VOLUME 6, ISSUE 5, MAY 2017
Denoising of ECG Signal by using Adaptive Filter and Non Adaptive Filter
Abhishek Sahu, Sagar Singh Rathore
Data Warehousing Architecture and Pre-Processing
Vishesh S, Manu Srinath, Akshatha C Kumar, Nandan A.S
Discrimination of Myopathy, Neuropathy and Healthy EMG Signals
Amit Kumar Singh, N K Agrawal, Sumit Gupta
Improved Data Security Protection Mechanism for Cloud Storage using Two Factors
Ravali Kolli, Swetha Mile, Shreya Shetty, Sharana Jyothi B, Chandrakala. B.M
A Review on Energy Efficient Routing in Wireless Sensor Networks
Navjot Kaur, Jatinder Kumar
A Theoretical Study on “Technological Interface in Controlling over Speeding”
Y. Sai Krishna Vaideek, Dr. B. Srinivasu, Dr. K. L. Vasundhara
Survey on Task Allocation in under Water Vehicle System by using ACO in CNP
Divyanshi Saxena, Miss Priya Sahai
Device Control using Intelligent Switch
M.V. Sreenivas Rao, Basavanna M
Facial Image based Emotion Recognition System using Neural Network
Parnal Dudul, Prof. S. M. Tayade, Prof. Ajay Talele
Vulnerability Signatures and Log Analysis: A Survey
Poornima .M, Ramakrishna M.V
Optimization of Parameters of Wireless Sensor Network using Opportunistic Routing Algorithm
Ankita Bajpai, Anamika Goswami, Mahendra Kumar
Application of Low Rank Online Multimodal Distance Metric Learning Technique for Semantic Hashing of Web Documents
P. Suryanka, L. Yamuna
Payload Data Processing System on Satellite
Shreyas H V, Dr Mohan H S
Comparison of the Low Power Wireless Technologies for Smart Refuelling
Sneha Kishore Kumar Rane, Rohini S Hallikar
Digital Image Watermarking using SWT and SVD
Manju Yadav, Ashok Kumar
A Review on: Job Portal- A Web Application for Distributed Clients
Pooja T. Killewale, Prof A.R. Mune
Review on Neural Based Expert System for Home Automation
Gunjan, Saurabh Charaya
Anti-Phishing I-Voting System using Visual Cryptography
Ramya. R. Nelli, Rashi Mehra, Pallavi Madri, Monica S, Rajeshwari J
Snake Electrical Energy Production
Prof. Sagar P. Thombare, Prof. Priyanka Hire
HIVELytics: Building Execution Profiles for the Systems Running on HIVE
Pratheeksha P, Paramesh R
Duplication Free Minimal Keyword Search in Graph using Top-K Algorithm
Miss. Payal P. Thakur, Prof. N. R. Borkar
Performance Enhancement in MIMO Two-Way AF Relaying System using Pre-coding Technique
Devi Singh Meena, Kavita Upadhyay
Object Detection in Android Smartphones for Impaired
Prof. S.P. Jadhav, Sonali S. Jayswal, Stelly. Tommy, Harshvardhan D. Dhaware, Akshay R. Vijapure
Pallet Sorting using Optical Character Recognition
Suraj Muley, Virendra Patil, Payal Dhage, Sarika Panwar
A Survey on Mining Aspects for Queries
Haritha Padmanabhan, Derroll David
A Noval Wakeup Schedule Algorithm for Relay Nodes to enhance the lifetime of Sensor Network
Shruti Pandey
Node Failure Detection in both Wired and Wireless Sensor Network Using Binary and Non-Binary Schemes
Amulya C N, Rajeshwari B S, Sowmya R, Lavanya K, Kavya K
Analysis of PAPR Reduction using Partial Transmit Sequence (PTS) Technique in OFDM
Mohit Agrawal, S. K. Sriwas, J.P. Sani, M. Shukla
Method to Capture Tearing and Stuttering in a GPU Driven Application
Yogesh Dasgaonkarw, K K Joshi
Dynamic Road Traffic Signal Control using Digital Image Processing and RFID Sensors
Prof. Wrushali M Mendre, Charudutta Sonone, Shrikrishna Choudhari, Kumar Gaurav
Different Coupling of Notch Loaded Rectangular Microstrip Patch Antenna for Wireless Communication System
Mohit Khanna, D.C. Dhubkarya
Patient Health Monitoring and Controlling System using Internet-of-Things (IoT)
Shamika Jog, Prajakta Ghodake, Darshana Jagtap, Deepgandha Shete
Study of Optimization of Recycle Coarse Aggregate on Strength Characteristics of Different Grades of Structural Concrete
Er. Nirmaljeet, Er. Vikram
Congestion Control in Spatial Networks in Case of Disasters
Saumya Pandey, R. K. Singh
Bandwidth Enhancement of U Shape Notched Microstrip Patch Antenna for Low Frequency Band
Surendra Kumar Gupta, D.K. Srivastava, Ravi Kant Prasad
Energy Harvesting in Wireless Sensor Networks
Anamika Goswami, Mahendra Kumar, Ankita Bajpai
Feature Extraction from Satellite Imagery
Aishwarya.C.G, Apoorva T M, Shresta R Shetty, Vandana B R, Mrs. Sangeetha V
A Review on Clustering Techniques and Time Series Analysis
Nidhi Tiwari, Prof. Toran Verma
Real Time detections of Drowsy Driver using Renes as Micro Controller
Anusha V A, Priyanka B H, Savitha N, Shreevandana A S, Neelaja K
The Framework for Building Smart Cities Application using IoT and Cloud Based Architecture
Prof. Sunil Kumar Yadav, Miss. Ashwini T. Pawar, Miss. Monika A. Shelar, Miss. Manali A. Pachpande, Mr. Mayur Barhate
A Review on aging aware Reliable Multiplier
Sushant Jalindar Sawant, Prof. Sanjay S. Badhe
Flexible Multi-Keyword Based Optimized Search Scheme for Encrypted Cloud Storage with User Revocation
CH. M. Shruthi, P. Deepthi, G. Sreelatha
Accident Detection by an Intelligent System
Bhalerao Harshal A., Jadhav Sarika J., Jadhav Snehal B
Ai Distress Beacon using Speech Recognition
Arman Shaikh, Mutasim Rehman, Rushikesh Mate, Ritesh Ghate, Prof. Mrs. A.S. Khandagale
Image Retrieval using High Order Local Autocorrelation and MFCM
Meenakshi Srivastava, Dr. S.K. Singh
Minimizing Energy Consumption & Prolong Network Lifetime of Linear WSNs
Roshni Kapoor, Pragya Awasthi
A Survey on Motion Detection in a Video
Mandeep Kaur, Pratibha Goyal
Implementation of an Effective Bus Pass Generation and Renewal Application
Niteesh Joshi, Mahesh Waghmare, Sujeet Bhosale, Ankit Singh, Sunita Nandgave
Fish Recognition based on HOG Feature Extraction using SVM Prediction
Ms. P. Antony Seba, Ms. S. Rama Subbu Laskhmi, Ms. P. Umamaheswari
BER Analysis of MIMO-OFDM System using BPSK Modulation under Different Channel with STBC, MMSE and MRC
Krishna Kant Dubey, D.K. Srivastava
Smart Traffic Congestion Control
Prof. Ranjeet S. Mote, Dharmesh A. Chhajed, Sambhav V. Dwidmuthe, Komal N. More
Tackling Privacy on Social Media
C.P. Kedia, Suraj Tavare, Vikram Karkande, Vivek Sonawane, Pranjul Avi
Privacy Preserving Back-Propagation Neural Network with Cloud
Kalpana Vyavahare, Aniket Khobragade, Pratiksha Wankhade, Atthar Mansuri, Sampada Kulkarni
Avoiding Duplication of Encrypted Data using Cloud
Ashweta Magar, Trupti Jagtap, Pradnya Gaikwad, Rashmi Singh
Data Deduplication on cloud
Manisha Galphade, Roshan Kunal, Mayuri Ingulkar, Safiya shaikh, Mamta Chavan
Home Energy Management by using Hybrid Power
Bhagyashri Baravkar, Komal Bhalerao, Asha Bharti, Sarika Patil
Robust Method for Detection of Copy-Move Forgery in Digital Images
Garima Mishra, A.K Singh
Design of Multiband Compact H-Shaped Microstrip patch antenna for Wireless application
Poonam Shukla, S.P. Gangwar
A Routing Technique for Query Scheduling and Forwarding in Unstructured Overlay Topology Networks
P. Deepa, A. Kanchana, V. Anitha
Video Watermarking using DWT and Alpha Blending Technique
Asha N, Bhagya P
IoT based Industry Automation using Arm7
Esha Gandotra, Suvidha Kohli, Shavaya Gupta, Rohan Slathia
Performance Analysis of the Two Soliton Interactions in O-IDMA channel
Vimal Prakash Gautam, Kapil Dev, S.K. Sriwas
E-Agriculture Information Monitoring System using Data Mining
Dhakne Aniket, Deshpande Mayur, Patharkar Mayur, Rathod Aakash
A Study of Different Methods of Attacking and Defending Cryptosystems
Manjula G, Dr. Mohan H.S
A Review: Solving ECDLP Problem using Pollard’s Rho Algorithm
Santosh P. Lokhande, Dr. Indivar Gupta, Dr. Dinesh B. Kulkarni
Preservation of Historical Documents using ICM and Filters
Ashika Parvin, Shajun Nisha, Mohamed Sathik
Design and Implementation of Linear Feedback shift Register based physical unclonable function
A. Nagamalli, P. Avinash, K.B.S. Akhil, K. Manoj Kumar
Survey on Various Steganography Techniques
Priyanka Sharma, Astha Gautam, Ruchi Singh
Estimation of Noise Power Spectrum and Automatic Speaker Recognition System
Rajalakshmi. P, Anju. L
Reversible Image Data Hiding with Contrast Enhancement
Prof. M.S. Sadavarte, Pratima B. Choudhari
Approximate Multiplier by Partial Product Preforation
Miss. Sasikala. V.P, Mr. R. Dharmalingam
Open Price Prediction of Stock Market using Regression Analysis
Mr. Pramod Mali, Hemangi Karchalkar, Aditya Jain, Ashu Singh, Vikash Kumar
A Survey on Macro Environment Sensing using Sensors in Smart Devices
Nilesh Chavanke, Harsimaran Saggu, Sanket Kurude, Saurabh Walunj, Prof. S.D. Salunkhe
Smart Field System using LabVIEW and IoT
Nisha Kushwaha, N.S. Beniwal
Protecting Web Servers from Client based Attacks
Akshay Gurav, Jay Chaudhari, Kajal Deshmukh, Dhanajay Jadhav, Dr. S. M. Chaware
SRD-Ad: Secured Routing and Data Delivery using Anonymous Detection in wireless networks
S. Suganya M.E., T. Sakthi Sree M.E.
Online Secure Examination Process using M-Learning Techno
Kavya G. S., Ragini A., Rashmitha R., Sandhya R., Prof. Vijayanirmala B.
A Review on Various Clustering Technique and Protocol in MANET
Pooja Kumari, Gurpreet Kaur
WLAN System Analyzer using Android Phone
Tambare Suraj, Swami Nachiket, Ajay Thakur, Mandrupkar Suraj
“Review on Reducing Routing Overhead and Energy Drainage in MANET”
Jaspreet Kaur, Jatinder Pal Sharma
Android Application to Read and Record Data from Multiple Sensors
Vishesh S, Manu Srinath, Ranjitha Ravishankar, Ranjan Ravishankar, Ashrith Pradeep, Jeevan HS
Implementation of Classification based on User using Facebook based Profile
Jeevan Pisal, Nikhil Tanpure, Rahul Hinge, Aniket Potdar, Mrs. Sonali A. Patil
“Furniture Layout Application using Augmented Reality”
Tanuja R. More, Avadhoot Modage, Venkatesh More, Kedar More
“Active Learning for Ranking through Expected Loss Optimization” based on Data Mining
Parkhi Aishwarya, Patil Chaitanya, Shinde Madhuri
Android Based LIGHTNET for Brightness and Color Temperature Control
Akshada A. Hanchate, Dr. S.B. Dhonde
Wireless Biometric Attendance Management System
Shaikh Sardar Salim, Jamdade Sonam Baburao, Patil Pranoti Jotiram
Crawling towards Building Advance Search Engine
Aparna Hambarde, Shwetal Yadav, Aishwarya Dhekane, Dipali Yadav, Mayuri Pawar
Indoor navigation using LIFI
Prof. B. B. Gite, Pankaj Maydeo, Shubhangi Bade, Tushar Muluk
A VLC-Based Location System for Mobile Application
Priti Konda, Dr. D. K. Shedge
Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation
Lakshmi A, Mandara Nagendra, Shreeraksha L, Chandru A S
Review: Segmentation of Fovea and Optic Disc
Chaithra Sree. K, K.V. Geethika, Anil Kumar. K. R
Friends Wall: A Semantic-based Friend Recommendation System for Social Networks
Mr. Raj Agarwal, Mr. Swaranjeet Singh, Ms. Samiksha Bhujbal, Ms. Pooja Jadhav, Prof. U.H. Wanaskar
Identification of Unique Users across Different Social Multimedia Platform
Renuka Devi .S, Sameeksha.M, Shreeja.M, Shivani.C.N, Ranjitha.A
Performance Analysis of OFDM-IDMA System using Random and Tree-based Interleaver for Underwater Acoustic Communication
Kapil Dev, S. K. Sriwas, J. P. Saini and M. Shukla
Comparative Analysis of Three Dimensional Channel Models in Molecular Communication via Diffusion
Anmol Preet Kaur, Dr. Deep Kamal Kaur Randhawa
Graphical Gauze Authentication
Mr. Vicky Ghaytadak, Prof. Kulkarni P.R
LPG/CNG Gas Leakage Detection System with GSM Module
Alan M John, Bhavesh Purbia, Ankit Sharma, Mrs. A.S Udapurkar
Efficient Job Recommender System
Sheela Bankar, Ambesh Vishwakarma, Siddhi Sarolkar
Automatic Gate with Track Switching
Mohd. Danish, Prashant Kr. Singh, Mrigank Shekhar, Mrs. S.U Kulkarni
Designing a Low- Pass FIR Digital Filter by using Rectangular Window Hanning Window and Bartlett Method
Vijendra Kumar Prajapati, Dhanmohan Ratre, Pranay Kumar Rahi
Monitoring of Data from Multiple Sensors Using Android Application and its User Manual
Vishesh S, Sharath R, Varun Hebbar BC, Sripragna CH, Shreyas BV, Ramalingesh Godavarthi
Flexible and Secure Auditing of outsourced Database in Cloud Computing
Mr. Darshan T. Kavathekar, Mrs. B. S. Shetty
Optimization of Slot and Map Reduce Workload
Vinayak Kadam, Rutuja Aughad, Priyanka Gaikwad, Jidnyasa Khanore, Pragati Naykodi
A Novel Approach for Privacy Policy on Online Social Network
Prof. P.S. Hanwate, Pradnya Kapile, Kajal Katariya, Sunny Yadav, Ranjeet Patil
WI-MOB: Power Transmission System for Charging Smart Phones using RF Module through Wi-Fi
Shareen Noronha, Prajna P, Prateeksha Prasad, Pratheeksha, Saritha, Sachin Bhat
Implementation of Image Encryption and Compression using Chinese Reminder Theorem and Chaotic Logistic Maps
V.V.M Sireesha, Y.V.D. Pushpa Latha
Colpitt Oscillator using CMOS Technology based on Second Generation of Current Conveyers
Ghanendra Kumar, Dr. N.S. Beniwa
Optimal Design of Low Pass Filter by Rectangular, Taylor and Hamming Technique
Tarun Kumar Chandra, Gautam Sharma, Pranay Kumar Rahi
Android Password based Door Opener System
Nagaveni B Biradar, Manjula, Pavithra S, M. Afreen Khanum, Mubeen Firdous M
A Brief Review of the Large Eddy Simulation Method
Sachin H Shinde, Mrs. B. S. Shetty
Practical Implementation of Real-time Sensing of Sensor Values using Android Application-1
Vishesh S, Siri BC, Shivani YN, Thanmayi BK, Shweta Manjunath, Sushmitha TS
High Voltage Dc Generation using Marx Generator
Gaytri Saraf, Amrapal Bansode, Akshada Khule, Shruti Rangari, Prof. S.U. Shinde
A Survey: Hybrid Intelligent Modeling Technique for Data Classification
Tanu Rani, Mr. Narender Kumar
Multi-Level Security for Internet Banking Services
V.L. Sowjanya, Mrs. K. Santosh Jhansi
Microwave Photonic Filter: A Systematic Literature Review
Vijay Mishra, Sumit Gupta
Semantic Search on Applicant Tracking System
Le Quan Ha and Mainur Rahman
Secure Novel Honey Words Generation Approach to Reduce the Storage Overhead
Ms. Madhavi R. Dachawar, Prof. Srinu Dharavath
A Review: Parallel Implementation of Shortest path Algorithm on GPGPU
Avadhoot K. Katkar, Dr. D. B. Kulkarni
Optimizing Cloud Base Video – CrowdSensing
Anitha J, Sapna B Kulkarni
Role of Data Mining Techniques in Agriculture Improvement
Saurabh Sindhu, Divya Sindhu
Review on Moving Object Detection in Video Surveillance
Aqsa Khan, Mr. N. J. Janwe
Review of Single Phase Induction Motor Controlling
Ajitabh Awasthi, Palash Rai, Sanjay Kumar, Mr. Swapnil Namekar
A Review on Role of Active Contour Model in Image Segmentation Applications
R.S. Jaiswal, M.V. Sarode
An Efficient Digital Baseband Encoder for Short Range Wireless Communication Applications
Sasmita M, Priya N
Web-based Application
Prajakta Andhale, Sonali Ghadigaonkar, Kushal Lahoti, Kiran Patil, Prof. Sunayana Jadhav
Overhead Reduction by Spatial Reusability in Multi-Hop Wireless Networks
Mr. Abhilash Bhise, Dr. Sachin D. Babar
Main Memory Sharing for the Processed Data using Spitfire AKNN Algorithm
Ms Rajalakshmi A B, Dr. K. S. Shreedhara
Noise Reduction in Medical Images using an Unbiased Non-local Means Method
Sushma C, Kavitha G
Big Data Covey Routine with Emphatic Slow Starter Apprehension and Conceptive Enactment
Ms Mufliha Parveen C M, Smt Geetha N B
Real-time Implementation of Sensor Read and Record using Android Application-2
Vishesh S, Satish K, Narendra Vadavadagi, Tammannagouda, Chethan C, Lohith S
Dispersion Management in Optical Soliton Transmission Systems: A Review
Harsimran Singh, Manjit Singh
A Proposed Approach to Federated Query Optimization
Kavitha Juliet, Rajeswari R P
Efficient Parameter Reading of Electronic Charkha
Mayuri W. Meshram, Mr. S. T. Valunjkar
Mobile Augmented Reality based Learning System
Afsana, Hazra Shanuda Aeroshan, Mr Manoj T
RFID and Pose Invariant Face Recognition Based Automated Security System
Tamil Vani .R, Ruckmani Divakaran, Vinitha Shree .G.R, Revathi .R, Nalini .P, Khutija Kubra
A Study of Genetic and Honey Bee Algorithms for Load Balancing in Distributed Systems
Dr. G. Suvarna Kumar, G. Venkata Lakshmi
Optimal Design of Low Pass Filter by Rectangular, Hanning, and Taylor Technique
Gaurinandan Prasad Tripathi, Ghanshyam Shriwas, Pranay Kumar Rahi
Video Streaming over Wireless Networks using Efficient Real Time Adaptive Algorithm
Ms. Bhagyashri A. Banarase, Prof. N. R. Borkar
A Novel Approach for Sharing Encrypted Data Over Cloud
Prof B.S. Vamsi Krishna, Bingi Anu Reshma
Medical Image Classification Techniques for Early Cancer Diagnosis: A Comprehensive Study
Neelaja K, Anand Kumar M, Minavathi
A Review on “Personal Identification by using Biometric Traits”
Neha Shivajirao Tondare, Prof. S.S. Savkare
A Survey: IoT based Vehicle Tracking System
Erabathini Chetan Laxmirajam, Dr. R. S. Kawitkar
Abstract
Denoising of ECG Signal by using Adaptive Filter and Non Adaptive Filter
Abhishek Sahu, Sagar Singh Rathore
DOI: 10.17148/IJARCCE.2017.6502
Abstract: Electrocardiogram (ECG) is an effective non-invasive method used to detect cardiac abnormalities. In our paper, we provide a study various noises, example power line disturbance (PLI), movement artifacts, electrode touch noise, muscle relaxation, base line drift, electromyography noise (EMG) and instrumentation noise etc. To remove above noises various algorithms of different filter, non-adaptive filter are used and we also provide discrete wavelet transform DWT. To filter random artifacts, filter with constant parameters, because hum manner is not accurate known relevant on time. For this problem to solve digital filter are used such as adaptive filters as smallest (least) mean square (LMS), Normalized mean square error (NLMS), Recursive least square (RLS), sign LMS, sign-sign LMS algorithms In the comparison among all have been tabulated. The quality of algorithms are evaluated by signal to noise ratio (SNR), mean square error (MSE), rate root mean difference (%PRD) and standardized mean square (NMSE). In the comparison to various adaptive algorithms sign-sign LMS gives better result for all parameters with MSE = 0.0253, NRMSE = 0.0033, %PRD = 0.3231, SNR = 5.327.
Keywords: ECG, LMS, NLMS, RLS, SLMS, SNR, MSE, NMSE, %PRD.
