IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Solar Radiation Machine Learning Production Depend on Training Neural Networks with Ant Colony Optimization Algorithms
El-Sayed M. Towfek El-kenawy
DOI: 10.17148/IJARCCE.2018.751
Abstract: Solar radiation one of the most important application in solar energy research so many research papers introduce to analyse the influence it. The great importance of Global Solar Radiation (GSR), the number of radiation stations are very less when compared to the stations that collect regular meteorological data like air temperature and humidity. This paper investigates new machine learning model meanly depend on an Artificial Neural Network (ANN) and Ant Colony Optimization (ACO). The prediction accuracy of the solar radiation depends on the best way to dataset optimization and training algorithm. This paper shows that prediction using (ANN) with dataset prepossessing by using (ACO) are more accurate and powerful when compared to conventional models
Keywords: Solar Radiation, Machine learning, Ant Colony Optimization, Artificial Neural Network.
High security provided by File Hosting, Online, and Cloud Storage made a revolution in clouding storage media.Storing files in the cloud will save you a lot of time and money by synchronizing our devices to retrieve and backup all type of data on the go from mobile, tablet or computer that’s connected on Internet.
Abstract: As we know agriculture is the backbone of India. Rice and Wheat is one of the new targets in agriculture where still, less researchers and manufacturers participate. This field faces some problems such as how to minimize the losses, how to increase productivity and how to minimize cost. In India, two types of agricultural methods are used, manual method (conventional method) and mechanize type method. Mechanization involves the use of a hybrid device between the power source and the work. This hybrid device usually transfers motion, such as rotary to linear, or provides ample of mechanical advantages such as increase or decrease or leverage of velocity. Agricultural machinery is machinery used in farming or other agriculture. Mechanized agriculture is a process of using agricultural machinery to mechanize the work of agriculture, greatly increasing farm worker productivity. In this modern era, automatedagro machinery has replaced many farm jobs that are carried out by labour or by animals such as oxen, horses etc.. The entire history of agriculture contains many examples of the use of tools, such as the hoe and the plough. The benefit of agro automation is that it saves the labour cost. However, it also saves the energy and cost of materials and to improve the quality, accuracy, and nicety. The seed feeding, pesticides sprinkling and crop cutting are the important stages in the agriculture field. The design of multipurpose agro equipment machine will help Indian farmers in rural side and small farm. It will reduce the cost of seed feeding, pesticides sprinkling and crop cutting the field and will help to increase economic standard of an Indian farmer.
An Efficient Way of Fruition Analysis on Content Addressable Memory
Ebziba, Dr.L. Jubair Ahmed
DOI: 10.17148/IJARCCE.2018.754
Abstract:
Abstract: Content Addressable Memory (CAM) is a memory device that is addressed to the content (or data) rather than the memory address. It is widely used in many applications that require fast table lookup and the prequel estimation aspect. It is used to boost up RAM performance and used to fast searching purpose. Basically CAM can be classified into two types NAND-CAM and NOR-CAM. Another type of CAM is neither a Hybrid CAM which intent to neither associates the fruition of target of NOR type CAM with the energy efficient NAND type CAM.
Keywords: Content Addressable Memory (CAM), Hybrid CAM architecture, Fast searching administration, High performance.
Efficient Wireless Network in Intercell Interferenceusing Resource Allocation Energy Aware Routing
Vaibhav R. Dandale, Prof. J. V. Shinde
DOI: 10.17148/IJARCCE.2018.755
Abstract:
Abstract: Content Addressable Memory (CAM) is a memory device that is addressed to the content (or data) rather than the memory address. It is widely used in many applications that require fast table lookup and the prequel estimation aspect. It is used to boost up RAM performance and used to fast searching purpose. Basically CAM can be classified into two types NAND-CAM and NOR-CAM. Another type of CAM is neither a Hybrid CAM which intent to neither associates the fruition of target of NOR type CAM with the energy efficient NAND type CAM.
Keywords: Content Addressable Memory (CAM), Hybrid CAM architecture, Fast searching administration, High performance.
Fog Computing & IoT: Overview, Architecture and Applications
Harshit Gupta, Dr. Ajay Kumar Bharti
DOI: 10.17148/IJARCCE.2018.756
Abstract:
Abstract: Fog computing is an emerging technology in the field of network services where data transfer from one device to another to perform some kind of activity. Fog computing is an extended concept of cloud computing. It works in-between the Internet of Things (IoT) and cloud data centers and reduces the communication gaps. Fog computing has made possible to have decreased latency and low network congestion. Fog computing is an on-going research trend in which the possibility of efficient network services exist. Fog computing can be described as a cloud type platform having similar services of data computation, data storage and application service but it is fundamentally different as it decentralized. In this paper, we have done a comprehensive survey on fog computing& IoT and described the fog computing architecture and analyse its different benefits and applications. We have also analysed the security aspects of fog computing & IoT, which is necessary and an important part of any kind of technology used in data communication system.
Keywords: Cloud computing, Fog computing, Internet of Things (IoT), Latency, Network Congestion.
Systematic Review of Web Application Security Vulnerabilities
Miss. Rohini Padmakar Pawar
DOI: 10.17148/IJARCCE.2018.757
Abstract: Increasing web technologies in collaboration with changing business environment means that web applications are becoming more popular today in corporate, public and government services. It is essential to understand the vulnerabilities commonly found in web applications. The number of reported web application vulnerabilities is increasing dramatically. The most of vulnerabilities result from improper input or improper security layer implementation in web application development this paper presents a new approach to vulnerability analysis which incorporates the different security vulnerabilities in web application and how they occur and how we can prevent from attack.
Keywords: Web Application, Vulnerabilities analysis, SQL Injection, XSS, Insecure Direct Object Reference, Failure to restrict URL Access.
Cloud Data Security using Trust based Mutual Authentication: A Survey Paper
Rina Patil, Mr. Pritesh Jain
DOI: 10.17148/IJARCCE.2018.758
Abstract: With the quick expansion of Cloud computing, more and more users place their data and application on the cloud. But the growth of Cloud computing is stuck by many Cloud security problem The development of the cloud system, large number of vendors can visit their users in the same platform directing their focus on the software rather than the underlying framework. This necessity requires the distribution, storage and analysis of the data on cloud for accessing virtualized and scalable web services. Access control policy can selectively restrict access to sensitive information stored by third-party sites on the Internet. Attribute-based encryption (ABE) schemes can strengthen the effective combination of flexibility and operability of access policy mechanism. Therefore, this survey paper is demonstrating secure mutual authentication for public cloud data and the need to prepare security solution using a strong cryptographic approach.
Saurabh Manjarekar, Sumit Rathod, Rafiq Siddhiqi, Israkkhan Pathan, Milind Kale
DOI: 10.17148/IJARCCE.2018.759
Abstract: Internet of Things (IoT) gives us the idea of remotely connecting and monitoring real world objects (things) through the Internet.This paper presents the design and implementation of an IoT-based Smart Home Security system for monitoring the surroundings based upon the real time tracking of Objects using OpenCV which is implemented on Raspberry Pi 3B development board, that can be used in homes and societies. Furthermore, this system can be used to report to the home security service provider immediately when a trespass occurs.
