VOLUME 6, ISSUE 11, NOVEMBER 2017
Collaborative Requirements Elicitation and Development Methodology for Migrating from Saap To Saas
Mr. Mahesh Nelapati, Mr. Simegnew Asemie, Mr. Tefera Adugnaw Lulie
Different Techniques to Ensure High Availability in Cloud Computing
Wejdan Bajaber, Manahil AlQulaity, and Fahd S. Alotaibi
Real-Time Health Monitoring System Using GPRS Communication between Embedded System and Android Phone
T. T. Bhondave
Analyzing travelling salesman problem with new parameters using Ant Colony Optimization
Mithlesh Kumar Kushwaha, C.P. Singh
Intersection Analytics Systems Provenance in Emergence of Data Lakes from Dataware House
Akash Suryawanshi, Pratik Patil
Handling Cassandra Datasets with Hadoop-Streaming
Akash Suryawanshi, Pratik Patil
Analysis of Bitcoin using Linear Regression and Data Mining Techniques
Abhyudit Bisht, Puru Agarwal
Monitoring of Indoor CO2 through Proactive and Reactive routing with Cognitive Wireless Sensor Networks
Kawaljeet Kaur, Neetu Gupta
A Comparative Study of Feature Selection Algorithms in Data Mining
P.Kavipriya, Dr.K.Karthikeyan
Low Light Video Enhancement Using Effective Framework Approach
Ms. Pallavi H. Yawalkar, Mr. P. N. Pusdekar
Improved Energy Efficient Social Routing Using EPDR Model
N.Kumaresan, K.Kannan
Prediction of Risk Factor for HCV Infection among IDUs – An Approach using C4.5
M.Gomathy, Vani Perumal
A Lossless data compression algorithm for Secret Image Sharing
V.S.Nikhita Dabbiru, Mr. CH. Kodanda Ramu, Mr.Y.Ramesh Kumar
Increasing randomness using DCM-based tunable True Random Number Generator
J.Shouba Tharani, Dr.V.Seethalakshmi
BRAM-based Multiported Memory Designs on FPGA
M.Supriya, Dr.N.Rajesh Kumar
Built-In self test based on Bit Swapping and Cell Ordering using Low Power Scan Method
K.Anandhi, Dr.C.Karthikeyini
Survey on Text Detection, Segmentation and Recognition from a Natural Scene Images
Miss Shital D Gheware, Nandkishor G Dharashive
Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
J. Malathi, T. Sathyapriya
A Nobel approach to create trust by using similarity based scheme in VANET
Deepa Soni, Ravindra Gupta, Varsha Namdeo
Fast nearest Neighbor Search with Keywords
Miss Netra Katariya, Prof. Pawan Kumar
Design of Area-Efficient Fault Tolerant Parallel FFTS using Multiple Error Correction
Janani M, Jaishankar B
Challenges, Applications and Future Technologies in “Internet of Things”
Manisha soni, Sahana T. Edwin
Design of low power Precharge-Free CAM design using parity based mechanism
S.A.Sivakumar, A.Swedha
REAS – Robust and Efficient Authentication Scheme for Secure Healthcare System in Body Area Network
K. Manjula Devi K. Brindha MCA, M.Phil.,
Pre-Computation Based Self-Controlled Precharge-Free Content-Addressable Memory in High Speed Applications
A.Kameswaran, K.Nanthakumar, M.Ruba
Dynamic Flip-Flop Conversion in Digital Circuits with Hybrid Time Borrowing and Critical Feedback Path Applications
K.Nanthakumar, S.Thejaswini
Server-Side and Client-Side Scripting of “Event Management System”
Vishesh S, Harshit Agarwal, Sandesh Arora, Aishwarya MS, Ashrith Pradeep, Divya P Hathwar
Prediction of Ventricular Arrhythmia using Naive Bayes Classifier
K.Nanthakumar, V.Suriyagayathri
Localization of License Plate Number and Character Recognition based on Embedded System
Prof. Sheetal Israni, Prof. Neha Israni
Design of Low Complexity Fault Tolerant Parallel FFTs using Parallel-SOS-ECC and Parallel correction
L Pavithra, R Naveen
Malware Detection using Data Mining Naïve Bayesian Classification Technique with Worm Dataset
Osama Mohammed Qasim, Karim Hashim Al-Saedi
The Instantaneous Advanced Water Quality Monitoring System using IoT
Reetesh Golhar Apurva Sakle, Harshali Warhate, Isha Ninawe, Ankita Bodhale
Link Failure Responsive Approach for Optimized Data Delivery in Mobile Ad-hoc Network
Anu Bhagat, Sandeep Kaur
Big Data Analytics in Higher Education
Preet Navdeep, Dr. Neeraj Sharma, Dr.Manish Arora
Support Vector Machine Based Quality Evaluation of Seam-carved Images
Devrim Akgun, Zehra Karapinar Senturk
Word Alignment Model for Co-Extracting Opinion Targets and Opinion Words from Online Reviews
Padmaja Katta, Nagaratna P. Hegde
Sentiment Analysis of Speech
Aishwarya Murarka, Kajal Shivarkar, Sneha, Vani Gupta,Prof.Lata Sankpal
Smart Shoe for Visually Impaired
Saloni Mohanty, Malavika Karunan, Ibtisam Sayyad, Shlesha Khursade, Prof. B.B. Gite
Fundamentals of Wireless LAN Design by Using Improved Dynamic Load Balancing Algorithm
Vandana Keshri, Abhishek Mishra
A Novel Approach of Data Warehouse OLTP and OLAP Technology for Supporting Management prospective
B.Manivannan
An Efficient K-Means Clustering Algorithm Using Euclidean Distance Techniques
N.Suresh, Dr.K.Arulanandam
A High Gain OTA with Slew Rate Enhancement Technique in 45nm FinFET Technology
Ankur Gupta, Satish Kumar
Design of High-Speed and Low Power Carry Skip Adder
Pritee verma, Shiva Jaishwal, Sonam Rathora
Relevance Feedback Algorithm Influenced By Quantum Detection
Shanmugha Priya B, Sharumathi R, Sruthi S
A trust oriented next-hop selection in Ad hoc Network by using Multiple Fuzzy
Lovepreet Singh Dhillon
Clustering the Movement of Trajectory Based Data
Bhupeshwar Kumar Sahu, Dr. Vishnu Mishra
CCTA: A Review Paper
Sarthak Grover, Himanshu Sharma, Gyanendra Singh, Anmol Sharma
IOT Based Fuel Monitoring for Future Vehicles
Mrs.S.A.Chiwhane, Mrs. Deepa Mishra, Akshada Kawane, Shweta Kompa, Pranali Survase, Pratiksha Thorat
Toll Collection Using Li-Fi
Aayushi Shaha, Shivani Shrma, Harsh Shirke, Saifalli Shaikh, Prof.Gauri Bhange
RFID Based Medical Decision System
Shubham Garge, Shashank Agrawal, Vivek Rohan, Omkar Mundlik