Abstract
Data Warehousing Architecture and Pre-Processing
Vishesh S, Manu Srinath, Akshatha C Kumar, Nandan A.S
DOI: 10.17148/IJARCCE.2017.6503
Abstract: The computerization of our society has substantially enhanced our capabilities for both generating and collecting data from diverse sources. A tremendous amount of data has flooded almost every aspect of our lives. There is a need in transforming the vast amount of data into useful information and knowledge. This has led to the generation of promising and flourishing frontier in computer science called data mining. Data mining is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the web, other massive information repositories or data streams. Data mining can be applied to any kind of data as long as the data is meaningful for a target application. In this paper, we discuss in detail data warehouse and data warehouse data, which is almost basic form of data for data mining applications. We also present to you a typical framework of a data warehouse and data pre-processing techniques. We also discuss about OLAP (Online Analytical Processing) Data Marts which is a subset of an organizational data store, usually oriented to a specific purpose or major data subject, which may be distributed to support business needs.
Keywords: computerization, data mining, databases, data warehouses, data pre-processing techniques, OLAP (Online Analytical Processing) Data Marts.
Abstract
Discrimination of Myopathy, Neuropathy and Healthy EMG Signals
Amit Kumar Singh, N K Agrawal, Sumit Gupta
DOI: 10.17148/IJARCCE.2017.6504
Abstract: In this paper, method for discrimination of EMG signals is proposed. EMG signal is decomposed into set of narrow band signal using empirical mode decomposition (EMD) process known as intrinsic mode functions (IMFs). The features namely mean, standard deviation, variance and Entropy of the intrinsic mode functions (IMFs) generated by EMD process is used to discrimination of myopathy, neuropathy, and healthyEMG signals. The statistical features of IMFs have provided better discrimination performance.
Keywords: EMG, EMD, IMF, SVM, RVM.
Abstract
Improved Data Security Protection Mechanism for Cloud Storage using Two Factors
Ravali Kolli, Swetha Mile, Shreya Shetty, Sharana Jyothi B, Chandrakala. B.M
DOI: 10.17148/IJARCCE.2017.6505
Abstract: This system proposed an improve data security protection mechanism for cloud using two components. In this system sender sends an encrypted message to a receiver with the help of cloud system. The sender requires to know identity of receiver but no need of other information such as certificate or public key. To decrypt the cipher text, receiver needs two parts. The first thing is a unique personal security device or some hardware device connected to the computer system. Second one is private key or secrete key stored in the computer. Without having these two things cipher text never decrypted. The important thing is the security device lost or stolen, then cipher text cannot be decrypted and hardware device is revoked or cancelled to decrypt cipher text.
Keywords: cloud storage system, cloud security, cloud protection, two-factor data security protection.
Abstract
A Review on Energy Efficient Routing in Wireless Sensor Networks
Navjot Kaur, Jatinder Kumar
DOI: 10.17148/IJARCCE.2017.6506
Abstract: There has been plenty of interest in building and deploying sensor networks. These networks are composed of a high number of very easy nodes wherever the majority of them ought to perform the function of a router also. Energy consumption of these nodes is important issue because the power provide of the node is provided by restricted batteries methodology, which limit the lifetime of the links additionally to whole networks. The energy treatment of network sensor node is serious issue for long lifespan of the network. Because the sensor nodes are being acting like routers as well, the choice of routing algorithm would be a key role within the energy consumption control. in this review paper we have done study and also the analysis of varied research work associated with Energy efficient Routing in Wireless sensor Networks in order to design an energy proficient path routing protocol for WSNs that's efficient in terms of the energy usage of the whole network such network wouldn't get disconnected because of the energy depletion of its nodes.
Keywords: clustering, Energy, Efficient, hole, Routing, static, Wireless Sensor Network.
Abstract
A Theoretical Study on “Technological Interface in Controlling over Speeding”
Y. Sai Krishna Vaideek, Dr. B. Srinivasu, Dr. K. L. Vasundhara
DOI: 10.17148/IJARCCE.2017.6507
Abstract: Over 1, 37,000 people were killed in road accidents in 2016 alone, that is more than the number of people killed in all our wars put together. Daily 16 children die due to road accidents in India. On an average for every four minutes, a death is recorded out of 1214 road crashes every day. The objective of this paper is to save human lives by empowering the existing model of the video cameras present in the motor ways with Speed-guns in order to track vehicles accurately and control Speed.
Keywords: speed control, speed gun, number plate identification, ocr.
Abstract
Driverless Car
Haard P. Mehta, Vishal K. Mistry
DOI: 10.17148/IJARCCE.2017.6508
Abstract: Since its commencement of the business vehicle industry in the late 1890s, autos have progressed toward becoming progressively protected and helpful. As of late, carmakers have started to present propelled driver-help frameworks, for example, versatile journey control (which computerizes quickening and braking) and dynamic path help (which mechanizes controlling.) These frameworks have turned out to be sufficiently proficient that new extravagance vehicles can drive themselves in moderate moving interstate traffic. Inquire about into self-sufficient autos has advanced amazingly since the first exhibits in the 1980s. In 2010, four driverless vans gone from Italy to China. In August of 2012, Google reported that its self-driving autos had finished more than 300,000 miles of mishap free self-ruling driving. Albeit self-driving autos may in any case appear like science fiction, Google, numerous industry experts, auto providers, and carmakers extend that such autos will be accessible before 2020.
Keywords: Driverless Car, industry experts, auto providers, and carmakers, quickening and braking.
Abstract
Survey on Task Allocation in under Water Vehicle System by using ACO in CNP
Divyanshi Saxena, Miss Priya Sahai
DOI: 10.17148/IJARCCE.2017.6509
Abstract: Unmanned underwater vehicle system is a very vast area for research. many organizations are currently working on this. UUV system use contract net protocol to establish the communication. There are many tasks to cover by the one system. This UUV system is design on multi agent based system. In the area of multi agent system contract net protocol is widely used for the establishment of communication between agents. In my research I focus on the working strategy of CNP. There are different areas like genetic algorithm, multi robot task allocation, reservoir flood control system, structural health monitoring, underwater unmanned vehicle system in which CNP works. Although, various algorithms are proposed to improve the efficiency of CNP and they are real effective but there is some area which is untouched for a while. In this paper there is a survey on the interaction protocols on MAS, mainly CNP and also the application area of unmanned underwater vehicles system.
Keywords: multi agent system , interaction protocol, contract net protocol, underwater vehicle system.
Abstract
Device Control using Intelligent Switch
M.V. Sreenivas Rao, Basavanna M
DOI: 10.17148/IJARCCE.2017.6510
Abstract: Intelligent switch is capacitive touch sensor which senses the touch. This type of switches takes body capacitance as a input in order to turn ON or OFF the devices which is connected to it and also the regulation of it. The devices controlled are bulb, fan, motor and other electronic appliances. This touch switches are needed in order to overcome the disadvantages of mechanical switches like wear and tare, limited operations, sparks etc. The capacitive touch sense pad which consists of one or more sense buttons. When the person touches the touch pad it takes the body capacitance and that analog signal is converted to digital signal in order to make compatible for the MSP430G2553 microcontroller to operate. This microcontroller contains pin oscillator and PWM which is used to turn ON or OFF and regulation of the particular devices respectively. Finally, the capacitive touch sensor are used to replace the mechanical switches thus providing high reliability, shock proof, trendy looks etc. The regulation of the devices which is connected to these switches can also be done using the same switches. Here regulation means light intensity control in the in bulb, speed control in the case of motor etc. Thus it reduces the power consumption and improves the quality of life.
Keywords: Capacitive Touch Sensor, Pulse Width Modulation (PWM), Light Emitting Diode (LED), DC Gear Motor.
Abstract
Facial Image based Emotion Recognition System using Neural Network
Parnal Dudul, Prof. S. M. Tayade, Prof. Ajay Talele
DOI: 10.17148/IJARCCE.2017.6511
Abstract: Facial emotion plays a vital role for human interactive communication and also used in numerous real applications. Facial expression identification from frontal still images has in recent times become a hopeful investigation area. Their applications include human-computer interface, human emotion examination robot control, driver state surveillance and medical fields. This paper aims to develop emotion classification scheme to identify seven dissimilar facial emotions, such as surprise, sad, neutral, happy, fear, disgust and anger by using JAFFE database. Two different approaches of feature selection and extraction have been used for generation of optimal feature vector. LBP and 2D- DCT coefficients are employed in addition to image statistics, texture and entropy parameters. In order to reduce the high dimensionality of the inputs, the principal component analysis has been used and significant reduction in the input-dimensionality has been achieved. The single hidden layer feedforward neural network has been used as a classifier in order to classify different emotions from frontal facial images. Three learning algorithms such as resilient backpropagation, scaled conjugate gradient and gradient descent algorithm with momentum and adaptive learning rate have been compared. It has been observed that LBP based feature vector and neural network with gradient descent algorithm with momentum and adaptive learning rate delivers the best classification performance.
Keywords: Facial Emotions, 2D DCT, LBP, PCA, neural network, Classifier.
Abstract
Vulnerability Signatures and Log Analysis: A Survey
Poornima .M, Ramakrishna M.V
DOI: 10.17148/IJARCCE.2017.6512
Abstract: Computer security has become a major concern of modern technological era and the history of security leads to a better understanding of emergence of security technology. One such field is concerned with protecting computer assets from attackers. Logs contain a huge wealth of information. Logs provides a sight of running system. Vulnerability is a kind of bug used by an attacker .log analysis for system security could be signature based or anomaly based. Both of these signatures are could either be network based or host based. In this paper a survey is done to study the current practices in generation of vulnerability signatures and analysis of logs.
Keywords: Logs, vulnerability signature, anomaly signatures, network based, host based.
Abstract
Optimization of Parameters of Wireless Sensor Network using Opportunistic Routing Algorithm
Ankita Bajpai, Anamika Goswami, Mahendra Kumar
DOI: 10.17148/IJARCCE.2017.6513
Abstract: Savings optimization will become one of the principal worries in the wireless sensor community (WSN) routing protocol layout, because of the reality that maximum sensor nodes are geared up with the restrained non-rechargeable battery strength community lifetime for statistics relay. Following the principle of opportunistic routing idea, multi hop relay choice to optimize the network energy performance is made based totally at the differences amongst sensor nodes, in phrases of both their distance to sink and the residual strength of each different. In this paper, we propose a technique, which improves the Opportunistic routing algorithm on the basis of Energy, Network Lifetime, Delay and Delivery Ratio.
Keywords: ORARN, Delay, Energy, Routing, WSN.
Abstract
Application of Low Rank Online Multimodal Distance Metric Learning Technique for Semantic Hashing of Web Documents
P. Suryanka, L. Yamuna
DOI: 10.17148/IJARCCE.2017.6514
Abstract: Semantic hashing for web documents is essential for effective information dissemination. This paper is a sincere effort towards application of a novel method which outputs a semantic hash for an input web document. The need of such method arises as a result of research search where user may be so na�ve that they are unaware of domain specific keywords or any labels for satisfying their search goals. The proposed technique in this paper assigns rank from 1 to n based on highly relevant modals of a web document. We have used six of such modals and duly considered their impact in finding semantics of a web document when hashing with a user input document. The algorithm is used in many information retrieval systems and employs a distance metric learning mechanism in practice.
Keywords: Semantic, Retrieval, Multi-Modal, Context, LOMDML.
Abstract
Payload Data Processing System on Satellite
Shreyas H V, Dr Mohan H S
DOI: 10.17148/IJARCCE.2017.6515
Abstract: The world is progressively relying upon theremotely detected information. The information is routinely utilized for checking the earth assets and furthermore to solve issues of the world like fiascos, atmosphere debasement, and so forth. Remotely detected information has changed our point of view of comprehension of different planets. With imaginative methodologies in information use, the requests of remote detecting information are regularly expanding. New exploration and advancements are obtained from information use. Satellite assets remain rare and each dispatch outlays vigorously. Apiece dispatch is likewise connected with expansive exertion for building up the equipment preceding dispatch. It is additionally connected with a substantial number of programming components and scientific calculations post-dispatch. The multiplication of low-earth and geostationary satellites has prompted expanded shortage in the accessible orbital spaces for the more up to date satellites. Space Research Organization has constantly attempted to upturn the service of satellites. Different sensors are winged on each satellite. In a piece of the satellites, radars are intended to take into account different ghostly groups/rates. Satellite (ex-Bhaskara-1), the principal trial satellite began with two groups in electro-optical range and three groups in themicrowave range. The framework stood intended to give information all around different information gathering stations and locally available information stockpiling abilities. Oceansat-2 satellite has one of a kind sensor mix with 8 bands electro-optical high delicate sea shading screen (obliging sea and land) alongside Ku-band scatter meter to procure data on sea winds. A similar framework has information transfer transponders for gaining information from climate stations. The payload arrangements have experienced noteworthy changes throughout the existences to build information of payload. Upcoming Indian distant detecting frameworks are arranged with high proficient methods for picture procurement. This paper explains about the high effectiveness in remote detecting picture information obtaining. Parameters identified with the effectiveness of picture information procurement are characterized then a philosophy is operated out to register the identical. A portion of the payloadsis broke down as for a portion of the framework limits that choose the arrangement of payload. This strategy might be utilized for surveying missions and can be reached out near different sorts of payloads and missions.
Keywords: Remote Sensing, Image acquisition, Resolution, Electro-optical payload, Data acquisition system, image acquisition efficiency.
Abstract
Comparison of the Low Power Wireless Technologies for Smart Refuelling
Sneha Kishore Kumar Rane, Rohini S Hallikar
DOI: 10.17148/IJARCCE.2017.6516
Abstract: Wireless communication is widely used in the field of the smart refueling but making the system ultra-low power is the major concern. In application area like mining and construction site, there is a need to use the non-replaceable low power devices which have more battery life. This paper discusses about the various technologies that can be employed for the wireless communication of the smart refueling and gives the idea in choosing the right technology. Sub-1GHz technology is used in the 866MHz (free frequency band in India and has low spectral pollution) with the proper tool and product to build a wireless module for automatic vehicle recognition (AVR) system. This module will use the data read by the RFID reader and transmit it to the wireless receiver at the terminal giving low power and low-cost solution to attain fast and smooth refueling.
Keywords: Sub-1GHz; low power; Automatic vehicle recognition (AVR).
Abstract
Digital Image Watermarking using SWT and SVD
Manju Yadav, Ashok Kumar
DOI: 10.17148/IJARCCE.2017.6517
Abstract: In this tech-era everyone is using social networking sites and many messenger sites. Using internet anyone can send data and access any data in few seconds in all over world but the problem is this if any data once send over a network lose its privacy any third party can access your data and can use your data in illegitimate manner and you cannot claim that this data belongs to you but if you put a watermark in that data the third party cannot access your data if your data send to any wrong person by mistaken then that person can send back your data by identifying watermark. So now main objective of our paper is to make a compatible relation between imperceptibility and robustness. .In this paper an improved technique based on SWT and SVD is presented that has good PSNR, MSE and NCC compare to other technique.
Keywords: SWT (Stationary wavelet transform), SVD, PSNR, NCC.
Abstract
A Review on Cloud Gaming
Sunanda D. Biradar, Nusrathjabeen. Nagoor
DOI: 10.17148/IJARCCE.2017.6518
Abstract: The present paper mainly focuses on literature review of cloud gaming. cloud gaming model it emerges with the advancement of communication technologies and cloud computing. Moving towards PCs, smartphones consoles tablets, people can have opportunity to use the games via data streaming, despite of the computing power of devices. The Internet is the style of communication between the game, and device hosted on a cloud environment. The big data analytics models it is an having ability to work with these data, and provides inputs for predictive actions and assertive analysis . A technique is shown in this study to indicate and analyzing the players� patterns in a virtual environment to optimize user experience. Using the visualization tools and Hadoop technology on a Cloud based cluster, it was possible to map and identify the players�behaviors as well as their gameplay patterns.
Keywords: Cloud Gaming; Big Data Analytics; Artificial Neural Networks.
Abstract
A Review on: Job Portal- A Web Application for Distributed Clients
Pooja T. Killewale, Prof A.R. Mune
DOI: 10.17148/IJARCCE.2017.6519
Abstract: Our JobPortal consists of 3 modules. Admin, Recruiter and Jobseeker. The admin has authority over the complete portal. He can see the recruiter requirements & search the relevant candidates for that profile. Recruiter has to buy some packages after registration and can post jobs, view jobseeker profile, download their resumes as per the restrictions of the package for the given validity period. Jobseeker can register for free in our portal and can search and apply for jobs matching their profile. This research aims to develop a job web portal for the students in the Faculty of Computer Science and Information Technology The main aims of this portal are to connect to the industries and acts as an online recruitment to support the students to find the right IT job after graduation. Furthermore, this system enhances the understanding concept and importance of the job portal for students in the universities. A survey was conducted to identify the students� problems with the existing portal of the faculty and to gather their requirements which can be incorporated in to the portal to be developed.
Keywords: Job Advertisement, job hunting, job portal, job posting, job search, content management system, and web- based system.
Abstract
Review on Neural Based Expert System for Home Automation
Gunjan, Saurabh Charaya
DOI: 10.17148/IJARCCE.2017.6521
Abstract: Cloud services are offering the flexible and scalable services. But there is always issue of security. When data is transferred from centrally located server storage to different cloud the compromise of person and private data would increase. There is always risk to the confidentiality and availability of data prior to selecting a cloud vender or choosing own cloud and cloud service migration. In order to program & control flow of information in Internet of Things, a predicted architectural direction is required. It is being called BPM. Everywhere that is a blending of traditional process management and special capabilities to automate control of large numbers of coordinated devices.
Keywords: IOT, Integration, Home automation, Machine to Machine.
Abstract
Anti-Phishing I-Voting System using Visual Cryptography
Ramya. R. Nelli, Rashi Mehra, Pallavi Madri, Monica S, Rajeshwari J
DOI: 10.17148/IJARCCE.2017.6522
Abstract: Anti-phishing I-voting system using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. The user or the employee is allowed to cast his or her vote from any remote place. The election is held in full confidentiality where the user is allowed to vote only if he logs into the system by entering the correct password. The password is generated by merging two shares using VC scheme. Before the election administrator sends share 1 to the voter�s e-mail id and share 2 will be available in the voting system for his login during election. Voter then combines share 1 and share 2 using VC to get the secret password. No information can be revealed by observing any one share. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims. Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter personal information at a fake website.
Keywords: Authentication, visual cryptography, image captcha, phishing, online voting.
Abstract
Snake Electrical Energy Production
Prof. Sagar P. Thombare, Prof. Priyanka Hire
DOI: 10.17148/IJARCCE.2017.6523
Abstract: Conceptual Harnessing the energy of waves is an alluring recommendation since they are a great deal more vitality thick than wind. In any case, wave control remains the poor connection of the sustainable power source segment because of the challenges of inexpensively working apparatus in the cruel marine condition. The world's first business wave cultivates just started working a year ago, off the northern shoreline of Portugal. An assortment of different outlines is in trying the world over, yet none are as irregular as the Anaconda. The elastic snake is loaded with freshwater � to help hinder ocean animals from setting up a home inside and fixed at both closures to make a semi-unbending inflatable that buoys at the ocean's surface.[1]
Keywords: wave energy, snake energy, PCM, power.
Abstract
HIVELytics: Building Execution Profiles for the Systems Running on HIVE
Pratheeksha P, Paramesh R
DOI: 10.17148/IJARCCE.2017.6524
Abstract: Apache Hive could be a wide used information reposition and analysis tool. Developers write SQL like HIVE queries, that are regenerate into MapReduce programs to runs on a cluster. Despite its quality, there's very little analysis on performance comparison and diagnose. Part of the explanation is that instrumentation techniques accustomed monitor execution can not be applied to intermediate MapReduce code generated from Hive question. as a result of the generated MapReduce code is hidden from developers, run time logs are the sole places a developer will get a glimpse of the particular execution. Having an automatic tool to extract info and to come up with report from logs is crucial to know the query execution behavior. The designed a tool to make the execution profile of individual Hive queries by extracting info from HIVE and Hadoop logs. The profile consists of elaborated info regarding MapReduce jobs, tasks and tries happiness to a question. it's keep as a JSON document in MongoDB and might be retrieved to come up with reports in charts or tables. I have run many experiments on AWS with TPC-H knowledge sets and queries to demonstrate that our identification tool is ready to help developers in examination HIVE queries written in numerous formats, running on completely different knowledge sets and organized with different parameters. it's additionally ready to compare tasks/attempts inside constant job to diagnose performance problems.
Keywords: MapReduce, HIVE, Hadoop, JSON.
Abstract
Duplication Free Minimal Keyword Search in Graph using Top-K Algorithm
Miss. Payal P. Thakur, Prof. N. R. Borkar
DOI: 10.17148/IJARCCE.2017.6525
Abstract: Keyword search over a graph searches for a subgraph that contains a set of query keywords. A problem with most existing keyword search methods is that they may produce duplicate answers that contain the same set of content nodes (i.e., nodes containing a query keyword) although these nodes may be connected differently in different answers. Thus, users may be presented with many similar answers with trivial differences. In addition, some of the nodes in an answer may contain query keywords that are all covered by other nodes in the answer. Removing these nodes does not change the coverage of the answer but can make the answer more compact. The answers in which each content node contains at least one unique query keyword are called minimal answersin this paper. We define the problem of finding duplication-free and minimal answers, and propose algorithms for finding suchanswers efficiently. Extensive performance studies using two large real data sets confirm the efficiency and effectiveness of theproposed methods.
Keywords: Keyword search, graph data, polynomial delay, approximation algorithm.
Abstract
Performance Enhancement in MIMO Two-Way AF Relaying System using Pre-coding Technique
Devi Singh Meena, Kavita Upadhyay
DOI: 10.17148/IJARCCE.2017.6526
Abstract: MIMO (Multiple-input, multiple-output) systems are an essential component of future wireless communication systems, due to their promising improvement with regards to performance and bandwidth efficiency. A significant research topic is study regarding multi-user MIMO systems. Such systems have the possibility to combine the top throughput achievable with MIMO processing with the main advantages of space division multiple accesses (SDMA). In this paper, a Bit Error rate analysis is presented for multiple-input�multiple-output (MIMO) system with two way multiple relay system with AF considered in QPSK modulation technique, where a transmitted signal consists of a pre-coders followed by an space�time block code (STBC), such as dirty paper code (DPC). DPC primarily helps transmit data efficiently even though the communication channel offers interference. Its objective is always to send as much readable information on a channel with interference as you can. The BER performance of this method is compared with the pre-coder based methods like Minimum Mean Square Error and zero-forcing beam forming. This paper considers both one-way and two -way relaying systems with multiple relays between two terminal nodes where all nodes have MIMO antennas.
