful balance between fuel and air is necessary for optimum efficiency, which can only be obtained through careful, multivariable measurement of airflow, fuel flow, and analytical analysis of the stack gases.
Keywords: Bipolar Air Demand, Boilers, Arduino Controller, Stack Gases.
Abstract
MAC Implemented using TCP, UDP and HTTP Protocols in Congestion Control
Tarannum Khan, Sachin Upadhyay
DOI: 10.17148/IJARCCE.2017.6646
Abstract: Congestion is necessary concern that can occur within the packet switched network. Here discussion on Congestion control gives the approach and appliances to control the problem of congestion and either avoid congestion from happening or eliminate the congestion once it has taken place. This paper summarizes the different category provided through the congestion control. Here It also discussed on how TCP utilize congestion and manages to improve congestion or avoid congestion in the network. In this paper we proposed that all the activity which we are managing by our proposed scheme is assure about the reliability aspects due to the connection oriented TCP services and the previous working of the �multicast congestion avoidance� (MCA) lower version protocol has been implemented as UDP connection-less services. Hence reliability will be increased significantly.
Keywords: Congesion Control; Congesion Control Algorithm, �Multicast Congestion Avoidance� (MCA).
Abstract
A Survey of Visual Cryptographic Method for Secure Data Transmission
Dr. D. Devakumari MCA., M.Phil., PhD., K. Geetha
DOI: 10.17148/IJARCCE.2017.6647
Abstract: Transmission of data between the users in the network is an important aspect of today, user of the network wants to share their information between other users of secured data transmission. They were many mode of transaction o data were done, but secured level of data transaction is an important aspect what everyone wants. Secret data transmission is still major problem in network. Embedding the secret information is an upgrading technology for sharing secret data, embedding process cryptography method plays a key role. Effective embedding of secret data by using visual cryptography helps a lot for secret data transmission. This paper provides the survey of various cryptographic methods and its effectiveness for secure transmission over network.
Keywords: Network, Data Transmission, Security, Visual Cryptography and Secure Data.
Abstract
A Small Review on Internet of Things (IoT)
Thogaricheti Ashwini
DOI: 10.17148/IJARCCE.2017.6648
Abstract: The basic study of this paper provides information about one of the buzz word what we are familiarly known and using in our daily use is �Internet�. Internet is one of the major resource we can see everywhere. Here, the internet in its daily life is continuously changing and evaluating in all fields and areas. We are mainly focusing on one of the field in the IT (Information Technology) is �Internet of Things (IoT)�. The things what we considering by using Internet, is giving all the sources to everyone. The term Internet of Things considered as the future evaluation of internet that has machine to machine learning. IoT is providing a connectivity services to everyone and everything. Here, in this basic review, the paper addresses about the services about the Internet of Things that are most important like Trends, applications, current details about IoT etc. In each and every aspect of how the population, technologies, new fields in IT etc. Growing day by day the Internet of Things is becoming challenging towards every aspect. In the coming years, IoT is expected to bridge technologies with new applications by using physical objects with decision making intelligent system. Because,� The sky is not at the Limit. It�s just only beginning of Internet of Things (IoT)�.
Keywords: IoT; Trends; Challenges; Future IoT.
Abstract
A Survey: Security in Patient Data Communication using Cryptographic Algorithm
Prof. Dr. R. S. Kawitkar, Nikita S. Karekar
DOI: 10.17148/IJARCCE.2017.6649
Abstract: Wireless medical sensor networks are more vulnerable to many more attacks than the wired networks. Mobile Ad-Hoc Networks (MANETs) are particularly useful and well-suited for critical scenarios, including healthcare applications, home patient monitoring, military. MANET has number of routing protocols Ad hoc On-Demand Distance Vector (AODV) routing protocol is one of them which is the most suitable protocol for healthcare application purpose. In this project we are considering as a base protocol. Here the practical approach to prevent the inside attacks in the healthcare applications from attackers. We provide the security to the network layer by using encryption and decryption standards and a cryptographic mechanisms such as Advance Encryption Standard (AES), Rivest-Shamir-Adleman Algorithm (RSA) and Secure Hash Algorithm (SHA). Network Simulator Software (NS2) has used for the simulation purpose.
Keywords: Ad-hoc on-Demand Distance Vector, AES, RSA, SHA.
Abstract
A Survey: Digital Audio Watermark Designed Methods
Prof. Y.D. Chincholkar, Dr. S.R. Ganorkar, Shalaka Pravin Kude
DOI: 10.17148/IJARCCE.2017.6650
Abstract: Audio watermarking is becoming a popular method in digital processing because it has the capability to secure the audios by embedding watermarks in them. Audio watermarking is getting to be distinctly a prominent strategy in advanced digital image processing since it has the ability to secure the audios by infusing watermarks in them. This paper is survey on a various watermarking methods.
Keywords: Audio watermarking, DCT, DWT, de-synchronization.
Abstract
Tomato Plant Disease Detection using Image Processing
Sagar Vetal, R.S. Khule
DOI: 10.17148/IJARCCE.2017.6651
Abstract: Agriculture is the major sector in India. About 58% of the rural livelihood influenced by in agriculture. Out of which tomato is one of the common food crops in India. Due to which detection of disease on tomato plant becomes important because less susceptibility. The plants productivity gets affected if proper care is not taken. Image processing is one of upbringing technology which is helping to resolve such issues with various algorithms and techniques. Most of the diseases of tomato plant detected at initial stages as they affects leaves first. By detecting the diseases at initial stage on leaves will surely avoid impending loss. In this paper four key diseases are identified using image segmentation and Multi-class SVM algorithm. For parting of damaged area on leaves image segmentation is used and for classification of accurate disease Multi-class SVM algorithm is used. In last stage symptoms and treatment to detected diseases recommended user.
Keywords: Tomato; Plant disease; Image segmentation; Multi-class SVM.
Abstract
CORDIC based Architecture of FFT for Orthogonal Frequency-Division Multiplexing Receiver
Sushma. U. Bhover, Mehrunnisa .S.P
DOI: 10.17148/IJARCCE.2017.6652
Abstract: This project is an attempt to develop a MIMO based Orthogonal Frequency Division Multiplexing (OFDM) using a CORDIC based FFT implementation. FFT acts as the very important block of the OFDM communication. As the computations are carried out on the hardware for any communication algorithms the computational complexity has to be low. A Multi Input Multi output OFDM implementation is carried out using the CORDIC based FFT algorithm in order to reduce the computational complexity in the OFDM algorithm. Matlab based implementation is carried out and the results are tabulated and discussed. The analysis of this algorithm is carried out with performance analysis.
Keywords: CORDIC, FFT, MIMO, OFDM.
Abstract
Power and Area Efficient High Speed Squaring Circuit using Vedic Mathematical Techniques
Gumpina Vakula Rani, Dr. Bhaskar Reddy
DOI: 10.17148/IJARCCE.2017.6653
Abstract: Vedic Mathematics is an ancient practice which has a unique procedures based on the sixteen Sutras dealing with the different branches of mathematics viz., arithmetic, calculus, algebra, geometry etc. The interest for high speed processing has been growing as an effect of wide computer processing applications. Very efficient math operations are important to accomplish the desired performance in several real-time systems such as Cryptography and Image Processing. Squaring is one of the key arithmetic operations in many applications like finding the transforms or the inverse transforms in signal processing and the development of fast squaring circuit has been a subject of interest over decades. The key requirements for many applications are to reduce the time delay and power consumption for many applications. In this paper, we have proposed power and area efficient fast squaring circuit using Vedic Multiplier and the proposed dsign is compared with the Vedic Multiplier and squaring circuits. The functionality of this circuit is verified and performance evaluation is done using Xilinx ISE design Suite 14.4 on target device xc5vlx20t-2ff363.
Keywords: Vedic Mathematics, Vedic multiplier, Squaring Circuit, Carry Save Adder, Shifter, Combinational Path Delay, Slices, Digital signal processors.