Keywords: Internet of Things(IoT), OpenCV, Raspberry Pi, Security.
Smart Parking Solution Using Internet of Things Approach
Dr. Nupur Soni
DOI: 10.17148/IJARCCE.2018.7510
Abstract: This paper reveals a work-in progress to capitalize on private land properties for parking, in order to relieve stress on public agencies, create new sources ofrevenue, and enlist new entities in the intermediary market. These intermediaries, labelled as Parking Service Providers (or PSPs)play a broker role through advertising parking lots on a shared cloud platform. To streamline these business collaborations andrelated processes, physical parking lots are augmented with Internet connectivity allowing cloud-provided applications tocongregate these lots into a larger inventory. The Internet of Things (IoT) paradigm expands the scope of cloud-based intelligentcar parking services in smart cities, with novel applications that better regulate car-parking related traffic. This paper presents awork-in-progress agenda that contributes to new business solutions and state-of-the-art research impacts.
Keywords: Smart parking systems; internet of things; sensor networks; cloud computing; web services.
Energy Aware Topographical forwarding protocol for Wireless Sensor Networks
Arun Kumar P R, Naveen Chandra Gowda, Rajeev Ranjan
DOI: 10.17148/IJARCCE.2018.7511
Abstract: This paper advice the topographical energy aware forwarding in WSN. In which partition of the sensor hubs in view of their area given by the hub gadgets utilizing GPS, into specific districts are arranged. Sink hub (base station) is set up far from the detecting locale and a Gateway hub at the center of detecting district. On the off chance that the separation of sensor hubs from sink hub and Gateway hub is nearly not exactly the predefined remove limit then hub utilizes coordinate correspondence for information transmission, isolate whatever is left of hubs into the equivalent districts whose separation is more than the edge remove. Cluster heads are chosen in every district freely from different districts in view of the likelihood, lingering energy of hubs. At last on examination, proposed forwarding execution with LEACH and our outcomes indicates better in terms of system energy utilization and life span.
Keystroke Dynamic Authentication Using Graphical Password
Prof P. D. Thakare, Samiksha Thakur
DOI: 10.17148/IJARCCE.2018.7512
Abstract: User authentication is one of the important issues for illegal access, especially to computer systems. Alphanumeric passwords can easily be hijacked later by some malicious user. A possible remedy against such a scenario is to use Keystroke Dynamics. Keystroke Dynamics is biometric used to measure the typing rhythm of the user for user authentication. Normally key logger proposed to record every keystroke made on the machine and offers the attacker the ability to steal large amounts of sensitive information without the permission of the owner of the message.
The main objective of this project is to provide 3 level securities for the operation in banking applications. initially, we are authenticating login id and password. Following user authentication, he will be shown with a graphical password screen which provides the additional security.
Abstract: Internet is the network of networks and is also called ‘internetwork’. Border Gateway Protocol (BGP) is the protocol of the internet. It is a standardised Exterior Gateway Protocol. It manages how packets are routed across the internet through the exchange of routing and reachability of information. In this paper we have put in efforts to realize a typical ISP network using a Network Simulation Tool. Efforts have been made to design a sophisticated network containing a network architecture well suited to route packets between various ISPs providing services for accessing, using or participating in the Internetwork. To realise an ISP network we have to draw limelight on various networking concepts and protocols. Redistribution [1], virtual-link configuration, Access Control List, internal BGP, external BGP and BGP route reflectors are a few considerable concepts and have paramount importance in building a worldly-wise ISP network.
Keywords: Border Gateway Protocol (BGP), realize a typical ISP network using a Network Simulation Tool, Redistribution, virtual-link configuration, Access Control List, internal BGP, external BGP and BGP route reflectors.
Case Study on Interactive Social Networking System
Gangadhar Immadi, Ramya Gopalan, Ronica K M, Yogitha Varshinee J
DOI: 10.17148/IJARCCE.2018.7514
Abstract:
Abstract: Question and Answer (Q&A) frameworks assume an imperative part in our day by day life for data and information sharing. Clients post inquiries and pick inquiries to reply in the framework. Because of the quickly developing client populace and the quantity of inquiries, it is far-fetched for a client to discover an inquiry by chance that (s) he can reply. Additionally, charitableness does not urge all clients to give answers, also astounding answers with a short answer hold up time. The essential goal of this paper is to enhance the execution of Q&A frameworks by currently sending inquiries to clients who are able and willing to answer the inquiries. To this end, we have outlined and actualized Social Q&A, an online informal community based Q&A framework. Social Q&A use the informal community properties of basic intrigue and shared trust companion relationship to recognize an asker through fellowship who are destined to answer the inquiry, and improve the client security. We additionally enhance Social Q&A with security and productivity improvements by ensuring client protection and distinguishes, and recovering answers naturally for repetitive inquiries. We portray the design and calculations, and led exhaustive expansive scale re-enactment to assess Social Q&A in examination with different techniques. Our outcomes propose that informal communities can be utilized to enhance the appropriate response quality and asker’s holding up time. We additionally actualized a genuine model of Social Q&A, and examine the Q&A conduct of genuine clients and inquiries from a little scale true Social Q&A framework.
Keywords: Question –Answering system, text mining, Information Retrieval (IR)
Survey on Automated Dynamic Query formation for Database Queries using Ranking
Yudhishthir D. Chavan, Prof. S.M. Shinde
DOI: 10.17148/IJARCCE.2018.7515
Abstract: A database is only as functional as query interface allows it to be. If a user is not capable to communicate to the database what user wishes from it, even the richest data store provides petite or no value. Writing well-structured queries, in languages such as SQL and XQuery, can be challenging due to a number of reasons, including the user’s lack of familiarity with the query language and the user’s ignorance of the underlying schema. A form based query interface, which only requires filling blanks to identify query parameters, is precious since it helps make data users with no knowledge of official query languages or the database schema. In practice, form-based interfaces are used frequently, but usually each form is designed in an adhoc way and its applicability is restricted to a small set of fixed queries.
Query form is one of the majority used user interfaces for querying databases. Traditional query forms are designed and predefined by developers or DBA in various information management systems. With the rapid development of web information and scientific databases, modern databases become very large and complex. Dynamic question type system: DQF, a question interface that is capable of dynamically generating question forms for users. Different from ancient document retrieval, users in information retrieval area unit usually willing to perform several rounds of actions (i.e., refinement question conditions) before distinctive the final candidates.
The essence of DQF is to capture user interests throughout user interactions and to adapt the question type iteratively. Every iteration consists of two sorts of user interactions: it contains only a few primary attributes of the information. The essential question type is then enriched iteratively via the interactions between the user and our system till the user is satisfying with the question results. Goal of this Project is to show that the advantages of using dynamic query forms for database over the existing static forms for database.