Keywords: Amplify-and-forward, MIMO, Space time block coding, Pre-coder (DPC), two ways relay, CSI, MMSE.
Abstract
Object Detection in Android Smartphones for Impaired
Prof. S.P. Jadhav, Sonali S. Jayswal, Stelly. Tommy, Harshvardhan D. Dhaware, Akshay R. Vijapure
DOI: 10.17148/IJARCCE.2017.6527
Abstract: The Main goal is to eliminate the need of dedicated devices and other wearable devices. We are implementing to help the visually impaired people using simple android Application with the help of smart phones. By using image processing, object detection, speech synthesis the highlighted key components to use this application. Detecting object using image processing technique can be used in multiple industrial as well as asocial applications. The project purpose is to use object detection for blind people and give them audio or vocal information about it as well as we are doing feature extraction to search for objects in a camera view. To improve the day to day lives of visually impaired blind people and people with low vision. Keeping in mind the challenges faced by them we felt the need of an Android application to provide them necessary information about the environment and the objects. The paper gives an overview of a general method of object recognition and significance of ORB over SIFTS and SURFS in different cases. This paper also provides an idea to implement ORB algorithm on FPGA to increase the execution speed by utilizing the reconfigurable nature and pipelining of the FPGA.
Keywords: Image Processing, Speech Synthesis, Object Detection, Android Application.
Abstract
Pallet Sorting using Optical Character Recognition
Suraj Muley, Virendra Patil, Payal Dhage, Sarika Panwar
DOI: 10.17148/IJARCCE.2017.6528
Abstract: Although, automation led us into the development in terms of sophistication of human efforts in bringing out mass production of more precisely manufactured goods but it needs to be modified to be a smarter intelligent system. Pallet sorting equipment using OCR techniques reduces human efforts in recognizing required position of object. It reduces time required to sort objects with less time. Different preprocessing techniques are used like skew correction, binarization, text recognition etc. In this paper, the proposed system is based on an efficient binarization and enhancement technique followed by a suitable connected hardware assembly is discussed. The objective of the study is to significantly improve the capabilities of pallet sorting by address recognition.
Keywords: OCR, skew correction, text recognition, pallet sort.
Abstract
A Survey on Mining Aspects for Queries
Haritha Padmanabhan, Derroll David
DOI: 10.17148/IJARCCE.2017.6529
Abstract: There is a problem of finding query facets or angles that is a particular aspect or feature of something which are multiple groups of words or phrases that explain and summarize th content covered by a query. Query facets provide interesting and useful knowledge about a query and thus can be used to improve search experiences in many ways. First, we can display query facets together with the original search results in an appropriate way. Second, query facets may provide direct information or instant answers that users are seeking. Third, query facets may also be used to improve the diversity of the ten blue links. It is an assumption that the important aspects of a query are usually presented and repeated in the query�s top retrieved documents in the style of lists, and query facets can be mined out by aggregating these significant lists. This can be solved by automatically mine query facets by extracting and grouping frequent lists from free text, HTML tags, and repeat regions within top search results.Then a large number of lists do exist and useful query angles can be mined.
Keywords: Facets, Mining, Query, Web page, HTML.
Abstract
A Noval Wakeup Schedule Algorithm for Relay Nodes to enhance the lifetime of Sensor Network
Shruti Pandey
DOI: 10.17148/IJARCCE.2017.6530
Abstract: The appeal of acquiring ambient knowledge to build smart environment results in a discovery of new intelligent devices which have overall abilities of sensing, computation and communication. Through precocious networking protocols, these devices are interconnected to each other and form Wireless Sensor Network (WSN). Routing is gargantuan task in terms of wireless sensor network. A routing protocol for wireless sensor network is different from conspiring it for the traditional networks. Traditional wireless routing protocols do not adapt well to the dynamic wireless environment variations. Hence, these protocols trigger excessive link-level retransmissions, unthriftiness of network resources, and may even lead to system cataclysm. Opportunistic Routing, however, considers the shared wireless medium as an opportunity rather than a limitation. In fact, the key idea behind opportunistic routing is to overcome the drawback of unreliable wireless transmission by taking advantage of the broadcast nature of the wireless medium. The problem arising is of energy optimization in network and if energy is managed, lifetime for the network is enhanced. Thus, we bring the enhanced ENS_OR algorithm, the advanced version of ENS_OR which include wakeup schedule in it. The Enhanced ENS_OR satisfies both metrics manages energy as well as prolong the network lifetime also.
Keywords: Wireless sensor network, Opportunistic Routing Protocol, Enhanced ENS_OR, Wakeup schedule.
Abstract
Node Failure Detection in both Wired and Wireless Sensor Network Using Binary and Non-Binary Schemes
Amulya C N, Rajeshwari B S, Sowmya R, Lavanya K, Kavya K
DOI: 10.17148/IJARCCE.2017.6531
Abstract: The main objective of this paper is node failure detection. To do this there are Binary Scheme and Non Binary Scheme. In Binary scheme, result will be one if Node is active and result will be zero if Node is not active. But main problem with binary scheme is we cannot check the signal strength. So we go for Non Binary Scheme, in this scheme we can check whether the node is in strong state or weak state to receive the signals. In the proposed system we are designing the scheme which can be used for both wired and wireless sensor network. If the node is in active state the data can be transferred else checks for the alternate route.
Keywords: Node Failure Binary Scheme, Non Binary Scheme, Fault Management.
Abstract
Analysis of PAPR Reduction using Partial Transmit Sequence (PTS) Technique in OFDM
Mohit Agrawal, S. K. Sriwas, J.P. Sani, M. Shukla
DOI: 10.17148/IJARCCE.2017.6532
Abstract: From a current scenario demand of high speed multimedia data services increase day by day. Orthogonal Frequency Division Multiplexing (OFDM) is one of the important multi carrier systems and it is famous because it allow large no of subcarriers, high speed data rate and universal coverage with high speed mobility. OFDM is considerably degrades by peak-to-average-power ratio (PAPR).There are many scheme are developed to reduce the PAPR in OFDM system. In this paper we use Partial Transmit Sequence (PTS)technique to decrease the PAPR and simulation data of this technique is done by using Matlab.
Keywords: Peak-To-Average Power Ratio (PAPR), Orthogonal Frequency Division Multiplexing (OFDM), Partial Transmit Sequence (PTS), Quadrature Amplitude Modulation) QAM.).
Abstract
Method to Capture Tearing and Stuttering in a GPU Driven Application
Yogesh Dasgaonkarw, K K Joshi
DOI: 10.17148/IJARCCE.2017.6533
Abstract: The manufacturing of a display system associated with a GPU system involves a mathematically driven algorithm and is based on several use cases that determine this algorithm to be designed in the correct way so as to avoid the various display related issues like stuttering, flickering, ghosting etc. This paper explains the various issues related to display technologies and provides a mechanism to calculate tearing and stutter datamathematically rather than observing them only through visual means. When we are dealing with the variable frames per second (fps) output of the GPU processed data to be outputted on the screen in real time , the type of activity that may be required to challenge occurs when the frames per second changes in a real time game graphics engine. There are displays suited to gaming, design work, and ultra-high resolution detail, but mixing priorities results in compromise. Fast response time, colorfully vibrant, or high-DPI�pick any two, because there's still no monitor that quite hits every bullet point. Even if a monitor hits all the bullet points it cannot always guarantee that it will be free from the issues associated with a display system. There exist a number of issues with these systems like stuttering, flickering,ghosting, micro stuttering and tearing which has a very high impact on the output and gameplay of the game played on that GPU system. These common display output issues will hereafter be referred to as �display system issues�.Visual Technology, graphic intensive applications and the display market itself (which is estimated to be worth 169.17 Billion USD by 2022) will be required to be able to incorporate means to avoid stutters and tearing.[5]
Keywords: stuttering, flickering , ghosting , micro stuttering and tearing.
Abstract
Dynamic Road Traffic Signal Control using Digital Image Processing and RFID Sensors
Prof. Wrushali M Mendre, Charudutta Sonone, Shrikrishna Choudhari, Kumar Gaurav
DOI: 10.17148/IJARCCE.2017.6534
Abstract: We all are experiencing heavy traffic in our metropolitan cities now a days. At such times it becomes very difficult for us to wait in heavy traffic jams. A solution to such conditions is given in our project, Dynamic traffic control using DIP n RFID sensors. At the traffic signals the count of the vehicles is taken (density count) and according to it, the duration of the traffic signal lights are modulated. Moreover for security purpose we are also using continues traffic monitoring and identification of the vehicle which has broken the signal is done using RFID sensors. Using GSM module and the data acquired from RFID module a penalty message is sent to the culprit with corresponding fine amount.
Keywords: Traffic density count, image processing, intelligent controlling of traffic, RFID module, GSM module.
Abstract
Different Coupling of Notch Loaded Rectangular Microstrip Patch Antenna for Wireless Communication System
Mohit Khanna, D.C. Dhubkarya
DOI: 10.17148/IJARCCE.2017.6535
Abstract: In this paper comparisonof different shapes of coupling of microstrip patch antenna is discussed.The bandwidth of proposed design antenna is 37.43 % (2.705 GHz-1.852GHz). The antenna has been designed for 2.45GHz operating frequency and the result of different coupling is compared byIE3D simulationtool. The return loss is -15.698dB, gain of 3.7447 dBi and Directivity of6.8002 dBi. The resonant frequency is 2.5470GHz which is near to our operating frequency. The antenna is fed by 50?Micro strip line feed.
Keywords: Microstrip patch antenna, coupling, Rectangular patch, IE3D Simulation Tool.
Abstract
Patient Health Monitoring and Controlling System using Internet-of-Things (IoT)
Shamika Jog, Prajakta Ghodake, Darshana Jagtap, Deepgandha Shete
DOI: 10.17148/IJARCCE.2017.6536
Abstract: IoT is a platform which offers various applications in different fields. IoT provides an important contribution in the field of healthcare, its principles and properties are already being applied to improve access to healthcare, improve the quality of healthcare and most importantly reduce the cost of system. The technology is used for gathering, analyzing and transmitting data in the IoT continues to new innovative healthcare applications and systems. Wireless devices are involved in medical area with a wide range of capability. To monitor the patient�s health details in periodic interval is necessary in existing technologies. To overcome this we have changed recent wireless sensor technologies. In general different sensors are used to gather patient�s medical information without being injecting inside the body by this we are achieving monitoring and data gathering of patients. There is no need for doctor to visit patient periodically. IoT provides new applications as well as efficient systems which helps to make an integrated healthcare system. The system provides better capability, healthcare system and costs are also reduced. Treatment outcomes are also improved.
Keywords: IoT, wireless sensor, integrated healthcare system.
Abstract
Study of Optimization of Recycle Coarse Aggregate on Strength Characteristics of Different Grades of Structural Concrete
Er. Nirmaljeet, Er. Vikram
DOI: 10.17148/IJARCCE.2017.6537
Abstract: A study based upon the analysis of the various experimental results for the fresh and hardened stage of the different concrete mix with different replacement levels of natural coarse aggregate with recycle coarse aggregates is presented in the paper. The recycled coarse aggregate were obtained from mobile crusher plant located in Sangrur (Punjab). The crushed aggregate was that of M30 grade demolished bridge deck slab and pier.Three types of concrete mixture were selected for a testing, i.e. M25, M30 &M35grade. The first two mixtures i.e(M25 &M30)are somewhat same as that of parent concrete (M30) from which recycled coarse aggregate is derived, so they were selected as 1st series where as 3rd mixture M35 was selected as 2nd series. For the first series, concrete was made entirely with natural aggregate as a control specimen and concrete was made with recycle coarse aggregate with 50&100% replacement levels of natural coarse aggregate. For 2nd series, concrete was made entirely with natural coarse aggregate as control specimen and two types of concrete with fly ash (15% and 25% replacement of cement) and recycle coarse aggregate (50% and 100%replacement of natural coarse aggregate) were made. 72 cube specimen and 36 beam specimens were made for testing of basic properties (cubes for compressive strength and split tensile strength; beam specimen for flexural strength) of hardened concrete. The fresh property i.e, the slump value for each investigated concrete type is also presented in the paper. In 1st series (M25 &M30), recycled aggregate concrete did not diverge its properties as compared with the control specimen, regardless of the replacement ratio by recycled aggregates. However for the 2nd series (M35), in order to achieve the desired strength, fly ash was used as the replacement of cement. The test results obtained were somewhat more than that of control sample.
Keywords: recycle coarse aggregate, natural coarse aggregate, fly ash, structural concrete.
Abstract
Congestion Control in Spatial Networks in Case of Disasters
Saumya Pandey, R. K. Singh
DOI: 10.17148/IJARCCE.2017.6538
Abstract: Large numbers of algorithms have been proposed to solve shortest path query problems for static or time-dependent spatial networks; however, these algorithms do not perform well to find the nearest shelter with fastest paths in disaster situations. In disasters, path computed through existing algorithms and saved as the fastest might become damaged. ONSC approach provide optimal path in disaster situation but do not deal with congestion control. To solve this problem, this paper proposes a method to reduce the travelling time with an existing dynamic network model, which is called an event-dependent network, to represent a spatial network in a disaster which help the people to choose the optimal path by giving weight-factor(in percentage) of the congestion in the road network.
Keywords: congestion control, event dependent network, path planning, disaster management.
Abstract
Bandwidth Enhancement of U Shape Notched Microstrip Patch Antenna for Low Frequency Band
Surendra Kumar Gupta, D.K. Srivastava, Ravi Kant Prasad
DOI: 10.17148/IJARCCE.2017.6539
Abstract: In this research paper, microstrip patch antenna with U-shape notched is analysed. Proposed antenna is suitable for band (1.965 � 2.508 GHz) for frequency band. The proposed antenna meet the required impedance bandwidth is 24.279 %. The dimension of proposed antenna is (29.5 � 38.0 � 1.6 mm3). This antenna exhibits bandwidth at 2.367 GHz and Gain is 4.01543 dBi. The archived band can be optimized by change parameter of U Shape notched microstrip patch antenna. The variation in the design structure from U shaped antenna is notching in the structure and varying the width of slot. The proposed antenna by introduces notching in the rectangular U shaped radiating patch, is suitable for Wireless application which works around frequency 2.4 GHz and its VSWR is around 1.237.
Keywords: Slotted Microstrip patch antenna, Feed-line, Return loss, Radiation pattern.
Abstract
Energy Harvesting in Wireless Sensor Networks
Anamika Goswami, Mahendra Kumar, Ankita Bajpai
DOI: 10.17148/IJARCCE.2017.6540
Abstract: Wi-fi or WSN sensor networks are potentially one of the mainly significant technologies of this century. Current development in wi-fi communications and electronics has enable the development of low-value, low-energy, multifunctional minute devices for use in remote sensing applications. The mixture of these elements have stepped forward the viability of using a sensor community which includes a huge variety of clever sensors, allowing the gathering, processing evaluation and dissemination of precious facts amassed in a selection of environments. Sensor community protocols and algorithms have to own self-organizing abilities. Every other specific function of sensor networks is the cooperative attempt of sensor nodes. Sensor nodes are appropriate with an onboard processor. As opposed to sending the uncooked records to the nodes accountable for the fusion, they use their processing talents to domestically perform easy computations and transmit handiest the specified and in part processed records.
Keywords: WSN, LEACH, Dead Nodes.
Abstract
Feature Extraction from Satellite Imagery
Aishwarya.C.G, Apoorva T M, Shresta R Shetty, Vandana B R, Mrs. Sangeetha V
DOI: 10.17148/IJARCCE.2017.6541
Abstract: Satellite multispectral remote sensing imagery has been used over decades for feature extraction. The spectral classes of the imagery are finally translated into the different feature types in the image interpretation process (image processing). Presently, classification of all feature types is a manual process. Local and global climatic variability and change is inevitable which makes satellite imagery redundant in a short span of time. Due to the above stated reasons, we need an efficient and fast automatic feature extraction algorithm for better observing and organization of the resources of Earth. This paper proposes a technique to extract urban built-up, land/vegetation and water features from Enhanced Thematic Mapper Plus (ETM+) (Landsat 7) imagery. The study used three indices, Normalized Difference Water Index (NDWI), Normalized Difference Vegetation Index (NDVI), and Normalized Difference Built-up Index (NDBI) to represent three major features on Earth: built-up land, open water body, and vegetation, respectively. Consequently, the seven bands of an original Landsat 7 image were reduced into three thematic-oriented bands derived from above indices, which were combined to compose a new image. This reduced data correlation and redundancy between original multispectral bands, with overall accuracy ranging from 91.5 to 98.5 percent. All these feature extractions will be helpful in developing information systems on water bodies, vegetation areas a-lnd urban sprawling.
Keywords: Automation, remote sensing, Landsat, spectral index ratio, feature extraction.
Abstract
A Review on Clustering Techniques and Time Series Analysis
Nidhi Tiwari, Prof. Toran Verma
DOI: 10.17148/IJARCCE.2017.6542
Abstract: Data mining is the combination of data assembled by customary information mining philosophies and procedures with data accumulated over a period of time. Mining means extricating something helpful or important from an already existing data. This paper is intended to review time series analysis and clustering techniques. The clustering algorithms which are investigated are K-Means and Hierarchical Clustering. Also a review is also conducted on Time Series based clustering.
Keywords: Data Mining, K-Means Algorithm, Hierarchical clustering algorithm, Time Series analysis.
Abstract
Real Time detections of Drowsy Driver using Renes as Micro Controller
Anusha V A, Priyanka B H, Savitha N, Shreevandana A S, Neelaja K
DOI: 10.17148/IJARCCE.2017.6543
Abstract: Now a days the death injuries are increased as the rate of road accidents are more. One of the main cause is due to driver fatigue. In this paper the detection of drowsy driver is based on closed or opened eye condition and displaying warning message accordingly. Detection of closed and opened eye condition is done by observing the blink pattern and eye movement. Real time detection of driver�s eyes is to be processed using image processing in MATLAB to detect weather the eye remains closed for more than fixed duration which indicates the condition of fatigue and raises an alarm which could prevent a collision. Even though if the driver is drowsy, continues alarm raises, if number of raised alarm crosses certain limit then the vehicle will be made to slowdown and stopped.
Keywords: Driver drowsiness, Eye blink pattern, Eye moment, Mean.
Abstract
The Framework for Building Smart Cities Application using IoT and Cloud Based Architecture
Prof. Sunil Kumar Yadav, Miss. Ashwini T. Pawar, Miss. Monika A. Shelar, Miss. Manali A. Pachpande, Mr. Mayur Barhate
DOI: 10.17148/IJARCCE.2017.6544
Abstract: Prime Minister Narendra Modi came up with new ideas of Smart City and took initiative in it. This project presents some new points which will be used in Smart city. Smart City technologies uses cloud-based and Internet of Things (IoT) based services in which real-world user interfaces use smart phones, sensors and bluetooth. In Smart city all devices are connected with each other through Internet and Wifi. This paper addresses the convergent domain of cloud computing and IoT for any smart city application deployment. A large number of people moving towards urban cities. This situation has created an urgency for finding smarter ways to manage the challenges and to win over it. These all things will lead to Smart city.
Keywords: Internet and Wifi, Smart city, IoT, smart phones, sensors and bluetooth.
Abstract
A Review on aging aware Reliable Multiplier
Sushant Jalindar Sawant, Prof. Sanjay S. Badhe
DOI: 10.17148/IJARCCE.2017.6545
Abstract: Advanced Digital multipliers are the most critical arithmetic functional units. The general execution of these systems depends on the throughput of the multiplier. While negative bias temperature instability (NBTI) effects on logic gates are of major concern for the reliability of digital circuits, they become even more critical when considering the components for which even minimal parametric variations affect the lifetime of the overall circuit. In the mean time, the negative bias temperature instability effect occurs when a pMOS transistor is under negative bias (V gs=-Vdd), increasing the threshold voltage of the pMOS transistor, and decresing multiplier speed. A similar phenomenon, positive bias temperature instability, happens when an nMOS transistor is under positive bias. Both effects or impacts reduce transistor speed, and in the long term, the system may fail because of timing infringement. Therefore, it is important to design reliable high-performance multipliers. In this paper, we propose an aging-aware multiplier design with a novel adaptive hold logic (AHL) circuit. The multiplier can give higher throughput through the variable latency and can adjust the AHL circuit to mitigate performance degradation that is due to the aging effect.
Keywords: Adaptive hold logic (AHL), negative bias temperature instability (NBTI), positive bias temperature instability (PBTI), reliable multiplier, variable latency.
Abstract
Flexible Multi-Keyword Based Optimized Search Scheme for Encrypted Cloud Storage with User Revocation
CH. M. Shruthi, P. Deepthi, G. Sreelatha
DOI: 10.17148/IJARCCE.2017.6546
Abstract: Encryption is used to secure data before it is sent to cloud storage. It is done by data owner in order to protect data from misuse. However, there are issues when the encrypted data needs to accessed or searched for. The traditional search operation is not suitable for searching encrypted cloud data. Many researchers contributed towards providing search mechanisms on encrypted and outsourced cloud data. Xia et al. focused on secure multi-keyword ranked search on the encrypted and outsourced data to public cloud. They supported search operations and data dynamics as well. In this paper we proposed a methodology for performing flexible multi-keyword based optimized search scheme for encrypted cloud storage with user revocation feature. Users who are no longer supported by the system are revoked in order to ensure that the system remains secure. A model is built in order to have dynamic queries possible. Towards this end TF/IDF measure is used for flexible search operations on outsourced cloud data. We built a prototype application that shows multi-keyword ranked search with user revocation feature. The results revealed that the proposed system is flexible, secure and supporting optimized search over encrypted cloud data.