Abstract
A Probabilistic Model for Object based Foreground Segmentation from Multimedia
Mr. P. Thangaraju, M.Sc., MCA, M. Phil., PGDCA, Mrs. R. Nanthini., M.Sc., B.Ed.,
DOI: 10.17148/IJARCCE.2017.6654
Abstract: The image processing is used for video segmentation, the inherent unreliability of frequently results in corrupted video packets and jitter during video playback. Such a deviation is especially pronounced in processing of videos due to the fading and multipath interference impediments in image processing. Algorithm based video transmission provides reliability at the cost of severely increased delay arising from frequent retransmissions in case of packet error over constraints from session and application layers for in-sequence delivery. These delays are substantially worsened in low SNR (signal-to-noise power ratio) environments. Multiple connections, which efficiently utilize the bandwidth of the channel, have been demonstrated to yield significantly improved quality of video segmentation over image processing while enhancing the reliability of video delivery compared to methods. It proposes new scalable classified adaptive bit rate video coding over heterogeneity atmosphere for reliable video segmentation while reducing the delay and jitter of video foreground subtraction.
Keywords: Bandwidth, Error Control, Overhead, SNR, Prioritization, Video Segmentation, Foreground Subtraction.
Abstract
Web based Clinical Data Management System
Parimal Tergundi, Prajnya Baliga, Nilam Kamble, Poonam Patil, Nikita Raval
DOI: 10.17148/IJARCCE.2017.6655
Abstract: Web Based Clinical Data Management System� mainly keeps track of all the patient records of the patients that have taken services from the hospital that uses this system. All the work that was done manually before, like making appointments, storing patient data, getting test reports from test centres, etc. can be done using this system. Apart from these features, the system also reduces manual work on the admin by generating reports like the collection of money made for the day and the number of patients that came into the hospital to endure services for a given day. Moreover the entire project is a web based application, thereby making resources like test reports, patient symptoms and prescriptions available to the doctor in real-time. As it is web based, information stored in the server is easily accessible anywhere and at anytime. Resources can be easily managed and maintained with this system. It provides status of every resource which helps administrators and other staff using this system to manage them effectively and efficiently.
Keywords: Management, Automation, Clinical, Web.
Abstract
A Machine Learning Based Approach for Early Detection of Alzheimer’s Disease by Extracting Texture and Shape Features of the Hippocampus Region from MRI Scans
Arpita Raut, Vipul Dalal
DOI: 10.17148/IJARCCE.2017.6656
Abstract: Alzheimer�s Disease (AD) is a neurological disease and the most common cause of dementia in the age group 65 years and above. The accurate and timely diagnosis of the AD is crucial in order to prevent the progression of this irreversible disease. This paper concentrates on a method to detect Alzheimer�s from MRI scans using machine learning approach. The proposed approach focuses on the hippocampal region of the brain. The texture features such as entropy, homogeneity, energy, contrast, correlation and variance are extracted from the hippocampus region using the Gray Level Co-Occurrence Matrix (GLCM). The area and shape feature are extracted using the Moment Invariants. The Error-back Propagation (EBP) in Artificial Neural Network (ANN) is used as the classifier for detection of various stages of AD. The proposed system gives an average accuracy of 86.8%.
Keywords: Alzheimer�s Disease (AD), Gray Level Co-Occurrence Matrix (GLCM), Artificial Neural Network (ANN).
Abstract
A Review on Microstrip Antennas Integrated with EBG Structure
Mrs. Kirti Varma, Prof. Atmeshkumar Patel
DOI: 10.17148/IJARCCE.2017.6657
Abstract: This paper contains, developing and employing methods to reduce the mutual coupling between elements of an antenna array. The utilization of electromagnetic band-gap (EBG) structures is an attractive way to reduce surface wave excitation in printed antenna geometries so to mitigate the mutual coupling problem. This paper investigates the performance of a microstrip antenna phased array embedded in an EBG. The band-gap feature of surface-wave suppression is demonstrated by plotting variations of the transmission coefficient S12 with frequency and dispersion diagram. The antenna design is verified by High Frequency Structural Simulator (HFSS), the simulating results show that the EBG design approach is a good candidate for a reduction in mutual coupling at certain frequencies between radiator elements, which in turn increases antenna directivity. Its band-gap feature of surface-wave suppression is demonstrated by exhibiting the near field distributions of the electromagnetic waves. The mutual coupling of microstrip antennas is parametrically investigated, including the E and H coupling directions, different substrate thickness, and various dielectric constants. It is observed that the E-plane coupled microstrip antenna array on a thick and high permittivity substrate has a strong mutual coupling due to the pronounced surface waves. Therefore, an EBG structure is inserted between array elements to reduce the mutual coupling.
Keywords: Electromagnetic band-gap (EBG), High Frequency Structural Simulator (HFSS), microstrip antennas, mutual coupling, surface wave.
Abstract
Advance Car Alarming System for Fatigue Detection during Driving using MATLAB
Mr. Shreyas Deshmukh, Mr. C.N. Bhoyar
DOI: 10.17148/IJARCCE.2017.6658
Abstract: The objective of this project is to design an Accident Prevention System which supports in preventing or avoiding accidents. The driver is more disposed to to accidents due to drowsiness and the disturbing intruders. Driver fatigue is one of the supreme common reasons for deadly road accidents around the world. This shows that in the transportation industry especially, where a driver of a heavy vehicle is often exposed to hours of monotonous driving which causes fatigue without frequent rest period. Driver inattention is one of the main causes of traffic accidents. There are lots of approaches and among them computer vision has the potential of monitoring the person behind the wheel without interfering with his driving. The computer vision system for driving monitoring uses face location and tracking as the first processing stage. In the next stage the different facial features are extracted and tracked for monitoring the driver�s vigilance. Under this project we will develop a system that can monitor the alertness of drivers in order to prevent people from falling asleep at the wheel System creatively reduces accidents due to drivers� fatigue by focusing on treating the driver later than fatigue has been detect to achieve decline in accident. This paper reviews driver�s fatigue monitoring techniques in detail.
Keywords: Automatic buzzer system, Distraction detection Drowsiness, fatigue.
Abstract
Model and Fabrication of CNC Plotter Machine
Udit Pandey, Swapnil Raj Sharma
DOI: 10.17148/IJARCCE.2017.6659
Abstract: Today the Growth of Technology and utilization of CNC machine are Rapid increased. The idea Behind Our Project is to Design a CNC plotter machine with using Arduino and CNC shield, it is capable to design machine mechanical parts and 2d design. This is fabrication of low cost CNC Machine and decreased cost and complexity. This Paper is help to design and fabrication of mini CNC Plotter Machine. In this machine only G codes are used to command or instructions. G codes are language, by using this person Told computer control machine tool. The CNC machine is design 3d objects in 2d paper. We have also used CNC Plotter Machine for 3d Printing.
Keywords: CNC Shield, SMPS, Arduino Board, Arduino Drivers, G Codes
Abstract
IoT Based Smart Home Automation for Windows using CoAP
Pravin Sunil Khillare, Prof. Dr. Mrs. Dipashree M. Bhalerao
DOI: 10.17148/IJARCCE.2017.6660
Abstract: Internet of things(IoT) is smart network technique where smart devices or smart things connected through internet through IP address. IoT is smart standardization technology that provides stacks for machine-to-machine(M2M) communication. In the smart home the IoT devices controls & monitors the electronics & mechanical systems used in smart home. Mobile application is used for the interfacing of home devices with the user. The IoT allows the mobile device to control & operate the household devices remotely from anywhere around the world using internet. For the interconnection between the device & user a Wi-Fi model, Zig-Bee or a Bluetooth is used. The sole purpose of this project is to develop a system that will provide remote control of home appliances and also provide security against the mishaps when the home host is not present, to assist the handicapped/old aged people at house through the use of internet.
