VOLUME 6, ISSUE 3, MARCH 2017
Multi touch Gesture Generation and Recognition Techniques: A Study
Mr. Ramdas Pandurang Bagawade, Ms. Pournima Akash Chavan, Ms. Kajal Kantilal Jadhav
Reliable and Secured Distributed Deduplication System in Cloud Computing
Rohit Jagtap, Akshay Deore, Kiran Mate
Multi-touch Gestures Authentication Techniques: A Study
Mr. Ramdas Pandurang Bagawade, Ms. Bhagyashri Satish Bagal, Ms. Monika Kishor Kale, Ms. Trupti Chandrakant Jangam
Automatic Irrigation using GSM Module and Solar Panel
Ankit Singh, Abhay Singh, Ashish Themse, Priyanka Ramteke, Damini Varle
An IoT Based Health Care and Patient Monitoring System to Predict Medical Treatment using Data Mining Techniques: Survey
Aieshwarya. B. Chavan Patil
Load Aspect Recognition Based Data Compression in Smart Meters
K. Anupallav, D. Selva Mary, M. Bincy Immaculate, U. Logeswari, S. Uma
Alcohol Detection with Vehicle Controlling
Dimple U. Mendhe, Pallavi R. Mishra, Monika R. Taywade, Rajani G. Musale, Komal Ramteke
A Novel approach for privacy policy on online social network
Prof. P.S. Hanwate, Pradnya Kapile, Kajal Katariya, Sunny Yadav , Ranjeet Patil
Review on Reversible Image Data Hiding With Contrast Enhancement
Prof. M.S.Sadavarte, Pratima B. Choudhari
Bluetooth Controlled Car System
Shrutika Kanere, Rutuja Shinde, Vaibhavi Tornekar, Dnyaneshwari Zagade, Mrs. V.S.Sonar
Model to Improve the Assimilation of Contents in Programming
Ivelisse Teresa Machín Torres
A Text Mining Approach to Identify and Analyse Prominent issues from Public Complaints
Febina Merson, Roseline Mary
To analyse real-time traffic conditions with the help of GPS
Anita Shinde, Rutwik Choughule, Shubham Jangam, Shweta Tarte, Shweta Kumbhar, Apoorva Shinde
Analysis of Algorithms for Implementing AI for Game “Tak”
Rajkumar pagey, Snehal Martiwar, Palak Khokle, Laxmi Nishad, Priya kakde, Rajesh Nasare
Survey Paper on Door Level Security using Face Recognition
Harshada B. More, Anjali R. Bodkhe
Design A Low Pass Fir Filter By Using Blackman Harris Kaiser And Tukey Window Techniques
Manju Kanwar, Ruchi Baghel, Pranay Kumar Rahi
Performance Analysis of Efficient Power Management Controls in Android Device
Chirag Shah, Sumit Chaudhary, Priya Agrawal
A Survey “Fatigue Monitoring System”
Mr. Sachin Pukale, Ms. Aishwarya Pandit, Ms. Komal Londhe, Ms. Priyanka Rajmane, Ms. Shital Agarwal
Agricultural Updates Using Multitenant Cloud Infrastructure In Distributed Environment
S.Divya, M.Mathivani, Priyanga Sivaprasad , S.Uma
Design of Low Power Multiplier using Reversible logic: A Vedic Mathematical Approach
D.V.R Mohan, K.Vidyamadhuri, Y.RamaLakshmanna, K.H.S Suresh kumar
Survey on Algorithms for High Utility Itemset Generation
Prof Jyoti B. Kulkarni, Aishwarya Dingre, Sonal Bhosale, Deepali Mehroliya, Shivani Mudgal
An Efficient Dynamic Scheduling based on Greedy Algorithm for Heterogeneity Clouds
Dr.P.Mathiyalagan, M.Rajshree, S.Shobika, M.Sowmiya
Trio Constrained Adaptive Noise Removal (TCANR) Mechanism for Salt and Pepper Noise in Image Classification
G Muthu Krishnan, Capt.Dr.S.Santhosh Baboo
A Review on IoT – Technology, Application, Architecture, Services
Mohammed Anwaruddin, Mohd. Abdul Sattar, Mohd. Anas Ali
Prosthetic Application Using Tongue and Robotic Arm
R.V.Shinde, S.S.Patil
An Efficient Geometric Routing Using Convex Hull Tree Information In Geographic Protocol
T.Nivetha, S.R.Lavanya
High Bandwidth F-Shaped Microstrip Patch Antenna for C-band Communications
Muhammad AfsarUddin, Fatama Akter, Md. Jahangir Alam
Evolution of Social Media Marketing
Prabhanjan Sharma, Beaulah Soundarabai P
Review Paper on Wireless Wearable Sensor System for Cardiac Activity Monitoring
Prof. G.K. Andurkar, Ms. Jayashri Mohurley, Vishakha Borkar
An Enhanced Energy Efficient Protocol with Optimize Cluster Head Selection Approach using Firefly Algorithm
Pankaj Soni, Rajnish Kansal
Analysis techniques of Content based Image Retrieval based on Confusion Matrix
Jaison Singh, Harshdeep Trehan, Varinderjit Kaur, Dr. Naveen Dhillon
Artery and Vein Classification in Retinal Images using Graph Based Approach
Ritesh R. Khatakalle, Prof. R. U. Shekokar
Data Mining Tool for SMBs with FIM Method
Prof. S.S. Pawar, Rupesh Wankhede, Hitesh Godse, Amar Puranik, Akash Surwase
Police Station Network Implementation
Prof. M. E. Ingale, Mayur B. Thakare, Kamini D. Sagar, Supriya M. Ghuge
A Secure Authorization for Cloud Data Deduplication using Privileged Key
Ashish Sonawane, Parth Walia, Khushbu Vachhani, Savi Moundekar, Rugveda Sherkar
Cross Compilers
Gunjali Mahajan, Tejashri Bhargav, Anjali Sharma, Rekha Thorat, Kavita Patil
Improvement of the Open Source Software Development Process
Shaikh Shariful Habib
Multilevel Authentication Based on QR Codes to Secure Banking Operations
Apoorva Khilare, Monika Dhage, Dhananjay Ghule, Rushabh Masurkar
Content-Based Image Retrieval by Query Adaptive Search using Hash Codes
E. Aarthi, S. Kaviya, D. Keerthika, B. Kirithika
Survey on Multi-Party Privacy Conflicts in Social Media
R. Aravinth, G. Bharath, J. Dinesh, M. Hari, N. Kathirvel
Automated Locomotion Robot: using Arduino
N. Ashika, S. Karthik, S. Karthika, P. Muthusamy
A Secure File Store in Cloud Environment using HABE
S. Nandhini, R. Sangavi, S. Sangavi, S. Sowndarya
Exploring the Journals using Artificial Bee Colony algorithm
K. Radhika, M. Sowndarya, R. Suganya, A. Vallikkannu
A Literature about Electronic Game which Reproduce Contingent Graph
N. Rajasekar, T. Santhosh, B. Sasikumar, K. Vijaya Kumar
A Fine-Grained Data Access Control using Attribute-Based Keyword in Web Search
P. Periyasamy, K.Y. Pradheep, U. Santhosh Kumar, G. Vengadesan
An Effective Audit Services for Allocation of Data in Cloud
M. Praveen, S. Surya, M. Vadivel, R. Vengatesh
Unique Establishment of Data Handling and Data Checking in Public Cloud
P. Rajkumar, S. Syedali, K. Vishal, K. Kumaravel
Smart Attendance Application Using Android and PHP
Sanya Patel, Aliya Sayyed, P.P Bastawade
Augmented Reality for Educational Enhancement
Abdullah Mubarak Ghare, Mohammed Akhtar Khan, Mustafa Rangwala, Shadab Kazi, Prof. Sameer Panwala, Prof. Abdus Salam
Extension of Lifetime and Efficiency of NAND Flash Memory using Coding Theory
C. Poovarasi, B. Priyanka, S. Shandiya, S. Lakshmi
Designing a Low- Pass FIR Digital Filter by using Rectangular, Hanning and Triangular Window Technique
Kamal Kant Chandra, Mohan Lal prajapati, Mr. Pranay Kumar Rahi
A Survey on Secure Authorized Deduplication in Hybrid Cloud
Ms. Chintu P Chacko
A Survey on Texture Based Weed Identification System for Precision Farming
Ms. J. Mohana Preethi, Mrs. Dr. M. Sujaritha
Transmission of Ideal Data Query in Mobile Ad-hoc Social Networks
Umesh Patil, Shital Damate, Ashwini Gurav, Ajit Patil
A Cumulative Study on Gray and Black Hole Detection in MANET
Prof. N. V. More, Chetana Thombare, Prajakta Sutar, Rutika Tasgaonkar, Komal Joshi
Interactive Voice Response Kiosk
Natasha Brahme, Ayushi Malhotra, Harsh Panchal, Chirag Waghela, Dr. V.C. Kotak
Design of Low pass Fir Filter using Hamming, Taylor, and Nuttel Windowing Techniques
Nikesh Kumar Manhar, Sachin Kumar Singh, Pranay Rahi
Face Recognition System Using Hybrid Approach of Both Principal Component Analysis and Linear Discriminant Analysis
Priyanka Sood, Er. Shivali Puri, Er. Varinderjit Kaur, Dr. Naveen Dhillon
Survey on Control of Photo Sharing on Online Social Networks
Sahla Nazlin A, Vishnu K
Hand Gesture Recognition System for Photo Viewer Application
Ms. Swati Sagar, Priti Kamble, Vidya Khamitkar, Snehal Ingawale, Deepali Suryavanshi
A Survey on Authentication, Counterfeit Note Detection& Automatic Printing System
Vivek D. Ugale, Harsha Nyati, Neeraj Shahane, Harshada Bhalerao
The impact of automation in IT industry: Evidences from India
Feby C Varghese, Dr. T. A. Ashok Kumar
Review on Data Mining Techniques in Bioinformatics for Extracting Enzymes Names from Literature
Dr. V. S. Gulhane, Prof. L. K. Gautam and V. G. Sahu
Spot Welding Controller
Aishwarya Chavan, Shubhangi Soundalkar, Bhagyashri Ranveer, Ganesh L.Dake
Sentiment Analysis, Emotion Mining & Authentication Methods in Hadoop: A Survey of Approaches
Sagar S. Patil, Pravin S. Game
Survey Paper on Smart Parking for Smart City
Prof. D.P. Salapurkar, Karan Dalal, Saurabh Mantri, Devesh Bhole, Vrushali Kurundkar
Analysis and Solutions for Bug
Akshay Khamkar, Aishwarya Jagtap, Neeraj Pattan, Anuja Raipure, Prof. Mrs. P.Y. Pawar
Review on Diagnosis the Plant Disease at Early Stage
Prof. Mrs. Mehzabin Shaikh, Nikita Butala, Sanjna Sharma, Sneha Sukumaran
Hacking on Crime with Workable Solution: A Survey
Sugandhi Aakash, Sumit Chaudhary
A Novel Technique for Secure Communication in Cryptography
Pooja Bhadauriya, Foram Suthar, Sumit Chaudhary
Harmonic Elimination of a Photo-Voltaic Based Cascaded H-Bridge Multilevel Inverter Using ANFIS for Non-Linear Loads
Rajarajeshwari.C, Sivasundari. K, Shalini.S, Karuppa Samy.A
A Software Complexity Prediction Model using Coupling Metrics: A Statistical Analysis
M. Kavitha, Dr. S.A. Sahaya Arul Mary
Sketch based Shopping
Hraddha. R. Kuchekar, Amruta. L. Satnur, Rutuja. P. Baheti, Prachi. L. Kamble
Laser Projection Virtual Keyboard: A Laser and Image Processing based Human-Computer Interaction Device
Toshan Sabni, Jayant K Yavatkare, Divyanand S Yadav, Prof. Vinit Kakde
A Review on High Ranked Features based NIDS
Dipali G. Mogal, Sheshnaryan R. Ghungrad, Bapusaheb B. Bhusare
A Review Paper on PAPR Reduction Techniques using Clipping& Filtering, Selective Mapping and Companding Methods in OFDM Systems
Okello Kenneth, Professor Usha Neelakanta
Micro data Privacy Preserving Using Slicing
S. Bhuvanesh, V.N. Anushya, A.X. Suganya Gladies, M. Vignesh
Critical Review of the Bunch: A Well-Known Tool for the Recovery and Maintenance of Software System Structures
Mahjoubeh Tajgardan, Habib Izadkhah
Food Ordering Restaurant Android Application
K V Aishwarya, Aishwarya Chavan, Sedjwick Drego, Akshay Chavan, Prof .P.P Bastawade
Resource Allocation Approach using Gang Scheduling: Design and Analysis
Swati Dwivedi, Anand Muni Mishra
Real Time Water Monitoring System using IoT
Schindhya.R, Simi V.P, Sathya.E, Janani.B
Performance Analysis of WiMAX Network with Uplink Scheduling Algorithm and its Implementation
Stuti Upadhyaya, Deepak Bicholia
Opensec: Policy Based Security using Internal Software Defined Network
Narayini.S, Gokulapriya.M, Raashmi.V, Senthil Madasamy.N
Intelligent Beaconing Principle based Congestion Free Routing in Vanet
Sankaragomathi.M, Srigayathri.M, Vijaya Lakshmi.P, Senthil Madasamy.N
Energy Optimization Factors for the Embedded Mobile Processors
Vrushabh Khobragade, Mandar Gadkari, Shubham Shingne, Hamza Niaz, Shivam, Dr. Prakash Prasad
Implementation of Zigbee Technology for Patient HealthCare Monitoring System
Shivachandra Hindinamani, Anant Baliwant Bodas
Color Sorting Robot
Snehal Shirgave, Aishwrya Salunkhe, Khadija Shirgave, S. Y. Upadhye
Remote Web Monitoring of Metering Equipment over the Internet
Pooja Borkar, Vishal Batheja, Gaurav Hendre, Kapil Gulwani, Mrs. H.A. Shinde
Authentication using Graphical Password with Association of Sound Signature
C. Rajalakshmi, C. Rohini, S. Sowndharya, A. Christy Jebamalar
An Involuntary Feeding and Health Monitoring System for Dairy Farms
J. Thilagavathy, D. Frijit Raja Shunmathi, S. Janaki, I. Jenifer, M. Jeslin Mary
Design and Development of Material Handling Cum Transportation System
Eshan Deshpande, Kshitij Bapat, Piyush Kedare, Pratik Totalwar, Raghav Dhoot, M. Sharique Tufail
An IoT Based Automated Noise and Air Pollution Monitoring System
Palaghat Yaswanth Sai
Classification System to Predict Universities for Students using Fuzzy Logic
Gayatri Nair, Shankar M. Patil
Design & Implementation of 3-Bit High Speed Flash ADC for Wireless LAN Applications
Mirza Nemath Ali Baig, Rakesh Ranjan
Design of Low Pass Fir Filter Using Rectangular, Bartlett and Blackman-Harris Window Techniques
Sriti Pandey, Shalu Choudhary, Pranay Kumar Rahi
Blind Assist System
Deepak Gaikwad, Chaitalee Baje, Vaishnavi Kapale, Tejas Ladage
A New Approach for Efficient Clustering Using CECM Algorithm in WSN
Gohil Sonal, Sumit Chaudhary, S.B. Batra
Adaptive Secure Document Access Mechanism in Cloud
Dr. M. Priyadharshini, P. Anitha, C. Janani
Optimal Face Retrieval From LFW Dataset
Priyanka A. Deshmukh, Prof. S.P. Abhang
A Survey of Internet of Things and its Applications
Prof. Vivek Pandey, Vipul Kushwaha, Ansari Rukhsar, Snehal Shinde
Design of Ultra Low Power 7.2 GHz True Single Phase Clock CMOS 2/3 Prescaler244 µW
Roshan Kumar, Prof. Monika Kapoor
Collaborative filtering in movie Recommendation System based on Rating and Genre
Ashwani Kumar Singh, P. Beaulah Soundarabai
DS System for 4G Networks through Data Mining
S.A. Chiwhane, Puja Sonawane
Healthcare Portal System using Iterative Search, K-Nn, Differential Diagnosis, Baye’s Theorem
Mathpati Dhondutatya, Memon Simran, Kesgire Akash, Karande Siddharth
Hand Gesture Recognition of Robot using Neural Network
D. S. Gaikwad, Yashika N. Mahajan
Location Based Video Searching
Prof Aparna S Kalaskar, Kaustubh Karanjkar, Harish Gwalani, Naman Jain, Shridhar Pawar
Student Information System and Performance Prediction in Educational Data Mining
Pratik Nanavati, Abhishek Masurkar, Chaitanya Shinde, Aaryaman Singh, Prof. Sumitra Sadhukhan
Secure Optical Link System
Shubham Pandey, Ruchi Varshney, Shivani Gupta, Sangeeta Singh, Neha Chaudhary
Friend Discovery Mechanism with Secure Communication and Accurate Recommendation for Social Web Networks
Prof. Neha Pharande, Sailen Raj, Ranoo Khatri, Krishna Sawalkar, Karan Mahesh
Advanced Computer Communication and Control Technology for Modern Substations
Swetha K, Rashmi H C
Relative Study of Bayesian Approach for Spectrum Sensing in C.R.
Mr. Pravin B. Kamble, Prof. Anant R. More, Prof. M.S.G. Prasad
Data Mining, Internet Marketing and Web Mining
Vishesh S, Manu Srinath, Supriya Ramarao Prasanna, Supriya Yadati Narasimhulu
SignTalk and Animator for Speech and Hearing Imapired
Haseeb Biya, Ruba Shaikh, Sayma Siddiqui, Sufiyan Khot
Spectrum Sensing Optimization by Sensing Threshold and Duration for Cognitive Radio Networks
Vinayak R. Barbole, Prof. Anant R. More, Prof. M.S.G. Prasad
A Survey Paper on Iris Based Access System Using Stabilized Iris Encoding and Zernike Moments Phase Features
Ms. Payal Mahajan, Mrs. Nandini Dhole
A Survey paper on Public Integrity Auditing for Shared Dynamic Cloud Data Using HMAC Algorithm
Prof. Sunita Patil, Prof. Supriya Bhosale, Prof. Shubhangi Sonawane
Analysis of Leach and Improved Leach Protocol in Wireless Sensor Network
Harpreet Kaur, Amit Verma, Manit Kapoor
A survey Paper on Feature Extraction and Classification in ECG Biometric Signal
Kalyani U. Girde, Asst. Prof. Nandini Dhole
A Review: Predictive Analytics with Big Data
Mr. Rizwanahmed B. Mujawar, Dr. Dinesh B. Kulkarni
Life Time Evolution of Wireless Sensor Network in Presence of Energy Hole at Sink
K. Anusha, S. Srija
Suit Yourself Customize Your Suits the Way You Want
Srishti Patil, Priya Todase, Sagar Dixit, Ashish Chopane, Prof. Neha Chankhore
An E-Learning Application for Learning Japanese Kanji
Asawari Khire, Pooja Dharmadhikari, Tanvi Raddi, Viraj Hudli, Chinmay Chiplunkar
Facial Recognition understanding and Differences Between PCA (Principal Component Analysis) and LDA (Linear Discriminant Analysis)
Aarav Yadav, Ms. Anamika Jain
Survey: Sentiment Analysis of Twitter Data for Stock Market Prediction
Rupawari Jadhav, M. S. Wakode
An Improved CL-EKM based Key Management System
Mr. Sanket Patil, Prof. Mrs. Snehal Bhosale
Image Processing based Multilingual Translator for Travellers using Raspberry pi
S. Rishi Kumar, G.Madhavan, M. Naveen, S.Subash, U. Selvamalar Beulah Ponrani
An Improved High Risk Prediction in Health Examination Record Using Data Mining
A. Narmatha, R. Abinaya Revathy, Mr. S. Radhakrishnan
Dynamic Groups with inbuilt data updating for loud and Anti Collusion Data Sharing Scheme
M. Nandhini Sri, R. Sangeetha, Mr. S. Radhakrishnan
Automation in Agriculture System using GSM
Prof. S .D. Anap, Mr. Uddhav Abuj, Miss. Kalyani Tambe, Miss. Swati Sangale
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution
Gauri Gajanan Bathe, Prof. Rahul Patil
Parking Management System using Image Processing and Distributed Approach
Prof. S.P. Bholane, Shantanu Kotambkar, Ajinkya Lakade, Kunal Mande, Tanmay Deshmukh
Animal Detection System in Farm Areas
Vikhram.B, Revathi.B, Shanmugapriya.R, Sowmiya.S, Pragadeeswaran.G
Programmed Vehicle Accident Detection using GSM and GPS Modem and Prevention using Alcohol Sensor
Jayesh Choudhary, Manish Kumar Meena, Saroj Kumar Sah, Mrs. Alka Rani
Fraud Detection in Health Care Insurance using Data Mining by Integrating Hospital and Health Insurance System
Baliram Darade, Amol Bhatkal, Akshay Phadtare, Ashish Katkade
A Hybrid Approach for Software Fault Prediction Using Artificial Neural Network and Simplified Swarm Optimization
Ankit Pahal and R. S. Chillar
Real Time Indoor Air Quality Monitoring System
Prof. Snehal Shinde, Akshay Kashid, Kshitij Jamdade, Shraddha Sable, Pragnaya Ankalgi
Design of Reversible Excess-3 Adder and Subtractor
Pujitha Chaluvadi, Mahi Pranay, P Sukesh, Kuruva Madhu
Bridge Disaster Monitoring & Alert System
Prof. S. D. Anap, Mr. Gaikwad Mangesh, Mr. Thorat Somnath, Mr. Wakchaure Akshay
Security in Searching Shared and Encrypted Data
Swati Virkar, Pritee Chinchwade, Shivani Ajmire, Prof. R.A. Badgujar
Interactive & Informative Digital Board using Raspberry PI
M. Bala Nagammal, S. Nilavarasi, M. Priyanka, Prof. Mr. A. John Paul Antony, M.E.
Efficient Transformerless MOSFET Inverter for Grid-Tied Photovoltaic System
M. Mareeswari, K. Ramalakshmi, A. Saranya, B. Noorul Hamitha
Automatic Portal Lock Security Using Two-Step Verification via Bluetooth and Gsm
Sherin Abraham, Ashwin Achari, Vishwadeep Shinde, Akash Shinde
Development of 6LoWPAN Border Router for Secure Communication
Mr. Tejas Mehare, Prof. Mrs. Snehal Bhosale
Implementing AES Algorithm for Selective Encryption in Wireless Networks
Manjula G., Dr. Mohan H.S.
Chemistry in Augmented Reality
Sanket Salve, Akshay Khapare, Rohit Barve
Detect-caused Fire and Bang Alarm using Image Processing and Sensors
Kamini Sharma, Dolly Jadhwani
An Efficient Difficult Appearance of Object Tracking Based on Spatial-Temporal Consistency
Dr. R. Muthu Kumar, M. Sivakumar
Protecting Web Servers from Distributed Denial of Service Attacks
Prof. Dr. A.N. Banubakode, Badal Mehta, Tanmay Modak, Vrushal Chaudhary
Indoor Asset Tracking System using Wireless Communication
Vaibhav Prasanna Bhandarkar, Harshal Girish Narkhede, Aditi Vijay Nerurkar
Wireless Real Time Monitoring and Controlling of Irrigation System
Kushnure Devidas, More Poonam, Padamalakar Dhanashri, Padavale Pooja
Spatiotemporal Keyword Query Suggestion Based On Document Proximity and K-Means Method– A Review
Aju Tom Kuriakose, Sobhana N.V
Survey Paper on “An Android Based Mobile Framework for Student Alert Notification”
Sagar Gore, Nitesh Sonawane, Sayali Pawar, Mrunal Nerkar
A Real Time Development of Gesture controlled Humanoid Robot using ZigBee Technology
Rachana Gulhane, Nivedita Pande, Shyam Prasad
An Efficient mechanism to identify DDoS attacks by using Mark on Demand Server and Deterministic Packet Marking
A. Ravi, Karthik Shankar P S, J. N Sudhir, K. Karuna, Chandan Kumar
Automatic OMR Answer Sheet Evaluation using Efficient & Reliable OCR System
Dhananjay Kulkarni, Ankit Thakur, Jitendra Kshirsagar, Y. Ravi Raju
Real Time Design and Development of Brain Computer Interface for Home Appliance Using LabVIEW
Kalpak Awale, Anagha Choudhari, Shyam Prasad
Survey on Cloud Compiler
S C Suryawanshi, Akshay Bankar, Akshay Agrawal, Aneesh Ashtikar, Pranesh Meher
Consistency Improvisation in MongoDB during Lag on secondary
Abuzar Kamal, Mr. Saravana Kumar K
Driver’s Doziness Revelation and Alert System
Miss Prachi Patil, Mr Sunny Patil, Mr. Bipin Pawshe, Prof. Ankit Sanghavi
Big Data Analysis of Fetched Logs using Hadoop Framework
Prof. Girija Chiddarwar, Sanket Chhajed, Sameer Deshmukh, Pranoti Dongre, Bharti Nile
Video Surveillance Based Attendance system
Mr. Rahul V. Patil, Mrs. S. B. Bangar
Key Point and Block based Feature Matching for Effective Image Forgery Detection
Durga Jetthy, Purva Gubbawar, Aditya Kumar Gupta, Mrs. S.A.Panwar
Intelligent Android based Online Parking System
Ajay Thakur, Puja Nawale, Shubhangi Randive, Prof. P.H. Joshi
Datawing File Sharing and PC Control Application
Mr. Nayan A. Sawant, Ms. Snehal S. Zore, Ms. Dhanashri S. Salunkhe, Mr. Parag S. Joshi
Enhancing Performance of Medical Expert System by Crisp Logic
Aishwarya A. Patil, Nimba Y. Koli, Gayatri S. Dhangar, Vidya Nivesh
Future inside Virtual Reality
Mrs. Shikha Sharma Sarkar, Pradeep Singh Bhawariya
Literature Review on Home Automation System
Neha Malik, Yogita Bodwade
A Survey on Intrusion Detection Systems in Mobile Ad-hoc Networks
Sonika H.R, Poornnima B.G
Development of Street Lighting System with Vehicular Sensing at Low Light Intensity based on Zigbee Intelligence
D. Sai Krishna, Lalithha Tempelle, Gampa Varun, Goli Sahithya, Gobburu Ravali
Responsive Job Scheduling for Map-Reduce in Hadoop Framework
Poonam Mahajan, Manish Patel, Amol Agarwal, Nikhil Raut, Devendra Gadekar
Open Source Resume
Priya Behlkar, Roshni Gondawale, Bhagyshree Lokare, Snehal Kamble, Prof. A.V. Kanade
Enhancing Distributed Data Storage Security for Cloud Computing using AES algorithm
Vasant S. Kakade, Akshay Kirve, Ankush Bhoir, Sagar Kadam
Efficient Design of Low Pass FIR Filter by Hamming, Blackman and Rectangular Window Techniques
Jyoti Kharsan, Shivani Yadav, Pranay Kumar Rahi
RTO Automation System using Near Field Communication (NFC)
Prof. Ankit S. Sanghavi, Sagar D. Nikumb, Priyanka P. Bhoir, Sagar D. Pooja
Secure Password with Graphical User Interface
Mr. Pramod Nannaware, Prof. Khwaja Aamer
Magnitude and Phase Response of High Pass FIR filter using Rectangular, Hamming and Bartlett Window Techniques
Durgesh Sahu, Mukesh Chandra, Pranay Kumar Rahi
Network Security Architecture with Active and Dynamic Response Selection
Resmi .A.M , Dr. R. Manickachezian
Patient Health Management System using E-Health Monitoring Architecture using WSN
Prof. C.G. Thorat, V.R. Salve, P.P. Thorat, K.R. Taru, S.S. Hindole
FIR Low Pass Filter Designing using Bartlett Hanning, Blackman Harris and Nuttal Window Techniques
Suman Mahant, Pooja Singh Chandel, Pranay Kumar Rahi
Inter-Vehicle Communication Using Li-Fi Technology
Muntazir Mohd Tali, Aarti Patil, Sushmita Chavan, Prof. Shailesh Jadhav
A Review on Automated Disease Diagnosis Techniques
Sunena Rose M V, Dr. Sobhana N. V
Decoy Technology in Fog Computing
Arwinder Singh, Abhishek Gautam, Hemant Kumar, Er. C.K. Raina
Security and Sharing of Data through Various Access Levels in Transparent Computing
D. Shireesha, Ayush Goyal, Arun Kumar Jangid, Jitesh Jain
Enhanced Security for the Prevention of Man-In-The-Middle Attacks
V. Yadagiri, G. Pranavi Goud, G. Bhargav, K. Komali Reddy
Techniques for Improving Performance of OFDM System for Wireless Communication
Mr. Umesha G B, Prof. M. N. Shanmukha Swamy
Real Time Monitoring of Water by use of Internet of Things
Rutwik Choughule, Shubham Jangam, Chinmay Chiplunkar, Omkar Kulkarni, Bharat Mazire, Pranav Karkar, Shriya Jadhav
“IOT based Home Automation and Security System”
Prof. Sagar Rajebhosale, Mr. Avinash Sonawane, Mr. Sunmitra Pawar, Mr. Vijay Kadam, Mr. Ashish Waghela
Comparision of BER’s of QAM and PSK Modulation Techniques for Channel Estimation by using LS Estimator in MIMO-OFDM System
Diksha Chauhan, Vivek Kanwar
Student Performance Prediction System using Data Mining Approach
Kalpesh P. Chaudhari, Riya A. Sharma, Shreya S. Jha, Rajeshwari J. Bari
Gym Monitoring Framework for Fitness Management System
Mr Akshay Sambare, Dipali Bondre, Sachin Thorat, Miss Archana Vishe, Prof. Ankit Sanghavi
Health Assessment using Raspberry Pi
Ann Maria Sunny, Ann Paul, Ann Susan Jose, Cuckoo Anitha Joseph, Anu Rani Philip
A Survey on Basics of Cryptography
Vaibhav V. Bhujade, Deepak Chaudhary, Suraj V. Raut
IoT Based Wearable Device for Enhancing Holistic Students Evolution
Mr. J. Dani Reagan Vivek, S. Lakshmanan, S. Karthik
A Review on Soft Errors and Different Fault Tolerance Techniques
Jyoti Maruti Gadekar, Prof. (Dr.) Prakash H. Patil
Solar Cell Crack Identification using Internet of Things (IoT)
L. Nagalakshmi, K.S. Abdul Karimullah Ansari, Gowtham.N, Janagi Raman.P
Enhanced Data Security with Magic Rectangle and Genetic Algorithm
Monali G. Pawar, Minal S. Chaudhari, Ankita K. Wani and Dhiraj S. Mahajan
Data Deduplication and Load Balancing Techniques on Cloud Systems
Prof M.S. Pokale, Surabhi Dhok, Vaishnavi Kasbe, Gauri Joshi, Noopur Shinde
GPS based Location Services and Analysis of Transit Data using Data Mining
Prof A.G. Dongre, Ankita Kadale, Snehal Khavle, Ajinkya Dalvi
Survey on Recommending Learning Path of Student using Machine Learning
Priti B. Jadhav, Dr. R. B. Ingle
Security in Cloud Computing and Different Algorithms for Load Balancing
Anitha R, Dr C Vidyaraj
Efficient Design of LOE Pass FIR Filter by Hamming, Kaiser and Blackman Window Techniques
Yogesh Chandrosha, Nirmala Maheshwari, Pranay Kumar Rahi
Educational Enquiry Desk
Nikhil Jadhav, Pravin Jadhav, Ashish Jagtap, K.K. Tripathi
Protein-Protein Interaction Interface Database Development based on Protein Network
Mr. Kamlesh K. Gautam
Modelling of Hybrid Wind and Solar System Using Multi Stage Convertors with the Help of MATLAB SIMULINK
Neha R. Khanzode, Sachin Gour
Cyber Crime and Its Preventive Measures
Manpreet Kaur, Gurinder Kaur, Er. C.K. Raina
Controlling of a Toy Car using an Android Device (Motor Droid)
Abhi Vora, Vaibhav Chincholkar, Omkar Lad, Ms. Avani Sakhapara
Visual Cryptography for Authentication and File Sharing using different techniques in Web Portals
Pankaj Sonune, Sourav Sengupta, Shikhar Srivastava, Tushar Sonawane
XML as Import and Export of Data
Binjal Gohil, Tejal Chavan, Vedant Kulkarni, Sudarshan Kumar
Improved Entropy and Key Point Feature Extractor for Effective Multimedia Information Retrieval
Santhosh J, Shafna M
Green Computing using Multi label classification for Mobile Medical Recommendation
T Sivakumar, Basheer P, Mubeena V
Worm Detection in Cloud Based Systems by a Systematic Analysis
Mr. Mahesh Nelapati, Dr. Yamarthi Narasimha Rao
IoT Based Electric Energy Meter
Pratik P. Bakshi, Akshay S. Patil, Akshay S. Gavali, Prof. Vibha U. Patel
Condition Monitoring of Back to Back HVDC Transmission System using Artificial Neural Network
Disharika Badgotiya, Dr. Pragya Nema
Improving Security using Honeyword for Online Banking Authentication System
Akshata Chor, Ashwini Gawali, Ashwini Mohite, Madhuri Tanpure, Prof. P. B. Sahane, Prof. P. B. Thorat
Plagiarism Tool
Mangesh Chandane, Medha Sarang, Sudarshan Borade, Amol Dhamale
Accident Detection using Hardware
Prof. J.B. Kulkarni, Khushboo Raisinghani, Poorva Chaturvedi, Pranshu Sanchania, Vartika Jharwal
Secure, Reliable and Load Balanced Routing Protocols for Multihop Wireless Networks
Mitali V. Patil, Prof. Vaishali Jadhav
A Secure Online Based Friend Recommendation System for Social Network
Priyanka Uchekar, Kirtee Gawade, Arati Dhumal, Rina Sandbhor, Prof .S.D Kadam, Prof .P.B.Sahane
A Review on Different Multi Biometric Cryptosystems
Sreemol R, Kavitha N
Detection of Retinal Hemorrhage in Color Fundus Image
Priyanka Kale, Prof. N. Janwe
A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
Mrs. Nagamani K, Bhange Yogita, Bhoir Dhanashree, Dalavi Rani
Enhanced User Motion Detection using Multiple Smartphone Sensors
Amit Thakor, Prof. Srushti P. Soni
Implementation of Dynamic Auditing Protocol for Data Storage in Cloud Computing
Patil Vaishali, Wagh Shrikant, Panchal Amol, Prof. G.N. Potdar
Enhancing Automatic PPT Generation Technique through NLP for Textual Data
Pooja Belote, Sonali Bidwai, Snehal Jadhav, Pradnya Kapadnis, Nakul Sharma
Shielding the Server from Furtive Distributed Denial of Service Attacks using Dominate and Release Policy
Akshitha Koluguri, Akshay Chotiya, Arindam Das, Aman Ajmani, Vishwajeet Singh
Assisting Text Annotation based on Attributes Suggestion Strategy using Content and Query
Vikas R. Palekar, Miss. Shital P. Dhok, Prof. Dinesh D. Gawande
Design and Performance Evaluation of Priority Vehicle for Emergency Services in VANET
Saket Tiwari, Vipin Bondre
A Hash based Mining Algorithm for Maximal Frequent Item Sets using Hashing
Vaishali Galav, Deepak Jain
RFID based Tracking System
Prof. Gaurav G. Narkhede, Akshay Kishor Langade, KinalGaurang Mehta, Shubhankar Abhay Kulkarni
A Survey on Cloud Security Issues and Challenges
S.Indhumathi,T.Manigandan, S.T.Saravanan
Abstract
A Review of Internet of Things in Healthcare
Md. Khashrul Alam
DOI: 10.17148/IJARCCE.2017.6301
Abstract: Internet of Things is a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual �Things� have identities, physical attributes, and virtual personalities and use intelligent interfaces, and are seamlessly integrated into the information network. Internet of Things infrastructure is letting devices to collect, record, analyze data that was not accessible before. The Internet of Things can play a significant role in managing the chronic diseases such as asthma, cardiac related diseases, stroke, hypertension etc. remotely. The study is based on secondary data sources. It shows the application and challenges of IoT in healthcare.