Survey on Secure Triple Level Encryption Method using Binary Field
Apurva Singh, Meera Makadia, Yogini Saste, Prof. N.I.Dalvi
Achieving Flatness: Selecting the Honeywords from Existing User Passwords
Supriya Bhosale, Ashwini Kale, Sunita Patil, Shubhangi Sonone
Smart Security System for Online Social Networks
Bhushan Patil, Sagar Chougule, Kiran Thorat, Prof.Monika Dangore
Maintaining Privacy on Photo Sharing
Rajat Agrawal, Karan Gidwani, Dakshayani Kamble, Maheshwari Chaudhari
Expansion of Networks (1G-5G)
Dr.D.Vimal Kumar, K.Sumathi, S.Poorani
An Novel Approach of Video Resource Delivery for CD Networks
Srimantula Siva Kumar, Mr.Y.Ramesh Kumar
Disjoint Route Vector Algorithm for Heterogeneous Wireless Sensor Networks
Dr.P.Swetha, Kolichala Rajashekar
Analysis of Information Security through Crypto-Stenography with Reference to E-Cipher Methods
Padmaja Patel, Sibo Prasad Patro
Location Based Travel Route Recommendation
Divya Haridas, Prof. T.K.P. Rajagopal
Future Research Directions in Crowd Computing: A Novel Perspective
Manas Kumar Yogi, Sirisha Ratnala
WBAN and Cloud Computing- 2
Vishesh S, Pradhyumna M, Suchit Shavi, Sujaya HS, Suraj N, Kavya P Hathwar
Abstract
Collaborative Requirements Elicitation and Development Methodology for Migrating from Saap To Saas
Mr. Mahesh Nelapati, Mr. Simegnew Asemie, Mr. Tefera Adugnaw Lulie
DOI: 10.17148/IJARCCE.2017.61101
Abstract: In present days to determine trends in Information systems, organizations expansively used Service Oriented Architecture technology. Tradesman of Information system products want to advantage by immigrating to central based internet. Despite when immigrating legacy and traditional information system from software as a product model to the software as a service model the information system model changes. This paper explicates the obligatory modifications in the requirements elicitation process and producing a methodology for a strong immigration to software as a service. This paper elaborates by deliberating collaborative requirements information system development methodology. This methodology analyzes initial stage grade that must be deliberating in software as a service and we can reduce risk factors. Additionally this methodology discusses the new advantages in requirements elicitation that are deriving in to central based internet.
Keywords: Information systems, Service oriented technology, Central based internet, Software as a service (SaaS), Collaborative requirements.
Abstract
Different Techniques to Ensure High Availability in Cloud Computing
Wejdan Bajaber, Manahil AlQulaity, and Fahd S. Alotaibi
DOI: 10.17148/IJARCCE.2017.61102
Abstract: Cloud computing is subject to failures which emphasize the need to address user's availability. Availability refers to the system uptime and the system capability to operate continuously. Different techniques can be implemented to increase the system availability. Indeed, cloud service provider is taking the lead in providing highly available and cost effective services. However, these solutions are not always working as it claims. This paper conducts a literature review to investigate different techniques used to ensure the system availability. An analysis of high profile cloud service company is presented to evaluate the availability level of their services and to find out if high availability can be ensured or not.
Keywords: Cloud Computing, High Availability, Cloud service provider, Scalability.
Abstract
Real-Time Health Monitoring System Using GPRS Communication between Embedded System and Android Phone
T. T. Bhondave
DOI: 10.17148/IJARCCE.2017.61103
Abstract: Cloud computing is subject to failures which emphasize the need to address user's availability. Availability refers to the system uptime and the system capability to operate continuously. Different techniques can be implemented to increase the system availability. Indeed, cloud service provider is taking the lead in providing highly available and cost effective services. However, these solutions are not always working as it claims. This paper conducts a literature review to investigate different techniques used to ensure the system availability. An analysis of high profile cloud service company is presented to evaluate the availability level of their services and to find out if high availability can be ensured or not.
Keywords: Cloud Computing, High Availability, Cloud service provider, Scalability.
Abstract
Analyzing travelling salesman problem with new parameters using Ant Colony Optimization
Mithlesh Kumar Kushwaha, C.P. Singh
DOI: 10.17148/IJARCCE.2017.61104
Abstract: Travelling salesman problem is studied in the field of combinatorial optimization. TSP being heuristic algorithm tries to find minimum distance between given set of cities by traversing each of these cities only once except the starting city. A lot of techniques have been developed to solve TSP like Ant Colony optimization, Genetic algorithms, neural networks etc. Ant Colony optimization (ACO) being a heuristic algorithm attempts to find optimum solution by mimicking ants finding food as a group. Ants release pheromones on their path, concentration of which suggests shortest path to food. Models have been developed to solve ACO with fixed parameters. This paper attempts to analyze and find the best value for the set of parameters like "Exponential Weight", "Heuristic exponential Weight", "Evaporation Rate� for this solution based on no. of iteration and minimum distance traversed.
Keywords: Ant Colony Optimization algorithm, Evaporation Rate, Genetic Algorithm, Travelling Salesman Problem, Heuristic exponential weight.