Keywords: Cloud data storage, encrypted cloud data, outsourcing, searching on encrypted cloud data, user revocation.
Abstract
Accident Detection by an Intelligent System
Bhalerao Harshal A., Jadhav Sarika J., Jadhav Snehal B
DOI: 10.17148/IJARCCE.2017.6547
Abstract: Most of the accidents on highways as well as on roads can lead to social as well as economic impacts. For minor accidents it is not necessary to give much more attention because passengers themselves take care. Whereas other accidents in which airbags are deployed requires immediate attention. Accident Detection by an Intelligent System (ADIS) is a smart system which informs to the emergency contacts through text messages when there is a change in acceleration, rotation and force which is detected by different sensors. These sensors are connected to the central system of the car. The idea behind this system is to inform authorities after collision immediately to avoid congestion and allows passengers to be hospitalized quickly. The system consists of Fuzzy logic as a decision support which decides accident is happened or not.
Keywords: Fuzzy Logic, Accident, Arduino, Accelerometer.
Abstract
Ai Distress Beacon using Speech Recognition
Arman Shaikh, Mutasim Rehman, Rushikesh Mate, Ritesh Ghate, Prof. Mrs. A.S. Khandagale
DOI: 10.17148/IJARCCE.2017.6548
Abstract: In recent time, there are many misbehaving activity happening with women in urban and rural areas. This paper is about �An Android Application for Women Safety Based on Voice Recognition�. One in which, keywords of different languages are set for activation of the system. System recognizes the voice and frequency of voice of the user. After system gets activate, it uses a GPS or WI-FI to track the location information of the user and send that location information as a message via SMS and post it on Social Application. Simultaneously, an emergency signal is sent to people who are selected by the mobile user. There is no need to handle mobile to activate the system and it will get activated even if mobile keypad is locked.
Keywords: Android, Voice Recognition, Dial 100, Messagesending, GPS, WI-FI, HMM, Audio Recording.
Abstract
Image Retrieval using High Order Local Autocorrelation and MFCM
Meenakshi Srivastava, Dr. S.K. Singh
DOI: 10.17148/IJARCCE.2017.6549
Abstract: Time span has increased Dynamic Vast development of data like pictures, sound and video on web. Which has prompted established researchers for capacity and recovery of interactive media data all the more naturally? Since one picture can be translated from numerous points of view, catchphrase based seeking frameworks can recover the data to a restricted degree. This constraint has prompted the prerequisite for improvement of Content Based Image Retrieval Systems. Picture Retrieval frameworks which can perceive the articles like the human eyes have been generally prominent. To build a decent savvy vision framework, high measurement highlight vectors of pictures are required for example acknowledgment. In spite of the fact that high measurement include vectors gives mends facilitate with increment in number of pictures in database. In the present original copy creators have proposed a model which enough addresses these imperatives and gives a vigorous and quick recovery component of images.
Keywords: CBIR System, Image Retrieval, fuzzy C-mean Clustering (MFCM), High Order Local Autocorrelation.
Abstract
Minimizing Energy Consumption & Prolong Network Lifetime of Linear WSNs
Roshni Kapoor, Pragya Awasthi
DOI: 10.17148/IJARCCE.2017.6550
Abstract: Wireless sensor networks (WSNs) have been employed as an ideal solution in many applications for data gathering in harsh environment. Energy consumption is a key issue in wireless sensor networks since nodes are often battery operated. Medium access control (MAC) protocol plays an important role in energy e?ciency in wireless sensor networks because nodes� access to the shared medium is coordinated by the MAC layer. An energy efficient MAC protocol is designed for data gathering in linear wireless sensor networks. In order to enhance the performance, when a source node transmits data to the sink, Best set of nodes are selected for forwarding data according to the energy consumption factor and residual energy balance factor. Some simulation experiments are conducted and the results show that, the proposed protocol provides better energy efficiency and long lifetime than the existing SLDMAC protocol.
Keywords: WSN, Linear topology, MAC protocol, Low-energy consumption, Relay nodes.
Abstract
Saliency Map Generation
Kiran Kumar M Mogalai, Dr. Veenadevi S V
DOI: 10.17148/IJARCCE.2017.6551
Abstract: Saliency Map is the process of distinguishing the pixels from its neighboring pixels. Saliency Map plays a vital role in many computer vision and image processing applications. This paper briefs the effective use of Saliency Map in Automobile applications. There are many individual algorithm like pedestrian detection, sign board detection, lane detection, traffic board detection algorithm and so on, but the computational time will be more. Saliency Map acts as an intermediate stage and reduce the computational time. Bottom-up approach is used to extract the saliency of an image. Graph based SLIC segmentation is used to segment the foreground object from the background.
Keywords: Saliency Map, Graph based SLIC segmentation, foreground, background.
Abstract
A Survey on Motion Detection in a Video
Mandeep Kaur, Pratibha Goyal
DOI: 10.17148/IJARCCE.2017.6552
Abstract: Motion Detection is a process of detecting a change in the position of the object relative to its environment or vice-versa. As time changes computer applications are becoming important part in every field. Due to which it has been used in several applications. The verification of the object from a video and then tracking of that object is an significant task in computer vision. Object is a thing of interest whose movement is to record. It can be anything of any dimensions. Video is a recording of moving visual images and to record the movements of the object in the video is quite a complex task. Object detection is termed as to detect or locate objects from consecutive frames of a video file. For object detection, object representation is required. There are many techniques that came into existence to capture the motions of the object but every technique is having their own merits and demerits. One of the merit is that they capture every motion of the object in the video while demerit contains the concept of Computational Cost, Accuracy, Time, Noise, Shadow Effect, only Major Movement Detection, Detection of Stationary Objects ,etc. Also most of the cameras produce a noisy image, which result into a motion in that such places, where there is no motion at all. This paper presents a survey of different motion detection techniques. This survey paper includes background subtraction method, temporal differencing, statistical approach, and optical flow method and then comparison is made on them, with this a feature extraction algorithm can be used to examine the difference in the frames and thus, object can be detected in it. The purpose of a feature extraction is to obtain descriptive quantities (description) and reduce the dimensionality of data without losing relevant information. The dimensionality of a data defines to the number of values (i.e. dimensions) of a single measurement. A visual feature refers here are: - colour, texture and shape, etc.
Keywords: Video Tracking; Motion Detection,Feature Extraction,Dimensionality.
Abstract
Implementation of an Effective Bus Pass Generation and Renewal Application
Niteesh Joshi, Mahesh Waghmare, Sujeet Bhosale, Ankit Singh, Sunita Nandgave
DOI: 10.17148/IJARCCE.2017.6553
Abstract: Android is the latest and a rapid growing technology available for all the users or customers in now days market. This project is mainly aims to provide an effective facility of bus pass through mobile Application. It also uses database to store data about passenger. This system has two logins, one for user side and another for admin side. In this project bus pass generation as well as renewal system has been provided. It is mobile application which is build using Angular JS and IONIC framework. Ionic is one of the best frameworks used to develop application now days. Angular JS and Ionic provide most custom methods and components to interact with application. Now days Ionic 2 support the universal windows platform for building windows 10 applications. It is an android application for people to get bus pass through online which is very useful as it reduces paper work, time consuming and makes process in simple and faster way. User can renew their existing pass by extending their validity of time when pass expires. Admin can view all the details and balance of user through its login. This system was intended to develop a mobile application to perform functions like accessing information for authentication and provide pass to particular person. So, users don�t need to stand in queue for long time. This system is helpful for people to get a pass. User can get a pass from anywhere and anytime. There is no need to do manual process. The benefit of this project is no one can reuse issued pass due to photograph and unique id. The notification will generate before expiring monthly pass. This is beneficial for every passenger to get pass in time. The one time password will be generated for every user while registering first time. Aim of this system is to generate daily and monthly bus pass.
Keywords: Angular JS and IONIC framework, Bus Pass Generation, Ionic 2.
Abstract
Fish Recognition based on HOG Feature Extraction using SVM Prediction
Ms. P. Antony Seba, Ms. S. Rama Subbu Laskhmi, Ms. P. Umamaheswari
DOI: 10.17148/IJARCCE.2017.6554
Abstract: Fish image recognition and prediction is a challenging task. This Paper gives an idea about recognition of fish image using correlation coefficient and then Histogram of oriented Gradient (HOG).Finally the fish images are classified based on their features using Support Vector Machine (SVM).This paper aims to detect which species of fish appears on a fishing boat, based on images captured from boat cameras of various angles and this can be used to prevent fishing of endangered fishes.
Keywords: Histogram of oriented Gradient (HOG), Support Vector Machine (SVM), Fish Recognition.
Abstract
BER Analysis of MIMO-OFDM System using BPSK Modulation under Different Channel with STBC, MMSE and MRC
Krishna Kant Dubey, D.K. Srivastava
DOI: 10.17148/IJARCCE.2017.6555
Abstract: A hypothesis is characterize in this paper with reference to Alamouti-STBC and MMSE (mean square error equalizer) for the advancement the BER (bit error rate) in the MIMO-OFDM system. So as achieve the desired outcomes. The different fading channel Rayleigh and AWGN have been used to calculate BER analysis of MIMO system. The prospective system is simulated in matlab and consider in terms bit error rate with signal to noise ratio (SNR). Finally this Alamouti-STBC technique evaluates for performance according to their BER using BPSK modulation schemes.
Keywords: MIMO, OFDM, MMSC, BER, SNR, MRC, ZF.
Abstract
Smart Traffic Congestion Control
Prof. Ranjeet S. Mote, Dharmesh A. Chhajed, Sambhav V. Dwidmuthe, Komal N. More
DOI: 10.17148/IJARCCE.2017.6556
Abstract: India could be a nation that has the one in all the biggest NonLane primarily based road network within the world. Several developed nations these days use Intelligent transit (ITS) to resolve traffic connected issues and supply sleek and safe ride on roads. The road traffic congestions area unit continual drawback in Republic of India. One in all the foremost reasons that cause tie up is that the poor infrastructure and perspective of road users in Republic of India. VANETs area unit wide rising in several developed countries as a more cost-effective, distributive and cooperative tie up system. The well-known tie up drawback in each surroundings has negative impact on several areas together with economy, surroundings, health and life-style. Recently, variety of solutions supported vehicle -to-vehicle communications were planned for tie up detection and management. Vehicular Ad hoc networks (VANETs) area unit accustomed collect and combination period of time speed and position info on individual vehicles to optimize signal management at traffic intersections. Vehicular Ad hoc networks (VANET) could be a promising technology to alter the communications among vehicles.
Keywords: Traffic Congestion, Vehicular Ad Hoc Networks (VANET), Traffic Information System.
Abstract
Tackling Privacy on Social Media
C.P. Kedia, Suraj Tavare, Vikram Karkande, Vivek Sonawane, Pranjul Avi
DOI: 10.17148/IJARCCE.2017.6557
Abstract: With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. Social Network is an emerging E-service for content sharing sites (CSS). It is emerging service which provides a reliable communication, through this communication a new attack ground for data hackers; they can easily misuses the data through these media. Some users over CSS affects users privacy on their personal contents, where some users keep on sending unwanted comments and messages by taking advantage of the users� inherent trust in their relationship network. To discussing this we focus on the issue to protect user Images on social site. Images are travelling on social site so we decide policy how image will be travel on social network. We consider to decide how to decide policy where own image become protective. This proposes a privacy policy prediction and access restrictions along with blocking scheme for social sites using data mining techniques. Toward addressing this need, we propose a novel system to help users compose privacy settings for their images. To deal with this dilemma, our mechanism attempts to utilize users� private photos to design a personalized FR system specifically trained to differentiate possible photo co-owners without leaking their privacy.
Keywords: online social networks, FR system, open social, photo privacy.
Abstract
Privacy Preserving Back-Propagation Neural Network with Cloud
Kalpana Vyavahare, Aniket Khobragade, Pratiksha Wankhade, Atthar Mansuri, Sampada Kulkarni
DOI: 10.17148/IJARCCE.2017.6558
Abstract: To improve the accuracy of learning result, in observe multiple parties might collaborate through conducting joint Back propagation neural network learning on the union of their several knowledge sets. throughout this method no party needs to disclose her/his non-public knowledge to others. Existing schemes supporting this type of cooperative learning are either restricted within the means of information partition or simply take into account 2 parties. There lacks an answer that enables two or a lot of parties, every with an at random partitioned off information set, to collaboratively conduct the training. This paper solves this open drawback by utilizing the ability of cloud computing. In our planned theme, every party encrypts his/her non-public knowledge regionally and uploads the ciphertexts into the cloud. By firmly offloading the high-ticket operations to the cloud, we tend to keep the computation and communication prices on every party nominal and freelance to the amount of participants. To support versatile operations over ciphertexts, we tend to adopt and tailor the BGN �doubly homomorphic� coding algorithmic rule for the multi-party setting. Numerical analysis and experiments on goods cloud show that our theme is secure, economical and correct.
Keywords: Privacy reserving, Neural Network, Back-Propagation, Cloud computing, Computation Outsource.
Abstract
Avoiding Duplication of Encrypted Data using Cloud
Ashweta Magar, Trupti Jagtap, Pradnya Gaikwad, Rashmi Singh
DOI: 10.17148/IJARCCE.2017.6559
Abstract: De-duplication is the way toward deciding all classes of data inside an informational collection that imply a similar genuine life/world element. The information accumulated from different assets may have quality issues in it. The idea to recognize copies by utilizing windowing and blocking procedure. The goal is to accomplish better exactness, great effectiveness and furthermore to decrease the false positive rate all are as per the assessed similitudes of records. De-duplication is a property which gives extra data of similitudes between the two substances. In this paper the essential concentrate is given on correct ID of copies in the database by applying idea of windowing and blocking. The goal is to accomplish better exactness, great proficiency and furthermore to diminish the false positive rate all are as per the evaluated likenesses of records.
Keywords: Access control, big data, cloud computing, data deduplication, proxy re-encryption.
Abstract
Data Deduplication on cloud
Manisha Galphade, Roshan Kunal, Mayuri Ingulkar, Safiya shaikh, Mamta Chavan
DOI: 10.17148/IJARCCE.2017.6560
Abstract: De-duplication is the path toward choosing all classes of information inside an enlightening gathering that suggest a comparable certified life/world component. The data amassed from various resources may have quality issues in it. The thought to perceive duplicates by using windowing and blocking system. The objective is to finish better precision, extraordinary viability and besides to diminish the false positive rate all are according to the surveyed comparable qualities of records. De-duplication is a property which gives additional information of comparable qualities between the two substances. In this paper the basic focus is given on right ID of duplicates in the database by applying thought of windowing and blocking. The objective is to achieve better precision, awesome capability and moreover to reduce the false positive rate all are according to the assessed similarities of records.
Keywords: Access control, big data, cloud computing, data deduplication, proxy re-encryption.
Abstract
Home Energy Management by using Hybrid Power
Bhagyashri Baravkar, Komal Bhalerao, Asha Bharti, Sarika Patil
DOI: 10.17148/IJARCCE.2017.6561
Abstract: A smart house, may be a home that includes advanced automation systems to supply the inhabitants with refined observation and management over the building's functions. star and wind energy and hybrid electrical vehicles (HEVs) usually utilized in smart homes. Renewable power sources like alternative energy and wind energy have become progressively vital due to the restricted fossil fuels resources and their negative environmental impact, on the opposite hand HEVs have become promising alternatives to be remedy for urban pollution, greenhouse gases and depletion of the finite fuel resources as they use centrally generated electricity as an influence supply. In smart homes, the vital factor is energy management between input sources, therefore this paper proposes to increase the battery life and keep system parts hazard-free, it includes actual battery - level sensing, charging -current dominant by microcontroller unit (MCU) and a additive DC/AC (MPPT) most wall plug following. A controller that monitors the operation of the autonomous/grid- joined system is intended. Such a controller determines the energy out there from every of the system parts and therefore the environmental credit of the system. The aim of the EMS is delivered a sleek line voltage to the facility grid.
Keywords: Provenance Model, Security, Sensor Networks, Bloom Filter Packet generation, Fault location.
Abstract
Robust Method for Detection of Copy-Move Forgery in Digital Images
Garima Mishra, A.K Singh
DOI: 10.17148/IJARCCE.2017.6562
Abstract: There is various forgeries possible on digital images such as image tampering, copy-move forgery and image compositing. Out of these, copy-move forgery is a type of image forgery, in which a part of original digital image is copied and pasted to another part in the same original image to make it, forged one. This paper describes blind image forensics approach for detecting copy-move forgery. In this technique forged image is reduced in dimension using 3-level DWT (Discrete Wavelet Transform) [1]. Then the compressed image is divided into overlapping blocks of fixed size. These blocks are sorted using lexicographic sorting and phase correlation is used as similarity criterion .now duplicated blocks are identified and copied part is clearly mentioned in the original image.. Detected forgery is displayed with the help of duplication map that gives count of pixels forged. This approach drastically reduces the time needed for the detection process and improves the accuracy of detection.
Keywords: Copy-Move forgery; digital signature; digital image forensics; DWT; phase correlation.
Abstract
Design of Multiband Compact H-Shaped Microstrip patch antenna for Wireless application
Poonam Shukla, S.P. Gangwar
DOI: 10.17148/IJARCCE.2017.6563
Abstract: Microstrip Patch Antenna (MPA) provides low profile and low volume, so it is use in a now a days in communication device. A new high gain, multiband H-shape slot loaded microstrip patch antenna is presented in this paper. By introducing wideband H-shape slot antenna multiband are merged together which gives the maximum bandwidth of 22.1% and the gain of 6.7522 dBi. The antenna is printed on a dielectric substrate, backed by a metal board, and directly fed from a 50 O coaxial cable. Using HFSS software package according to the set size, the antenna is simulated. The composite effect of integrating these techniques and by introducing the novel slotted patch offers a low profile, wide bandwidth, high gain and compact antenna element. The computer simulation results show that the antenna can realize wide band characters. In this paper, a design of H-Shape microstrip patch antenna is given for multiband operation. This type of smaller antenna has application in mobile phone for Wi-Max, Bluetooth, C-band, S-band and also for other wireless applications.
Keywords: Microstrip Patch Antenna, Multiband H-shape slot, Coaxial Probe and HFSS.
Abstract
A Routing Technique for Query Scheduling and Forwarding in Unstructured Overlay Topology Networks
P. Deepa, A. Kanchana, V. Anitha
DOI: 10.17148/IJARCCE.2017.6564
Abstract: The peer-to-peer (P2P) paradigm has emerged as a viable alternative to overcome limitations of the client-server model namely, in terms of scalability, fault-tolerance, and even operational costs. This paradigm has gained significant popularity with its successful application in the context of file sharing applications. The success of these applications is illustrated by systems such as Napster, Emule, Gnutella, and recently, Bit Torrent. In order to ensure the scalability of these solutions many P2P services operate on top of unstructured overlay networks, which are logical networks deployed at the application level. Unstructured overlay networks build irregular neighboring acquaintanceships around members of the framework. In spite of the irregular nature for these overlays may be alluring Eventually Tom's perusing large portions P2P services, those coming about toponomy might display sub-optimal characteristics, for instance from the point of view of link latency. This may have a significant impact of the performance of P2P services executed over these overlays. In this paper we propose a query routing approach that accounts for arbitrary overlay topologies, nodes with heterogeneous processing capacity, e.g., reflecting their degree of altruism and heterogeneous class-based likelihoods of query resolution at nodes which may reflect query loads and the manner in which files/resources are distributed across the network. The approach is shown to be stabilizing the query load subject to a grade of service constraint, i.e., a guarantee that queries' routes meet pre-specified class-based bounds on their associated a priori probability of query resolution. Experimental results shows the performance benefits in terms of mean delay and reduced complexity. The query resolution probabilities and traffic loads are also studied.
Keywords: P2P networks, Overlay, Query resolution, Query Forwarding, Priori probability.
Abstract
Video Watermarking using DWT and Alpha Blending Technique
Asha N, Bhagya P
DOI: 10.17148/IJARCCE.2017.6565
Abstract: In cyber world, protection of copyrighted information is catching its attention due to the accessibility of immense amount of data and its copies in digital form. An efficient method of protecting this copyrighted information is by Digital Watermarking. In this paper, Discrete Wavelet Transform (DWT) and Alpha Blending Techniques are used. The video is converted into frames and DWT is applied on the frames and the watermark, alpha blending technique is applied to embed the watermark in the video frames. Finally Alpha blending extracting technique and inverse discrete wavelet transform is used to extract the watermark from the watermarked video. The robustness of the proposed method is analyzed by PSNR and MSE values.
Keywords: Digital Video Watermarking, Discrete Wavelet Transform (DWT), Alpha Blending Technique, PSNR, MSE.
Abstract
IoT based Industry Automation using Arm7
Esha Gandotra, Suvidha Kohli, Shavaya Gupta, Rohan Slathia
DOI: 10.17148/IJARCCE.2017.6566
Abstract: Automation is the current need of industries. There are number of technologies that are growing to achieve the good automation in the plant. Industries have been automated with machines that allow for fully automated tasks without or little manual intervention. Well here we propose an internet based industry automation system that allows a single industry operator to control industry appliances with ease using ARM7 processor and IOT. Our proposed system allows for automation of industrial loads to achieve automation over internet. We use IOT for the web serve interface and ARM7 processor to process and run circuit loads. User is allowed to send commands for machines/ load switching over internet using IOT from anywhere in the world over internet. The ARM7 processor captures these commands by internet over wifi connector. Now the ARM7 processes received data to extract user commands. After getting commands it displays it on LCD display. Also it switches the loads on/off based on received commands to achieve user desired output. The system thus achieves industry automation over IOT using ARM7 processor.
Keywords: Arm7, Internet of things (IOT), GSM, LCD, Wifi.