Keywords: Radio Frequency Identification, Wireless sensor networks, body area network, Trustworthiness.
Abstract
Multi touch Gesture Generation and Recognition Techniques: A Study
Mr. Ramdas Pandurang Bagawade, Ms. Pournima Akash Chavan, Ms. Kajal Kantilal Jadhav
DOI: 10.17148/IJARCCE.2017.6302
Abstract: A huge number of users are using smart phones to communicate with each other. A smart phone user is exposed to various threats when they use their phone for communication. These threats can disorganization the operation of the smart phone, and transmit or modify user data rather than original[1]. So applications must guarantee privacy and integrity of the information. Single touch mobile security is unable to give efficient performance for confidential data. Hence we are moving towards multitouch mobile security for high security. In computing, multi-touch is authentication technology that enables a surface to recognize the presence of more than one touch points of contact with the touch screen [2]. By using multiple touch points to authenticate user for access confidential data in mobile phones. we are presenting our study about biometric gestures to authenticate user through multitouch finger points for more security[1].
Keywords: Multitouch, biometric gesture, authentication, security, smart phone Finger-tracking, Android Operating system.
Abstract
Reliable and Secured Distributed Deduplication System in Cloud Computing
Rohit Jagtap, Akshay Deore, Kiran Mate
DOI: 10.17148/IJARCCE.2017.6303
Abstract: Cloud Storage has been commonly used by many users, deduplication is a one of the technique used in such cloud storages. Basic idea of deduplication is that there should be only single instance of a file stored in the servers even if it is used by millions of users. Although deduplication increases storage consumption, the technique itself is not very reliable. Likewise, when the user uploads some file security concern of confidentiality of that file also arises. With the above security concerns keeping in mind we put forward this paper with an idea of creating a reliable distributed deduplication system. With our system we target to improve reliability of files with them scattered across multiple serves. With our new covert sharing mechanism we also meet the security requirements of data confidentiality and consistency, all of this without using any cryptography mechanism of any sort. Our tests show that this system is secured as it fulfills our security threat model. As a proof of concept, we implement the system we put forward and show that the incurred operating cost is very limited in realistic environments.
Keywords: Deduplication, distributed storage system, reliability, covert sharing.
Abstract
Multi-touch Gestures Authentication Techniques: A Study
Mr. Ramdas Pandurang Bagawade, Ms. Bhagyashri Satish Bagal, Ms. Monika Kishor Kale, Ms. Trupti Chandrakant Jangam
DOI: 10.17148/IJARCCE.2017.6304
Abstract: In current era the multitouch interfaces interactions with computing devices are changing fastly. The common problems related to users for user authentication are selecting weak textual passwords or forgetting password [1]. Hence we studied gesture based multitouch authentication system. Multitouch gestures based on the movement characteristics of the palmand fingertips being used to perform the gesture[1]. We studied a various techniques to verify multi-touch gesture templates. With score-based classifiers where only the first five samples of a good subject were considered as templates, author achieved4.46 % EER [1]. Further, with the combination of three commonly used gestures likepinch, zoom, and rotate, using more than one finger, 1.58% EER was achieved[1].Touch and multi-touch gestures are the most common way to interact with technology such as smart phones, tablets and other mobile devices[1].
Keywords: Finger-tracking, Android Operating system, Eclipse, Gesture, Normalization.
Abstract
Automatic Irrigation using GSM Module and Solar Panel
Ankit Singh, Abhay Singh, Ashish Themse, Priyanka Ramteke, Damini Varle
DOI: 10.17148/IJARCCE.2017.6305
Abstract: Most of the Indian people depends on the agriculture and due to that economy of our country mainly depend on the agriculture, so proper irrigation is must for efficient agriculture and accordingly we can improve the economy of our country. we can achieve this with the help of various electronic devices and by using this we can achieve proper irrigation on the field in automatic manner. For automation, we require various hardware and software tools such as various kinds of sensors for checking the status of field and GSM module for wireless communication and the microcontroller along with DTMF IC for decision purpose.
Keywords: Automated Irrigation system using GSM, Sensors, Microcontroller, Dual Tone Multi Frequency (DTMF).
Abstract
An IoT Based Health Care and Patient Monitoring System to Predict Medical Treatment using Data Mining Techniques: Survey
Aieshwarya. B. Chavan Patil
DOI: 10.17148/IJARCCE.2017.6306
Abstract: The majority of patients in the hospital are non-ambulatory and would benefit from predictive and personalized monitoring system. Technology plays the major role in healthcare not only for sensory devices but also in communication, recording and display device. It is very important to monitor various medical parameters and post operational days. Hence the latest trend in Healthcare communication method using IOT is adapted. Internet of things serves as a catalyst for the healthcare and plays prominent role in wide range of healthcare applications. In this project the AVR-328 microcontroller(Arduino board) is used as a gateway to communicate to the various sensors such as temperature sensor, heartbeat sensor, ECG sensor, sensor for keeping a track of drip levels(blood or saline). The microcontroller picks up the sensor data and sends it to the network through Wi-Fi and hence provides real time monitoring of the health care parameters for doctors. The data can be accessed anytime by the doctor. The controller is also connected with buzzer to alert the caretaker about variation in sensor output. At the time of extremity situation alert message is sent to the doctor through the android application connected to the cloud server. Hence quick provisional medication can be easily done by this system. Also an additional subsystem is provided for prediction of heart disease for the patient based on his/her health parameters. This system is efficient with low power consumption capability, easy setup, high performance and time to time response.
Keywords: IOT (Internet Of Things), Data mining, Arduino kit, Health Parameters, Cloud storage, Motion detection, Heart Disease Prediction.
Abstract
Load Aspect Recognition Based Data Compression in Smart Meters
K. Anupallav, D. Selva Mary, M. Bincy Immaculate, U. Logeswari, S. Uma
DOI: 10.17148/IJARCCE.2017.6307
Abstract: Power line carrier communication has as of late pulled in the consideration of vitality organizations as a helpful and common innovation for building the advanced prepaid metering infrastructure and to balance the electricity without fluctuation. The voltage fluctuation is also reduced . The customer and the system can be interacted without the help of EB officers. This system particularly focus on the activities of power line communication technology and provide the electricity to the customer without any fluctuation till the maximum level of electricity consumption is reached. A person need not go to EB station for billing and payment.
Keywords: Power line, EB station, Load Aspect Recognition, Data Compression, Smart Meters.
Abstract
Alcohol Detection with Vehicle Controlling
Dimple U. Mendhe, Pallavi R. Mishra, Monika R. Taywade, Rajani G. Musale, Komal Ramteke
DOI: 10.17148/IJARCCE.2017.6308
Abstract: This system provides a unique method to curb drunken people. The system has an alcohol sensor embedded on the steering of the car. Whenever the driver starts ignition, the sensor measures the content of the alcohol in his breath and automatically switches off the car if he is drunken. In this system the sensor delivers a current with a linear relationship to the alcohol molecules from zero to very high concentration. The output of the sensor is fed to the pic microcontroller for comparison. If the measured value reaches the threshold, relay cut off automatically and the buzzer produces sound.
Keywords: PIC16F877A, CMOS, MQ-3 gas sensor.
Abstract
A Novel approach for privacy policy on online social network
Prof. P.S. Hanwate, Pradnya Kapile, Kajal Katariya, Sunny Yadav , Ranjeet Patil
DOI: 10.17148/IJARCCE.2017.6309
No abstract available.
Abstract
Review on Reversible Image Data Hiding With Contrast Enhancement
Prof. M.S.Sadavarte, Pratima B. Choudhari
DOI: 10.17148/IJARCCE.2017.6310
No abstract available.
Abstract
Bluetooth Controlled Car System
Shrutika Kanere, Rutuja Shinde, Vaibhavi Tornekar, Dnyaneshwari Zagade, Mrs. V.S.Sonar
DOI: 10.17148/IJARCCE.2017.6311
No abstract available.
Abstract
Model to Improve the Assimilation of Contents in Programming
Ivelisse Teresa Machín Torres
DOI: 10.17148/IJARCCE.2017.6312
Abstract: The contemporary world requires each day more intensity in the use of technologies, this requires an improvement in the programming teaching. This work provides a model that contributes to the implementation of concepts and methods of Object Oriented Programming using multiple intelligence, in such a way that it favors the knowledge management and improve the orientation to the solution of problems in the informatics professionals. An Intelligent Tutor System component was developed as part of the model, based on an integration of Artificial Intelligence techniques, taking into account multiple intelligences. The component intelligent tutor system, contributes to the traditional architecture of tutor systems. An administrator interface allows professor the management of the data referred to the activities developed by the students in the system, thus the analytical extraction and the forecast capacity of the students through data mining techniques. The model was tested under validation and favorable outcomes were obtained.
Keywords: Learning, multiple intelligence, knowledge management, model, intelligent tutor system.
Abstract
A Text Mining Approach to Identify and Analyse Prominent issues from Public Complaints
Febina Merson, Roseline Mary
DOI: 10.17148/IJARCCE.2017.6313
Abstract: The contemporary world requires each day more intensity in the use of technologies, this requires an improvement in the programming teaching. This work provides a model that contributes to the implementation of concepts and methods of Object Oriented Programming using multiple intelligence, in such a way that it favors the knowledge management and improve the orientation to the solution of problems in the informatics professionals. An Intelligent Tutor System component was developed as part of the model, based on an integration of Artificial Intelligence techniques, taking into account multiple intelligences. The component intelligent tutor system, contributes to the traditional architecture of tutor systems. An administrator interface allows professor the management of the data referred to the activities developed by the students in the system, thus the analytical extraction and the forecast capacity of the students through data mining techniques. The model was tested under validation and favorable outcomes were obtained.
Keywords: Learning, multiple intelligence, knowledge management, model, intelligent tutor system.
Abstract
To analyse real-time traffic conditions with the help of GPS
Anita Shinde, Rutwik Choughule, Shubham Jangam, Shweta Tarte, Shweta Kumbhar, Apoorva Shinde
DOI: 10.17148/IJARCCE.2017.6314
Abstract: The emergence of Social Media has given a platform to the public to articulate their interests and opinion. Social Media has a great impact on the public�s thoughts and opinion and the public does not hesitate to express their thoughts through Social Media. Lately, Social Media is increasingly used in Political Context. Through Social media the public have got a platform to voice their opinion about anything and everything, this also include politics. Due to the transparency of the social media, any issues raised will reach out to the whole world. Hence the participation of the citizens in government related issues will make the authorized officials accountable to look into the issues immediately. These opinions pertaining to political institutions and government are gathered from micro blogging services and social networking sites to identify the efficiency of the government. This paper discuss an approach where data collected from social media are preprocessed and classified to identify the major issues encountered by the public in their daily life. In this paper we propose a method to identify the most important government related issues from the perspective of the public.
Keywords: Social Media, Text Categorization, Text Mining, Data Pre-processing, Opinion Mining.
Abstract
Analysis of Algorithms for Implementing AI for Game “Tak”
Rajkumar pagey, Snehal Martiwar, Palak Khokle, Laxmi Nishad, Priya kakde, Rajesh Nasare
DOI: 10.17148/IJARCCE.2017.6315
Abstract: "TAK" is a conceptual technique two player game, which has as of late picked up ubiquity in the gaming group because of its beginning in a Fantasy Novel and because of its Kickstarter crusade. It is a Zero-Sum, Perfect-Information game. A zero-whole game is a scientific portrayal of a circumstance in which every member's pick up (or misfortune) of utility is precisely adjusted by the misfortunes (or increases) of the utility of the other member. In the event that every player, when settling on any choice, is superbly educated of the considerable number of occasions that have beforehand happened, it is known as an immaculate data game. Because of these properties, we can actualize essential AI calculations, as Minimax and Alpha-beta look based calculations for "TAK". "TAK" Community is consistently developing and dissimilar to chess there hasn't been a great deal of consideration given to "TAK" AI. A similar investigation of AI Algorithms will help future "TAK" AI designers to make an AI program all the more proficiently.
Keywords: Abstract strategy, board game, perfect information, TAK, zero-sum.
Abstract
Survey Paper on Door Level Security using Face Recognition
Harshada B. More, Anjali R. Bodkhe
DOI: 10.17148/IJARCCE.2017.6316
Abstract: This paper is a review of existing face detection and recognition which is conducted to investigate the result of different approaches in terms of recognition accuracy and some of them are discussed for minimizing processing time point of view. The goal of this paper is to present a critical survey of existing literature on human face recognition. This paper is having two level security which makes the security stronger and reliable. In turn, this give the user more control. In past days, the research is gone on various door lock security systems like traditional security systems which provide indication using alarms. Due to the advancement in recent techniques, some door lock security systems are based on PROTEUS, GSM, GPS, many sensors, iris recognition, software like MATLAB, microcontroller, biometrics like face recognition, face detection, RFID and smart cards. This paper is basically comprised of three subsystems � Face detection, Face recognition and automatic door access control.
Keywords: Face recognition, detection, PCA, MATLAB, biomatrics, GSM, GPS.
Abstract
Design A Low Pass Fir Filter By Using Blackman Harris Kaiser And Tukey Window Techniques
Manju Kanwar, Ruchi Baghel, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.6317
Abstract: The input signal has a great influence on the performance of the system in digital control system. Processing of input signals is important to get useful signal in has processing of digital signal finite impulse response (fir) filter plays on important role. The aim of this paper is digital FIR filter designed by different window techniques perform better for reducing noise various window method such as Blackman window, Kaiser window, tucky window. We found that filter designing by window method is easy and fast.
Keywords: DSP, Digital Filter, Low Pass Filter, and Blackman Harris Window, Kaiser window and tukey window.
Abstract
Performance Analysis of Efficient Power Management Controls in Android Device
Chirag Shah, Sumit Chaudhary, Priya Agrawal
DOI: 10.17148/IJARCCE.2017.6318
Abstract: Now a days too much research work is carried out currently in Android, but one of the biggest issue that faced by any customer as well as developer is that, Android device consumes too much power that leads to battery and heating problems which degrades the performance. This paper depicts the significance of various ways how one can reduce the power consumption of android device in terms of Linux power management, Battery Enhancement, Wake Lock management etc. and provide the efficient result in growth of performance of device.
Keywords: Android power consumption, Android performance management, Battery Enhancement, Power Saving Apps, Power efficiency
Abstract
A Survey “Fatigue Monitoring System”
Mr. Sachin Pukale, Ms. Aishwarya Pandit, Ms. Komal Londhe, Ms. Priyanka Rajmane, Ms. Shital Agarwal
DOI: 10.17148/IJARCCE.2017.6319
Abstract: This is a fatigue detection system implemented in smartphone. This system will detect the drowsiness of the driver while he is driving. And if the reverie is detected by the system then it will generate an alert. In this the parameters are blinking of eyes, mouth yawning and head shaking. Head shaking is the new parameter which is used in this system. These parameters are calculated to identify driver�s weariness. The Canny Active Contour method is used for detecting yawning and the Harr-like technique is used for detecting face and eye blinking.
Keywords: Fatigue monitoring, Eye blinking, Yawning, Face tracking, Head Noding.
Abstract
Agricultural Updates Using Multitenant Cloud Infrastructure In Distributed Environment
S.Divya, M.Mathivani, Priyanga Sivaprasad , S.Uma
DOI: 10.17148/IJARCCE.2017.6320
Abstract:
Keywords:
Abstract
Design of Low Power Multiplier using Reversible logic: A Vedic Mathematical Approach
D.V.R Mohan, K.Vidyamadhuri, Y.RamaLakshmanna, K.H.S Suresh kumar
DOI: 10.17148/IJARCCE.2017.6321
Abstract: Multipliers are vital components of any processor or computing machine. More often than not, performance of microcontrollers and Digital signal processors are evaluated on the basis of number of multiplications performed in unit time. Hence better multiplier architectures are bound to increase theefficiency of the system. Vedic multiplier is one such promising solution. Its simple architecture coupled with increased speed forms an unparalleled combination for serving any complex multiplication computations. Tagged with these highlights, implementing this with reversible logic further reduces power dissipation. Power dissipation is another important constraint in an embedded system which cannot be neglected. In this paper we bring out a Vedic multiplier known as "UrdhvaTiryakbhayam"meaning vertical and crosswise, implemented using reversible logic, which is the first of its kind. This multiplier may find applications in Fast Fourier Transforms (FFTs), and other applications of DSP like imaging, software defined radios,wireless communications.
Keywords: VedicMultiplier, Reversible Logic, UrdhvaTiryakbhayam, Power utilization.
Abstract
Survey on Algorithms for High Utility Itemset Generation
Prof Jyoti B. Kulkarni, Aishwarya Dingre, Sonal Bhosale, Deepali Mehroliya, Shivani Mudgal
DOI: 10.17148/IJARCCE.2017.6322
Abstract: Data mining is becoming a popular research topic with its frequent applications in online e-business, web click stream analysis and cross marketing. Mining high utility itemsets from a transactional database is concerned with the discovery of itemsets with high utilities like profits or gains. Efficient discovery of the frequent and useful itemsets in huge datasets is a crucial task in data mining. In the recent years, many methods have been proposed for generating high utility patterns. Owing to this, there are few problems such as, if the minimum utility threshold value is set too low, huge amount of itemsets are generated. But, if the minimum utility threshold is set too high, very few or no high utility itemsets will be generated. In high utility itemset mining, the profit values or utility value for every item and the number of units of each item is taken into consideration. We hereby present the study of issues related to the different structures used and algorithms for mining the high utility itemsets.
Keywords: Data mining; frequent itemset; high utility itemset; transactional database.
Abstract
An Efficient Dynamic Scheduling based on Greedy Algorithm for Heterogeneity Clouds
Dr.P.Mathiyalagan, M.Rajshree, S.Shobika, M.Sowmiya
DOI: 10.17148/IJARCCE.2017.6323
Abstract:
Keywords:
Abstract
A Comparative Study for Trust and Reputation Models for Wireless Sensor Networks
Sura F. Ismail
DOI: 10.17148/IJARCCE.2017.6324
Abstract: Cloud computing provides on-demand computing and storage services with high performance and high scalability. However, the rising energy consumption of cloud data centers has become a prominent problem. Scheduling in cloud is responsible for selection of best suitable resources for task execution, by considering some static and dynamic parameters and restrictions of tasks into consideration. The existing deadline constrained application, meeting the application�s deadline requirement is critical, but there is no incentive to finish the application earlier. The proposed introduce a model of task scheduling for a cloud-computing data center to energy-efficient dynamic task scheduling. Dynamic power aware greedy scheduling algorithm (DPAGS). As a heuristic algorithm, DPAGS dynamically estimates task energy by considering factors including task resource demands, VM power efficiency, and server workload before scheduling tasks in a greedy manner. Simulated a heterogeneous VM cluster and conducted experiment to evaluate the effectiveness of DPAGS. Simulation results show that DPAGS effectively reduced total energy consumption by more than 20% without producing large scheduling overheads. Finally, the simulation is carried out and its efficiency is analysed with existing scheduling algorithms.
Keywords: Cloud Simulation, Dynamic VM Allocation, Power Consumption, Greedy Algorithm.
Abstract
Trio Constrained Adaptive Noise Removal (TCANR) Mechanism for Salt and Pepper Noise in Image Classification
G Muthu Krishnan, Capt.Dr.S.Santhosh Baboo
DOI: 10.17148/IJARCCE.2017.6325
Abstract: Noise removal (also called as denoising) of an image is a vital task in multi-class image classification. Three major shortcomings in Weighted Nuclear Norm Minimization (WNNM) are identified. Firstly, WNNM�s patch matching based on the noisy data will considerably augment the risk of patch mismatching. This shortcoming is overcome by performing the grouping task based on noise contentment. Secondly, the fixed feedback percentage which keeps on feeds back ten percent of the residual image to the next iteration despite the consequences of noise levels. This shortcoming is ruled out by incorporating relative feedback mechanism. Finally, the unchanged / constant number of iterations for different noise not considering the distinctions in image content that which will certainly fails to deem the degree of detail in the image. For this variable termination criterion is used. The proposed work is named as Trio Constrained Adaptive Noise Removal (TCANR). Performance metric peak signal to noise ratio (PSNR) is chosen. Four existing methods are taken into account for comparing the proposed TCANR. Extensive simulations are conducted using MATLAB and the results prove that the proposed TCANR performs better in terms of PSNR when compared with the existing methods.
Keywords: WNNM, Classification, Multi-label, Noise Removal, Quality, Denoise, PSNR, TCANR, TV, FBF, LLSure, LAPB, Corel 5k, IAPR-TC12, PASCAL-VOC-2007, PASCAL-VOC-2010
Abstract
A Review on IoT – Technology, Application, Architecture, Services
Mohammed Anwaruddin, Mohd. Abdul Sattar, Mohd. Anas Ali
DOI: 10.17148/IJARCCE.2017.6326
Abstract:
Keywords:
Abstract
Prosthetic Application Using Tongue and Robotic Arm
R.V.Shinde, S.S.Patil
DOI: 10.17148/IJARCCE.2017.6327
Abstract: The �internet of things� (IoT) concept is used to define or reference systems that rely on the autonomous communication of a group of physical objects. The applications areas of the IoT are numerous, including: smart homes, smart cities and industrial automation. IoT systems often provide great benefits to numerous industries and society as a whole. Many of the IoT systems and technologies are relatively novel. The aim of this paper is to provide the last and most innovative contributions concerning the Protocol, Technology, Application, Architecture & Issues of interest in IoT solutions that involve interconnected smart things that interoperate with the objective of solving problems, provide functionality or optimize tasks. Topics of interest include (but are not limited to): � Smart things network and communication: architectures, services and protocols. � Smart things: privacy, security and identification. � Internet of Things systems and applications. � User-centric solutions to define IoT collaborative process. � Innovative IoT Solutions for handicapped persons. � Smart things and RFID/NFC communications. � Intelligent systems based on connected vehicles. � Smart things networks for real world data management. � Practical experiences in Smart cities, large-scale IoT systems. � Opportunistic IoT, based on opportunistic networking techniques.
Keywords: RFID, IoT, NFC,M2M
Abstract
An Efficient Geometric Routing Using Convex Hull Tree Information In Geographic Protocol
T.Nivetha, S.R.Lavanya
DOI: 10.17148/IJARCCE.2017.6328
Abstract: Geographic routing is of interest for sensor networks because a point-to-point primitive is an important building block for data-centric applications. Improved Greedy Distributed Spanning Tree Routing (IGDSTR), is a new geographic routing algorithm that finds shorter routes and generates and less maintenance traffic than Greedy Perimeter Stateless Routing (GPSR) algorithms. Greedy forwarding faces the problem at local dead ends where geographic routing potentially scales well. GPSR handles dead ends by planarizing the node connectivity graph and then using the right-hand rule to route around the resulting faces. The proposed system introduces a new kind of spanning tree, called hull tree. Hull trees provide a way of aggregating location information built by convex hull to the spanning tree. Convex hull is used in routing to avoid paths that will not be productive, so it is able to traverse a significantly reduced sub tree, consisting of only the nodes with convex hulls that contain the destination point.
Keywords: Geographic Routing, Greedy Distributed Spanning Tree Routing, Hull Tree, Routing protocol
Abstract
Human Computer Interaction
Suvrunda Jadhav , T.R.Patil
DOI: 10.17148/IJARCCE.2017.6329
Abstract: The intention of this paper is to provide an overview on the subject of Human-Computer Interaction. The overview includes the basic definitions and terminology, a survey of existing technologies and recent advances in the field, common architectures used in the design of HCI systems which includes unimodal and multimodal configurations, and finally the applications of HCI. This paper also offers a comprehensive number of references for each concept, method, and application in the HCI.
Keywords: Human-Computer Interaction, Multimodal HCI, Mobile Computing, Smart Environment, Science & Technology.
Abstract
High Bandwidth F-Shaped Microstrip Patch Antenna for C-band Communications
Muhammad AfsarUddin, Fatama Akter, Md. Jahangir Alam
DOI: 10.17148/IJARCCE.2017.6330
Abstract: In this paper, a F-shape microstrip patch antenna is designed and analyzed. The antenna design is simulated using a tool named Sonnet Suites, a planar 3D planar electromagnetic simulator that use Method of Moments. Probe feed technique is used in the proposed F-shape patch antenna. Simulation results show that the impedance bandwidth is 36.6% of the center frequency.The measured return loss is below -10dB.The proposed microstrip patch antenna is suitable for C-band communications.
Keywords: Patch Antenna, F-shape, Dielectric Substrate, Bandwidth, Return Loss, C-band, Sonnet.
Abstract
Evolution of Social Media Marketing
Prabhanjan Sharma, Beaulah Soundarabai P
DOI: 10.17148/IJARCCE.2017.6331
Abstract: Social Media is a platform where people socialize virtually. There are several social media platforms such as Facebook, whatsapp, Twitter, Quora, LinkedIn, YouTube and many more which are all used to acquaint with people across the globe by sharing their lifestyle status, Opinions, interests and also to create Awareness amongst each other. Social Media has impacted modern World on a very high scale. It can also be called as a first ever virtual creation that has revolutionized the world by Toppling governments; by keeping people on toes regarding day to day news, fashion, trends; by Sharing information's, bold facts which never reached common man in the recorded history. It is also providing a voice to common man which he/she never realized that he/she ever had. Human race has never been this aware; never pushed its potential to this extent. Never were our lives this easier, aware and revolutionary. Although there are several factors that made this world as it is today, it's evident that Social Media is to be thanked the most. As people are sharing pretty much everything about themselves with each other over the servers using social media platforms, their data's are stored in the databases which are hawked by corporate companies to promote their products by Mining, analyzing, predicting the data in the database. Sports Brand like Nike, Adidas, Under Armour and Puma use this data from different social media such as Facebook, Instagram to promote their product using the users search site records. This paper proposes a framework to develop a Social Media which is exclusively staunched to a distinct domain such as Sports, Fashion, Music which makes mining of data and promoting of products efficient without much hassle. Proposed Framework is further narrowed down to Sports domain for better understanding of the framework that's been explained.
Keywords: Social Media, Facebook, Instagram, Advertisement, Promotion, Platform, data Mining, Interests, Hassle Free, Under Armour, Nike, Sports, Tournament Bizz, Sponsor.
Abstract
Review Paper on Wireless Wearable Sensor System for Cardiac Activity Monitoring
Prof. G.K. Andurkar, Ms. Jayashri Mohurley, Vishakha Borkar
DOI: 10.17148/IJARCCE.2017.6332
Abstract: Ubiquitous vital signs sensing using wireless medical sensors are promising alternatives to conventional, in-hospital healthcare systems. In this work, a wearable ECG sensor is proposed. This sensor system combined an appropriate wireless protocol for data communication with capacitive ECG signal sensing and processing. The entire system has small size, is thin, and has low power consumption compared to recent ECG monitoring systems. In addition, appropriate signal conditioning and processing were implemented to remove motion artifacts. The acquired ECG signals are comparable to ones obtained using conventional glued-on electrodes, and are easily read and interpreted by a cardiologist. Heart rate assessment, as well as heart rate variability parameters are computed in real time directly on the sensor, thus only a few parameters are sent via wireless communication for power saving. Hardware and software methods for heart beat detection and variability calculation are described and preliminary tests for the evaluation of the sensor are presented.
Keywords: ECG signals, Heart rate assessment, MEMS technology.