Abstract
Intersection Analytics Systems Provenance in Emergence of Data Lakes from Dataware House
Akash Suryawanshi, Pratik Patil
DOI: 10.17148/IJARCCE.2017.61105
Abstract:
Keywords:
Abstract
Handling Cassandra Datasets with Hadoop-Streaming
Akash Suryawanshi, Pratik Patil
DOI: 10.17148/IJARCCE.2017.61106
Abstract: The dynamic change in the idea of both logical and mechanical datasets has been the main impetus behind the advancement and research interests in the NoSQL display. Inexactly organized information represents a test to conventional information store frameworks, and when working with the NoSQL demonstrates, these frameworks are regularly viewed as illogical and exorbitant. As the amount and nature of unstructured information develops, so does the interest for a preparing pipeline that is able to do consistently joining the NoSQL stockpiling model and a "Major Data" handling stage for example, MapReduce. In spite of the fact that MapReduce is the worldview of decision for information serious processing, Java-based systems such as Hadoop expect clients to compose MapReduce code in Java while Hadoop Streaming module enables clients to characterize non Java executables as guide and lessen operations. Whenever stood up to with inheritance C/C++ applications and other non-Java executables, there emerges a further need to permit NoSQL information stores get to the highlights of Hadoop Streaming. We introduce approaches in comprehending the test of coordinating NoSQL information stores with MapReduce under non-Java application situations, alongside points of interest and drawbacks of each approach. We look at Hadoop Streaming nearby our own particular spilling system, MARISSA, to indicate execution ramifications of coupling NoSQL information stores like Cassandra with MapReduce structures that typically depend on document framework based information stores. Our trials additionally incorporate Hadoop-C*, which is where a Hadoop group is co-situated with a Cassandra group keeping in mind the end goal to process information.
Keywords: Cassandra, HADOOP.
Abstract
Analysis of Bitcoin using Linear Regression and Data Mining Techniques
Abhyudit Bisht, Puru Agarwal
DOI: 10.17148/IJARCCE.2017.61107
Abstract: Cryptocurrency also referred as virtual currency is a digital asset which is used as a medium of exchange using high level cryptography. After the introduction of Bitcoin, hundreds of alternate cryptocurrencies started emerging and so did the need to analyse them. As of September 2017, there were over 1100 digital currencies in existence. We investigate the use of data mining techniques in analysing and predicting attributes like Volume, Market Cap. The cryptocurrency has many parameters like Open, High, Low, Close whose values are highly volatile and change every day. On available data set collected between 2013 and 2017 we perform Machine Learning algorithm and predict the values for Market Cap and various other attributes. This paper develops a model using linear regression to predict the future values which can be useful in many ways in determining the market behaviour.
Keywords: cryptocurrency, Bitcoin.
Abstract
Monitoring of Indoor CO2 through Proactive and Reactive routing with Cognitive Wireless Sensor Networks
Kawaljeet Kaur, Neetu Gupta
DOI: 10.17148/IJARCCE.2017.61108
Abstract: As we know, many air buildings are built and the ventilators are not work in timely manner and also less. Indoor air quality become an issue in recent years because it directly relates to human health. Therefore the clean air is essential especially when it comes to indoor air. To mitigate this worriment, the wireless sensor networks (WSNs) have the dormant. Wireless sensor networks are easy to afford and implement. Indoor Carbon Dioxide measuring is very necessary because at inside environment, its concentration is more than outside environment due to limited space. As the number of the nodes that join the network increases the need for energy-ef?cient, spectrum-ef?cient and resource-constrained protocol also increases. In this paper, two routing protocols proactive and reactive are introduced. The Destination-Sequenced Distance-Vector routing (DSDV) protocol is proactive protocol and Ad Hoc on-demand Distance vector routing (AODV) protocol is reactive protocol. Firstly we monitored the carbon dioxide gas through simple wireless sensors network with proposed protocols and then monitored through cognitive network with proposed protocols. Then the performance results has been carried out in terms of throughput w.r.t time which shows that by using cognitive properties on monitoring system performs better than simple wireless sensor network system. Secondly, the performance of AODV, DSDV and existing (CNOR- cognitive networking with opportunistic routing) protocol in terms of throughput, total energy consumption and average end-to-end delay through cognitive wireless sensor networks has been compared. The AODV performs better than DSDV and existing (CNOR- cognitive networking with opportunistic routing) protocol.
Keywords: Indoor air quality (IAQ), CO2, Cognitive wireless sensor networks (CWSNs), AODV, DSDV,CNOR, proactive, reactive.
Abstract
A Comparative Study of Feature Selection Algorithms in Data Mining
P.Kavipriya, Dr.K.Karthikeyan
DOI: 10.17148/IJARCCE.2017.61109
Abstract: : Data mining is the method of extraction of related data from a collection of large dataset. Mining of a fastidious data related to a concept is done on the basis of the feature of the data. The accessing of these features thus for data retrieval can be termed as the feature selection mechanism. Different types of feature selection methods are being used. Feature selection methods in data Mining problem aim at selecting a subset of the features, which illustrate the data in order to acquire a more necessary and compact representation of the available information. The preferred subset has to be small in size and must maintain the information that is most useful for the specific application. This paper try to analyze Feature Selection algorithms clearly with the purpose to examine strengths and weaknesses of some widely used Feature Selection methods.
Keywords: Feature selection algorithm, Euclidian distance, T-test, Information gain, Markov blanket filter.
Abstract
Low Light Video Enhancement Using Effective Framework Approach
Ms. Pallavi H. Yawalkar, Mr. P. N. Pusdekar
DOI: 10.17148/IJARCCE.2017.61110
Abstract: Over the several decades, there have been improvements in Digital cameras including resolution and sensitivity. Other than these improvements, digital cameras are still limited in capturing images in low-light conditions. Video in low light is targeted. Many approaches are developed to improve the quality of low light video; however most of them consider video from moderately dark conditions. In this project, we propose an effective framework approach to enhance video from low light condition using noise removal filter technique and Weber�s law used to detect the background in video in poor lighting. Finally, the performance of the proposed technique is illustrated through the processing of videos with different backgrounds, the majority of them with poor lighting conditions. The proposed method not only enhances the contrast but also measuring image quality by using MSE, PSNR and Correlation factor. Experimental results show that the proposed method has good performance on enhancing contrast and visibility for a majority of images. The software tool used is a MATLAB.
Keywords: Video, Enhancement, Low Light, Weber�s Law, MATLAB.
