VOLUME 7, ISSUE 3, MARCH 2018
Decision Support System for Discrete Robust Berth Allocation
Reda Adel Samkari
An Information Hiding System Based on Image Steganography for Color Images
Phyu Hnin Lwin, May Htet
Health Monitoring System Using IOT
DR.Jitendranath Mungara, Preethi JD, N.Phani Bhaskar, D.T.Rajesh, Kishan Kunal, Vishal Anand JHA
On Energy Hole And Coverage Hole Avoidance in Underwater Wireless Sensor Networks Using ABC Algorithm
E.Nandhini, V.Senthilkumar
Virtualization-The New Era of Cloud Computing
S.Gowsalya, S.Agalya, A.Helina Mercy
Towards Building a Communication System and an E-Portal of an University
Hao Do, Binh Huynh
Towards Building the Information System of an University
Hao Do, Binh Huynh
Selecting the Honey Words from Customer Password in Online Application
Mrs.M.Ananthi, M.E.,(Ph.D.,), T. Dharanipriya, M. Monisha, A. Harshini
Image Compression Algorithm Using Improved Haar Wavelet Transform
Nariman Jabbar Qasim
Novel Dynamic Structure to Implement Public Auditing Protocol on Cloud Data
Ch Sai Pavan, P Sudheer Kumar
Survey on Public Key Cryptography for Securing Data in Cloud Computing
M.Keerthika, K.Indhumathi, V.S.Lakshmi Priya, T.Fathima Barveen
Role of IOT based Indian Agriculture Sector
N. Udhaya, R.Manjuparkavi, R.Ramya
A Review on Satellite Image Enhancement Techniques using Wavelet Transform and Interpolation
Kumari Suniti Singh
Relational Database with Multicore-Framework
Venkatesh Kakalwar, Dipanjan De, Arup Kumar Biswas, Sivanesan S
Secure Protocol Implementation using Near Field Communication
Prof. Swati Patil, Mr. Mahesh H Pachpande
Storytelling with Augmented Reality
Suyog Padmere, Abhishek Kunchikor, Shubham Madavi,Neha Kudu
Predicting Stock Market Investment Using Sentiment Analysis
Shantanu Pacharkar, Pavan Kulkarni, Yash Mishra, Amol Jagadambe, S.G.Shaikh
Secure transportation internet of things of vehicles using ultrasonic sensor and ardiuno board in Obstacle Detection
Ms.Shweta Borse, Ms.Mayuri Sapkal, Mr.Ritesh Kolhe, Prof.K.D.Wagh
Smart Band For Women Safety using Internet of Things (IoT)
Mr.Pampapathi B. M , Komal Singh , Madhavi V , Madhu B Yallaraddi , Mangala Desai
A Survey on Feasibility and Suitability of Blockchain Techniques for the E-Voting Systems
Umut Can Çabuk, Eylül Adıgüzel, Enis Karaarslan*
Providing Privacy Using M-Diversity Algorithm along with K-Anonymity
Ashok Reddyboina, Pavan Koushik Bachu, Naveen Kumar Chennakesi
The Survey of Classification Methods Using Wireless Mesh Networks
Sukhwinder Singh, Rajeev Sharma, Harjot Singh
Real-Time HCCA scheduler and MAC Protocol for IEEE 802.11e WLANs: A Review
Ishwinderpal Singh, Jashanpreet Singh, Joginder Singh
Customer Satisfaction Aware Optimal Multi Server Configuration For Profit Maximization in Cloud Computing
U.Naveen, Mr.S.Jambunathan
Acquaintance Allocation in Ontology Authoring
T.Vindhuja, Mr.S.Jambunathan
Smart Waste Management using IOT
Nagajothi.S, Durga.J, Jayasurya.K, Vishnuvarshini.M.D, Nadhiya.M
Medical Image Compression using Block Processing with DCT
Himani, Pawan Kumar Mishra
IoT Based Smart Car Parking System Using Android Application
B.D. Deore, S. R. Kurkute, Pooja Bhalerao, Kajal Barve, Mokshada Deore
IOT Based Electronic Monitoring System Using Raspberry pi
Vinitha.M, Mahendran.R, Janani.B
Design and Simulation of an Energy Scavenger for Microsystem
Prof. Omprakash K. Piprewar, Abhilesh D. Kedar, Aditya A. Verma, Latika S. Raut, Pinki V. Kumbhare, Rajashree S. Karoo, Rajeshree V. Zade
A Review on Mobile Cloud Computing
T.Fathima Barveen, K.Indhumathi, V.S.Lakshmi Priya, M.Keerthika
An Decision Support System to Analyse Customer Behaviour Based on Map Reduce Based C4.5 Algorithm
Mausami Verma, Neha Chandrakar , Rahul Kumar Chawda
An Approach to Predict Train Delay Using Big Data Analytic Approaches
Ajay Patel, Manish Jaiswal, Rahul Kumar Chawda
Enhancing the Quality of E-Learning Systems by Using Big Data and Cognitive Computing Approaches
Shivangi Jamuda, Sanju Rai , Rahul Kumar Chawda
Smartphone Based Optical Character Recognition for Indian Language
Abhishek R. Katyare, Pradeep R. Todkar, Shivam C. Bapat, Mayur K. Gunjal, Prof. Apurva N. Varade
WebApp for Document Verification and Challan Generation (RTO)
Manjeet Marodkar, Mansi Singh, Yash Goyal, Shubham Chouke, Mayur Ganvir,Anurag Rallapalli
Fraud Detection System for Banking Services
Falguni Patil, Mansi Vyas, Naman Jain, Rameez Raza, Laxman J. Deokate
Arduino Based Smart Irrigation System
Madhu Vanthi.K, Kavipriya.R, DivyaPriya.D
Detection of crime and non-crime tweets using Twitter
Nakul Sharma, Anupama dhamne, Nisha more, Vikash rathi, Ankita supekar
Smart Multiuser Charging Station-Technical Review
B. D. Deore, S. R. Kurkute, P. R. Ghatol, V. S. Vaidya, S. H. Ansari
Criminal Identification System Using Face Detection and Recognition
Piyush Kakkar, Mr. Vibhor Sharma
A Shuffled Leaping-Based Data-Gathering Algorithm for Industrial WSNs with a Mobile Sink
Jasvir Kaur*, Deepinderjeet Kaur Dhaliwal
Secured Password Authentication using Image an Auto Dialing
Mr.S.Jambunathan, Gouthaman.P
Student Performance Prediction And Analysis
Ditika Bhanushali, Seher Khan, Mohommad Madhia, Shoumik Majumdar
VoIP Intrusion Detection for secure transmission using PLRT (Packet Level Restraining Technique) under DDOS Attack
Humma Shoket, Jagdeep Singh Aulakh
Security System for Online Transaction
Amol More, Archana Karbhari, Prem Gorivale, Sridhar Iyer
Secure Cloud Storage of Health Records
P. Vishnu Sagar, RVLSN Sastry
Minimum Cost Blocking Problem in Multi-path Interconnected Wireless Networks.
D. Siva Kavya, D.Anusha, D.Mahima, Ch. Hari Prasad
Tele-Monitoring Device for Cardiorespiration Activity
Rachit Patel, Rashi Dubey, Sidhi Mishra, Subhadra Kumari Bharti
Android Voting System Using Facial Recognition
Divyank Madan, Aaditya Suri, Mr. Saurabh Gautam
Social Media Assist Bot
Devata Anekar, Aniruddha Madurwar, Payal Hemane, Chandrakant More, Rahul Porwal
Crop Rate Console System Rahul Wankhede, Rahul Gaikwad, Lalit Ghavghave, Bhushan Shende, Rohit Barsagade
P. Vishnu Sagar, RVLSN Sastry
IR based Theatre Piracy Reduction by using Image Processing
Gouri Raut, Kajal Bakade, Proff. S.V.Kulkarni
Cyber Security Challenges In IoT
S.Dharini Iswarya, K.Priyadharshini, R.Minakumari, S.Anbazhaki
Analysis of HCV Risk Factor among PWID’s in India- An Approach using Naive Bayes Classifier
M. Gomathy, Saravanamurthy P. Sakthivel
Proposed System for Data Mining Using Clustering
Pratik Sohala, Harshil Patel, Aniket Patel, Hezal Lopes
Implementation of Web Scraper Bot: Web Harvesting
NandanAS, Rahul S Niranjan, PB Rahul Choudhary, Karthik Srinivas, Nilesh Kumar Singh, Kavya P Hathwar
Implementation of Intelligent Tutoring System
Ms. Akansha Chaudhary, Ms. Preeti Mali , Ms. Pooja Chaudhari , Ms.Sulekha Shardul , Prof.M.R.Tiwari
Smart Parking System and It’s Simulation
Gaurav Surtani, Sakshi Gupta, Shikha Singh, Madhuri Yadav, Mr. S.S.Kulkarni
Design of Buck-Boost Converter for Solar Panels using PID Controller
S. Kiruthiga, M.Dheivanai, S.Deepika, Mr.A.Karuppasamy
Mind Controlled Assistive Quadrotor Drone
Om Raheja, Kapil Pawar, Mohini Saraf, Sudeshna Maiti
Cost Reduction for Big Data Processing In Physically Dispersed Data Centers
Miss. Sayyad K. M, Mr. Gurav R. R, Mr. Salunke S. S, Miss. Mirgane P. V, Prof. Shaikh N. K
Survey: Detection of Blackhole Mechanism on MANET
Mr.Vishwajith M V, Pratik Sanjel, Pranish Pokharel, Kshetiz Pokhrel
Analysis of Different Fusion and Normalization Techniques
Komal, Dr. Chander Kant
Review Paper on Security in Cloud Computing
Sharad Srivastava, Manjula R
Design of Grid Tie Inverter Fed With Renewable Energy Sources
Mr. D. Mariappan, S. Pavithra, P. Banu Prabha, P. Vasuki
Smart Car Parking System
Mithun Mhatre, Priyanka Kamble, Raheel Kumar, Qais Nadkar
Camera Based Driver Distraction
Apurva Hadap, Anuja Shette, Tanaya Jadhav, Tejasvi Pandey, Mrs. Suvarna Pothdukhe
Review Paper: New Advances in Recommender Systems
Shubham Jain, Manjula R
Anti Collision Data Ciphering of AES With Hash Function Enhancement and Implementation on LabView
Aya Qusay Dawood, Raaed Khalid Ibrahim
Securing Online Transaction Using Visual Cryptography
P.Y. Pawar, Pooja Rajguru, Jaishree Dhomse
Diabetic Retinopathy Identification using Object Detection Method
Prof. Gauri R. Rao, Alankrita Srivastava, Pooja R. Patil, Dhruv Datta
Preventing and Detecting Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
Sable D.V, Sakhare S S, Khule Y.R, Salve P.M , Tonape Y.L
Survey on the detection of the fog and its impact on the highway traffic network
Vidhyashree G, Priyanka G , Arpitha C , Ravi Kumar SK
Chat-Bot Real Virtual Human
Himanshu Agarwal, Rameshwari Deshmukh, Supriya Biradar, Bhagyashri Cheke
Cache Based Course Setting Up On Roads
S.Saveetha, P.Sumathi Chitra, J.Shanthini
Design of Hybrid Electric Cycle with Automatic Speed Breaker Alert System
Dr.S. Kalyani, P. Divyaprabha, M. Janani, B. Mahemaa
Improving the QAM Performance by using RSBC, Alamouti STBC and Interleaving over Rayleigh Fading Channel in Wireless Communication Applications
Mr. Girish Kalse, Mr.Vijaykumar Sharma
Review on Privacy of Content Based Retrieval of Image in Cloud
Prof. Suvarna L.Kattimani, Miss. Saba Parveen Bougdadi
Clone Detection Using Double-Track Approach For Rfid-Enabled Supply Chains
Dhumal T.A, Jadhavar S.S, Shinde A.S, Navadkar N.K, Shaikh T.U, Sarwade P.L
A Study On Tuberculosis Analysis Using Data Mining Techniques
N. Suresh, K. Arulanandam
Remote Device Automation Of Sprinklers
Chetana Tambe, Manoj Racherla, Shalvi Khandare, Prof.Akshay Loke
A New Class of 2–parametric Deterministic Activation Functions
Nikolay Kyurkchiev, Anton Iliev
A Note on the Generalized Inverted Exponential Software Reliability Model
Nikolay Pavlov, Angel Golev, Asen Rahnev, Nikolay Kyurkchiev
Wearable Technology Orientation using Cloud Computing for Improving Quality of Human Life
P.Veeramuthu, Mula Koushik Reddy
Big Data Management in Telecom Domain Using Hadoop
Miss. Deshmukh A.A, Miss. Hasarmani D.R, Miss. Kashid P.B, Miss. Jagatap P.S, Prof.Raule M.B
Over Power Detection of Induction Motor
Pankaj Kashyap, Aakanksha Aharwal, Kriti Tiwari, Anukriti Singh, Monika Singh, Sandeep Somkuwar
SIN CAMAREROS: Touch Screen based Ordering Systems without Waiters
Jayesh Ghugal , Sumiti Bhoyar, Yash Thumbunkel, Shubham Mandape, Vaidehi Dahake
Development Of Farm Management In Modern World
Shriram A.P, Shwetha. C, Rani S
Significance of applying K-means Clustering Technique to Video Steganography
Shree Raksha, Shruthi R, Sushma Shekar K, Vismaya M, Vidya Raj C
Widget To Compare Price Using Mashup
Nimish Jadhav, Siddhesh Lokare, Aniket Andhale, Prof.Sachin Bojewar
Survey of Challenge Big Data on Cloud Computing and MetaCloudDataStorage Architecture Efficiency Performances
R.Edwina, S.Kamatchi, M.Kavitha, T.Sathiyapriya
Hybrid Power Generation in Indian Scenario
Dr. Prakash Prasad, Kiran Bobade, Khyati Raikar, Mansi Pande, Janvhi Ingle
Drowsy Driver Detection and Alert System
Gauri Thakare, Vaishnavi Shirbhate, Tanmay Fuse, Sanjiv Sharma, Prof R. R Karwa
Solar Induction Wireless Roadways
Akash Kumar Nirala, Hitesh Kumar, Somesh Kumar Sidar, Vijay Kumar Thakur, Vishal Patle, Mrs. Nushin Anjum, Dr. Abhishek Verma
AUTOMATIC QUESTION PAPER GENERATOR SYSTEM
Zalte S.V, Jadhav C.C, Mangire A.A, Hole A.D, Tulshi A.R
Gas Sensor Using Arduino UNO & MQ2 Sensor
Prof. Parag Naik, Pranay Dhopte, Rajat Wanode, Roheet Kantode, Saurabh Nagre
Abstract
Decision Support System for Discrete Robust Berth Allocation
Reda Adel Samkari
DOI: 10.17148/IJARCCE.2018.731
Abstract: This paper discusses algorithm to reduce total service time for set of vessels arriving at port. The objective is to reduce the total stay or delay times of vessels at a port i.e. the waiting, loading and discharging of containers should be done as quickly as possible, in order to save on terminal costs. Mentioned algorithm will also provide the coordinate along the quay at which vessel can be berthed, start of handling time after arrival, waiting time for each vessel. This research provides a decision-making system of berth ships in all available berths on the port based on the required handling time of the ship after a meeting between several departments such as operations management, maritime transport and representative companies discharge. All departments cooperate with each other to work out the schedule for the allocation of berth suitable for all vessel requirements.