Abstract
An Enhanced Energy Efficient Protocol with Optimize Cluster Head Selection Approach using Firefly Algorithm
Pankaj Soni, Rajnish Kansal
DOI: 10.17148/IJARCCE.2017.6333
Abstract: Wireless Sensor Network is the combination of small sensor nodes which sense the data from its surroundings such as temperature etc. then the collected or sensed data travels from source node to sink node via a selected and efficient route. The process of data transmission accomplishes by consuming the amount of energy. The energy consumption directly affects the lifetime of the network. Hence the performance and lifetime of the network is depends upon the amount of energy consumed by the nodes. There are various protocols which are used for reducing the energy consumption of the nodes by various means such as selection or route to the sink node and section of cluster heads. So this paper provides a review to the various techniques used for selecting the cluster heads for the network. The cluster head selection is a crucial part of the network. Because the node selected as cluster head is responsible for data transmission between sources and sink node. So the candidate node for cluster head should have required amount of energy so that it can remain live for long period and enhances the performance and lifetime of the network.
Keywords: WSN, Low Energy Adaptive Clustering Hierarchy, Routing, Cluster heads, TEEN.
Abstract
Analysis techniques of Content based Image Retrieval based on Confusion Matrix
Jaison Singh, Harshdeep Trehan, Varinderjit Kaur, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2017.6334
Abstract: In today�s epoch of Digital technology, the need of content based image retrieval is increasing day by day. Image retrieval system based on image�s visual content becomes more desirable. Hence, content based image retrieval has emerged as one of the most active research areas in the past few years. There are a lot of approaches have been proposed for content based image retrieval. The literature addresses the issues involved in content based image retrieval and presents solution to them. To this end, an interface is designed for content based image retrieval and in order to key out best approach a comparative study is performed.
Keywords: Content Based Image Retrieval, Fuzzy Semantic Relevance Matrix, Histogram of Oriented Gradients, Local Binary Pattern, Negative Predictive Value, Positive Predictive Value.
Abstract
Artery and Vein Classification in Retinal Images using Graph Based Approach
Ritesh R. Khatakalle, Prof. R. U. Shekokar
DOI: 10.17148/IJARCCE.2017.6335
Abstract: Digital image analysis of eye fundus images has several benefits than current observer based techniques. The characteristic symptoms of different systemic diseases like hypertension, glaucoma, diabetes and cardiovascular disorder etc. Affects retinal vessels. Diseases like diabetes show abnormalities and diameter changes in retinal blood vessels. In hypertension retinal blood vessels show dilatation and elongation of main arteries and veins. Arteriolar to venular diameter ratio (AVR) express high blood pressure levels, diabetic retinopathy and retinopathy of prematurity. Among other image processing operations the estimation of AVR requires vessel segmentation, accurate vessel width measurement and artery or vein classification [1].Hence the identification of arteries is essential to detect eye diseases. The work has been done on automated classification of retinal vessels and hence it is a challenging task.
Keywords: Artery/vein classification, graph, retinal images, vessel segmentation.
Abstract
Data Mining Tool for SMBs with FIM Method
Prof. S.S. Pawar, Rupesh Wankhede, Hitesh Godse, Amar Puranik, Akash Surwase
DOI: 10.17148/IJARCCE.2017.6336
Abstract: Data analytics is the science of examining raw data with the purpose of drawing conclusions about that information. Using these conclusions, retailers can make decisions that can significantly increase their revenue. However, small to medium sized businesses (SMBs) often cannot benefit from the advantages of data analysis due to lack of awareness, being technologically incompetent and other reasons. We propose to solve the above problem by developing a data analysis tool. The tool will run on a single computer- the same computer on which the source transactional data will be generated. It will be easy to use for those who are not comfortable with computers by providing a user-friendly interface and by displaying conclusions in an easy to read manner. These conclusions will guide the business owner (user) in making better business decisions. The goal behind creating the tool is to let the users realize, first-hand, the benefits data analysis can bring to their business. We will also be making use of an improved frequent-itemset mining (FIM) approach which will reduce the execution times of the tool.
Keywords: Data analysis, data mining, Apriori algorithm, Hadoop cluster.
Abstract
Police Station Network Implementation
Prof. M. E. Ingale, Mayur B. Thakare, Kamini D. Sagar, Supriya M. Ghuge
DOI: 10.17148/IJARCCE.2017.6337
Abstract: In this network implementation we are supposed to access multiple PC�s without using internet with LAN and the protocols that we are using are TFTP and FTP for sharing data and this whole network system is designed for security purpose and for handling system with command.
Keywords: FTP, TFTP, LAN, Routers, Switch.
Abstract
A Secure Authorization for Cloud Data Deduplication using Privileged Key
Ashish Sonawane, Parth Walia, Khushbu Vachhani, Savi Moundekar, Rugveda Sherkar
DOI: 10.17148/IJARCCE.2017.6338
Abstract: In today�s world, cloud service providers offers highly handy storage and as well as bulky parallel computing re-sources at nearly low costs. As cloud computing has become frequent, an ever increasing amount of data is stored in the cloud and shared by users with particular benefits. It defines the access rights which are safeguard for stored data. One of the tough challenge of cloud storage services is the administration of data which is increasing day by day. For the better preservation of data security, this project makes the first pursuit for technically inscribing the question of endorsement of data deduplication. Outstanding from all the other classic deduplication systems, the differential privileges of users are further taken in application in duplicate check keeping the data separate. We also present many innovative deduplication constructions which supports authorized duplicate check in an architecture of hybrid cloud. We are developing an advanced scheme for supporting stronger security by encryption of the file with different privilege keys. In this way, the users without correspondence of privileges do not perform the duplicate check. Security analysis shows that our system is secure in terms of the definitions which are specified in the system which is proposed.
Keywords: Cloud computing, Security, Deduplication, Encryption Decryption Technology.
Abstract
Cross Compilers
Gunjali Mahajan, Tejashri Bhargav, Anjali Sharma, Rekha Thorat, Kavita Patil
DOI: 10.17148/IJARCCE.2017.6339
Abstract: Compilers are used to run the programs and convert them from text format to executable format. Once a program is compiled it becomes platform dependent and the same program code cannot be carried to multiple systems. A compiler which is to be installed manually on every system requires a lot of space. It is also not easy to carry the same program code to multiple systems if the situation doesn�t permit the usage of a single system. For each language, a different compiler is needed to be installed. To avoid these drawbacks, a solution is proposed in this paper that is a cloud based cross compiler. The user would be given an option to select the language in which he wants to compile the program. The software will compile the program and return the output to the user. It reduces the problem of storage space and portability by using the cloud computing. The ability to used different compilers allows the user to choose the fastest compiler to compile the code. Also, the trouble of installing a compiler on each computer is avoided. This paper would be implementing a private cloud on which the software will be hosted. The software would be provided to the end user using a PaaS cloud.
Keywords: Cloud computing, private cloud, PaaS, web-services.
Abstract
Improvement of the Open Source Software Development Process
Shaikh Shariful Habib
DOI: 10.17148/IJARCCE.2017.6340
Abstract: Software development process is a very tightly steps maintaining process. We buy the software by making payment from the different enterprises. It may have different problems such as buying frequently, changing etc. To overcome such type of different problems we very often use open source software. But oss (open source software) has to maintain the proper development process. In this paper I have tried to give some ideas to improve the development process.
Keywords: Development process, peer review, parallel debugging, impede, derived works.
Abstract
Multilevel Authentication Based on QR Codes to Secure Banking Operations
Apoorva Khilare, Monika Dhage, Dhananjay Ghule, Rushabh Masurkar
DOI: 10.17148/IJARCCE.2017.6341
Abstract: Today, People can do almost everything online (banking, shopping, storing and sharing personal information). To access these services in the most secured manner is very critical. Many authentication methods are available such as username and password, barcode, finger print and face detection. But these methods have some advantages as well as disadvantages. Username and password are not providing security; fingerprints and face identity are the methods which are very costly and not affordable by common users. To overcome all the drawbacks the QR code is introduced. QR code has many applications. QR codes are used in banking transactions for security; it provides more security than barcode. The QR code stores complex password. QR code can be scanned using smart phones. When a user opts for online banking transaction he opens the bank website. On the same page, QR code is displayed after registration, user can scan the QR code image with a scanner. A string is generated after scanning. For authenticating user, IEMI no. of phone is used. The multilevel security is used in this application; therefore this system is very secured method for online transaction than existing system.
Keywords: Barcode, QR code, IMEI no., Finger Print.
Abstract
Content-Based Image Retrieval by Query Adaptive Search using Hash Codes
E. Aarthi, S. Kaviya, D. Keerthika, B. Kirithika
DOI: 10.17148/IJARCCE.2017.6342
Abstract: Visual similarity has been a lively topic of analysis in Scalable image search. Progressive solutions usually use hashing ways to plant high-dimensional image options into playing area, wherever search may be performed in period supported playing distance of compact hash codes. Not like ancient metrics (e.g., Euclidean) that provide continuous distances, the playing distances area unit separate number values. As a consequence, there area unit usually an outsized range of pictures sharing equal playing distances to a question that mostly hurts search results wherever fine-grained ranking is vital. This paper introduces associate approach that allows query-adaptive ranking of the came pictures with equal playing distances to the queries. This can be achieved by first off offline learning bitwise weights of the hash codes for a various set of predefined linguistics thought categories. We have a tendency to formulate the burden education method as a quadratic programming drawback that minimizes intra-class distance whereas conserving inter-class relationship captured by original raw image options. Query-adaptive weights area unit then computed on-line by evaluating the proximity between a question and also the linguistics thought categories.
Keywords: Hash codes, Query-adaptive, Hamming distance.
Abstract
Survey on Multi-Party Privacy Conflicts in Social Media
R. Aravinth, G. Bharath, J. Dinesh, M. Hari, N. Kathirvel
DOI: 10.17148/IJARCCE.2017.6343
Abstract: On-line Social Networks (OSNs) expend knowing commanding movement in clean years and develop into portal in wish of jillions of net quit clients. Those provider deal alluring methodology for digitals organize contact and truths dissemination, however to boot trade a numeral of wellbeing and secrecy issues. While OSNs concur clients to control get right of passage to pooled measurements, they once don't convey any gadget to instructor echoer information associated with a modest bunch of customers. To the present outstanding degrees, we tend to supporter connect come back with reference to change the fortress of shared measurements identified with numerous handlers in OSNs. We tend to put along a privilege of get to controller model to seizure the see of helpful quit horsemen objectives, on board through approach of a multiparty strategy measurement test and a way organization invention. Also, we tend to contemporaneous a judgment showing of our affirmation system original that faces United States to control the geologies of winning sensibility solvers to finish interminable investigation family commitments on our prototype. We tend to as pleasantly articulate a confirmation of-thought organization of our meld as piece of a sales in Face digital book and convey ease of use task and refinement estimation of our gadget. Contraptions common completed system Broadcasting isn't introductory rate with more distant than single customer privacy � e.g., picks that paint several clients, editorials that remark complex client, happenings amid which few client is asked for then on.
Keywords: Dissemination, Geologies, Contemporaneous, Contraptions.
Abstract
Automated Locomotion Robot: using Arduino
N. Ashika, S. Karthik, S. Karthika, P. Muthusamy
DOI: 10.17148/IJARCCE.2017.6344
Abstract: In this report we have developed a locomotion robot which is mainly used to deliver goods and parcels from one Place to another. Input signals transmitted from a maximum distance of 150 m without a hitch, and the robot can also follow the instruction with a steady run. So it can be used to deliver products effectively. A small development board with a brain is known as Arduino. It communicates with the real world entities like LEDs and sensors.
Keywords: Arduino ATMega 2560, Bluetooth connection, Voice simulation, Android application, Sensors.
Abstract
A Secure File Store in Cloud Environment using HABE
S. Nandhini, R. Sangavi, S. Sangavi, S. Sowndarya
DOI: 10.17148/IJARCCE.2017.6345
Abstract: In this project, we propose the HABE (Hierarchy Attribute-Based Encryption) scheme for shared data with large groups in the cloud. We make use of hash signatures to compute verification information on shared data so that the authority is able to audit the correctness of shared data, but cannot reveal the identity of the signer on each block. Hash signature and Keys are generated by Hierarchical Access Tree. We can implement auditing scheme to perform efficient public security to protect both identity and data privacy in cloud environments. Users can also access the data from the data owner through cloud provider in real-time dynamic cloud environment. Data reliability through replication of the original data. Manipulation of data in the replicas, there by maintaining the originality of the data. If hierarcical data are stored in different servers then the unauthorised users cannot access the data.
Keywords: HABE, Data replication, Cloud computing, ABE.
Abstract
Exploring the Journals using Artificial Bee Colony algorithm
K. Radhika, M. Sowndarya, R. Suganya, A. Vallikkannu
DOI: 10.17148/IJARCCE.2017.6346
Abstract: The assessment of academic journals is a critical task to numerous scientific actions. These assessments may have an important influence on various issues reaching from publishing articles in academic journals to determining. The main aim is to develop the system that have the fair means of the selection of the best journal. Here we propose the system for ranking the journals in a huge data set which may include both similar and dissimilar distances of values from which the effective means of results being declared. A method for exploring the journals using, Artificial Bee Colony algorithm is presented to lessen the effort in working with the growth of data volumes. Artificial Bee Colony (ABC) is introduced for web mining for the both Journal Citation Reports and proposed data sets. This algorithm results us with relevant information for the questions posted by the clients when related to present Fuzzy c-means algorithm.
Keywords: Citation, Impact factor, Eigen factor, Artificial Bee colony.
Abstract
A Literature about Electronic Game which Reproduce Contingent Graph
N. Rajasekar, T. Santhosh, B. Sasikumar, K. Vijaya Kumar
DOI: 10.17148/IJARCCE.2017.6347
Abstract: In this project describe a hierarchical routine for technically originating game maps using two-dimensional Markov chains. Our techniques takes collection of game maps breaks them into small chunks and platforms clustering to find a set of chunks that correspond to high-stage constructions in the practicing maps. Procedures that produce pc game at ease need game enterprise knowledge. It takes some method to mechanically study game proposal information for stage proposal from gameplay videos. In future validate the learned proposal information can be used to originate sections of game levels. In this project explored statistical procedures that could lead to generalized technical map generators. It shows rich game proposal information can be automatically analysed from gameplay videos and signified in reproductive problematic replicas. It takes Contra game for evidence. In the gameplay videos, it evaluates the method on a measure of execute ability and Quality to the real stages signified.
Keywords: Multidimensional Markov Chains (MdMC), Markov Random Fields(MRF), Hierarchical MdMCs, Procedural Content Generation.
Abstract
A Fine-Grained Data Access Control using Attribute-Based Keyword in Web Search
P. Periyasamy, K.Y. Pradheep, U. Santhosh Kumar, G. Vengadesan
DOI: 10.17148/IJARCCE.2017.6348
Abstract: To hold those critical user data secured from untrusting servers, present ideas generally use cryptographic techniques by revealing data decryption keys simply to accredited users. These answers unavoidably introduce key distribution and data management on a heavy calculation on the data owner when fine grained data access control is preferred. It does not scale well. The issue still remains unresolved for rapidly attaining fine-graininess scalability and data privacy of access control. Users outsource critical data for distribution on cloud hence, they projected some services for data safety and access control. Existing paper generally focuses on outsourced data-set that can be retrieved from various owners. It can be identifiable by several users.It uses the techniques of attribute based encryption called Attribute-based keyword search pattern with efficient user cancellation (ABKS-UR). Users can have own search capabilities by not trusting on an online related authority. It enables scalable fine-grained search approval.Our proposed scheme enables application scenarios which enables separate data file to be related with a set of appearances. We achieve this objective by manipulating and individually joining the techniques of Key Policy attribute based encryption (KP-ABE) and Flap encryption. This also has salient features of Users secret key responsibility thereby achieving fine-graininess, scalability and data privacy for data access control. This examination shows that our proposed pattern is extremely efficient and provable safeguarding under existing security replicas.
Keywords: Cloud Computing, Management Data, Data Security.
Abstract
An Effective Audit Services for Allocation of Data in Cloud
M. Praveen, S. Surya, M. Vadivel, R. Vengatesh
DOI: 10.17148/IJARCCE.2017.6349
Abstract: We have created a brand new manner for the reversible information access theme for the multiple authority cloud storage theme. A theme known as CP-ABE is employed as a principle for our project. it's accustomed guarantee each forward and backward security. The results obtained from the project states that the project may be a secure oracle model. It�s an internet primarily based application mistreatment MVC design because the principle.
Keywords: CP-ABE, Multiple Authority, MVC Design.
Abstract
Unique Establishment of Data Handling and Data Checking in Public Cloud
P. Rajkumar, S. Syedali, K. Vishal, K. Kumaravel
DOI: 10.17148/IJARCCE.2017.6350
Abstract: In this real world the Cloud Computing, has develop a possible key for sharing Computing resources. Though it has distributing Computing service slightly than having native servers or individual devices to control applications, there are durable protection anxieties in management data. The current system are constructed with rough security ideas but it has some problems. The ideas are similar discrete responsibility, demonstrable data ownership, Third Party Inspecting are secure but it has some issues. To provide enough security in public Cloud a little research has been made on previous idea we suggest a new outline recognized as uniqueness established data handling and data checking in public Cloud which feats the welfares of quantum mechanisms to shelter public database. We took some reference in which rough public Cloud server, owner and client are provided with secure connection with our projected idea which uses arbitrary oracle model. Our logical learning has both achievement and disappointment rates with isolated and common Clouds respectively. Many customers would like to accumulate their information to common Cloud servers laterally with the quick growth of Cloud Computing. New safety issue have to be resolved in order to support more customers process their data in common Cloud.
Keywords: Cloud Computing, Management Data, Data handling.
Abstract
Smart Attendance Application Using Android and PHP
Sanya Patel, Aliya Sayyed, P.P Bastawade
DOI: 10.17148/IJARCCE.2017.6351
Abstract: Taking attendance in a class can often be a time consuming and a manual process, which is prone to human errors and incorrect recorded data. Also, maintaining the data for every student can be a tedious job since it involves some sort of manual efforts. These day�s inventions of smart phones and tablets which are very handy to use, this process can be made completely automated and error free by using the right technologies. In this project we have created an android application, server and a database that is used for taking and storing attendance which is easy to use and time saving. Once the attendance is taken, the attendance is stored at the database and the teacher can view the data accordingly. The teacher can even send e-mail to the student�s parent manually.
Keywords: Notification, XAMPP, Android studio.
Abstract
Augmented Reality for Educational Enhancement
Abdullah Mubarak Ghare, Mohammed Akhtar Khan, Mustafa Rangwala, Shadab Kazi, Prof. Sameer Panwala, Prof. Abdus Salam
DOI: 10.17148/IJARCCE.2017.6352
Abstract: Augmented Reality superimposes virtual objects over real world environment. Educators know that learning deepens, not just through reading and listening, but also through creating and interacting. This proposed project of ours aims to enhance current educational system using Augmented Reality. We are developing an application which will show animations, videos and 3D models of educational material. This project can enhance learning, creativity and retention among students. Our application will also foster intellectual curiosity among students making them smarter. We aim to change the conventional way of education and open a new opportunity towards a smart classroom.
Keywords: Augmented Reality; education; children; learning; virtual; disabled children; interaction; android.
Abstract
Extension of Lifetime and Efficiency of NAND Flash Memory using Coding Theory
C. Poovarasi, B. Priyanka, S. Shandiya, S. Lakshmi
DOI: 10.17148/IJARCCE.2017.6353
Abstract: In general, as the number of program/erase cycles increases over time, number of errors also increases in NAND flash memories. Hence, these memories suffer from write/read disturbs, data retention errors, bad block accumulation. Also, reliability of MLC memory is lower due to reduced gap between adjacent threshold levels. This causes for continuous scaling down of NAND flash memories. In order to improve the unwavering quality and performance of the chip, combinations of techniques are proposed in the paper. The aim of the paper is to prevent the data from being stored in a block that is bad to reduce power consumption and to place the data in the exact location rather than being stored in an equivalent address according to the mapping table to improve the performance of the memory using coding theory(Error Correction Code).Thereby, realizing higher efficiency, reliability and support longer lifetimes of NAND flash memory.
Keywords: NAND, retention error, unwavering, threshold.
Abstract
Designing a Low- Pass FIR Digital Filter by using Rectangular, Hanning and Triangular Window Technique
Kamal Kant Chandra, Mohan Lal prajapati, Mr. Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.6354
Abstract: Digital filter are widely used in the world of communication and computation. On the other hand, to design a Digital Finite Impulse Response (FIR) filter that satisfies all the required condition is challenging one. In this paper, design techniques of Low Pass filter using Rectangular, Hanning and Triangular Window Techniques of order (15) are presented. It shown that filter design by using Rectangular Window Technique is better as it provides better result in terms of magnitude, phase, impulse, step responses and pole-zero plot. The analysis of magnitude, phase, impulse, step response and pole-zero plot of proposed FIR Low Pass filter is performed using MATLAB Simulation.
Keywords: DSP, Digital filter, Low-Pass filter, FIR filter, Rectangular window, Hanning and Triangular Window Techniques.
Abstract
A Survey on Secure Authorized Deduplication in Hybrid Cloud
Ms. Chintu P Chacko
DOI: 10.17148/IJARCCE.2017.6355
Abstract: Cloud storage has become very popular now a days because of its advantages like sharing of data among different geographical locations .But in most of the organizations, the cache can contain many duplicate copies of many pieces of same data. Many techniques being used for removing duplicate copies of repeating data, among these techniques one of the important data compression technique is data deduplication. Deduplication is widely used in cloud storage to save bandwidth and to reduce the amount of storage space. To protect the confidentiality of data along with deduplication convergent encryption technique is used before outsourcing. To effectively protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication.
Keywords: Deduplication, hybrid cloud, authorized duplicate check, convergent encryption, symmetric encryption.
Abstract
A Survey on Texture Based Weed Identification System for Precision Farming
Ms. J. Mohana Preethi, Mrs. Dr. M. Sujaritha
DOI: 10.17148/IJARCCE.2017.6356
Abstract: Weed control within crop fields is one of the main problems in organic farming. For centuries, different weed removal tools have been used to minimize weeds in the crop fields. The automation of weed detection and removal in the agricultural field is a vital task which greatly improves the cost effectiveness and efficiency of the weed removal processes. This paper compares four texture extraction and one feature selection method tailored for weed removal process. Nowadays several image processing techniques are used for the removal of weeds in crop field. Eventually it also discusses the performance of those texture extraction methods and feature selection methods concludes the challenges facing in the present day research of weed removal technique in image processing.
Keywords: chemical weeding, physical weeding, morphological operation, texture extraction, feature selection, classification.
Abstract
Transmission of Ideal Data Query in Mobile Ad-hoc Social Networks
Umesh Patil, Shital Damate, Ashwini Gurav, Ajit Patil
DOI: 10.17148/IJARCCE.2017.6357
Abstract: Transmission of Ideal Data Query in Mobile Ad-hoc Social Network based on MASON. In this concept we develop social network where user can fire the query and expert will give the accurate answer as per highest ranking. User will become expert having likes of answer by another user from their own domain. Our aim to develop Mobile Ad-hoc Social Network for accurate answer and reduce the communication cost. Up till now we have covered 5 modules: 1.Network creation 2.Reachable expertise 3. Routing with dynamic redundancy control. 4. Data Query Evaluation by expertise. 5. File transmission.
Keywords: MASON, P2P Networks, Query Transmission, Dynamic Redundancy Control.
Abstract
A Cumulative Study on Gray and Black Hole Detection in MANET
Prof. N. V. More, Chetana Thombare, Prajakta Sutar, Rutika Tasgaonkar, Komal Joshi
DOI: 10.17148/IJARCCE.2017.6358
Abstract: Mobile Ad-hoc Network is a network in which multiple mobile nodes are interconnected and they communicate which other without fixed infrastructure. Such network invites multiple threats in network which affects the routing speed and decreases performance level of the network. In all these threats gray hole is silent but more vulnerable attack which attacks the network in repetition mode. There are so many techniques invented in order to detect and remove these gray hole in which all the actions need to be taken by the nodes themselves to find out malicious node. It is hard to detect gray hole node in pool if the neighbour node of gray hole node is malicious or does not work properly due to some technical reasons. So a pool manager of the pool keeps the record of routing history and detects gray hole node by iterative comparison of the data hash keys.
Keywords: Gray hole, Wireless Sensor Network, MANET.
Abstract
Interactive Voice Response Kiosk
Natasha Brahme, Ayushi Malhotra, Harsh Panchal, Chirag Waghela, Dr. V.C. Kotak
DOI: 10.17148/IJARCCE.2017.6360
Abstract: Interactive Voice Response Kiosk is built using artificial algorithms that analyses user�s queries and understand user�s message. In our case, we're using the bot for college purposes - to answer the queries of the student based on web system. Students or any visitor or faculty just has to query through the bot which is used for chatting. Students can chat using any format, there is no specific format the user has to follow. The System uses built in artificial intelligence to answer the query. The answers are appropriate to what the user queries. The User can query any college related activities through the system - be it academic, extra-curricular activities, sports, results, certified courses etc. The user does not have to personally go to the college for enquiry. The System analyses the question and then answers to the user. The system answers to the query as if it is answered by the person. With the help of artificial intelligence, the system answers the query asked by the students. The system replies using an effective Graphical user interface. The student & faculty just has to register himself to the system and has to login to the system. After login, they can have access to the various helping pages the bot through which the students can chat by asking queries related to college activities. The project also provides another two tabs called Visitor & Parent. The visitor just has to go the visitor tab and get the visitor slip printed. The visitor has to fill all the details asked & then save it. Unless it�s saved, the slip cannot be printed. The functionality of the parent is the same as that of the student. The only difference is that the parent does not login. It just asked the queries. But for that, the parent has to go to the respective tab. If the parent wants to meet someone, then it becomes the visitor. So the parent will have to print the receipt after asking the required question. The student can query about the college related activities online with the help of this web app.
Keywords: HTML, CSS, PHP, MySQL.
Abstract
Design of Low pass Fir Filter using Hamming, Taylor, and Nuttel Windowing Techniques
Nikesh Kumar Manhar, Sachin Kumar Singh, Pranay Rahi
DOI: 10.17148/IJARCCE.2017.6361
Abstract: This report deals with some of the techniques used to design FIR filters. In the beginning, the windowing method and the frequency sampling methods are discussed in detail with their merits and demerits. Different optimization techniques involved in FIR filter design are also covered, including Rabiner�s method for FIR filter design. These optimization techniques reduce the error caused by frequency sampling technique at the non-sampled frequency points. A brief discussion of some techniques used by filter design packages like Matlab are also included.
Keywords: FIR filter, window techniques, DSP (digital signal processing), optimization, frequency sampling, phase and magnitude response etc.
Abstract
Face Recognition System Using Hybrid Approach of Both Principal Component Analysis and Linear Discriminant Analysis
Priyanka Sood, Er. Shivali Puri, Er. Varinderjit Kaur, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2017.6362
Abstract: Face recognition is emerging as one of the popular field in the biometric research. It is used in various surveillance systems for the security purpose as it doesn�t need object comparison. The main advantage of using face recognition system is its uniqueness and acceptance over other biometric systems. Though this system is considered to be accurate but the detection of the face is a difficult process due to the high degree of variability in faces. Face recognition is a section of pattern recognition in which human visual perception is saved in the computer. Many researchers are working on this field for many of the years, many algorithms and techniques are developed to update the traditional systems. Some of the techniques that are common these days are PCA, LDA, and Gabor etc. But these approaches individually are not that much efficient in some of the cases. In this research work a new approach is proposed, in which the main concentration is to extract the features with the PCA and LDA techniques as well as the combined systems. This is a much better approach to work with, as suggested from the literature and also more successful for the large dataset. After combining both of the feature extraction, finally the classification will be done and the performance will be evaluated.
Keywords: Face Recognition, Biometric System, Linear Discriminant Analysis, Principal Component Analysis.
Abstract
Survey on Control of Photo Sharing on Online Social Networks
Sahla Nazlin A, Vishnu K
DOI: 10.17148/IJARCCE.2017.6363
Abstract: Online Social Networks (ONS) is an important part of our everyday life...At present people are very interested to share the photo on online social networks, unluckily which is used for the purpose we not at all imagine. To check possible confidentiality outflow of a group photograph, we prepared a mechanism in which each person can take part in the decision making on the photograph posting, so everyone in the photograph must be recognized. It is important to have a professional facial recognition (FR) system that cans distinguish each person in the photograph. Haar cascade classifier and CBIR (content based image retrieval) algorithm are used in the proposed system for face detection and recognition. Once the faces are recognized from the group photograph then acceptance or reject notifications are sending automatically to each identified people within the close friend circle. The photograph will be posted if all the individuals within the friend circle are accepting the notification and it will not be posted if any of them rejects the notification. We expect that this proposed system would be very useful in protecting users� confidentiality in photo/image sharing over online social networks.
Keywords: Online Social Network, CBIR, K-Mean Clustering, Face Recognition.
Abstract
Hand Gesture Recognition System for Photo Viewer Application
Ms. Swati Sagar, Priti Kamble, Vidya Khamitkar, Snehal Ingawale, Deepali Suryavanshi
DOI: 10.17148/IJARCCE.2017.6364
Abstract: Humans communicate with one another not only through their vocal abilities but also through the gestures that they make. A gesture can go a great way in putting through our point and making the other person understand us and computers are no different in this and can be controlled and made to respond to hand gestures using a gesture recognition system. Today Human Computer Interaction is an interface with which we can virtually interact with the Systems with an ease Humans communicate mainly by vision and sound; therefore, a man machine interface would be more intuitive if it made greater use of vision and audio recognition. Another advantage is that the user not only can communicate from a distance, but need have no physical contact with the computer Gesture recognition can be seen as a way for computers to begin to understand human body language, thus building a richer bridge between machines and humans than primitive text user interfaces or even GUIs (graphical user interfaces), which still limit the majority of input to mouse. The results obtained convey us that there is a good alternative to mouse that is by using gesture.
Keywords: Human Computer Interaction, GUIs (graphical user interfaces), Hand Gesture Recognition System.
Abstract
A Survey on Authentication, Counterfeit Note Detection& Automatic Printing System
Vivek D. Ugale, Harsha Nyati, Neeraj Shahane, Harshada Bhalerao
DOI: 10.17148/IJARCCE.2017.6365
Abstract: In every educational institute, government offices printing play a major role. Now a day, printing is easy task because of the different printing machines available in the market. Printing requires human efforts so the system is semi- automatic. Printing at public places where beneficiary has to pay for printing, is still vastly dependent on the operator i.e. manual help. Also it is difficult to print the pages during rush time period which causes further time delay. To avoid the manual help in paying charges for printing and delay in printing, we are designing the standalone automated printing system which will deliver prints to authenticated user without any manual help other than user himself/herself. Every task from taking printouts to paying the charges for the printing will be done without any help from operator. For security purpose and to avoid misuse of system, authentication is necessary part. To avoid counterfeiting of currency while depositing the money, fake currency detection module will be needed. In this paper we are reviewing the authentication, technique of currency detection and the automated printing system designed in the past.
Keywords: Authentication, automation, fake currency detection, printing, standalone.
Abstract
The impact of automation in IT industry: Evidences from India
Feby C Varghese, Dr. T. A. Ashok Kumar
DOI: 10.17148/IJARCCE.2017.6366
Abstract: Robotic Process Automation is the next big thing in the outsourcing industry. So major Indian IT companies are in the bandwagon of RPA which give the flexibility, speed, accuracy and avoid any human error than can happen. But how well the employees respond to this change? To understand this an exploratory research was done in and around Bengaluru. The subject were mainly employees of top IT companies like Infosys, TCS, Wipro, Accenture, HCL etc, which mainly deals with outsourcing services. In the view of software companies, which primarily cater to the outsourcing and ITes services, the entire shift should be changed from low skill cheap human resource to process automation which will also help in overall cost reduction. Process Automation will remove the human error in the execution. It also bring speed and accuracy to the existing process which will be very much crucial to the client and curtailing the competition. This means the client can be provided with a better customer experience, which is scalable and flexible. The company can also draw insights into the services provide and the analytics will help in better optimisation of process automation which will result in overall decrease in the cycle time.
Keywords: Automation, Outsourcing, domain, cost reduction.