Abstract
Improved Energy Efficient Social Routing Using EPDR Model
N.Kumaresan, K.Kannan
DOI: 10.17148/IJARCCE.2017.61111
Abstract: Over the several decades, there have been improvements in Digital cameras including resolution and sensitivity. Other than these improvements, digital cameras are still limited in capturing images in low-light conditions. Video in low light is targeted. Many approaches are developed to improve the quality of low light video; however most of them consider video from moderately dark conditions. In this project, we propose an effective framework approach to enhance video from low light condition using noise removal filter technique and Weber�s law used to detect the background in video in poor lighting. Finally, the performance of the proposed technique is illustrated through the processing of videos with different backgrounds, the majority of them with poor lighting conditions. The proposed method not only enhances the contrast but also measuring image quality by using MSE, PSNR and Correlation factor. Experimental results show that the proposed method has good performance on enhancing contrast and visibility for a majority of images. The software tool used is a MATLAB.
Keywords: Video, Enhancement, Low Light, Weber�s Law, MATLAB.
Abstract
Prediction of Risk Factor for HCV Infection among IDUs – An Approach using C4.5
M.Gomathy, Vani Perumal
DOI: 10.17148/IJARCCE.2017.61112
Abstract: Hepatices C viral (HCV) infection is one of the common and hazardous viral infection among injecting drug users (IDU) globally. There are several identified risk factors associated with HCV. In Data Mining, various algorithms are used to mine the necessary information from the large set of data. These are also playing a vital role in numerous disease predictions C4.5 is one of the most popular algorithms for rule based classification and pruning of decision trees. Decision Tree is a supervised classification technique, which is simple, fast and accurate for prediction and decision making. It can be applied to any domain. In this paper, C4.5 algorithm is used to rank the risk factors associated with HCV among IDU�s in India. It also identifies the most relevant attributes from a dataset, so that the input space is reduced and simultaneously the performance is improved. In addition to that, this also gives decision tree for effective decision making. From the experimental results, the C4.5 algorithm and the decision tree shows the most important factors associated with HCV infection among IDU�s in India.
Keywords: Data Mining, C4.5 Algorithm, IDU, HCV, Entropy, Decision tree
Abstract
A Lossless data compression algorithm for Secret Image Sharing
V.S.Nikhita Dabbiru, Mr. CH. Kodanda Ramu, Mr.Y.Ramesh Kumar
DOI: 10.17148/IJARCCE.2017.61113
Abstract: Information is increasingly important in our daily life. Information gets more value when shared with others. Due to advances in technologies related to networking and communication, it is possible to share the information like audio, video and image easily. It may give rise to security related issues. Attackers may try to access unauthorized data and misuse it. To solve this problem certain techniques are required. Techniques to provide security, while sharing information are termed as Secret sharing schemes. When it comes to visual information like image and video, it is termed as Visual secret sharing scheme. Visual cryptography (VC) is a technique used for protecting image-based secrets. The basic concept of visual cryptography scheme is, to split secret image into some shares, which separately reveals no knowledge about the secret information. Shares are then distributed to participants. By stacking these shares directly, secret information can be revealed and visually recognized. All shares are necessary to combine to reveal the secret image. The best part is secret image is revealed by overlaying the shares without any complex computation involved. Starting from the basic model, many visual cryptographic techniques have been evolved day by day. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS). In this paper, I propose a construction of EVCS which is realized by embedding random shares into meaningful covering shares, and it is called embedded EVCS. Experimental results compare some of the well-known EVCSs proposed in recent years systematically, and show that the proposed embedded EVCS has competitive visual quality compared with many of the well-known EVCSs in the literature. In addition, it has many specific advantages against these well-known EVCSs, respectively. In this paper I propose, an invisible watermarking technique is proposed, to embed multiple binary watermarks into digital medical images based on the concept of Visual Cryptography (VC). The proposed scheme embeds the watermarks without modifying the original host image.
Keywords: Information security, Secret sharing scheme, Visual Cryptography, Data hiding
Abstract
Increasing randomness using DCM-based tunable True Random Number Generator
J.Shouba Tharani, Dr.V.Seethalakshmi
DOI: 10.17148/IJARCCE.2017.61114
Abstract: There is a need for enhancing the randomness in modern cryptographic systems. True Random Number Generators (TRNGs) play a very important role in modern cryptographic systems. True Random Number generator (TRNG) circuit utilizes tunability feature for determining the degree of randomness. Random number generators will be required to protect the medical, financial and personal data of entities connected to the networks. A digital true random number generator that can be synthesized using standard digital tools will enable designers to address these privacy concerns more efficiently. To provide advanced clocking capabilities, Digital Clock Managers (DCMs) is used. The DCM modules allow greater designer control over the clock waveforms, and their usage eliminates the need for initial calibration.The well equidistributed long-period linear (WELL) is used to fix poor initialization and take less time to recover from zero-excess initial state.This systems creates randomness with high authentication.
Keywords: Tunable Random Number Generator (TRNG), Digital Clock Manager (DCM), Well equidistributed long-period linear (WELL).
Abstract
BRAM-based Multiported Memory Designs on FPGA
M.Supriya, Dr.N.Rajesh Kumar
DOI: 10.17148/IJARCCE.2017.61115
Abstract: FPGAs offer an attractive platform to build multi-ported memories. Multi-ported memories are used in modern designs on FPGAs (Field Programmable Gate Arrays). Block RAMs (BRAMs) are broadly used for multi-ported memory designs on FPGA. This paper first introduces 2R1W memory as 2R1W/4R memory; hence 4R/1W requires fewer BRAMs than 2R/1W. Compared with existing technique like Hierarchical Bank division with XOR design (HBDX) and Bank division with remap table (BDRT) with 2R1W/4R the proposed technique combines HBDX and BDRT and uses 2R1W/4R as 8R1W with 8K depth; as the memory capacity increases. For complex Multi-ported designs, the proposed BRAM approach can achieve higher clock frequencies. For 8R/1W the design requires fewer BRAMs compared with 4R/1W.
Keywords: Block RAM (BRAM), FPGA (Field Programmable Gate Arrays), Hierarchical Bank division with XOR design (HBDX) and Bank division with remap table (BDRT), Clock frequency.
Abstract
Built-In self test based on Bit Swapping and Cell Ordering using Low Power Scan Method
K.Anandhi, Dr.C.Karthikeyini
DOI: 10.17148/IJARCCE.2017.61116
Abstract: A new low power weighted pseudorandom test pattern generator using weighted test-enable signals is proposed using a new clock disabling scheme .It supports both pseudorandom testing and deterministic BIST. To implement the low power BIST scheme, a design-for-testability (DFT) architecture is presented. During the pseudorandom testing phase, an LP weighted random test pattern generation scheme is used by disabling a part of scan chains.A novel low-power bit-swapping LFSR (BS-LFSR) is used to minimize the transistions, while keeping the randomness almost similar. The BS-LFSR is combined with a scan-chain-ordering algorithm that orders the cells in a way that reduces the average and peak power (scan and capture) in the test cycles (or) while scanning out a response to a signature analyzer. These techniques have a substantial effect on average and peak power compared to the existing approach.