Keywords: Internet of Things(IoT), Wi-Fi, Raspberry Pi, CoAP, Home Automation.
Abstract
Decision Support System in Corporate Intelligence
Monika Varshney, Dr. Azad Kumar Srivastava
DOI: 10.17148/IJARCCE.2017.6661
Abstract: A Decision Support System (DSS) is a computer-based information system that supports business or corporate organizational decision-making activities. DSSs serve the management, operations, and planning levels of an organization (usually mid and higher management) and help to make decisions. Corporate intelligence represents the tools and systems that play a key role in the strategic planning process within a corporation. These Business Intelligence systems allow a company to gather, store, access and analyze corporate data to aid in decision-making. Generally these systems will illustrate business intelligence in the areas of customer profiling, customer support, market research, market segmentation, product profitability, statistical analysis, and inventory and distribution analysis just to name a few. This paper presents a relationship between decision support system and corporate intelligence to find out the true picture of business parameters, to plan strategies for the future and direct business resources towards achieving growth potential.
Keywords: Decision Support System; Corporate Intelligence; Decision Making; Information System; Data Analysis.
Abstract
Cataract Detection
Mayur R Yadav, Prof. N. M. Wagdarikar
DOI: 10.17148/IJARCCE.2017.6662
Abstract: The percentage of blindness in today�s world above the age of 65 is 78% out of which more than 55% of people are blind because they are suffering from cataract. The lens in the human eye enables one to see. It is made up of water and some proteins. It is normally transparent. But when a person is suffering from cataract, the lens losses its transparency and is formed when the protein clumps together and clouds the lens due to which the lens loses its transparency and the person is not able to see as the light cannot reach the eye. Cataract is the leading cause of blindness all over the world especially in senior citizens. Its initial symptoms are watering of eyes, blurred view, white spot can be seen in the eye.
Keywords: cataract, immature, mature, hypermature.
Abstract
Cloud Computing and Its Technologies: A Survey
Mohd Saleem
DOI: 10.17148/IJARCCE.2017.6663
Abstract: Cloud computing play a big role in today business environment. It provides on-demand services. Here we provide what actually cloud computing is and it�s various computing technologies and their characteristics.
Keywords: Cloud computing, Architecture, computing technologies, characteristics.
Abstract
Embedded System Development Life Cycle- An Iterative Approach
Vishesh S, Nagashree KV, Rachana BR, Poojashree AP, Rupa, Navamallika N
DOI: 10.17148/IJARCCE.2017.6664
Abstract: The Embedded System Product Development Life Cycle consist of different phases � Requirement analysis, Feasibility analysis, Design & Implementation, Integration & Testing, product release & Marketing and Operations, Maintenance & Upgrade. In the Embedded System Development Life Cycle there is a partition of responsibility or duties between Hardware development and Software development team. They work in parallel and in harmony. They unite or integrate after the design stage of Embedded System Development Life Cycle. Testing/ debugging needs to be done to make the product an instant hit/ free of bugs. We carryout functional testing, performance testing, security testing, usability testing, compatibility testing and recoverability testing. In this paper we will be dealing in detail, the tail stages of embedded system development life cycle. We consider the product that we have designed and carryout numerous iterations in these blocks to make the product more acceptable in the market based on various criticisms by the user, at the market place, seller etc�. The Embedded system development life cycle allows the vendor or manufacturer to introspect on various aspects, considerations, reviews and facets; hence, it is a flexible model and also reduces the cost, time to market and complexities.
Keywords: Embedded System Product Development Life Cycle, Requirement analysis, Feasibility analysis, Design & Implementation, Integration & Testing, product release & Marketing, Operations, Maintenance & Upgrade, functional testing, performance testing, security testing, usability testing, compatibility testing and recoverability testing, flexible model, cost, time to market and complexities.
Abstract
The NBRDETP: Neighbor Node Detection and Prediction Technique for Energy Efficient Routing with Leach Protocol in WSN
Navjot Kaur, Jatinder Kumar
DOI: 10.17148/IJARCCE.2017.6665
Abstract: In this paper, cluster head and vice cluster head selection is discussed and a method of energy efficient routing is presented based on both NBRDETP and V-LEACH protocol. Performance comparison with existing leach protocol shows proposed protocol provides better performance to minimize energy dissipation in the transmission and increases the life time of the wireless sensor networks, also other comparative performance metrics like End to End delay, data transmitted and total energy consumed shows proposed protocol provides better performance in comparison to existing leach protocol.
Keywords: PSO, NBRDETP, WSN, Vleach.
Abstract
Capacity Improvement for Multi-Tier 5G Networks
Haitham Al Fatli
DOI: 10.17148/IJARCCE.2017.6666
Abstract: Recently, there is a significant need of fastest wireless networks for 5G. Radio resource and interference management are the biggest challenges in multi-tier and heterogeneous 5G cellular networks. In this project, the capacity of 5G network is enhanced by resource and interference management algorithm. The simulation is carried on MIMO channel using QPSK modulation technique. The simulation result of joint distributed cell association and power control (CAPC) methods resulted into maximum system throughput, less energy consumption, less delay, less latency and balance traffic loads- It also requires less signal-to-interference ratio (SIR) for high priority users.
Keywords: Cell Association, Resource, Interference, 5G Networks, CAPC, Wireless Networks.
Abstract
Implementation of Virtual Router in User Space by Bypassing the Kernel using Snabb
Pranav Gokhale, Hrishikesh Kulkarni, Surajkumar Gunjal, Akshay Abhang
DOI: 10.17148/IJARCCE.2017.6667
Abstract: As network adapters get faster, the time between packets i.e. the time the kernel has to process each packet gets smaller. That does not leave a lot of time for kernel to figure out what to do with each packet. The kernel has traditionally not done a great job with this kind of network-intensive workload. This is due to the latency of multiple system calls involved while an application reads packets from the network interface. This has led to existence of a number of networking implementations that bypass the kernel's network stack entirely. We use Snabb which is one of many such implementations. Snabb allows us to build our own network design on top of the Snabb core, bypassing the kernel. Our virtual router is built on top of Snabb. The virtual router runs in user space and also bypasses the kernel entirely. This capability allows us to make fast and intelligent forwarding decisions in the virtual router. This is suitable for dedicated servers which have high network traffic and require fast packet forwarding.
Keywords: Software Defined Networking, Kernel bypass, Fast packet processing, Snabb.
Abstract
Fairness Queue for Energy Efficient Data Transmission in Wireless Sensor Network
Durga S. Nikam, Prof. M. M. Wankhade
DOI: 10.17148/IJARCCE.2017.6668
Abstract: Wireless sensor network gain enormous attention because of increase need of wireless sensing for application like weather forecasting, industrial automation. Deploying wireless networks on the same area get advantage. WSN lifetime is expected to be extended by cooperative packet sending across huge wireless sensor network. But WSN designer do not consider the heterogeneity in the characteristics of each WSN such as battery capacity, operation start time, and the number of sensor nodes, nodes locations, energy power consumption, packet size and/or data transmission timing, and route discovery. Clustering is a useful and practical solution for wireless sensor communication with low energy resources. The proposed system performance of WSNs. Proposed system implements solution for secure data transmission in cluster based network, where clusters are assigned and updated periodically. The energy pool is used as broker for fair cooperation. In order to energy efficient packet transmission in wireless network this system implements systematic and novel way of fairness driven queue management scheme. Fairness based queue management scheme helps to network traffic control by monitoring UDP data packet among clustered wireless communication. In order to overcome malicious packets transmission in the network, proposed system uses Identity based online and Identity based Online/Offline security mechanism. This help to avoid threats and its causes for drastic damage to the network. Proposed work improves a network security which targets at detection and prevention, compromised nodes detection energy hole attacks in wireless network.
Keywords: Wireless Sensor Networks, IBS and IBOOS convention, Key Management.