Abstract
Review on Data Mining Techniques in Bioinformatics for Extracting Enzymes Names from Literature
Dr. V. S. Gulhane, Prof. L. K. Gautam and V. G. Sahu
DOI: 10.17148/IJARCCE.2017.6367
Abstract: This paper highlights some of the basic concepts of bioinformatics and data mining. The major research areas of bioinformatics are highlighted. The application of data mining in the domain of bioinformatics is explained. It also highlights some of the current challenges and opportunities of data mining in bioinformatics.
Keywords: Datamining, Bioinformatics, Protein Sequences Analysis, Bioinformatics Tools.
Abstract
Spot Welding Controller
Aishwarya Chavan, Shubhangi Soundalkar, Bhagyashri Ranveer, Ganesh L.Dake
DOI: 10.17148/IJARCCE.2017.6368
No abstract available.
Abstract
Sentiment Analysis, Emotion Mining & Authentication Methods in Hadoop: A Survey of Approaches
Sagar S. Patil, Pravin S. Game
DOI: 10.17148/IJARCCE.2017.6369
No abstract available.
Abstract
Survey Paper on Smart Parking for Smart City
Prof. D.P. Salapurkar, Karan Dalal, Saurabh Mantri, Devesh Bhole, Vrushali Kurundkar
DOI: 10.17148/IJARCCE.2017.6370
No abstract available.
Abstract
Analysis and Solutions for Bug
Akshay Khamkar, Aishwarya Jagtap, Neeraj Pattan, Anuja Raipure, Prof. Mrs. P.Y. Pawar
DOI: 10.17148/IJARCCE.2017.6371
No abstract available.
Abstract
Review on Diagnosis the Plant Disease at Early Stage
Prof. Mrs. Mehzabin Shaikh, Nikita Butala, Sanjna Sharma, Sneha Sukumaran
DOI: 10.17148/IJARCCE.2017.6372
No abstract available.
Abstract
Hacking on Crime with Workable Solution: A Survey
Sugandhi Aakash, Sumit Chaudhary
DOI: 10.17148/IJARCCE.2017.6373
No abstract available.
Abstract
A Novel Technique for Secure Communication in Cryptography
Pooja Bhadauriya, Foram Suthar, Sumit Chaudhary
DOI: 10.17148/IJARCCE.2017.6374
No abstract available.
Abstract
Harmonic Elimination of a Photo-Voltaic Based Cascaded H-Bridge Multilevel Inverter Using ANFIS for Non-Linear Loads
Rajarajeshwari.C, Sivasundari. K, Shalini.S, Karuppa Samy.A
DOI: 10.17148/IJARCCE.2017.6375
No abstract available.
Abstract
A Software Complexity Prediction Model using Coupling Metrics: A Statistical Analysis
M. Kavitha, Dr. S.A. Sahaya Arul Mary
DOI: 10.17148/IJARCCE.2017.6376
No abstract available.
Abstract
Green Computing
A.M. Bagul, Saylee Shitole
DOI: 10.17148/IJARCCE.2017.6377
No abstract available.
Abstract
Sketch based Shopping
Hraddha. R. Kuchekar, Amruta. L. Satnur, Rutuja. P. Baheti, Prachi. L. Kamble
DOI: 10.17148/IJARCCE.2017.6378
No abstract available.
Abstract
Laser Projection Virtual Keyboard: A Laser and Image Processing based Human-Computer Interaction Device
Toshan Sabni, Jayant K Yavatkare, Divyanand S Yadav, Prof. Vinit Kakde
DOI: 10.17148/IJARCCE.2017.6379
No abstract available.
Abstract
A Review on High Ranked Features based NIDS
Dipali G. Mogal, Sheshnaryan R. Ghungrad, Bapusaheb B. Bhusare
DOI: 10.17148/IJARCCE.2017.6380
No abstract available.
Abstract
A Review Paper on PAPR Reduction Techniques using Clipping& Filtering, Selective Mapping and Companding Methods in OFDM Systems
Okello Kenneth, Professor Usha Neelakanta
DOI: 10.17148/IJARCCE.2017.6381
No abstract available.
Abstract
Micro data Privacy Preserving Using Slicing
S. Bhuvanesh, V.N. Anushya, A.X. Suganya Gladies, M. Vignesh
DOI: 10.17148/IJARCCE.2017.6382
No abstract available.
Abstract
Critical Review of the Bunch: A Well-Known Tool for the Recovery and Maintenance of Software System Structures
Mahjoubeh Tajgardan, Habib Izadkhah
DOI: 10.17148/IJARCCE.2017.6383
No abstract available.
Abstract
Food Ordering Restaurant Android Application
K V Aishwarya, Aishwarya Chavan, Sedjwick Drego, Akshay Chavan, Prof .P.P Bastawade
DOI: 10.17148/IJARCCE.2017.6384
No abstract available.
Abstract
Resource Allocation Approach using Gang Scheduling: Design and Analysis
Swati Dwivedi, Anand Muni Mishra
DOI: 10.17148/IJARCCE.2017.6385
No abstract available.
Abstract
Real Time Water Monitoring System using IoT
Schindhya.R, Simi V.P, Sathya.E, Janani.B
DOI: 10.17148/IJARCCE.2017.6386
Abstract: Water is the prime necessity of every living being in the world. Being the most depleted and most polluted indispensable resource, we are in dire need of saving every possible drop of water. Over two thirds of earth's surface is covered by water and others are taken by land. As Earth's population continues to grow, people are putting ever-increasing pressure on the planet's water resources. Population, household size, and growth and affluence all affect how much water is used. Factors such as climate change have increased pressures on natural water resources especially in manufacturing and agricultural irrigation. In a sense, our oceans, rivers, and other inland waters are being squeezed by human activities not so they take up less room, but so their quality is reduced. Poorer water quality means water pollution. The usage of water being the same, cannot be reduced beyond a certain extent. Hence, to preserve the water that is remaining, the quality of the water is to be monitored. The water quality can be decided using different parameters like pH,temperature and Dissolved Oxygen[DO] which are recommended to be measured for determining the quality of water. Wireless Sensor Technology is been used in IoT Environment using Arduino technology. The system's measurement capacity ranges from 0�C to 80�C for water temperature; from 0 to 14 on pH scale. The main goal of this application is that , it ensures to be an effective way for real time water quality monitoring at the lowest cost possible
Keywords: IoT, WSN, Dissolved Oxygen[DO], pH
Abstract
Performance Analysis of WiMAX Network with Uplink Scheduling Algorithm and its Implementation
Stuti Upadhyaya, Deepak Bicholia
DOI: 10.17148/IJARCCE.2017.6387
Abstract: The IEEE 802.16 provides QoS support, but it does not specify the details of how the QoS can be achieved for different types of applications. Since the gradual deployment of new multimedia applications generate traffic that is more sensitive to delay thus it required proper scheduling of packets. The objective of this paper is to analysis WiMAX network with and without scheduling methods by varying nodes density from 2 to 10 nodes. To recapitulate, WiMAX 802.16d gives better results with scheduling method (round robin) which is almost same with time and the performance parameters are throughput, packet delivery ratio and end-to-end delay.
Keywords: IEEE 802.16, Uplink Scheduling, WiMAX, QoS, throughput, packet delivery ratio, end-to-end delay.
Abstract
Opensec: Policy Based Security using Internal Software Defined Network
Narayini.S, Gokulapriya.M, Raashmi.V, Senthil Madasamy.N
DOI: 10.17148/IJARCCE.2017.6388
Abstract: The software-defined network (SDN) and OpenFlow development made easierto manage the policy-driven network. Before this policy management are handled through manual configurations. The device has made the things complexity and takes more time to transfer messages. They use low-level language for configuration. Manual configuration is handled by network controller is being replaced by SDN. We proposed opensec, an OpenFlow security framework that allows network security operator to implement security policies written in the human readable language. Using opensec, openflow controller converts security policies into series of messages. Opensec automatically detects the malicious traffic. Opensec automatically reacts to the security alerts based on pre-defined network policies. Our framework improves Vulnerabilities detection and prevention and Transmission time.
Keywords: Openflow, Software Defined Network, Opensec, Policy-Driven Network, Security Policies.
Abstract
Intelligent Beaconing Principle based Congestion Free Routing in Vanet
Sankaragomathi.M, Srigayathri.M, Vijaya Lakshmi.P, Senthil Madasamy.N
DOI: 10.17148/IJARCCE.2017.6389
Abstract: Beacons are an application which relays the details, such as distance between two nodes, coverage area and the node positions. A Beaconing activity is helpful for estimating the complete status of node and identify whether the node is suitable to make the communication or not. Once if the Beaconing activity is analyzed, the traffic estimation principles take place to avoid congestions[7] over a network. Vehicular networks[8] play an important role in wireless communications, which allows the node to move from one location to another location dynamically without any interruption. In this system wireless environment is created with the number of nodes and allow the source and destination nodes able to move from one location to another location dynamically during data transmission. In the proposed approach Fair Adaptive Beaconing Rate for Inter-vehicular Communications (FABRIC) algorithm[4] is used, which solves the problem of Network Utility Maximization (NUM) in a wireless environment. For all, the entire simulation results prove that the proposed approach is more convenient to perform wireless data transmission, without any congestion or traffic breakages.
Keywords: VANET, Beaconing activity, Vehicular Networks, Congestion.
Abstract
Energy Optimization Factors for the Embedded Mobile Processors
Vrushabh Khobragade, Mandar Gadkari, Shubham Shingne, Hamza Niaz, Shivam, Dr. Prakash Prasad
DOI: 10.17148/IJARCCE.2017.6390
Abstract: Due to the increasing performance of smart phones the users are expecting more exorbitant performance from the company. As the performance increases the usage of battery consumption also increases and the battery drains very rapidly. To overcome the problem we use the software technology, to increase the battery life and to efficiently run any tasks without any fear of the battery drainage of the mobile rapidly.
Keywords: Embedded Mobile Processors, Scheduling, Big Little Platform.
Abstract
Implementation of Zigbee Technology for Patient HealthCare Monitoring System
Shivachandra Hindinamani, Anant Baliwant Bodas
DOI: 10.17148/IJARCCE.2017.6391
Abstract: This paper deals with development of microcontroller based health monitoring system for heartbeat, temperature and oxygen using Zigbee. Now a days, nation population increases demands for caretaking because of these reason monitoring system are the most important system. In this paper we use wireless sensor network based on Zigbee technology. This monitoring system consists of Zigbee based network, microcontroller and three types of sensors which are heartbeat sensor, temperature sensor, oxygen sensor. These sensors are connected to the patient and the output is directly displayed on LCD through Zigbee. The output from the sensor is analog values it is converted to digital and processed by using microcontroller and it will be respond in LCD or computer display.
Keywords: Heartbeat sensor, Microcontroller, Oxygen sensor, Temperature sensor, Zigbee network.
Abstract
Color Sorting Robot
Snehal Shirgave, Aishwrya Salunkhe, Khadija Shirgave, S. Y. Upadhye
DOI: 10.17148/IJARCCE.2017.6392
Abstract: In industry there is highly increasing demands for automation. Sorting of objects based on color is very difficult task. This paper gives us an idea about color sorting project. Here we are designing and implementing an efficient color sorting robot using color sensor TCS3200 based on Arduino UNO. This project provides high accuracy and performance. Easy to operate and construct which reduces human errors.
Keywords: Arduino UNO controller, TCS3200 color sensor, servo motors.
Abstract
Remote Web Monitoring of Metering Equipment over the Internet
Pooja Borkar, Vishal Batheja, Gaurav Hendre, Kapil Gulwani, Mrs. H.A. Shinde
DOI: 10.17148/IJARCCE.2017.6393
Abstract: Internet of Things represents a general concept for the ability of network devices to sense and collect data from the world around us, and then share that data across the Internet where it can be processed and utilized for various interesting purposes. The Internet of Things (IoT) describes a network of physical objects that connect to each other through the internet. Objects or �things� can transfer information wirelessly without requiring human interaction. A �thing� can be any object that can be assigned an IP address and provided with the ability to transfer data over a network. Some also use the term industrial Internet interchangeably with IoT. This refers primarily to commercial applications of IoT technology in the world of manufacturing. The Internet of Things is not limited to industrial applications, however.
Keywords: Internet of things, remote web monitoring, Atmega 328, ESP 8266 (Wi-Fi module), Flow sensor, OLED, Arduino UNO, PHP web server.
Abstract
Authentication using Graphical Password with Association of Sound Signature
C. Rajalakshmi, C. Rohini, S. Sowndharya, A. Christy Jebamalar
DOI: 10.17148/IJARCCE.2017.6394
Abstract: A graphical password system with a supportive sound signature to enhance the remembrance of the password and to enhance the security level in authentication system is discussed. In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is implemented. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature which is correlated to each click point this sound signature will be used to help the user in recalling the click point on an image. Systems shared very good Performance in terms of speed, accuracy, and enhance the security. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was very easy and sound signature helps considerably in recalling the click points.CCP offers both improved usability and security.
Keywords: Sound signature, Authentication, Cued click point.
Abstract
An Involuntary Feeding and Health Monitoring System for Dairy Farms
J. Thilagavathy, D. Frijit Raja Shunmathi, S. Janaki, I. Jenifer, M. Jeslin Mary
DOI: 10.17148/IJARCCE.2017.6395
Abstract: The Involuntary feeding and health monitoring system for dairy farms ensures that there is always enough fresh feed with rich content of fat and protein along with good health condition and environment for animals. In large cattle farm provision of food is necessary. Nearly 80% of milk composition depends on feed. More research results that more frequent feeding results higher feed intake and higher production. The feeding system could not take care by workers all the time. The carelessness of the workers will makes the cattles to be hungry for a long time.So this can be prevented by implementing the involuntary feeding system as it provides the food at right time in a periodic manner and proper environmental and health management to preserve the animals. Quality of milk is necessary for every cattle.If the room/body temperature varied, the milk contents(fat &protein) gets changed. To maintain the constant temperature (390C), temperature control system is used. The health monitoring system consists of RTC,GSM module which helps to remind the dairy farm owner about the periodical checkup of the cattles.
Keywords: Feeding System, Health monitoring system, GSM module, PIC Microcontroller, PIR sensor,LM35,Real Time clock.
Abstract
Design and Development of Material Handling Cum Transportation System
Eshan Deshpande, Kshitij Bapat, Piyush Kedare, Pratik Totalwar, Raghav Dhoot, M. Sharique Tufail
DOI: 10.17148/IJARCCE.2017.6396
Abstract: In today�s fierce competitive global markets, customers are demanding adjustable sizes, higher quality, and flexibility: in short, they want it all. In order to stay competitive in the market, companies need to attain both customer satisfaction and cost reduction in production operations. Material Handling Systems (MHS) is the place to accomplish this goal, since they have a direct impact on production.
Keywords: Adjustable sizes, flexibility, customer satisfaction, cost reduction, production operations.
Abstract
An IoT Based Automated Noise and Air Pollution Monitoring System
Palaghat Yaswanth Sai
DOI: 10.17148/IJARCCE.2017.6397
Abstract: In the present era, air and noise pollution is the growing hazardious issue. It is necessary to monitor air quality and keep it under control for a better future and healthy living for all. Here we propose an air quality as well as sound pollution monitoring system that allows us to monitor and check live air quality as well as sound pollution in a particular areas through IOT. System uses air sensors to sense presence of harmful gases/compounds in the air and constantly transmit this data to microcontroller. Also system keeps measuring sound level and reports it to the online server over IOT. The sensors interact with microcontroller which processes this data and transmits it over internet. This allows authorities to monitor air pollution in different areas and take action against it. Also authorities can keep a watch on the noise pollution near schools, hospitals and no honking areas, and if system detects air quality and noise issues it alerts authorities so they can take measures to control the issue.
Keywords: IoT, Air Pollution, Noise Pollution, Microcontroller, Monitoring System.
Abstract
Classification System to Predict Universities for Students using Fuzzy Logic
Gayatri Nair, Shankar M. Patil
DOI: 10.17148/IJARCCE.2017.6398
Abstract: Big Data is relatively a new concept and a lot of definitions have been given to it by researchers, organizations and individuals. To extract meaningful value from big data, you need optimal processing power and analytics capabilities. One of the field dealing with such vast data is the education system for which various applications for processing, classifying and so on has been implemented. Various works include classification of student data to evaluate the performance of the student, Predictive Analytics in Higher Education, Mining Social Media Data for Understanding Students� Learning Experiences, evaluating and predicting student performance before admission to the college as well as evaluating the suitability of the entry exams. An educational institution needs to have an approximate prior knowledge of the students performance and admittance in future studies. Taking reference of the earlier works, the proposed system looks into the academic scores of the students and classifies the students on the basis of their scores to various universities, the system can be used to determine the chance of getting admission to particular university as well. The algorithm for building the decision tree, which is an intermediate module is ID3.The system is developed in MapReduce framework which can easily handle the processing of huge dataset.
Keywords: Classification, ID3, Big data, Fuzzy rule Hadoop, Mapreduce, Decision tree.
Abstract
Design & Implementation of 3-Bit High Speed Flash ADC for Wireless LAN Applications
Mirza Nemath Ali Baig, Rakesh Ranjan
DOI: 10.17148/IJARCCE.2017.6399
Abstract: Analog-to-digital (ADC) converter has become a very important part of electronics in the current digital world as they have a wide variety of applications. Among all the ADC�s available, the Flash ADC is one of the fastest ADC but a main drawback of this ADC is its power consumption. So, the main objective of this paper is to implement a high speed low power Flash ADC. A design with 3-bit resolution has been implemented using seven OTA based comparators with a reference voltage of 250mV and a high speed encoder have been implemented using four full adders upon which the integration of different block ADC has been designed. All the circuits are simulated using 180nm technology in Cadence Virtuoso Design environment. The supply voltage is 1.8v.Analog output of each comparator depending upon the comparison between the input and the reference voltage is fed to the encoder and finally the compressed digital output is obtained.
Keywords: Flash ADC, Comparator, OTA, Thermometer to Binary encoder, CMOS 180 nm Technology.
Abstract
Design of Low Pass Fir Filter Using Rectangular, Bartlett and Blackman-Harris Window Techniques
Sriti Pandey, Shalu Choudhary, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.63100
Abstract: The most powerful digital filters are described and compared here. Here various windows are compared and demonstration of the best window is done, which is the one with minimum side lobes. This is hence the major objective of filtering operation. The experimental results show that the FIR filters designed in this paper are effective for filtering operation. Through this paper the intricacies of the window methods are explained in a simple and a subtle manner. In this paper, the design techniques of Low Pass filter using Rectangular Window, Bartlett window and Blackman-Harris of order 10 are presented. On the basis of their performances, it is shown that filter design by using Blackman�Harris window technique is better as it provides better result in terms of magnitude and phase response. The analysis of magnitude and phase response of proposed FIR Low Pass filter is performed using MATLAB simulation.
Keywords: DSP, Digital Filter, Low-Pass, FIR, Rectangular Window, Bartlett Window and Blackman-Harris Window.
Abstract
Blind Assist System
Deepak Gaikwad, Chaitalee Baje, Vaishnavi Kapale, Tejas Ladage
DOI: 10.17148/IJARCCE.2017.63101
Abstract: We are able to see the beauty of nature, things which happen in day-to-day life with the help of our eyes. But there are some people who are unableto experience these things. Many difficulties are seen by them in daily life. It is very challenging issue even for doing small tasks. So there is always need of helping hands for such visually impaired person. The blind assist system will help the blind person by providing more convenient means of life. In this paper we propose a light weight, inexpensive as well as user friendly system using infrared technology. This system will helpto live independently and happily without facing many difficulties. Thus this system will lower their challenging issues and will lead to social service towards visually impaired person.
Keywords: Infra-red Sensors, Microcontroller, Buzzer, GPS.
Abstract
A New Approach for Efficient Clustering Using CECM Algorithm in WSN
Gohil Sonal, Sumit Chaudhary, S.B. Batra
DOI: 10.17148/IJARCCE.2017.63102
Abstract: In this paper the proposed work is to compare the properties of the nodes in the cluster on the basis of probability of their being retrieved by other cluster or network. All this nodes and clusters contains battery level, memory, reverse signal strength indication, multicast routing information cost , time to live new node and time to live cluster on the basis of expectation clustering and maximization clustering in wireless sensor networks.
Keywords: Expectation, maximization, cluster head, energy efficiency, k-means, data aggregation, WSN.
Abstract
Adaptive Secure Document Access Mechanism in Cloud
Dr. M. Priyadharshini, P. Anitha, C. Janani
DOI: 10.17148/IJARCCE.2017.63103
Abstract: Cloud data storage has provided massive benefits by allowing users to store huge amount of data in cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic role-based access control (RBAC) scheme combined with context information have been proposed and developed ensuring the restricted access of the documents. The system holds role and context information that enables the upload and download of documents by legitimate users. The security mapper component filters the user information so as to perform adaptive secure document access in cloud.
Keywords: Role-based access control, Context-based access, cryptographic RBAC, secure cloud data storage.
Abstract
Optimal Face Retrieval From LFW Dataset
Priyanka A. Deshmukh, Prof. S.P. Abhang
DOI: 10.17148/IJARCCE.2017.63104
Abstract: A method for face retrieval will proposed to describe. In most of the cases various methods are unable to increase retrieval rate of face images especially LFW images, by using this proposed system the retrieval rate increased. In face retrieval, objects of inter class should have larger distance than intra class objects. By extracting LBP & SIFT features of training image, shape context and inner distance shape contexts methods are applied on test image for deriving relevant images with better performance.In particular, when measures the input distance are quite different from the truth or the variance of data from the same class is too large, in such a condition, our proposed system will use the algorithm �Optimal Face Retrieval�.
Keywords: LFW, IDSC,SIFT, LBP.
Abstract
A Survey of Internet of Things and its Applications
Prof. Vivek Pandey, Vipul Kushwaha, Ansari Rukhsar, Snehal Shinde
DOI: 10.17148/IJARCCE.2017.63105
Abstract: Internet of Things (IoT) is a wide field that has a huge variety of applications. A lot of work has been done in the different fields this concept encompasses such as media, environmental monitoring, infrastructure management, manufacturing, medical and healthcare, transportation etc. This paper is a survey of the various applications of Internet of Things. This paper also focuses on the readily available platforms for the development in this field. Finally, different issues in practical applications have been discussed.
Keywords: IoT; Microcontroller; Sensor; Actuator; Wi-Fi; MQTT, Arduino YUN.
Abstract
Design of Ultra Low Power 7.2 GHz True Single Phase Clock CMOS 2/3 Prescaler244 µW
Roshan Kumar, Prof. Monika Kapoor
DOI: 10.17148/IJARCCE.2017.63106
Abstract: In this paper a high operating frequency and power efficient TSPC prescaler layout is proposed and compared with the existing TSPC and E-TSPC prescalers on the basis of operating frequency and power consumption. The maximum operating frequency of the proposedTSPC prescaler is 7.2 GHz which is 10% higher than other TSPC based prescalers and 7% than E-TSPC based prescalers with average power consumption of 307 �W at 1.8 V supply voltage. This High Frequency is achieved by reducing propagation delay in PMOS and NMOS at different stages. The power consumption in divide by 2 and divide by 3 mode is 3% to 10% better than all other prescalers and four times better than those prescalers which can be operated higher than 6.5 GHz frequency.This prescaler consumes 348�W in divide by 2 mode and 244�W in divide by 3 mode.
Keywords: Dual modulus prescaler, D Flip-flop (DFF), True single phase clock (TSPC), Microwind, DSCH, Frequency synthesizer, Clock, Propagation Delay.
Abstract
Collaborative filtering in movie Recommendation System based on Rating and Genre
Ashwani Kumar Singh, P. Beaulah Soundarabai
DOI: 10.17148/IJARCCE.2017.63107
Abstract: Recommender system is one of the recent applications which help to recommend the items or products based on the user needs. Since the user needs varies from person to person we cannot generalize the recommender system. Movie recommender system also has the same issues since individuals have different expectations while watching a movie and recommendation is not possible based on the annotations given by the other users. To overcome this situation an affective recommender framework is proposed in this work. One of the most famous methodology is collaborative filtering and finding the some top similar users and then find the movies those users has viewed and given a good rating which has not been viewed by particular user, recommending movies to user has great benefit, but applying probability for particular movie based on genre is done, which will increase accuracy in recommendation engine.
Keywords: Recommender system, Movie recommender system, Rating and Genre.
Abstract
DS System for 4G Networks through Data Mining
S.A. Chiwhane, Puja Sonawane
DOI: 10.17148/IJARCCE.2017.63108
Abstract: Due to the more demand of services provided by cellular devices. And the mobile devices, the traffic in the network increases. In result it causes the reduction in quality of services (QOS). For the assurances of (QOS) reduction in traffic and the satisfaction of customer. This paper propose the decision support mechanism, data mining techniques are used. In this study, the aspect of DSS are explored with the experimental support. For the experimental support WiMAX equipment is used. In the DSS by using the k-map clustering algorithm of data mining, MRTR parameter are automatically adjusted. This real experimental result shows that the QOS can be maintain using DSS in 4G mobile network to fulfil increasing demand for advanced services.
Keywords: DSS, QoS, LTE, WiMAX, NMC.
Abstract
Healthcare Portal System using Iterative Search, K-Nn, Differential Diagnosis, Baye’s Theorem
Mathpati Dhondutatya, Memon Simran, Kesgire Akash, Karande Siddharth
DOI: 10.17148/IJARCCE.2017.63109
Abstract: Big data is now rapidly expanding in all science and engineering domains including physical, biological and biomedical sciences. Medical data are an ever growing source of information generated from hospitals consisting of patient records in the form of hard copies which can be made easier and convenient by using E-copies of the patient details. Our aim is to build a Health-care Portal system which will provide the features like clinical management, patient records and diagnosis of chronicle diseases. Proposed system will be useful in emergency and also when the patient is relocating. Iterative search algorithm helps in symptom matching and providing possible diseases ranked according to number of symptoms matched in the database. The k-NN algorithm is applied to classify the diseases into subgroups and higher preference subgroups are displayed. Differential diagnosis is used to narrowing down the diseases to the root disease out of the list of diseases that show similar symptoms. Baye's theorem is used to find the probable occurrence of disease.
Keywords: Data mining, Differential diagnosis, k-NN, Baye's theorem.
Abstract
Hand Gesture Recognition of Robot using Neural Network
D. S. Gaikwad, Yashika N. Mahajan
DOI: 10.17148/IJARCCE.2017.63110
Abstract: Now a day�s most of the industries demand for robots. The challenge in human robot interaction is that they don�t feel real or natural. Growing interest towards gesture recognition of robots and challenges faced, this paper present different methodologies used for hand gesture recognition of robots. Each methodology in sequence improves the recognition rate (RR).These methodologies are listed as follows-Artificial Neural Network (ANN), Bio sleeves, Multilayer Neural Network and Bicubic Interpolation, Gesture Segmentation. Gestures are classified into Static Gestures (SG) and Dynamic Gestures (DG).
Keywords: Homan Robot Interaction, Methodologies, Recognition Rate.
Abstract
Location Based Video Searching
Prof Aparna S Kalaskar, Kaustubh Karanjkar, Harish Gwalani, Naman Jain, Shridhar Pawar
DOI: 10.17148/IJARCCE.2017.63111
Abstract: Location based Video Searching (LBVS) systems have been shown as valuable tools for providing appropriate recommendations to users. In the last decade, the amount of customers, services and online information has grown rapidly. Moreover, most of existing service recommender systems present the same ratings and rankings of services to different users without considering diverse users' preferences, and therefore fails to meet users' personalized requirements. We will develop Smart (LBVS), to address the above challenges. It aims at presenting a personalized service recommendation list and recommending the most appropriate services to the users effectively. Specifically, keywords are used to indicate users' preferences, and a user-based Collaborative and Demographic Filtering algorithm is adopted to generate appropriate recommendations. Extensive experiments are conducted on real-world data sets, and results demonstrate that Smart Recommendation System significantly improves the accuracy and scalability of service recommender systems over existing approaches. Geo-location is a feature that is presented individually to users. The users can share location and add geo-located data to content. Adding geographical identification metadata to an information resource attach value to the content by making it more searchable.
Keywords: Location based Video Searching, customer reviews,Geo-location, metadata.
Abstract
Student Information System and Performance Prediction in Educational Data Mining
Pratik Nanavati, Abhishek Masurkar, Chaitanya Shinde, Aaryaman Singh, Prof. Sumitra Sadhukhan
DOI: 10.17148/IJARCCE.2017.63112
Abstract: The main focus of data mining is to collect different data from databases or data warehousesand the information collected that had never been known before, it is valid and operational. Educational institutes can use this to maintain all the information of student academics easily which is critically important. The performance of students in their academics is a turning point for their brightest career. Predicting student academic performance has been an important research topic in Educational Data Mining (EDM) which uses machine learning and data mining techniques to explore data from educational settings. Measuring student academic performance is challenging since it depends on various factors. Classification and Prediction are among the major techniques in data mining and plays a vital role in EDM. The need for this is to enable the university to intervene and provide assistance to low achievers as early as possible. In this study we develop a classification model usingC4.5 algorithm for domain wise performance evaluation system for engineering students. It also brings connectivity between teachers, students and parents by keeping them updated with their child performance regularly. The whole system will be available through a secure, online interface embedded in college website.
Keywords: Educational Data mining, Student information system, Performance prediction, Decision tree, C4.5 algorithm.
Abstract
Secure Optical Link System
Shubham Pandey, Ruchi Varshney, Shivani Gupta, Sangeeta Singh, Neha Chaudhary
DOI: 10.17148/IJARCCE.2017.63113
Abstract: With the explosion of information traffic due to the Internet, electronic commerce, computer networks, multimedia, voice, data, and video, the need for a transmission medium with the bandwidth capabilities for handling such vast amounts of information is paramount. Fiber optics, with its comparatively infinite bandwidth, has proven to be the solution. The security inherent in optical fiber systems is a major benefit. The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks, still need the attention. To make optical link more secure many devices can be used for transmission and reception purpose. These devices may be DNA sensor lock, card sensor lock, electronic eye lock, thumbprint sensor lock and electronic combination lock. In this research paper we are focusing on a secure communication where biometric system can be used as a good and effective security option. An important and very reliable human identification method is fingerprint identification. As fingerprint of every person is unique thus it can be used in various security options. Fingerprint recognition at the transmitter side allows only valid person to transmit the signal. At the receiver side code lock security can be economic and good option to allow only valid user to receive the information which has been sent through secure optical link. During communication over the optical link, automation can also be achieved at the receiver end from the transmitter end. With the help of automation, energy consumption at the receiver end can be reduced upto a great extent from the transmitter end.
Keywords: Automation, Biometric security, Code-lock security, Optical fiber link.
Abstract
Friend Discovery Mechanism with Secure Communication and Accurate Recommendation for Social Web Networks
Prof. Neha Pharande, Sailen Raj, Ranoo Khatri, Krishna Sawalkar, Karan Mahesh
DOI: 10.17148/IJARCCE.2017.63114
Abstract: Nowadays, online social networks is a very popular communication platform, using on awide range of applications. Social networking sites employ recommendation systems in contribution to providing better user experiences. Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflecta user�s preferences on friend selection in real life.We propose, a novel semantic-based friend recommendation system for social networks,which recommends friends to users based on their life styles instead of social graphs. Novelsemantic approach measures the similarities of two members based on information containedin their profiles and recommends friends to users if their life styles have high similarity. Comparison Analysis Algorithm helps in securing the users data from visualizing to others. It alsohelp users to choose accurate friend requests by checking the matching percentage value.The results show that the recommendations accurately reflect the preferences of users inchoosing friends. This system can be used in finding accurate and secure recommendationsin social networks. Results of this system represent strong potential for developing link recommendation systems using this combined approach of personal interests and the underlyingnetwork.
Keywords: social networking services, friend recommendation, graphs, novel semantic, Comparison Analysis Algorithm.