Abstract
Performance Analysis of the Two Soliton Interactions in O-IDMA channel
Vimal Prakash Gautam, Kapil Dev, S.K. Sriwas
DOI: 10.17148/IJARCCE.2017.6567
Abstract: The objective of the paper is to numerical computation of the two Soliton interaction in the optical interleave division multiple access channel. Solitons are used in O-IDMA because they have tendency to maintain their shape over a long distance. This occurred because of the interaction between nonlinearity and group velocity dispersion in anomalous region. Due to the individual pulse with, loss in O-IDMA channel and spacing between pulse, Co-propagation Solitons do interact and share energy. Conduct various simulation. The interaction of two Slotion can be express with the help of Korteweg de Vries Equcation. Simulation is done with matlab. The simulation result shows that, two Soliton are travelling in channel and after a certain distance get attached and evolve a giant pulse. If propagation further continue then they get separated as if they walked through each other. With the help of simulation result , a careful choice of pulse, pulse separation and fiber parameter can be helpful for avoiding the Soliton interaction in O-IDMA channel. To improve the intensity of the Soliton prism mechanism can be used in O-IDMA channel.
Keywords: Soliton interaction, kerr effect, GVD, Nonlinearity.
Abstract
E-Agriculture Information Monitoring System using Data Mining
Dhakne Aniket, Deshpande Mayur, Patharkar Mayur, Rathod Aakash
DOI: 10.17148/IJARCCE.2017.6568
Abstract: Agriculture is one of the important sector in India. Most of the Indian population is engaged in agriculture occupation. Most of the Indian farmers do farming in traditional way they are unaware of new technologies and trends in market. Farmers work hard for growing good quality of crop. Indian farmers also have to face adverse climatically effects. After this when farmer sells there agriculture produce in market they are cheated by the market traders and commission agents. All these factors lead to making Indian farming community economically infirm. Information and communication technology (ICT) can play important role in agriculture sector to increase income and economical standard of farmer. Agriculture is very information intensive industry but information related to this sector is not properly maintained. The advantages of ICT will be very helpful for providing accurate and timely relevant information about weather and market prices to farmers this will be helpful for facilitating an environment for remunerative agriculture. In this paper we are interested to introduce a new web portal system based on agriculture market which will be helpful for farmers and market traders to sell and buy agriculture products easily and efficiently. Our system intends to provide reliable and efficient communication and interaction platform between different stakeholders of market like farmers, traders and government officials. System will provide timely updates about weather information, market prices and minimum support prices of different crops. System focuses on making use of advantages of ICT to bring transparency and accuracy in Agriculture Produce Market Committee (APMC) and making Indian farmers ready to compete with farmers of developed countries in globalised market.
Keywords: Data mining, K- means, Apriori algorithm, k-NN Algorithm, Weather API, APMC, E-Agriculture.
Abstract
Dispersion Tailoring in a High-Index Core Bragg Fiber
Pramod Sharma
DOI: 10.17148/IJARCCE.2017.6569
Abstract: In this paper, investigation on the effect of variation in fill factor ratio d/? on the dispersion characteristics, particularly on zero dispersion wavelength of a High-index Core Bragg fiber has been done. The dispersion of the Bragg fiber can be tailored to achieve desired zero dispersion wavelength by changing the fill factor ratio d/?.
Keywords: Bragg fiber; dispersion; fill factor; pitch; zero dispersion wavelength.
Abstract
A Study of Different Methods of Attacking and Defending Cryptosystems
Manjula G, Dr. Mohan H.S
DOI: 10.17148/IJARCCE.2017.6570
Abstract: Encryption techniques have been utilized for a large number of years and, in this way, they are being capable of protecting sensitive data and this has been of incredible intrigue. As the privacy of our secrets have expanded, so have the technological innovations used to secure them. One of the key objectives of the individuals who need to keep confidential data secure is to keep ahead of the techniques used by the attackers. These assaults pose a genuine risk to the security of cryptographic modules. In outcome, cryptographic executions must be assessed for their resistivity against such assaults and the fuse of various countermeasures must be considered. This paper overviews the strategies and methods utilized in these assaults, the damaging impacts of such assaults, the countermeasures against such assaults and assessment of their achievability and materialness.
Keywords: Cryptography, attacks, Differential cryptanalysis, Linear cryptanalysis.
Abstract
A Review: Solving ECDLP Problem using Pollard’s Rho Algorithm
Santosh P. Lokhande, Dr. Indivar Gupta, Dr. Dinesh B. Kulkarni
DOI: 10.17148/IJARCCE.2017.6571
Abstract: In Public Key Cryptography system, separate keys are used to encode and decode the data. Public key being distributed publicly, the strength of security depends on large key size. The discrete logarithm for mathematical base in Public Key Cryptography systems. Unlike the finite field Discrete Logarithm Problem; there are no general purpose sub exponential algorithms to solve the Elliptic Curve Discrete Logarithm Problem. Though good algorithms are known for certain specific types of elliptic curves, all known algorithms that apply to general curves take fully exponential time. As a result, elliptic curves are gaining popularity for building cryptosystems. The absence of sub exponential algorithms implies that smaller fields can be chosen compared to those needed for cryptosystems. Elliptic curve based cryptosystems are popular because they provide good security at key sizes much smaller than number theoretical Public Key Schemes like RSA cryptosystem. Solving Elliptic Curve Discrete Logarithm Problem using Pollard�s Rho algorithm provide efficiency in terms of time and storage. Using various parallel architectures like MPI, GP-GPU and FPGA increase accessing precision and efficiency of solving ECDLP.This article covers Elliptic Curve Cryptography, Elliptic Curve Discrete Logarithm Problem and Pollard's Rho algorithms to solve ECDLP.
Keywords: Elliptic curve, ECC, DLP, ECDLP, Pollard�s Rho Algorithm, Parallel Architectures.
Abstract
Preservation of Historical Documents using ICM and Filters
Ashika Parvin, Shajun Nisha, Mohamed Sathik
DOI: 10.17148/IJARCCE.2017.6572
Abstract: Digital image enhancement technique is used for improving the visual qualities of the images. In this paper, contaminated Brahmi script is taken as an input and it is enhanced. There are numerous problems in preserving historical documents from degradation due to some bad storage conditions and poor contrast due to humidity. In this work, it is proposed to investigate the efficiency of logarithmic technique to enhance along with the performance of utilizing the Intersecting Cortical Model (ICM) network which is a simplified model of Pulse-Coupled Neural Network (PCNN) model and filters.
Keywords: Digital Image Enhancement, PCNN, Filters, Brahmi script.
Abstract
Design and Implementation of Linear Feedback shift Register based physical unclonable function
A. Nagamalli, P. Avinash, K.B.S. Akhil, K. Manoj Kumar
DOI: 10.17148/IJARCCE.2017.6573
Abstract: In the physical real world, there is a critical problem due to the threats in network security. As a result, there is an infringement of integrated intellectual data. Hence there is a strong necessity to eliminate this discrepancy in Integrated Security Systems (ISS). An LFSR is a commonly used circuit to generate pseudo random sequences. An LFSR is a shift register whose input bit is a linear function of the previous state. A physical unclonable function (PUF) is a physical entity that is embodied in a physical structure and is easy to authenticate but hard to predict. The output bits of a pulse generator are presented in parallel as a challenge input to an Arbiter PUF. PUFs depend on the uniqueness of their physical microstructure. This microstructure depends on random physical factors introduced during manufacturing. These factors are unpredictable and uncontrollable which makes it virtually impossible to duplicate or clone the structure. Therefore this project mainly focuses on providing security by randomly generating different sequences by the implementation of LFSR based PUF which can be decoded only by having master or true authentication of the system.
Keywords: Physical Unclonable Function, True Random Number Generator, Network Security, FPGA, Linear Feedback Shift Register, Information Security, Randomness.
Abstract
Survey on Various Steganography Techniques
Priyanka Sharma, Astha Gautam, Ruchi Singh
DOI: 10.17148/IJARCCE.2017.6574
Abstract: Steganography is progressive to gain its importance due to the aggressive growth and secret communication of potential computer users over the internet. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Normally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other objectives.
Keywords: Data hiding, Steganography, Cover writing.
Abstract
Estimation of Noise Power Spectrum and Automatic Speaker Recognition System
Rajalakshmi. P, Anju. L
DOI: 10.17148/IJARCCE.2017.6575
Abstract: Unseen noise estimation is one of the challenging steps to make the speech enhancement algorithm work in adverse conditions. The prior knowledge known about the encountered noise is that it is different from the involved speech.The proposed work consists of two segments, Speech Enhancement and Automatic Speaker Recognition (ASR) system. The speech enhancement comprises of offline training and online enhancement processes. In offline training, the inputs clean speech data and noisy speech magnitude are collected and trained using Support Vector Machine (SVM). In online enhancement, the trained signals are compared and their noise spectrum is estimated using the Modified Spectral Subtraction (MSS) method which is also used for the removal of noises. Then the enhanced speech signal is obtained by transforming the estimated spectrum into time domain. The features are extracted from the obtained enhanced speech using Mel Frequency Cepstral Coefficients (MFCC) and Perceptual Linear Prediction (PLP). Finally the speaker recognition is done using k-NN and Gaussian Mixture Model (GMM) based Multi-SVM. The experimental results are compared and efficient system is obtained.
Keywords: Speech enhancement, SVM, MSS, k-NN, GMM and Multi-SVM.
Abstract
Reversible Image Data Hiding with Contrast Enhancement
Prof. M.S. Sadavarte, Pratima B. Choudhari
DOI: 10.17148/IJARCCE.2017.6576
Abstract: In this report, reversible data hiding (RDH) algorithm is proposed for digital images. Instead of trying to keep the PSNR value high, the proposed algorithm enhances the contrast of a host image to improve its visual quality. The highest two bins in the histogram are selected for data embedding so that histogram equalization can be performed by repeating the process. The side information is embedded along with the message bits into the host image so that the original image is completely recoverable. The proposed algorithm is used for two sets of images to demonstrate its efficiency. To our best knowledge, it is the first algorithm that achieves image contrast enhancement by RDH. Furthermore, the evaluation results show that the visual quality can be preserved after a considerable amount of message bits have been embedded into the contrast-enhanced images, even better than three specific MATLAB functions used for image contrast enhancement.
Keywords: RDH, MATLAB, Image, Histogram.
Abstract
Approximate Multiplier by Partial Product Preforation
Miss. Sasikala. V.P, Mr. R. Dharmalingam
DOI: 10.17148/IJARCCE.2017.6577
Abstract: Approximate computing appear as a promising solution to reduce their power dissipation. Such applications process large redundant data sets or noisy input data derived from the real world, do not have a golden result, perform statistical/probabilistic computations, and/or demand human interaction, thus their exactness is relaxed due to limited human perception. Approximate computing can be applied at both software and hardware levels. Hardware-level approximation mainly targets arithmetic units, such as adders and multipliers, widely used in portable devices to implement multimedia algorithms, e.g., image and video processing. Partial product generation, we introduce the partial product preforation method for creating approximate multipliers. Inspired from, we omit the generation of some partial products, thus reducing the number of partial products that have to be accumulated, we decrease the area, power, and depth of the accumulation tree.
Keywords: Approximate arithmetic circuits, approximate computing, approximate multiplier, error analysis, low power, Integrated synthesis environment.
Abstract
Open Price Prediction of Stock Market using Regression Analysis
Mr. Pramod Mali, Hemangi Karchalkar, Aditya Jain, Ashu Singh, Vikash Kumar
DOI: 10.17148/IJARCCE.2017.6578
Abstract: The development of a dynamic application for analysing and predicting stock market prices is a basic tool aimed at accelerating the rate of investors� interest in stock market .The development and implementation of a stock price prediction is explained in this project and for this purpose regression algorithm and object oriented approach of software development is used. In most of the economies trading in shares is big business. From the information gathered from their website, it appears that the stock brokers do not have any intelligent tool which can help them advice their clients on which stocks are proper for them to buy or sell. The prevailing methods show a trend on future movement of stocks and not the likely price for any stock in the future. It is therefore preferable to have a tool that does not just point a direction towards price movement, but also indicates the most likely price of the stock itself.
Keywords: Data mining, Regression, Prediction, Coefficient of correlation, Training set, Testing set.
Abstract
A Survey on Macro Environment Sensing using Sensors in Smart Devices
Nilesh Chavanke, Harsimaran Saggu, Sanket Kurude, Saurabh Walunj, Prof. S.D. Salunkhe
DOI: 10.17148/IJARCCE.2017.6579
Abstract: A range of mobile and pervasive applications on recently smart phones. Although human-driven settings (e.g indoor/outdoor, at home/in work, driving walking) are wide researched. Proximity Sensing covering the various instances of phone use, situation, disposition, and cooperation altogether the approach right all the manner all the way down to earth utilizes with entangled shopper propensities. As an extended running middleware, Proximity Sensing considers every vitality utilization and shopper relationship. The preliminary results demonstrate that Proximity Sensing accomplishes low energy price, fast system preparation and competitive sensing accuracy.
Keywords: Proximity sensor, telephony manager, audio recognition system.
Abstract
Smart Field System using LabVIEW and IoT
Nisha Kushwaha, N.S. Beniwal
DOI: 10.17148/IJARCCE.2017.6580
Abstract: Appropriate soil water level is a necessary pre-requisite for optimum plant growth. Also, water being an essential element for life sustenance, there is the necessity to avoid its undue usage. Irrigation is a dominant consumer of water. This calls for the need to regulate water supply for irrigation purposes. Fields should neither be over-irrigated nor under-irrigated. The objective of this thesis is to design a simple, easy to install methodology to monitor and indicate the level of soil moisture that is continuously controlled in order to achieve maximum plant growth and simultaneously optimize the available irrigation resources on a monitoring software LabVIEW and the sensor data can be seen on Internet. In order to replace expensive controllers in current available systems, the Arduino Uno will be used in this project as it is an affordable microcontroller. The Arduino Uno can be programmed to analyse some signals from sensors such as moisture, temperature, and rain. A pump is used to pump the fertilizer and water into the irrigation system. The use of easily available components reduces the manufacturing and maintenance costs. This makes the proposed system to be an economical, appropriate and a low maintenance solution for applications, especially in rural areas and for small scale agriculturists. This research work enhanced to help the small-scale cultivators and will be increase the yield of the crops then will increase government economy.
Keywords: IOT, LABVIEW, Rain Sensor, Moisture Sensor, Microcontroller, Arduino.
Abstract
Protecting Web Servers from Client based Attacks
Akshay Gurav, Jay Chaudhari, Kajal Deshmukh, Dhanajay Jadhav, Dr. S. M. Chaware
DOI: 10.17148/IJARCCE.2017.6581
Abstract: In today�s high technology world, Organizations are becoming more and more dependent on Internet Technology and Information System. There are millions of users are using Internet and dependent on Information System. Sensitive and Confidential information is shared through internet and it must be protected. The threat to the information security from criminals like Hackers and terrorist are increasing. Threats are widely increasing as internet grows. Different kinds of attacks are used to harm the system and to get confidential information. Attacks like Distributed Denial of Service, SQL injection, Brute force, Cross site Scripting are used to break down the Sensitive systems and make them vulnerable.
Keywords: SQL Injection, DDoS (Distributed Denial of Service), brute force attack, Threshold Value.
Abstract
SRD-Ad: Secured Routing and Data Delivery using Anonymous Detection in wireless networks
S. Suganya M.E., T. Sakthi Sree M.E.
DOI: 10.17148/IJARCCE.2017.6582
Abstract: In wireless networks, the secure data communication is needed to collect data from source to destination. Collected data are transmitted in a path consisting of connected links. All existing end-to-end routing protocols propose solutions in which each link uses a pair-wise shared key to protect data. In this paper, we propose a novel design of secure data communication. And energy drain rate, relative mobility estimation to predict the route lifetime. But this has given a problem of network congestion and delay. In this paper, we investigate the Secured Routing and data delivery(SRD) between the source�destination pairs in wireless networks (WN), where Anonymous node expose their selfish behaviors, i.e., forwarding or dropping data services. Manage the Anonymous node information in terms of its available resources, the employed incentive mechanism and the quality-of-service (QoS) requirements, and the other terms of their historical behaviors. In this framework, we used DSR Routing for Route Detection and Route Maintenance. Under the Anonymous Detection management, in this framework we used Random Key Pre-distribution (RKP) a security key management for secure path selection criterion is designed to select the most reliable and shortest path in terms of routing available resources.
Keywords: Wireless networks, Public-key cryptosystems, Key Pre-distribution, Mobile nodes, Secure Authentication.
Abstract
Online Secure Examination Process using M-Learning Techno
Kavya G. S., Ragini A., Rashmitha R., Sandhya R., Prof. Vijayanirmala B.
DOI: 10.17148/IJARCCE.2017.6583
Abstract: M-Learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments, students can easily exchange information over the network during exam time. This paper aims to identify various vulnerabilities that may violate exam security in m-learning environments and to design the appropriate security services and countermeasures that can be put in place to ensure exam security. It also aims to integrate the resulting secure exam system with an existing, opensource and widely accepted Learning Management System (LMS) and its service extension to the m-learning environment, namely �Moodbile Project�.
Keywords: e-learning, m-learning, Learning Management System (LMS), Access control, exam engine.
Abstract
A Review on Various Clustering Technique and Protocol in MANET
Pooja Kumari, Gurpreet Kaur
DOI: 10.17148/IJARCCE.2017.6584
Abstract: Mobile ad-hoc network (MANETs) is a type of wireless network which do not consist a base station for providing network connectivity. A mobile ad-hoc network (MANET) is a self-configuring, infrastructure less network. When MANET network used for large scale operation, MANET induce many drawbacks like delay in routing, resource consumption due to dynamic nature of MANET. Many cluster algorithm proposed by researcher to overcome this problem. Cluster technique used to splitting the network into Sub network called cluster. Every cluster has a its own cluster head which maintains a whole information about the cluster. Dynamic nature of MANET make difficult to divide a network into cluster and electing cluster head. In this paper we provide an overview of some clustering approaches and protocol used in Manet.
Keywords: MANET, Cluster, Clustering Protocol.
Abstract
WLAN System Analyzer using Android Phone
Tambare Suraj, Swami Nachiket, Ajay Thakur, Mandrupkar Suraj
DOI: 10.17148/IJARCCE.2017.6585
Abstract: A remote LAN system can be checked utilizing an android phone when the administrator is not present at the place of system but rather he/she is far from it. The venture point is to secure the system or a LAN by actualizing such a product which is empower to complete operations which are able to screen entire of the system, sitting on one seat by survey remote desktop, passing messages to remote framework and is likewise ready to close down the framework by performing remote prematurely ending operations. The components introduced in the application which can be introduced in an android telephone. This venture is to give the most extreme insights about the system to the director on their screen without knowing them their clients. The director can see the static picture of customer's desktop and afterward he/she could send cautioning message to the client to stop that operation instantly. Indeed, even than if customer don't stop than manager has the office to prematurely end the framework remotely or restart the framework whatever vital he considers. The issue of security and approval is additionally tended to at expressing how the application made is open just to an approved individual.
Keywords: WLAN, Framework, Android Handheld Device.
Abstract
“Review on Reducing Routing Overhead and Energy Drainage in MANET”
Jaspreet Kaur, Jatinder Pal Sharma
DOI: 10.17148/IJARCCE.2017.6586
Abstract: Mobile Ad hoc network is a network where nodes communicate with each other without any network structure as well as central administration. They are interconnected through wireless mediums and can utilize multiple hops to alter information with them. Routing protocols are needed for communication and synchronization in Ad hoc networks, where it targets effective as well timely delivery of message. Routing techniques help in path creation for transmission. The existing routing protocols suffer from overhead inflicting energy loss which may be further annoying by link failures. In this paper we provide an overview of a vast range of the existing routing protocols which mainly focus on their basic characteristics and functionality. Also, the comparison is been presented which supports routing methodologies and information which further used to make routing decisions.
Keywords: MANET, Routing protocols, Routing overhead.
Abstract
Android Application to Read and Record Data from Multiple Sensors
Vishesh S, Manu Srinath, Ranjitha Ravishankar, Ranjan Ravishankar, Ashrith Pradeep, Jeevan HS
DOI: 10.17148/IJARCCE.2017.6587
Abstract: The increasing capabilities of smart phones have led to the replacement of PC�s in almost all real-time scenarios. A Smartphone is a mobile/portable personal computer with a swift processor, advanced mobile operating system, huge memory space and a platform for many real-time applications-business, accounting, entertainment, scientific, recreation, education, finance, social networking, news and many other applications suited to the 21st century impatient world. In the early inception of mobile technology development, mobile phones were elite devices primarily used by middle and upper class people. But with more and more Smartphones manufacturers entering the market, the price of a Smartphone is so affordable [1] that today about half the adult population owns a Smartphone. [2] Android phones are increasingly becoming cheaper [3], better and more intelligent. Android is a mobile OS developed by Google, based on the Linux kernel. [4] In this paper, we develop an android application which can monitor the real-time values of any electronic/optical/acoustic sensor on android powered Smartphone. The mobile application is well suited to the scientific community, engineers and professionals/amateurs in their real-time monitoring of sensed value. The stream of real time data is sent wirelessly to the Smartphone via Bluetooth or Wi-Fi. In this paper, we also present to you the ADLC model which includes feasibility study, Requirement analysis, Design and implementation, integration and testing, operation and maintenance and marketing.
Keywords: Smartphone, operating system, Linux kernel, ADLC model, Bluetooth, Wi-Fi.
Abstract
Implementation of Classification based on User using Facebook based Profile
Jeevan Pisal, Nikhil Tanpure, Rahul Hinge, Aniket Potdar, Mrs. Sonali A. Patil
DOI: 10.17148/IJARCCE.2017.6588
Abstract: Social Networking Portal like Facebook attracts more and more illegal activities. Social Networking Portal such as Facebook is developed and limitations of Facebook are removed by keeping watch on all types of activities performed on this Portal. Classification of user posts into different categories such as Politics, Education, Entertainment, Sports etc. is made based on analysis of post messages in this Social Network Portal. Interest of any friend can be seen by user of this network from categories graph data. Adult images are blocked into Social Network using adult detection based on Image Processing. User posts, comments are analyzed to classify into Crime, Riots, Worst or Vulgar categories. Sentiment analysis is done on user posts and comments using NLP (Natural Language Processing) algorithm to detect user sentiments. If any user exceeds limit of bad posts or adult images, then he/she is automatically banned from this social networking Portal and this portal is more secure and reliable than Facebook Portal.