Abstract: Unmanned aerial vehicles have become cheaper because many control functions can be implemented in software rather than having to depend on expensive hardware . This even allows multiple UAVs to be used for a single application. In this case, the UAVs must have communication facilities so that they can communicate with each other. This can easily be achieved by equipping an UAV with a wireless mesh node. In this scenario, the UAV swarm can be considered to be a highly mobile wireless mesh network. In this paper we propose an architecture based on unmanned aerial vehicles (UAVs) that can be employed to implement a control loop for agricultural applications where UAVs are responsible for spraying chemicals on crops. The process of applying the chemicals is controlled by means of the feedback from the wireless sensors network deployed at ground level on the crop field. The aim of this solution is to support short delays in the control loop so that the UAV spraying can process the information from the sensors. Further more ,we evaluate an algorithm to adjust the UAV route under changes in the wind (intensity and direction) and the impact related to the number of messages exchanged between the UAV and the WSN. The information retrieved by the WSN allows the UAV to Confine its spraying of chemicals to strictly designated areas. Since there are sudden and frequent changes in environmental conditions the control loop must be able to react as quickly as possible.
Keywords: Arduino board, Bluetooth Model, Brushless Motor.
Securing Online Transaction using Visual Cryptography
P.Y.Pawar, Pooja Rajguru, Jaishree Dhomse
DOI: 10.17148/IJARCCE.2018.7517
Abstract: Nowadays many people are using online financial transactions. This transaction needs to be secure. A rapid growth in E-Commerce market is seen in recent time throughout the world. With the ever-increasing use of online shopping, Debit or Credit card fraud and personal information security are major concerns for customers, merchants and banks specifically in the case of CNP (Card Not Present). This paper presents a new technique for providing limited data only that is required for fund transfer during online shopping thereby safeguarding customer data. To overcome these problems using visual cryptography.
Visual Cryptography is a secret sharing scheme which owns the technique of sharing the visual information. The Captcha (image) is getting divided into two shares. The basic idea is that the secret captcha is divided into two irregular patterns of images called shares and they can be unravelled without any complicated cryptographic computation.
Implementation of Interleave Division Multiple Access (IDMA) and comparison of Rician Channel with MIMO Channel in Wireless Communication System
Abhishek Kumar, Srivastava Pratyush Tripathi
DOI: 10.17148/IJARCCE.2018.7518
Abstract: This paper provides a review on the IDMA (Interleave Division Multiple Access) technology inwirelesscommunication system based on Interleaver. In thispaper, IDMA technique is proposed in multipath rician fading channel and compared with MIMO. IDMA is a multi-users cheme in which chip Interleaversare the only means of user separation. The IDMA performance in term so bit error rate, error rate is discussed. Here comparison with different channel is done on the basis of error rate and various different parameters.
Optimization of A Digitaladder Design Using Mosfet and Finfet Technology
Chetan, Shalini Kashyap, Anand Kumar Jha
DOI: 10.17148/IJARCCE.2018.7519
Abstract:
In this paper, a low power ultra-high speedAdder is proposed by utilizing voltage scaling system for FinFET short gate mode technique. AnAdder design is implemented in MOSFET 32nm and also in FinFET 32nm, performance is compared on the basis of Average power Consumption and Delay. A variation of Number of fins versus Average power is also calculated. Simulation results are obtained using Synopsys HSPICE software, and they show that short gate mode Adder technique is low power. Delay is also improved when FinFETs are used in the Adder.
Performance Analysis of Various Digital Adders – A Review
Meenakshi Yadav, Ms. Nancy Aggarwal
DOI: 10.17148/IJARCCE.2018.7520
Abstract:
Adders are the center component of complex math activities like expansion, duplication, division, and exponentiation and so on. In the greater part of these frameworks adder lies in the basic way that influences the general speed of the framework. To meet these requests, control utilization and proliferation defer must be decreased in adder cell which is the fundamental building area.
Optimization of A Ripple Carryadder Using MOSFET AND FinFET Technology
Meenakshi Yadav, Ms, Nancy Aggarwal
DOI: 10.17148/IJARCCE.2018.7521
Abstract:
In this paper, a low power ultra-high speedRipple Carry Adder is proposed by utilizing voltage scaling system for FinFET. A Ripple Carry Adder design is implemented in MOSFET 32nm and also in FinFET 32nm, performance is compared on the basis of Average power Consumption and Delay. A variation of Number of fins versus Average power is also calculated. Simulation results are obtained using Synopsys HSPICE software, and they show that dual mode Ripple Carry Adder technique is low power. Delay is also improved when FinFETs are used in the Ripple Carry Adder.
A Survey of Automatic Text Summarization using Lexical Chains
Tapas Guha
DOI: 10.17148/IJARCCE.2018.7522
Abstract:
Text Summarization is a reductive transformation of source text to summary text through content reduction by selection and/or generalization on what is important in the source. It is the process of distilling the most important information from a source (or sources) to produce an abridged version for particular user (or users) and task (or tasks). The process of producing summaries automatically is Automatic Text Summarization. This paper produces a survey of the cohesion based summarization technique: Lexical Chain.
Keywords:
Automatic text summarization, Extracts, Cohesion, Lexical Chains.
Comparison of Greedy Routing Algorithms and various techniques for Efficient Packet Forwarding in VANET: A Review
Rupinder Kaur*, Khusboo bansal
DOI: 10.17148/IJARCCE.2018.7523
Abstract:
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. In VANET nodes which are vehicles can move safety with high speed and must communicate quickly and reliably. When an accident occurs in a road or highway, alarm messages must be disseminated, instead of ad hoc routed, to inform all other vehicles. Vehicular ad hoc network architecture and cellular technology to achieve intelligent communication and improve road traffic safety and efficiency. VANET can perform effective communication by utilizing routing information. In this paper, we have discussed about three greedy routing algorithms, and have compared to show which one is efficient in delivering packets in terms of mobility, nodes and transmission range.
The Enhanced KQuery To Search Neighbor Node in Manet
Gurjit Kaur*, Deepinder Dhaliwal
DOI: 10.17148/IJARCCE.2018.7524
Abstract:
K Nearest Neighbour (KNN) queries, which recover the k nearest sensor data items associated with a location (location-dependent sensor data) from the location of the query issuer, are useful for location based services in mobile environments. Here, we focus on the Ekquery processing in mobile ad hoc networks (MANETs). Key challenges in designing system protocols for the MANETs include low-overhead flexibility to network topology changes due to node mobility, and query processing that achieves high accuracy of the query result without a centralized server. In this paper, we propose the knodes which find optimal path in network for transmission.
The proposed system is the Automated Traffic Control System for Ambulance which deals with traffic congestion during high-density traffic at the specific time. Traffic density can be identified by Vehicle Counter placed at a certain default position on the lane. Here we are considering the main scenario at a time when the traffic congestion is less, the green signal activates for less number of time. As the traffic congestion increases green signal activates until it matches the default number. If there are no vehicles on the lane, then that particular lane signal is skipped. This framework additionally controls the movement of traffic congestion by enabling an ambulance to arrive at a specific area without having it to stop anyplace until the hospital is reached. This system includes RF transmitter and RF receiver. A unique RF transmitter which is present on ambulance transmits signals. The RF receiver placed few meters away from traffic signal receives signals and hence the ambulance on road is detected. Our system show result under light medium & heavy traffic. The designed system has a simple architecture, fast response time, ease of understanding the working module, user-friendliness and scope for further expansion.