Abstract
Advanced Computer Communication and Control Technology for Modern Substations
Swetha K, Rashmi H C
DOI: 10.17148/IJARCCE.2017.63115
Abstract: This paper proposes a novel approach to achieve monitoring and control of modern substations using advanced computer communication and control technology. The proposed approach is based on a code division multiple access (CDMA) and interleave division multiple access (IDMA) system joining with optical-fiber communication technology to realize the utility infrastructure of Smart Grid. Recently, owing to the rapid growth on optical-fiber communication, it can offer standardized communication technology for wide-area, metropolitan-area, and local-area networks. Moreover, optical-fiber communication technologies offer not only significant benefits on connection among different CDMA-IDMA systems such as rapid deployment, higher baud rate (equal or higher than 14 Tb/s), enhanced bandwidth, less bit error rate (equal or less than 10-9), less optical-amplifier quantities, reduced interference among them, lower signal attenuation, etc. but also the advantages of being more suitable for remote-end applications in Smart Grid environment. With spreading spectrum modulation and demodulation combing encoding, it can be used to transmit data and images over power lines to accomplish opportunities and challenges in the effort on comparisons and assure safety, security, and reliability in order to achieve reliability and demand efficiency for modern substations of the utility system as a supervisory control and data acquisition (SCADA) system.
Keywords: Code division multiple access, interleave division multiple access, optical-fiber communication, supervisory control and data acquisition.
Abstract
Relative Study of Bayesian Approach for Spectrum Sensing in C.R.
Mr. Pravin B. Kamble, Prof. Anant R. More, Prof. M.S.G. Prasad
DOI: 10.17148/IJARCCE.2017.63116
Abstract: The spectrum sensing problem is one of the most challenging problem in cognitive radio systems. Cognitive radio automatically detects available channels in wireless spectrum, then consequently changes, its transmission or reception parameters to allow additional concurrent wireless communications in a given spectrum band. Many detection methods are used for spectrum sensing. In this paper, we discussed Bayesian approach for maximum spectrum utilization. We described optimal detector structure for MPSK modulated primary signal. We also described its suboptimal detector in both low and high SNR regime. Through approximations, it is found that, in low SNR regime, for MPSK signals, the suboptimal detector is that the energy detector as well as for BPSK signals, the suboptimal detector is that the energy detector on the real part. A relative study between Bayesian detector and other spectrum sensing algorithm for cognitive radio is presented. The performance analysis of Bayesian detector is shown in terms of probabilities of detection, false alarm, selection of detection threshold.
Keywords: Cognitive radio (CR), spectrum sensing, energy detector, Bayesian detector, matched filter detection, wavelet based detector.
Abstract
Data Mining, Internet Marketing and Web Mining
Vishesh S, Manu Srinath, Supriya Ramarao Prasanna, Supriya Yadati Narasimhulu
DOI: 10.17148/IJARCCE.2017.63117
Abstract: Data mining is the computational process of discovering patterns in large scale data sets involving methods at the intersection of artificial intelligence, machine learning, statistics and database systems. [1] In this paper, we will draw limelight on one of the applications of data mining- �Internet Marketing�. For internet marketing, data mining is helpful in attaining increased number of page views per session, increased number of average profit per check, increased number of referred customers, increased number of visitors as well as retention rate and increased brand awareness. Data mining acts as a tool which practices like collection, integration, analysis and presentation of business intelligence data in an internetwork. We would like to discuss about web mining and how it is different from data mining.
Keywords: Data mining, artificial intelligence, machine learning, statistics, database systems, Internet Marketing.
Abstract
SignTalk and Animator for Speech and Hearing Imapired
Haseeb Biya, Ruba Shaikh, Sayma Siddiqui, Sufiyan Khot
DOI: 10.17148/IJARCCE.2017.63118
Abstract: Communication is basic fundamental human right, however who are deaf and mute communicate differently than everyone else using Sign Language (SL), while we communicate verbally. This puts them at disadvantage. Our system will help them better communicate with rest of the world without changing how they already interact with each other. The system i.e. Hand gloves will translate sign language to voice. flex sensors, accelerometer, gyroscope, are placed on hand gloves to capture hand movements. Arduino Nano recognizes these signals and sends them to smart phone via Bluetooth for voice generation. Animator is an android application that takes text sentences as input and converts it to 2D animations for facilitating two-way communication.
Keywords: Arduino Nano, Bluetooth Module, Accelerometer, Smart Phone, Flex Sensors, MPU60506-Axis Gyro Sensor Module, Android Studio, Sign Language(SL).
Abstract
Spectrum Sensing Optimization by Sensing Threshold and Duration for Cognitive Radio Networks
Vinayak R. Barbole, Prof. Anant R. More, Prof. M.S.G. Prasad
DOI: 10.17148/IJARCCE.2017.63119
Abstract: The spectrum sensing problem is one of the challenging issues in cognitive radio systems. In this paper, Survey for Spectrum Sensing Optimization of cognitive radio networks by joint optimization of sensing Threshold and Duration is presented. High network utilization by secondary users can be achieved with fast and reliable spectrum sensing. Maximizing Throughput for secondary users by considering both parameter variable to sensing 1.Sensing Threshold and 2.Sensing Duration. Joint optimization can be achieved by two performance criteria minimizing time for detection of spectrum hole and Joint optimization of the opportunistic throughput.
Keywords: Cognitive radio, Joint optimization, Spectrum sensing, Sensing Threshold, Sensing Duration.
Abstract
A Survey Paper on Iris Based Access System Using Stabilized Iris Encoding and Zernike Moments Phase Features
Ms. Payal Mahajan, Mrs. Nandini Dhole
DOI: 10.17148/IJARCCE.2017.63120
Abstract: Iris recognition is a technique for biometric identification. Biometric identification gives programmed acknowledgment of an individual based on the unique feature of physiological characteristics or behavioral characteristic. Iris acknowledgment is a technique for perceiving a man by examining the iris design. This review paper covers the distinctive iris acknowledgment systems and strategies. The standardized area is proposed, which essentially contains the Zernike moment (ZM) phase An exact and vigorous estimation of the rotation angle between a pair of normalized regions is then described and used to measure the comparability between two coordinating areas. Exact iris acknowledgment from the indirectly gained face or eye pictures requires improvement of powerful systems, which can represent for significant variations in the segmented iris image quality. Such variations can be highly correlated with the consistency of encoded iris elements and information that such delicate bits can be misused to enhance coordinating exactness.
Keywords: Biometrics, iris recognition, less-constrained iris recognition, at-a-distance iris recognition.
Abstract
A Survey paper on Public Integrity Auditing for Shared Dynamic Cloud Data Using HMAC Algorithm
Prof. Sunita Patil, Prof. Supriya Bhosale, Prof. Shubhangi Sonawane
DOI: 10.17148/IJARCCE.2017.63121
Abstract: This paper presents various disputes associated with public Auditing and security for storing user�s data on untrusted cloud. There is a huge amount of research being made to discover the disputes with these cloud service providers and cloud security. In this paper system proposes a HMAC algorithm to enhanced public integrity auditing Shared Dynamic Cloud Data. Typically message authentication code is used in between sender and receiver that share secrete key in order to authenticate information transmitted between this parties. This standard defines a MAC that uses a cryptographic hash function in conjunction with a secret key in order to authenticate information transmitted between these parties. The main goal of this paper is to proposal a secure and an effective cloud data storage system to decrease the bandwidth and to increase the data integrity. The key is part of HMAC, since it is shared secrete known between two parties only and only they can create .The main intention of these is to overcome the length extension attack and to protect the original performance of the hash function without incurring a significant degradation.
Keywords: Cloud Computing; Hash Message Authentication Code (HMAC); Message Authentication Code (MAC); integrity.
Abstract
Analysis of Leach and Improved Leach Protocol in Wireless Sensor Network
Harpreet Kaur, Amit Verma, Manit Kapoor
DOI: 10.17148/IJARCCE.2017.63122
Abstract: This paper describes energy-efficient communication in wireless Sensor Networks is necessary and identifies the main sources of energy dissipation as well as counter measures to make sure a long network lifetime. Wireless Sensor Networks can collect trusty and accurate information in distant and risky environments, and can be used in National Defence, Military Affairs, Industrial Control, Traffic Management, Medical Care, Smart Home, etc. The sensor whose resources are reserved is low-cost, and depends on battery to supply electricity, so it�s importance for routing to efficiently utilize its power. The main purpose of this Research work is to investigate and find insight into the effect of energy efficient for wireless Sensor Networks using Leach and proposed new Leach protocol and their parameter. As noted, the research consists of both experimental and analytical results on MATLAB tool with the following parameter average energy of each node for different- different no of rounds, number of dead nodes, total number of packet received to base station and end to end delay.
Keywords: WSN, LEACH, Proposed LEACH, Network lifetime.
Abstract
A survey Paper on Feature Extraction and Classification in ECG Biometric Signal
Kalyani U. Girde, Asst. Prof. Nandini Dhole
DOI: 10.17148/IJARCCE.2017.63123
Abstract: This Customary biometric recognition frameworks regularly utilize physiological attributes, for example, unique mark, confront, iris, and so forth. Later a long time have seen a developing enthusiasm for electrocardiogram (ECG) based biometric acknowledgment procedures, particularly in the field of clinical prescription. In existing ECG based biometric recognition techniques, feature extraction and classifier configuration are as a rule performed independently. In this paper, multitask learning approach is proposed in which highlight extraction and classifier configuration are completed all the while. Weights are allocated to the features inside the kernel of each task. We break down the network comprising of all the feature weights into sparse and low rank components. The meagre part decides the highlights that are important to distinguish every person, and the low rank segment decides the normal component subspace that is pertinent to distinguish every one of the subjects. A quick improvement calculation is produced which requires just the principal arrange data. The execution of the proposed approach is shown through tests utilizing the MIT-BIH Normal Sinus Rhythm database.
Keywords: normalized minimum distance, PC, Biometrics, ECG, classification, feature selection, multitask learning.
Abstract
A Review: Predictive Analytics with Big Data
Mr. Rizwanahmed B. Mujawar, Dr. Dinesh B. Kulkarni
DOI: 10.17148/IJARCCE.2017.63124
Abstract: Businesses and researchers alike take great interests in furthering the use of Predictive Analytics in enhancing Business Intelligence and forecasting ability across a wide range of applications. As data is growing so fast every day, analysis of big data is a big problem for traditional analysis technique. Data generated from various resources is huge in volume and highly unstructured in nature, it is thus important to structure the data and leverage its actual potential. This requires a need for new techniques and frameworks to aid humans in automatically and intelligently analyzing large data sets to acquire useful information. This review paper discusses the overview of the researches done in this area. This paper also gives an insight how big data can be analyzed using predictive analytics method by exploiting the potential of Hadoop/Map-Reduce tool. The benefit of implementing this technique would be that making business orientated decisions in a respective domain of data.
Keywords: predictive analytics, data mining, apache hadoop, R, apache sparks.
Abstract
Life Time Evolution of Wireless Sensor Network in Presence of Energy Hole at Sink
K. Anusha, S. Srija
DOI: 10.17148/IJARCCE.2017.63125
Abstract: Wireless sensor networks play vital role in data gathering. They often work in hostile environments where nodes are not having any energy refilling. Therefore the lifetimes of network and energy consumption are very important. The aim of any technique is to increase lifetime of the network with optimizations. The rationale behind this is that the network has sensor nodes that are resource constrained. In this paper we proposed a model used to determine the effects of energy hole and estimate network lifetime in presence of energy hole at sink. Energy hole is characterized and studied in order to find its effect on the lifetime of the network. We used NS2 simulations in order to evaluate our work. The experimental results revealed that the proposed model is useful to determine the life time of WSN.
Keywords: Wireless Sensor Network (WSN), energy hole, routing, network lifetime, energy efficiency.
Abstract
Suit Yourself Customize Your Suits the Way You Want
Srishti Patil, Priya Todase, Sagar Dixit, Ashish Chopane, Prof. Neha Chankhore
DOI: 10.17148/IJARCCE.2017.63126
Abstract: With the growing technology, getting things do neat the tip of a finger have become very common. Everyone wants their stuff to be done quickly and easily whether it is changing television channel or ordering goods online. But when it comes togetting designed and customized suits, one does not have many options. What is observed is that user can select the parts of suit likeblazer, vest, tie, bowetc. User cannot completely customize the look he wants. Suit Yourself will enable user to choose smallest of the smallest detail. In traditional user has to visit the store, get the designs from tailors, explain them what exactly he wants the suit to look like and at the same time get recommendations from the designer himself. To overcome this hectic procedure, the idea of Suit Yourself has been undertaken. Suit Yourself is a concept to customize the suit online, which will help the customer better visualize the suit in 360-degree panoramic view before its tailored and will reduce the effort of client to goto the shop and getthings done.
Keywords: 360-degree panoramic, customization.
Abstract
An E-Learning Application for Learning Japanese Kanji
Asawari Khire, Pooja Dharmadhikari, Tanvi Raddi, Viraj Hudli, Chinmay Chiplunkar
DOI: 10.17148/IJARCCE.2017.63127
Abstract: A Kanji is similar to an Alphabet in English, but unlike an alphabet it has its own speci?c meaning. Every kanji also acts as a word depicting objects, weather, behaviour, etc. Because of this very reason there are about Three Thousand kanjis in the Japanese Language depending on the dialect. Memorizing every Kanji is a very dif?cult task, due to the sheer number of Kanjis as well as every Kanji is to be written in a speci?c Stroke order. Hence it becomes very hard for Japanese as Foreign Language (JFL) students to learn Kanjis. But Japanese being a pictographic language, construction of its Kanjis is based on pictures. Hence animation sequences for construction of every kanji maintaining its Stroke Order, are to be generated and displayed, so that JFL students can learn and understand Kanjis in a creative as well as an easier method.
Keywords: Computer Graphics, Software Engineering, Pattern Recognition.
Abstract
Facial Recognition understanding and Differences Between PCA (Principal Component Analysis) and LDA (Linear Discriminant Analysis)
Aarav Yadav, Ms. Anamika Jain
DOI: 10.17148/IJARCCE.2017.63128
Abstract: Facial recognition is the process of identi?cation of humans by the beyond wildest dreams characteristics of their Faces. Face recognition technology is the end intrusive and fastest bio-metric technology to identify the human face. With increasing money in the bank needs and by all of advancement in technology extracting taste has become roughly simpler. Authentication by passwords are not secure, so this technology are much more important as for upcoming security and safety measures. Many technologies have been developed for finding the best possible ways to describe the face descriptors and finding the face from available database of images. In this Paper we have discussed some understanding about Facial Recognition and differences between two algorithms which are used for facial description, these are PCA (Principal Component Analysis) and LDA (Linear Discriminant Analysis).
Keywords: Face Recognition; PCA Algorithm; LDA Algorithm; Image Processing.
Abstract
Survey: Sentiment Analysis of Twitter Data for Stock Market Prediction
Rupawari Jadhav, M. S. Wakode
DOI: 10.17148/IJARCCE.2017.63129
Abstract: Stock market prediction is trying to determine the future value of a company stock. The company should make a profit when the prediction of stock�s future price could be successfully done. News article and social media can affect the stock market. The Twitter is one of the most useful social media that can help to predict public mood. The predicted mood and previous day value are useful for predicting stock market price. This paper discusses the prediction of the future stock market with help of sentiment score. The different techniques can be used to classify result of sentiment score. In this paper, the different technique for stock market prediction is introduced. We also discuss technology that speedup the computation which will improve the performance.
Keywords: Clustering, classification techniques, Sentiment analysis, Social data analysis, Stock market prediction.
Abstract
An Improved CL-EKM based Key Management System
Mr. Sanket Patil, Prof. Mrs. Snehal Bhosale
DOI: 10.17148/IJARCCE.2017.63130
Abstract: In not distant future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is major worry in wireless sensor network. The traditional network security methods are not suitable for wireless sensor networks because of limited resource. Several Key management and establishment schemes have been suggested to provide light weight ciphers. The key management schemes play an important role in wireless sensor networks toachieve security. Basically, key management includes two aspects: key distribution and key revocation. Key distribution refers to the task of distributing secret keys between communicating parties to provide secrecy and authentication. Key revocation directs to the task of securely removing compromised keys. By revoking all of the keys of a compromised sensor node, node can be removed from the network. As compared to key distribution, key revocation has received very little attention. In this paper a survey of key management schemes in wireless sensor networks has been executed.
Keywords: Secret key sharing, key management schemes, wireless sensor network, symmetric algorithms.
Abstract
Image Processing based Multilingual Translator for Travellers using Raspberry pi
S. Rishi Kumar, G.Madhavan, M. Naveen, S.Subash, U. Selvamalar Beulah Ponrani
DOI: 10.17148/IJARCCE.2017.63131
Abstract: The present paper is about an innovative, efficient and real-time cost beneficial method that enables international travelers to hear the text images of sign boards, routes in their own languages. It combines the concept of Optical Character Recognition (OCR), text to Speech Synthesizer (TTS) and translator in Raspberry pi. Text Extraction from color images is a challenging task in computer vision. Text-to-Speech conversion is a method that scans and reads any language letters and numbers that are in the image using OCR technique and then translates it into any desired language and at last it gives audio output of the translated text. The translate shell which is used to translate the text to is available in many languages. The translate shellis utilized to provide audio output too. This paper describes the design, implementation and experimental results of the device. This device consists of two modules, image processing module and voice output module. The device was developed based on Raspberry Pi b+ with 900 MHz processor speed.
Keywords: Translator, OCR, Rassberry pi, Tesseract , image magic, python .
Abstract
An Improved High Risk Prediction in Health Examination Record Using Data Mining
A. Narmatha, R. Abinaya Revathy, Mr. S. Radhakrishnan
DOI: 10.17148/IJARCCE.2017.63132
Abstract: Medical databases have accumulated huge amounts of information about patients and their medical conditions. Relationships and patterns within the data can provide new medical knowledge. Huge amount of Electronic Health Records (EHRs) are collected over the years have provided a rich base for risk analysis and prediction. An EHR contains digitally stored healthcare information about an individual, such as observations, laboratory tests, diagnostic reports, medications, patient identifying information, and allergies. A special type of EHR is the Health Examination Records (HER) from annual general health check-ups. The fundamental challenge of learning a classification model for risk prediction lies in the unlabelled data that constitutes most the collected dataset. Particularly, the unlabelled data describes the participants in health examinations whose health conditions can vary greatly from healthy to very-ill. There is no ground truth for differentiating their states of health. Identifying participants at risk based on their current and past HERs is important for early warning and preventive intervention. Risk means unwanted outcomes such as mortality and morbidity. The proposed system presents a Semi-supervised learning algorithm to handle a challenging multi-class classification problem with substantial unlabelled cases. This algorithm constructs a training set from the diabetes records with unlabelled classes and performs risk analysis with user queries reports. The process shows a new way of predicting risks for participants based on their annual health examinations.
Keywords: Medical database, association rule mining,semi-supervised learning.
Abstract
Dynamic Groups with inbuilt data updating for loud and Anti Collusion Data Sharing Scheme
M. Nandhini Sri, R. Sangeetha, Mr. S. Radhakrishnan
DOI: 10.17148/IJARCCE.2017.63133
Abstract: The Benefited from Cloud Computing, clients can achieve a flourishing and moderate methodology for information sharing among gathering individuals in the cloud with the characters of low upkeep and little administration cost. Then, security certifications to the sharing information records will be given since they are outsourced. Horribly, due to the never-ending change of the enrolment, sharing information while giving protection saving is still a testing issue, particularly for an untrusted cloud because of the agreement attack. In addition, for existing plans, the security of key dispersion depends on the safe communication channel, then again, to have such channel is a solid feeling and is difficult for practice. In this paper, we propose a safe information sharing plan for element individuals. Firstly, we propose a safe route for key dispersion with no safe correspondence channels, and the clients can safely acquire their private keys from gathering administrator. Besides, the plan can accomplish fine-grained access control, any client in the gathering can utilize the source in the cloud and refused clients can't get to the cloud again after they are rejected. Thirdly, we can protect the plan from trickery attack, which implies that rejected clients can't get the first information record regardless of the possibility that they scheme with the untrusted cloud. In this methodology, by utilizing polynomial capacity, we can achieve a protected client denial plan. At long last, our plan can bring about fine productivity, which implies past clients need not to overhaul their private keys for the circumstance either another client joins in the gathering or a client is give up from the gathering.
Keywords: Access control, Privacy-preserving, Key distribution, Cloud computing.
Abstract
Automation in Agriculture System using GSM
Prof. S .D. Anap, Mr. Uddhav Abuj, Miss. Kalyani Tambe, Miss. Swati Sangale
DOI: 10.17148/IJARCCE.2017.63134
Abstract: The venture is intended to build up a programmed water system framework that switches a valve ON/OFF by detecting the dampness substance of the dirt and switches engine ON/OFF by detecting the water level of tank utilizing remote innovation adequately for horticulture applications through GSM Modem utilized as a part of sending a SMS on the status. In the field of farming, utilization of legitimate technique for water system is vital. The upside of utilizing this technique is to decrease human mediation and to guarantee legitimate water system. Once the controller gets this flag, it produces a yield that drives a hand-off for working the water pump. It likewise sends a SMS to the concerned number utilizing GSM modem. A LCD show is additionally interfaced to the microcontroller to show the status of the dirt and water pump ON/off condition.
Keywords: ARM1, GSM2, Sensors3, water-saving irrigation4, water pump5, assembly language6 etc.
Abstract
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution
Gauri Gajanan Bathe, Prof. Rahul Patil
DOI: 10.17148/IJARCCE.2017.63135
Abstract: Due to increasing security requirements, digital videos need to be encrypted to maintain confidentially, integrity and availability. This paper proposes data embedding in H.264/AVC video where the embedded data is restored without knowing the original video content. In this manner, confidentially is preserved. The property of H.264/AVC code, the codeword of the intra-prediction modes, motion vector differences and residual coefficients are encrypted with the stream ciphers. User may hide additional data in the encrypted domain by using code word substitution method. Data can be restored in encrypted domain or in the decrypted domain.
Keywords: Data hiding, encrypted domain, H.264/AVC, codeword substitution.
Abstract
Parking Management System using Image Processing and Distributed Approach
Prof. S.P. Bholane, Shantanu Kotambkar, Ajinkya Lakade, Kunal Mande, Tanmay Deshmukh
DOI: 10.17148/IJARCCE.2017.63136
Abstract: Vehicle parking in today's date has turned into a noteworthy issue in urban territories, because of the absence of parking facilities and poor management. Problems emerging from the absence of parking facilities and poor administration incorporate movement clog, expanded contamination, expanded utilization of fuel.To relieve these issues, a model has been produced with the android application, appropriated frameworks, image processing. The prototype with the help of an android application gives the information regarding the availability of car parking to the user directly. Delivering User the information regarding the parking space availability will thus reduce the time, fuel and efforts invested in search of a parking space. This will also lead to a reduction in traf?c congestion, ultimately leading to less pollution. A database maintained for the availability of parking space can be used for better management of parking spaces. For detection of car parking spaces, image processing is helpful which will determine the parking availability. This prototype hence, will reduce manpower needs and increase the ?exibility and security. The image processing at the local server level and only providing the required information to the central server thus optimizes the process followed by this prototype. Thus, a distributed parking prototype is developed to mitigate the problems faced by a common man and in the process conserving fuel and helping reduce global warming, pollution as well.
Keywords: Image processing, car park occupancy, object detection, information system.
Abstract
Animal Detection System in Farm Areas
Vikhram.B, Revathi.B, Shanmugapriya.R, Sowmiya.S, Pragadeeswaran.G
DOI: 10.17148/IJARCCE.2017.63137
Abstract: The main aim of our project is to protect the crops from damage caused by animal as well as divert the animal without any harm.Animal detection system is designed to detect the presence of animal and offer a warning. In this project we used PIR and ultrasonic sensors to detect the movement of the animal and send signal to the controller .It diverts the animal by producing sound and signal further, this signal is transmitted to GSM and which gives an alert to farmers and forest department immediately.
Keywords: PIC 16F877A, PIR sensor, ultrasonic sensor, APR board.
Abstract
Programmed Vehicle Accident Detection using GSM and GPS Modem and Prevention using Alcohol Sensor
Jayesh Choudhary, Manish Kumar Meena, Saroj Kumar Sah, Mrs. Alka Rani
DOI: 10.17148/IJARCCE.2017.63138
Abstract: The Rapid development of innovation and framework has made our lives less demanding. The coming of innovation has additionally expanded the movement perils and the street mischances happen oftentimes which causes gigantic death toll and property as a result of the poor crisis offices. Our venture will give an ideal answer for this downside. An accelerometer can be utilized as a part of an auto caution application so that unsafe driving can be recognized. It can be utilized as a crash then again rollover identifier of the vehicle amid and after a crash. With signs from an accelerometer, an extreme mischance can be perceived. As indicated by this venture when a vehicle meets with a mishap instantly Vibration sensor will identify the flag or if an auto moves over, and Micro electro mechanical framework (MEMS) sensor will identifies the flag and sends it to ARM controller. Microcontroller sends the ready message through the GSM MODEM including the area to police control room or a safeguard group. So the police can instantly follow the area through the GPS MODEM, in the wake of getting the data. At that point subsequent to acclimating the area essential move will be made. On the off chance that the individual meets with a little mishap or if there is no genuine risk to anyone`s life, then the ready message can be ended by the driver by a switch gave so as to abstain from squandering the profitable time of the medicinal safeguard group. This paper is successful in recognizing the mishap absolutely by way of doing thing for both vibration sensor and Micro electro Mechanical framework (MEMS) or accelerometer. As there is a field of reference for development and as an age execution we can include a remote gps system for catching the location which will aid in giving victim help. Here we have discussed on alcohol sensor which will indicate the person can drive the car or not and will allow the car to get started or stop.This will increase the safety parameters of person.
Keywords: GSM, GPS, Vibration Sensor, ARM Controller, MEMS.
Abstract
Fraud Detection in Health Care Insurance using Data Mining by Integrating Hospital and Health Insurance System
Baliram Darade, Amol Bhatkal, Akshay Phadtare, Ashish Katkade
DOI: 10.17148/IJARCCE.2017.63139
Abstract: Fraud is widely spread and it can be very costly to the health- care insurance system. It involves intentional deception intended to result in an unauthorized benefit. It is shocking because the incidence of health insurance fraud increasing every year. In order to detect and avoid the fraud, data mining techniques are applied. This includes some basic knowledge about health care system and its behaviors, analysis of the health care insurance data. Data mining is divided into two learning techniques, supervised and unsupervised learning is employed to detect fraud claims. But, since each of the above techniques has its own advantages and disadvantages, by combining the advantages of both the techniques, a hybrid approach for detecting fraud claims in healthcare insurance industry is proposed.So, to make healthcare insurance industry free from fraud, it is necessary to focus on the elimination of fake claims arriving through health insurance. According to the recent survey, it is found that the number of false claims in the industry is near about 15 percent of total claims. Insurance companies in USA losses over 30 billion USD annually to healthcare insurance frauds. The statistics is increasing in developing country like India as well.
Keywords: Database, Data Mining, web Application, ECM
Abstract
A Hybrid Approach for Software Fault Prediction Using Artificial Neural Network and Simplified Swarm Optimization
Ankit Pahal and R. S. Chillar
DOI: 10.17148/IJARCCE.2017.63140
Abstract: The major task in the software developing is to provide a software which is free from any kind of defects. But this task is hard to accomplish by the developers. Fault prediction can be classified as one main region to forecast the possibility of the software containing faults. The aim of the fault prediction in software development life cycle is to categorize the software modules in fault-prone and non fault-prone modules as soon as possible. This classification of fault-proneness of a module is actually essential for reducing the cost and increasing the efficiency of the software development process. In this paper, we propose a hybrid model using artificial neural network (ANN) and Simplified Swarm Optimization (SSO) for fault prediction. ANN is used for categorization the software modules in fault-prone and non-fault-prone modules, and SSO is then used to reduce dimensionality of dataset. This approach is easy to implement as no expert knowledge is required. The attained results confirms a preferred performance of this approach for fault prediction and output rate or recognition. The results indicates the prediction rates of proposed method is more than 90 percent in best condition.
Keywords: Software fault proneness, fault prediction, artificial neural network, simplified swarm optimization.
Abstract
Real Time Indoor Air Quality Monitoring System
Prof. Snehal Shinde, Akshay Kashid, Kshitij Jamdade, Shraddha Sable, Pragnaya Ankalgi
DOI: 10.17148/IJARCCE.2017.63141
Abstract: Major of the time about 2/3rdof the day we humans spend indoor. So it is necessary to keep our indoor environment clean and healthy. As air quality has major influence on the health of people so this A Wi-Fi Based, Multi-Sensor, Real Time Indoor Air Quality Monitoring System is proposed. The system will detect the level of the several gases like Carbon Dioxide (CO2), Nitrogen Dioxide (NO2), Sulfur Dioxide (SO2), and Volatile Organic Compound (VOC) and also the presence of dust, temperature, and humidity. The system will alert the user if levels of these gases are exceeded through Wi-Fi module on their smartphones. The system consists of Arduino platform and multiple sensors along with Wi-Fi and Bluetooth module. The Wi-Fi module is used to communicate with the user.
Keywords: Arduino, WI-Fi, Sensors, Temperature.
Abstract
Design of Reversible Excess-3 Adder and Subtractor
Pujitha Chaluvadi, Mahi Pranay, P Sukesh, Kuruva Madhu
DOI: 10.17148/IJARCCE.2017.63142
Abstract: Power is one of the most important design parameter after speed, in integrated circuit. One of the basic fundamental component in such circuit is adder and subtractor. In order to optimize such circuits there is need of designing efficient and low power fundamental blocks.As per the Launder�s principle, KTln2 heat is dissipated if there is any loss in bit. Excess-3 code is one of the sequential code used widely in digital circuits for performing arithmetic operations. Since conventional excess-3 adder and excess-3subtractor both circuits designed in irreversible logic observe large amount of leakage power. By keeping this as main point, this paper explains the process of designing 4-bit excess-3 adder and subtactor in 90nm technology and also worked to combine both individual circuit to design as a single circuit where it can perform addition and subtraction on excess-3 coded bits simultaneously. This paper also gives mathematical analysis of n-bit proposed circuit in terms of number of gates, quantum cost, garbage output, power and delay. Finally simulation results are obtained by using cadence virtuoso and observed power dissipation for proposed circuit is 171uW.In this paper detail simulation results along with the power graph submitted.
Keywords: Quantum Cost (QC), Garbage Outputs (GO), Fredkin gate (F), Peres Gate (PG), Feynman gate (FG), Reversible MUX(RMUX), Reversible full adder (RFA), Reversible Parallel adder, GSR logic cell.
Abstract
Bridge Disaster Monitoring & Alert System
Prof. S. D. Anap, Mr. Gaikwad Mangesh, Mr. Thorat Somnath, Mr. Wakchaure Akshay
DOI: 10.17148/IJARCCE.2017.63143
Abstract: Structures, including pipelines, aircraft, ships and civil infrastructures, such as bridges, buildings, dams, among others, are major parts of society�s economic and industrial success. Bridges are one of the critical cross points of a country�s transport network but they are expensive to build and maintain. It is basically imperative to keep connect harms from regular debacles, for example, hurricane surge, seismic tremor, and so on. As needs be, the consideration on water powered brought about scaffold disappointment has been gotten because of scour issues. In any case, in-situ connect scour observing is still one of the rough works for analysts in their field applications. It is important to guarantee that the scaffold checking framework under normal fiascos can work well. By sending cautioning signals, the ongoing data can give designers to settle on right choice and take fitting activities in time while the extension harm happens. This review connected the inventive scour observing procedures which have been outlined and created in the research facility, and can be introduced and tried in the field. An inventive remote sensor systems was additionally utilized to build the scaffold observing framework with fluctuated sensors.
Keywords: ARM1, GSM2, Sensors3, ZIGBEE4, assembly language5 etc.