Keywords: Social Networking, Portal, NLP, Image Processing.
Abstract
“Furniture Layout Application using Augmented Reality”
Tanuja R. More, Avadhoot Modage, Venkatesh More, Kedar More
DOI: 10.17148/IJARCCE.2017.6589
Abstract: Information technology currently supports the development of human interaction with virtual environment. This development will continue in developing in the form of Human Computer Interaction (HCI). Augmented Reality is a field of computer research which deals with the combination of reality with computer generated data. The main purpose of this project is to develop a windows application for trying different furniture items in a virtual way. This application will eliminate the need of physically visiting the furniture store which is very time consuming activity. This research is using photo-realistic 3D models to rendering used in computer graphics. Rendering of the basis for colour and shading in order to make it appear solid and 3D. These 3D furniture models are superimposed on to the live feed of real space taken from the camera. After imposing the model it will appear as, it is actually placed into the real world. Using this application one can choose from the different set of furniture and try it on their space.
Keywords: HCI- Human Computer Interaction, 3D -Three dimensional, AR- Augmented Reality.
Abstract
“Active Learning for Ranking through Expected Loss Optimization” based on Data Mining
Parkhi Aishwarya, Patil Chaitanya, Shinde Madhuri
DOI: 10.17148/IJARCCE.2017.6590
Abstract: Learning to rank arises in many data mining applications, ranging from web search engine, online advertising to recommendation system. In learning to rank, the performance of a ranking model is strongly affected by the number of labelled examples in the training set; on the other hand, obtaining labelled examples for training data is very expensive and time consuming. This presents a great need for the active learning approaches to select most informative examples for ranking learning; however, in the literature there is still very limited work to address active learning for ranking. In this paper, we propose a general active learning framework, expected loss optimization (ELO), for ranking. The ELO framework is applicable to a wide range of ranking functions. Under this framework, we derive a novel algorithm, expected discounted cumulative gain (DCG) loss optimization (ELO-DCG), to select most informative examples. Then, we investigate both query and document level active learning for raking and propose a twostage ELO-DCG algorithm which incorporate both query and document selection into active learning. Furthermore, we show that it is flexible for the algorithm to deal with the skewed grade distribution problem with the modification of the loss function. Extensive experiments o realworld web search data sets have demonstrated great potential and effectiveness of the proposed framework and algorithms.
Keywords: Active Learning, Data Mining.
Abstract
Android Based LIGHTNET for Brightness and Color Temperature Control
Akshada A. Hanchate, Dr. S.B. Dhonde
DOI: 10.17148/IJARCCE.2017.6591
Abstract: These days, the LEDs used for residential, commercial and industrial sectors puposes could be configured for lively with specific lighting, which provides more efficient outcome. The basic idea is to drive the bi-color stripe (warm white stripe with cool white stripe of LEDs) for precise PWM dimming in the range of 1-10V. The dimming of LED strings is controlled by using the android phone. The most important thing that needs to be taken in consideration for controlling the light level in an energetic way, preserving the desired light level where needed while controlling light to a minimum value. However, the regulation of light intensity (brightness) and colour correlated temperature is obtained by adjusting the PWM dimming for LEDs. PWM signal enables us to attain minimum intensity levels and more linear control of light intensity compared to continuous current dimming methods. Though, accurate LEDs controlling of colors which possess color point maintenance, light intensity control along with color mixing in due with LED device lifespan and changes in temperature at a junction. Smart with efficient lighting evolves from the traditional lighting control system with feedback from integrated sensors. In order to achieve the goal of accurate color mixing of two LED strings (warm and cool white LEDs), the closed loop non-linear feedback control method is adopted instead of a linear control method.
Keywords: Bi-color LED stripe; PWM dimming; Color correlated temperature (CCT); luminance; color mixing; 0-10v range; non linear feedback control; lighting levels.
Abstract
Wireless Biometric Attendance Management System
Shaikh Sardar Salim, Jamdade Sonam Baburao, Patil Pranoti Jotiram
DOI: 10.17148/IJARCCE.2017.6592
Abstract: Attendance Management System is software developed for maintaining the attendance of the student on the daily basis in the collage. We have designed user module, parent module, HOD module etc. Here the staffs, who are dealing with the subjects, will be dependable to stamp the participation of the student. Student, parents as well as admin will be provided login credentials. An accurate report based on the student attendance is produced here. This system will also help in appraising attendance eligibility conditions of a student. Report of the student�s attendance on weekly and monthly basis is generated.
Keywords: student attendance, aurdino, NRF, R305.
Abstract
Crawling towards Building Advance Search Engine
Aparna Hambarde, Shwetal Yadav, Aishwarya Dhekane, Dipali Yadav, Mayuri Pawar
DOI: 10.17148/IJARCCE.2017.6593
Abstract: In these days situation World Wide internet is flooded with large quantity of knowledge. Finding helpful information from the online is sort of difficult task. Their part several search engines accessible within the market which will solve our purpose. But among all, choosing correct program with extremely effective internet crawler is sort of necessary. There unit several challenges within the style of high performances internet crawler find it irresistible should be able to transfer pages at high rate, store it into the info expeditiously and additionally crawl page space. During this paper we tend to gift taxonomy of WebCrawlers.
Keywords: Crawler, Database, Search Engine, World Wide Web.
Abstract
Indoor navigation using LIFI
Prof. B. B. Gite, Pankaj Maydeo, Shubhangi Bade, Tushar Muluk
DOI: 10.17148/IJARCCE.2017.6594
Abstract: Li-Fi remains for Light-Fidelity. Li-Fi innovation, proposed by the German physicist�Harald Haas, gives transmission of information through light by sending information through a LED light that changes in power quicker than the human eye can take after. This paper concentrates on building up a Li-Fi based framework and investigates its execution regarding existing innovation. The LI-FI is the most avant-garde development in the Field of remote correspondence. Nowadays numerous people are using web to fulfill their endeavor through wired or remote. As the amount of customers is extends the rate of data transmission in the remote framework gets subsequently reduces.
Keywords: Wi-Fi, Radio Spectrum, Li-Fi, Visible Spectrum.
Abstract
A VLC-Based Location System for Mobile Application
Priti Konda, Dr. D. K. Shedge
DOI: 10.17148/IJARCCE.2017.6595
Abstract: Visible light communication is the new technology with more benefits over an existing radio frequency communication system such as high security, high energy, efficiency and long life. The primary aim of LED is illumination which is important requirement of VLC system. White light can be used in both indoor and outdoor applications for illumination as well as data transmission because colours of objects as seen closely resemble under both the white light and natural light. The proposed VLC system enables indoor applications by allowing illumination as well as data transmission both of which not affected on each other. The transmitter comprises On-Off keying (OOK) modulation and LED to send data by flashing the light at a flicker-free frequency and speed undetectable to the human eye. In order to avoid flickering in lighting, the designated system should work above 200Hz. The receiver comprises photodiode and its amplification system followed by Bluetooth module to ensure its connectivity to a smart phone.PWM signals are modulated (Single carrier modulation technique) by the user data and the led driver drive the LED according to the modulated PWM signal.VLC is the peer to peer communication. Therefore, it is enables for several other applications such as home, office, airplane etc.
Keywords: Visible light communication, White light emitting diode, Modulation techniques, Led driver.
Abstract
Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation
Lakshmi A, Mandara Nagendra, Shreeraksha L, Chandru A S
DOI: 10.17148/IJARCCE.2017.6596
Abstract: With the prevalence of smart phones, location based services (LBS) have received noticeable attention and has become prominent and vital. Despite the use of LBS, it also poses a serious concern on user�s location privacy. In this paper, we propose a safe tourist application for privacy preserving spatial range query. The aim is to outsource the location based service (LBS) data from the LBS provider to the cloud and from the cloud to the LBS user without any privacy breach. To achieve privacy preserving spatial range query, we propose the first predicate only encryption scheme for inner product range, which can be used to detect whether a position is within a given circular area in a privacy-preserving way. To avoid scanning of all POIs to find matched POIs, we further exploit the novel index structure named ss tree, which conceals sensitive location information with our IPRE scheme. In particular, for a mobile LBS user using an Android phone, around 0.9 second is needed to generate a query.
Keywords: Location based services (LBS), spatial range query, point of interest (POI), Inner product range(IPRE).
Abstract
Review: Segmentation of Fovea and Optic Disc
Chaithra Sree. K, K.V. Geethika, Anil Kumar. K. R
DOI: 10.17148/IJARCCE.2017.6597
Abstract: Retinal image analysis is one of the crucial topics in medical image processing. During the last three decades, people are trying to extract the different features (like blood vessels, optic disk, macula, fovea etc.) automatically from retinalimage. Fovea and optic disc are the important features of a fundus retinal image.The quantitative analysis of retinal images is of increasing importance in the diagnosis of the various eye disorders.Hence a number of algorithms and techniques are being developed for its segmentation. This paper analyses various algorithms and techniques proposed earlier for the detection of optic disc and fovea.
Keywords: Optic Disc, Fovea localization, Fundus image, Segmentation, Image processing.
Abstract
Friends Wall: A Semantic-based Friend Recommendation System for Social Networks
Mr. Raj Agarwal, Mr. Swaranjeet Singh, Ms. Samiksha Bhujbal, Ms. Pooja Jadhav, Prof. U.H. Wanaskar
DOI: 10.17148/IJARCCE.2017.6598
Abstract: Present social networking services suggest friends to users based on their social activities, which may not be the most suitable to react a users taste on friend choice in real life. In this project, we present Friendswall, a semantic-based friend recommendation system for social networks, which present friends to users based on their life styles instead of social activities. By taking benefit of sensor-rich Smartphones, Friendswall discovers life styles of users, measures the resemblance of life styles between users, and suggest friends to users if their life styles have high resemblance. Inspired by text mining, in this project we design a users daily life as life documents, from which his/her life styles are taken out by using the Naive Byes algorithm. We further aim a similarity metric to measure the resemblance of life styles between users, and estimate users impact in terms of life styles with a friend-matching graph. Upon acquiring a request, FriendsWall returns a list of people with maximum resemblance scores to the query user. At last, FriendsWall incorporate a feedback mechanism to further amend the recommendation accuracy. This project will build FriendsWall and evaluate its performance on both small-scale experiments and large-scale model.
Keywords: Friend recommendation, Mobile sensing, Social networks, Life style, Data Mining, Machine Learning.
Abstract
Identification of Unique Users across Different Social Multimedia Platform
Renuka Devi .S, Sameeksha.M, Shreeja.M, Shivani.C.N, Ranjitha.A
DOI: 10.17148/IJARCCE.2017.6599
Abstract: Social identity linkage across differentsocial media platforms is of critical importance to business intelligence by gaining from social data a deeper understanding and more accurate profiling of users. In this paper, we propose a solution framework, HYDRA, which consists of three key steps:(I)we model heterogeneous behavior by the long-term topical distribution analysis and multiresolution temporal behavior matching against high noise and information missing, and the behavior similarity are described by multi-dimensional similarity vector for each user pair; (II) we build structure consistency models to maximize the structure and behavior consistency on users� core social structure across different platforms, thus the task of identity linkage can be performed on groups of users, which is beyond the individual level linkage in previous study; and (III) we propose a normalized-margin based linkage function formulation, and learn the linkage function by multi objective optimization where both supervised pair-wise linkage function learning and structure consistency maximization are conducted towards a unified Pareto optimal solution. The model is able to deal with drastic information missing, and avoid the curse of dimensionality in handling high dimensional sparse representation. Extensive experiments on 10 million users across seven popular social networks platforms demonstrate that HYDRA correctly identifies real user linkage across different platforms from massive noisy user behavior data records, and outperforms existing state-of-the-art approaches by at least perception under different settings, and four times better.
Keywords: Social identity linkage, structured learning, heterogeneous behavior, multi resoultion temporal information matching.
Abstract
Performance Analysis of OFDM-IDMA System using Random and Tree-based Interleaver for Underwater Acoustic Communication
Kapil Dev, S. K. Sriwas, J. P. Saini and M. Shukla
DOI: 10.17148/IJARCCE.2017.65100
Abstract: The ocean display episode of changing acoustic signal transmission due to its non-stationary nature. To set up wireless communication system of communication purpose is challenging in underwater application because transmitter sector section and receiver section are not fixed. Sound causes large delay in acoustic signal because of multipath phenomena and speed of sound is 1500 m/s. inter-symbol interference (ISI) occur due to large time delay and ISI decrease the performance of many system or receivers. However orthogonal frequency division multiplexing (OFDM) is a multi-tone modulation scheme which is used to reduce the long-time delay spreads of acoustic channels. OFDM-IDMA system is designed to mitigate the error burst in multi-access underwater application. An efficient random base interleaver is present which is simple and could produce orthogonal interleavers for generating user specific chip level interleaver for different user. Performance of OFDM-IDMA system was observed through analysis of BER with respect to SNR.
Keywords: IDMA, FDMA, BER, ISI, MAI and underwater communication.
Abstract
Comparative Analysis of Three Dimensional Channel Models in Molecular Communication via Diffusion
Anmol Preet Kaur, Dr. Deep Kamal Kaur Randhawa
DOI: 10.17148/IJARCCE.2017.65101
Abstract: The movement of messenger molecules in molecular communication via diffusion (MCvD) follows Gaussian distribution function. Due to the nature of random movement of information molecules (or messenger molecules), one of the key challenges is to reduce inter- symbol interference (ISI) that results from the response of diffusion process occurs in Gaussian distribution channel. In this paper, we propose and evaluate a new Poisson distribution channel model for molecular communication which is a novel solution to improve the system reliability and to reduce the impact of ISI. In this approach, now the randomly propagating messenger molecules follow Poisson distribution function. This paper analyzes and compares these two approximations of the binomial distribution of propagating molecules in 3-D MCvD system. We investigate either Poisson or Gaussian channel model is better in terms of ISI, Symbol Error Rate (SER), and communication delay via numerical simulations.
Keywords: Molecular Communication via Diffusion (MCvD), Ligand-Receptor Binding Process (LRBP), binomial, Gaussian, Poisson, Additive White Gaussian Noise (AWGN).
Abstract
Graphical Gauze Authentication
Mr. Vicky Ghaytadak, Prof. Kulkarni P.R
DOI: 10.17148/IJARCCE.2017.65102
Abstract: Currently predictable secret word patterns are susceptible to dictionary attacks, eves dropping and shoulder surfing, numerous shoulder surfing unaffected graphical password patterns proposed. On the other hand, Textual passwords are the utmost public technique used for authentication. There are several graphical password schemes that are planned in the past years. A maximum users are used word-based passwords than untainted graphical passwords, word-based or character based graphical password schemes have been proposed. Regrettably, none of existing schemes are create a graphical gauze to resisting the impersonation. In this paper, we propose an improved mainly text-based or character based shoulder surfing resistant and other attacks like eves dropping, dictionary attacks, and social engineering resistant graphical gauze by using colors. In the projected scheme, the operator can strongly, simply and professionally login system and examine the security and usability of the planned system and show the resistance of the proposed scheme to unintended login.
Keywords: Authentication, shoulder surfing, Gauze, Impersonation.
Abstract
LPG/CNG Gas Leakage Detection System with GSM Module
Alan M John, Bhavesh Purbia, Ankit Sharma, Mrs. A.S Udapurkar
DOI: 10.17148/IJARCCE.2017.65103
Abstract: The Gas leakage is one of the big problems with industrial sector, residential milieu and gas functioning vehicles like CNG (Compressed Natural Gas) buses, cars etc. One of the contraceptive methods to stop accidents associated with the gas leakage is to install a gas leakage detection device at vulnerable places. The system detects the leakage of the LPG using a gas sensor and uses the GSM to alert the person about the gas leakage via SMS. When the concentration of LPG in air exceeds a certain level, the sensor senses the gas leakage and the output of the sensor goes LOW. The detection is done by the gas sensor, through the microcontroller the LED and buzzer are turned ON simultaneously. An alert is provided to the user, sending an SMS to the programmed mobile number.
Keywords: IC555, Opto coupler, MOSFET, Marx generator.
Abstract
Efficient Job Recommender System
Sheela Bankar, Ambesh Vishwakarma, Siddhi Sarolkar
DOI: 10.17148/IJARCCE.2017.65104
Abstract: Open source resume is web application to help programming advancement groups to enroll designers in view of their open source framework commitment exercises. This instrument gives bits of knowledge into designers' Practical commitments to open source framework ventures, which can be valuable criteria for judging whether they are appropriate for joining the advancement group in view of their diverse capabilities. To beat the Empowerment issues many employment entrances appeared despite the fact that these entries are attempting their best we are confronting numerous challenges to get reaction from the corporate side, in the meantime even corporate human resource individuals are confronting troubles to discover the representative who fits their necessity. Activity is expected to conquer these many difficulties and make everything less demanding for the clients.
Keywords: Open Source Software; Mining Software Repositories; Developer Expertise; Visualization Tool.
Abstract
Automatic Gate with Track Switching
Mohd. Danish, Prashant Kr. Singh, Mrigank Shekhar, Mrs. S.U Kulkarni
DOI: 10.17148/IJARCCE.2017.65105
Abstract: Our mission is to design a system to manage the railway gate at the level crossing and switching mechanism for changing the track at railway station. The range of accidents associated with railway is increasing day by day, the above automations will reduce these accidents to a far extra volume. This project employs two pair of Infrared (IR) sensors, one pair of IR sensor is used to govern the railway gate and the other pair of IR sensor is used to switch the railway track according to the requirement .Track switching can be achieved by using the electromagnetic circuit or placing the motor arrangement. IR sensors are used to experience the appearance and departure of the train. As the entire system is automatic errors taking place due to manual operation are averted due to the fact the accuracy of automated operation is more than the manned operation. Our mission is advanced on an embedded system and the usage of a microcontroller as a controlling unit.
Keywords: Infrared (IR) sensor, microcontroller, Limit switch, Railway gate and track switching.
Abstract
Designing a Low- Pass FIR Digital Filter by using Rectangular Window Hanning Window and Bartlett Method
Vijendra Kumar Prajapati, Dhanmohan Ratre, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.65106
Abstract: Digital filtering plays a significant role in the world of technology. Therefore, processing of input signal has to be done to get useful signal. This paper deals with the design of finite impulse response digital filter using window techniques Rectangular, Hanning and Bartlett of order (15) are presented. It shown that filterdesign by using Rectangular Window Technique is better as it provides better result in terms of magnitude, phase, impulse, step responses and pole-zero plot.[1]
Keywords: FIR Filter, DSP, FFT, Hanning Window, MATLAB, Rectangular Window, Bartlett Window, frequency sampling, amplitude-frequency.
Abstract
Monitoring of Data from Multiple Sensors Using Android Application and its User Manual
Vishesh S, Sharath R, Varun Hebbar BC, Sripragna CH, Shreyas BV, Ramalingesh Godavarthi
DOI: 10.17148/IJARCCE.2017.65107
Abstract: Today�s Smartphones come with an advanced Operating Systems (OS), a swift processor, huge memory space, SD card /external memory card slot, USB, graphic accelerators and many other features to satisfy the needs of the 21st century user. In fact smartphones are portable and battery powered Personal Computers. The widespread adoption of mobile devices such as the smartphones has created tremendous opportunities for business, entertainment, science and technology, sports, stock market, etc. Many useful applications can be easily found in the smartphone and used immediately. The Operating Systems like Android and iOS provide platform for third party applications as well. Today almost all business/ companies/ firms have their own Android or iOS application which can be easily downloaded from the app store and easily installed into the smartphone. The third party application opens up the door to infinite possibilities and nourishes the user�s experience. In this paper we present to you the working of the Android application that we have built and discussed in our previous paper [1] �Android Application to Read and Record Data from Multiple Sensors�. We also present to you the user manual of the Android application. Embedded system life cycle is unravelled with a real time example.
Keywords: Smartphones advanced Operating Systems, Android, Embedded System life cycle, Personal Computers, third party applications.
Abstract
Flexible and Secure Auditing of outsourced Database in Cloud Computing
Mr. Darshan T. Kavathekar, Mrs. B. S. Shetty
DOI: 10.17148/IJARCCE.2017.65108
Abstract: Now a days increasing number of enterprise outsource their IT services to third parties who can provides services for a lower cost due to economy of scale. The database management to cloud service provider that provides various database services to different users. For securing database outsourced to the cloud, it is important to allow cloud users to verify that their queries to the cloud �hosted database are correctly executed by the cloud. Existing solutions on that issue suffer from a high communication cost, a heavy storage overhead or an overwhelming computational cost on clients. In this paper, we propose a new auditing scheme for outsourced database, which can simultaneously achieve the correctness and completeness of search results. Furthermore, we can prove that our construction can achieve security properties even in the encrypted outsourced database. Our audit services can be extended to support dynamic database operations.
Keywords: Cloud computing, Audit service, Database encryption, Outsourcing computation.
Abstract
Optimization of Slot and Map Reduce Workload
Vinayak Kadam, Rutuja Aughad, Priyanka Gaikwad, Jidnyasa Khanore, Pragati Naykodi
DOI: 10.17148/IJARCCE.2017.65109
Abstract: MapReduce might be a modish computing paradigm in Hadoop. MapReduce is utilized for large-scale process in large info. However, the slot-based MapReduce system (e.g., Hadoop MRv1) can suffer from poor performance as a result of its unoptimized resource allocation. to resolve this downside this paper identifies and optimizes the resource allocation from three key aspects.First, alowing to the pre-configuration of distinct reduce slots and map slots that aren't fungible, slots will be severely under-utilized. as a result of map slots can be totally used whereas reduce slots area unit empty, and vice-versa. This paper conjointly proposes another technique known as Dynamic Hadoop Slot Allocation by keeping the slot-based model. It relaxes the slot allocation constraint to permit slots to be reallocated to either map or reduce tasks reckoning on their desires. Second, the speculative execution will tackle the strayer drawback, that has shown to boost the performance for one job however at the expense of the cluster potenc In view of this, we tend to propose Speculative Execution Performance leveling to balance the performance between one job and a bunch of jobs. Third, delay programming has shown to enhance the info neighbourhood however at the price of fairness. to boot, the paper propose a way referred to as Slot PreScheduling which will improve the info neighbourhood however with no impact on fairness. Finally, by combining these techniques along, we tend to type a gradual slot allocation system referred to as DynamicMR which will improve the performance of MapReduce workloads considerably.