A Survey on Cloud Security Issues and Challenges (CSIC)
Rama Krishna K, Dr. K G Mohan
DOI: 10.17148/IJARCCE.2018.7526
Abstract:
Cloud computing security is a fast-growing service that provides many of the same functionalities as traditional IT security. This includes protecting critical information from theft, data leakage and deletion. One of the benefits of cloud services is that you can operate at scale and still remain secure. It is similar to how you currently manage security, but now you have new ways of delivering security solutions that address new areas of concern. Cloud security does not change the approach on how to manage security from preventing to detective and corrective actions. But it does however give you the ability to perform these activities in a more agile manner. This paper provides a survey on generic architecture of cloud and the challenges in making the cloud secure.
An Adaptive Approach For Mobile Wireless Sensor Network With Dynamic Cluster Head Selection
Abhinav R.B, Mr.Prasad A.M
DOI: 10.17148/IJARCCE.2018.7527
Abstract:
Wireless Sensor Networks (WSN) is the key resource of perception and is widely used trends now a days. In wireless sensor network clustering, Efficient clustering and proper Cluster Head (CH) selection schemes are required, in order to improve energy saving of sensor nodes. In this paper, Dynamic CH Selection Method (DCHSM) is used where CHs are selected dynamically to solve the problem of the unreasonable cluster head selection that may lead to the overlapping coverage and unbalanced energy consumption in the cluster communication. By comparing it with the other existed algorithms, Here the network lifetime is increased by 50%, higher than that of Low Energy Adaptive Clustering Hierarchy (LEACH), and increased by 30%, higher than that of Distribute Energy -Efficient Clustering Algorithm (DEEC). The survival time of the network is longer than that of energy-balanced deterministic clustering algorithm and adaptive energy optimized clustering algorithm. The effectiveness of the network energy consumption, and it has the longest network lifetime which can be achieved.
The Internet of Things (IOT) is a new mega trend in the internet. This paper effort on implementation of a smart healthcare monitoring system that uses the sensors to collects the user health data and transmit the data to the server through Wi-Fi module. The data is stored in the database if any patients data is not in the normal range then the caretaker as well as the doctor are notified through the message service.
Keywords:
Internet of Things (IOT), WiFi, LPU, healthcare system.
Convolutional Neural Network based Inception v3 Model for Animal Classification
Jyotsna Bankar, Nitin R Gavai
DOI: 10.17148/IJARCCE.2018.7529
Abstract: Identification of similar types of objects in image processing now become regular task, but when dissimilar objects come into picture it becomes quite complex. Even it become more complicated when not just we need to identify objects but also categorizes them into their specific classes. We are using machine learning technique to classify the animal and put them into specified classes. Inception-v3 is the open source algorithm made by Google and used for objects classification. In this paper, based on Inception-v3 model in TensorFlow platform, we use the transfer learning technology to retrain the animal category datasets, which can greatly improve the accuracy of animal classification.
During this paper, system proposes a unique light-weight theme to effectively transmit information from supply to destination. In projected for information secret writing system target the AES algorithmic program. The projected system introduces economical mechanisms for information verification and reconstruction at the base station (Destination). In the system we additionally and securely extends the information of packet drop attacks with the sight of forwarding nodes. System valuate the projected technique each analytically and by trial and error, and also the results prove the effectiveness and potency of the light-weight secure information theme in police work packet forgery, loss attacks and alter destination through hacker.
Keywords- Packet Drop, AES algorithm, Confidentiality
Accurate estimation of Gaussian noise level is of fundamental interest in a wide variety of vision and image processing applications as it is critical to the processing techniques that follow. In this work, a new effective noise level estimation method is approaches on the basis of the study of singular values of noise-corrupted images. Two novel aspects of this project address the major challenges in noise estimation:1)how to infer the noise level according to image singular values out of SVD space .2)to add new noise to image to be estimated and analyses the change of singular values in order to determine the content related parameter in the model , so that the proposed scheme is adaptive to visual signals, thereby enabling a wider application scope of the proposed scheme. In this work example of algorithms noise estimates include motion estimation, denoising, super-resolution, shape-from-shading, and feature extraction. Noise level estimation is useful for many computer vision and other image processing algorithms that require knowing the noise level. It the fast noise estimation algorithm using a Gaussian filters in order to estimate the amount noise, images are spilt into a number of blocks and smooth blocks are selected. SVD is a basic tool for signal processing and analysis for long, but it is explored for noise estimation in images. The analysis and experiment results demonstrate that the proposed algorithm can reliably infer noise levels and show robust behavior over a wide range of visual content and noise conditions, and that is outperforms relevant existing methods.
Communication has revolutionized by the Satellites. Its importance and services to human race cannot be neglected. A communication satellite may be looked upon as a big microwave repeater body, where the satellite consists of so many numbers of transponders. Where transponders receive the incoming signal, modifies them and sends back them to the earth station at the receiver end. The satellites work in the operating frequency range of 1 GHz to 50 GHz. The technique with on the satellite communication operates is the FDM. This is the oldest technique but nowadays TDM is also being used, where FDM stands for frequency division multiplexing and TDM for time division multiplexing. As we all know satellite is a heavenly body which moves around the earth in an elliptical or circular orbit to carry on the motion of satellite in circular orbit. The various applications of satellite are weather forecasting, television, radio broadcasting, GPS & internet Communication, etc. Satellite can be used for point-to-point or point-to-multipoint communication is supported.
Keywords:
Satellites communication, GPS system, Ground Segment, Control Segment, Space Segment, Telemetry and Tele command.
Smart Location Based Student Attendance Management System Using Fingerprint Recognition
Prof. B.S.Satpute, Nikita Kakra, Pooja Kumbhar, Rupali Bhirud, Priya kumbhar
DOI: 10.17148/IJARCCE.2018.7533
Abstract:
Participation of teacher has been widely used as a method to track students’ academic behavior. But conventional approaches tend to be slow and imprecise. In this paper, we have proposed an automatic attendance detection system, where students can use smart phones to present their presences in parallel. The identity of a student is verified in collaboration with a fingerprint and position in real time. There are various forms of presence systems, such as the ERP system, RFID cards, and the biometric assistance system where fingerprints are considered the best and fastest method. In this system, we are monitoring the presence by matching the fingerprints and the position to improve the old method of recording presences. Replacing the tedious traditional form of assistance will save time, minimize administration workload and change paper and pen with digital devices.
Defending the Data from Selfish Node and Malicious Node in MANETs
J.Saranya, Mr. R.Arun Kumar M.E.,
DOI: 10.17148/IJARCCE.2018.7534
Abstract:
Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node behavior. Thus, the overall network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to poor performance when detecting selfish nodes, in term of precision and speed. This is especially important on networks with sporadic contacts, such as delay tolerant networks (DTNs), where sometimes watchdog’s lack of enough time or information to detect the selfish nodes. Thus, we propose collaborative contact-based watchdog (CoCoWa) as a collaborative approach based on the diffusion of local selfish nodes awareness when a contact occurs, so that information about selfish nodes is quickly propagated. As shown in the paper, this collaborative approach reduces the time and increases the precision when detecting selfish nodes.