Keywords: Berth Allocation Problem, minimum service time, waiting time.
Abstract
An Information Hiding System Based on Image Steganography for Color Images
Phyu Hnin Lwin, May Htet
DOI: 10.17148/IJARCCE.2018.732
Abstract: Information Hiding is one of the challenging issues in the field of security. Steganography is one of the most important fields in information hiding system. Steganography is used to hide the existence of secret message by embedding the message inside any cover object like image, text, audio and video files. This paper proposes a new method based on modified PVD method in order to obtain larger embedding capacity and produce acceptable stego image quality. To prove the better performance of the proposed method, the comparison analysis is performed according to Peak Signal to Noise Ratio (PSNR) values and embedding capacity. Experimental results show that the proposed method provides an average hiding capacity gain of 1.85 times over the existing method while maintaining acceptable of stego image quality.
Keywords: Information Hiding; Image Steganography; Proposed Method; modified PVD method; Secret Message.
Abstract
Health Monitoring System Using IOT
DR.Jitendranath Mungara, Preethi JD, N.Phani Bhaskar, D.T.Rajesh, Kishan Kunal, Vishal Anand JHA
DOI: 10.17148/IJARCCE.2018.733
Abstract: The Internet of Things (IOT) is a new mega trend in the internet. This paper focus on developing a smart health monitoring system that uses the sensors to collects the patient health data and transfer the data to the server through Wi-Fi module. The data is stored in the database if any patients data is not in the normal range then the caretaker as well as the doctor are notified through the message service. Security is an important thing for every system to achieve this a password protected Wi-Fi module and restricted access to the database is used.
Keywords: Data Collection Unit, Data Authentication Unit, Alert Unit, Microcontroller, Temperature sensor, Motion sensor, ECG Sensor, LCD display, Heartbeat sensor.
Abstract
MOART: Multiple Occupants Activity Recognition and Tracking in Smart Home
Kalaiselvi.P
DOI: 10.17148/IJARCCE.2018.734
Abstract: Smart home aims to offer ambient assisted living environment to its occupants through the design of activity recognition system. Most of the existing works in smart home design is carried on single occupant monitoring and recognition. In reality, more than one occupant resides in a home environment and thus it essential to extend the activity recognition to multi occupancy. Sensor data association and occupant enumeration are the major concerns in the design of multi occupancy activity recognition system for smart home. Hence, the Multiple Occupants Activity Recognition and Tracking (MOART) framework is proposed for data association and enumeration using statistical and artificial intelligence techniques. Hidden Markov Model and Joint Probability Data Association approaches are used for activity recognition and data association respectively and is further enhanced using contextual approaches. Experiments are carried with the real time smart home dataset and the study shows that the proposed approach outperforms existing approaches.
Keywords: Smart home, Multioccupancy, Activity recognition, Occupant count.
Abstract
On Energy Hole And Coverage Hole Avoidance in Underwater Wireless Sensor Networks Using ABC Algorithm
E.Nandhini, V.Senthilkumar
DOI: 10.17148/IJARCCE.2018.735
Abstract: Network lifetime plays an integral role in setting up an efficient wireless sensor network. The objectives of this thesis are: 1) To deploy sensor nodes at optimal locations such that the theoretically computed network lifetime is maximum 2) To schedule these sensor nodes such that the network attains the maximum lifetime. 3) A coverageaware sensor deployment scheme should be developed to ensure sufficient sensing coverage, and 4) to face of sensing node failures, a sensor self-organizing mechanism needs to be devised to efficiently recover the sensing void and restore the required sensing coverage. Since local repairs generally consume less moving energy and communication overhead than a global redeployment does, the sensor self-organizing mechanism should limit the network recovery/repairing locally to effectively reduce unnecessary. Further, the nodes are scheduled to achieve this upper bound. This project uses artificial bee colony algorithm and particle swarm optimization for sensor deployment problem followed by a heuristic for scheduling. In addition, ANT colony optimization technique is used to provide maximum network lifetime utilization. The comparative study shows that artificial ACO performs better than bee colony algorithm for sensor deployment problem. The proposed heuristic was able to achieve the theoretical upper bound in all the experimented cases.
Keywords: UWSN, Sensor Deployment, Energy Hole, Sensor Scheduling, ABC algorithm, ANT Colony Algorithm, PSO algorithm.
Abstract
Virtualization-The New Era of Cloud Computing
S.Gowsalya, S.Agalya, A.Helina Mercy
DOI: 10.17148/IJARCCE.2018.736
Abstract: The cloud is essentially born from virtualization of era environment. The issue by the I/O inconsistency are well known and I will deem. A support of climbable according to load of service and pays as hash house cloud computing is becoming an ductile technology for alive with is zippy scalability and trick of virtualized appliance as a service though the internet. In this paper shows the steam computing plays an far-reaching role in the terrain of information .This presents analysis the benefits of cloud computing parallel virtualization and inaugurate why they are not substitutable if you want user empowerment ,scalability and relief from the maintaining hardware and software yourself you want the cloud.
Keywords: Cloud computing, SaaS, PaaS, IaaS, Hybrid techniques.
Abstract
Towards Building a Communication System and an E-Portal of an University
Hao Do, Binh Huynh
DOI: 10.17148/IJARCCE.2018.737
Abstract: This paper was audited carefully current state of The Ho Chi Minh University of Foreign Languages and Information Technology (HUFLIT) such as infrastructure, IT and IS, network architecture, education and training operations to find out their strengths and weaknesses aspect and propose effective solutions to building and a communication system and an e-portal of HUFLIT.
Keywords: Communication System; E-Portal; university.
Abstract
Towards Building the Information System of an University
Hao Do, Binh Huynh
DOI: 10.17148/IJARCCE.2018.738
Abstract: This paper was audited carefully current state of The Ho Chi Minh University of Foreign Languages and Information Technology (HUFLIT) such as infrastructure, IT and IS, network architecture, education and training operations to find out their strengths and weaknesses aspect and propose effective solutions to building and a communication system and an e-portal of HUFLIT.
Keywords: Communication System; E-Portal; university.
Abstract
Selecting the Honey Words from Customer Password in Online Application
Mrs.M.Ananthi, M.E.,(Ph.D.,), T. Dharanipriya, M. Monisha, A. Harshini
DOI: 10.17148/IJARCCE.2018.739
Abstract: Inverting the hash values by means of acting brute force computation is one of the modern-day protection threats on password based authentication approach. New technologies are being evolved for brute force computation and these boom the achievement price of inversion attack. Furthermore, getting into with a honey phrase to login will cause an alarm notifying the administrator about a password le breach. However, the prevailing schemes have numerous limitations like more than one system vulnerability, Weak dos resistivity, storage overhead, and many others. In this review, we to analyses in detail with cautious consideration the honey word framework and present some remark to center be utilized frail focuses. In this have a look at, we to study in Detail with cautious interest the honey word machine and present some remark to consciousness be used vulnerable points. Also focus on Pragmatic password, reduce storage price of password, and change ay to desire the new password from current person passwords.
Keywords: Honey words, Attributes, Hash code points, hybrid generations.
Abstract
Face Biometric Antispoofing
Minu Correya, Dr. Thippeswamy G
DOI: 10.17148/IJARCCE.2018.7310
Abstract: In an increasingly digital world, protecting confidential information from hackers and unauthorized individuals is becoming more difficult and the need for robust security is paramount. As a result, Biometric spoofing is a growing concern as biometric traits are vulnerable to attacks. Biometric spoofing is the ability to fool a biometric system into recognizing a fake user as a genuine user by means of presenting a synthetic forged version of the original biometric trait to the sensor. Specific countermeasures that allow biometric system to detect fake artefacts and to reject them need to be developed. This paper�s main goal is to provide an overview of different antispoofing techniques used in the now emerging field of antispoofing with special attention to face modality.
Keywords: Biometrics, spoofing, antispoofing, antispoofing techniques.
Abstract
Image Compression Algorithm Using Improved Haar Wavelet Transform
Nariman Jabbar Qasim
DOI: 10.17148/IJARCCE.2018.7311
Abstract: There are several problems to be solved in image compression to make the process more efficient. the proposed methodology of this paper is to achieve high compression ratio in images using Wavelet Transform. The aim of proposed work is developing computationally efficient and effective algorithms for lossy image compression using wavelet techniques, where This paper proposes a modified simple but efficient calculation haar wavelet transformation in image compression. The haar wavelet is designed using MATLAB. This work has been tested and found suitable for its purpose.
Keywords: Image Compression , wavelet, Haar Wavelet, compression ratios
Abstract
Cloud storage
Eng. Nassar E. Muhanna
DOI: 10.17148/IJARCCE.2018.7312
Abstract: In the last few years the revolutionary invention of A file hosting service, cloud storage service, online file storage provider or cyberlocker is an Internet hosting service specifically designed to host user files has been extremely changed. Storing files in the cloud has many advantages. We can sync our devices and retrieve our data on the go from any phone, tablet or computer that's connected to the Internet, and the cloud can also provide backup for files so they'll never disappear if your phone gets lost or your computer crashes. Using the cloud is a no-brainer, As a user, There many of cloud sharing platforms like iCloud, OneDrive, Google Drive, Dropbox, Amazon Cloud Drive ,and Box but picking which service to use is a bit more difficult.
Keywords: Cloud systems, hosting service, Storage service, Cyberlocker.
Abstract
Novel Dynamic Structure to Implement Public Auditing Protocol on Cloud Data
Ch Sai Pavan, P Sudheer Kumar
DOI: 10.17148/IJARCCE.2018.7313
Abstract: As cloud computing is one of the rapidly growing technologies, cloud storage has been accepted by many people and organizations because it is a more convenient and outsourcing application which is high on-demand. Data owner generally thinks that whether his data is secure or not.So, many research people started designing auditing protocols which concentrates on outsourced data. In this paper, we propose a public auditing protocol with global and sampling block-less verification, batch auditing where data dynamics is more efficiently supported. It is important to note that novel dynamic structure in our protocol consists Doubly Linked Info Table (DLIT) and Location Array (LA).By using this dynamic structure, computational and communicational overheads are reduced, security is achieved. Moreover, numerical analysis and real-world experimental results illustrates that the proposed auditing protocol is going to be more efficient.
Keywords: Double Linked Info Table, Location Array, Auditing Protocol.
Abstract
Survey on Public Key Cryptography for Securing Data in Cloud Computing
M.Keerthika, K.Indhumathi, V.S.Lakshmi Priya, T.Fathima Barveen
DOI: 10.17148/IJARCCE.2018.7314
Abstract: Cloud computing provides convey of computing services such as networking, storage, databases, servers, databases, software, analytics and Online Internet . Cloud computing as a favor can transform and attract Information technology services. Now days, security of data become a large concern to insure various aspect like integrity, confidentiality, authentication etc. Cryptography techniques are used for this purpose. It plays a major role in protecting the data in those applications which are running in a network environment. To increase data security cryptography techniques also used on cloud because cloud computing provides secure transmission of data. On cloud, various computing task or programs can be run at a time. Cloud computing provides an illusion to the customers of using infinite computing resources that are available from anywhere, anytime, on demand.
Keywords: Cryptography, Cloud computing, RAS, DES, Ciphertext.
Abstract
Role of IOT based Indian Agriculture Sector
N. Udhaya, R.Manjuparkavi, R.Ramya
DOI: 10.17148/IJARCCE.2018.7315
Abstract: Internet of Things (IoT) based Agriculture sector in India is diminishing day by day which affects the production capacity of ecosystem. Agriculture is most important aspect of human civilization. The Agriculture Application based on the framework consisting of KM-Knowledge base and Monitoring modules. To make profitable decisions, farmers need information throughout the entire farming cycle. A knowledge dataflow model is constructed connecting various scattered sources to the crop structures. IoT plays role in the development of agricultural sector. This paper aims at to make agriculture sector using automation ,cultivation and IoT Technologies.
Keywords: Internet, information technology, sensing, control, precision farming ,food chains, consumer information.
Abstract
A Review on Satellite Image Enhancement Techniques using Wavelet Transform and Interpolation
Kumari Suniti Singh
DOI: 10.17148/IJARCCE.2018.7316
Abstract: Satellite images are used in various field of research and applications. The major limitation of satellite images are its resolution. Therefore image resolution enhancement is very necessary and first step in image processing. To modify an image under some consideration so that the obtained image is superior than the original image for specified application is image resolution enhancement. Resolution enhancement of images can be performed in different domain such as Spatial and Transform domain. Images with high resolution give better result for a specific application. Different image enhancement methods based on transform domain are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Stationary Wavelet Transform (SWT), DWT with SWT, Dual-Tree Complex Wavelet Transform (DT-CWT), DT-CWT with cycle spinning. In this paper, it has been discussed about different image enhancement techniques based on transform domain and interpolation methods. All the techniques are discussed and compared on satellite benchmark images and the analytical results of all these shows supremacy of methods over each other.
Keywords: Satellite images, DWT, DCT, SWT, DWT with SWT, DT-CWT, DT-CWT with CS, Interpolation
Abstract
Relational Database with Multicore-Framework
Venkatesh Kakalwar, Dipanjan De, Arup Kumar Biswas, Sivanesan S
DOI: 10.17148/IJARCCE.2018.7317
Abstract: Database Management is one of the most important tasks for an organization today. The ultimate goal is not only storing and/or managing data, but to do so efficiently, in order to reduce the overall cost and expenditure of the organization. Using the right database system to handle multiple types of data, increases the overall efficiency of business operation. These systems are built to be extremely versatile. Through this paper, we present an alternate way of storing data in a database, in pursuit of optimizing space and reducing the time complexity during data search or retrieval.
Keywords: RDBMS, Multicore architecture
Abstract
Secure Protocol Implementation using Near Field Communication
Prof. Swati Patil, Mr. Mahesh H Pachpande
DOI: 10.17148/IJARCCE.2018.7318
Abstract: NFC is one of the recent wireless communication technologies. Near field communication is technology for contactless short-range communication based on RFID (Radio Frequency Identification). So there is possibility of eavesdropping, data modification, data corruption, man-in-middle attacks. Solution on these threats is creating a secure channel. The proposed system protocols consider three different factor (Touch, Angle and Time) of user behavior to know the authenticity or authorization of users. In this processing phase, here the touch signals are cleaned for some irregularities via cubic spline smoothing process. Then after the processing, the extracted information represented in vector and stored in database. Here the angle of user touch gets calculated. Also the counter is set for time parameter in NFC devices. All parameter are stored into database. The comparison can be done between stored feature of user and recent feature of user for validation. If user is valid or authenticated then file get transferred to authorized user device. At the end secure communication with NFC device is successful.