Abstract
Security in Searching Shared and Encrypted Data
Swati Virkar, Pritee Chinchwade, Shivani Ajmire, Prof. R.A. Badgujar
DOI: 10.17148/IJARCCE.2017.63144
Abstract: When private data content is stored in databases that are under the control of others, a formal way to protect the data, is to encrypt the data before storing in the database. To retrieve the data efficiently, a search mechanism is needed that works over the encrypted data an encryption scheme where each authorized user in the system has user own private keys to encrypt and decrypt data. The method supports keyword search which enables the server to return only the encrypted data that satisfies an encrypted query with decrypting itat client side. For strong authentication we are implementing the AES 128 with 16 bit algorithm is implemented. We can deploy this system on the cloud server.
Keywords: Encrypted Data, private data, retrieve, database.
Abstract
Interactive & Informative Digital Board using Raspberry PI
M. Bala Nagammal, S. Nilavarasi, M. Priyanka, Prof. Mr. A. John Paul Antony, M.E.
DOI: 10.17148/IJARCCE.2017.63145
Abstract: Informative system is a most important thing which provides up-to-date information without much effort. In the normal notice board, a separate person is required to take care of this notices, but our main aim is to provide green environment and to provide ease of use. This project is about advanced wireless notice board. The project is built around ARM controller raspberry-pi which is heart of the system. In this system, the user may interact with the system and can get the information from the Informative system via the mobile application. The admin will provide the information, and the user can view the information from the system by interacting with the system through mobile application. This informative system was developed using the open source software's and this makes informative system cheaper when compared to the other system. This interactive and informative system can be used for commercial purposes such as shopping malls, Railway stations, airports and also for the Educational purposes. This informative System uses internet connection for client and server communication which makes communication faster.
Keywords: raspberry-pi, Interactive and Informative Digital Board, mobile application.
Abstract
Efficient Transformerless MOSFET Inverter for Grid-Tied Photovoltaic System
M. Mareeswari, K. Ramalakshmi, A. Saranya, B. Noorul Hamitha
DOI: 10.17148/IJARCCE.2017.63146
Abstract: The grid tied photovoltaic system suffers a great loss because the perormance of the transformer present in the inverter. The cost of the transformr is high and the maintaince cost is also high.Therefore transformerless inverter are widely used in grid tied photovoltaic system,due to the benefits of achieving high efficiency and low cost. The sinusoidal pulse width modulation of full bridge transformerless inverters can achieve high effeciency by using metal oxide semiconductor field effect transistor. Various topology has been implemented for transformerless inverter, but in that there is a problem of losse and reverse recovery characteristics. In our paper we are going to implement the centre tapped H bridge transformerless inverter topology for grid tied photovoltaic system to avoid the losses and leakage current. A clamped branch is added in the transformerless inverter. The added clamping branch clamps the freewheeling voltage at the freewheeling period. As the common mode voltage is kept constant for the whole grid period that reduce the leakage current. The splitting structure of inductor at the region of grid side avoids reverse recovery voltage and this improves the effeciency of the system. The detailed analysis of our topology with the operational modes, leakage current analysis and design consideration were implemented.
Keywords: Transformerless; Photovoltaic; Grid connected; Efficiency.
Abstract
Automatic Portal Lock Security Using Two-Step Verification via Bluetooth and Gsm
Sherin Abraham, Ashwin Achari, Vishwadeep Shinde, Akash Shinde
DOI: 10.17148/IJARCCE.2017.63147
Abstract: IoT has emerged as a new concept for smart- security oriented system. IoT is basically connecting embedded devices to internet. IoT includes embedded devices along with software, sensors, actuators and network connectivity to collect and exchange data across the network. IoT has become an integral part in security domain. Bluetooth technology from mobile combined with real time monitoring system can be used for security and automation. Instead of using traditional locking system (ex. key-lock), Bluetooth can be used as an alternative. Bluetooth can be used for securing portals like doors, lockers, etc. but Bluetooth can be spoofed. To overcome this, two way authentication can be introduced where first step will be Bluetooth pairing, second will be answering a predefined question via Morse code interface and also using an authenticator generating time based code. This will reduce the chance of Bluetooth spoofing and provide better security in the field of IoT.
Keywords: Door Locking System, Sensor, GSM, Bluetooth, Embedded System.
Abstract
Development of 6LoWPAN Border Router for Secure Communication
Mr. Tejas Mehare, Prof. Mrs. Snehal Bhosale
DOI: 10.17148/IJARCCE.2017.63148
Abstract: Accessing end devices (nodes) in the Internet of things (IoT) with a unique IP address is possible with the evolution IPv6 and 6LoWPAN. which is an open stack developed by IETF to provides communication between LoWPAN devices and the internet. 6LoWPAN Border Router is the gateway between nodes and internet which connects 6LoWPAN devices to the Internet and also responsible for controlling traffic between IPv6 and IEEE 802.15.4 interfaces. 6LoWPAN Networks are implemented by several ways, but some are open standards which can be executed on development boards like Raspberry Pi, Beagle bones etc. The design and implementation of 6LoWPAN border router with an embedded Web server and implement the bridge between 6LoWPAN devices to the internet (IPv4 as well as IPv6). The border router is built around a 32-bit ARM Cortex M3 microcontroller and runs the network-enabled operating system Contiki in version 2.7.The network layer uses IPv6 and Layer-3 forwarding between these different link-layer technologies.
Keywords: Internet of Things, 6LoWPAN Border Router, IPv6, IEEE 802.15.4, Contiki-OS.
Abstract
Implementing AES Algorithm for Selective Encryption in Wireless Networks
Manjula G., Dr. Mohan H.S.
DOI: 10.17148/IJARCCE.2017.63149
Abstract: The importance given to security in every Internet application is an unblemished spur to contribute in the turf of Information Safety. The evolution of digital data transaction in E-way is expanding, data safety is emerging with much more importance in data storage and broadcast. To defend the data against various attacks and eavesdropping we use a procedure known as Encryption which protects the data. To accomplish this, Encryption algorithms serve a fundamental role in proficient information security structures. Symmetric key algorithms are stereotypically effective and serve to be the fastest cryptosystem and hence have crucial applications in many territories. Selective cryptography is a novel drift in protecting the data. It targets at dropping the volume of data to be encrypted however it aims to attain a satisfactory and economical security. This methodology is predominantly anticipated in controlled communication such as in real time applications with delay limitations, mobile communication with restricted computational power and so on. In this paper, we present the perception of encryption using AES algorithm and selective encryption and the propose a new selective encryption method which is constructed on symmetric key. By exploiting a new probabilistic approach, a sender embraces appropriate ambiguity in the procedure of data encryption, so that only consigned recipient can recover the original data and other illegal systems have no acquaintance of the total conveyed communication. By reducing the amount of encryption i.e. Selective Encryption is a very useful method for the different data formats such as text, video and audio content. This paper discusses the importance of Probabilistic Selective Encryption, their role in ensuring the strength of a cipher system and finally describes a new approach of Encryption using enhanced AES based Selective Encryption.
Keywords: Encryption, Decryption, Cryptography, Advanced Encryption standard (AES), Symmetric Encryption, Asymmetric Encryption.
Abstract
Study of Alert Correlation Technique
Ankita B. Palekar
DOI: 10.17148/IJARCCE.2017.63150
Abstract: Alert correlation is a significant technique for arranging large volume of intrusion alerts that are produced by Intrusion Detection Systems (IDSs). The popular trend of research in this area is to drawn out the attack strategies from unprocessed intrusion alerts. The general belief about intrusion detection is that it cannot satisfy the security requirements of organizations. Now, Intrusion response and prevention are becoming very important for preventing the network and removing damage. To launch proper response to stop attacks and prevent them from increasing, it is important to know the real situation of a network and the strategies used by the attackers. This is also the primary aim of using alert correlation technique. However, many of the current alert correlation techniques only focus on grouping inter-connected alerts into different sets without further verifying the strategies of the attackers. The main aim of this paper is to focus on developing a new alert correlation technique that can help to automatically extract attack strategies from a large volume of intrusion alerts, without any prior knowledge about these alerts. The proposed approach is based on two network approaches, namely, Multilayer Perceptron (MLP) and Support Vector Machine (SVM). The output of these two methods is used to verify with which previous alerts, this current alert should be related. This suggests the relationship of two alerts, which is helpful for determining attack scenarios. One of the important features of this technique is that an Alert Correlation Matrix (ACM) is used to store correlation strengths of any two types of alerts. ACM is updated in the training process. The information is then used for drawn out high level of attack strategies.
Keywords: ACE (Alert Correlation Matrix), MLP (Multi-Layer Perceptron), SVM (Support Vector Machine)..
Abstract
Chemistry in Augmented Reality
Sanket Salve, Akshay Khapare, Rohit Barve
DOI: 10.17148/IJARCCE.2017.63151
Abstract: The comprehension of atom-world has always been the focus and the challenge of chemistry learning. Junior high school student�s imaginative abilities are not yet mature. As a result, they are not able to visualize structures correctly during the beginning stage of chemistry learning. The Augmented Reality application of Chemistry in AR has its own features, teaching information capacity, interactive user interface. Through Augmented Reality, an application will be developed which will help the students to easily visualize the 3D structure of an element or a molecule. Students could control, combine and interact with a 3D model of micro-particles using markers. It will also help the student to visualize and understand the chemical reactions by combination of two or more elements or molecules. The chemistry modelling and spatial arrangement of molecular structures in space can be understood using 3D objects. It enables user to interact with virtual and real world in real time application.
Keywords: Augmented Reality, Unity 3D, Vuforia SDK, Multimedia Technology, Chemistry learning.
Abstract
Detect-caused Fire and Bang Alarm using Image Processing and Sensors
Kamini Sharma, Dolly Jadhwani
DOI: 10.17148/IJARCCE.2017.63152
Abstract: Detection of flame and its classified category is the most demanding and testing work in processing of the image. The use of image processing without the use of sensors helps to detect the fire in more precise, more accurate and in the fast manner. Hence the proposed paper is trying to introduce the procedure towards the optimum solution for the detection of flame as early as possible. In order to make the action less in amount in the loss of human and loss in property as well, an intelligent fire detection system is been proposed so as to detect flame with higher accuracy.
Keywords: Fire detection; color segmentation; image processing.
Abstract
An Efficient Difficult Appearance of Object Tracking Based on Spatial-Temporal Consistency
Dr. R. Muthu Kumar, M. Sivakumar
DOI: 10.17148/IJARCCE.2017.63153
Abstract: Analysing image sequences to detect and determine temporal events is often known as video analysis. The �video analysis is used in a wide range of domains including entertainment, health care, automotive, transport, home automation, safety and security. Object detection is the first and most important step of moving object tracking. These techniques can be divided into several categories. Moving objects extraction from background is an important task. Results of object extraction depend upon the variation of local or global light intensities, objects shadow, background and foreground regular or irregular movement. Present a robust tracking method by exploiting a fragment-based appearance model with consideration of both temporal continuity and discontinuity information. From the perspective of probability theory, the proposed tracking algorithm can be viewed as a two-step optimization problem. In the first step, by adopting the estimated occlusion state as a prior, the optimal state of the tracked object can be obtained by solving an optimization problem, where the objective function is designed based on the classification score, occlusion prior, and temporal continuity information. In the second step propose a discriminative occlusion model, which exploits both foreground and background information to detect the possible difficult appearance, and also models the consistency of occlusion labels among different frames. In addition, a simple yet effective training strategy is introduced during the model training (and updating) process, with which the effects of spatial-temporal consistency are properly weighted. The propose tracker is evaluated by using the recent benchmark data set, on which the results demonstrate that our tracker performs favourably against other state-of-the-art tracking algorithms.
Keywords: Spatial Reasoning, Visual Surveillance, Temporal Reasoning.
Abstract
Protecting Web Servers from Distributed Denial of Service Attacks
Prof. Dr. A.N. Banubakode, Badal Mehta, Tanmay Modak, Vrushal Chaudhary
DOI: 10.17148/IJARCCE.2017.63154
Abstract: Recently many prominent websites faced the Distributed Denial of Service (DDOS) attacks. While former security threats could be faced by tight security policy and measures like using firewalls, vendor patches etc. These DDOS are new in such a way that there is no completely satisfying protection as yet. There are certain solutions based on class based routing mechanisms in the LINUX kernel which prevent most severe impacts of DDOS. However, these do not provide complete security to the web server and hence there is a need to focus on other defence mechanisms. That is why we propose to introduce a concept called Honeypot in which we create a proxy server so as to lure attackers. In this system we can identify the attacker and can be notified immediately.
Keywords: LINUX kernel, Distributed Denial of Service (DDOS) attacks, Web Servers.
Abstract
Indoor Asset Tracking System using Wireless Communication
Vaibhav Prasanna Bhandarkar, Harshal Girish Narkhede, Aditi Vijay Nerurkar
DOI: 10.17148/IJARCCE.2017.63155
Abstract: This system locates assets in closed infrastructures like hospitals, factories, IT parks, and large warehouses, where normally Global Positioning System devices don�t work. The concept is based on an object tagged with a passive RFID tag, which are read by an RFID reader installed at strategic locations. If you have an outdated asset management system, it's easy to lose track of your resources. Indoor tracking systems provide an extensive solution for companies that require the maintenance of an inventory for tracking their resources, both human and material.
Keywords: Indoor Tracking System (ITS), Location Tracking, Asset Tracking, Asset Management using RFID.
Abstract
Wireless Real Time Monitoring and Controlling of Irrigation System
Kushnure Devidas, More Poonam, Padamalakar Dhanashri, Padavale Pooja
DOI: 10.17148/IJARCCE.2017.63156
Abstract: In this paper we proposed Wireless irrigation monitoring and controlling system to monitor different parameters with the help of wireless sensor network (WSN). The proposed system model which is cost effective and efficient solution for existing irrigation system to monitor real time parameters. The embedded web server is designed using ARDUINO UNO with the help of Real time operating system (RTOS). The system designed using the concept of wireless sensor network and the data collected to the server side is real time and user can continuously monitor and control through the Internet by using computer or handheld wireless devices. The experimental result shows that system useful to monitor and control different parameters from remote location.
Keywords: Embedded web server, Free RTOS, LAN, Wireless sensor network.
Abstract
Spatiotemporal Keyword Query Suggestion Based On Document Proximity and K-Means Method– A Review
Aju Tom Kuriakose, Sobhana N.V
DOI: 10.17148/IJARCCE.2017.63157
Abstract: The commercial web search engines are looking for the efficient keyword suggestions methods for retrieving the relevant information. The submission of the right keyword query determines the right direction of the user�s search. Spatial proximity and query results are the crucial factors in the keyword suggestion techniques. The Spatiotemporal suggestion of queries deals with spatial proximity.On the basis of a weighted keyword document graph that maps the relevance of keyword queries semantically with the distance between the location of the user and the documents retrieved. The K-Means method used for retrieving the highest ranked top k objects near to the current location of the user and Time aware query suggestion brings out the most relevant documents based on the temporal proximity. The word sense disambiguation gives an added advantage of getting the local data without the location name ambiguity.
Keywords: Query Suggestions, query optimization, spatial proximity, K-Means Method, Word Sense Disambiguation.
Abstract
Survey Paper on “An Android Based Mobile Framework for Student Alert Notification”
Sagar Gore, Nitesh Sonawane, Sayali Pawar, Mrunal Nerkar
DOI: 10.17148/IJARCCE.2017.63158
Abstract: Android phones are now become handiness to many and much people with the advance of electronics and communication technology. They are getting wide acceptability because of their utilized cordial applications. This paper deals with such an android application made for academic avail of students, and teachers and sta?s of the educational institution. Its features are- provide class and laboratory schedule, notice board, teachers update, noti?cation for recently inclusive updates, CGPA (cumulative grade point average) calculation. Its goal is to provide avail in academically works by making communication more facile, provide simple and quick access to information. Though it has been development for a speci?c institution, this application has the possible tractable to inclusive much assistive function and have extent version for a wide range of users.
Keywords: Mobile application, android, educational institution, academic news updates, server, codes.
Abstract
A Real Time Development of Gesture controlled Humanoid Robot using ZigBee Technology
Rachana Gulhane, Nivedita Pande, Shyam Prasad
DOI: 10.17148/IJARCCE.2017.63159
Abstract: Robots are now moved from research laboratory into our everyday lives, they are used to support people in daily activities. Specific humanoid robots are used to provide help with some physical activities. In the past efforts were made to construct a full-bodied humanoid robot. Due to advances in electronics technology humanoid robots, such as ASIMO, NAO & HUBO are developed. These developed robots have successfully demonstrated behaviours, such as walking, running and dancing. For interaction of humanoid robot with humans various kinds of technologies such as speech, gesture and skeleton are used. In the area of gesture recognition several different approaches have been established using different input devices and learning algorithms. Currently the robotics field is undergoing many changes. Over the past, robots were used in factories for manufacturing different products and transportation of products. Now in new generation we are having robots which can do the desired task called as �service robots�. Service robots can cooperate with people and serve them in day to day tasks. This paper aims to conflate the above conception of humanoid robot with MEMS (Micro-Electro-Mechanical-Systems) accelerometers to attain ease in accuracy and control. This humanoid robot will perform activity according to the position of the MEMS accelerometer.
Keywords: Servo-Motor, MEMS Accelerometer sensor, Micro-controller, Humanoid-Robot, Gesture, ZigBee.
Abstract
An Efficient mechanism to identify DDoS attacks by using Mark on Demand Server and Deterministic Packet Marking
A. Ravi, Karthik Shankar P S, J. N Sudhir, K. Karuna, Chandan Kumar
DOI: 10.17148/IJARCCE.2017.63160
Abstract: In the present age of technology where the Internet is the foremost necessity, the able working of Internet is the key concern. The main disadvantage faced on the Internet is the security of the data and other security constraints. One of the most known threats is Dynamic Denial of Service (DDoS) where the server is burdened with data which causes it to not respond to other user�s requests. This key issue is tackled till present day with the help of various techniques, one of the most prominent among being the Packet Marking. Deterministic Parking Marking (DPM) is the method which is used to mark the packets which are transmitted through the Internet. DPM, when used along with the Mark on Demand Servers, increases the possibility of easy and efficient detection of the DDoS attacks faced on the servers. We discuss the methods using .NET framework to identify the traffic sources and identify the physical address of the attacker for prevention and safety.
Keywords: DDoS attack, Denial of Service, Detectors, Deterministic Packet Marking, DPM, IP header marking, Mark on Demand, Packet Marking.
Abstract
Automatic OMR Answer Sheet Evaluation using Efficient & Reliable OCR System
Dhananjay Kulkarni, Ankit Thakur, Jitendra Kshirsagar, Y. Ravi Raju
DOI: 10.17148/IJARCCE.2017.63161
Abstract: In today�s modern world of technology when everything is computerized, the Evaluation exercise of examining and assessing the educational system has become absolute necessity. Today, more emphasis is on objective exam which is preferred to analyze scores of the students since it is simple and requires less time in the examining objective answer-sheet as compared to the subjective answer-sheet. This paper proposes a new technique for generating scores of multiple-choice tests which are done by developing a technique that has software based approach with computer & scanner which is simple, efficient & reliable to all with minimal cost. Its main benefit to work with all available scanners, In addition no special paper & colour required for printing for marksheet. To recognize & allot scores to the answer marked by of the student�s Optical character recognition technique is executed here.
Keywords: Multiple Choice, analyze, evaluate, Optical Character Recognition.
Abstract
Real Time Design and Development of Brain Computer Interface for Home Appliance Using LabVIEW
Kalpak Awale, Anagha Choudhari, Shyam Prasad
DOI: 10.17148/IJARCCE.2017.63162
Abstract: Each and every physical action we make is provoked by the neural course of action in human brain. With the correct apparatus and contemporary advancement or improvement in both the fields of cognitive neuroscience and brain imaging mechanism. This has drive to tremendous and accelerated growing field of brain computer interface (BCI). The BCI benefits or supports physically disabled, aged or unblessed people to make the use of the devices and application through their mental or cerebral exercise. Remarkably people conclude that BCI is a boon for physically challenged persons anguish from serious neuromuscular disorders. So in this paper, we evolve a BCI technology that control the home appliance for physically disabled or aged people. The EEG study conception has been applied to control the home appliance such as light or fan automatically that is without doing any physical movement from the place to electrical switch board for immobile persons. The EEG signals are catched from the subject brain activity using �NEUROSKY MINDWAVE MOBILE� EEG sensor which is implanted at the FP1 location of the subject forehead. The depacking and processing of the EEG signals and eye blink data from the raw EEG brain signals is done by using LabVIEW software from which composed signal is generated to control the home appliance. Micro-controller is used to control the relay drive circuitry to handle the on/off switching of the home appliance.
Keywords: LabVIEW (Laboratory Virtual Instrument Engineering Workbench), Electroencephalography (EEG),Brain computer interface (BCI),Eye Blinks, Neurosky Mindwave Mobile, Micro-controller.
Abstract
Survey on Cloud Compiler
S C Suryawanshi, Akshay Bankar, Akshay Agrawal, Aneesh Ashtikar, Pranesh Meher
DOI: 10.17148/IJARCCE.2017.63163
Abstract: Essentially, high-level programming languages highly relies on computer programs, called as compilers, to transform the source code of their programs into lower-level computer languages. To use these typesof compilers, programmers needs to install the required executable ?les on his local machines.The computers become limitation when it comes to local installation of compilers (i.e., devices, like tablets, cannot be used) and it resultsmostly in numerous portability and compatibility problems. For example, compilers (and their versions) are hugely dependent on the speci?cations of target computers (e.g., platform, architecture),resulting indif?culties toprogrammers in compilingsuch programs of a particular programming language on any other machine they use. On the other hand, conventional compilers are provided with no source code,restricting the programmers from extending their functionality or participating in ?xing bugs. This paper provides a solution for problems, by providing open-source cloud-basedcompilers.The systempresentstherequiredprospective stakeholders, framework features, by taking into consideration potential challenges of deploying such kind of compilers.
Keywords: Cloud Compiler, Android Based, Web Based, Multi Language, etc.
Abstract
Consistency Improvisation in MongoDB during Lag on secondary
Abuzar Kamal, Mr. Saravana Kumar K
DOI: 10.17148/IJARCCE.2017.63164
Abstract: Replication lag in Mongo database is serious problem in replication environment if the reporting is done through secondary server, In replication environment the read only query can be routed to secondary server, however if there is huge lag then it can result into inconsistent data. In the current version this issue has not been addressed, In the proposed system, an attempt has been made to overcome with this problem. Before execution of query the session should verify the lag, if the lag is beyond the specified limit then the query should be re-routed back to primary. This is possible through continuous short messaging between primary and secondary. The metadata about the lag can send through the messaging, upon reading message the secondary server should re-direct the query to primary server.
Keywords: Mongo DB, Replication, Lag, Consistency, Replica set, NoSQL, CAP Theoram.
Abstract
Driver’s Doziness Revelation and Alert System
Miss Prachi Patil, Mr Sunny Patil, Mr. Bipin Pawshe, Prof. Ankit Sanghavi
DOI: 10.17148/IJARCCE.2017.63165
Abstract: Driver�s invigilance is an important cause for most mishap related to the vehicles crashes. Drivers fatigue resulting from sleep impoverishment or sleep disorders is an important factor in the increasing number of the mishap on today�s roads. Dozy driver alert system can form the basis of the system to possibly decrease the mishap related to driver�s doziness. The aim of such a system is to accomplish revelation of driver fatigue by placing the camera inside the car, we can keep track of the face of the driver and look for the eye-motion which point out that the driver is no longer in condition to drive. In such a case, a alert signal should be issued. We also illustrate a method that can incline if the eyes are open or closed. The main principle of this system is that it must be highly non-invasive and it should start easily when the key is put in ignition and engine starts and car should run smoothly, without having at the driver begin the system. A dozy driver alert system using image processing as well as accelerometer is propounded in this paper.
Keywords: Dozy Driver Alert System, Image Processing, Driver�s invigilance, Vehicles Crashes.
Abstract
Big Data Analysis of Fetched Logs using Hadoop Framework
Prof. Girija Chiddarwar, Sanket Chhajed, Sameer Deshmukh, Pranoti Dongre, Bharti Nile
DOI: 10.17148/IJARCCE.2017.63166
Abstract: With every second slipping away, there are thousands of activities carried out on the internet. The big data generated out of logs is very crucial and important to provide a superior backbone to the whole IT infrastructure. It is not an easy task to analyse the logs generated by system as there are numbers of discrete type machines available in a network. The growing size and complexity of log files has made the manual analysis of system logs by administrators prohibitive. This fact makes it important for tools and techniques that will allow some form of automation in management and analysis of system logs to be developed. The proposed technique uses Hadoop framework to process huge amount of data. To extract useful information data mining technique is used, among which clustering is most popular. Various types of clustering like Connectivity-based clustering, Centroid-based clustering (K-Means Clustering), Density-based clustering, etc. can be used to cluster the log files. Centroid-based (K-Means Clustering) is the most effective technique amongst all. The input logs will be clustered using K-Means clustering and then processed in Hadoop framework. The analysis result can be used for detecting security threats in network and inform the administrator about the Intrusion Detection, SQL-Injection, system error, etc.
Keywords: Big Data, Hadoop, Log Analysis.
Abstract
Video Surveillance Based Attendance system
Mr. Rahul V. Patil, Mrs. S. B. Bangar
DOI: 10.17148/IJARCCE.2017.63167
Abstract: Attendance management system it is very important and popular method to maintain the record of work hours of everyone in organization. The attendance management system is used for multiple areas such as college, university, business organizations. It is very simple method to calculate the attendance how many people are present or absent. Schools and colleges are using attendance system so that they will give marks to students based on their attendance at submission time. Multiple methods are available for calculating attendance i.e. Attendance using pen and paper, fingerprint attendance system, RFID based attendance system, wireless iris recognition attendance management system , attendance management system using SMART-FR, automated attendance management system using face recognition, real time human face detection and tracking , robust and real time face detection.
Keywords: RFID, IRIS, SMART-FR.
Abstract
Key Point and Block based Feature Matching for Effective Image Forgery Detection
Durga Jetthy, Purva Gubbawar, Aditya Kumar Gupta, Mrs. S.A.Panwar
DOI: 10.17148/IJARCCE.2017.63168
Abstract: An effective method for the detection of forgery in images is proposed. In recent years, digital images are in use in many applications and for multiple purposes. They also play an crucial role in the storage and transfer of visual information, especially the secret ones. With this widespread utilization of digital images, in sum to the increasing number of tools and software of any digital image editing, now a days it is easy to manipulate and change the actual information of the image. Therefore, it has become mandatory to check the genuineness and the coalition of the image by using modern and digital techniques, which contribute to analysis and perception of the images content, and then make sure of their integrity. There are many types of image forgery, the most important and popular type is called copy move forgery, which uses the same image in the process of forgery. This type of forgery is used for one of two things, first to hide an object or scene by copying the area of the image and pasting it on another area of the same image. The second is the repetition of object or scene with change in some qualities "such as size and degree" by copying this object and pasting it on another area of the same image. The copy paste forgery in the input images can be identified with the help of segmentation, feature extraction and feature matching process. The input images were initially over segmented with the help of the SLIC algorithm. The features were extracted from each blocks based on Scale Invariant feature extraction algorithm (SIFT). From the extracted features the forgery is detected based on block matching and labeled feature point matching. In block matching process the distance between the divided images regions were identified. From the identified similarity between the features the copy move regions were identified in the image. The performance of the process is measured with the help of precision, recall and F-measure of the input image.
Keywords: feature point, feature block, SIFT, SLIC, etc.
Abstract
Intelligent Android based Online Parking System
Ajay Thakur, Puja Nawale, Shubhangi Randive, Prof. P.H. Joshi
DOI: 10.17148/IJARCCE.2017.63169
Abstract: With the increase of economical behavior and the upgrade of living standard of people, the ratio of people in India who own cars and motorcycles have recently increased giving a boost to Metropolitan Traffic. Therefore, Now a days parking issues will be a big challenge to facilitate traffic network and ensure the urban life quality. Searching for parking space in most metropolitan area�s, especially during the rush hours, is difficult for the drivers. The difficulty arises from not knowing where the available spaces may be at that time or not ; even if known, many vehicles like two wheeler and four wheeler may pursue very limited parking spaces to cause serious traffic congestion. In this paper, we design and implement a prototype of Andriod Base Smart Parking System based on Reservation that allows drivers to effectively find the car parking in particular area and reserve the vacant parking spaces. By periodically learning the parking status from the host parking database management in parking lot, the reservation service is affected by the change of physical parking status. The drivers are allow to access this cyber-physical system with their personal communication device. Furthermore, we study state-of-the-art parking policies in the smart parking systems and compare their performance. The experiment results show that the proposed reservation-based parking policy has the potential to simplify the operations of parking systems, as well as traffic congestion caused by parking searching.
Keywords: Parking space detection, Android Application, Automated parking.
Abstract
Datawing File Sharing and PC Control Application
Mr. Nayan A. Sawant, Ms. Snehal S. Zore, Ms. Dhanashri S. Salunkhe, Mr. Parag S. Joshi
DOI: 10.17148/IJARCCE.2017.63170
Abstract: Users are frustrated with slow transfer speed and carrying cable everywhere with them to transfer ?le from one device to another so here we introduce DataWing. It will be an application to transfer ?les from Wi-Fi device to another compatible Wi-Fi device. User can use it to transfer ?les including photos, videos, music, apps and any other ?les. It should be supportable for many platforms to transfer ?le directly by Ad-hoc Wi-Fi connection. In additional DataWing also including services like WebShare and Remote PC Control.
Keywords: Android, Java, HTTP, FTP.
Abstract
Enhancing Performance of Medical Expert System by Crisp Logic
Aishwarya A. Patil, Nimba Y. Koli, Gayatri S. Dhangar, Vidya Nivesh
DOI: 10.17148/IJARCCE.2017.63171
Abstract: Cancer disease diagnosis is difficult and needs higher level of expertise. Artificial Intelligence helps to solve the problem in Medical Expert System domain as expert people do. In the existing system, Fuzzy logic is used in medical expert system. This system is agroup of membership functions or rules and tilting toward multi-optional processing. Thiscreates confusion and gives a non-fixedresult which does not satisfy the user. The proposed system improve the performance of medical expert system by crisp logic, The Crisp Expert System defines imprecise knowledge and offers a linguistic concept with better approximation to medical condition. Crisp logic only permits conclusion which are either yes or no, there are also propositions with variables answers. The input variables their description value associated Crisp Sets and their indicator function indicates the membership of variables. The mathematical model developed is the pioneer attempt to predict the risk of Lung cancer disease and used to compare the performance of crisp expert system.
Keywords: Artificial Intelligence, Medical Expert System, Crisp Logic, Indicator Function, Boolean Logic.
Abstract
Future inside Virtual Reality
Mrs. Shikha Sharma Sarkar, Pradeep Singh Bhawariya
DOI: 10.17148/IJARCCE.2017.63172
Abstract: Virtual Reality innovation may give new alternatives to directing perceptual engine appraisal inside mimicked 3D conditions for people with an extensive variety of inabilities. This paper diagrams our work building up a progression of diversion like virtual reality situations to survey and restore eye-hand coordination, scope of movement and other important perceptual motor exercises. Our endeavors have concentrated on building drawing in diversion based stereoscopic realistic situations that permit customers to take an interest in perceptual engine restoration by interfacing with 3D jolts inside an entire 360-Degree space utilizing a head mounted show or by method for a "confront forward" organization utilizing 3D projection shows. Exploratory work utilizing various video sensors to recognize and track 3D body movement, distinguish body poses and evaluate engine execution is likewise portrayed.
Keywords: Virtual Reality, 3D, progression of diversion, exploratory work, 360-Degree.
Abstract
Literature Review on Home Automation System
Neha Malik, Yogita Bodwade
DOI: 10.17148/IJARCCE.2017.63173
Abstract: One of the topics which is gaining popularity is Home Automation System because of itsinnumerous advantages. Home automation refers to the monitoring and controlling of home appliances remotely. with the never-ending growth of the Internet and its applications, there is much potential and scope for remote access and control and monitoring of such network enabled appliances. This paper deals with discussion of different intelligent home automation systems and technologies from a various features standpoint. The effort targeted on the home automation concept of where the controlling and monitoring operations are expediting through smart devices. Wide-ranging home automation systems and technologies considered in review with central controller based (Arduino or Raspberry pi), cloud-based, Bluetooth-based, SMS based, ZigBee based, mobile-based, RF Module based, web based and the Internet with performance.