Drunk person identification is carried out using thermal infrared images. Two different methods for identifying drunk person face. The features used in first method are simply the pixel values of specific points on the face. It is proved that cluster of a specific person moves in the feature space as the person consumes alcohol. The Fisher linear discriminate approach is used for space dimensionality reduction. In feature, space is found to be of very low dimensionality. The majority of the clusters moves towards the same direction, which can be easily separated into the ‘sober’ and ‘drunk’ regions. The ‘drunk’ feature space is introduced. The second method is thermal differences between various locations on the face are evaluated. It identify that specific areas in the face of a drunk person present an increased thermal evaluation. These best approach for identifying a drunk person. The concept behind this second proposed method relies on a physiology-based face identification procedure.
Keyword: Biometrics, Thermal Infrared Signatures, Drunk Person Verification.
A precise measure of corporate operating performance play critical role for achieving development during turbulent financial markets. This study proposes a reliable and sophisticated prediction architecture that incorporates risk metrics, dimensionality reduction technique, data envelopment analysis, and artificial intelligence technique for corporate operating performance forecasting. The securities market has deviated from its traditional form due to new technologies and changing investment strategies. The current securities market demands scalable machine learning algorithms supporting identification of market manipulation activities. In this paper we use Support Vector Machine algorithms to identify suspicious transactions in relation to market manipulation in stock market. The usage of ensemble classifiers in machine learning plays a vital role in prediction problems. The aim of this study is to analyze the accuracy of the ensemble methods in classifying the customers as good risk group or bad risk group. The opinions are judged on the basis of unsupervised and supervised learning. Supervised learning has unwavering to be superior to unsupervised mode of view verdict. The proposed paper has given a comparative study of naïve bayes and SVM on the opinions of the reviewers of the stock market. No system has been created for sentiment analysis in the share market. One decision in Stock Market can make huge impact on an investor life. The stock market is a complex system and often covered in mystery, it is therefore, very difficult to analyze all the impacting factors before making a decision. In this research we have tried to design a stock market prediction model which is based on different factors. To find best predicting model we can used the Support Vector Machine algorithm.
Keywords:
risk management, classification, data mining, market manipulation, Support Vector Machine(SVM), Stock Market, Machine Learning, Feature Selection
Survey on Data Security Mechanism by Distributed Data over Cloud Using Client-Server Architecture
Prof.Kanchan Sonawane, MOHD Shahid Saifi ,Vipul Gautame, Guruprasad Dastane
DOI: 10.17148/IJARCCE.2018.7537
Abstract: Data sharing is an critical functionality in cloud storage. In this article, we display a way to securely, efficiently, and flexibly share information with others in cloud storage. Deduplication may be a storage saving technique that has been adopted by several cloud storage suppliers likeDropbox. In cloud storage services, deduplication technology is commonly accustomed cut back the world and data live necessities of services by eliminating redundant knowledge and storing entirely one copy of them. Deduplication is best once multiple users supply an identical data to the cloud storage, but it raises issuesconcerning security and possession. Issues over information security still forestall several users from migratinginformation to remote storage. The standard resolution is to write in code the info before it leaves the owner’s premises.Client-side information deduplication specifically ensures that multiple transfers of constant content solely consume network information measure and space for storing of one upload. We’ll use server facetinformation deduplicationWe additionally describe other utility of our schemes. In precise, our schemes provide the first public-key encryptionhierarchy, which turned into but to be acknowledged.
Keywords: Searchable encryption, data sharing, cloud storage, data privacy.
Abstract: The new technologies characterizing the internet of Things permit realizing real sensible environments ready to offer advanced services to the users. Recently, these sensible environments also are being exploited to renovate the users’ interest on the cultural heritage, by guaranteeing real interactive cultural experiences. During this paper, we have a tendency to style and validate an inside location-aware design ready to enhance the user expertise during adiposity. Above all, the projected system depends on a wearable device that mixes place recognition and Localization capabilities to mechanically offer the users with cultural contents associated with the determined artworks. The localization data is obtained by a Bluetooth infrastructure put in within the College. Moreover, the system interacts with the Cloud to store multimedia system contents created by the user and to share environment-generated events on his/her social networks.
Real Time Commercials Detection in Television (TV) Program
Pujadevi Mourya Sakshi Jadhav, Reshma Pawar
DOI: 10.17148/IJARCCE.2018.7539
Abstract:
We explained here the real-time commercial detection in recorded Television (TV) program. TV commercials have become an inescapable part of modern life, significantly influencing our work habits and other aspects of life. The commercial can be interpreted as a special TV program which attempts to communicate up-to-date “product” information to a tremendous number of consumers. We are developing a system “Automatic Switching of Channels between Commercial Breaks” in which we give a solution for commercial block detection by using a technique like BSM.[2] The purpose is to eliminate commercials from their recordings to watch their recorded television shows without the annoyance of commercials by using the methods like Block based background subtraction image followed by frame retrieval, color conversion, frame comparison. After detection of the commercial break the channel automatically switches to next channel.
Cloud computing is the long dreamed vision of computing as a utility. Besides all the benefits of the cloud computing security of the stored data need to be considered while storing sensitive data on cloud. Cloud users cannot rely only on cloud service provider for security of their sensitive data stored on cloud. To achieve optimal usage of storage resources, many cloud storage providers perform de-duplication, which exploits data redundancy and avoids storing duplicated data from multiple users. System proposes a new approach to achieve more efficient deduplication for (encrypted) large files. Our approach, named Block-Level Message-Locked Encryption (BL-MLE), can achieve file-level and block-level deduplication, block key management, and proof of ownership simultaneously using a small set of metadata. The BL-MLE method can be simply completed to hold confirmation of storage, that makes it multi-purpose for secure cloud storage.
Keywords:
Third Party Authenticator, AES Algorithm, RSA Algorithm, SHA 512 Algorithm, deduplication, Block-Level Message-Locked Encryption.
Sathya Priya.B, Saritha.D, Dr. Kalpana.M, Dr. Manonmani.V
DOI: 10.17148/IJARCCE.2018.7541
Abstract:
Information and Communication Technology (ICT) in agriculture is a wide platform which offers solution to many areas in agriculture and rural development. The growing technology in agriculture has led to a marvellous development of application to foster and enhance the information dissemination. In the recent years, mobile is the only gadget to deliver the information in new ways. This paper reveals the idea about the creation of Techno seed app, an android based application. Techno seed app, an application helps the users by giving the information regarding the various enhancement technologies of seed, seed sowing, germination of seedling growth by altering the physiological state of the seed. The Techno seed app helps to improve the germination or seedling growth using the enhancement technologies and the application is very much useful for the seed scientists and farmers.
Optimization of Half, Full and 4 Bit Ripple Carry Adders
Sandhya Bhardwaj, Anuj Sharma
DOI: 10.17148/IJARCCE.2018.7542
Abstract:
In this paper, a varied range of adder circuits are designed in which half adder cmos, full adder cmos and RCA cmos are included, are designed using MOSFET in 32nm Technology length. Then, they are simulated using HSPICE and the performance parameters of adders such as average power and delay are determined. A dual mode low power technique is applied on Ripple Carry Adder to reduce power.
In this paper, a varied range of XOR circuits are designed in which 6T XOR is proposed using CNTFET Technology are designed using MOSFET in 32nm Technology length. Then, they are simulated using HSPICE and the performance parameters of adders such as average power and delay are determined. The proposed circuit is compared with 12T CMOS XOR circuit which is conventional used and compared with CNTFET counterpart of the XOR gate. Simulation results show that the proposed XOR gate is better in performance.