Keywords: Near Field Communication (NFC), Security, RFID, NFC tags, etc.
Abstract
Storytelling with Augmented Reality
Suyog Padmere, Abhishek Kunchikor, Shubham Madavi,Neha Kudu
DOI: 10.17148/IJARCCE.2018.7319
Abstract: Storytelling with augmented reality is a concept to enhance the way of learning, which will help schools to reduce the unnecessary cost invested into story book. This project tries to address how a Marker-based Augmented Reality, with the help of various applications, can enhance the current education system. In the existing education system, for example, teachers use blackboard teaching methods or show 2D images in the books to explain the elements in the real world. The above practice may or may not enhance the knowledge about the particular element of all the students in the class. But by introducing augmented reality into the education system, a teacher can show a 3D object to the students instead. The objects can be viewed from different angles left, right, top, and bottom. And the object can be scaled and animated. This idea of learning enables them to quickly grasp more and more as compared to conventional teaching approach. Thus, to enhance the education system, we proposed an idea to use augmented reality with various platforms.
Keywords: Marker, Scaling, Animation, Interactivity, Versatility, Vivid.
Abstract
Chit Fund Management System
K.Anandan, F.Alvin
DOI: 10.17148/IJARCCE.2018.7320
Abstract: The aim of this project is to develop a web application software package �CHIT FUND MANAGEMENT SYSTEM�. It is developed for easy transaction of data control various activities in the proposed system. Various process followed are automated in this project. The infrastructure module describes about the details of infrastructure of the Chit Fund. The modules are Super Admin, Agent, Collection Executives, and Member�s. The department modules give the details about the different types of bidding systems running in real-time. Each modules specific some roles of it and report structure also available and you can take 4 types of reports (Daily, Weekly, and Monthly, Yearly) etc. Chit fund software running the systematic web application it is used to agent, executive and members user friendly. Every panel login and check our data etc. Members can see the full reports and admin can see the full rights and maintenance of this application.
Keywords: PHP, Mysql, Chit Fund, Reports, Agent.
Abstract
Predicting Stock Market Investment Using Sentiment Analysis
Shantanu Pacharkar, Pavan Kulkarni, Yash Mishra, Amol Jagadambe, S.G.Shaikh
DOI: 10.17148/IJARCCE.2018.7321
Abstract: When a customer or a new comer invests into a stock market, they want to attain higher profits in short period of time. With less amount of knowledge, they have. The process of attaining higher profit gets very difficult. Sometimes this situation often creates more losses to customers rather than profit. Out of all the books offering investing advice to research papers analysing mathematical prediction models, the stock market has always been centre of attraction for public and academic interest. Number of publications propose strategies with good profits, while others demonstrate the random and unpredictable behaviour of share prices. Shared prices aren�t really based on how a company works. It�s based on how mass psychology works. Sentiment Analysis is one of the most popular technique which is widely been used in every industry. Extraction of sentiments from user�s comments is used in detecting the user view for a particular company. Sentiment Analysis can help in predicting the mood of people which affects the stock prices and thus can help in prediction of actual prices. Stock market prediction is the act of trying to determine the future value or other financial instrument traded on a financial exchange. In this paper, project is overall based upon the myriad data which is going to be mined from various stock related portals, social media, etc. and after fetching the desired data they have been used for the predictions of related results using NB classifier (Naive Bayes classifier).
Keywords: Sentiment Analysis, Stock Market, Public review, Naive Bayes classifier.
Abstract
Secure transportation internet of things of vehicles using ultrasonic sensor and ardiuno board in Obstacle Detection
Ms.Shweta Borse, Ms.Mayuri Sapkal, Mr.Ritesh Kolhe, Prof.K.D.Wagh
DOI: 10.17148/IJARCCE.2018.7322
Abstract: Vehicle accidents are one of the leading causes of fatalities. Because of not getting help on time, poor emergency facilities, people lose their lives. This project deals with the optimum solution to this drawback. The high demand of automobiles has also increased the traffic hazards and the road accidents. Life of the people is under high risk. This is because of the lack of best emergency facilities available in our country. An automatic alarm device for vehicle accidents is introduced in this project. The vehicular module is used to prevent vehicle accident. An accelerometer can be used in a car alarm application so that dangerous driving can be detected.When the obstacle will prevent then system will start to buzz
Keywords: Obstacles detection,alcohol detection,accelerometer,alarm device, Performance.
Abstract
Smart Band For Women Safety using Internet of Things (IoT)
Mr.Pampapathi B. M , Komal Singh , Madhavi V , Madhu B Yallaraddi , Mangala Desai
DOI: 10.17148/IJARCCE.2018.7323
Abstract: In today�s day to day life, we hear many unfortunate incidents taking place in women�s case. The popular inference is that women�s are not safe, as there are many drawbacks on both the sides of a coin-the victims and the law enforcers. An ages old practice is still continuing today in the form of harassment, blackmailing etc., Today cyber world or virtual world has opened up new ways to reach out the women attacked. The use of cyber space and its attendant anonymity that continues to influence negatively the social and cultural aspects of society. We propose to have a device which is the integration of multiple devices, hardware comprises of a wearable �Smart band� which continuously communicates with Smart phone that has access to the internet. The application is programmed and loaded with all the required data which includes Human behaviour and reactions to different situations like anger, fear and anxiety. This generates a signal which is transmitted to the smart phone. The software or application has access to GPS and Messaging services which is pre-programmed in such a way that whenever it receives emergency signal, it can send help request along with the location co -ordinates to the nearest Police station, relatives and the people in the near radius who have application. This action enables help instantaneously from the Police as well as Public in the near radius who can reach the victim with great accuracy.
Keywords: Smart Band, GPS/GSM, Smart phone application.
Abstract
A Survey on Feasibility and Suitability of Blockchain Techniques for the E-Voting Systems
Umut Can Çabuk, Eylül Adıgüzel, Enis Karaarslan*
DOI: 10.17148/IJARCCE.2018.7324
Abstract: In the second decade of the 21st century, blockchain definitely became one of the most trending computational technologies. This research aims to question the feasibility and suitability of using blockchain technology within e-voting systems, regarding both technical and non-technical aspects. In today's world, although the course of this spreading is considerably slow, several countries already use means of e-voting due to many social and economic reasons, which we further investigated. Nevertheless, the number of countries offering various e-government solutions, apart from e-voting, is significantly high. E-voting systems, naturally, require much more attention and assurance regarding potential security and anonymity issues, since voting is one of the few extremely critical governmental processes. Nevertheless, e-voting is not purely a governmental service, but many companies and non-profit organizations would benefit the cost-efficiency, scalability, remote accessibility, and ease of use that it provides. Blockchain technology is claimed to be able to address some, obviously not all, important security concerns, including anonymity, confidentiality, integrity, and non-repudiation. The analysis results presented in this article mostly confirm these claims.
Keywords: Blockchain, decentralized computing, e-democracy, electronic elections, e-voting
Abstract
Providing Privacy Using M-Diversity Algorithm along with K-Anonymity
Ashok Reddyboina, Pavan Koushik Bachu, Naveen Kumar Chennakesi
DOI: 10.17148/IJARCCE.2018.7325
Abstract: The data of any person can be divided into two categories. They are non-sensitive data and sensitive data. Coming to banking details, the bank�s database consists of large dataset regarding customers of the bank and their transactional details which are treated as most sensitive data. Any Intruder can get the sensitive data of the customer even the customer�s personal information is removed. Interlopers utilize a few information mining methods to recover the information and break down it and utilize the information for their own motivation. Gatecrashers can get the subtle elements of the managing an account clients through Quasi Identifier esteem which results to the homogeneity assault and membership disclosure assault. So to keep this information assaults this paper proposes new strategy which saves the security among the client's information through randomizing the client's information based on Quasi-Identifier.
Keywords: Anonymization, Regression, K-Anonymity, M-Diversity.
Abstract
The Survey of Classification Methods Using Wireless Mesh Networks
Sukhwinder Singh, Rajeev Sharma, Harjot Singh
DOI: 10.17148/IJARCCE.2018.7326
Abstract: WMNs are one of the insufficient commonly applied types of Mobile Ad-hoc NETworks (MANETs); several companies offer WMNs for broadband Internet access and for spreading the attention of wireless local area networks. Several particularities differentiate WMNs from MANETs. Principal, in WMNs, most of the circulation originates or terminates at the gateways (nodes connected to the wired infrastructure/Internet). Additional, in most requests, WMN nodes incline to be neatly distinguished as either stationary nodes or mobile nodes (utilizing the coverage afforded by the stationary nodes). Routing Protocol is an important typical of mesh topology network. The strengths and fault of routing protocols are reflected directly in WMN�s characteristics. Numerous compensations of WMNs over competing skills are directly enabled by the routing protocols. WMNs necessitate routing procedures that provide suppleness to work with different topologies, low latency for route (re-) discovery, low control traffic overhead, scalability with respect to mobility and network dimension, moveable user support, efficient delivery, QoS support, multicast which is significant for emergency response cases and more desirable one multipath. This paper reviews on various types of routing protocols that are used in wireless mesh networks. An evaluation of properties and proposed classification of WMN routing protocols. Also authors tried to make an evaluation of different structures of selected routing metrics and characteristics of selected routing protocols.
Keywords: Wireless Mesh Networks, MANET, Routing Protocols, Quality of Service and Characteristics in WMNs.
Abstract
Real-Time HCCA scheduler and MAC Protocol for IEEE 802.11e WLANs: A Review
Ishwinderpal Singh, Jashanpreet Singh, Joginder Singh
DOI: 10.17148/IJARCCE.2018.7327
Abstract: The IEEE 802.11 standard for wireless networks has been recently enhanced with the IEEE 802.11e amendment which introduces Quality of Service support. It provides differentiation mechanisms at the Medium Access Control layer, using two additional access functions: the Enhanced Distributed Channel Access (EDCA) function and the HCF Controlled Channel Access (HCCA) function. Only the HCCA mechanism is suitable for serving traffic streams with real-time requirements such as multimedia applications and Voice Over IP. The IEEE 802.11e standard does not specify a mandatory HCCA scheduling algorithm, but it offers a reference scheduler as the guideline in the resources scheduling design. In this paper we analyze four HCCA alternative schedulers to the reference one. They offer real-time guarantees proposing different solutions to the request of QoS and real-time support expressed by the increasing diffusion of multimedia applications. Real-Time HCCA (RTH), devised to support Quality of Service (QoS) at the flow level in an IEEE 802.11e network using the Hybrid Coordinator Function (HCF) Controlled Channel Access (HCCA) function. RTH separates online activities which take place at the frame transmission timescale, from offline activities which take place at the flow lifetime timescale. On the other hand, online scheduling is enforced simply by reading the pre-computed schedule, at little or no computational cost. RTH performance is assessed in terms of the admission control limit and of the amount of channel capacity that is left for contention-based access.
Keywords: Wireless Networks, Quality of Services, HCCA algorithm, IEEE 802.11e network.
Abstract
Customer Satisfaction Aware Optimal Multi Server Configuration For Profit Maximization in Cloud Computing
U.Naveen, Mr.S.Jambunathan
DOI: 10.17148/IJARCCE.2018.7328
Abstract: Along with the development of cloud computing, an increasing number of enterprises start to adopt cloud service, which promotes the emergence of many cloud service providers. For cloud service providers, how to configure their cloud service platforms to obtain the maximum profit becomes increasingly the focus that they pay attention to. In this paper, we take customer satisfaction into consideration to address this problem. Customer satisfaction affects the profit of cloud service providers in two ways. On one hand, the cloud configuration affects the quality of service which is an important factor affecting customer satisfaction. On the other hand, the customer satisfaction affects the request arrival rate of a cloud service provider.
Keywords: Cloud computing, cloud service, customer satisfaction.
Abstract
Acquaintance Allocation in Ontology Authoring
T.Vindhuja, Mr.S.Jambunathan
DOI: 10.17148/IJARCCE.2018.7329
Abstract: It is well-established that crafting ontologies has become a teamwork activity, as it requires a range of knowledge and skills hardly findable all together in a single person. For this reason collaborative aspects in ontology modeling have been investigated, and several works to support and enhance collaboration in this context have been presented. The requirements and features that have emerged from these studies highlight the need to support collaboration in an articulated way: from supporting the collaboration between who understands the domain to be represented (the Domain Expert, or DE) and who has proper expertise in ontology modeling (the Knowledge Engineer, or KE), to supporting communication, discussion, and decision making between (geographically) distributed teams of ontology contributors.
Keywords: The Knowledge Engineer, or KE, The Domain Expert, or DE.
Abstract
Smart Waste Management using IOT
Nagajothi.S, Durga.J, Jayasurya.K, Vishnuvarshini.M.D, Nadhiya.M
DOI: 10.17148/IJARCCE.2018.7330
Abstract: An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a Personal Computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. Modern embedded systems are often based on microcontrollers (i.e. CPUs with integrated memory and/or peripheral interfaces) but ordinary microprocessors (using external chips for memory and peripheral interface circuits) are also still common, especially in more complex systems. In either case, the processor(s) used may be types ranging from rather general purpose to very specialized in certain class of computations, or even custom designed for the application at hand. A common standard class of dedicated processors is the Digital Signal Processor (DSP).In this project, we present the Smart bin system that identifies hazardous gases of bin. The system is designed to collect data and to deliver the data through wireless mesh network. The system also employs duty cycle technique to reduce power consumption and to maximize operational time. The Smart bin system was tested in an outdoor environment. Through the test, we collected data and applied sense-making methods to obtain litter bin utilization and litter bin daily seasonality information. With such information, wastage bin providers and cleaning contractors are able to make better decision to increase productivity.
Keywords: IoT, BigData Analytics, Application Program Interface (API), Ultrasonic Sensor, Gas Sensor.
Abstract
Medical Image Compression using Block Processing with DCT
Himani, Pawan Kumar Mishra
DOI: 10.17148/IJARCCE.2018.7331
Abstract: To provide an efficient image compression method for medical imaging , an effective approach Discrete Cosine Transform (DCT) with block processing is presented in this paper. To stimulate image transformation, discrete cosine transformation is used first. The discrete cosine transformation transform image into several parts by keeping image visual quality. DCT is most commonly used transformation based on fourier transformation. After successful transformation using DCT method block processing is applied on transformed image. In block processing operations are performed on blocks of image instead processing whole image. In our proposed paper block processing on image is done with 8X8 block. Experimental results shows that block processing with dct compress images faster compared with conventional DCT and older variant of other variant of DCT.