Abstract
Vertical Handoff Optimization in 4G Heterogeneous Networks
Alka Kamra
DOI: 10.17148/IJARCCE.2017.6669
Abstract: Wimax and Wifi are the telecommunication technologies that offer transmission of wireless data via a number of transmission methods such as portable or fully mobile internet access via point to multipoint links. As the size of a Wireless Network is much vast the complete network is divided into clusters. Each cluster has a cluster head that controls all nodes of the network. These networks can have a node with the mobility. The problem begins when a node moves from the cluster to outside the range of a Cluster head. In such case, the control of that node is shifted to other Cluster Head. This process is called handoff mechanism. The proposed system is the scheme to select the best cluster head for this node respective to the reliability and efficiency. The proposed work is the selection of cluster head in case of heterogeneous network. Here the heterogeneity is defined in terms of two different networks these are Wimax and Wifi Networks. The process of handover between these networks is called vertical handover. This paper tells us how to minimize the vertical handover. In this work we have done the basic changes while performing the selection of base station.
Keywords: Wimax, Wifi, Cluster, Cluster Head, Handoff Mechanism, Heterogeneous Networks.
Abstract
Integration of Mobile Ad Hoc Networks in 4G Networks
Nupur Soni
DOI: 10.17148/IJARCCE.2017.6670
Abstract: This Fourth-generation wireless networks may require an integration of mobile ad hoc networks (MANET) into external network to enhance the flexibility of the communication and roaming. This phenomenon is well-suited for commercial and military applications which yield additional benefit of roaming. However, integration of MANET with external network poses a serious security challenge for communication because of open and distributed nature of the ad hoc network. This paper discusses about the 4 G network architecture, its challenges and finally the use of manet in 4G networks.
Keywords: internet working, MANET, multimode end user terminal, QoS.
Abstract
A Systematic Literature Review on Software Reliability Estimation Model for Measuring the Effectiveness of Object Oriented Design
Surabhi Saxena, Dr. Devendra Agarwal
DOI: 10.17148/IJARCCE.2017.6671
Abstract: Software Reliability is one of the most important quality indicator for software development life cycle process. It is perfectly measured and support to increase the development process. Somewhere the software quality depends upon the reliable measurement. A number of software reliability theories have been published in different types of journals by researcher and practitioners. On the other hand reliability is a always big questions in complex system. This research paper shows the outcomes of a systematic literature review conducted on software reliability of object oriented design.
Keywords: Software Reliability, Software Reliability estimation model, Object Oriented design, Industrial Perspective.
Abstract
Key Aggregate Searchable Encryption for Group Data Sharing along with Duplication Detection on Cloud
Soniya L. Barkade, Nagaraju Bogiri
DOI: 10.17148/IJARCCE.2017.6672
Abstract: Data sharing is an critical functionality in cloud garage. In this article, we display a way to securely, efficiently, and flexibly share information with others in cloud garage. We describe new public-key cryptosystems which produce steady-size ciphertexts such that green delegation of decryption rights for any set of ciphertexts are possible. The novelty is that possible aggregate any set of secret keys and lead them to as compact as a single key, however encompassing the electricity of all of the keys being aggregated. In other phrases, the secret key holder can launch a constant-size mixture key for flexible alternatives of ciphertext set in cloud storage; however the different encrypted files outside the set stay private. This compact mixture key can be conveniently despatched to others or be saved in a clever card with very limited comfortable storage. We offer formal security evaluation of our schemes inside the trendy version. We additionally describe other utility of our schemes. In precise, our schemes provide the first public-key patient-controlled encryption for bendy hierarchy, which turned into but to be acknowledged.
Keywords: Searchable Encryption, Data Sharing, Cloud Storage, Data Privacy.
Abstract
Android Application Implemented for Distance Measurement using Image Processing
Mr. Ghumare Amar Ashok, Dr. Jadhavar, Prof. Mulajkar R.M
DOI: 10.17148/IJARCCE.2017.6673
Abstract: Now a day�s multiple images special photographing poses methods are used to measure the distance from the real world, these methods are able to measure the height with a special view configuration but not enough to measure the depth, ground distance from the real time. We propose a novel image-based method that can measure various types of distance from a single image captured by a smart mobile device. The embedded accelerometer is used to determine the view orientation of the device. In this system pixels can be back-projected to the ground; there are many efficient calibration methods using two known distances. Then the distance in a pixel is transformed to a real distance in centimeter with a linear model parameterized by the magnification ratio. Various types of distance specified in the image can be computed accordingly.
Keywords: Android mobile, Accelerometer, Image processing.
Abstract
Indoor CO2 Monitoring using Cognitive Wireless Sensor Networks
Kawaljeet Kaur, Neetu Gupta
DOI: 10.17148/IJARCCE.2017.6674
Abstract: As we know, many air buildings are built and the ventilators are not work in timely manner and also less. Indoor air quality become an issue in recent years because it directly relates to human health. Therefore the clean air is essential especially when it comes to indoor air. To mitigate this worriment, the wireless sensor networks (WSNs) have the dormant. Wireless sensor networks are easy to afford and implement. Indoor carbon dioxide measuring is very necessary because at inside environment, its concentration is more than outside environment due to limited space. This paper aims to monitor the carbon dioxide gas through wireless sensors networks. Their causes and impacts on human health are also discussed. The paper represents the benefits of cognitive WSNs over conventional WSNs. It also shows the opportunistic routing protocol used for data routing is helps to transmit data at destination in timely manner and framework for data processing are used to transmit only useful information.
Keywords: Indoor air quality (IAQ), carbon dioxide, Cognitive wireless sensor networks (CWSNs), green house gas, CNOR.
Abstract
MUCH: Multi-Criteria Cluster Head Delegation Based on Fuzzy Logic
Mohammad Houssein Ghosn, Alia Ghaddar
DOI: 10.17148/IJARCCE.2017.6675
Abstract: WSNs are composed of limited-power sensors. Replacing or recharging sensors, especially when deployed in places where human intervention is risky, is an important challenge. Therefore, and since communication is the major energy consuming operation [1], ensuring an energy efficient usage is a major concern. Clustering is one of the techniques used for this purpose [2]. It decreases the number of sensors which take part in transmission thereby assist in power consumption [3]. The sensors are organized into clusters. Each Cluster has a Cluster Head (CH) to which only other cluster members send data. CHs gather information and send it to a base station for processing. We propose an method for CH selection based on multiple criteria (distance to base station, distance to cluster members, energy cost and number of rounds) using fuzzy logic. Simulation results show that MUCH decreases the energy consumption comparing to LEACH thus increases the network lifetime.
Keywords: Wireless sensor networks, Clustering, Energy Consumption, Fuzzy logic, Cluster-head election.
Abstract
Security Framework for Sharing Data in Fog Computing
V.K. Sowjanya
DOI: 10.17148/IJARCCE.2017.6676
Abstract: Cloud computing is an attractive criterion for accessing virtually unlimited storage and computational resources. Cloud computing has many advantage, but providing the data confidentiality in the cloud is major concern. The major disadvantages in the cloud computing is high latency, limited mobility, slow response time because data is transferred through Multiple hops. And it is centralized Geo-distribution. In Our System, we propose the Fog computing which address the above problems faced by cloud computing. Fog computing is a criterion which extends the cloud computing and its services to the network edge. It can�t replace cloud. It extends the cloud computing by providing the security in the cloud atmosphere. Fog has many advantages when compared to the cloud i.e., less data traffic, low cost and latency. It also eliminates the overhead to the centralized computing system, and security is high because data moves across the edge of the network so response is quick. Still there are many advantageous in fog computing, but some of the security issues also taken into consideration while transferring the data. In our system we focus on providing the security to the data while transferred via cloud. Here Outsourcer sends the encrypted data along generated key (cipher key/encrypted key) to the data user via Fog Server. Using that encryption key the user decryption is performed and then viewed the original data. This Cipher key is generated by the Modified ELGAMAL algorithm which provides the better security than the existing algorithm.