An Efficient Signature – Based Scheme for Energy consumption in Wireless Sensor Networks
B.Shanti, Molli Srinivasa Rao
DOI: 10.17148/IJARCCE.2018.7544
Abstract:
Information collection strategies are extremely becoming challenging factor in the field of remote sensor systems for secure data sharing. In managing the settings of the remote sensor systems have been extensively vital issue, for example, target following and condition remote observing. Be that as it may, information can be effectively traded off by a huge of challenges, for example, information interference and information altering and so on, and this produced information will be dropped by bunch head which will be appeared in the recreations by utilizing NS2 programming. We basically concentrate on information respectability security; give a personality based total mark conspire with an assigned verifier for remote sensor systems. As per the benefit of total marks, our plan can keep information uprightness, as well as can decrease data transfer capacity and capacity taken a toll for remote sensor systems.
Breast cancer is the most common cancer among American women. The average risk of a women developing a breast cancer some time in her life is about 12% in the united states. Breast cancer stars when cells in the breast begin to grow out of control. These cells usually form as a tumor. Tumor is malignant if the cells grows and spread to the surrounding tissues that is, to other areas of the body. Breast screening exam allow early detection of the cancerous lesion that may be a more effective treatment of disease. Nearly all 25% of breast cancer deaths occur in women diagnosed between 40 to 49 years. Early detection of breast cancer still remains as open problem in the research community. This paper presents a survey of different techniques for early detection of breast cancer.
Keywords:
Breast Cancer, Digital Breast Tomosynthesis, Microwave Imaging, Mammography; Ultrasound.
Distributed Load Balancing and Scheduling Algorithm for Resource Allocation in Cloud
AR. Meenakshi1, R. Divya Sopna2
DOI: 10.17148/IJARCCE.2018.7546
Abstract: Cloud computing is the latest distributed computing paradigm and it offers tremendous opportunities to solve large scale scientific problems. However, it presents various challenges that need to be addressed in order to be efficiently utilized for workflow applications. Although the workflow scheduling problem has been widely studied, there are very few initiatives tailored for Cloud environments. Furthermore, the existing works fail to either meet the user‟s Quality of Service (QoS) requirements or to incorporate some basic principles of Cloud computing such as the elasticity and heterogeneity of the computing resources. This work proposes a resource provisioning and scheduling strategy for scientific workflows on Infrastructure as a Service (IaaS) Clouds. We present an algorithm based on the meta-heuristic optimization technique, Particle Swarm Optimization (PSO), which aims to minimize the overall workflow execution cost while meeting deadline constraints. Our heuristic is evaluated using CloudSim and various well-known scientific workflows of different sizes. The results show that our approach performs better than the current state-of-the-art algorithms.
Abstract: In this paper we are presenting our work on the Indoor positioning of the users / Shopper using a Bluetooth network of low energy i.e. BLE (Bluetooth Low Energy) beacons deployed in large landmark our Main Objective is to determine which path is Shortest from User’s Current Location to reach Destination Using RSSI reading from Multiple Beacon Which will Asynchronously get measured on standard Commercial Mobile Device. As new Comer, There may be the problem to find out a particular location from current location [1].
Keywords: BLE (Bluetooth Low Energy), Indoor Mapping, Beacons, Commercial promotion.
Design and analysis of Microstrip Patch antenna on 1.7Ghz, 2.4Ghz and 5.8Ghz
Jemma, Dharmendra, Suman Dagar
DOI: 10.17148/IJARCCE.2018.7548
Abstract: During a disease outbreak or some natural or manmade disaster, it has been observed that several people suffer due to mismanagement and miscommunication between hospitals. This happens because most of the hospitals although are equipped with modern healthcare infrastructure, still rely on pen paper based record keeping of the patients. This not only causes wastage of resources but also complicates and increases the patient’s bills. Having paper based records although helps in keeping track of an individual patient, but it gives us no knowledge about the health of a community as a whole. Our project tries to solve the above problems by automating the healthcare systems by providing a one stop close loop solution. Using healthcare automation a patient can easily be registered to a hospital and doctor can keep track of his disease and treat him better. The patient also would be able to carry his reports and prescription on the go without any hustle. Location based emergency response service can help greatly in providing medical assistance to the victims in the nick of time. By creating Electronic Medical Record of every patient we can also determine patterns in the diseases caused in the patients over a period of time and can try to trace its source. Using K-Means clustering algorithm we can also predict what disease a patient would have by taking his blood report and symptoms as input and verifying them against the historical data stored in database. The project will consist of 3 modules, viz, Patient and Hospital Data Accumulation for Automation purpose, Location based emergency services, discovering disease patterns and identifying drug and medicine usage.
Video Sentiment Analysis using Multi Model Approach
Aishwarya Murarka, Kajal Shivarkar, Sneha, Vani Gupta, Prof. Lata Sankpal
DOI: 10.17148/IJARCCE.2018.7549
Abstract:
Now in recent era of attendance system, so many manual attendances provides for schools and collages. Likewise private as well as government school and collages trying to improve their attendance system day by day, Mostly of the student are absent or bunk the lectures, Now in this case message are not given to parents , because of some manual reason so the attendance is not properly, after some days RFID based student attendance system are invented. In previous system RFID technology provides automatic wireless identification using electronic passive and active tags with suitable reader, an attempt is made to solve previous attendance monitoring problems in schools and collages using RFID technology, hence we prepared the GSM module and Arduino for our project. Our project is modern attendance system using GSM, GSM stands for global system for mobile communication , using GSM module message will send to respective absent student parents and by using wi-fi module message is send to the respective staffs computer.
The objective of this project is to develop a system to flawless transport (emergency service) and track stolen vehicle. The main aim of this project is to develop such system that will automatically control the traffic signal once emergency service vehicle detected hence provide jam free road. The other part of this project is to track the route of the stolen vehicle. All the vehicle will have RFID tags, if the signal is RED and if RFID reader detects Emergency vehicle on that lane the automatically This signal will turn GREEN and all other signals will turn RED. If any registered stolen vehicle passes through that traffic signal, the RFID reader will detect it and track its route. The RFID reader will be installed at some distance from the traffic signal it will keep on reading the tag vehicles once it finds that the tagged vehicle is emergency vehicle the microcontroller will change the signal to green. Many life end due to emergency service vehicles not reaching on time for help. This system will help to provide flawless road so that emergency service would be right on time and some life gets saved.
Pooja Chaparwal, Simran Jakkan, Mrunali Jambhulkar, Anam Kazi, Sheshnarayan Pawar
DOI: 10.17148/IJARCCE.2018.7551
Abstract:
Data security is more important in cloud, for that efficient way is to have some access control. This access controls provide security very efficiently. The information accessing is a very important method in this cloud system, Due to data outsourcing to entrusted cloud servers and some unauthorized users. Mostly cloud computing treated as just “the cloud,” as the conveyance of on-request processing of data. In addition to everything from applications to server over the Internet. Cloud is utilized for putting away information, as well as the put away information can be shared by numerous clients. Every time it is not workable to access all information and confirm trustworthiness, so this system proposed to contain TPA to verify the exactness of shared facts of that system. Security safeguarding is done confirmation of that the TPA could not obtain client’s knowledge from the information captured along with the verification of inspecting process. However, for security reviewing process of that shared information, to preserve identification of user remaining part is the open challenge. This paper proposes the system for security conserving so as to permit reviewing information of client for common information access in cloud storage. These systems focus on the confirmation of data is necessary for auditing to check reliability of common information. Through this system, signature identity for each block is stored secure as of aTPA. The reliability of that mutual information of TPA can verify secretly without retrieving entire information. Final output achieved through this experiment proves the capability of this executed system while reviewing mutual information.