Keywords: Built-In Self-Test, Scan chain, Linear Feedback Shift Register, Bit Swapping, Cell Ordering and Design-for-Testability.
Abstract
Survey on Text Detection, Segmentation and Recognition from a Natural Scene Images
Miss Shital D Gheware, Nandkishor G Dharashive
DOI: 10.17148/IJARCCE.2017.61117
Abstract: Detecting text from an image is an important prerequisite for the content based image analysis process. To understand the contents of an image or the valuable information, there is need of analysing the text appears in it. Various methods have been proposed over past years for text detection and extraction from different types of images, like scene image, born digital image and document image.In this paper, we describe the existing methods of text detection, text segmentation and character recognition from natural scene images with their features, advantages and disadvantages.
Keywords: Text detection, text segmentation, character recognition, scene image.
Abstract
Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
J. Malathi, T. Sathyapriya
DOI: 10.17148/IJARCCE.2017.61118
Abstract: This work proposes a novel Reversible Image Data Hiding (RIDH) scheme over encrypted domain. The data embedding is achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. Support Vector Machine (SVM) has been widely used in machine learning for data classification. It has high generalization ability which provides high reliability in real-world applications such as image processing, computer vision, text mining, natural language processing, bio-informatics and many more. A�digital watermark�is a kind of marker covertly embedded in a noise-tolerant�signal�such as an audio, video or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital information in a�carrier signal; the hidden information should,�but does not need to, contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the signal or to show the identity of its owners. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non-encrypted image patches, allowing us to jointly decode the embedded message and the original image signal. Compared with the state-of-the-arts, the proposed approach provides higher embedding capacity, and is able to perfectly reconstruct the original image as well as the embedded message. Extensive experimental results are provided to validate the superior performance of our scheme.
Keywords: SVM, RIDH, Water marking
Abstract
A Nobel approach to create trust by using similarity based scheme in VANET
Deepa Soni, Ravindra Gupta, Varsha Namdeo
DOI: 10.17148/IJARCCE.2017.61119
Abstract:
Keywords:
Abstract
Fast nearest Neighbor Search with Keywords
Miss Netra Katariya, Prof. Pawan Kumar
DOI: 10.17148/IJARCCE.2017.61120
Abstract: Fast nearest Neighbor Search with Keywords involve condition on object�s geometric properties.In today�s application many queries that aim to seek out out objects satisfying each a abstraction predicate, and a predicate on their associated texts. example of the above condition is consider all restaurants , a nearest neighbor question would instead extract the eating house that�s the highest among those whose menus contain steak, spaghetti, brandy all at an equivalent time. in this paper effective resolution to such queries is predicated on the IR2-tree, features a few deficiencies that seriously impact its potency we have to develop a replacement access methodology known as the abstraction inverted index.the purpose of inverted index is to address flat knowledge and come with algorims that may answer nearest neighbor queries with keywords in real time.
Keywords: R-tree, UML, diagrams, brandy, index, R-tree.
Abstract
Design of Area-Efficient Fault Tolerant Parallel FFTS using Multiple Error Correction
Janani M, Jaishankar B
DOI: 10.17148/IJARCCE.2017.61121
Abstract: As signal-processing circuits become more complex, it is common to find several filters or FFTs operating in parallel. Soft errors pose a reliability threat to modern electronic circuits. For some applications, an interesting option is to use algorithmic-based fault tolerance (ABFT) techniques that try to exploit the algorithmic properties to detect and correct errors. One example is fast Fourier transforms (FFTs) that are a key building block in many systems. Several protection schemes have been proposed to detect and correct errors in FFTs. Among those, probably the use of the Parsevals or sum of squares check is the most widely known. Recently, a technique that exploits this fact to implement fault tolerance on parallel filters has been proposed. In this brief, this technique is first applied to protect FFTs. Then, two improved protection schemes that combine the use of error correction codes and Parseval checks are proposed and evaluated. The results show that the proposed schemes can further reduce the implementation cost of protection.
Keywords: Algorithmic-basedgfaultttolerance (ABFT), Errorrcorrectiongcodesb(ECCs),FastgFourier transforms (FFTs),Softrerrors,Parseval theorem.
Abstract
Challenges, Applications and Future Technologies in “Internet of Things”
Manisha soni, Sahana T. Edwin
DOI: 10.17148/IJARCCE.2017.61122
Abstract:
Keywords:
Abstract
Design of low power Precharge-Free CAM design using parity based mechanism
S.A.Sivakumar, A.Swedha
DOI: 10.17148/IJARCCE.2017.61123
Abstract: Internet of Things (IoT) gained a great attention from researchers, it becomes an important technology that promises a smart human being life, by allowing a communications among objects, machines and every things together with peoples. IoT represents a system which consists a things in the real world, and sensors attached to or combined to these things, connected to the Internet via wired and wireless network structure. The sensors can use various types of connections such as RFID, Wi-Fi, Bluetooth, and ZigBee, in addition allowing wide area connectivity using technologies such as GSM, GPRS, 3G, and LTE.. by the technology of the IoT, the world will becomes smart in every aspects, the IoT will provides a means of smart cities, smart healthcare, smart homes and building, in addition to many important applications such as smart energy, grid, transportation, waste management and monitoring . In this paper a concept of IoT applications and future possibilities for related technologies in addition to the challenges that facing the implementation of the IoT.