Keywords: MapReduce, Hadoop Fair Scheduler, Delay Scheduler, DynamicMR SlotAllocation.
Abstract
A Novel Approach for Privacy Policy on Online Social Network
Prof. P.S. Hanwate, Pradnya Kapile, Kajal Katariya, Sunny Yadav, Ranjeet Patil
DOI: 10.17148/IJARCCE.2017.65110
Abstract: Photograph sharing is an alluring element which advances on line Social Networks (OSNS). Tragically, it could release clients' privateness in the event that they're permitted to distribute, comment, and tag a photo uninhibitedly. we endeavor to address this issue and observe the situation while a man offers a photo containing people other than him/her (named co-picture for brief).To spare you suitable privateness spillage of a photo, we format a component to permit every person in a picture know about the posting interest and take an interest inside the decision making at the photograph posting. For this rationale, we require a productive facial acknowledgment (FR) machine which can catch every one of us inside the photo. In any case, additional distressing privateness putting may furthermore limitation the assortment of the pictures openly accessible to instruct the FR contraption. To address this dilemma, our component endeavors to use clients' private pics to plan a customized FR contraption specifically prepared to recognize feasible picture co-proprietors without releasing their privateness. We moreover widen designated agreement based method to diminish the computational multifaceted nature and monitor the individual tutoring set. We demonstrate that our gadget is better than other reasonable strategies in expressions of notoriety proportion and execution. Our component is executed as confirmation of idea Android programming on Face book's stage. The vitality direction dissemination is brought about by the particular join method, in which the likelihood of a man An associating with a client B is corresponding to the scope of B's present associations. Watchwords: Social system, photograph protection, secure multi-party calculation, bolster vector machine, collective learning.
Keywords: Social network, photo privacy, secure multi-party computation, support vector machine, collaborative learning.
Abstract
WI-MOB: Power Transmission System for Charging Smart Phones using RF Module through Wi-Fi
Shareen Noronha, Prajna P, Prateeksha Prasad, Pratheeksha, Saritha, Sachin Bhat
DOI: 10.17148/IJARCCE.2017.65111
Abstract: Wireless technology has shown an advance improvement and is rapidly growing making the life of mankind much easier and feasible. The Wi-Fi plays a major role in the wireless power transmission in this paper. The range of a Wi-Fi is wider compared to other wireless transmitters such as Bluetooth. WI-MOB uses ESP8266 module which is a combination of antenna, voltage regulator and filters. This module is followed by an amplifier which is used to boost the signal in order to meet the required range of voltage. Wi-Fi signal frequency varies between 2.4GHz or 5GHz which is detected and captured by the PCB antenna being used. The received signal does not meet our expected values hence we amplify the signal using a boost circuit and then connect it to the cell phone. The Cell phone starts charging when it is paired with the available Wi-Fi router in the vicinity.
Keywords: RF module, PCB antenna, Voltage regulator, WiFi.
Abstract
Implementation of Image Encryption and Compression using Chinese Reminder Theorem and Chaotic Logistic Maps
V.V.M Sireesha, Y.V.D. Pushpa Latha
DOI: 10.17148/IJARCCE.2017.65112
Abstract: When the image data are regularly changed, existing image encryption algorithm is easy to be decrypted. In modern technology encryption of data is necessary to provide security when it is transmitted and stored in internet world. To employ this we are using different types of encryption algorithms such as AES, DES, and 3DES and also Blow Fish which are common. These encryption techniques does not provide more security when are used in real time encryption process. In this we use a new algorithm called Chinese Reminder Theorem along with compression which helps in encrypting the data and secure it from unauthorized access. Along with chaos based mapping, Chinese remainder theorem (CRT) which is used long with compression of an image along with Fibonacci series is also used. In order to improve the security of encryption algorithm, this paper proposes an image encryption algorithm based on chaotic mapping and Chinese remainder theorem. The encryption algorithm is divided into pixel scrambling and image diffusion. Firstly, the Chebyshev mapping is used to generate a chaotic sequence, which is used to scramble the image pixel bit value. Then, the pixel position is scrambled by formula. Finally, the scrambled image is substantially changed by the application of the Chinese Remainder Theorem with compression and Fibonacci series. Simulation results show that, compared with other typical encryption algorithm, the proposed encryption algorithm has better effect on the key sensitivity, histogram statistics, information entropy analysis and correlation analysis.
Keywords: Chebyshev Chaotic Mapping, Chinese Remainder Theorem, Fibonacci series, Compression, Pixel scrambling, Image diffusion.
Abstract
Colpitt Oscillator using CMOS Technology based on Second Generation of Current Conveyers
Ghanendra Kumar, Dr. N.S. Beniwa
DOI: 10.17148/IJARCCE.2017.65113
Abstract: CMOS Technology is used to high stability, high accuracy, and high output power, high amplitude. We use cadence virtuoso to design this type circuit, The proposed range of this oscillator is 2 Hz � 1000 Hz, there are many communications applications of this circuit. It is used to reduce power consumption as well as it reduces noise margin too. It also acts as an inverter as well as in switching applications.
Keywords: Colpitt Oscillator using CMOS technology Based on second generation of current conveyers.
Abstract
Optimal Design of Low Pass Filter by Rectangular, Taylor and Hamming Technique
Tarun Kumar Chandra, Gautam Sharma, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.65114
Abstract: Digital filters are widely used in many Digital Signal Processing applications. Therefore, Digital Filtering is one of the basic needs of Digital Signal Processing. This paper introduces the definition and basic principles of FIR digital filters, and the design based on MATLAB. After the description of the process of design., the MATLAB program is Used to implement FIR filter using modified coefficient of Hamming window function and also calculate the equivalent noise bandwidth. Digital filters are pervasive in the present era of communication systems. As a result good digital filter performance is important and hence to design a digital finite impulse response (FIR) filter satisfying all the required condition is a demanding one. This report deals with the design of FIR digital filter using hamming window technique. This window is optimized to minimize the maximum (nearest) side lobe, giving it a height of about one-fifth that of the Hamming window. Hence this type of filter plays very important role in spectral analysis of different types of signal. In spectral analysis applications, a small main lobe width of the window function in frequency domain is required for increasing the ability to distinguish two closely spaced frequency components.
Keywords: FIR Filter, DSP, FFT, Rectangular Window, Taylor Window, Hamming Window, MATLAB.
Abstract
Android Password based Door Opener System
Nagaveni B Biradar, Manjula, Pavithra S, M. Afreen Khanum, Mubeen Firdous M
DOI: 10.17148/IJARCCE.2017.65115
Abstract: This project presents a prototype security door that can be remotely controlled by a GSM phone set acting as the transmitter and another GSM phone set with a dual tone multi-frequency (DTMF) connected to the door motor through a DTMF decoder interfaced with micro controller unit and a stepper motor. The design is composed of four main functional modules, namely; the GSM module, the IR SENSOR module, GAS SENSOR module and the FIRE SENSOR module. The GSM module act as both transmitting and receiving unit employs the use of a mobile phone set serving as the communication device between the user at one end and the object of access (i.e. the door) at the other receiving end. The codes for this project was written in Embedded C language with Android application compiled by visual studio and keil software , the program run without error before it was burn onto the micro controller using a device called the programmer by placing the micro controller on it socket equal to the pin number.
Keywords: GSM, Microcontroller, IR sensor, Security, Gas sensor, Fire sensor, Buzzer, Android application.
Abstract
A Brief Review of the Large Eddy Simulation Method
Sachin H Shinde, Mrs. B. S. Shetty
DOI: 10.17148/IJARCCE.2017.65116
Abstract: Large-eddy simulation (LES) was originally proposed for simulating atmospheric flows in the 1960s and has become one of the most promising and successful methodology for simulating turbulent flows with the improvement of computing power. It is now feasible to simulate complex engineering flows using LES. However, apart from the computing power, significant challenges still remain for LES to reach a level of maturity that brings this approach to the mainstream of engineering and industrial computations. This paper will describe briefly overview of LES formalism first, present a quick glance at its history, review its current state focusing mainly on its applications in transitional flows and gas turbine combustor flows, discuss some major modeling and numerical challenges/issues that we are facing now and in the near future, and finish with the concluding remarks.
Keywords: Parallel computing, atmospheric flow, turbulent flow, cloud physics.
Abstract
Practical Implementation of Real-time Sensing of Sensor Values using Android Application-1
Vishesh S, Siri BC, Shivani YN, Thanmayi BK, Shweta Manjunath, Sushmitha TS
DOI: 10.17148/IJARCCE.2017.65117
Abstract: We can smell, taste, feel, hear and see the gifts of nature but we have always had that curiosity or a strong desire to measure those senses in a more systematic manner and record those values/store those values. Sound from a speaker is loud- This is the reading given by our ears which is one of the five sense organs, but we would like to measure it in terms of units like decibels dB, frequency Hz etc� This is necessary for systematic analysis. For this we need a sensor that is sensitive to the real time processes and their outcome, a processing unit, connectivity elements and output display/elucidation unit. In this paper we carry out real time measurements of %vol of vapour of a volatile liquid (Alcohol), Leakage of hazardous gasses like LPG, Climate-Humidity and temperature and the distance between the source and the obstacle using ultrasonic sensors. All these real time sensor data is monitored wirelessly using a third party developed Android application and installed into an Android OS powered Smartphone and stored into the internal or SD card memory (external memory) of the Smartphone. We have designed an android application named �Sense_graph� which can wirelessly record and monitor real time values. In this paper we also mention the key considerations in sensor selection and operation, they are Accuracy and Resolution, Precision, Sensitivity, Reliability, Response time, Practicality and Cost.
Keywords: Leakage of hazardous gasses like LPG, Climate-Humidity and temperature, ultrasonic sensors, Accuracy and Resolution, Precision, Sensitivity, Reliability, Response time, Practicality and Cost.
Abstract
High Voltage Dc Generation using Marx Generator
Gaytri Saraf, Amrapal Bansode, Akshada Khule, Shruti Rangari, Prof. S.U. Shinde
DOI: 10.17148/IJARCCE.2017.65118
Abstract: The main aim of the project proposes high voltage DC generation using Marx generator precept that uses MOSFET alongside capacitor stacks. The Marx precept turned into brought with the aid of Erwin Otto Marx. The principle includes producing a pulse of excessive voltage with the aid of the usage of some of capacitors parallely in an effort to charge up to on time after which installation in connection collection to develop an excessive voltage for the duration of the off length. The machine is used inside the method of era of in Kv�s for actual time checking out to be finished on electrical equipment insulation effectiveness to be placed up on strength carriers. The system includes 4 stages such that everyone is made up from diodes, one MOSFET in conjunction with one capacitor. Diodes are used in capacitor charging at every stage and MOSFET is used as a transfer to keep away from power losses. The capacitors are charged in parallel in the course of the ON time using 555 timer. The capacitors are delivered in a sequence the use of MOSFET switches in the course of the OFF time. Our challenge offers a compact and smooth device from a DC deliver of 12 V to get an approx (36-40) Volts.
Keywords: IC555, Opto coupler, MOSFET, Marx generator.
Abstract
A Survey: Hybrid Intelligent Modeling Technique for Data Classification
Tanu Rani, Mr. Narender Kumar
DOI: 10.17148/IJARCCE.2017.65119
Abstract: Classification is one of the important areas of research in the field of data mining and machine learning. This paper discusses about GA, ANN and SVM algorithm and their use in classification. The artificial neural network is the widely used technique for classification and prediction. ANN has some disadvantage such long learning rate, high computational cost, convergence at local optima and adjustment of weight. Optimization techniques and hybridization improve ANN performance. GA is an optimization technique that produces optimization of the problem by using natural evolution. SVM use the nonlinear kernel functions that implicitly map input data into high-dimensional feature spaces. Hybridization is a technique which combines the two or more classifier to improve the performance of the classifier.
Keywords: GA, ANN, SVM.
Abstract
Multi-Level Security for Internet Banking Services
V.L. Sowjanya, Mrs. K. Santosh Jhansi
DOI: 10.17148/IJARCCE.2017.65120
Abstract: Session management in disseminated Internet services is customarily in light of username and password, explicit logouts and components of user session termination utilizing fantastic timeouts. Developing biometric solution permit substituting username and password with biometric information during session establishment, however in such a methodology still a single verification is considered sufficient, and the identity of a user is viewed as unchanging during the whole session. Also, the length of the session timeout may effect on the conveince of the service and subsequent user fulfilment. This paper proposing an alternate method by applying authentication via multi-level user verification by applying biometrics an application in the service of sessions.
Keywords: Authentication, Security, Mobile environments, web servers.
Abstract
Microwave Photonic Filter: A Systematic Literature Review
Vijay Mishra, Sumit Gupta
DOI: 10.17148/IJARCCE.2017.65121
Abstract: An overview of microwave photonic filters which are implemented in both incoherent and coherent operational regimes has been provided. For microwave photonic filters implemented in the incoherent regime, an incoherence light source usually a broadband light source such as a light-emitting diode source, an amplified spontaneous emission source, or a laser array is needed. Importance of negative coefficients and complex coefficients in photonic FIR filters is discussed in detail. In this paper various technique reported in the last few year for both incoherent and coherent regime microwave photonic filter are reviewed with significance on the system architecture of microwave photonic filters , photonic generation , processing of time-delay microwave photonic signals, tunable and reconfigurable microwave photonic filters. Complexity and challenges in system implementation for widespread use for practical application and possibilities of newer research in microwave photonic were also discussed.
Keywords: Photonic Filters, Microwave Photonics, Optical Source Generation, FIR, IIR, Laser Array.
Abstract
Semantic Search on Applicant Tracking System
Le Quan Ha and Mainur Rahman
DOI: 10.17148/IJARCCE.2017.65122
Abstract: Web search engines often federate many user queries to relevant structured databases. For example, a recruitment-related query might be federated to a jobseekers-and-employers database containing their resumes and skills. The relevant structured data items are then returned to the user along with web search results. Though each structured database is searched in isolation, the search often produces empty / incomplete results as the database may not contain the required information to answer the query. Starting from our Applicant Tracking System (ATS), we have 16 development databases of over 650,000 profile documents of resumes / cover letters / skills. There are on average 238 keywords per document. In fact, per minute there can be up to 200,000 transactions within all these databases. Our existing traditional database search technique (by full-text keyword PostgreSQL search) can be frozen or taking very long to respond unless if we cut off / only search from top profiles, we will not have the search results ready by thirty seconds, but this cut-off limitation returned incorrect results; for example for a query �Jet fuel Thermal Oxidation� to request information about job seekers whose resumes contain skills in Oil and Gas industry, in the top ten results there was a conflict in relevance ranking. In order to research a more suitable full-text keyword search technique better than the existing database search, we considered employment of semantic search models. Our semantic search technique has 88% - 91.22% accuracy with very much quicker queries that can help users to make a search of 4 keywords of skills completed from 1 second to 28 seconds. Furthermore, the semantic search engine becomes very strong that users can search by entering a whole text paragraph. We designed a combination of semantic search that look for web pages per search and database search.
Keywords: applicant tracking system, ATS, click model, entity retrieval, entity ranker, keyword extraction, ontology, PostgreSQL, resource description framework, RDF, semantic search, Triplify.
Abstract
Secure Novel Honey Words Generation Approach to Reduce the Storage Overhead
Ms. Madhavi R. Dachawar, Prof. Srinu Dharavath
DOI: 10.17148/IJARCCE.2017.65123
Abstract: Now days, password has a lot of security problem that has a ected millions of users and many companies across globe. Password is generally stored in en-crypted format. If a password is stolen by us-ing the password cracking techniques and de-cryption techniques, it is easy to understand and capture password protected data using decrypted passwords. To troubleshoot, we create the honeyword password, i.e. a false password by using a at honeyword genera-tion method. When unauthorized user tries to login using honeyword, it will generate alarm to system administrator. Once admin-istrator received alert, it will generate false data and make unauthorized user confused.
Keywords: Honeywords, Honeypot, Lo-gin, OTP, Authentication, Password Cracking, Decoy Documents.
Abstract
A Review: Parallel Implementation of Shortest path Algorithm on GPGPU
Avadhoot K. Katkar, Dr. D. B. Kulkarni
DOI: 10.17148/IJARCCE.2017.65124
Abstract: To find out the shortest paths from a single source to all other vertices�s is a common problem in graph analysis. The Bellman�Ford�s algorithm is solves such a single�source shortestpath (SSSP) problem and better applies to beparallelized for many�core architectures. TheSequential Bellman-Ford Algorithm is that it very time consuming for large data set & it's time complexity is O(ve). Therefore, frontier based Bellman�Ford's algorithm significantly reduces the number of relaxation operation, number of iterations and time required for search task. This paper presents a parallel implementation of the Bellman�Ford algorithm based on frontier propagation. General Purpose Graphics Processing Units (GPGPU) based parallel computing is the best alternate way to speed up the search task. This paper gives detailed information about frontier based Bellman�Ford's algorithm to solve optimization problem & improve the performance of GPU based computing.
Keywords: Bellman�Ford, SSSP, GPGPU, Parallel graph algorithms.
Abstract
Optimizing Cloud Base Video – CrowdSensing
Anitha J, Sapna B Kulkarni
DOI: 10.17148/IJARCCE.2017.65125
Abstract: Wearable and mobile devices are widely used for crowdsensing, as they come with many sensors and are carried everywhere. Among the sensing data, videos annotated with temporal-spatial metadata contain huge amount of information, but consume too much precious storage space. In this paper, we solve the problem of optimizing cloud-based video crowdsensing in three steps. First, we study the optimal transcoding problem on wearable and mobile cameras. We propose an algorithm to optimally select the coding parameters to fit more videos at higher quality on wearable and mobile cameras. Second, we empirically investigate the throughput of different file transfer protocols from wearable and mobile devices to cloud servers. We propose a real-time algorithm to select the best protocol under diverse network conditions, so as to leverage the intermittent WiFi access. Last, we look into the performance of cloud databases for sensor-annotated videos, and implement a practical algorithm to search videos overlapping with a target geographical region. Our measurement study on three popular opensource cloud databases reveals their pros and cons. The three proposed algorithms are evaluated via extensive simulations and experiments. The evaluation results show the practicality and efficiency of our algorithms and system. For example, our proposed transcoding algorithm outperforms existing approaches by 12 dB in video quality, 87% in energy saving, and one-quarter in delivery delay. Another example is, by intelligently choosing a proper cloud database; our system may reduce the insertion time by up to one-third, or the lookup time by up to one-fourth.
Keywords: Crowd Sensing and Crowd Sourcing, Cloud Ser-vices, Mobile and Ubiquitous Systems, Efficient Communications and Networking.
Abstract
Role of Data Mining Techniques in Agriculture Improvement
Saurabh Sindhu, Divya Sindhu
DOI: 10.17148/IJARCCE.2017.65126
Abstract: Data mining is the process of discovering and extracting of interesting patterns and knowledge from large amounts of data. The field of agriculture has to deal with large amounts of data and processing and retrieval of significant data from this abundance of agricultural information is necessary to help the farmers. Therefore, appropriate methods and techniques are required for managing and organizing this data to increase the efficiency and agricultural productivity. The application of data mining methods and techniques to discover new insights or knowledge is a relatively a novel approach in agriculture. Data mining can help to process and convert this raw data into useful information for improving agriculture. In this paper, various data mining techniques used for processing of agricultural information/data such as k-means clustering, k-nearest neighbour, artificial neural networks, support vector machine, naive Bayesian classifier and fuzzy c-means are described. With the advancement of novel and appropriate data mining techniques, different types of agricultural problems will be addressed to improve crop productivity.
Keywords: Data mining, Agriculture productivity, k-means clustering, Artificial neural network, Naive Bayesian classifier, Association rule mining, Regression analysis.
Abstract
Review on Moving Object Detection in Video Surveillance
Aqsa Khan, Mr. N. J. Janwe
DOI: 10.17148/IJARCCE.2017.65127
Abstract: This chapter presents a review and systematic study on the moving object detection and surveillancing of the video as they are important and challenging task in many computer vision applications. Such as human detection algorithm, vehicles detection, threat, security. Video surveillancing in a dynamic environment ,especially for human and vehicles and for specific object in case of security is one of the current challenging research topic in computer vision it is a key technology to fight against terrorism, crime, public safety and for efficient management of accidents and crime seen going on now a days. The paper also presents the concept of real time implementation computing task in video surveillances system. In this review paper various methods are discussed were evaluation of order to access how well they can detect moving object in an outdoor/indoor section in real time situation.
Keywords: Human Detection, Video Surveillance, Moving Object Detection, Background Subtraction.
Abstract
Review of Single Phase Induction Motor Controlling
Ajitabh Awasthi, Palash Rai, Sanjay Kumar, Mr. Swapnil Namekar
DOI: 10.17148/IJARCCE.2017.65128
Abstract: AC motors are predominant in the field of industrial Drives. They are widely used because of their efficiency, less maintenance, construction. Speed control is a vital requirement of industries today. The parameter which takes the features of the induction motor away from the DC motor is its speed control. The speed control of AC Motors by conventional method of pole changing, voltage and frequency are very complicated and require more time and are less efficient or expensive techniques. So in industrial applications where variable speed is required, an easy and quick speed control method has to be employed. Here we are going to make use of 89C51 microcontrollers along with electronic circuitry to regulate the speed and retrieve the real time speed on the digital display screen. The speed measurement will be employed by means of infrared transmitter and receiver. Depending on rotation a pulse will be generated and measured by the microcontroller. This ensures quick speed regulation as per the requirement of the user the firing angle is changed to regulate the speed. This would give the use of real time data of running motor; this will prevent the operator from reaching the maximum speed. Thus overall technique will provide reliable and flexible control on the motor.