Keywords: Image Compression, Medical Imaging, PSNR, MSE, Compression Ratio (CR), Compression size, Block processing. CT, MRI, PET.
Abstract
IoT Based Smart Car Parking System Using Android Application
B.D. Deore, S. R. Kurkute, Pooja Bhalerao, Kajal Barve, Mokshada Deore
DOI: 10.17148/IJARCCE.2018.7332
Abstract:
Abstract: Mainly in metropolitan cities now a day�s one of the major issue is availability of parking space. During the busy hours, the reserved parking area gets full completely which creates lot of confusion to the car owner to search vehicle among other vehicles in the parking area. To overcome this difficulty, it is very necessary to modernise the parking of commercial environment system. For designing advance parking slots one of the best solutions is to develop parking system with consideration the reservation of parking slot with the optimal parking space which is mainly dependent on cost and time. The cost function must also include the parking cost and proximity to the destination. The time driven sequence method solve the issue of parking using slot allocation method these proper process an android application which is used to implement a prototype Smart car Parking System based on Reservation(SPSR). These allow the passenger to easily locate and reserved the vehicle parking spaces with the help of IoT (Internet of Things) with slot allocation method.
Keywords: SPSR, IoT, Android Application, Node MCU, RFID, SPS, Parking Space Detection.
Abstract
IOT Based Electronic Monitoring System Using Raspberry pi
Vinitha.M, Mahendran.R, Janani.B
DOI: 10.17148/IJARCCE.2018.7333
Abstract: This paper proposes the design of Inter of Things (IoT) based home automation system using Raspberry pi. Currently in day today�s life can hardly find a house without a home automation system. This project is intended to construct a home automation system that uses any device to control the electronic appliances. This home automation system is based on IoT. Home automation is very exciting field when it uses new technologies like Internet of Things (IoT). Raspberry pi is credit card size computer. Raspberry pi supports large number of peripherals. Raspberry pi is having different communication media like Ethernet port, HDMI port, USB port, Display Serial Interface, Camera Serial Interface, Bluetooth, Bluetooth low energy. It allows to control number of home appliances simultaneously. The local server is created on Raspberry pi.Home Automation System is a web based application that allows the user to monitor and control their home using their any device. This system requires a micro SD card with an OS for the Raspberry Pi. In this project OS Raspbian which is mostly preferred for projects, before copying the OS on the micro SD card copy a file named NOOBS which helps to download the latest OS�s for the Raspberry PI as well as works as an interface like BIOS in windows. After booting the OS we installed Python 2.7, 3.0, Scratch etc. for programming. User required to use different devices like smart phones, iphones, Tablets to operate the home appliances with the help of UI created on web page. Home automation is becoming more and more popular day by day due to its numerous advantages. This can be achieved by local networking or by remote control. The Raspberry Pi is a low cost single-board computer which has recently become very popular. Via internet (webpage) user can access or operate any connected device from anywhere and system also checks for any device left switched on by user to switch it off. With the use of various sensors (Infrared sensors, temperature sensors) and actuators entire connection is established between Ethernet shield and the device. System would also be able to monitor presence of any person inside the room and using this data, user can manage the operability of any connected devices. Modules can be integrated as and when required for easing the task and effort of human.
Keywords: HDMI, IoT, Raspberry PI.
Abstract
The Blockless Distributed Ledger: A Cryptocurrency for the IoT Industry
Shloka Bhalgat
DOI: 10.17148/IJARCCE.2018.7334
Abstract: The need for decentralized consensus system and the risks associated with centralization suggests a solution for storing transactions in a distributed ledger and a standard permissionless protocol which governs the same. A Blockless Distributed Ledger is primarily based on a DAG (Directed Acyclic Graph) for storing transactions. Unlike Blockchain there are no miners which removes any possibility of decoupling. Furthermore, it offers features for machine to machine micropayment system using a cryptocurrency for the Internet of Things industry known as �IOTA�. The main aim of IoT industry now is to connect daily used objects to the Internet which have the ability of sensing and actuation which may or may not involve humans. This paper discusses how a Blockless Distributed Ledger implemented by �IOTA�, stands apart over a traditional Blockchain of which �Bitcoin� is a well-known example for storing transactions as well as description of a use case involving a smart cable and a smart socket which pays for its electricity through IOTA and shares its remaining power with other cables.
Keywords: Directed Acyclic Graph (DAG), IOTA, Bitcoin, micropayments, Transactions per Second (TPS)
Abstract
Design and Simulation of an Energy Scavenger for Microsystem
Prof. Omprakash K. Piprewar, Abhilesh D. Kedar, Aditya A. Verma, Latika S. Raut, Pinki V. Kumbhare, Rajashree S. Karoo, Rajeshree V. Zade
DOI: 10.17148/IJARCCE.2018.7335
Abstract: Energy scavenging is without any doubt a very attractive technique for a wide variety of self-powered Microsystems i.e. wireless sensors, biomedical implants, military monitoring devices and etc. The chip fabrication set up helps us to fabricate and integrate energy scavenger with electronics due to homogeneity. Piezoelectric power generator made by MEMS technology can scavenge power from low-level ambient vibration sources. An attempt has been made to design, optimize the dimensions of cantilever based scavenger and evaluate performance of the system for variety of vibration source and load. The design and simulation of MEMS piezoelectric cantilever beam single, array of cantilever with parallel plate electrode is carried out. The micro-energy harvester is formed using a silicon substrate, lead zirconium titanate (PZT) piezoelectric layer, Pt electrodes and silicon proof mass. The 0.279V output voltage of the piezoelectric energy scavenger is achieved at 2300Hz under 1g (g=9.81) acceleration. The FOM is 1023V/mm3.g and power is 78 �W for load resistance 1000?. Finite element simulation was conducted using comsol Multiphysics to obtain the device resonance frequency, deflection of cantilever beam, FOM, Electric potential for optimum dimensions.
Keywords: MEMS, piezoelectric, energy Scavenging.
Abstract
A Review on Mobile Cloud Computing
T.Fathima Barveen, K.Indhumathi, V.S.Lakshmi Priya, M.Keerthika
DOI: 10.17148/IJARCCE.2018.7336
Abstract: Cloud computing is the convey of on-demand computing services from applications to storage and processing power typically over the web .Cloud computing is emerging as one of the most important branch for providing seamless applications on mobile devices. This paper, cloud computing is bringing up as a new and speedily developing and accepted way of providing better and efficient applications for mobile devices. It provides mobile users with data repository and processing services on a cloud computing platform Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile circumstances from which all the entire data and complicated computing subjects can be processed in clouds and mobile devices do not need a powerful configuration like CPU speed, memory capacity etc.,
Keywords: Mobile cloud computing (MCC), SaaS, PaaS, IaaS, M- Learning, OOS, HPC.
Abstract
An Decision Support System to Analyse Customer Behaviour Based on Map Reduce Based C4.5 Algorithm
Mausami Verma, Neha Chandrakar , Rahul Kumar Chawda
DOI: 10.17148/IJARCCE.2018.7337
Abstract: Big data is one of the most raising technology trends that have the capability for significantly changing the way business organizations use customer behaviour to analyse and transform it into valuable insights. Also decision trees can be used efficiently in the decision making analysis under uncertainty which provides a variety of essential results. Customer behaviour analytics have implemented in many systems, though still it�s a developing and unexplored market has greater potential for better advancements. One of the major challenges for knowledge discovery and data mining systems stands in developing their data analysis capability to discover out of the ordinary models in the data. The current work proposes an implementation of C4.5 algorithm using Map Reduce. The experimental results reveal that C4.5 algorithm performs better in case of prediction and accuracy for analysing customer behaviour.
Keywords: Big data, Hadoop, Map Reduce, Web mining, C4.5 Algorithm.
Abstract
An Approach to Predict Train Delay Using Big Data Analytic Approaches
Ajay Patel, Manish Jaiswal, Rahul Kumar Chawda
DOI: 10.17148/IJARCCE.2018.7338
Abstract: Driven by specialized analytics systems and software, big data analytics can point the way to various business benefits, including new revenue opportunities, more effective marketing, better customer service, improved operational efficiency and competitive advantages over rivals. The public transportation industry has been at the forefront in utilizing and implementing Analytics and Big Data, from ridership forecasting to transit operations Rail transit systems have been especially involved with these IT concepts, and tend to be especially amenable to the advantages of Analytics and Big Data because they are generally closed systems that involve sophisticated processing of large volumes of data. The more that public transportation professionals and decision makers understand the role of Analytics and Big Data in their industry in perspective, the more effectively they will be able to utilize its promise. The current work aims to develop a system to predict train delay using Big Data analytic approaches.
Keywords: Big Data Analytics, Predictive modelling, Big-Data, Train Delay prediction, SVM.
Abstract
Enhancing the Quality of E-Learning Systems by Using Big Data and Cognitive Computing Approaches
Shivangi Jamuda, Sanju Rai , Rahul Kumar Chawda
DOI: 10.17148/IJARCCE.2018.7339
Abstract: E-learning has evolved from its initial stage of using standalone computers and devices for delivering multimedia content to a more comprehensive and integrated virtual learning system. With cloud-based learning management systems, e-learning is likely to gain more popularity. Today, increasing number of institutions is adopting it to achieve excellence in educational practices. In Cognitive Storage Computers can be taught to learn the difference between high value and low value data i.e. memories or information, and this differentiation can be used to determine what is stored, where it is stored and for how long.The main of this paper is discuss the importance of utilizing the concept of Cognitive storage for improving the performance of E-Learning Systems. E-Learning system can essentially be modified to learn the difference between primary and secondary contents, so that it can retain only updated educational data for the maximum benefit of users.
Keywords: Cognitive computing ,Cognitive storage, Big-Data, E-Learning, Deep Learning.
Abstract
Smartphone Based Optical Character Recognition for Indian Language
Abhishek R. Katyare, Pradeep R. Todkar, Shivam C. Bapat, Mayur K. Gunjal, Prof. Apurva N. Varade
DOI: 10.17148/IJARCCE.2018.7340
Abstract: : India is a diverse country with various cultural and traditional differences. There are more than 12 distinguished different languages in the country. Smartphone�s have been known as most commonly used electronic device in daily life today. As hardware embedded in Smartphone�s can perform many more tasks than traditional phones, the Smartphone�s are no longer just a communication device but also considered as a powerful computing device which is able to capture images, record videos, etc. With advancement of technology, it is possible to apply some techniques to perform text detection and translation. Therefore, an application that allows Smartphone�s to capture an image and extract the text from it to translate into Indian languages is no longer a dream. In this paper, an Android app is proposed by integrating Tesseract OCR engine. Optical Character Recognition (OCR) is designed in a way that automatically identifies the language of the input document for further processing.
Keywords: Android, OCR, text translator, Image Processing.
Abstract
WebApp for Document Verification and Challan Generation (RTO)
Manjeet Marodkar, Mansi Singh, Yash Goyal, Shubham Chouke, Mayur Ganvir,Anurag Rallapalli
DOI: 10.17148/IJARCCE.2018.7341
Abstract: The term Digitization refers to the process of converting information into digital form. Digitization is taking the country by storm, digitization has formed its roots in almost every field of interest India. In this growing digital India it is very important to automate the process of document verification and Challan generation by RTO. Also the existing scenario of RTO does not necessarily enforce traffic rules and laws as effectively as it should, which sometimes leads to these rules being overlooked by the drivers, vehicle owners and even the traffic police officers. We aim at providing drivers and vehicle users the facility of not carrying around unnecessary paperwork as this application which will store their DL and VRC can be accessed from any location at any given time. The proposed approach in this paper tackles with all these issues by automating the whole process of registration for D.L and V.R.C and viewing and accessing these documents by authorized users and traffic police and generation of e-challan and payment in case any traffic rule violation is observed. Also the current RTO scenario does not provide any way to detect frauds and unauthorized user of vehicles.
Keywords: Digitization. Document Verification, e-challan generation, driving license, vehicle registration certificate.
Abstract
Fraud Detection System for Banking Services
Falguni Patil, Mansi Vyas, Naman Jain, Rameez Raza, Laxman J. Deokate
DOI: 10.17148/IJARCCE.2018.7342
Abstract: Bank fraud is obtaining money, assets, or other valuable properties owned by financial institutions, or obtain money from depositors by use of potentially illegal means. Bank frauds have always remained an attractive source of revenue for the fraudsters. Frauds not only affect the bank customers but also result in loss to the bank in terms of profitability and image. These issues can�t be processed manually, requiring a series of antifraud measures. Fraud detection is not only concerned with capturing the fraudulent activities, but also implementing processes of continuous monitoring, to capture them as quickly as possible. Data mining technology and machine learning techniques will be applied to form an Anti-Fraud System, which will collect all the information regarding the transactions. The system will then determine whether a transaction is fraudulent or legit.
Keywords: Data mining, Machine learning, Fraud detection, Anti-Fraud system.
Abstract
Arduino Based Smart Irrigation System
Madhu Vanthi.K, Kavipriya.R, DivyaPriya.D
DOI: 10.17148/IJARCCE.2018.7343
Abstract: India is the crop growing based country. Our ancient publics entirely depended on the farming realizing. Agriculture is a cause of living of mainstream Indians and has great control on the economy of the country. In dry zones or in situation of lacking rainfall, irrigation comes to be difficult. So, it wants to be involuntary for correct produce and measured at all for farmer protection. Increasing energy costs and decreasing water supplies point out the need for healthier water management. Irrigation management is a hard decision making progression to control when and how much water to relate to a growing crop to meet exact management objectives. If the farmer is far away from the agricultural land he will not be noticed of current environments. So, capable aquatic association plays a vital role in the irrigated agricultural harvesting structures. A small cost another key for well-organized aquatic checking presently in use is drip irrigation structures that contain of an automatic processor to turn on & off the control values, which in turn helps the farmers by management the water supply to the crop fields and supplementary keeps the humidity levels of soil that helps in better crop production. This project probes into the design of the mindless irrigation system based on Arduino and IoT technology. This Embedded development is to intention and growth a low cost feature which is established on inserted stage for aquatic irrigation system. This mission uses temperature and soil moisture sensors to sense the water amount present in farming. The project uses Arduino board that process the information and acts according to the data. The goal of the operation was to prove that the programmed irrigation can be used to decrease aquatic use.
Keywords: Water-saving irrigation, wireless device, efficiency, energy, time saving.
Abstract
Detection of crime and non-crime tweets using Twitter
Nakul Sharma, Anupama dhamne, Nisha more, Vikash rathi, Ankita supekar
DOI: 10.17148/IJARCCE.2018.7344
Abstract: As the speedy growth of Twitter in social media, researchers get attracted towards the use of social media data for analysis. Twitter is one of the widely used social media platform to express thoughts. This paper approaches for analyzing tweets using sentiment mining in which classify highly unstructured data on Twitter and second is data mining. There are 500 million users of Twitter. The limit of character in twitter is 140 character because of this user uses shorthand notation example �ok� can be used as �kk�. Analysis of tweets contains misspellings and grammatical error.