Keywords: IoT Applications, Future Technologies, Smart Cities, Smart Environment, Smart Energy and Grid, Smart Manufacturing, Smart Healthcare
Abstract
REAS – Robust and Efficient Authentication Scheme for Secure Healthcare System in Body Area Network
K. Manjula Devi K. Brindha MCA, M.Phil.,
DOI: 10.17148/IJARCCE.2017.61124
Abstract: The Wireless Body Area Network (WBAN) technology is one of the core technologies of developments in healthcare system, where a patient can be monitored using a collection of tiny-powered and lightweight wireless sensor nodes. However, development of this new technology in healthcare applications without considering security makes patient privacy vulnerable. In this article, at first we highlight the major security requirements in BAN based healthcare system. Subsequently, we propose Robust and Efficient Authentication Scheme (REAS) based healthcare system using WBAN - HealthCare, which can efficiently accomplish those requirements. And then we used Lightweight Authentication Protocol for secure data sharing in WBAN. Using secure key management Scheme. WBANs not only bring us conveniences but also bring along the challenge of keeping data�s confidentiality and preserving patients� privacy. In the past few years, several authentication schemes for WBANs were proposed to enhance security by protecting patients� identities and by encrypting medical data. However, many of these schemes are not secure enough. First, we review the most recent REAS scheme for WBANs and point out that it is not secure for medical applications by proposing an impersonation attack. After that, we propose a new REAS system for WBANs and prove that it is provably secure. Our detailed analysis results demonstrate that our proposed REAS scheme not only overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
Keywords: Wireless Body Area Network, Robust and Efficient Authentication Scheme, Security
Abstract
Pre-Computation Based Self-Controlled Precharge-Free Content-Addressable Memory in High Speed Applications
A.Kameswaran, K.Nanthakumar, M.Ruba
DOI: 10.17148/IJARCCE.2017.61125
Abstract: Content-Addressable Memory (CAM) is frequently used in applications, such as lookup tables, databases, associative computing, and networking, that require high-speed searches due to its ability to improve application performance by using parallel comparison to reduce search time. Although the use of parallel comparison results in reduced search time, it also significantly increases power consumption. Both low power NAND-type and high-speed NOR-type match-line (ML) schemes suffer from requirement of the precharge prior to the search. Recently, a precharge-free ML structure has been proposed but with inadequate search performance. In this brief, a Pre-computation Based Self-Controlled Precharge-Free CAM (PB-SCPF CAM) structure is proposed for high-speed applications. The SCPF architecture is useful in applications where search time is very crucial to design larger word lengths. The experimental results show that PB-SCPF approach can achieve on average 80% in delay reduction and 32% in power reduction. The major contribution of this paper is that it presents theoretical and practical proofs to verify that our proposed PB-SCPF CAM system can achieve greater power reduction without the need for a special CAM cell design. This implies that our approach is more flexible and adaptive for general designs.
Keywords: Content-Addressable Memory (CAM), ML delay, high speed search, Self-Controlled Precharge-Free CAM.
Abstract
Dynamic Flip-Flop Conversion in Digital Circuits with Hybrid Time Borrowing and Critical Feedback Path Applications
K.Nanthakumar, S.Thejaswini
DOI: 10.17148/IJARCCE.2017.61126
Abstract: Dynamic Flip-Flop Conversion (DFFC) is a time bor-rowing method for improving the performance of digital circuits. Existing types of DFFC [11], [12] suffer from successive critical and critical feedback paths that are frequently seen in digital circuits. Moreover, they are unable to increase the performance of the designs with short sequential depth. In this paper, we introduce a hybrid technique which utilizes DFFC together with a dynamic clock stretching mechanism. Our technique is able to mitigate the problems of successive critical and critical feedback path structures even in the presence of process variations. The results show that our hybrid technique is able to increase the performance of some ITC�99 and ISCAS�89 benchmarks by 24.4% on average while DFFC Type C increases the performance only by 8.4% on average. Furthermore, we have shown that our hybrid technique is able to tolerate process variations, 18% power supply variation, and 100 ?C temperature variations, 27.3%, 16.4%, and 13.3% better than the state-of-the-art methods on average, respectively.
Keywords: Dynamic flip-flop conversion, hold time violation (HTV), process variation, setup time violation (STV), time borrow-ing, transparency window.
Abstract
Server-Side and Client-Side Scripting of “Event Management System”
Vishesh S, Harshit Agarwal, Sandesh Arora, Aishwarya MS, Ashrith Pradeep, Divya P Hathwar
DOI: 10.17148/IJARCCE.2017.61127
Abstract: Event management is the systematic planning and execution of events such as marriage, concert, ceremonies, formal parties, conferences etc. Event management companies are responsible for the above, and almost everything comes as a package- photography, food, lightings and decoration, event security etc. Many start-ups in this domain suffer from lack of recognition or engagements. Online marketing is one mode of strategic promotion of these companies [5]. Development of web applications and mobile apps; online booking and remote communication with clients and online payment gateway are the areas on which these companies must focus upon. In this paper we demonstrate the back-end and front-end design of a web-application suited for event management. MySQL is used as the back-end tool; PHP and HTML as front-end design tools; CSS and bootstrap for page design and JavaScript for validation.
Keywords: Web application, HTML, CSS, JavaScript, and PHP, Cascading Style Sheets (CSS), bootstrap, online booking.
Abstract
Prediction of Ventricular Arrhythmia using Naive Bayes Classifier
K.Nanthakumar, V.Suriyagayathri
DOI: 10.17148/IJARCCE.2017.61128
Abstract: This paper presents the design of a fully integrated Electrocardiogram (ECG) Signal Processor (ESP) for the prediction of ventricular arrhythmia using a unique set of ECG features and a naive Bayes classifier. Real-time and adaptive techniques for the detection and the delineation of the P-QRS-T waves were investigated to extract the fiducial points. Those techniques are robust to any variations in the ECG signal with high sensitivity and precision. Two databases of the heart signal recordings from the MIT PhysioNet and the American Heart Association were used as a validation set to evaluate the performance of the processor. The early prediction of ventricular arrhythmia will improve the quality of life by alerting the patients before the critical condition. This is achieved by analyzing the ECG segment that precedes the onset of ventricular tachycardia/ventricular fibrillation condition. In order to achieve high detection accuracy with low power consumption, a multi-scaled product algorithm and soft-threshold algorithm are efficiently exploited in our ECG detector implementation.
Keywords: Adaptive techniques, classification, Electrocardiogra-phy (ECG), feature extraction, low power, ventricular arrhythmia.