Keywords: Fog Computing, Cryptography, ElGamal, Cipher key.
Abstract
Comparison of Routing Algorithms using Riverbed Modeler
Suraj Wandile, Rohit Zende, Siddhant Sribhashyam, Mrs. M. R. Kale, Mr. R. C. Jaiswal
DOI: 10.17148/IJARCCE.2017.6677
Abstract: One of the vital practice in the internet is routing of data packets. A routing protocol specifies the method of communication among routers used in the inter connection of networks. A routing table in the memory of a router keeps track of routes to particular network destination. There are varios routing protocols which have application on the internet like Routing Information Protocol (RIPv2), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (EIGRP), Intermediate System To Intermediate System (IS-IS), etc. Every single protocol has its unique way of packet routing. This paper presents a simple relative study of RIP, OSPF, EIGRP and IS-IS dynamic routing protocols. The Routing Information Protocol (RIP) comes under the distance vector algorithm while Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol, the Open Shortest Path First Protocol (OSPF) is a link state routing algorithm. Intermediate System to Intermediate System (IS-IS) regulates the superlative route for information through a packet-switched network. The crucial objective of this research work is to illustrate the comparitive performance analysis of dynamic routing protocols and redistribution among the protocols. Cisco routers were used in our simulated network topology.
Keywords: Routing Protocols, Topology, Convergence, Comparison.
Abstract
Approaches and Methods for Steganalysis – A Survey
L. Rathika, B. Loganathan
DOI: 10.17148/IJARCCE.2017.6678
Abstract: Information security is the main concern of current scenario, which has a number of approaches to preserve data via cryptography, watermarking, steganography techniques. One such approach may always create a negative impact on all the process, which involves with vulnerable activities such as malicious and harmful content spreading by embedding. To identify such content, steganalysis has been performed. The counter technique of image steganography is called as image steganalysis, which begins by recognizing the object that exists in the embedded source file. This paper gives a survey of the approaches and techniques, tools used in steganalysis. This paper also makes the discussion about the problems of those techniques in the real-time analysis.
Keywords: Data security, Steganalysis, Steganography, Image Processing, Pixel-Decimation.
Abstract
A Study on Detection of Misbehaving Nodes in Ad Hoc Routing
Monika Jatiwal, Parul Tomar
DOI: 10.17148/IJARCCE.2017.6679
Abstract: Adhoc network is a collection of wireless networks. Each node communicate in a radio communication range. A MANET is a group of multi-hop wireless adhoc networks. Each node transfer the message to the other node through the wireless networks. This network is not fully secured so there are more chances of attacker .The success of mobile adhoc network depends on people�s confidence in its security. To identify the malicious node different techniques are used. This paper is going to deal with the malicious node for secure data transmissions.
Keywords: MANET, Adhoc network, malicious node, data transmissions, wireless networks.
Abstract
Optimal Design of Low Pass Filter by Hamming, Hanning and Kaiser Technique
Akanksha Mahto, Muskan Chaubey, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.6680
Abstract: In DSP application digital filter plays vital role. Therefore, digital filtering is one of the basic needs of digital signal processing. Digital filtering plays a significant role in the world of technology. Therefore, processing of input signal has to be done to get useful or wanted signal. This paper deals with the design of finite impulse response digital filter using window techniques the design based on MATLAB simulation. Through this paper the intricacies of the window methods are explained in a simple and a suitable manner. In this paper the comparative performance analysis of proposed filter are done with respect to Magnitude, Phase and Impulse. From simulation it is observed that Kaiser window shows better response in compare with other technique i.e. Hamming and Hanning.
Keywords: FIR Filter, DSP, Hamming Window, Hanning, Window, Kaiser Window, MATLAB, frequency sampling, amplitude-frequency.
Abstract
Multi Kernel Boosting Algorithm for Image Segmentation and Analysis
S. Sanjuna
DOI: 10.17148/IJARCCE.2017.6681
Abstract: The bootstrap learning algorithm for salient object detection in which both weak and strong models are exploited. First, a weak saliency map is constructed based on image priors to generate training samples for a strong model. Second, a strong classifier based on samples directly from an input image is learned to detect salient pixels. Results from multiscale saliency maps are integrated to further improve the detection performance. The proposes a novel framework to improve the saliency detection performance of an existing saliency model, which is used to generate the initial saliency map. First, a novel regional descriptor consisting of regional self-information, regional variance, and regional contrast on a number of features with local, global, and border context is proposed to describe the segmented regions at multiple scales. Then, regarding saliency computation as a regression problem, a multiple kernel boosting method based on support vector regression (MKB-SVR) is proposed to generate the complementary saliency map. Finally, an adaptive fusion method via learning a quality prediction model for saliency maps is proposed to effectively fuse the initial saliency map with the complementary saliency map and obtain the final saliency map with improvement on saliency detection performance. Experimental results on two public datasets with the state-of-the-art saliency models validate that the proposed method consistently improves the saliency detection performance of various saliency models.
Keywords: saliency detection, saliency map, saliency computation, multiple kernel boosting, adaptive fusion.
Abstract
A Study of Phishing URL Detection using Apriori and FP-Tree algorithm
Vaishali Jaiswal, Dr. Pramod Nair
DOI: 10.17148/IJARCCE.2017.6682
Abstract: The internet becomes a primary need or the part of daily life. A significant amount of growth of internet users is observed in recent years. In the similar ratio the internet frauds and phishing cases are also observed. In order to prevent these issues the user awareness is required. In addition of that various anti-phishing tools are also used to identify the phishing cases. There are a number of techniques available for detection of phishing URLs and prevent them to open in the user's browser. In this presented work the data mining technique based phishing URL detection technique is investigated. The data mining approaches are always first evaluating the historical data to recover the patterns to recognize and then the concluded knowledge is used for application. In the similar manner the phish tank data is used to recover the patterns and the mixed data is used for classification performance demonstration. In the proposed work first using the phishing URLs the significance of the URL is estimated. This phase is termed as a feature computation phase. After finding the features the entire URLs are encoded on the basis of these features and a transactional database is prepared. After this the association rule mining algorithms are applied to the dataset. In this experiment the Apriori algorithm and FP-Tree algorithm is used for computing the association rules. These association rules are further utilized for detection of phishing URLs. The implementation of this technique is performed on JAVA technology. After implementation the experimental results with increasing amount of data are performed. The result shows the increasing amount of data for classification impact on the performance of both the algorithms. But the FP-Tree algorithm provides efficient and accurate results as compared to the Apriori algorithm.
Keywords: phishing detection, URL analysis, FP-Tree, Apriori Algorithm, Data mining technique.
Abstract
A Comparative Analysis of Clustering Approach for Predicting Road Traffic Accident Dataset
Srividhya, Mr. C. Palanichamy
DOI: 10.17148/IJARCCE.2017.6683
Abstract: Road traffic accidents are the majority and severe issue, it results death and injuries of various levels. The traffic control system is one of the main areas, where critical data regarding the society is noted and kept as secured. Various issues of a traffic system like vehicle accidents, traffic volumes and deliberations are recorded at different levels. In connection to this, the accident severities are launched from road traffic accident database. Road traffic accident databases provide the origin for road traffic accident analysis. In this research work, road accident dataset is taken to consideration, the city having higher number of vehicles and traffic and the city having higher number of vehicles and traffic and the cost of these loss and accidents has a great impact on the socioeconomic growth of a society. Traditional machine learning algorithms are used for developing a decision support system to handle road traffic accident analysis. The algorithms such as k-means, Gaussian mixture model and Hierarchical clustering are implemented in MATLAB the result of these algorithms were compared. In this work, the algorithms were tested on a sample database of more than thousand five hundred items, each with 5 accident attributes. And the final result proves that the hierarchical algorithm was accurate and provides 99%.
Keywords: Data Mining, Gaussian mixture model, Hierarchical clustering, k-means, Road Accident data set.