Keywords: Social network, natural language processing, Machine Learning, sentiment analysis and data mining.
Abstract
Smart Multiuser Charging Station-Technical Review
B. D. Deore, S. R. Kurkute, P. R. Ghatol, V. S. Vaidya, S. H. Ansari
DOI: 10.17148/IJARCCE.2018.7345
Abstract: In today�s technological era with developing in technology the use of electronics devices also increases. The use of high-tech electronic devices makes the system more efficient which results in improvement in productivity as well as reduces the time factor. One of the most essential electronic devices is cell phone which gives the connectivity to the entire world. For the gracefully utilisations of electronic device it is very essential to maintain the power requirement of electronic device. In privet area is it easy to maintain this power requirement but in public area such as in travelling or in outside filled many time it is some what difficult to fulfil the power requirement. One of solution given by some researcher is portable charging station. The important factor which has been taken care is security of electronic devices during charging. In this paper we are going to discuss different system for charging of electronic devices especially cell phone along with the technology used for giving a proper security to device.
Keywords: Biometric, arduino, compartment, fingerprint.
Abstract
Criminal Identification System Using Face Detection and Recognition
Piyush Kakkar, Mr. Vibhor Sharma
DOI: 10.17148/IJARCCE.2018.7346
Abstract: There is an abnormal increase in the crime rate and also the number of criminals is increasing, this leads towards a great concern about the security issues. Crime preventions and criminal identification are the primary issues before the police personnel, since property and lives protection are the basic concerns of the police but to combat the crime, the availability of police personnel is limited. With the advent of security technology, cameras especially CCTV have been installed in many public and private areas to provide surveillance activities. The footage of the CCTV can be used to identify suspects on scene. In this paper, an automated facial recognition system for criminal database was proposed using known Haar feature-based cascade classifier. This system will be able to detect face and recognize face automatically in real time. An accurate location of the face is still a challenging task. Viola-Jones framework has been widely used by researchers in order to detect the location of faces and objects in a given image. Face detection classifiers are shared by public communities, such as OpenCV.
Keywords: Criminal Identification; CCTV; facial recognition; Haar classifier; real-time; Viola-Jones; OpenCV.
Abstract
A Shuffled Leaping-Based Data-Gathering Algorithm for Industrial WSNs with a Mobile Sink
Jasvir Kaur*, Deepinderjeet Kaur Dhaliwal
DOI: 10.17148/IJARCCE.2018.7347
Abstract: Wireless Sensor Networks (WSNs) is generally applied in various industrial applications, which involve gathering a huge amount of heterogeneous sensory data. The various data gathering techniques for WSNs cannot avoid the data loss problem in local or whole distribution area. Network loss problem affects the network connectivity and decreases the network lifetime. Hence, we propose a shuffled leaping algorithm data-gathering algorithm (SLA) for WSNs with a mobile sink. A novel Density based cluster formation method is introduced. The cluster head nodes of the constructed our Proposed algorithm balance the load of the whole network, reduce the energy consumption, solve the network loss problem, and increase the network lifetime.
Keywords: Data-gathering scheme, cluster, cluster head, mobile sink, wireless sensor networks.
Abstract
Secured Password Authentication using Image an Auto Dialing
Mr.S.Jambunathan, Gouthaman.P
DOI: 10.17148/IJARCCE.2018.7348
Abstract: This paper is developed as a web application which can be accessed universally. In this project user get their application form from the respective interested banking site. All that a normal user would have to do is to browse through the different pages of the site and do whatever transaction he/she wants. This proves to be much more beneficial and also more efficient to maintain than the conventional method of banking. These cards provide a safer way to use money from your personal account without using a check or carrying around large amounts of cash. Before this process the user has to register with their user name, password and image. During Registration user gives their personal details such as address, phone number, mail id. User will be intimated with banks rules and regulations. If the user wants to apply e banking means they can apply continuously. After this process bank will provide unique pin number to the registered user. Administrator will update the database with the information got from registered user. Now user gets the authentication to logon to the system, and also they can check their account status. User can also change their pin number and view their transaction. And also transfer their amount in locally or foreign exchange. To deposit or withdrawal amount from the banks manually is a time consuming process. To make this manual process fast this proposed system allows transferring amount another account. . This proposed system deals with all transactions of actual.
Keywords: Password Authentication, SSL/TLS, E-MONEY
Abstract
Student Performance Prediction And Analysis
Ditika Bhanushali, Seher Khan, Mohommad Madhia, Shoumik Majumdar
DOI: 10.17148/IJARCCE.2018.7349
Abstract: The main objective of higher education institutions is to provide quality education to its students. One way to achieve highest level of quality in higher education system is by discovering knowledge for prediction regarding enrolment of students in a particular course, alienation of traditional classroom teaching model, detection of unfair means used in online examination, detection of abnormal values in the result sheets of the students, prediction about students� performance and so on. The knowledge is hidden among the educational data set and it is extractable through data mining techniques. This project is developed to justify the capabilities of students in various subjects. In this, the classification task is used to evaluate students� performance and as there are many approaches that are used for data classification, the decision tree method and probabilistic classification method is used here. By this task we extract knowledge that describes students� performance in end semester examination. It helps earlier in identifying the dropouts and students who need special attention and allow the teacher to provide appropriate advising/counseling. In addition to this, we will also compare the results generated by two classification algorithms, namely ID3 and Na�ve Based algorithm, and thereby determine which algorithm is more accurate.
Keywords: Data Set, Data Mining, Classification Task, ID3 Algorithm, Na�ve Based Algorithm.
Abstract
VoIP Intrusion Detection for secure transmission using PLRT (Packet Level Restraining Technique) under DDOS Attack
Humma Shoket, Jagdeep Singh Aulakh
DOI: 10.17148/IJARCCE.2018.7350
Abstract: Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing security holes of the Internet. Moreover, given that voice communication is time sensitive and uses a suite of inter-acting protocols, VoIP exposes new forms of vulnerabilities to malicious attacks The VOIP services in developed countries because of the existence of technologies i.e. 3G, 4G and LTE. VOIP is the main issue in developing countries because of the absence of these technologies as several main telecommunication companies are stressing on combining their system with VOIP technologies for providing the enjoyment of these less expensive services to the users. The PLRT technique is proposed for DDos Attack Detection and prevention
Keywords: VoIP, PSJA, PLRT.
Abstract
Security System for Online Transaction
Amol More, Archana Karbhari, Prem Gorivale, Sridhar Iyer
DOI: 10.17148/IJARCCE.2018.7351
Abstract: Phishing is one of the assaults that have become famous these days. It's a type of robbery tried with an intention to obtain exclusive and private data of people or companies for monetary or other profits. Inside the latest component there had been many reports on phishing assault in lots of financial domains; such as banking. It has emerged as a severe threat to establishments that deal with monetary transactions. If those threats aren�t addressed thoroughly, people can�t trust on-line transactions that contain due authentication through credentials. Many solutions came to resolve this kind of identity robbery. We aim to develop a new approach based on visual cryptography to cope with this issue of phishing. This can automatically preserve the privacy of captcha. It achieves this through dividing the original photograph into two shares which might to be saved in one of a kind database. The decryption is possible best when adversaries can provide both shares at a time. The character shares can�t display the authentic captcha. The planned frame work has two phases. Within the first phase, a brand new user registers himself. When the new user is processing for the registration, the net application chooses a picture; then the picture is split into two share pictures. Where as in authentication phase, the same user is asked for the share allotted him during registration phase. Solely the shares are accessible only with the original user. Therefore this phishing attacks can be effectively prevented.
Keywords: Visual cryptography, captcha, phishing, security, online transaction.
Abstract
Secure Cloud Storage of Health Records
P. Vishnu Sagar, RVLSN Sastry
DOI: 10.17148/IJARCCE.2018.7352
Abstract: The Distributed healthcare data Keyword cloud computing system considerably facilitates secure and efficient patient treatment for medical consultation by sharing personal health information among the healthcare providers. This system should bring about the challenge of keeping both the data confidentiality and patients� identity privacy simultaneously. This research focuses on the secure storage of Patient-Centered e-Health (SSPCEH) concept by introducing its importance and demonstrating a multidisciplinary project that combines advanced technologies. The project links several aspects of SSPCEH functionality a) homecare telemedicine technologies) e-prescribing, referral, e-learning (c) state-of-the-art technologies like cloud computing and Service Oriented Architecture (SOA)(d)privacies preserving and secure storage This paper provides insights of the SSPCEH concept and the current stages of the project. In doing so, we aim to increase the awareness of this significant work and disseminate the knowledge gained so far through our work. In this project we implement and identity-based record retrieval process with uses a cryptography technique of identity-based privacy protection
Keywords: Personal Healthcare Record; Cloud Computing; Healthcare Information Systems Integration, privacy Protection, Identify based Encryption
Abstract
Minimum Cost Blocking Problem in Multi-path Interconnected Wireless Networks.
D. Siva Kavya, D.Anusha, D.Mahima, Ch. Hari Prasad
DOI: 10.17148/IJARCCE.2018.7353
Abstract: This paper will address the issues in multipath directing issues in interconnected remote systems. In this paper we are showing the Base cost blocking issue in interconnected system, for example, remote work organize. Here we are proposing a MCB calculation which will help us to choose the ideal course/way for information transmission among the hubs. In this paper we are thinking about the three kinds of assaults, for example, blocking, node isolation and network partitioning. This MCB calculation is capable to create different ways among the hubs with the affirmation about the malignant hubs.
Keywords: MCB problem, blocking, network-partitioning, node isolation, Inter connected network.
Abstract
Tele-Monitoring Device for Cardiorespiration Activity
Rachit Patel, Rashi Dubey, Sidhi Mishra, Subhadra Kumari Bharti
DOI: 10.17148/IJARCCE.2018.7354
Abstract: With increasing air pollution & changing lifestyle health monitoring has become indispensible. The system proposed in this paper is an advanced solution for measuring & monitoring the important parameters such as heart beat rate, oxygen saturation level& storing the measured data on cloud memory through IOT (Internet of Things) .The gas sensor is used to measure the CO2 level of the breathing air and a pulse oximetry sensor intended for pulse detection & oxygen saturation level in a human body. The device includes an Arduino Uno for data processing and a Wi-Fi module for data transmission.
Keywords: Arduino Uno, pulse Oximetry sensor (MAX30100), Gas sensor (MQ135), Arduino IDE, Wi-Fi module (ESP8266).
Abstract
Android Voting System Using Facial Recognition
Divyank Madan, Aaditya Suri, Mr. Saurabh Gautam
DOI: 10.17148/IJARCCE.2018.7355
Abstract: With the conceptualization of e-Voting, the voting process will be revolutionized. Till date, voting has been conducted either manually through ballot papers or using the electronic voting machines (EVMs) that are based on the Direct Response Electronic (DRE) or the Identical Ballot Boxes. For multinational companies and organizations, a more digitalized and convenient method of voting has been in demand. With the e-voting Android application, voting can be conducted using any Android mobile device. Our proposed application system will allow users to cast a vote on any survey question created by an administrator. Login will be fully authenticated using a novel two step process � finger printing and facial recognition. Post development of this application, several enhancements can be made to the system, in order to fully customize the experience for the users.
Keywords: ICT, Android, voting, application, e-voting
Abstract
Social Media Assist Bot
Devata Anekar, Aniruddha Madurwar, Payal Hemane, Chandrakant More, Rahul Porwal
DOI: 10.17148/IJARCCE.2018.7356
Abstract: A social media consist of a wide range and variety of information or data in the form of Pictures, Videos, Audios or Text, which are encapsulated in a said structure called posts. A social media platform would always have a number of posts in its incoming and outgoing data traffic so managing and maintaining the efficiency of being relevant specifically to a certain user is very difficult. So we propose on developing a bot to handle the traffic. The bot will assist user in filtering the new post update and letting user know which post are of interest to the user by classifying the feed updates using data mining and Machine Learning, thus helping user to navigate through refined posts according to user�s interest. It will be plug in to our social media platform, which will store all the posts that are updated on news feed, and then we will use machine learning algorithms to filter the post data to obtain the post that are relevant to the interest stated.
Keywords: Machine Learning; Text Analysis; Semantic Analysis.
Abstract
Crop Rate Console System Rahul Wankhede, Rahul Gaikwad, Lalit Ghavghave, Bhushan Shende, Rohit Barsagade
P. Vishnu Sagar, RVLSN Sastry
DOI: 10.17148/IJARCCE.2018.7357
Abstract: Today, the revolution in technology is offering huge advantages. The world has seen a massive and rapid growth in technology and hence, the human race has become more dependent and looking for more comfort every day. But the farmers of India are not able to use that technology for welfare of them. So we form a web application for them, i.e. Crop Rate Console System .The agriculture and farming has always been a focus for all over the world. The farmers do not have any platform for selling their products to the market directly online. It is a much needed platform for not only India but also all over the world. Crop Rate Console System to be a platform that connects farmers with various market places, various food processing industries and agricultural officer.
Keywords: Farmers, Market places, Food Processing Industries, Agricultural Officer.
Abstract
IR based Theatre Piracy Reduction by using Image Processing
Gouri Raut, Kajal Bakade, Proff. S.V.Kulkarni
DOI: 10.17148/IJARCCE.2018.7358
Abstract: The system locates the camera, and then neutralizes it. This paper intends to aid in maintaining the safety and security of people by developing an application with the help of which spy cameras can easily be detected, also the location and the perpetrator�s identity would be sent to the concerned authorities. It finds its application in courts and places where cameras are not allowed. In this paper, we propose another system for recognizing and deactivating advanced cameras in photography restricted regions. This procedure will find a camera and afterward kill it. It utilizes picture handling for identifying camera's focal point. In the wake of finding camera's focal point an infrared light will be coordinated towards that focal point which will twist the picture by overexposure. The coordinated infrared light causes solid lessening in the nature of the picture. It doesn't meddle with camera's activity and it is innocuous to the camera client. The proposed work has applications, for example, averting theft at theatres. This work will serve advantageous at spots, for example, galleries, enterprises, recorded landmarks, shows, evolving rooms, shopping centres, gems stores where keeping up mystery is enormous issue.
Keywords: Image processing, Camera, IR transmitter.