Abstract
Localization of License Plate Number and Character Recognition based on Embedded System
Prof. Sheetal Israni, Prof. Neha Israni
DOI: 10.17148/IJARCCE.2017.61129
<P align="justify"><B>
Abstract: </B>
This project presents the license plate localization and recognition using embedded platform like FPGA.� An Automatic Number Plate Recognition (ANPR) system has the function of tracking, identifying and monitoring moving vehicles. These systems are applicable for a vast number of applications such as automatic congestion charge systems, access control, tracing of stolen cars, or identification of dangerous drivers. The Number plate localization is a very important step in an Automatic Number Plate Recognition (ANPR) system. Previously the algorithms used for localization of license plate number and character recognition have low detection rate and requires more time. The objective is to use the system that requires algorithm having high detection rate and requires less time. This system is implemented and tested using the FPGA (cyclone II DE2) board. The localization is done using morphological operations. The edge detection is done by using Sobel operator. The recognition is done by using genetic algorithm. This system is implemented using MATLAB R2013b and Quartus II software�s.
</P>
<P><B>
Keywords: </B>�
ANPR, FPGA, genetic algorithm, morphological operation, segmentation, etc
�</P>
Abstract
Design of Low Complexity Fault Tolerant Parallel FFTs using Parallel-SOS-ECC and Parallel correction
L Pavithra, R Naveen
DOI: 10.17148/IJARCCE.2017.61130
<P align="justify"><B>
Abstract: </B>
As signal-processing circuits become more complex, it is common to find several filters or FFTs operating in parallel. Soft errors pose a reliability threat to modern electronic circuits. This makes protection against soft errors a requirement for many applications. Communications and signal processing systems are no exceptions to this trend. For some usage, an attractive choice is to use Algorithmic-Based Fault Tolerance (ABFT) techniques that try to effort the algorithmic properties to detect and correct errors. One example is Fast Fourier transforms (FFTs) that are a key building block in many systems. Several protection schemes have been proposed to detect and correct errors in FFTs. Among those, perhaps the use of the Parseval or sum of squares check is the most widely known. Recently, a technique that exploits this fact to implement fault tolerance on parallel filters has been proposed. In this brief, this technique is first applied to protect FFTs. With the help of error correction codes and parseval checks are arranged and checked to protect FFTs. The results show that the proposed schemes can further reduce the implementation cost of protection complexity of communications and signal processing circuits increases every year. In this technique, the idea is that each filter can be the equipment of a bit in an ECC and parity check bits can be computed using addition. This technology is used for operation, in which the output of the sum of several input is the sum of the individual outputs. This is true for any linear operations as Discrete Fourier transform (DFT).This can be simulated with the help of simulation tools like Xilinx and ModelSim.
</P>
<P><B>
Keywords: </B>�
DFT, FFT, ECC, Parity SOS, Parseval� check, Soft Errors.
�</P>
Abstract
Malware Detection using Data Mining Naïve Bayesian Classification Technique with Worm Dataset
Osama Mohammed Qasim, Karim Hashim Al-Saedi
DOI: 10.17148/IJARCCE.2017.61131
<P align="justify"><B>
Abstract: </B>
According to numerous increasing of worm malware in the networks nowadays, it became a serious danger that threatens our computers. Networks attackers did these attacks by designing the worms. A designed system model is needed to defy these threats, prevent it from multiplying and spreading through the network, and harm our computers. In this paper, we designed a detection system model for this issue. The designed system detects the worm malware that depends on the information of the dataset that is taken from Kaspersky company website, the system will receive the input package and then analyze it, the Na�ve Bayesian classification technique will start to work and begin to classify the package, by using the data mining Na�ve Bayesian classification technique, the system worked fast and gained great results in detecting the worm. By applying the Na�ve Bayesian classification technique using its probability mathematical equations for both threat data and benign data, the technique will detect the malware and classify data whether it was threat or benign. The results of the experiments were 95% of worm detection accuracy and 98% of detection rate with 21% false positives, which makes it more accurate and effective to detect the worm malware by using the proposed dataset for this work.�
</P>
<P><B>
Keywords: </B>�
Network Security, Worm Detection, Malware, Na�ve Bayesian, Data Mining.
�</P>
Abstract
The Instantaneous Advanced Water Quality Monitoring System using IoT
Reetesh Golhar Apurva Sakle, Harshali Warhate, Isha Ninawe, Ankita Bodhale
DOI: 10.17148/IJARCCE.2017.61132
<P align="justify"><B>
Abstract: </B>
Today�s world, Internet of Things (IoT) and Remote Sensing (RS) techniques� used in different area of research for monitoring, collecting and analyzing data from remote locations. Drinking water is a very precious commodity for all human beings as drinking water utilities face a lot of new challenges in real-time operation. These challenges originate because of limited water resources, growing population, ageing infrastructure etc. therefore there is a need for better methodologies to monitor the water quality. Any imbalance in water quality would severely affect the health of the humans, animals and also affect the ecological balance among species. The WHO (world health organization) estimated, in India among 77 million people is suffering due to not having safe water. WHO also estimates that 21% of diseases are related to unsafe water in India. In order to ensure the safe supply of drinking water the quality needs to be monitored in real-time. The conventional method of measuring the quality of water is to take the samples manually and send it to laboratory for analysis. This technique is time overwhelming and not economical. Also it is not feasible to take the water sample to the laboratory after every hour for measuring its quality. To overcome from these problems a new system is proposed in this work. This water quality measuring system will measure the essential qualities of water in real time.� In this research work we intend to present the design and development of a low cost system for real monitoring of water quality in an IoT environment. The system consists of several sensors which are used for measuring physical and chemical parameters of water. The parameters such as temperature, pH and turbidity of the water can be measured. The measured values from the sensors can be processed by the core controller. Using this system a person can detect pollutants from a water body from anywhere in the world.
</P>
<P><B>
Keywords: </B>�
�Water Quality Monitoring,� IoT,� Arduino, Sensors, Microcontroller
�</P>
Abstract
Link Failure Responsive Approach for Optimized Data Delivery in Mobile Ad-hoc Network
Anu Bhagat, Sandeep Kaur
DOI: 10.17148/IJARCCE.2017.61133
<P align="justify"><B>
Abstract: </B> There are currently two variations of mobile wireless networks Infrastructure and Infrastructure less networks. The infrastructure networks, also known as Cellular network, have fixed and wired gateways. They have fixed base stations that are connected to other base stations through wires. The transmission range of a base station constitutes a cell The network nodes in a MANET, not only act as the ordinary network nodes but also as the routers for other peer devices. The routers move freely and organize themselves randomly and the network topology may change rapidly and spontaneously also there is no centralized gateway device to monitor the traffic within network. More specifically, in our geo-routing method, the node which retains a data item first broadcasts a neighbor search message when it moves beyond d. Then, when a node receives the neighbor search message, if it is closer to the data point than the source node, it sets a waiting time for sending a reply. Because nodes closer to the data point transmit a reply message after a shorter waiting time.