Abstract
Design of a Modified Carry Select Adder with Single Fault Tolerant Architecture
C M Aiswarya, Shanil Mohamed N
DOI: 10.17148/IJARCCE.2017.6684
Abstract: In the era of deep sub-micron technology, probability of chip failure has been increased with increase in chip density. A system must be fault tolerant to decrease the failure rate and increase the reliability of it. The major bases of VLSI areas are low power, high speed and data logic design. Adder forms the integral part of ALU. Different algorithm in digital signal processing such as FIR and IIR are also employed using adder. Advance result can be calculated by using possible values of input carry 0 and 1. Here carry select adder is modified with BEC and Brent kung adder. In addition triple fault tolerant architecture is implemented in the modified carry select adder. Multiple faults can affect a system simultaneously and there is a trade of between area overhead and number of faults tolerated. The proposed system models fault tolerant architecture design for modified carry select adder and a conditional sum adder as fast adder assuming single double and triple faults.
Keywords: ALU, BEC, BK.
Abstract
Comprehensive Architecture for Securing Information Disseminated by Wearable Devices in Health Informatics
Dr. Badr Almutairi, Dr. Abdulgader Almutairi
DOI: 10.17148/IJARCCE.2017.6685
Abstract: Health information is one of the most critical data to manage and disseminate. Securing this information is a big challenge. Many vendors today are providing wearable devices, which collect different information and display them to the end-user, but the information provided by these wearable devices is not secured and encrypted. Information is extracted from various variable devices having different sensors to extract specific information from the human body. This information is further stored on the web servers which hold the records of individuals. Securing the dissemination of information from wearable devices to the web servers is a big challenge in the wearable industry today. In this research project, we are focusing on designing a comprehensive architecture for securing information dissemination and management of the end-users� health data. We will be using optimization and encryption algorithms to protect the privacy of information which is being disseminated by wearable devices to the web servers which hold critical data related to the end-users. Our research project will collect data from various wearable devices and convert it to XML data sheets which, in turn, will help in information collaboration between various application software applications available for health information management.
Keywords: Security;Optimizatin; Encryption; Wearable Devices ; Health Information; XML.
Abstract
Fusion-Identity Based Encryption with the Outsourced Withdraw in the Cloud Computing
Ashwini Bhosale, S.T. Singh and Prema Sahane
DOI: 10.17148/IJARCCE.2017.6686
Abstract: Cloud computing frequently introduce as the cloud is the delivery of on the demand computing resources everything from the applications to data centers above an internet on pay for use. The Cloud based applications rundown infrastructure and IT expense, growth accessibility, enable collaboration, and allow organizations more freedom in customizing their products. User or multi user data sharing should be secure and integrity should be derived on cloud. To achieve the data security the methods like IBE (Identity Based Encryption) and ABE (Attribute Based Encryption) are widely used in cloud computing environment. Still, the complication corresponding with IBE (Identity Based Encryption). The Private Key Generator is compromised all messages protected over the whole lifetime of the public-private key couple used by that server are also compromised. This makes the PKG an high-value target to adversaries. To limit the exposure due to an compromised server, the master private-public key couple could be updat with a new independent key couple. Still, this is an found the key-management problem where all the users must have been the most recent the public key for the server. From the recent studies, there are two main research problems for cloud computing security such as security improvement using IBE and efficient ABE withdraw process. The cause of this paper is to present framework to address both this research challenges. In this paper new fusion cloud security method is proposed in order to deliver both efficient withdraw and enhanced security. This fusion approach is combination of two well know security techniques such as IBE and ABE. The ABE method is combined with IBE to achieve the strong security against diverse warning. Adjacent with user identity attributes like country or type of subscription has are used for further process of IBE encryption, decryption and withdraw. Other complication of efficiency identity revocation is further addressed by presenting the outsourcing computation into fusion IBE (F-IBE) way at server dependent settings. The other components and ways of proposed F-IBE are discourse between this paper and evaluated the experiment against existing way.
Keywords: ABE, IBE, Cloud Computing, C-PABE C-IBE, Encryption, Decryption, Key Generation, PKG, KU-CSP.
Abstract
A Novel Approach for Keyword-Aware Service Recommendation System using Collaborative- Filtering Algorithm to Implement in Hadoop Framework
Mr. M. Vengateshwaran M.E, T.S Janarthanan, S. Senbagam, S. Shanmugapriya
DOI: 10.17148/IJARCCE.2017.6687
Abstract: Service recommendation system is an one of the valuable tool and it provide a appropriate recommendation to the users. Now a days large number of customers, services and the other online information needs service recommendation system. It provides the recommendations about the services to the user. In the existing recommendation system, the ratings of services and the service recommendation lists presented to users are the same.In the existing system the major problem is scalability and inefficiency problems when processing or analyzing such large-scale data. Here we propose a Keyword-Aware Service Recommendation method. In the proposed system it recommends the services based on the user preferences. In this system keyword refers to the user preferences. In this system user based collaborative filtering algorithm is used to generate recommendations. To improve the efficiency here we implement the system in Hadoop. In addition to that to make services effective, here we are going to use rank boosting algorithm with combined preferences. To achieve the scalability and efficiency with help of mapreduce framework in an big data environment.
Keywords: Recommendation system, Hadoop, collaborative algorithm, preference, keyword, Mapreduce.
Abstract
TSDT: TPA Based Secure Data Transmission of Cloud Data Storage System
Sandhya Dwivedi, Juhi Kanungo
DOI: 10.17148/IJARCCE.2017.6688
Abstract: Data integrity and storage efficiency are two important requirements for cloud storage. Cloud computing has emerged as a long-dreamt vision of the utility computing paradigm that provides reliable and resilient infrastructure for users to remotely store data and use on-demand applications and services. Currently, many individuals and organizations mitigate the burden of local data storage and reduce the maintenance cost by outsourcing data to the cloud. However, the outsourced data is not always trustworthy due to the loss of physical control and possession over the data. In this context a storage service provider is demonstrated who offers storage services to their clients additionally the intermediate service distributors are also demonstrated that re-distribute the service of primary service providers. In this research work we are presented a novel approach i.e. TPA based Secure Data Transmission (TSDT) for the cloud data security using successful data transmission. Due to this for securing the data on the cloud storage and unsecured network transmission the cryptographic solution is proposed. Our experimental results prove the effectiveness and efficiency of our mechanism when evaluating shared data integrity.
Keywords: Data Security, Encryption, Decryption, AES, Cloud Computing, Cryptography, TPA, Deduplication, MD5.
Abstract
Two-Level QR Code for Secured Message Sharing and Document Authentication
Shreya V. Uttarwar, Dr. A. M. Bagade
DOI: 10.17148/IJARCCE.2017.6689
Abstract: The quick response (QR) code was designed for storage information and high-speed reading applications. QR codes are used to create a link between the real world products (tagged with the QR code) and the Internet. A new rich QR code is proposed that has two storage levels: a public level and a private level. The public level can be read by any QR code reading application, while the private level is constructed by replacing the black modules by specific textured patterns. These patterns, do not introduce disruption in the standard reading process and always perceived as black modules by any QR code reader. Thus the private level is invisible to standard QR code readers. It can also be used for document authentication. It consists of information encoded using q-ary code with an error correction capacity which helps to increase the storage capacity of the QR code and to determine the original document from a copy. The sensitivity of the used patterns to the print-and-scan (P&S) process represents this authentication. The pattern recognition method can be used both in a private message sharing and in an authentication scenario. The storage capacity can be notably enhanced by increasing the code alphabet q or by increasing the textured pattern size.
Keywords: Quick Response (QR), two-storage level, Message Sharing, Document Authentication.