Abstract
Cyber Security Challenges In IoT
S.Dharini Iswarya, K.Priyadharshini, R.Minakumari, S.Anbazhaki
DOI: 10.17148/IJARCCE.2018.7359
Abstract: Nowadays, the evolution of the world of the Internet of Thing is promising the explosion of a number of devices connected to the Internet. According to Cisco analysts (Evans, 2011), in 2015 there were more than 25 billion devices connected and with a projection of more than 50 billion devices connected by 2020. Also, the new business model that the Internet of Things technologies enable are manufacturing a super-fast increase of machine-to-machine communications. This is a real market innovation moment that opens up a lot chances for enterprises and, generally speaking, for the entire society.[1] Inherently, it increases dramatically the security problems, which could discomfit a sizeable part of Internet of Things� potential benefits that McKinsey valuates at approximately $4 trillion. Indeed, a recent survey by HP reports that the 70% of devices contain defenselessness. The intent of this segment is to give an overview of present trends about cyber security involvement and a glimpse of what the future of the Internet of Things will convey.
Keywords: Security, Internet of Things,Cyber-attack, Security threats, Secure Reprogrammable Networks.
Abstract
Analysis of HCV Risk Factor among PWID’s in India- An Approach using Naive Bayes Classifier
M. Gomathy, Saravanamurthy P. Sakthivel
DOI: 10.17148/IJARCCE.2018.7360
Abstract: The huge amount of data generated by healthcare transactions are too complex and voluminous to be processed and analyzed by traditional methods as the way in which healthcare is financed is critical for equity in access to healthcare. At present the proportion of public resources committed to healthcare in India is one of the lowest in the world, with less than one-fifth of health expenditure being publicly financed. To overcome this issue the researchers, use data mining techniques. Data mining through various algorithms provides the methodology and technology to transform large amount of data into useful information for decision making and patients receive better, more affordable healthcare services. In this paper, Naive Bayes algorithm is used to predict the risk factors associated with HCV infection among People Who Inject Drugs (PWID�s) in India. Naive Bayes algorithm are the most popular algorithms for rule based classification as it requires minimal number of attributes.
Keywords: Data Mining, Naive Bayes Algorithm, PWID, HCV.
Abstract
Proposed System for Data Mining Using Clustering
Pratik Sohala, Harshil Patel, Aniket Patel, Hezal Lopes
DOI: 10.17148/IJARCCE.2018.7361
Abstract: In present scenario most of the service centres manage their accounts through manual process i.e. paper work which is very tedious to create job cards, no record of parts and details of customers but this application will help in computerizing entire service centre system using software application. This proposed system is useful for any service centre for managing information of availability of spare parts, customer�s information, managing accounts. This application can be useful for private service centres and franchise service centre. In service centre first job is to make job card so work can be done according to it, managing spare parts is a important task where details of spare parts is accurately managed i.e. part number, part type ,price, when it was purchased and from which retailer had purchased, even maintain records of all of customers is very important as per business perspective to grow business there is need to maintain record of each and every customer i.e. what was last service date ,what work was done in last servicing what issue customer is facing now ,what parts we used while serving their bikes ,and generating bills according to work .it also shows list of customers whose last service exceed more than 3 months as to contact them and send them reminder which helps to grow business and maintain customer relationships as details of parts changes over time there will be another panel where you can edit if details changes which makes it more flexible. There will be another panel for the Data Representation with the help of clustering algorithm for Data Mining purposes as the data will grow exponential as the proposed system will be used in the real world. Thus seeing the limitation of the current system we propose the new computerized system.
Keywords: Data Mining, Data Analysis, Clustering.
Abstract
Implementation of Web Scraper Bot: Web Harvesting
NandanAS, Rahul S Niranjan, PB Rahul Choudhary, Karthik Srinivas, Nilesh Kumar Singh, Kavya P Hathwar
DOI: 10.17148/IJARCCE.2018.7362
Abstract: Web Harvesting or Web-Scraping also called web data extraction, are various methods of collecting information from across the internet. It is essentially a form of data mining. Programs are written to mine the data and to convert it into a meaningful and useful structure. In this paper we demonstrate a code/program written to harvest web-data from a particular web-site and to display the same in different file formats. The university results of a class of Students arescraped from the web and are being stored and calculated. This code can be reused several number of times and may also be altered to suit the desired/intended application. Creating a customized score sheet of all students in the college or university is a tedious task. In this paper a web scraper bot is employed to do the same within minutes.
Keywords: Web Harvesting or Web-Scraping, essentially a form of data mining, reused several number of times, Creating a customized score sheet, web scraper bot, regular expression (regex).
Abstract
Implementation of Intelligent Tutoring System
Ms. Akansha Chaudhary, Ms. Preeti Mali , Ms. Pooja Chaudhari , Ms.Sulekha Shardul , Prof.M.R.Tiwari
DOI: 10.17148/IJARCCE.2018.7363
Abstract: Educational Data Mining (EDM) is the process of converting raw data from Educational systems to useful information that can be used by educational software Developers, students, teachers, parents, and other educational researchers. Currently there is an increasing interest in data mining and educational systems, making educational data mining as a new growing research community. This work provides the application of data mining to traditional educational systems, particular web-based courses, well-known learning content management systems, and adaptive and intelligent web-based educational systems. Each of these systems has different data source and objectives for knowledge discovering. India�s education system is traditional; it has not under gone changes according to the existing technology. The main objective of this model is to predict the actions of new students for improving the tutoring feedback provided by an intelligent tutoring system. This Portal will also help to conduct online exams in class rooms, Teacher can create and upload test, after that teacher need to activate and the test will available for students. It also have features like the Download Notes, View Notes, feedback option and many more. In the implemented intelligent tutoring system student can learn through the active tutor. Student also ask the questions to tutor through the chat window. Student analysis can be done thought the online examination. The implemented model has been validated using student logs collected in a Computer laboratory. As a result of this validation, we concluded that the model can provide reasonably good predictions and can support tutoring feedback that is better adapted to each student type.
Keywords: Educational Data Mining, e-learning, Procedural Training, Intelligent Tutoring Systems.
Abstract
Smart Parking System and It’s Simulation
Gaurav Surtani, Sakshi Gupta, Shikha Singh, Madhuri Yadav, Mr. S.S.Kulkarni
DOI: 10.17148/IJARCCE.2018.7364
Abstract: The number of vehicles in the world is increasing rapidly due to the hike in demands. Increasing population density in urban centers calls for adequate provision of service and infrastructure to meet the needs of the residents. This is where the concept of Smart Cities has gained great popularity. With the help of Internet of things, we can connect the surrounding environment to the internet and access those things from any remote location. This will help boost productivity and reliability of already existing infrastructure and will also help in future planning[1]. In this paper, we have proposed to design a smart parking system which enables the user to find the nearest parking lots and also informs the user about any vacancies in the parking lots using IoT. The main purpose is to prevent the user from wasting time in looking for parking lots and unnecessary traveling and fuel consumption in an already filled-up parking lot. We have also proposed to develop a mobile application to allow the user to book parking spot and utilize his time efficiently.
Keywords: Smart City; Smart Parking Systems; Internet of things; Intelligent Parking Assistant.
Abstract
Design of Buck-Boost Converter for Solar Panels using PID Controller
S. Kiruthiga, M.Dheivanai, S.Deepika, Mr.A.Karuppasamy
DOI: 10.17148/IJARCCE.2018.7365
Abstract: Currently, there are plenty of technological applications that utilize natural, environmental-friendly sources of energy. However, a disadvantage often found in natural energy sources is that the intensity produced is uncertain. This occurrence is also found in solar panels, wherein the light intensity that enters is not always equal. Light intensity may be affected by various factors such as ones on gloomy or sunny weathers. This irregularity on light intensity leads to deviation of voltage output produced by the solar panel. With the use of buck-boost converters, the amount of output voltage may be set to higher or lower than the input voltage, enabling us to maintain the desired output voltage. The amount of output voltage produced is controlled by a microcontroller program which regulates pulse widths produced by PWM signals. This paper discusses about designing a buck-boost converter for solar panels, with a voltage input range of 10 to 30 V. The regulation of output voltage is the main aim in analysing the success of the design created. The design is simulated with MATLAB12, and yields a voltage output with an efficiency90 to 99%.
Keywords: Pulse Width Modulation, Buck Boost converter, PID Controller, Solar panel.
Abstract
Mind Controlled Assistive Quadrotor Drone
Om Raheja, Kapil Pawar, Mohini Saraf, Sudeshna Maiti
DOI: 10.17148/IJARCCE.2018.7366
Abstract: Brain Computer Interfaces (BCI), also referred to as Mind Machine Interface (MMI) are devices capable of capturing brain activity. EEG based brain-controlled systems had initially found applications in military surveillance and biomedical services. Further research and work in this domain has enabled paralyzed people to control prosthetic arm with the help of their brain signals. Recent advancement in BCI Technology has seen a meteoric growth with contributions in additional fields such as security, lifestyle and entertainment. With the ever-increasing usability of drones in this era, we have tried to incorporate BCI with Unmanned Aerial Vehicles (UAVs). In this paper, we discuss the utilization of EEG signals to manoeuvre a quadrotor drone using a brain-wave-enabled biosensor. One of the crucial tasks performed by this sensor is to assimilate incoming stimuli and analyse the cerebral signals to determine accurate results.
Keywords: BCI(Brain computer interface), EEG, brain signals, drone,BCI(Brain computer interface), EEG, brain signals, drone.
Abstract
Cost Reduction for Big Data Processing In Physically Dispersed Data Centers
Miss. Sayyad K. M, Mr. Gurav R. R, Mr. Salunke S. S, Miss. Mirgane P. V, Prof. Shaikh N. K
DOI: 10.17148/IJARCCE.2018.7367
Abstract: Demand on big data is being rising day by day and also growing heavy burden on computation, storage and communication in data centers, which cause significant expenses to data center providers. So, cost reduction became an issue for the upcoming big data. One of the primary feature of big data is coupling of data and computation as computation assignment. Three obligations like data placement, task assignment and data movement impact the rate of facts centers. In this paper we study how to reduce the cost using joint optimization of these above three factors for big data service in geographically spreaded data centers. Right here we recommend 2-d markov chain to describe time to finish a particular undertaking with consideration of data transmission and computation to derive average challenge finishing touch time in closed time. The problem with the mixed integer nonlinear programming solved by linearizing it.
Keywords: big data, markov chains, data centers, nonlinear programming, geo-distributed.
Abstract
Survey: Detection of Blackhole Mechanism on MANET
Mr.Vishwajith M V, Pratik Sanjel, Pranish Pokharel, Kshetiz Pokhrel
DOI: 10.17148/IJARCCE.2018.7368
Abstract: A Mobile Ad hoc Network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Protecting the network layer of a MANET from malicious attacks is an important and challenging security issue, since most of the routing protocols for MANETs are vulnerable to various types of attacks. Ad hoc On-demand Distance Vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process but drops all packets in the data forwarding phase. This attack becomes more severe when a group of malicious nodes cooperate each other. The proposed mechanism does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to malicious activities of the nodes. Simulation results show that the scheme has a significantly high detection rate with moderate network traffic overhead and computation overhead in the nodes. Keywords-Mobile ad hoc network (MANET), blackhole, packet dropping attack, malicious node, routing misbehavior,
Keywords: MANET, AODV, routing techniques
Abstract
Analysis of Different Fusion and Normalization Techniques
Komal, Dr. Chander Kant
DOI: 10.17148/IJARCCE.2018.7369
Abstract: Multimodal biometric system fuses the data presented by multiple biometric sources, hence offering better performance than unimodal biometric system. In multimodal biometric systems, failure of any one trait may not seriously affect the person authentication as other trait can successfully work. Fusion of multiple modalities can take place at different levels i.e feature level, score level or decision level. But the data acquired from different modalities may be heterogeneous. So, there is a need to normalize the data into common domain. This paper presents the overview of various fusion and normalization techniques used in the biometric systems. Also, analyze the performance of different normalization techniques with various fusion techniques.
Keywords: Fusion techniques, multimodal biometric, normalization techniques.
Abstract
Review Paper on Security in Cloud Computing
Sharad Srivastava, Manjula R
DOI: 10.17148/IJARCCE.2018.7370
Abstract: Every day the data that we produce is growing at an exponential rate and the growth of which is only going to increase with time. In such a scenario the transfer, security and storage become factors of critical importance. A big step in resolving these issues was the development of cloud computing, but development of such a large and complex system brought about its own concerns mainly in terms of security. Remote data access control is of crucial importance in public cloud. Based on its own inclinations, the data owner predefines the access policy. When the user satisfies the data owner�s access policy, it has the right to access the data owner�s remote data. To improve flexibility and efficiency of remote data access control, attribute-based encryption (for short, ABE) is used to realize the remote data fine-grained access control. For the basic systems with low resources, secure outsourced decryption is a very useful technique. In the real application scenarios, the user�s attributes are usually managed by many authorities. This paper is intended towards discussing the issue and single point of failure in access control for cloud infrastructure and suggesting a solution for the same.
Keywords: Cloud computing, types, security
Abstract
Design of Grid Tie Inverter Fed With Renewable Energy Sources
Mr. D. Mariappan, S. Pavithra, P. Banu Prabha, P. Vasuki
DOI: 10.17148/IJARCCE.2018.7371
Abstract: Solar power generation studies are extensively increasing, because it is considered as an essentially inexhaustible, largely available and pollution free energy resource. Solar energy source that convert Solar energy into Electrical Energy. That Electrical Energy are further divided into two main categories. They are stand-alone (or) off line and grid-connected. The standalone system is isolated from the electric distribution grid. This system actually one of the most complex and includes all the elements necessary to serve AC applications in common household or commercial applications. The number of system will depend on the type of load that is being served. A good example is water pumping applications. The Grid connected system is directly couped to the electric distribution network and do not require battery storage. Electric energy is either sold or bought from the local energy load patterns and the solar resource variation during the day, this operation mode requires an inverter to convert DC currents to AC currents. Electric grid is parallel to the renewable system by use of the inverter. This project presents the New Design and performance of the Grid Tie Inverter and results prove that the system will reduce the energy consumption and optimum use of the renewable energy use can be utilized.
Keywords: Grid Connected Inverter, Grid Tied PV System, Conservation of Energy
Abstract
Smart Car Parking System
Mithun Mhatre, Priyanka Kamble, Raheel Kumar, Qais Nadkar
DOI: 10.17148/IJARCCE.2018.7372
Abstract: This paper introduces a new method to increase the efficiency of the current Parking System. This paper recommends a new strategy to find a parking space near our desired destination. This system also suggests a different parking lot to the riders is the current parking lot is already full or is booked. The suggested parking lot that is the next nearest parking lot to the desired destination. This System works globally as it is connected with the internet.
Keywords: Smart Car Parking System, destination, global, internet.