Keywords: At89C51, Triac, Single phase Induction Motor, LCD etc.
Abstract
A Review on Role of Active Contour Model in Image Segmentation Applications
R.S. Jaiswal, M.V. Sarode
DOI: 10.17148/IJARCCE.2017.65129
Abstract: In recent years, Active contours have been widely studied and applied in image analysis. Active contours combine underlying information with high-level prior knowledge to achieve automatic segmentation for complex objects. Their applications include edge detection, segmentation of objects, shape modelling and object boundary tracking. This paper presents the development process of active contour models and describes the classical parametric active contour models, geometric active contour models, and new hybrid active contour models based on curve evolution and energy minimization techniques. It also discusses challenges and applications of active contour models in image segmentation.
Keywords: parametric model, geometric model, active contour.
Abstract
An Efficient Digital Baseband Encoder for Short Range Wireless Communication Applications
Sasmita M, Priya N
DOI: 10.17148/IJARCCE.2017.65130
Abstract: Various physical layer protocols are employed to encode information bits in short range wireless communication technologies. In this paper, we propose a multimode hardware architecture for a digital baseband encoder which incorporates Manchester, Differential Manchester and FM0 codes. These codes help in achieving good DC balance thereby improving signal reliability. Alternating Manchester with Differential Manchester for different intervals of time improves security at the physical layer level. This work aims at efficient integration of hardware components for the three coding modes.
Keywords: Manchester; Differential Manchester; FM0; Short range wireless communication; VLSI.
Abstract
Web-based Application
Prajakta Andhale, Sonali Ghadigaonkar, Kushal Lahoti, Kiran Patil, Prof. Sunayana Jadhav
DOI: 10.17148/IJARCCE.2017.65131
Abstract: With the growing use of Internet, demand for intelligent and user-friendly applications is increasing continuously. Thus we are providing with the user-friendly application where desktop resides within the web browser. As the Internet is easily accessible from any corner of the world the user can access this web application anytime from anywhere. Web-based Application is work as a normal operating system where applications provided by it can be handled just like using the normal desktop. The application is provided with network sharing, file sharing, document printing, games, group chatting applications and interestingly with social media applications like Facebook, Instagram and email. The advanced feature provided to our client is Stateful state of the system in which the position of the icons and the windows opened while working on the desktop will remain same whenever you login into the virtual desktop.
Keywords: Operating systems, Browsers, WEB OS, Web browser, Web application, Web server.
Abstract
Overhead Reduction by Spatial Reusability in Multi-Hop Wireless Networks
Mr. Abhilash Bhise, Dr. Sachin D. Babar
DOI: 10.17148/IJARCCE.2017.65132
Abstract: The issue of routing in multi-hop wireless networks, to achieve high end-to-end throughput, it is difficult to find the optimal path from the source node to the destination node. Although a large number of routing protocols have been implemented to find the path with minimum transmission time for sending a single packet, such transmission time reduces protocols cannot be guaranteed to achieve high end-to-end throughput. Spatial reusability aware routing in multi hop wireless network is featured by considering spatial reusability of the wireless communication media. Spatial reusability-aware single-path routes and any path routing protocols, and compare them with existing single-path routing and any path routing protocols, respectively. Our evaluation results demonstrate that our protocols significantly improve the end-to-end throughput compared with existing protocols. Resource allocation algorithm is inquired to maximize the energy efficiency (EE) in multiuser decode-and-forward (DF) relay interference networks.
Keywords: Routing, wireless network, Hop to Hop to communication.
Abstract
Main Memory Sharing for the Processed Data using Spitfire AKNN Algorithm
Ms Rajalakshmi A B, Dr. K. S. Shreedhara
DOI: 10.17148/IJARCCE.2017.65133
Abstract: A huge spectrum of Internet-scale mobile applications, for example social networking, gaming and entertainment, emergency response and crisis management, all require ef?cient and scalable All k Nearest Neighbors (AkNN) computations over millions of moving objects every few seconds to be operational. Most traditional techniques for computing AkNN queries are centralized, lacking both scalability and ef?ciency. Only recently, distributed techniques have been proposed to achieve scalability for large datasets. These batch-oriented algorithms are sub-optimal due to inef?cient data space partitioning and data replication among processing units. Algorithm Spit?re is a distributed algorithm that provides a scalable and high performance AkNN processing framework. The proposed algorithm deploys a fast load-balanced partitioning scheme along with an ef?cient replication-set selection algorithm, to provide fast main-memory computations of the exact AkNN results in a batch-oriented manner. Here the pruning ef?ciency of the Spit?re algorithm plays a pivotal role in reducing communication and response time up to an order of magnitude, compared to other state-of-the-art distributed AkNN algorithms executed in distributed main-memory.
Keywords: distributed system, memory distribution, spitfire algorithm, AKNN algorithm.
Abstract
Noise Reduction in Medical Images using an Unbiased Non-local Means Method
Sushma C, Kavitha G
DOI: 10.17148/IJARCCE.2017.65134
Abstract: Medical ultrasound also known as diagnostic sonography or ultrasonogrophy is a diagnostic imaging technique based on the application of ultrasound. Since the speckle intensity has a signal dependent nature, filters based on the standard additive Gaussian noise model are inadequate. The main objective of the system is to remove the noise present in the image using UNLM Filter. The proposed unbiased NLM speckle filter based on Gamma statistics has mainly two phases. In the first phase the shape and scale parameters, ? and �, of the Gamma distribution are computed. In the second phase, an Unbiased Non-Local Means Method (UNLM) method was applied. Experiments were carried out on synthetic, B- mode US, CT scan, MRI images to validate the performance of the proposed method. Quantitative analysis based on PSNR with various noise levels shows that the proposed method is more effective in denoising.
Keywords: Denoising, ultrasound, MRI, CT scan images, NLM.
Abstract
Big Data Covey Routine with Emphatic Slow Starter Apprehension and Conceptive Enactment
Ms Mufliha Parveen C M, Smt Geetha N B
DOI: 10.17148/IJARCCE.2017.65135
Abstract: When one of the many tasks is assigned to a congested machine, processing of these tasks becomes slow. This problem is named to be as straggler or slow starter tasks. To tackle this so-called straggler problem, most parallel processing frameworks such as Map Reduce adopts various strategies, among which one of that is speculatively launching additional copies of same task when extra idling resource is available. Processing clusters consists of different conditions of loading namely lightly loaded and heavily loaded the major focus is on lightly loaded condition. For lightly loaded case, a cloning scheme, namely, Smart Cloning Algorithm (SCA) is utilized which is based on maximizing overall system utility. For heavily loaded case, �Enhanced Speculative Execution (ESE)� is used which is an extension of the Microsoft Mantri scheme to mitigate stragglers. After simulating the results obtained show that SCA reduces the total job flow time that is the job delay/ response time by nearly 6% comparing to speculative execution strategy of Microsoft Mantri. In addition, ESE Algorithm outperforms the Mantri baseline scheme by 71% in terms of job flow time while consuming the same amount of computation resource.
Keywords: congested machine, parallel processing jobs, straggler problem, and smart cloning algorithm.
Abstract
Real-time Implementation of Sensor Read and Record using Android Application-2
Vishesh S, Satish K, Narendra Vadavadagi, Tammannagouda, Chethan C, Lohith S
DOI: 10.17148/IJARCCE.2017.65136
Abstract: A System can be defined as an arrangement in which all units assemble and work together according to a program or plan. An embedded system is a system that has software embedded into computer-hardware, which makes a system dedicated for an application or specific part of an application or product or part of a larger system. Today Embedded systems are used in real-time computing applications like temperature sensing, environmental gas sensing, medical applications, automotive, military applications etc�Embedded systems may or may not have user interface. In systems dedicated only to one task, there is no user interface provided. In this paper we have developed an embedded system with an android interface. The android application developed by us is capable of wirelessly monitoring real-time sensor values. In the previous paper titled �Practical Implementation of Real-time Sensing of Sensor values using Android Applicaion-1� we had tested our Third party developed Android application with numerous sensors-LPG sensors, Alcohol sensing, Range detection using ultrasonic sensors and Temperature-Humidity sensing. In this paper we are applying the embedded system design to many other sensors like CO, CO2 and SO2 sensors; IR sensors and Pressure sensors.
Keywords: real-time computing applications, user interface, Third party developed Android application, CO, CO2 and SO2 sensors, IR sensors and Pressure sensors.
Abstract
Dispersion Management in Optical Soliton Transmission Systems: A Review
Harsimran Singh, Manjit Singh
DOI: 10.17148/IJARCCE.2017.65137
Abstract: We have reviewed various paper such as �Stabilization of dispersion-managed solitons in random optical fibers by strong dispersion management� and �Simulative analysis of dispersion managed solitons for Long-haul optical communication system�. They have investigated the stability of DM solitons that is based on a technique of separation of scales. It provides a fast and efficient way to compute all relevant quantities. They have given precise asymptotic expressions for the widths and chirps of the stable solitons, as well as conditions for their stabilities in homogeneous and inhomogeneous media. The solitons corresponding to strong dispersion managements are more stable with respect to the influence of random fluctuations of the chromatic dispersion than the solitons corresponding to weak dispersion managements. The other paper gives the design, implementation and performance analysis of a dispersion managed soliton link. The soliton transmission is very attractive as a potential method for realizing high-speed, long distance communication. The performance analysis includes 3D diagram, dispersion mapping and optical spectrum analysis. Analysis shows that by using dispersion compensated fiber and periodic amplification with EDFA, soliton based data transmission with least error is possible.
Keywords: Solitons, Dispersion Compensation, Amplifiers, Dispersion-managed Soliton, Random Dispersion.
Abstract
An Effective Login Authentication using Two Password Field and Multiple Hash Algorithm
Sumit Gautam
DOI: 10.17148/IJARCCE.2017.65138
Abstract: Authentication maintains privacy of a user. Almost all authentication techniques have some vulnerabilities, these vulnerabilities are exploited by hacker in order to gain access to someone privacy without his or her permission which is illegal as per IT rules. This paper focuses on present method which uses alphanumeric password ,It increases the strength of a alphanumeric password and make it difficult to crack a password using common password cracking techniques such a dictionary based attack, rule based attack, password guessing and many more attack used by black hat hacker.
Keywords: brutus force, rule based attack, black hat hacker, Authentication.
Abstract
A Proposed Approach to Federated Query Optimization
Kavitha Juliet, Rajeswari R P
DOI: 10.17148/IJARCCE.2017.65139
Abstract: Recently, there is a growing need for query optimization that can effectively deal with federated database systems. Modern optimizers use a cost model to choose the best query execution plan (QEP) which heavily dependent on statistics maintained in the system catalog. Keeping such statistics up to date in the federation is troublesome due to local autonomy.This paper discuss query processing for a federated data base system. The main objective of the paper is to give general framework for query optimization in federated database system and enhancing the global query optimization.
Keywords: Federated Query Optimization, Query Execution Plan (QEP), Query Processing, Database System.
Abstract
Efficient Parameter Reading of Electronic Charkha
Mayuri W. Meshram, Mr. S. T. Valunjkar
DOI: 10.17148/IJARCCE.2017.65140
Abstract: The system proposed in this paper aims at monitoring the torque and efficiency in simple dc motors in real time by employing steel disc. An embedded system is employed for acquiring electrical signals from the motor in a noninvasive manner, and then performing local processing for torque and efficiency estimation. The values calculated by the embedded system are transmitted to a LCD. Motors can be monitored in real time. An experimental study was conducted for observing the electronic charkha with its conditioning parameters. This study demonstrated that the use of intelligent nodes, with local processing capability, is essential for this type of application. The embedded system was deployed on a charkha with disc arrangement and studies were conducted to analyze torque and system efficiency.
Keywords: Efficiency estimation, embedded systems, PMDC motors, torque measurement, steel disc.
Abstract
Mobile Augmented Reality based Learning System
Afsana, Hazra Shanuda Aeroshan, Mr Manoj T
DOI: 10.17148/IJARCCE.2017.65141
Abstract: Augmented Reality is a technology that allows the user to simultaneously see virtual and real information in a combined view blending the real world with the digital data. In this paper, we have specified about Mobile Augmented Reality in the field of education which will allow the experience of augmented reality without constraining the individual�s whereabouts to a specific area. The implementation of this technique in rural areas will prove very beneficial to the students who cannot afford to spend a huge amount on education. This technology is new and also cost-effective and can bring the entire system of education in India to a new level.
Keywords: Augmented Reality, virtual, digital data, Mobile Augmented Reality.
Abstract
RFID and Pose Invariant Face Recognition Based Automated Security System
Tamil Vani .R, Ruckmani Divakaran, Vinitha Shree .G.R, Revathi .R, Nalini .P, Khutija Kubra
DOI: 10.17148/IJARCCE.2017.65142
Abstract: Conventional methods of using Barcodes that requires line of sight, pricing discrepancies, scanning problems, label damage, financial and equipment cost causes inaccuracy in entering the information and barcode scanners eventually breakdown causing scanning problems. Therefore, Radio Frequency Identification (RFID) technology is proposed that uses radio waves to transfer from an electronic tag called RFID tag, attached to an object, through a reader for the purpose of identifying and tracking the object. RFID technology which is a matured technology that has been widely deployed by various organization as a part of their automation system. In this study, an RFID based system has built in order to produce a compact and reliable smart security system using RFID and face verification is presented here. The RFID system identifies the student using the RFID card and further identity verification of the student is carried out using face recognition technique. RFID uniquely identifies the student based on the card number, then Viola- Jones algorithm is used to verify face of the students using face image of the student. The performance of the system is carried out with RFID code and face recognition.
Keywords: RFID card, RFID reader, Viola-Jones Algorithm.
Abstract
A Study of Genetic and Honey Bee Algorithms for Load Balancing in Distributed Systems
Dr. G. Suvarna Kumar, G. Venkata Lakshmi
DOI: 10.17148/IJARCCE.2017.65143
Abstract: Parallel processing in Distributed Computing refers to the concept of running several tasks simultaneously on different processors. Load balancing and scheduling are very important tasks to optimally utilize the available resources and processor utilization. These problems are NP-Complete. In this paper, we introduce two methods which are genetic algorithms and Honey bee algorithms for scheduling and load balancing in parallel heterogeneous multi-processor systems. Genetic algorithm is a meta-heuristic algorithm which provides optimization by performing genetic operations on the running tasks and Honey bee algorithm is a Bio-inspired algorithm which provides optimization based on foraging behaviour of honey bees. Finally these two types of algorithms provides better optimization than the normal CPU scheduling algorithms, it is studied by comparing the results of meta-heuristic and bio-inspired algorithms with CPU scheduling algorithms, such as Longest Processing Time (LPT) and Shortest Processing Time (SPT) [2]. The results of simulations indicate meta-heuristic and bio-inspired algorithms for scheduling and load balancing provides better total response time and system utilization. Simulations results indicate Genetic Algorithm and Honey bee algorithm reduces overall response time and also increases resource utilization in load balancing of distributed systems.
Keywords: Heterogeneous multiprocessor systems, Meta-heuristic algorithms, Bio-inspired algorithms, Genetic algorithms, Honey bee algorithm, Waggle dance, Virtual machine, System utilization, Total response time.
Abstract
Optimal Design of Low Pass Filter by Rectangular, Hanning, and Taylor Technique
Gaurinandan Prasad Tripathi, Ghanshyam Shriwas, Pranay Kumar Rahi
DOI: 10.17148/IJARCCE.2017.65144
Abstract: In digital control system, interference, which is mixed in the input signal, has a great influence on the performance of the system. Therefore, processing of input signal has to be done to get useful signal. Finite impulse response (FIR) filter plays an important role in the processing of digital signal. Designing the FIR filter by Matlab can simplify the complicated computation in simulation and improve the performance. By using the methods of window function, frequency sampling and convex optimization techniques, the design of FIR filter has been processed by Matlab. In the view of the designed program of Matlab and I can get the amplitude-frequency characterization. By using the FIR digital filters which have been designed to process the input signal based on the Matlab function, the filtering effect of different digital filters is analyzed by comparing the signal�s amplitude-frequency diagrams which have been generated. The experimental results show that the FIR filters designed in this paper are effective. In the view of the designed program of Matlab and I can get the amplitude-frequency characterization. By using the FIR digital filters which have been designed to process the input signal based on the Matlab function, the filtering effect of different digital filters is analyzed by comparing the signal�s amplitude-frequency diagrams which have been generated. The experimental results show that the FIR filters designed in this paper are effective.
Keywords: FIR Filter, DSP, FFT, Hanning Window, MATLAB, Taylor Window, Rectangular Window, frequency sampling, amplitude-frequency.
Abstract
Video Streaming over Wireless Networks using Efficient Real Time Adaptive Algorithm
Ms. Bhagyashri A. Banarase, Prof. N. R. Borkar
DOI: 10.17148/IJARCCE.2017.65145
Abstract: In this paper a real time adaptive algorithm is used for video streaming. A large number of live segmented adaptive HTTP video streaming services exist in the internet today. Managing the Quality-of-Experience (QoE) of video streaming for wireless clients is becoming increasingly important due to the rapid growth of video traffic on wireless networks. How efficiently and cost-effectively utilize multiple links to improve video streaming quality needs investigation. In order to maintain high video streaming quality while reducing the wireless service cost, in this paper, the optimal video streaming process with multiple links is formulated as a Markov Decision Process (MDP). The reward function is designed to consider the quality of service (QoS) requirements for video traffic, such as the start-up latency, playback fluency, average playback quality, playback smoothness and wireless service cost. To solve the MDP in real time, we propose an adaptive, best-action search algorithm to obtain a sub-optimal solution.
Keywords: DASH, Markov decision process, video streaming, wireless networks, Adaptive Video Streaming, HTTP protocol.
Abstract
A Novel Approach for Sharing Encrypted Data Over Cloud
Prof B.S. Vamsi Krishna, Bingi Anu Reshma
DOI: 10.17148/IJARCCE.2017.65146
Abstract: Data sharing is an important functionality in cloud storage for searchable encryption. In this paper, we describe how to securely, efficiently and flexibly share data over multi users in cloud storage. We developed a secret key for multi users which are group key and normal single key. We describe group key as a constant-size ciphertexts. Such that efficient delegation of decryption rights for any set of ciphertexts are possible. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. We provide formal security analysis of our schemes in the standard model. In this paper, we developed AES algorithm for secret key generation. In which a data owner only needs to distribute a group key and normal single key for each file or more than one file to the user for data privacy purpose.
Keywords: Data Sharing, Searchable Encryption, Group Key, Data Privacy, cloud storage.
Abstract
Medical Image Classification Techniques for Early Cancer Diagnosis: A Comprehensive Study
Neelaja K, Anand Kumar M, Minavathi
DOI: 10.17148/IJARCCE.2017.65147
Abstract: Medical imaging has become a vital part in the early detection, diagnosis and treatment of cancer. The reason: the remarkable power of medical imaging in providing physicians with sight and insight about human disease and physiology. In this role, imaging is used to: Screen, diagnose, and stage cancer; Guide cancer treatments; Determine if a treatment is working; Monitor cancer recurrence; and Facilitate medical research, particularly in such critical areas as drug discovery and therapeutic innovation to improve patient care. The cancer (lung, breast, or brain) biological database which contains the medical images classifies the digital films into three categories: normal, benign and malignant. The normal ones are those characterizing a healthy patient (non-nodules); nodules can be either benign (non-cancerous) or malignant (cancer). This paper presents a comprehensive study of various medical image processing and classification techniques used for predicting various types of cancer in early stage.
Keywords: Computer Aided Diagnosis Systems, Image Mining, Image Recognition, Neural Networks, Classification, Image matching, Image retrieval.
Abstract
A Review on “Personal Identification by using Biometric Traits”
Neha Shivajirao Tondare, Prof. S.S. Savkare
DOI: 10.17148/IJARCCE.2017.65148
Abstract: In today�s world automation is takes place in every field of human life which causes replacement of human control functions in to automated equipments. This results in need of hugely reliable personal identification system for authentication of person. Personal identification traits which are traditionally used such as password or signature are highly sensitive to spoofing attacks or being hacked. So, to fulfill the need of highly reliable personal identification and authentication biometric systems comes in to light. Biometric system which uses biological traits for identification are unique for every single personal as well as need not remember or carry token for it. During past few years, there are number of biometric traits are used for personal identification .This paper provides short review on different biometrics used for personal identification and related study which investigates their comparative performance.
Keywords: Biometric traits, Personal identification.
Abstract
Women Health Monitoring: A Survey
Pooja S. Shegokar, R. S. Paswan
DOI: 10.17148/IJARCCE.2017.65149
Abstract: In medical area, various problem exist but gestation stage serious problem regarding women. Women undergo several physiological parameter changes which cause major problem. When we neglect such problem may result in complications or mortality of mother and fetus, so we need to protect pregnant women. In this paper we have discussed a few approaches for find risk during pregnancy and information regarding health care.
Keywords: Gestation, Health monitoring, Machine learning classi?cation algorithm, Risk Prediction.
Abstract
A Survey: IoT based Vehicle Tracking System
Erabathini Chetan Laxmirajam, Dr. R. S. Kawitkar
DOI: 10.17148/IJARCCE.2017.65150
Abstract: Present scenario of the vehicle tracking system is useful in many applications like trace the vehicle; find the current location of the vehicle, security of personal vehicle, public transportation system, traffic management and others. Focusing on current traffic scenario in major cities and user requirements, we are trying to implement such system which is useful in real time applications. This paper focuses on some of the techniques to help traffic management. One of the techniques is connecting traffic management with Internet of Things (IoTs). IoT is the system of physical objects or things installed with hardware, software, sensors, and system connectivity, which empowers these objects to gather and trade information. IoT uses different types of protocols to work with different objects. CoAP, MQTT protocols ESP8266 and Zigbee models and customized RFID to help traffic management.
Keywords: Custom RFID, CoAP, MQTT, AWS, mosquito paho.