Abstract
Security of Photo Sharing on Online Social Networks
Harshali Chandel, Dr. A. M. Bagade
DOI: 10.17148/IJARCCE.2017.6690
Abstract: Photo sharing is an attractive feature in Online Social Networks (OSNs) but it may leak users privacy if they are allowed to post, comment, and tag a photo freely. This issue of sharing the photos of individual or himself/herself is addressed by the proposed scheme. The proposed scheme is used to prevent possible privacy leakage of a photo. For this purpose, an efficient facial recognition (FR) system is required that can recognize everyone in the photo. However, to train the FR system, more demanding privacy setting may limit the number of the photos that are publicly available. To solve this problem, the proposed scheme attempts to utilize users private photos by designing a personalized FR system and also provide security while posting the photo. A distributed consensus based method is also developed to reduce the computational complexity and protect the private training set. The efficiency of proposed scheme is calculated by using recognition ratio. The proposed mechanism is implemented as a proof of concept on Android application in OSN�s (Online Social Networks) on Facebook platform.
Keywords: social networks, photo privacy.
Abstract
A New Location based Mechanism for Indoor Environments
Prof. B.B. Gite, Swati Pandey
DOI: 10.17148/IJARCCE.2017.6691
Abstract: The new advances portraying the web of Things allow acknowledging genuine sensible situations prepared to offer propelled administrations to the clients. As of late, these sensible conditions additionally are being misused to revamp the clients' enthusiasm on the social legacy, by ensuring genuine intuitive social encounters. Amid this paper, we tend to style and approve an inside area mindful plan prepared to upgrade the client ability amid adiposity. Most importantly, the anticipated framework relies upon a wearable gadget that blends picture acknowledgment and Localization abilities to mechanically offer the clients with social substance related with the decided craftsmanships. The restriction information is acquired by a Bluetooth framework put in inside the Museum. In addition, the framework store interactive media framework substance made by the client and to share condition produced occasions on his/her interpersonal organizations.
Keywords: Bluetooth, Image recognition, IoT, Tracking system, Location-awareness, SoA, Smart Museum.
Abstract
An Innovative Method of Power Generation using PV Technology on Solar Roadways
Monika B. Dhoke, Dr. Hari Kumar Naidu, Pratik Ghutke
DOI: 10.17148/IJARCCE.2017.6692
Abstract: This is other approaches and methods of using solar photovoltaic technology on highways, for example, using solar-powered LED roadway lighting, security lighting, highway changeable message, etc. Although these are very important applications, in terms of power generation or power saving, they are almost negligible in comparison to the approach that it has suggested in this paper. Also, one can see the cost-oriented modeling and design optimization for alignment to determine operation and engineering cost of the highway.
Keywords: solar, LED, cost-oriented, optimization.
Abstract
Hop-to-Hop Secure Data Transmission using Cryptography and Audio Steganography Algorithm
V. Vetri Selvi, S. Gayathri
DOI: 10.17148/IJARCCE.2017.6693
Abstract: Today�s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. In this thesis we implement two security algorithms they are cryptography and steganography. For secure communication we are providing security by using the RSA which is based on Cryptography. Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of the secret messages. Audio signals have a characteristic redundancy and unpredictable nature that make them ideal to be used as a cover to hide secret information. A Steganographic technique for embedding text information in audio using LSB based algorithm is presented in this paper. In the proposed method each audio sample is converted into bits and then the text data is embedded. In embedding process, first the message character is converted into its equivalent binary. By using proposed LSB based algorithm, the capacity of stego system to hide the text increases. The performance of the proposed algorithm is computed using SNR values for various audio input. By using these methods third parties cannot percept the existence of message embedded in the audio file. The properties of the audio file remain the same after hiding the secret message.
Keywords: Cryptography, steganography, LSB, RSA.
Abstract
Review Paper on Big Data: Applications and Different Tools
Simranjot Kaur, Er. Sikander Singh Cheema
DOI: 10.17148/IJARCCE.2017.6694
Abstract: The term Big Data play very important role in various fields. It is the collection of data in the large amount which has to store, capture, manage and process. For this process we have introduced various tool and techniques in this paper. Big data is a term which is being used almost in every field. Big data is basically used in various fields just like Medical department, Business, Agriculture, Education, BDA, Finance etc. We have also introduced the applications of Big Data in different fields. This paper will give the detailed explanation of different tools and different applications in which Big Data is used in very vast amount.
Keywords: Big data, Big data Analytics, Hadoop, MapReduce, HDFS, Data Mining.
Abstract
Implementation of Crop Simulation Model for Malwa Region Punjab
Parmeet Kaur, Er. Sikander Singh Cheema
DOI: 10.17148/IJARCCE.2017.6695
Abstract: Crop Simulation Models helps in precision decisions in agriculture that are used to integrate various datasets through information technology in building crop production decisions. Crop Diversification is also necessary to properly utilize land resources and for increasing crop production. This model works on the idea to estimate crop production on a particular area and gives us simulated crop production on that area in specific soil and weather conditions. We have compared the results of simulation production and actual production to check the validity of the simulation model. It gives satisfactory results. This model also gives suggestions for crop diversification as it is necessary to increase income of farmers and for increasing fertility of the land. It also tells us to select appropriate crops according to the conditions of the soil. This model is specifically designed for Malwa Region, Punjab and works according to the climatic conditions of this particular area.
Keywords: Agriculture, crop, diversification, simulation, soil, weather.
Abstract
Open Shortest Path First- A Case Study
Vishesh S, Ranjan Ravishankar, Nandhishwara BN, Hema R, Nagabhushan HS, Bhaskar V
DOI: 10.17148/IJARCCE.2017.6696
Abstract: Open Shortest Path First routing protocol or simply OSPF routing protocol is an Internal Gateway Protocol (IGP) used to exchange routing information within an Autonomous System (AS). OSPF follows Link-state routing protocol rather than the distance-vector protocol. In Link-state routing protocol, each router describes itself and its interfaces to its directly connected objects unlike distance-vector routing protocol which sends its neighbour a list of all known networks along with its own distance to each one of these networks. It uses LSAs to advertise the distance to directly connected links. It is a classless protocol and supports VLSM (Variable Length Subnet Masking). It uses the concept of areas to implement hierarchical routing and area 0 is considered as the backbone area and area n, where n=1, 2, 3,.. is connected to the backbone area using virtual links. In this paper OSPF routing protocol is being configured in an AS and routing is carried out using LSAs. OSPF is preferred over other routing protocols because in OSPF only the new or updated values are transferred instead of sending the entire code and has fast convergence. We use network simulator 3 to build the situation and solve the problem. In this paper we also illustrate the setting of CTY, TTY, AUX and VTY password, create interface loopbacks to test the advertisement by OSPF routing protocol configured on each router and other aspects of OSPF routing protocol with great fervour.
Keywords: Open Shortest Path First routing protocol, Autonomous System (AS), CTY, TTY, AUX and VTY password, fast convergence, hierarchical routing, VLSM (Variable Length Subnet Masking), route summarization, interface loopbacks.
Abstract
Hide and Seek: A New Way to Hide Encrypted Data in QR Code Using the Concepts Steganography and Cryptography
M. Manimekalai, R. Bakkiyalakshmi
DOI: 10.17148/IJARCCE.2017.6697
Abstract: The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are 2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and horizontal direction, thus able to encode more information. Genetic Algorithm basic function is to be used to generate the key values that can be used to encrypt the message so the detection of the message is complicated. In this paper a novel approach is proposed for secret communication by combining the concepts of Steganography and QR codes. The suggested method includes two phases: (i) encrypt the message by using the key values that is generated using genetic algorithm (ii) Hiding the encrypted message inside the QR code. Experimental result shows that the enhanced design of secure algorithm can be created which ensure improved security and reliability.
Keywords: QR, Cryptography, Steganography, Genetic Algorithm, Encode.