Keywords:
Cloud Computing, Cryptography, Data integrity, Privacy-Preserving, Third-party public auditing etc.
Wavelet Transform Based Moving Object Detection in Video Surveillance System
Ms. Rajshree Lande, Prof. R.M.Mulajkar
DOI: 10.17148/IJARCCE.2018.7552
Abstract:
Cloud storage is one the most broadly used applications of cloud. As use of cloud is expanding, critical and individual data is additionally being outsourced making it imperative to keep up confidentiality and integrity of this data. A basic method for securing data is encoding it before outsourcing, yet the recovery of required records from the encrypted cloud turns into an issue which requires searching over encrypted data. Different plans have been proposed to manage this issue for searching over encrypted cloud data, and work keeps on progressing endeavoring to provide ideal user search experience resembling plaintext search. This paper reviews research in this field from single keyword to multi-keyword search, forward indexing to reverse indexing, and disjunctive to conjunctive multi-keyword search. As research in this space is developing soon with focus of influencing user search experience over encrypted data resemble plain text search experience like “Google Search”.
P. V. Lokhande, S. S. Matsager, C. M. Gaikwad, Ashish U. Ghadge, Rahul V. Kumbhar
DOI: 10.17148/IJARCCE.2018.7553
Abstract:
This paper describes a smart watch which not only shows time but provides additional features like automatic door opening and starting the car engine. The watch is programmed using Arduino open source libraries and functions. With the development of this project we are providing a smartwatch in an affordable price. In this project we are providing facilities to unlock your car and door wirelessly through our smartwatch using a fingerprint sensor. The entire purpose of this project is to provide smart and secure functionalities to an already existing product in an affordable price.
High security provided by File Hosting, Online, and Cloud Storage made a revolution in clouding storage media.Storing files in the cloud will save you a lot of time and money by synchronizing our devices to retrieve and backup all type of data on the go from mobile, tablet or computer that’s connected on Internet.
Abstract: Credit Risk Assessment is a crucial part of decision making in any financial institutes. The aim of this paper is to highlight and illustrate the use of some quantitative techniques for risk estimation in finance and insurance. We will study the theoretical properties, the accuracy of modelling the economic phenomena and the computational performances of the risk measures Value-at-Risk, Conditional Tail Expectation, Conditional Value-at-Risk and Limited Value-at-Risk in the case of logistic distribution. We also investigate the most important statistical estimation methods for risk measure evaluation and we will compare their theoretical and empirical behavior.
Keywords: risk management, classification, data mining, market manipulation, Support Vector Machine (SVM), Stock Market, Machine Learning, Feature Selection
Segmentation of Moving Object in Video for Smart Surveillance
Rita Sehrawat, Shivani Duggal, Suman Dagar
DOI: IJARCCE.2018.75556
Abstract: The moving object detection deals with the detection of moving object in terms of moving person, vehicle,
animal etc. It identify and detects the moving object and avoids the background challenges such as motion of the
background, illumination variation etc. Such kind of work can be applicable in many useful for real-time computer
vision applications like indoor-outdoor visual surveillance security systems, robotics, driver assistance system, traffic
analysis, vehicle counting, navy, defence, army, target based object identification and surveillance of restricted zone. In
this research work, the proposed method detects the moving person and handles the problem of background motion and
illumination variation. It shows how a system can be developed by means of controlling the variance and standard
deviation based threshold value. The proposed automatic threshold is used to trade-off with the difference between
background and foreground pixel. It generates effective and appropriate threshold value for each pixel classification. It
also classifies the moving pixels more accurately and improves the detection quality. The proposed work shows a
significant improvement in the results of all considered video sequences and also compared with peer method i.e.
DECOLOR. It presents the strength by eliminating various environmental and illumination effects.
Keywords: Background Subtraction Algorithm, Real Time, MATLAB
Performance Comparison of Different Circuit Using DCVSL and Static CMOS Technique
Sangam, Shivani Duggal, Suman Dagar
DOI: IJARCCE.2018.75557
Abstract: The basic requirement of any Integrated Circuit is high speed and low power processing of the data signals to perform the desired execution. The minimization of feature size plays an important role in increasing the performance of integrated circuits. But the feature minimization inversely affects the percentage of leakage current when compared to the total current requirement of the circuit. So in this research we design single bit magnitude comparator & 3 input EXOR gate using conventional CMOS logic style as well as DCVSL style and then compared the output of both designs with some parameters. These parameters are power dissipation, delay and number of transistors used in the respective designs, and then concluded that which design yields best results. In CMOS circuits, as the technology scales down to nano scale, the sub-threshold leakage current increases with the decrease in the threshold voltage. So we need a technique to tackle the power dissipation problem in CMOS circuits do the analysis keeping parameters such as power consumption, delay, voltage & transistor count. First, there is the analysis between power consumption & delay, keeping the voltage constant at 1.8V. We here can see that circuit of the DCSVL structures produces better results in terms of power consumption by lowering its value. The circuit designed using DCVS Logic style is an attempt to further reduce the power dissipation with minimum delay.
Keywords: CMOS, 1-bit Magnitude comparator, EXOR gate, DCVSL, delay, transistor count, power dissipation.
An efficient technique has been proposed for de-noising the image that has greatly sorted the problem caused by the Random Value Impulse Noise (RVIN) in digital gray scale images. The proposed method consists of mainly two main phases: First phase detected the noise pixels using block wise dual threshold method. In the first phase, the boundary pixel has also been processed using interpolation techniques. The output image from the first phased is again processed to refine the corrupted pixels. The correct estimation of the original pixels at the place of corrupted pixels is done by Principal Component Analysis (PCA). Experimental results show the method has an outstanding performance than other state-of-the art the RVIN de-noising methods.
A Review on Improved Tabu Search Based Max Flow in Wireless Sensor Networks
Neetu Rani, Er. Deepti Garg
DOI: IJARCCE.2018.7558
Abstract: Tabu Search is a meta-heuristic that guides a local heuristic search procedure to explore the solution space beyond local optimality. One of the main components of Tabu Search is its use of adaptive memory, which creates a more flexible search behaviour. A novel finding is that such principles are sometimes sufficiently potent to yield effective problem solving behaviour in their own right, with negligible reliance on memory. In rechargeable Wireless Sensor Networks (WSNs), a key concern is the max flow or data rate at one or more sinks. However, this data rate is constrained by the available energy at each node as well as link capacity. After deployment, some sensor nodes may impede the amount of data that arrive at a sink because of their low energy harvesting rate. In this work, the main goal is to construct a fast tabu search algorithm for computing solutions so that max flow rate may achieve. The main objective is to maximize the flow rate at one or more sinks and optimize the network cost. It will investigate the problem of upgrading sensor nodes to maximize the flow rate. All simulations will be implemented in MATLAB.