Keywords: Home Automation, Intelligence, Microcontroller, Sensor System, User-friendly Interface.
Abstract
A Survey on Intrusion Detection Systems in Mobile Ad-hoc Networks
Sonika H.R, Poornnima B.G
DOI: 10.17148/IJARCCE.2017.63174
Abstract: Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad-hoc network (MANET) and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET.
Keywords: mobile ad-hoc network (MANET), Intrusion Detection System (IDS), malicious, security.
Abstract
Development of Street Lighting System with Vehicular Sensing at Low Light Intensity based on Zigbee Intelligence
D. Sai Krishna, Lalithha Tempelle, Gampa Varun, Goli Sahithya, Gobburu Ravali
DOI: 10.17148/IJARCCE.2017.63175
Abstract: A new method is proposed here for the automation of the street lighting system using the wireless zigbee module. This module provides a perfect scheme for the operation of alternate street lighting systemthat is both automatic and manual. LDR and IR sensor are the backbone of this project. The LDRSensors are used here to detect the day and night andthe sensors to detect any obstacle (vehicle/mobile) passing by and accordingly the lights will be switched on and off.The Graphical User Interface (GUI) is created on MATLAB and can be used to manually operate the lights from the base station. Considerable amount of energy will be saved by the application of this module. The scheme was implemented, and a small scale-working model was developed.
Keywords: LDR, GUI, IR, MATLAB, Zigbee.
Abstract
Responsive Job Scheduling for Map-Reduce in Hadoop Framework
Poonam Mahajan, Manish Patel, Amol Agarwal, Nikhil Raut, Devendra Gadekar
DOI: 10.17148/IJARCCE.2017.63176
Abstract: Hadoop is a framework which is used to store and process large amount of data. Scheduling of Jobs is very much important to achieve high performance in Hadoop cluster. Hadoop scheduler is pluggable module which is used to manage the tasks for executions. Most commonly used schedulers are FIFO, Fair and Capacity scheduler. In this paper we have implemented Responsive Job Scheduler based on locality of Reference, it would add fair and capacity scheduler�s job selection features to our algorithm. Data locality ensures that the map tasks will be executed on the node encompassing the input data. Though the proposed algorithm is designed specifically for map reduce framework and it can be very well implemented in Hadoop environment.
Keywords: Hadoop, MapReduce, Job Scheduler, Responsive Job Scheduling.
Abstract
Open Source Resume
Priya Behlkar, Roshni Gondawale, Bhagyshree Lokare, Snehal Kamble, Prof. A.V. Kanade
DOI: 10.17148/IJARCCE.2017.63177
Abstract: Open source resume is a web-based application to help software development teams to recruit developers based on their open source system contribution activities. This tool provides insights into developers� Practical contributions to open source system projects, which can be useful criteria for judging whether they are suitable for joining the development team based on their different qualifications. To overcome the Empowerment issues many job portals came into existence even though these portals are trying their best we are facing many difficulties to get response from the corporate side, at the same time even corporate human resource people are facing difficulties to find the employee who fits their requirement. Action is needed to overcome these many challenges and make everything easier for the users.
Keywords: Open Source Software; Mining Software Repositories; Developer Expertise; Visualization Tool.
Abstract
Enhancing Distributed Data Storage Security for Cloud Computing using AES algorithm
Vasant S. Kakade, Akshay Kirve, Ankush Bhoir, Sagar Kadam
DOI: 10.17148/IJARCCE.2017.63178
Abstract: Now an afternoon�s cloud computing is used in lots of areas like industry, military schools etc to storing large amount of statistics. We are able to retrieve facts from cloud on request of person. To shop records on cloud we should face many troubles .To offer the answer to those troubles there are n wide variety of ways .Cryptography and steganography techniques are more popular now a day�s for facts safety. Use of a unmarried algorithm isn't effective for high degree safety to data in cloud computing. On this paper we have introduced new security mechanism the usage of symmetric key cryptography set of rules and steganography .in this proposed gadget AES set of rules are used to offer block sensible safety to records. This set of rules key length is 128 bit.. LSB steganography method is introduced for key information security. Key statistics includes which part of file is encrypted the usage of by which set of rules and key .file is splited into 8 parts. Each and each a part of record is encrypted using extraordinary set of rules. All parts of file are encrypted concurrently with the assist of multithreading technique. Records encryption Keys are inserted into cowl photo the use of LSB approach. Stego picture is ship to valid receiver the use of e-mail .For record decryption reason opposite manner of encryption is applied.
Keywords: Privacy Preserving, AES Algorithm, Hash Code, Encryption, Cloud Computing, Integrity.
Abstract
Efficient Design of Low Pass FIR Filter by Hamming, Blackman and Rectangular Window Techniques
Jyoti Kharsan, Shivani Yadav, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.63179
Abstract: Digital filtering plays a significant role in the world of technology. This paper deals with the design of finite impulse response digital filter using window techniques. Here various windows are compared and demonstration of the best window is done, which is the one with minimum side lobes. This is hence the major objective of filtering operation. The experimental results show that the FIR filters designed in this paper are effective for filtering operation. Through this paper the intricacies of the window methods are explained in a simple and a subtle manner.
Keywords: blackman window, hamming window, rectangular window, FIR filter and MATLAB.
Abstract
RTO Automation System using Near Field Communication (NFC)
Prof. Ankit S. Sanghavi, Sagar D. Nikumb, Priyanka P. Bhoir, Sagar D. Pooja
DOI: 10.17148/IJARCCE.2017.63180
Abstract: Road Transport Authority has developed an online service for consumers to complete various procedures like applying for licenses and registrations this information service is known as Regional Transport Office Information System (RTO). RTO information service helps in flow of information within the organization. RTO provides the facility of applying licenses online, issuance of permanent license and tax challans, and receiving payments against challans. The Existing system of RTO services has been is usage for two years. The existing system is not giving accurate results while doing transactions. and It doesn�t provide security, anyone enter into the system and can do their own transactions. It is not flexible in generating reports and many manual processes are made computerized. To overcome problems in the existing System a new RTO services �Road Transport Authority Information System� is proposed after study of system
Keywords: Road Transport Authority, Road Transport Authority System, RTO, NFC.
Abstract
Secure Password with Graphical User Interface
Mr. Pramod Nannaware, Prof. Khwaja Aamer
DOI: 10.17148/IJARCCE.2017.63181
Abstract: In general, all the keypad based authentication system having several possibilities of password guessing by means of shoulder movements. Shoulder-surfing is an attack on password authentication that has traditionally been hard to defeat. This problem has come up with a new solution. Devising a user authentication scheme based on personal identification numbers that is both secure and practically usable is a challenging problem. The greatest difficulty lies with the susceptibility of the entry process to direct observational attacks, such as human shoulder-surfing and camera-based recording. password entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the usability and security aspects of a system. However, if this scheme is to be used in a public system then the scheme may suffer from shoulder surfing attack. In this attack, an unauthorized user can fully or partially observe the login session. Even the activities of the login session can be recorded which the attacker can use it later to get the actual password. In this paper, we propose an intelligent user interface, known as Color Pass to resist the shoulder surfing attack so that any genuine user can enter the session without disclosing the actual password. The Color Pass is based on a partially observable attacker model. The experimental analysis shows that the Color Pass interface is safe and easy to use even for novice users.
Keywords: Shoulder Surfing Attack, User Interface.
Abstract
Magnitude and Phase Response of High Pass FIR filter using Rectangular, Hamming and Bartlett Window Techniques
Durgesh Sahu, Mukesh Chandra, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.63182
Abstract: A Digital Signal Processing is a main branch of electronics. In the digital control system, which is mixed in the input signal, has a great influence on the performance of the system. Therefore, processing of input signal has to be done to get useful signal. It is concerned with the representation by sequence of number or symbol and the processing of these signals. DSP have many more applications which are useful in our life i.e military processing of these signals. DSP have many more radar signal processing, sonar signal processing, navigation, instrument and control spectrum analysis etc. Signal filtering is the main application of DSP. In signal processing, a filter is a device or process that removes some unwanted components or features from a signal. In this we discuss about High Pass FIR filter using Rectangular, Hamming and Bartlett window techniques. By comparative analysis of these window techniques we conclude that Rectangular window technique is better in comparison with them techniques. In this technique the maximum wanted signals are present after cut off frequency.
Keywords: DSP, Digital Filter, FIR filter, Blackman, Rectangular, MATLAB.
Abstract
Network Security Architecture with Active and Dynamic Response Selection
Resmi .A.M , Dr. R. Manickachezian
DOI: 10.17148/IJARCCE.2017.63183
Abstract: In the past decade, several network attacks have become recognized in the field of networking. This situation necessitates serious care and considerations to address its extensive impact. To conquer and defeat the effects of network attacks and vulnerabilities, an appropriate intrusion prevention system, intrusion detection system and an effective dynamic intrusion response system are essential. This paper presents an Intrusion Response System (IRS) framework based on real time implementation parameters. Moreover, this paper investigates the essential response design parameters for IRS to reduce attacks in real time and obtain a robust and effective outcome. Different IRS design parameters are broadly discussed in this paper.
Keywords: Network Intrusion, Intrusion Response System, Alert Correlation, Intrusion Detection System, Content Delivery Networks.
Abstract
Patient Health Management System using E-Health Monitoring Architecture using WSN
Prof. C.G. Thorat, V.R. Salve, P.P. Thorat, K.R. Taru, S.S. Hindole
DOI: 10.17148/IJARCCE.2017.63184
Abstract: Healthcare is the most important concern of many countries in the world. Improving the lives of patients especially in the weaker parts of the society which include the elderly, physically and mentally disabled as well as the chronically ill patients is the major factor to be improved. E-Health systems depending on modern technology play a vital role in eradicating the problems and faster curing of the patients. Also, lot of advancement has been done in order to improve the systems in various terms of size, speed mobility and faster communication in emergency situations. New health monitoring systems have proved to be of great help to the healthcare of the patients. But the major constraint of this system is that patients are supposed to be bed fitted and kept in the smart rooms and are immobile. The proposed system uses mobile devices and wireless sensor networks for real time monitoring and analysis of the patient�s health parameters and in return provide medication. It is easy for doctors and the caregivers to immediately act in emergency cases, and also to provide medication depending on the health parameters without the physical presence of the doctors. The system is such that, remote monitoring of patients can be done by diagnosis of the patients with the help of the environmental and medical sensors. The sensor monitors the health of patients and in real time and the collected data is sent to server. This data is received by the doctors and caregivers through server which is analyzed by the doctors. The server helps to store the data, medical history of the patient for future use. The system architecture is such that the patients can be monitored and treated privately at home. This system also helps in handling multiple patients at a time in the hospitals as well as the public health care units and we can see the analysis in graph on the basis of sensor reading history.
Keywords: IoT, e-Health, m-Health, Body Sensor, Communication Architecture, Continuous assessment.
Abstract
FIR Low Pass Filter Designing using Bartlett Hanning, Blackman Harris and Nuttal Window Techniques
Suman Mahant, Pooja Singh Chandel, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.63185
Abstract: Digital filter plays a significant role in the advanced area of communication system as it provides high attenuation to the unwanted signals and at same time offers very low attenuation to the desired signals.In this paper, Low pass filter is designed using different window techniques namely Bartlett Hanning, Blackman Harris and Nuttal. Design of FIR filter is done in MATLAB by FDATOOL low pass filter is designed with sampling frequency 48000Hz and cut-off frequency 10000Hz magnitude, phase impulse, step response and pole, zero plot. Here the Magnitude and phase response in time and frequency domain ofthese window techniques have been compared using MATLAB simulation.
Keywords: FIR, Digital filter, DSP, Low pass filter, MATLAB, FDATOOL in MATLAB, Bartlett Hanning Window, Blackman Harris Window, Nuttal Window techniques.
Abstract
Inter-Vehicle Communication Using Li-Fi Technology
Muntazir Mohd Tali, Aarti Patil, Sushmita Chavan, Prof. Shailesh Jadhav
DOI: 10.17148/IJARCCE.2017.63186
Abstract: Communication between vehicles, we present the blueprint and outcome of a small-scale mock-up using light fidelity (Li-Fi) technology, a new technology that was founded in the last January 2010 to January 2012, which still needs more organized inquiry on its sustainability for communication between vehicles.Inter-vehicle communication is an effective method with productive results that we have used in order to communicate between two vehicles and maintain safe distance between vehicles to prevent accedents. In Li-Fi technology, for communication between two vehicle data is transmitted using bulb and at receiving end we use photo detector to receive the data. In this technology there is no protocol used so it reduce the complexity. The aim of the paper is to design a module for communication between vehicles and to maintain safe distance between vehicles to prevent accedents.
Keywords: Inter-vehicle communication, Visible Light Communication, Light Emitting Diode, Photodiode.
Abstract
A Review on Automated Disease Diagnosis Techniques
Sunena Rose M V, Dr. Sobhana N. V
DOI: 10.17148/IJARCCE.2017.63187
Abstract: The development of computer technologies and increased expenditure of healthcare are the reasons for innovation of automated disease inference system. Automated disease inference system will give the disease information which a person is facing on the basis of health related questions. Using this system health seeker will get immediate response as compared to the existing system. Diseases and symptoms are collected and used as the Question Answer pairs. In this paper, a survey of different techniques for automatic disease diagnosis is done. In shallow learning methods, which make use of patient details from hospital records with structured fields, they can focus on only a single or a few diseases. The automated scheme can deals with wide range of diseases which posses scalability and generalizability.
Keywords: Support Vector Machine; Neural Network; Deep Learning; Decision Tree Induction.
Abstract
Decoy Technology in Fog Computing
Arwinder Singh, Abhishek Gautam, Hemant Kumar, Er. C.K. Raina
DOI: 10.17148/IJARCCE.2017.63188
Abstract: Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. In this paper, we proposed a system for securing data stored in the cloud using decoy technology. In this we monitor data access in the cloud and detect abnormal data access. When unauthorised access is detected that users, activity will be tracked in log details table. Based on the activities performed by unauthorized user. Admin can have blocked or delete that user. When a new user enters into this System, he has to register first. After successfully registered, that user will get a key through mail. And during login, if the user enters wrong password continuously more than three times, he will get access and his activity will be tracked on log details table in the database. And after this, whatever activities he is doing that also will be tracked in the log table. If he downloads any file, he won�t get original file. Instead of that he will get decoy file. If a user entered correct password and he will get access. If that user wants to download any file, and he entered wrong key more than three times, in first three cases in the action column invalid will be entered and in the fourth case wrong key and that user will get decoy file. In every case, it Now will execute user behaviour algorithm. When a user edit password, he enters wrong key more than three times, then user will get message that password updated successfully. But in actual case it is not updating.
Keywords: FOG computing, Cloud computing, Decoy, Cisco, edge of network, Cloud Security.
Abstract
Security and Sharing of Data through Various Access Levels in Transparent Computing
D. Shireesha, Ayush Goyal, Arun Kumar Jangid, Jitesh Jain
DOI: 10.17148/IJARCCE.2017.63189
Abstract: Transparent computing, the hosts and the users are working on a low-cost high-performance environment but they are placed at distinct places at distinct locations due to which their accessibility decreases. In this paper, we have introduced various levels of accessing the data and sharing them. In these levels, each level will provide a security check to the user and gives restricted access. This proposed system which we were shown is effective in providing security at various levels, providing accessibility to data from anywhere and protecting it from different hazardous attacks.
Keywords: Transparent computing, Authentication, data access, security.
Abstract
Enhanced Security for the Prevention of Man-In-The-Middle Attacks
V. Yadagiri, G. Pranavi Goud, G. Bhargav, K. Komali Reddy
DOI: 10.17148/IJARCCE.2017.63190
Abstract: Man-In-The-Middle (MITM) ambush is one of the majorly recorded assaults in personal computer safety. Man-In-The-Middle aims at a certain info which passes among two end terminals, and privacy and righteousness of the data. We tend to broadly study the writings on Man In The Middle to scrutinize and reach the range of Man-In-The-Middle blitz, taking into account the referral model in the similar way as OSI design and also taking into consideration of two set of widely utilized networking technologies that is the Global System for Mobile and Universal Mobile Telecommunication System.In particular the Man-In-The-Middle assaults can be occurred due to the criteria like location of the sender, receiver and the attacker according to the channel of communication, the type of transmission and the spoofing techniques and provide implementation for the all possible Man-In-The-Middle groups. We draw the resemblance by understanding the pros and cons of the existing methods which prevent attacks. Eventually, according to our analysis we provide a system which gives the secured information and reduced attacks.
Keywords: Man-In-The-Middle (MITM) attack, GSM, UMTS, OSI model.
Abstract
Techniques for Improving Performance of OFDM System for Wireless Communication
Mr. Umesha G B, Prof. M. N. Shanmukha Swamy
DOI: 10.17148/IJARCCE.2017.63191
Abstract: Orthogonal frequency division multiplexing (OFDM) is a special case of multicarrier transmission which transmits a stream of data over a number of lower data rate subcarriers. OFDM splits the total transmission bandwidth into a number of orthogonal and non-overlapping subcarriers and transmit the collection of bits called symbols in parallel using these subcarriers. This works gives a total insight of various Peak -to Average Power Reduction (PAPR) techniques and principles of OFDM systems used in wireless communications. The research work places a focus also on OFDM behaviors and techniques like Carrier Frequency Offset (CFO) estimation that improves performance of OFDM for wireless communications. Finally, this work provides a number of wireless communication standards and many of the applications where OFDM systems are used.
Keywords: OFDM, Peak-to-Average Power Reduction (PAPR), Inter-Carrier Interference (ICI), Channel estimation, Cyclic Prefix, Bit Error Ratio (BER).
Abstract
Real Time Monitoring of Water by use of Internet of Things
Rutwik Choughule, Shubham Jangam, Chinmay Chiplunkar, Omkar Kulkarni, Bharat Mazire, Pranav Karkar, Shriya Jadhav
DOI: 10.17148/IJARCCE.2017.63192
Abstract: In recent years, because of the faster advancement in the computer technology like IOT, it's easy to prepare a smarter, reliable and cost effective model in developing countries to handle one of basic need �water�. The basic idea of the project is to determine the quality of water by measuring the contamination with the help of sensors, then transferring the sensed data to cloud where decision making is done and the final results will be intimated on the mobile device. IoT proves to be beneficial by providing real-time monitoring. The technology uses MQTT protocol for sending data from Arduino board to any distantly located server, broker application or cloud and receives data from same to any mobile application or web application.
Keywords: Internet of Things, Water management, Potential of Hydrogen.
Abstract
“IOT based Home Automation and Security System”
Prof. Sagar Rajebhosale, Mr. Avinash Sonawane, Mr. Sunmitra Pawar, Mr. Vijay Kadam, Mr. Ashish Waghela
DOI: 10.17148/IJARCCE.2017.63193
Abstract: With the rising power of innovation, we can finish things at a substantially faster rate. We have at the touch of a button access to large amounts of information due to the capability of computers and the Internet. Not only technology has given us more information, but also has given us the ability to communicate, organize, and manage our time. Smartphones are handheld faster processing devices that are becoming more popular as the means by which everyone manages personal information, accesses and enters corporate data, and mines the richness of the web. The aim of this paper is to design the secure Home automation system which is accessed from global position. In this proposed system raspberry pi is used as gateway between web dashboard and actual system devices as well as sensors. For faster communication point of view in this system MQTT protocol is used which access the sensors data and devices from anywhere in the world. Sensors and devices are communicating to the raspberry pi through the wired connection.
Keywords: MQTT, Raspberry pi, COAP, IOT, Home Automation.
Abstract
Comparision of BER’s of QAM and PSK Modulation Techniques for Channel Estimation by using LS Estimator in MIMO-OFDM System
Diksha Chauhan, Vivek Kanwar
DOI: 10.17148/IJARCCE.2017.63194
Abstract: This paper gives the comparison of the Bit error rates of modulation techniques like QAM and PSK for their different order of modulations (M) and for different values of subcarriers (N) by using LS channelestimator. Comparison of bit error rates of various modulation schemes is done to find out the best suited modulation technique for transmitting N no. of subcarriers. LS estimator is a technique used for channel estimation in MIMO-OFDM system. Channel estimation is done at the receiver for compensating the effect of distortions which are created by the channel. LS channel estimator comes under the block type channel estimation technique.
Keywords: channel estimation; modulation schemes; MIMO; OFDM; MIMO-OFDM; LS estimator; QAM; PSK.
Abstract
Student Performance Prediction System using Data Mining Approach
Kalpesh P. Chaudhari, Riya A. Sharma, Shreya S. Jha, Rajeshwari J. Bari
DOI: 10.17148/IJARCCE.2017.63195
Abstract: The success of an academic institution can be measured in terms of quality of education provides to its students. In the education system, highest level of quality is achieved by exploring the data relating to redirection about students performance. These days the lack of existing system to analyse and judge the students performance and progress isn�t being addressed. There are 2 reasons why this is often happening. First, the present system is not accurate to predict students� performance. Second, because of shortage of consideration of some vital factor those are affecting students� performance. Predicting students� performance is more challenging task as a result of large amount of information in academic database. This proposed system can help to predict students� performance more accurately. For these suitable data mining approach will be applied. In this approach, preprocessing step will be applied to raw dataset so that the mining algorithm will be applied properly. The prediction about students� performance can help him/her to enhance the performance.
Keywords: Education, student, performance, data mining, pre-processing, database, prediction.
Abstract
Gym Monitoring Framework for Fitness Management System
Mr Akshay Sambare, Dipali Bondre, Sachin Thorat, Miss Archana Vishe, Prof. Ankit Sanghavi
DOI: 10.17148/IJARCCE.2017.63196
Abstract: Usually, the client uses MS Excel or paper, and maintains their records, however it is not possible for them to share the data from multiple system in multi user environment, there is lot of duplicate work, and chance of mishap. Every Excel file need to be updated once records are been changed The Fitness Freak System rejects most of the disadvantages of the existing software. Increasing efficiency and effectiveness, automation, accuracy, user-friendly interface, information availability, communication capacity, maintenance, cost deduction makes our system smarter than the existing system. We intermingle some new and blatant features along with all the necessary features. Some of them are user login, platform independent, etc...
Keywords: Gym Monitoring Framework, Fitness Management System, login, platform independent, MS Excel.
Abstract
Honeypot: A Trap for Attackers
Savita Paliwal
DOI: 10.17148/IJARCCE.2017.63197
Abstract: This paper introduces Honeypot, a new technology for Network Security. The paper deals with the basic aspects of Honeypots, their use in modern computer networks and their implementation in educational environments. It explains the different types i.e Production honeypot, Research honeypot, low level interaction honeypot, medium level interaction honeypot, high level interaction honeypot and functions of honeypots. The advantages & disadvantages related to honeypot are discussed further. Probable future work in the area of honeypot is discussed which includes enhancement in framework of honeypot.
Keywords: Honeypot, Honeynet, Honeyd, IDS (Intrusion detection system), Network security.
Abstract
Health Assessment using Raspberry Pi
Ann Maria Sunny, Ann Paul, Ann Susan Jose, Cuckoo Anitha Joseph, Anu Rani Philip
DOI: 10.17148/IJARCCE.2017.63198
Abstract: Health assessment using Raspberry Pi is a continuous monitoring system at home for assessing early health changes to address the management of chronic conditions as people age. Sensors embedded in the body and environment capture various parameters of health. Changes in those parameters are detected as potential signs of changing health. If changes are detected, an alert message will be sent. Activities will be investigated using in-home sensors both day and night to ensure security. The sensor data will be then sent to mobile devices through the Internet. Also a continuous monitoring can be done through the webpage.
Keywords: sensors, data, monitor, webpage.
Abstract
Neoteric Study on Big Data
Ishani Wadhwana, Manisha Valera
DOI: 10.17148/IJARCCE.2017.63199
Abstract: The term Big Data has been coined to refer to the gargantuan bulk of data that cannot be dealt with traditional data-handling techniques. Big data is new archetype that has been discovered in past years. We have reached in era of interconnectivity among different organization to predict and make decisions in time changing environments. Big Data is the term for any gathering of datasets so vast and complex that it gets to be distinctly troublesome to process using traditional data processing techniques. The challenges include capture, storage, analysis, data curation, search, transfer, visualization, quering, updating and information privacy. The trend to larger data sets is due to the additional information derivable from analysis of a single large set of related data, as compared to separate smaller sets with the same total amount of data. Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, select, manage, and process data within time.
Keywords: BIG DATA, 3V�s, HDFS, MAP REDUCE, HIVE, PIG, HBASE.
Abstract
A Survey on Basics of Cryptography
Vaibhav V. Bhujade, Deepak Chaudhary, Suraj V. Raut
DOI: 10.17148/IJARCCE.2017.63200
Abstract: Cryptography is one of the important and useful technique in which usually a particular file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data or file transmission between original sender and receiver. In this transmission file of unreadable format is send, after receiving this file receiver used the similar algorithm technique and private key for getting the original file data. In this procedure various algorithms are used as a processing function and depending on that algorithm we used the private key. The power or strength of any algorithm is depending on the secret key used in sender client and receiver side client.
Keywords: Cryptography, authentication, Integrity, Confidentiality.
Abstract
IoT Based Wearable Device for Enhancing Holistic Students Evolution
Mr. J. Dani Reagan Vivek, S. Lakshmanan, S. Karthik
DOI: 10.17148/IJARCCE.2017.63201
Abstract: Holistic education is a philosophy of education, based on the premise that each person finds identity, meaning, and purpose in life through connections to the community. The major aim of our proposal is to introduce the IoT concept in schooling, for enhancing the performance metrics of young wards, as well as making the learning process enthusiastic and amusing. At the same time, it promises to reduce the burden of a tutor, by ensuring that the performance acquisition & analysis of students is automated, by means of IoT based wearable devices. The tutor will be provided with the ease of identifying a child, who finds difficulty in the learning process and steps regarding knowledge improvement can be taken. It aims to nurture the self confidence in young learners, who have not responded well to the traditional methodology. The children will be entrusted with the art of learning a foreign language, with the help of IoT enabled objects and devices, through the task-based learning approach.
Keywords: IoT, RFID tags, Task based learning, Wearable device.
Abstract
A Review on Soft Errors and Different Fault Tolerance Techniques
Jyoti Maruti Gadekar, Prof. (Dr.) Prakash H. Patil
DOI: 10.17148/IJARCCE.2017.63202
Abstract: With fabrication technology reaching nanolevels, systems are becoming more prone to manufacturing defects with higher susceptibility to soft errors. Soft errors caused by particles strike in combinational parts of digital circuits are a major concern in the design of reliable circuits. Several techniques have been presented to protect combinational logic and reduce the overall circuit Soft Error Rate (SER). Such techniques, however, typically come at the cost of significant area and performance overheads. A comprehensive review on the soft error generation and different fault tolerance techniques used, are presented in this study. After the overall concepts and general ideas are presented, representative works as well as new progress in the techniques are covered and discussed in detail.
Keywords: Fault tolerance, Soft errors, Single event upset, Single event transient, Soft error tolerance.
Abstract
Solar Cell Crack Identification using Internet of Things (IoT)
L. Nagalakshmi, K.S. Abdul Karimullah Ansari, Gowtham.N, Janagi Raman.P
DOI: 10.17148/IJARCCE.2017.63203
Abstract: The main aim of this project is to propose an automated inspection technique of solar cell panel to detect cracks and monitor its output round the clock. This monitoring is done from anywhere and anytime with the help of Internet of Things (IoT). From the manufacturer's point of view, the inspection of the solar cell panel is essentially performed to obtain a high quality product. The power generated by the cells can be simultaneously calculated, as the current value is updated periodically to the control room and/or to the mobile monitoring app via internet. When there is a drop in the current and voltage values of the solar panel, a notification is received in the developed application. Further a mail is being sent to the configured mail IDs regarding the parameters of the solar panel which in turn will help us to detect the damaged/cracked solar panel. The monitoring is carried out using current sensors which senses current of the individual solar panels and with a help of microcontroller, raspberry Pi 3 and Relay driver it is taken to the load. Raspberry Pi 3 interfaces with mobile application using Wi-Fi technology and updates the status of the solar panel to the users all around the world.
Keywords: Solar Cell, Internet of Things (IoT), Crack Identification, Mobile Application, Inspection Technique and Current Sensors.
Abstract
Enhanced Data Security with Magic Rectangle and Genetic Algorithm
Monali G. Pawar, Minal S. Chaudhari, Ankita K. Wani and Dhiraj S. Mahajan
DOI: 10.17148/IJARCCE.2017.63204
Abstract: For many years, people were concerned with the secure transmission of data. The encryption is used to securely communicate data in open network. As each type of data has its own structure, different techniques should be used to protect confidential data. The existing algorithms used for encryption in cryptography have some flaws such as data easily retrieved using ASCII values for numerical representation. The proposed system combines cryptographic algorithm with steganography to protect data or message over network thereby enhancing the data security.
Keywords: Security, Cryptography, Steganography, Magic Rectangle, Genetic Algorithm.
Abstract
Data Deduplication and Load Balancing Techniques on Cloud Systems
Prof M.S. Pokale, Surabhi Dhok, Vaishnavi Kasbe, Gauri Joshi, Noopur Shinde
DOI: 10.17148/IJARCCE.2017.63205
Abstract: Cloud storage systems are able to provide low-cost and convenient network storage service for users, which makes them more and more popular. However, the storage pressure on cloud storage system caused by the explosive growth of data is growing by the day, especially a vast amount of data waste plenty of storage space. Data deduplication can effectively reduce the size of data by eliminating redundant data in storage systems. However, current researches on data deduplication, which mainly focus on the static scenes such as the backup and archive systems, are not suitable for cloud storage system due to the dynamic nature of data. In this paper, we propose the architecture of deduplication system for cloud storage environment and give the process of avoiding duplication at the file-level and chunk-level on the client side. In the storage nodes (Snodes), DelayDedupe, a delayed target deduplication scheme based on the chunk-level deduplication and the access frequency of chunks, are proposed to reduce the response time. Combined with replica management, this method determines whether new duplicated chunks for data modification are hot and removes the hot duplicated chucks when they aren?t hot. The experiment results demonstrate that the DelayDedupe mechanism can effectively reduce the response time and achieve the storage load of Snodes more balanced.
Keywords: Cloud storage, deduplication, DelayDedupe, replica, chunk, load balancing.
Abstract
GPS based Location Services and Analysis of Transit Data using Data Mining
Prof A.G. Dongre, Ankita Kadale, Snehal Khavle, Ajinkya Dalvi
DOI: 10.17148/IJARCCE.2017.63206
Abstract: To reduce the wait times and uncertainties of citizens travelling through public transportation system such as bus. To give better services by providing real time bus location as well as passenger count to the user and analysis of transit service performance using classification. In this fast life, everyone is in hurry to reach their destinations. In this case waiting for the buses is not reliable. People who rely on the public transport their major concern is to know the real time location of the bus for which they are waiting for and the time it will take to reach their bus stop. This information helps people in making better travelling decisions. This project provides the user with a user friendly GUI wherein he/she can get information about the real time location of the bus and also availability of bus for a particular route along with passenger count inside the bus. The real time location of the bus is tracked using GPS system of an android phone and the passenger count is obtained using IR Sensors which is fitted inside the bus at the front and rear doors. The data from this transit system can be analysed to discover patterns and useful information .Problem faced by the public transport organizations can be solved by using data mining technique. Service performance analysis based on historical data will help organizations to improve their functioning and efficiency. The analysis of gathered data, would help organizations to predict rush on particular routes and handle the same. This may also help redesign and improve the existing transportation policies.
Keywords: GPS; location tracking; real time location; android; smart phone; IR Sensor; classification Knn; data mining.