Abstract
Automatic Classification of Hand Gesture Contours Based on Human Computer Interaction
Ms. Nayan S. Mane, Prof. Suresh S. Rode
DOI: 10.17148/IJARCCE.2017.6698
Abstract: The accurate classification of hand gestures in the development of novel hand gesture based systems designed for human computer interaction (HCI) and for human alternative and augmentative communication (HAAC) is decisive. A complete vision-based system consisting of hand gesture acquisition, segmentation, filtering, representation, and classification is developed for classification of hand gestures. The algorithms in the subsystems are formulated or selected to optimally classify hand gestures. By using a histogram thresholding algorithm grey scale image of a hand gesture is segmented. For effectively remove background and object noise in the segmented image a morphological filtering approach is designed The contour of a gesture is represented by a localized contour sequence whose samples are the perpendicular distances between the contour pixels and the chord connecting the end-points of a window centred on the contour pixels. Gesture similarity is determined by measuring the similarity between the localized contour sequences of the gestures. To measure the similarity between the localized contour sequences the linear alignment and nonlinear alignment are developed. Experiments and evaluations on a subset of American Sign Language (ASL) hand gestures show that, by using nonlinear alignment, no gestures are misclassified by the system. Additionally, it is also estimated that real-time gesture classification is possible through the use of a high-speed PC, high-speed digital signal processing chips, and code optimization.
Keywords: Gesture, augmentative, Human Computer Interaction, VHGC System.
Abstract
Data Extraction and Alignment by using Combining Tag and Values Similarity
Aparna Pathak, Dr. Sadhana Chidrawar
DOI: 10.17148/IJARCCE.2017.6699
Abstract: Based on the query entered by user web databases generate query result pages. Assistant Professor, Dept. of CSE, MPGIN, Nanded, Maharashtra, IndiaMany techniques are available to extract data and align it but they did not consider the unstructured data. This paper presents a novel technique for data extraction and alignment. It collects data from internet related to user�s query which contains huge amount of data and it can be in unstructured form also. Here the aim is to find out only important data from it and align it in tabular form so that it will be very easy to compare different data.
Keywords: Data Records, Tag Tree Structure, Record Extraction and Records Arrangement.
Abstract
Hybrid Approach of Spectrum-Energy Efficiency Optimization for LTE Network
Y.D. Chincholkar, Mohammed Luay Abdulmunem
DOI: 10.17148/IJARCCE.2017.66100
Abstract: A massive research is growing across the spectrum efficiently in networks such as LTE, based on 802.22 standards. Along with the spectrum efficiency by the mobile phone service point of view, the important energy savings is nothing but the reduction in operating costs and improve the efficiency of the spectrum is nothing more than increase profits. To improve profitability, it is necessary that the wide area network (wireless access networks) has efficient energy and spectrum. The division of this work are designed to offer a new hybrid approach, aimed at improving energy efficiency and spectrum Advance LTE cellular networks. We have a new policy for allocating optimal planning methods proposed size spectrum swelling, migration of users and distribution of various types of base stations sleep mode. A problem spectrum efficiency and energy optimization method is calculated as quasiconvex and then transforming a problem MILP. The optimization problem is solved quasiconvex bisection method and solved by a software tool MILP. Finally, we have contributed to the third algorithm to improve spectrum efficiency and energy in this paper. The proposed method practical simulation work performed using NS2. A practical simulation results show that the efficiency of the method is better than previous methods.
Keywords: Energy, Spectrum, LTE, Heterogeneous networks, Base station, Cellular, 802.22.
Abstract
Efficient Cloud Security Method for Preventing Insider Attacks in Cloud Computing Platforms
Bhushan Rathod, Prashant Yelmar
DOI: 10.17148/IJARCCE.2017.66101
Abstract: Different types of organizations based on requirements commonly and widely used cloud-computing frameworks. Many companies are sharing very important data on daily basis over the different cloud server. Hence it is required to have efficient data confidentiality and security method to protect against different security threats like insider attacks. The recent works proposed on cloud computing security has mainly worked either on cloud computing platform protection from malicious users or cloud client�s protection from each other�s unwanted activities. However, the issues of cloud client�s protection from the other malicious cloud client�s attacks (this attack is called insider attacks are still remaining research problem. In this project, a novel approach is presenting in order to ensure the client data confidentiality and integrity during computation over the cloud platform. The goal of proposed approach is to ensure that cloud user private data not be exposed to other internal cloud users like other cloud clients and administrator. The proposed designed method makes use of remote attestation and late launch based method called Flicker in order to verify the integrity of the cloud platform. This is a practical approach designing for securing the confidentiality and integrity of client data and computation from cloud clients and from the Infrastructure-as-a-Service (IaaS) based cloud system administrator himself. For data security, we are using newly designed hybrid cryptography method to deliver the best efficiency performance.
Keywords: Cloud Computing, Cloud Security, Security threats, Risk analysis, Data Protection, Privacy.
Abstract
Kanban: A Definite Answer for Effective Project Execution in Uncertainties
Kamini Godbole, Dr. Jitesh Neve
DOI: 10.17148/IJARCCE.2017.66102
Abstract: As a process setting practitioner I have come across many a times that either customer is not really understanding what they want or a vendor unable to articulate and provide solution which meets 90-95% of customer requirements. There are various factors that actually make this happen at both ends such as novice customer / vendor, emerging technologies, vendor unable to visualize customer vision, business, skilled resources not available, fast changing end user needs, no more valid requirements etc. Root cause of many of these reasons is agility which is growing due to fast pace and ever developing technology and changing needs. In any industry without a proper plan it is not easy to keep delivering solution of any type to meet with ever changing demands of customer. Kanban method is helping in such unpredictable delivery.
Keywords: TDD (Test Driven Development), BDD (Behaviour Driven Development), XP (Extreme programming), WIP (Work in Progress)
Abstract
Attribute Based Encryption with Anonymous Authentication of Data Stored in Cloud
Shailesh Vijay Gawai
DOI: 10.17148/IJARCCE.2017.66103
Abstract: I propose a new decentralized access control technique for data securly storing in clouds that supports anonymous authentication. In the proposed technique, the cloud verifies the authenticity of sequence without knowing the users identification before storing files. My technique also has the extra feature of access control in which only authorised users are able to (decode)decrypt the saved data. This technique restricts the replay attacks and confirms the creation, modification, and reading data stored in the cloud. I also includes and supports user revocation. Moreover, my authentication and access control technique is decentralized and robust, unlike other access control techniques designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.
Keywords: Access control, authentication, attribute based signatures, attribute-based encryption, cloud storage, Information Security.
Abstract
Improvement in Prediction Accuracy using Data Mining Techniques
Pallavi D. Bagul, Prof. K. C. Waghmare
DOI: 10.17148/IJARCCE.2017.66104
Abstract: In today�s competitive world companies� aim is to maintain their customers. In the competitive environment, companies need to build their predictive models to identify their potential customer behaviors. Data mining techniques can be used to build the prediction model for companies because it can extract the predictive information from large databases. The accurate prediction helps in the growth of the industry. The prediction model is build by using Naive Bayes algorithm. But it is based on the independent assumptions between features. The objective of this paper is to improve the accuracy of prediction by using Data mining algorithm with a Naive Bayes Classier for better results. The proposed system gives the accuracy of 72.62% by using data mining techniques on UCI machine learning Repository which is a bank data set.
Keywords: Data Mining, Classification, Prediction, etc.
Abstract
IMPROVED APPROACH FOR METEOR DETECTION & AUTOMATION: A CROSS CORRELATION METHOD
Leela Lakshmi. S, Rajani Kanth. V
DOI: 10.17148/IJARCCE.2017.66105
Abstract: A simple but effective technique has been proposed for Atmospheric Radar signals to extract the sporadic events such as the meteor occurrences is presented at higher altitudes. VHF radars are also being used to detect the ionized meteor trail over the altitude region of 70-120 km as a tracer of background wind using correlation technique. The proposed cross correlation-based technique not only detects the occurrence of the meteor phenomenon, but also senses precisely the height at which the phenomenon observed. Correlation between the data collected from the successive range Bins is the basis for the meteor detection. This helps to automate for detecting the sporadic phenomenon.
Keywords: backscatter, scans, meteor, correlation.