Keywords: WSN System, Routings in WSN, Tabu Search, QoS in WSN etc.
Abstract: Brain Control technology is at its beginning of its advancement to bring back the nature of uninhibitedly in a handicap. Electroencephalogram based personality controlled versatile robots can fill in as fruitful helpers for to an awesome degree injured individuals in their well-ordered life, particularly to engage them to move intentionally. Eye blink and Attention levels are used to control the direction of robot. The wireless Brain control technology can be used for physically handicapped people in day today life.
Endoscopic Image Enhancement using Blind Denoising
Snehal Pawar, Amarsinh Deshmukh, Rahul Mulujkar
DOI: IJARCCE.2018.7560
Abstract: Biomedical images such as endoscopic images, retina, MRI, X-ray plays important role in the analysis and diagnosis of the internal body structure. Endoscopic image is used during pregnancy, plastic surgery, orthopedic surgery, spinal surgery etc. to examine internal body structure. Endoscopic images are corrupted with various types of noise. The noisy image results into inaccurate diagnosis and thus the endoscopic image denoising is essential. In this paper a method known as blind denoising has been used to improve the visual quality of the images. In the proposed method we first estimate the noise level in the image obtained. Now having known the noise level we apply BM3D algorithm to denoise the endoscopic image. By the proposed method it is found that the PSNR of the test image is improved. The enhanced image will help the doctors for accurate diagnosis.
Abstract: This paper concentrates on the work done on controller using Field Programmable Gate Array (FPGA) technology. FPGA based realization offers high speed, complex functionality, consume less power, and provides parallel Processing. Proportional-Integral-Derivative (PID) controllers are universal control structure and have widely used in Automation systems. A PID is widely used in feedback control of industrial processes on the market in 1939 and has remained the most widely used controller in process control until today. The work is done on PID Controller and working status of PID Controller is shown through its one of application i.e. a line follower Car which is used in industry for parcels and stuffs transports. For such an PID to obtained an pre-defined output a Car is created which may called as a application of PID Controller. The car is composed by three cards DE0-Nano main card, SCD(Smart Car Daughter card) daughter card, and sensor daughter card. The SDC daughter card includes the lamp, buzzer, motor driver DRV8833, IR receiver, ADC chip LT2308, and TMD (Terasic Mini Digital) expansion header. The sensor daughter card includes seven Photo Interrupters used to track dark line (s) on a white background. Proportional-integral-derivative (PID) controller is a vastly used control algorithm for many real-time control applications and among many types of PID controller, FPGA based PID controller is one of the effective one. FPGA can offer parallel processing, more speed and easy to implement. In this paper, we focused our works designing PID controller with its application by Field Programmable Gate Arrays (FPGAs) with some parameter change so that the cost will be minimized and accuracy will be maximized.
A human body implanted with biomedical sensors and running wireless protocols of variable frequency and measuring more than one physiological parameter of the body is considered for realization in this paper. A Wireless Body Area Network is a conglomeration of various nodes interconnected through links forming a network of biomedical or other sensors placed at the nodes. In our previous paper, titled “Realization of Wireless Body Area Network using GNS3 tool for Health Monitoring” bearing DOI 10.17148/IJARCCE.2018.7459, the implementation and introduction to intra-body network was expounded. In this paper route redistribution and BGP will be dealt with and efforts will be made to simulate it using GNS3 tool. The use of a routing protocol to advertise routes that are learned by some other means, such as by another routing protocol, static routes or directly connected routers can be referred to as route redistribution. The moral behind route redistribution [1] is the content of this paper and its implementation in the constitution of the Body Area Network. Border Gateway Protocol which is an Exterior Gateway Protocol is the protocol of choice of the internet. The use of BGP in simulation of the inter-body network is being propounded by us. Various BGP policies will be simulated in the paper.
Keywords:
Border Gateway Protocol (BGP), realize a typical ISP network using a Network Simulation Tool, Redistribution, internal BGP, external BGP, BGP policies, variable frequency and 3-way handshaking.
Image Enhancement by Histogram Technique using MATLAB
Ankit Singh, Bulbul Sharma, Suman Dagar
DOI: 10.17148/IJARCCE.2018.7564
Abstract:
The idea of this thesis is to enhance the visual quality of an image in order to make it more suitable for various applications. The enhancement is done to improve the brightness of image as well as the contrast to some extent. For this purpose four techniques have been implemented namely Histogram Equalization(HE), Brightness Preserving Bi-Histogram Equalization (BBHE), Non-Parametric Modified Histogram Equalization (NMHE) and Brightness Preserving Dynamic Fuzzy Logic Based Histogram Equalization (BPDFHE) . Some basic image enhancement methods like Thresholding and Gaussian filtering are also implemented and a comparison is made based on different performance measures. Also a review of commonly used enhancement techniques based on histogram modifications is presented in the thesis. The MATLAB software is used to develop a GUI (graphical user interface) which makes it easier for users to improve an image using different techniques. Uncompressed, JPEG, and png images are used in this thesis. The result is based on the comparison of the different techniques and then the best method is suggested based on the comparison.
Keywords:
Histogram Equalization(HE), Brightness Preserving Bi-Histogram Equalization (BBHE), Non-parametric Modified Histogram Equalization (NMHE) and Brightness preserving dynamic fuzzy logic based histogram equalization (BPDFHE), GUI (Graphical User Interface)
Review of Multiplexing Techniques in Advance Communication Systems
Sandeep Singh, Prof. (Dr.) Janakkumar B. Patel
DOI: 10.17148/IJARCCE.2018.7565
Abstract:
In this paper, we present an overview of different multiplexing techniques. The goal of transmission of signal which communication system is to have faithful reproduction of the same original signal at the receiver end without error. The aim of data communication and networking is to facilitate the exchange of data such as data,audio, text, video, etc. between any point in the world. Insurance rise enterprise free and lossless original signal transmission and reception.Modulation is the key operation performance on the signal. The orthogonal frequency division multiplexing is a multi-carrier transmission Technology. It aims to achieve higher data rate in the multi-path fading involvement of communication system. The purpose of applying multiplexing techniques to reduce frequency selective fading and burst error generated by wide band fading channel in wireless communication.
Fog Computing & IoT: Overview, Architecture and Applications
Harshit Gupta, Dr. Ajay Kumar Bharti
DOI: 10.17148/IJARCCE.2018.756
Abstract: Fog computing is an emerging technology in the field of network services where data transfer from one device to another to perform some kind of activity. Fog computing is an extended concept of cloud computing. It works in-between the Internet of Things (IoT) and cloud data centers and reduces the communication gaps. Fog computing has made possible to have decreased latency and low network congestion. Fog computing is an on-going research trend in which the possibility of efficient network services exist. Fog computing can be described as a cloud type platform having similar services of data computation, data storage and application service but it is fundamentally different as it decentralized. In this paper, we have done a comprehensive survey on fog computing& IoT and described the fog computing architecture and analyse its different benefits and applications. We have also analysed the security aspects of fog computing & IoT, which is necessary and an important part of any kind of technology used in data communication system.
Keywords: Cloud computing, Fog computing, Internet of Things (IoT), Latency, Network Congestion.