Abstract
Survey on Recommending Learning Path of Student using Machine Learning
Priti B. Jadhav, Dr. R. B. Ingle
DOI: 10.17148/IJARCCE.2017.63207
Abstract: Many times student do not understand what is the field they are good at, what is the area they can improve to be better in. This paper introduce the adaptive questionnaire strategies, which changes the question based on student previous answer. This can help student to find out the depth of knowledge they have in that subject. Some of them are to check the students learning style. In that which student work better in what kind of courses. This paper gives idea about the different methods to set the questionnaire and the different classification algorithm to help us to understand the nature of the student like for what course they are suitable or they can find their correct career path with different classes the paper gives the techniques to make the classification of the students.
Keywords: Business Intelligence, Data Mining, Machine Learning, Web Application.
Abstract
Security in Cloud Computing and Different Algorithms for Load Balancing
Anitha R, Dr C Vidyaraj
DOI: 10.17148/IJARCCE.2017.63208
Abstract: Cloud computing opens up a new era in Information Technology, in order to reduce the enormous investments of the customers in their own infrastructure, it provides various IT services such as pay-as you-go flexibly and and is also scalable where the customers can use the same. In this philosophy, cloud storage service users do not need to physically and directly control the data. Data security relates to an important use of the cloud. Existing research work has shown enabling data integrity to be checked without the actual data file. When the scan is from a trusted third party, this verification process is also known as the data auditing, and the third part which does this is known as auditor. Our work gives a brief description over how cloud works, how the data in the cloud is accessed, and the process of load balancing in cloud computing. Load balancing is an important aspect of cloud computing environment. Efficient charge balancing scheme ensures the efficient use of resources and the supply of cloud resources to the users on-demand based on the payment. Load balancing can even support the prioritization of the user through the proper implementation of the scheduling criteria.
Keywords: IP networks, Hop by hop, optimal routing, adaptive routing, link state.
Abstract
Efficient Design of LOE Pass FIR Filter by Hamming, Kaiser and Blackman Window Techniques
Yogesh Chandrosha, Nirmala Maheshwari, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.63209
Abstract: Digital filtering plays a significant role in the world of technology. This paper deals with the design of finite impulse response digital filter using window techniques. Here various windows are compared and demonstration of the best window is done, which is the one with minimum side lobes. This paper presents the importance of filter in signal processing. Digital filter are two type 1. FIR and 2. IIR. These are various methods for filter designing. This paper discuss the window method low pass fir filter designing Hamming, Kaiser and Blackman window function methods are presented. Design of FIR filter is done in MATLAB by FDATOOL low pass filter is designed with sampling frequency 48000Hz and cut-off frequency 10000Hz magnitude, phase impulse, step response and pole, zero plot. We found that filter designing by window method is easy and fast.
Keywords: FIR, Digital filter, DSP, low pass filter, window function, MATLAB, FDATOOL in MATLAB, Hamming window, Kaiser Window and Blackman Window techniques.
Abstract
Educational Enquiry Desk
Nikhil Jadhav, Pravin Jadhav, Ashish Jagtap, K.K. Tripathi
DOI: 10.17148/IJARCCE.2017.63210
Abstract: Changes in Information Technology (IT) allows schools to utilize database and application such as student information system (SIS) thus, making the accessing of records. One of the changes that came about is this system is a web application which provides answer to the query of student. Students just have to query through the bot which used for chatting. The proposed system is a web application to manage student�s details and keeping them updated about latest events in college. The application will be used by teachers, students and parents. The utilities provided by the applications are- the user can query any college related activities through the system. The user does not have to personally go to the college for enquiry. The system analyzes the question and then answers to user. The user just has to register himself to the system and has to login to the system . After login user can access to the various helping pages. This system helps the student to be updated about the college activities.
Keywords: utilize databases, chat bot, analyzes the question, login the system.
Abstract
Protein-Protein Interaction Interface Database Development based on Protein Network
Mr. Kamlesh K. Gautam
DOI: 10.17148/IJARCCE.2017.63211
Abstract: Protein-Protein interaction interface database (PPIIDB) is developing on the basis of cellular and biological processes of protein-protein interaction interfaces of protein network. PPIIDB is collection of dataset of PPII of Breast cancer of Homosapience which developed on the basis of various parameters such as such as Accessible Surface Area (ASA), Buried Surface Area (BSA), Binding energy (?G), Cluster Coefficient (CC), Connectivity, Degree of node or Degree of network, Euclidean Distance between interacted proteins, Network Interaction Modularity (Im), size of interface or Voronoi Interface Area (VIA), Significant Connected Component (SCC), Scoring Function, Combine Association Score (CAS), Surface shell (No of Surface Shell Residue, Surface Shell Area),interface face (no. of Interface Residue, Interface Area), Interior core (No of Interior Residue, Interior Area), Resolution, length etc.
Keywords: ppiidb, ppiidatabase, ppii, Protein-Protein Interaction, ppiidbpn, Protein Interface.
Abstract
Modelling of Hybrid Wind and Solar System Using Multi Stage Convertors with the Help of MATLAB SIMULINK
Neha R. Khanzode, Sachin Gour
DOI: 10.17148/IJARCCE.2017.63212
Abstract: The aim of this study is to introduce the local PV-wind hybrid system�s working principle by reviewing one case where the system is connected to the grid. The thermal power stations are causing pollution which severely affects mankind and nature. These power stations result in causing many diseases. Also natural resources like coal, oil,radio-active materials etc will get extinct in near future. The other existing power generating systems like Hydro-Electricity power generating plant cannot afford much power as it is season based, although it causes less pollution. Therefore, it is of great urgency to go for non conventional energy resources. In recent years, environmental friendly technological solutions are becoming more prominent as a result of concern over the state of our deteriorating planet. The main purpose of this hybrid wind-solar energy system is to meet our daily demand effectively and to get an uninterrupted power supply from any one of the natural source either wind or solar or both. The hybrid model is designed using Cuk-SEPIC fused convertors and the performances are analyzed. Due to the inherent nature of this Cuk-SEPIC fused convertors, we get optimum efficiency Simulation results are given to highlight the merits of the proposed circuit. To ful fill the challenging demands of the growing grid, new concepts of the inverters are needed. Inthis project a reduced switch modular inverter design is detailed. A modular inverter design is presented for a modern power system which inputs power from both AC andDC Renewable Sources.
Keywords: Hybrid System, multi winding transformer, cuk-sepic convertors, modular inverter; MATLAB/SIMULINK.
Abstract
IoT Based Ticket Checking System
Kirti Dhiman, Er. CK Raina
DOI: 10.17148/IJARCCE.2017.63213
Abstract: Internet of things. The term Internet of Things was used by Kevin Ashton in 1999. IOT is like a vehicle used to as a �Smart Devices� and other items like Electronics, softwares.IOT words was Invented from a two words �Internet �and �Things�. Internet is a vast network. The Internet is the global system of interconnected computer networks that use the protocol to link devices. Internet is used in daily life to communicate, search information etc. things means important information or devices. In recent days a population is gained day by a day and smart cities have gained popularity. In this paper we present a �IOT BASED TICKET CHECKING SYSTEM�. This system is consist of an IOT module that is used to check the tickets of passenger in trains. This system describes the whole architecture of a train system.
Keywords: IOT, Passengers, Smart cities, Smart transport, Ticket checking, passengers, safety.
Abstract
Cyber Crime and Its Preventive Measures
Manpreet Kaur, Gurinder Kaur, Er. C.K. Raina
DOI: 10.17148/IJARCCE.2017.63214
Abstract: Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we define different types of cybercrime and review previous research and current status of fighting cybercrime in different countries that rely on legal, organizational, and technological approaches. We focus on a case study of fighting cybercrime in India and discuss problems faced. Finally, we propose several recommendations to advance the work of fighting cybercrime.
Keywords: Cyber Crime, Cyber Security, Hacking, Phishing.
Abstract
Controlling of a Toy Car using an Android Device (Motor Droid)
Abhi Vora, Vaibhav Chincholkar, Omkar Lad, Ms. Avani Sakhapara
DOI: 10.17148/IJARCCE.2017.63215
Abstract: The need for Unmanned Vehicles like drones and automatic driven cars is growing at an exponential rate. UAVs and other radio transmitted devices are used in battlefields and in the entertainment sector. In this paper we discuss building a cost effective system in which a user can remotely operate a toy car with the help of a Live Video Feed. The paper will also cover various modules on how the project was built and its Applications in the real world.
Keywords: Android, Arduino, Collision, Remote Control Car, Live-Video.
Abstract
Data Security Using Cramer – Shoup Algorithm in Cloud Computing
Deepak Jain
DOI: 10.17148/IJARCCE.2017.63216
Abstract: Cloud computing is an rising technology that has become today�s blistering analysis space as a result of the advancement of inflated property and it's most attention-grabbing and magnetized technology that offers the on demand services to the users over the web. Since Cloud Computing stores the user knowledge and permits the user to figure on the cloud system so the protection has become the most concern that creates threat and tries to deploy the Cloud environments. Even supposing the Cloud Computing is economical, there area unit several challenges for knowledge security, which can deduct the users from mistreatment the cloud computing. To confirm the protection of knowledge, we have a tendency to planned a technique of RSA rule and Cramer � Shoup cryptosystem.
Keywords: Cloud Security; RSA; Cramer; Shoup; Cryptosystem.
Abstract
Public Opinion Mining on Social Media
Reema D, J Nagesh Babu
DOI: 10.17148/IJARCCE.2017.63217
Abstract: Social media, including micro-blogs such as Twitter, have become main channels to communicate and share public social opinion among people. The opinion on nuclear power is an important social issue because nuclear plant construction needs national consensus. This paper proposes an opinion mining approach to monitor public sentiments on nuclear related issues using tweets on Twitter. The proposed process consists on (1) Crawling related tweets (2) Text preparation (3) Sentiment dictionary construction, and (4) Sentimental scoring. Based on experiment using nuclear related tweets in Korean between 2009 and 2013, we verify the usefulness on the proposed approach and confirm the changes on national opinion on nuclear generation depending on critical events such as Fukushima Daiichi nuclear disaster.
Keywords: public opinion mining, sentiment analysis, nuclear power.
Abstract
Visual Cryptography for Authentication and File Sharing using different techniques in Web Portals
Pankaj Sonune, Sourav Sengupta, Shikhar Srivastava, Tushar Sonawane
DOI: 10.17148/IJARCCE.2017.63218
Abstract: For security purposes every application provides user authentication. In user authentication the process which we have to pass through is username and password. Authentication process divided into Token based authentication, Biometric based authentication and Knowledge based authentication. Most of the web application provides knowledge based authentication which include alphanumeric password as well as graphical password. In today�s changing world when we are having number of networks and personal accounts some sort of easy authentication scheme needs to be provided. In this we provide the image based authentication that can do login. Password image is generated and it will be downloaded from the email which is stored at the time of registration. Every time the image will be unique. In this system the OTP based authentication is also used. In this system the data file that will be transferred within this web portal will be embedded using image as key into the video file and sender sends this file to the receiver and the receiver extracts the data file by using the image as a key.
Keywords: Visual Cryptography, Encryption/Decryption, Steganography, DCT, K-N Algorithm, Watermarking, AES Algorithm.
Abstract
XML as Import and Export of Data
Binjal Gohil, Tejal Chavan, Vedant Kulkarni, Sudarshan Kumar
DOI: 10.17148/IJARCCE.2017.63219
Abstract: This paper presents the survey of XML technology in data integration, import, and export of data. In this paper, we study the XML technologies and design a new data integration structure for data import and export. This study shows that it has a great effect on improving the efficiency in importing and exporting the data from one system to another.
Keywords: Data integration, data import, and export, file transfer, performance factors.
Abstract
Ad_Hoc on Demand Distance Vector Routing using MANET
Shadab Ahmed
DOI: 10.17148/IJARCCE.2017.63220
Abstract: Load balancing is a crucial problem in mobile ad hoc networks. Many conventional routing protocols that are developed are not having functionality of coping up load balancing. Hence several kinds of approaches are followed in the design and development of load balancing routing protocols. This paper aims to survey research articles pertaining to load balancing research problem in mobile ad hoc networks. An ad_hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. In this paper we present Ad_hoc On Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad_hoc networks. Each Mobile Host operates as a specialized router and routes are obtained as needed on demand with little or no reliance on periodic advertisements. AODV provides loop free routes even while repairing broken links. Because the protocol does not require global periodic routing advertisements, the demand on the overall bandwidth available to the mobile nodes is substantially less than in those protocols that do necessitate such advertisements.
Keywords: Demand Distance Vector Routing (AODV), MANET, peer-to-peer, topology, Mobile Ad Hoc Networking.
Abstract
Improved Entropy and Key Point Feature Extractor for Effective Multimedia Information Retrieval
Santhosh J, Shafna M
DOI: 10.17148/IJARCCE.2017.63221
Abstract: Information retrieval became very imperative task in current scenario, everyone have huge volume of data in the distributed environment, and retrieving those contents need extra care and attention. In this paper, a new semi-supervised lexicon based optimized information retrieval methods are proposed. Unlike the existing classification method, the proposed system decreases the need of training process and improves the information retrieval efficiency. In this proposal, the semi-supervised bag of words representation is used for information retrieval. The improved entropy and lexicon method effectively performs information retrieval process on different type of text, image and video datasets. This drastically reduces the training time and information retrieval time in the huge dataset environment. The implementation and experiments used multi-class image, video datasets and text datasets with lexicon entropy. the system significantly improve average precision, accuracy and storage efficiency by deploying high configured information retrieval method.
Keywords: Information retrieval, CBIR, classification, Web extraction, Image dataset, Dictionary Learning, Entropy Optimization, Image Retrieval, Time-series Retrieval.
Abstract
Green Computing using Multi label classification for Mobile Medical Recommendation
T Sivakumar, Basheer P, Mubeena V
DOI: 10.17148/IJARCCE.2017.63222
Abstract: Communication technology plays a major role for sharing the knowledge with the support of customer friendly service. Customer friendly technology like cellular helps to exchange the knowledge between people. However, such services require more computing resources and energy. For energy consumption green computing were used to balance the problem. Henceforth development of green and energy-ef?cient in cellular application has become an important topic in communication technology. For this analyses this paper propose a multi label classification methods for medical recommendation system through mobile application. Using multi label classification method we labelled it on doctor recommendation system and this improve to provide needed data to the user.
Keywords: Green computing, Data mining, Classification and Medical recommendation.
Abstract
Worm Detection in Cloud Based Systems by a Systematic Analysis
Mr. Mahesh Nelapati, Dr. Yamarthi Narasimha Rao
DOI: 10.17148/IJARCCE.2017.63223
No abstract available.
Abstract
IoT Based Electric Energy Meter
Pratik P. Bakshi, Akshay S. Patil, Akshay S. Gavali, Prof. Vibha U. Patel
DOI: 10.17148/IJARCCE.2017.63224
Abstract: This research is to design an automated electric meter reading and billing system. It will replace human working system for taking reading. It will be helpful in knowing the daily electricity usage. The proposed system design eliminates the human involvement in Electricity maintenance. The Buyer needs to pay for the usage of electricity on schedule, in case that he couldn�t pay, the electricity transmission can be turned off autonomously from the distant server. The user can monitor the energy consumption in units from a web page by providing device IP address [1].
Keywords: Energy Meter, Microcontroller, Optocoupler, Wi-fi Module, Meter Reading, Consumer, LED Blinking, Server, Web page.
Abstract
Condition Monitoring of Back to Back HVDC Transmission System using Artificial Neural Network
Disharika Badgotiya, Dr. Pragya Nema
DOI: 10.17148/IJARCCE.2017.63225
Abstract: Fault detection process is much more complex in HVDC systems as many circuits and accessories are involved in this system which is much than HVAC systems. Here an attempt is made to monitor the condition of whole HVDC system. The HVDC system not only involves converter and inverter but have other parts too which are; grid systems, firing circuits, filters, sensing units, protections system and transmission lines. The condition monitoring involve overall present situations of entire system which ultimately ease the operation and maintenance of system and prevent unpredicted breakdowns. The proposed work is a condition monitoring system for back to back HVDC system using artificial neural network.
Keywords: Artificial Neural Network, Faults, HVDC System, Training.
Abstract
Improving Security using Honeyword for Online Banking Authentication System
Akshata Chor, Ashwini Gawali, Ashwini Mohite, Madhuri Tanpure, Prof. P. B. Sahane, Prof. P. B. Thorat
DOI: 10.17148/IJARCCE.2017.63226
Abstract: In existing banking system, the only way to get access to the bank account is through the OTP which is not the secure way. If any unauthorized person stole your mobile and if that person guesses the password from user details then that person will get the access to the bank account easily. In propose system we are going to create and store honeywords in the honeypot, Honeywords are generate from the user details. Because of doing this if any unauthorized person will try to guess the password and if that guess password match with the honeypots words then alert for the legal user will generated and only login fail message will shows to that user. In this project we will use Honeyword Generation algorithm to achieve above goal.
Keywords: honeywords; honeypot; DoS attack; brute force attack; authentication.
Abstract
Plagiarism Tool
Mangesh Chandane, Medha Sarang, Sudarshan Borade, Amol Dhamale
DOI: 10.17148/IJARCCE.2017.63227
Abstract: Plagiarism is a growing problem in academia. Academics always use plagiarism detection tools to find similar source-code files. Once similar files are detected, the academic investigates the process which involves identifying the similar source-code fragments within them. These source code fragments could be used as evidence for proving plagiarism. The tool implements a new approach for investigating the similarity between source-code files with a view to gathering evidence for proving plagiarism. Graphical evidence is presented that allows for the investigation of source-code fragments with regards to their contribution toward evidence for proving plagiarism. The graphical evidence indicates the relative importance of the given source-code fragments across files in a corpus. This is done by using the Latent Semantic Analysis information retrieval technique to detect how important they are within the specific files under investigation in relation to other files in the corpus.
Keywords: Java Corpus, LSA, Cosine similarity.
Abstract
Accident Detection using Hardware
Prof. J.B. Kulkarni, Khushboo Raisinghani, Poorva Chaturvedi, Pranshu Sanchania, Vartika Jharwal
DOI: 10.17148/IJARCCE.2017.63228
Abstract: Accident detection systems help to reduce fatalities stemming from car accident by decreasing the response time of emergency responders. The symbiosis between communication technologies and vehicles offers opportunity to improve assistance to people injured in traffic accidents, by providing information about the accident to reduce the response time of emergency assistance services. The proposed design of the application can detect accidents, pin-point the location of accident and initiate emergency communications automatically. The use of this application can significantly shorten the time taken for determination of the accident site and warning the concerned authorities. A hardware kit is used to detect the accident, get the GPS location that consists of accelerometer, Node MCU and GPS receiver. And the information about the accident location is sent to the hospitals and the relatives of the user. The message is sent through Firebase Cloud Messaging (FCM).
Keywords: Firebase cloud messaging, GPS, Node MCU.
Abstract
Secure, Reliable and Load Balanced Routing Protocols for Multihop Wireless Networks
Mitali V. Patil, Prof. Vaishali Jadhav
DOI: 10.17148/IJARCCE.2017.63229
Abstract: In multihop wireless networks, route stability is very challenging task and major research problem. The routes in this network are frequently breaks presence of malicious nodes, faulty nodes, or due to lack of energy of intermediate nodes. Hence there should be the hybrid approach in which route stability should be achieved by considering all the causes of frequent routes failure. In this paper, the novel secure and load balanced E-STAR (LBE-STAR) for HMWNs. LBE-STAR E-STAR trust method and payment systems with a trust-based and energy-aware routing protocol along with load balancing algorithm. LBE-STAR is based on existing E-STAR routing protocol with contribution of efficient load balancing functionality. The payment system based on rewards and changes in which nodes that relay others� packets are rewarded and charge those that send packets. The trust system evaluates the nodes� reliability and competence in relaying packets in terms of multi-dimensional trust values. The load balancing is achieved by using disjoint path communication approach. In this paper, two variants of LBE-STAR algorithm proposed such as LB-SRR (shortest reliable route) and LB-BAR (Best Available Route). Overall objective of designing the LBE-STAR routing protocol is to achieve the security, reliability and load balancing in multihop wireless networks.
Keywords: Securing heterogeneous multihop wireless networks, packet dropping and sel?shness attacks, trust systems, load balanced and secure routing protocols.
Abstract
Data Mining for Big Data
Rashmi Reddy.M, Kavitha Juliet
DOI: 10.17148/IJARCCE.2017.63230
Abstract: Big data is the term for a collection of data sets which are large and complex, it contain structured and unstructured both type of data. Data comes from everywhere, sensors used to gather climate information, posts to social media sites, digital pictures and videos etc This data is known as big data. Useful data can be extracted from this big data with the help of data mining. Data mining is a technique for discovering interesting patterns as well as descriptive, understandable models from large scale data. In this paper we overviewed types of big data and challenges in big data for future.
Keywords: Data mining, Big data, interesting patterns, large scale data.
Abstract
A Secure Online Based Friend Recommendation System for Social Network
Priyanka Uchekar, Kirtee Gawade, Arati Dhumal, Rina Sandbhor, Prof .S.D Kadam, Prof .P.B.Sahane
DOI: 10.17148/IJARCCE.2017.63231
Abstract: In this paper, we have presented aThe modern Activity based friend recommendationservices. Social networking sites imply friend recommendation Systems in contribution to providing better user experiences. Online friend recommendation is a rapid developing topic in web mining. Current social networking servicing recommend friends to users based on their social graphs and mutual friends , which may not be the most appropriate to reflect a user�s taste on friend selection in real lifetime . In this paper propose a system that recommends friends based on the daily activities of users. Here a semantic based friend recommendation is done based on the users� life styles. By using text mining, we display a user's everyday life as life archives, from which his/her ways of life are separated by using the Latent Dirichlet Allocation algorithm. At that point we discover a similarity metric to quantify the similarity of life styles between users, and as certain users� effect as far as ways of life with a similarity matching diagram. At last, we incorporate a feedback component to further enhance the proposal precision.
Keywords: ActivityRecognition;Social Network, Data Mining ;Pattern Recognition;Secerte Sharing Scheme.
Abstract
A Review on Different Multi Biometric Cryptosystems
Sreemol R, Kavitha N
DOI: 10.17148/IJARCCE.2017.63232
Abstract: Biometric Identification is one of the area related to person recognition by means of physiological and behavioral features like iris, fingerprints, voice, face, etc. Biometric cryptosystems can be used to protect the biometric template. It provides a better solution for the cryptographic key generation, encryption and decryption. Single Biometric cryptosystems use a single biometric feature to protect the data, while multi biometric cryptosystems uses two or biometric features. Multi biometric cryptosystem uses different fusion techniques. In this paper, a survey of different kinds of multi biometric cryptosystem is done.
Keywords: biometric; fusion; cryptosystem.
Abstract
Detection of Retinal Hemorrhage in Color Fundus Image
Priyanka Kale, Prof. N. Janwe
DOI: 10.17148/IJARCCE.2017.63233
Abstract: Diabetic Retinopathy (DR) is an eye disease due to diabetes which causes visual loss. So it is reasonable to provide treatment for DR at first stages of disease. Hemorrhages are the first symptoms that indicate diabetic retinopathy. Therefore, their detection is very important. In this survey paper image contrast is enhanced by pre-processing and then blood vessels are detected as the boundaries of hemorrhages are not preserved when they are in contact with blood vessels.then classification done on the basis texture feature such as area and size and standard deviation etc. finally classify the images into normal, moderate and Severe DR.
Keywords: Diabetic retinopathy, haemorrhages, Blood vessel, Diabetes.
Abstract
A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
Mrs. Nagamani K, Bhange Yogita, Bhoir Dhanashree, Dalavi Rani
DOI: 10.17148/IJARCCE.2017.63234
Abstract: Schemes like conventional password schemes such as textual password scheme, graphical scheme are commonly used for authentication. But these schemes are vulnerable to dictionary attack, shoulder surfing attack, accidental login. Hence the text-based shoulder surfing resistant graphical password schemes have been proposed. These existing schemes are not secure and efficient enough and have high failure rate. The text-based shoulder surfing resistant graphical password scheme is improved by using colors. In addition one time password is also used. So it has become more secure. User can easily login to the system. Unauthorized user cannot get the password easily. Hence this scheme provide protection against the shoulder surfing.
Keywords: Android, Attendance management, E-learning, SMS etc.
Abstract
Enhanced User Motion Detection using Multiple Smartphone Sensors
Amit Thakor, Prof. Srushti P. Soni
DOI: 10.17148/IJARCCE.2017.63235
No abstract available.
Abstract
Implementation of Dynamic Auditing Protocol for Data Storage in Cloud Computing
Patil Vaishali, Wagh Shrikant, Panchal Amol, Prof. G.N. Potdar
DOI: 10.17148/IJARCCE.2017.63236
Abstract: Cloud computing is growing now days, all physical systems are going to be history in coming years as cloud computing provides the virtualize framework of all i.e. software, hardware etc. The one of the most efficient use of cloud is data storage on cloud server on pay as you go scheme. But as its good to hear there are some challenging aspects behind this cloud data storage as per end users perspective. How end users know their data is secure on cloud server? How they satisfied that the data is not tampered and successfully updated after performing some operation over it? Here the Trusted Third Party auditor comes in picture and using auditing framework he satisfy end users that there data is secure over server and successfully updated. Thus, an efficient and secure dynamic auditing protocol is desired to convince data owners that the data are correctly stored in the cloud. In this paper, we first design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support the data dynamic operations, which is efficient and provably secure in the random oracle mode.
Keywords: Cloud computing, dynamic auditing, privacy-preserving auditing, batch auditing, Storage auditing.
Abstract
Enhancing Automatic PPT Generation Technique through NLP for Textual Data
Pooja Belote, Sonali Bidwai, Snehal Jadhav, Pradnya Kapadnis, Nakul Sharma
DOI: 10.17148/IJARCCE.2017.63237
Abstract: Proposed system come with an idea of automatically generate presentation slides from textual data. The slides mostly incorporate of only the important points related to the topic. There are various tools and systems are available in the market which only address with formatting of the slides but not the content. But it having performance issues regarding of sentence extraction, so this paper proposes an idea of automatically ppt generation from text. This will finally help in reducing a great amount of the presenter�s time and efforts. The intended system works on NLP rules to classify data for the desired slides.
Keywords: Pre-processing, Tokenization, Steaming, Feature Extraction, Fuzzy Classification.
Abstract
Shielding the Server from Furtive Distributed Denial of Service Attacks using Dominate and Release Policy
Akshitha Koluguri, Akshay Chotiya, Arindam Das, Aman Ajmani, Vishwajeet Singh
DOI: 10.17148/IJARCCE.2017.63238
Abstract: With the increase in threats in cyber security it is predictable that any service providing systems could be easily victimized by intruders. All the incoming requests are served by the servers attached to the systems and thus attackers can target the servers and generate illegitimate requests with the possibility of malfunctioning. The faux requests are practically imperceptible as the traffic they engender is suspected to be in low-rate. We represent respective intensities for legitimate traffic and fake traffic. The initial result is under the assumption of static routing by the attackers, followed by time-varying attacks. We confront the case like Join-the-Shortest-Queue is not a solid policy to defend from the time-varying attacks as the throughput region providing intensities for both legitimate and fake traffics are compromised. This study will provide you a clear idea on how to balance the traffic and defend the network from Distributed DoS attacks which lugs the possibility to degrade the system by using dominate and release(DaR) policy. We shall discuss this method using .NET framework on how we can identify the manual and automatic incoming requests to the server and provide protection.
Keywords: Service provisioning system, Distributed Denial of Service, Dominate and Release (DaR) policy, DDoS attack, illegitimate traffic.
Abstract
Assisting Text Annotation based on Attributes Suggestion Strategy using Content and Query
Vikas R. Palekar, Miss. Shital P. Dhok, Prof. Dinesh D. Gawande
DOI: 10.17148/IJARCCE.2017.63239
Abstract: In the current computing world, machine based data innovations have been broadly used to help numerous associations, individual businesses, scholarly and training establishments to deal with their procedures and data frameworks. Data frameworks are utilized to keep an eye on information. A general information administration framework that is prepared to do dealing with a few sorts of information, data stored in the database is known as Database Management System (DBMS). Accumulations of enormous, extensive text based Information contain huge measure of organized data, which remains unstructured content. Important data is constantly hard to find in these documents. In this paper we proposed a novel approach that encourages the era of the organized metadata by recognizing records that are prone to contain data of investment and this data is going to be helpful for questioning the database. Here individuals will lying on your front to allot metadata identified with records which they transfer which will effortlessly help the clients in recovering the records.
Keywords: Collaborative Adaptive Data sharing platform (CADS), Annotation, metadata, structured information, queries.
Abstract
Design and Performance Evaluation of Priority Vehicle for Emergency Services in VANET
Saket Tiwari, Vipin Bondre
DOI: 10.17148/IJARCCE.2017.63240
Abstract: Today�s era is the era of fastest speed considering from the evolution of wheel. In the process of development, there has been a drastic increase in the speed as well as the number of vehicles. With the increase in number of vehicles there the aroused the need for Intelligent Transport Scenario with efficiency in terms of reduced travel time, zero congestion (traffic jams), etc. Thus the way for using intelligent traffic system got fulfilled in the form Vehicular Ad hoc Network (VANET). The use of VANET include the communication between the vehicular nodes to circulate information like speed, destination of a node, proposed way, etc. to other nodes. In all the applications related to Vehicular Ad Hoc Network include traffic management, traffic bypassing, etc. The other cited application of VANET that is coming into light is in Emergency services. In addition to the use of siren as in ambulance, fire trucks, police cars, etc. there can be use of communication between the emergency vehicle and other vehicles so that other vehicles can be warned about presence of emergency vehicle. In this paper, the VANET scenario has been simulated wherein the emergency vehicle communicates with other vehicles. The simulation has been carried out using MOVE, Simulation of Urban Mobility (SUMO) and Network Simulator (NS2).
Keywords: Priority Vehicle, VANET, AOMDV, SUMO, MOVE, NS2.
Abstract
A Hash based Mining Algorithm for Maximal Frequent Item Sets using Hashing
Vaishali Galav, Deepak Jain
DOI: 10.17148/IJARCCE.2017.63241
Abstract: Data mining plays important role in many applications like market-basket analysis, cross marketing field etc. In data mining, Association Rule Mining (ARM) finds the interesting relationship between across of various items in a given database. In this paper, we propose a new association rule mining algorithm called Hash Based Frequent item sets-Quadratic probing (HBFI-QP) in which hashing technology is used to resolve primary collisions in vertical data format of the data base. But Quadratic probing also suffer from secondary clustering. This secondary clustering problem solve by using double hashing technique (HBFI-DH). The proposed technique generates the exact set of maximal frequent item sets directly by removing all non-maximal item sets. The proposed technique access the data fastly and efficiently compare with other hashing technique.
Keywords: Frequent Item Sets, data mining, Association Rule Mining (ARM), double hashing technique (HBFI-DH).
Abstract
RFID based Tracking System
Prof. Gaurav G. Narkhede, Akshay Kishor Langade, KinalGaurang Mehta, Shubhankar Abhay Kulkarni
DOI: 10.17148/IJARCCE.2017.63242
Abstract: Radio Frequency Identification (RFID) is coming, and it�s bringing a streamlined revolution. When dealing with the tracking device, Radio Frequency Identification (RFID) is the latest phase in the decades, that can be used as an efficient tracker. The development of Tracking System using Radio Frequency Identification (RFID) Technology is Quite new but something that promising. This solution uses RFID technique for monitoring entry and exit of employees with their official assets (E.g. laptops). The Tracking System actually based on external database system that will provide the recorded information about the reader. Since the reader detected by the database, then the tracking system will process the data and will show the result of subject tracking.
Keywords: Radio Frequency Identification (RFID), Asset Security, Asset Tracking using RFID, Asset Management using RFID, Security.
Abstract
A Survey on Cloud Security Issues and Challenges
S.Indhumathi,T.Manigandan, S.T.Saravanan
DOI: 10.17148/IJARCCE.2017.63243
No abstract available.