Abstract
Camera Based Driver Distraction
Apurva Hadap, Anuja Shette, Tanaya Jadhav, Tejasvi Pandey, Mrs. Suvarna Pothdukhe
DOI: 10.17148/IJARCCE.2018.7373
Abstract: Driver inattention is a major contributor to highway crashes. The National Highway Traffic Safety Administration (NHTSA) estimates that approximately 25% of crashes involve some form of driver inattention � the driver is distracted, asleep or fatigued, or otherwise �lost in thought� Every year nearly million people die and are injured as a result of road traffic crashes. These deaths and injuries have an immeasurable impact on families and communities as they tragically and irrevocably change people�s lives. In addition to the huge emotional toll these injuries cause the considerable economic loss to casualties, their families and nations as a whole. It will be necessary in next- generation smart vehicles, to develop advanced driver specific active/ passive safety systems. Important to analyse on-road, real traffic naturalistic driving data for all possible driving variations in different maneuvers. The Purpose of this project is to identify alertness of driver in driving. If the driver is found to be yawning or sleeping or distracted from driving, then continuous sound is played to alert him. Continuously evaluate driving performance. In case the driver is distracted, then buzzer is played and led glows.
Keywords: Driver Distraction, yawning Detection, glance behavior.
Abstract
Power Management in Mobile Cloud Computing
Nola T P, V R Nagarajan
DOI: 10.17148/IJARCCE.2018.7374
Abstract: Cloud computing is an expression used to describe a variety of computing concepts that involves a large number of computers connected through a real-time communication network known as internet. It enables a program or an application to run on many connected computers at same time. Mobile Cloud Computing is an emerging technology where both data storage and data processing happens outside the mobile device. Mobile devices are increasingly becoming an essential part of human life and a powerful trend in the development of Information Technology. However, the mobile devices are facing many challenges with respect to their resources such as battery life, bandwidth and storage. This project deals with a study of Mobile Cloud Computing based on the issues relate to the battery life of mobile phone. The Objective is to show how battery life of the phone can be saved by using Mobile Cloud Computing Technology.
Keywords: Mobile Cloud Computing, Battery power, Power Tutor, Mobile Devices, Android Applications
Abstract
Review Paper: New Advances in Recommender Systems
Shubham Jain, Manjula R
DOI: 10.17148/IJARCCE.2018.7375
Abstract: Recommender Systems have been known for the past forty plus years but with the explosion of ecommerce sites and social media. In the new era it has become a major need to personalize the recommender system for every user, collaborative filtering does this job well but only but as users and products scale up we need newer techniques. Privacy is being demanded by internet users so how can one build recommender systems with privacy embedded in it is now one of the issue discussed in this paper. A recommender system also faces attacks on it like fake users, fake ratings the methods to deal with such attacks are listed. Lastly deep learning has shown several advances in the field of computer vision how to use the power of deep learning and Convolution and Recurrent Neural Networks in Recommender systems this paper explicitly covers that.
Keywords: Recommender Systems, NLP,RBM,CNN, RNN
Abstract
Anti Collision Data Ciphering of AES With Hash Function Enhancement and Implementation on LabView
Aya Qusay Dawood, Raaed Khalid Ibrahim
DOI: 10.17148/IJARCCE.2018.7376
Abstract: This paper presented an implementation of Advanced Encryption Standard (AES) and Secure Hash Algorithm (SHA) by using the LabView software environment. The proposed algorithm in this work is to combine the AES algorithm and the Secure Hash algorithm (SHA-1) together. The resulting hash code output was used as the input key for the AES in order to improve data security and also to make the SHA-1 two way encryption algorithm. SHA-1 is a 160 -bit key so, the AES key used is a192-bit where the SHA-1 would take 160bit from the AES key size and the rest of the 192-bit of the AES key would be used as a salt. From the results of SHA-1 and AES algorithms obtained in LabView, the suggested work showed the simplicity in modeling hashing and AES algorithms, generating hash codes and plain texts in English plain text(small and capital letters), Arabic plain text, symbols, and numbers.
Keywords: Advanced Encryption Standard AES; Secure Hash Algorithm SHA-1; Security; LabView.
Abstract
Securing Online Transaction Using Visual Cryptography
P.Y. Pawar, Pooja Rajguru, Jaishree Dhomse
DOI: 10.17148/IJARCCE.2018.7377
Abstract: Nowadays many people are using online financial transactions. This transaction needs to be secure. A rapid growth in E-Commerce market is seen in recent time throughout the world. With the ever-increasing use of online shopping, Debit or Credit card fraud and personal information security are major concerns for customers, merchants and banks specifically in the case of CNP (Card Not Present). This paper presents a new technique for providing limited data only that is required for fund transfer during online shopping thereby safeguarding customer data. To overcome these problems using visual cryptography. Visual Cryptography is a secret sharing scheme which owns the technique of sharing the visual information. The Captcha (image) is getting divided into two shares. The basic idea is that the secret captcha is divided into two irregular patterns of images called shares and they can be unravelled without any complicated cryptographic computation.
Keywords: Visual Cryptography, Share generation, Image (Captcha).
Abstract
Diabetic Retinopathy Identification using Object Detection Method
Prof. Gauri R. Rao, Alankrita Srivastava, Pooja R. Patil, Dhruv Datta
DOI: 10.17148/IJARCCE.2018.7378
Abstract: Diabetic retinopathy, also known as diabetic disease for eye. In this disease, damages occur to retina of patient. 90% of the cases can be reduced by large number by identifying and providing proper treatment patient�s. So, there is need of such approach in which diabetic retinopathy identification can be done easily. So, proposed approach uses python and different object detection techniques to determine if the provided image is affected by diabetic eye disease or not.
Keywords: Diabetes, Diabetic retinopathy, Object Detection, Retinopathy, Eye Disease.
Abstract
Preventing and Detecting Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
Sable D.V, Sakhare S S, Khule Y.R, Salve P.M , Tonape Y.L
DOI: 10.17148/IJARCCE.2018.7379
Abstract: In recent years, there are raising interests in using path identifiers (PIDs) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which made it easy for attackers to launch distributed denial-of service (DDoS) flooding attacks. To address this issue, in this paper, we present the design, implementation, and evaluation of D-PID, In that framework that uses PIDs negotiated between neighbouring domains as inter-domain routing objects. In DPID, the PID of an inter-domain path connecting two domains is kept top secret and changes dynamically. In this paper we describe in detail how neighbouring domains negotiate PIDs, how to maintain ongoing communications when PIDs change. We build a 42-node prototype comprised by six domains to verify D-PID�s beneficial and conduct broad simulations to evaluate its effectiveness and cost. The results from both simulations and experiments show that D-PID can effectively prevent DDoS attacks.
Keywords: Inter-domain routing, security, distributed denial-of- service (DDoS) attacks, path identifiers.
Abstract
Survey on the detection of the fog and its impact on the highway traffic network
Vidhyashree G, Priyanka G , Arpitha C , Ravi Kumar SK
DOI: 10.17148/IJARCCE.2018.7380
Abstract: This paper provides the survey about the impact of the weather changes (particularly fog) on the highway transport traffic. Considering the general surveys on the road crashes, the deaths caused due to road accidents and fatalities are of 7,400 approximately in an year with 673,000 minor and major injuries. When gone particular about the crashes due to less visibility in the presence of the fog almost 11,600 people die in a year. The data generated due to the weather impact on the transport traffic need to be analyzed to predict the safety of individual on the road during adverse climatic conditions such as fog, high winds etc.
Keywords: Highway transport network, fog detection, road fatalities, grayscale features, histogram, climatic changes, risk index.
Abstract
Chat-Bot Real Virtual Human
Himanshu Agarwal, Rameshwari Deshmukh, Supriya Biradar, Bhagyashri Cheke
DOI: 10.17148/IJARCCE.2018.7381
Abstract: Chat Bot intend to build a discussion among both person and device. The can recognize the sentences and building a conclusion itself as reply to answer a query. The reaction standard is corresponding to the input sentence starting from user. It can match the similarity of sentences; the elevated score acquired extra analogous of reference sentences. The information of chat bot are accumulated in the database. The database has been working as information storage and performer has been working as accumulated programs of function and process fixed for pattern- matching condition. The interface is standalone which has been built using programming language of Java.
Keywords: Natural Language Processing, ChatBot, Sentiment Analysis, Word Net, Word Order Similarity between Sentences.
Abstract
Cache Based Course Setting Up On Roads
S.Saveetha, P.Sumathi Chitra, J.Shanthini
DOI: 10.17148/IJARCCE.2018.7382
Abstract: On-road path planning is an important power that is used to discover course between an area which is asked as a begin area and a goal. Whereas on streets, a way-arranging question might be issued because a factor considers various circumstances. A sudden change in driving course, startling activity conditions, or lost of GPS signals are the various situations, in which way -arranging should be conveyed in an auspicious manner. The most necessary condition of opportunities is more difficult when an unbelievable number of way arranging inquiries are submitted to the server especially during top hours. there is an order for the server to handle the devastating over workload of way arranging needs in an efficient manner. We propose a framework called Path Planning by Caching (PPC) in order to deal with this issue which aims to answer another way -arranging inquiry. This is done by reserving and reusing provably questioned ways. In the older frameworks a reserved question is returned when it matches up totally with another inquiry. In this system the server only needs to compute the unmatched path segments, along these lines altogether. Thus the overall system workload is getting reduced.
Keywords: GPS, PPC, MPI
Abstract
Design of Hybrid Electric Cycle with Automatic Speed Breaker Alert System
Dr.S. Kalyani, P. Divyaprabha, M. Janani, B. Mahemaa
DOI: 10.17148/IJARCCE.2018.7383
Abstract: It is very well known that fossils fuels are depleting and renewable energy sources are gaining importance day by day. Among various renewable energy sources, solar energy seems to be a reliable and viable one. Hence, in this work solar energy is used as the main source of supply. The present work comprises of two modules, the first module focuses on design of hybrid electric vehicle which runs by solar powered PV panel, and the second module involves automatic detection of speed breakers. The hybrid vehicle also has an option of pedalling based on driver�s choice. It is also ensured in design that motoring operation is not interrupted by the pedalling. Nowadays, vehicles are prone to accidents frequently, because of misheeding of speed breakers on the road either by over speeding or driver becoming unconscious. The second module of our project tries to overcome the above issue. This is implemented by detecting and exact location of speed breakers using vibration sensor and GPS and thereby giving an automatic alert to the driver.
Keywords: Solar PV panel, Arduino micro controller, vibration sensor, GPS.
Abstract
Improving the QAM Performance by using RSBC, Alamouti STBC and Interleaving over Rayleigh Fading Channel in Wireless Communication Applications
Mr. Girish Kalse, Mr.Vijaykumar Sharma
DOI: 10.17148/IJARCCE.2018.7384
Abstract: The aim of the paper is to improve the performance of QAM which is, one of the widely used modulation technique in the digital wireless communication that founds applications in DVB-T, DVB-C, modems, HSPA, LTE, LTE-A, microwave, and satellite systems, over a fading channel. Quadrature amplitude modulation (QAM) is a widely used method for transmitting digital data over the bandpass channels. In a communication channel, fading is one of the major issues among all, which degrades the performance of the systems to a great extends therefore it is necessary to reduce the effect of fading in order to improve the performance of the system in terms of bit error rate. Since the errors are introduced by the transmission medium we need to use a method that can be used to detect the errors and correct the errors. In order to achieve this, the error detection techniques and error correction techniques are used. These techniques increase the bandwidth requirement, but they provide reliable communication. An Almouti 2 X 2 STBC diversity technique is use to scale down the effect of fading whereas for error detection and correction the Reed-Solomon codes are used and the error rate is improved by the Interleaver. The model is implemented and investigated using Simulink (MATLAB) simulation. Firstly the performance of the QAM is analyzed over a fading channel then the performance of QAM along with RSBC, Alamouti STBC and Interleaving is compared with it, to comment on the benefits of the applied techniques.
Keywords: Bit error probability, DVB-T, LTE, LTE-A, QAM, RSBC, STBC, and Interleaver.
Abstract
Review on Privacy of Content Based Retrieval of Image in Cloud
Prof. Suvarna L.Kattimani, Miss. Saba Parveen Bougdadi
DOI: 10.17148/IJARCCE.2018.7385
Abstract: Multimedia interactive data is personal or corporate one which is huge in size because of visual understanding by the people is easy. It requires high storage service, security and retrieval of visual data from the cloud. It requires security for storage and retrieve. Proposed framework is on image encryption scheme based privacy preserving content based image retrieval and classification on colour and texture in cloud image repository which allow efficient operations require less time to retrieve and proved less complexity.
Keywords: Data outsourcing; Content based image retrieval; Encryption; Repositories
Abstract
Clone Detection Using Double-Track Approach For Rfid-Enabled Supply Chains
Dhumal T.A, Jadhavar S.S, Shinde A.S, Navadkar N.K, Shaikh T.U, Sarwade P.L
DOI: 10.17148/IJARCCE.2018.7386
Abstract: Toward enhancing the regular clone identification method whose execution might be influenced by powerful changes of supply chains and misread, we introduce a novel and successful clone location approach, named twofold track discovery, for radio recurrence identification-empowered supply chains. As a feature of a label's properties, verification data is built into labels with the goal that the arrangement of all verification data in the gathered label occasions frames a period arrangement succession. Real labels can be separated from clone labels because of the disparity in their verification groupings which are built as items own along the production network. The verification grouping together with the succession framed by business activities performed amid the supply chains yield two tracks which can be evaluated to recognize the nearness of clone labels. Hypothetical examination and trial comes about demonstrate that our proposed system is compelling, sensible, and has a moderately high clone discovery rate when contrasted and a main strategy around there.
Keywords: Clone detection, RFID, twofold track discovery, EPC.
Abstract
A Study On Tuberculosis Analysis Using Data Mining Techniques
N. Suresh, K. Arulanandam
DOI: 10.17148/IJARCCE.2018.7387
Abstract: Tuberculosis (TB) is an infectious disease usually caused by the bacterium Mycobacterium tuberculosis (MTB). Tuberculosis generally affects the lungs, but can also affect other parts of the body. Most infections do not have symptoms, in which case it is known as latent tuberculosis. About 10% of latent infections progress to active disease which, if left untreated, kills about half of those infected. The classic symptoms of active TB are a chronic cough with blood-containing sputum, fever, night sweats, and weight loss. The historical term "consumption" came about due to the weight loss. Infection of other organs can cause a wide range of symptoms. In previous years TB classification has been done using various algorithms like color segmentation, thresholding, histogram equalization. The main objective of this research Data Mining analysis uses efficient techniques and statistical measures for analyzing the data to predict the possible causes for the health issues and its impact on individual patients. Enormous data mining techniques are available for analysing the outcome accurately. When Classification technique is used in conjunction with the clustering technique , it produces considerable improvement in learning the accuracy particularly in detecting the Outliers. The main objective of using K-Means algorithm is to find the common factors between tuberculosis patients. Clustering is a useful technique of data distribution and finding patterns in the data. In the end, results are being evaluated after classification and testing on the basis of performance parameter such as accuracy, recall, precision, false acceptance ratio, and false rejection ratio.
Keywords: Tuberculosis(TB), Data mining, Neural Network, K-Means Algorithm.
Abstract
Remote Device Automation Of Sprinklers
Chetana Tambe, Manoj Racherla, Shalvi Khandare, Prof.Akshay Loke
DOI: 10.17148/IJARCCE.2018.7388
Abstract: Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects through the Internet. REMOTE DEVICE AUTOMATION automates specific devices like light and sprinklers, to reduce manual efforts. This IoT project focuses on building a smart wireless sprinkling system helping in monitoring the output of these devices based on external conditions. Regulating the amount of water dispersal by sensing the pressure of water supply. Using light sensors to regulate the light intensity of lights in the campus. This project specifically focuses on conserving energy and water resources by smartly monitoring the specific parameters like by scheduling the running time for sprinklers from wherever you want to control it with the help of application and also light intensity, soil moisture and Humidity in environment with the help of sensors and Node MCU-Esp8266 1266.
Keywords: IOT, Sprinklers, Automation, Node MCU.
Abstract
A New Class of 2–parametric Deterministic Activation Functions
Nikolay Kyurkchiev, Anton Iliev
DOI: 10.17148/IJARCCE.2018.7389
Abstract: We will explore the interesting methodological task for constructing new 2�parametric deterministic activation function � (2PDAF). We prove upper and lower estimates for the Hausdorff approximation of the sign function by means of this new activation functions. Numerical examples, illustrating our results are given.
Keywords: 2�parametric deterministic activation function � (2PDAF), Sign function, Hausdorff distance, Upper and lower bounds.
Abstract
A Note on the Generalized Inverted Exponential Software Reliability Model
Nikolay Pavlov, Angel Golev, Asen Rahnev, Nikolay Kyurkchiev
DOI: 10.17148/IJARCCE.2018.7390
Abstract: In this paper we study the Hausdorff approximation of the Heaviside step function by sigmoidal curve model based on the generalized inverted exponential software reliability model and find an expression for the error of the best approximation. Some comparisons are made.
Keywords: Generalized inverted exponential software reliability model, Hausdorff approximation, Heaviside step function, sigmoidal curve model
Abstract
Wearable Technology Orientation using Cloud Computing for Improving Quality of Human Life
P.Veeramuthu, Mula Koushik Reddy
DOI: 10.17148/IJARCCE.2018.7391
Abstract: Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc. In a cloud computing environment, the entire data presides over a set of networked resources, enabling the data to be accessed through virtual machines. In proposed system many advantage like accessing the home page before we request the admin for key generation once admin generate the key then they send it by mail id the user can get the key from the mail and apply the required place, if the which is generated by admin is correct means the home page will open otherwise it will shows wrong message, Upload the image with encryption and store in the database, in admin side the admin will decrypt the image, the other user can view the data if admin decrypt the data otherwise it can�t showed the image. Data sharing the data from one user to another user with encryption technique as well as non-encryption techniques.
Keywords: Wearable Technology, Big data, Hadoop, Map reduce and Cloud Computing.
Abstract
Big Data Management in Telecom Domain Using Hadoop
Miss. Deshmukh A.A, Miss. Hasarmani D.R, Miss. Kashid P.B, Miss. Jagatap P.S, Prof.Raule M.B
DOI: 10.17148/IJARCCE.2018.7392
Abstract: Map reduce is a programming model for examining and processing large data sets .Apache hadoop is an effective framework and most popular implementation of the map reduce model. Hadoop�s success has motivated research interest and has led to different modifications as well as extensions to framework. In this paper, the challenges round faced to in several domain like data storage, analytics, online processing and privacy/ security issues while handling big data by using K �means algorithm for clustering and SVM algorithm for classification. Also we provide the security by AES algorithm. In this paper, we focus specifically on Hadoop and its implementation of Map Reduce for analytical processing.
Keywords: Big Data, Telecom Domain, Map Reduce, Call Detail Records.
Abstract
Over Power Detection of Induction Motor
Pankaj Kashyap, Aakanksha Aharwal, Kriti Tiwari, Anukriti Singh, Monika Singh, Sandeep Somkuwar
DOI: 10.17148/IJARCCE.2018.7393
Abstract: Induction motors are most commonly used as compared with any the other type of electric motors due to its low cost, robustness, and less maintenance requirement (especially squirrel-cage types), and the ability to perform in rough conditions. The aim of this project is to detect, indicate and protect the 3 phase induction motor from various faults using some technique. The circuit will control the 3 phase induction motor and faults of motor like over voltage, under voltage, over current, under current will be indicated first and after circuit will indicate that faults and at least it will protect induction motor from faults. These also protect induction motor from temperature imbalances i.e. overheating of motor and after that circuit will switch on motor under safe condition. There is microcontroller used for control of circuit and it will detect and indicate voltage and current of 3-phases as well as faults occur in IM. If fault occurs it will cut off power to motor and switch off motor until they are normal. We have implemented a GSM Module so that SMS can be sent to the registered mobile phone to indicate the condition of the Induction motor. In the project work undertaken, GSM technology based automatic control system is designed to monitor and control speed of an Induction motor.
Keywords: Short Message Service (SMS), Global Systems for Mobile Communication (GSM), AT Command, GSM Modem, monitoring and control, Radio frequency (RF), Induction Motor.
Abstract
SIN CAMAREROS: Touch Screen based Ordering Systems without Waiters
Jayesh Ghugal , Sumiti Bhoyar, Yash Thumbunkel, Shubham Mandape, Vaidehi Dahake
DOI: 10.17148/IJARCCE.2018.7394
Abstract: This paper is designed to reduce the work load and to improve the efficiency of restaurants. This system works on android tablet. The webpage application access database and download real time menu list. Customer can browse and choice the items and order it. The order given by customer displayed in the kitchen section. Customer tablet, kitchen display and cash counter connects to each other through Web.
Keywords: Restaurant, webpage, menu list, customer.
Abstract
Development Of Farm Management In Modern World
Shriram A.P, Shwetha. C, Rani S
DOI: 10.17148/IJARCCE.2018.7395
Abstract: Smart farming is a relatively new concept, but its becoming important factor for the agriculture as a way to rise productivity through technology. Our system is addressed to farmers and other actors involved in forming Operations. Such as rural service companies and banks. The system is working in two levels, locals and Cloud. First of all it must be deployed on forms local wirelessnetwork and secondly it uses the Cloud Resources and flexibility to offer even more complex services.
Keywords: Cloud Resource, Operations, farmers, Cloud, Companies.
Abstract
Significance of applying K-means Clustering Technique to Video Steganography
Shree Raksha, Shruthi R, Sushma Shekar K, Vismaya M, Vidya Raj C
DOI: 10.17148/IJARCCE.2018.7396
Abstract: The rapid growth in digitalization and usage of public domain channels has greatly facilitated transfer of data. The rapid growth in technology facilitating transfer of data through internet has a lot of security threats as these public domains are highly vulnerable. Among the techniques used for concealing the confidential data, video steganography is eminent. This paper indicates the progress in the field of video steganography, its uses and techniques based on secret media, image and video. The paper also makes a performance comparison of known video steganography techniques and identifies K-means clustering as one of the most suitable techniques for video steganography, which is applied in solving most of the real time problems.
Keywords: K-means, Random Byte Hiding, LSB, MSE, PSNR, Steganalysis.
Abstract
Widget To Compare Price Using Mashup
Nimish Jadhav, Siddhesh Lokare, Aniket Andhale, Prof.Sachin Bojewar
DOI: 10.17148/IJARCCE.2018.7397
Abstract: Today the same product is available on multiple websites. User may not be aware of all the websites where the products are available. User also needs to visit each website individually to check the availability of the product and its price on different websites. If the customer does not check all the websites they may lose the price bene?t and end up buying the product at a higher price. To avoid this, the application to be developed will provide a widget which will compare price of the same product from different websites and give him the price comparison of all the websites that have been selected by the user previously. To compare the prices Mash-up Technology will be used with the help of APIs to get data from different websites.
Keywords: e-Commerce, GUI, Fuzzy logic.
Abstract
Survey of Challenge Big Data on Cloud Computing and MetaCloudDataStorage Architecture Efficiency Performances
R.Edwina, S.Kamatchi, M.Kavitha, T.Sathiyapriya
DOI: 10.17148/IJARCCE.2018.7398
Abstract: Implementing cloud computing empowers several paths for Web-based service contributions to meet diverse needs. However, the data security and privacy has become a significant issue that restricts many cloud applications. Many researchers have been trying to protect big data in cloud computing environment. Usually security mechanisms using encryption are neither efficient nor matched to the task of shielding big data in the Cloud. In this paper, we first discuss about challenge and potential solutions for protecting big data in cloud computing. Second, we propose Meta Cloud Data Storage Architecture efficiency performances.
Keywords: Cloud Computing, Big Data, MetaCloudDataStorage Architecture.
Abstract
Hybrid Power Generation in Indian Scenario
Dr. Prakash Prasad, Kiran Bobade, Khyati Raikar, Mansi Pande, Janvhi Ingle
DOI: 10.17148/IJARCCE.2018.7399
Abstract: In the era of 21st century, man is always hungry about power but conventional resources of power are not going to last forever, So, non-conventional and natural resources are required to get the energy. It is therefore need of the time that some alternate sources are to be identified for the sake of effective and green energy. The reliability of any one source is impractical in the era of if-then else loop or plan B. So, more than one source is to be identified. Piezoelectric and Solar technology are identified for the purpose of power generation in few cases. Solar energy may not be available 24x7 and 365 days, so in that duration, piezo can get power stored. It is renewable, inexhaustible and environmental pollution free. This paper deals with Hybrid technology that is a combination of piezoelectric and solar power generation which will be stored in battery and can be utilized whenever required for utilities.
Keywords: Piezoelectric cells, Solar energy, Hybrid power.
Abstract
Citrix Systems
Meshal F. Aldhamen
DOI: 10.17148/IJARCCE.2018.73100
Abstract: Citrix Systems, Inc. is an American multinational software company that supply server, application and desktop virtualization, networking, software as a service (SaaS), and cloud computing technologies. It was founded in Richardson, Texas in 1989 by a group of ex-IBM developers. The name Citrix is a combination of Unix and Citrus since its founder Ed Iacobucci moved the company from southern Florida to its new headquarters. Ed Iacobucci served as chairman until his departure in 2000. Citrix solutions are based on virtualization and cloud computing technologies that can grant various benefits and great efficiency in CPU utilization, green IT environments with low power consumption, central control, more availability, reduces project timelines by eliminating hardware procurement, improves disaster recovery capabilities, more central control of the desktop, and improve outsourcing services.
Keywords: Citrix Systems, XenServer, Cloud Suite, NetScaler, Virtual Desktops.
Abstract
Drowsy Driver Detection and Alert System
Gauri Thakare, Vaishnavi Shirbhate, Tanmay Fuse, Sanjiv Sharma, Prof R. R Karwa
DOI: 10.17148/IJARCCE.2018.73101
Abstract: Drivers who do not take regular breaks when driving long distances run a high risk of becoming drowsy and cause accidents. The growth of technology supports the society to protect from accidents which happens by human mistakes by building advance accident prevention systems. Drowsy Driver Detection System is developed, using a machine learning and image processing concepts. Proposed system is ready to use for car because of compact hardware which consumes less power and provide much faster processing speed and also can be operated in low light conditions. This system detects the eye landmarks from camera frames for monitoring the drowsiness of driver. The system detects the eye landmark and distance formula is applied to find out that eyes of the driver is open or closed. In case the driver feels drowsy i.e. driver closes eyes for some fraction of time then alert system of car gets activated to prevent accident.
Keywords: Drowsy, machine learning, image processing, eye landmarks.
Abstract
Solar Induction Wireless Roadways
Akash Kumar Nirala, Hitesh Kumar, Somesh Kumar Sidar, Vijay Kumar Thakur, Vishal Patle, Mrs. Nushin Anjum, Dr. Abhishek Verma
DOI: 10.17148/IJARCCE.2018.73102
Abstract: In the age of wireless technology and increasing use of renewable energy there's a continuing increase within the demand for wireless technology that is environment friendly. the primary step in wireless power is providing power to any device wirelessly. If the efficiency of transmitting the power wirelessly is magnified slightly more, then wireless power transmission may become a regular means for charging any electronic appliance, and conjointly if it's by the means of a renewable and a clean power supply comparable to solar power it'd be a cherry of the cake. This paper presents the design of a wireless power transfer system with road embedded transmitter coils to facilitate dynamic charging of EVs. A transmitter coil, that is comparatively long compared with the circular receiver coil, has been designed to cut back the price of the transmitter circuit. A model transmitter coil has been embedded into a road for analysis of its characteristics. we had designed a high-efficiency charging system that uses magnetic fields to wirelessly transmit massive electrical currents between metal. The long-run goal of the analysis is to develop an all-electric road that wirelessly charges cars and trucks as they cruise down the road. The new technology has the potential to dramatically increase the practice range of electrical vehicles and eventually remodel road travel, per the researchers. Our vision is that you're going to be able to drive onto any road and charge your automobile. Large-scale preparation would involve revamping the complete transit and will even have applications beyond transportation.
Keywords: Wireless electricity, Roads, Solar energy , Battery, Electric vehicles.
Abstract
AUTOMATIC QUESTION PAPER GENERATOR SYSTEM
Zalte S.V, Jadhav C.C, Mangire A.A, Hole A.D, Tulshi A.R
DOI: 10.17148/IJARCCE.2018.73103
Abstract: This is a challenging era due to the growth in the field of computer science and demand we are facing today. Hence examinations play a vital role in testing student�s performance. And that is why it is important to have a smart development question model for growth of students as well as to test their learning skills thereby keeping a check on student performance. Now the traditional method of generating question paper has been manual. In this method certain officials chalk out the question paper. But this method can be ineffective at times owing to bias, repetition and security concerns. We have proposed an Automated process of Question Paper Generation which is fast, streamlined, randomized and secure. Every task performed by this system is automated so that storage space, bias and security is not a concern anymore. Furthermore, we have proposed a new algorithm which ensures total randomization of questions and avoids repetitions. The proposed system can be helpful to many educational institutes and NGO based institutes.
Keywords: Question paper generation; paperless; automation; randomization; information communication technology.
Abstract
Gas Sensor Using Arduino UNO & MQ2 Sensor
Prof. Parag Naik, Pranay Dhopte, Rajat Wanode, Roheet Kantode, Saurabh Nagre
DOI: 10.17148/IJARCCE.2018.73104
Abstract: In today�s world, everyone is busy in their own life that people rarely take care of using resources effectively. We know gas is a useful component in environment. Some gases do not cause any harm if emitted in excess amount but some do. Gas like LPG is used household purpose for cooking food. Not only in household purpose but also in hotels, restaurants, hospitals, etc where there is human interaction. Also we can see CNG operated vehicles. If there is any amount of leakage of these type gases it can cause a huge loss to life and property. So what if we get a way to reduce or abandon the chances of this loss.
Keywords: Arduino, UNO, MQ2, CNG, LPG.