</P>
<P><B>
Keywords: </B>�
MANET,LBS, SPRD
�</P>
Abstract
Big Data Analytics in Higher Education
Preet Navdeep, Dr. Neeraj Sharma, Dr.Manish Arora
DOI: 10.17148/IJARCCE.2017.61134
Abstract: With the increase in structured and unstructured data, the use of Big Data platforms to analyze such large data is common. Even the Higher Education sector is not free from its impact .The strategic use and applications of Big Data in higher education would lead to higher educational quality and better student retention. Big Data Analytics play a critical role in performing a thorough analysis of student and learning data to make an informed decision on future course offerings and their mix to cater to the potential and existing students. This paper focuses on the role of Big Data Analytics in higher education
Keywords: Big Data, Big Data Analytics, Higher Education.
Abstract
Support Vector Machine Based Quality Evaluation of Seam-carved Images
Devrim Akgun, Zehra Karapinar Senturk
DOI: 10.17148/IJARCCE.2017.61135
Abstract: Seam-carving is one of the widely used content aware image resizing methods. According to the image content, the output of the algorithm sometimes may not be satisfactory visually. In the presented study a machine learning method for detecting visually impaired images after seam-carving procedure is proposed. For this purpose a training set that is constructed by good and visually bad examples which are obtained by examining the seam-carving images. Features from the sample set are extracted and a Support Vector Machine is trained for determining whether the quality of the examined image is good. According to experimental results using four fold cross-validation, the method produced 65% success.
Keywords: Seam-carving, Support Vector Machine, Image Resizing, Local Binary Patterns.
Abstract
Word Alignment Model for Co-Extracting Opinion Targets and Opinion Words from Online Reviews
Padmaja Katta, Nagaratna P. Hegde
DOI: 10.17148/IJARCCE.2017.61136
Abstract: Seam-carving is one of the widely used content aware image resizing methods. According to the image content, the output of the algorithm sometimes may not be satisfactory visually. In the presented study a machine learning method for detecting visually impaired images after seam-carving procedure is proposed. For this purpose a training set that is constructed by good and visually bad examples which are obtained by examining the seam-carving images. Features from the sample set are extracted and a Support Vector Machine is trained for determining whether the quality of the examined image is good. According to experimental results using four fold cross-validation, the method produced 65% success.
Keywords: Seam-carving, Support Vector Machine, Image Resizing, Local Binary Patterns.
Abstract
Sentiment Analysis of Speech
Aishwarya Murarka, Kajal Shivarkar, Sneha, Vani Gupta,Prof.Lata Sankpal
DOI: 10.17148/IJARCCE.2017.61137
Abstract: Communication through voice is one of the main components of affective computing in human-computer interaction. In this type of interaction, properly comprehending the meanings of the words or the linguistic category and recognizing the emotion included in the speech is essential for enhancing the performance. In order to model the emotional state, the speech waves are utilized, which bear signals standing for emotions such as boredom, fear, joy and sadness etc...So we can find different speech signals of each subject. The most signi?cant features that transfer the variations in the tone are classified into pitch and intensity categories. We can use, eleven features, namely, pitch, intensity, the ?rst four formants and their bandwidths and standard deviation, are extracted. The proposed method ?rst digitizes the signal to extract the required properties. According to emotional Prosody studies, the tone of every person�s voice can be characterized by its pitch, loudness or intensity, timbre, speech rate and pauses, whose changes convey different information from the speaker to the listener.
Keywords: Speaker recognition, vocal emotion recognition, sentimental analysis, Emotion prediction, Text mining.
Abstract
Smart Shoe for Visually Impaired
Saloni Mohanty, Malavika Karunan, Ibtisam Sayyad, Shlesha Khursade, Prof. B.B. Gite
DOI: 10.17148/IJARCCE.2017.61138
Abstract: Communication through voice is one of the main components of affective computing in human-computer interaction. In this type of interaction, properly comprehending the meanings of the words or the linguistic category and recognizing the emotion included in the speech is essential for enhancing the performance. In order to model the emotional state, the speech waves are utilized, which bear signals standing for emotions such as boredom, fear, joy and sadness etc...So we can find different speech signals of each subject. The most signi?cant features that transfer the variations in the tone are classified into pitch and intensity categories. We can use, eleven features, namely, pitch, intensity, the ?rst four formants and their bandwidths and standard deviation, are extracted. The proposed method ?rst digitizes the signal to extract the required properties. According to emotional Prosody studies, the tone of every person�s voice can be characterized by its pitch, loudness or intensity, timbre, speech rate and pauses, whose changes convey different information from the speaker to the listener.
Keywords: Speaker recognition, vocal emotion recognition, sentimental analysis, Emotion prediction, Text mining.
Abstract
Fundamentals of Wireless LAN Design by Using Improved Dynamic Load Balancing Algorithm
Vandana Keshri, Abhishek Mishra
DOI: 10.17148/IJARCCE.2017.61139
Abstract: Eyes play important role in our day to day lives and are perhaps the most valuable gift we have. This world is visible to us because we are blessed with eyesight. But there are some people who lag this ability of visualizing these things. Due to this, Visually impaired people face many challenges when moving in unfamiliar public places.285 million people are estimated to be visually impaired worldwide: 39 million are blind and 246 have low vision. Hence, wearable device should design for such visual impaired people. Smart shoes is wearable system design to providedirectional information to visually impaired people. To provide smart and sensible navigation guidance tovisually impaired people, the system has greatpotential especially when integrated with visualprocessing units.During the operation,the user is supposed to wear the shoes. When sensors will detect any obstacle, user will be informed through Android system being used by the user. The Smart Shoes along with the application on the Android system shall help the user in moving around independently.
Keywords: Navigation, Android, Smart Shoes, Visually impaired, sensors.
Abstract
A Novel Approach of Data Warehouse OLTP and OLAP Technology for Supporting Management prospective
B.Manivannan
DOI: 10.17148/IJARCCE.2017.61140
Abstract: Data warehousing and On-Line Analytical Processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. Many commercial products and services are now available, and all of the principal database management system vendors now have offerings in these areas. Decision support places some rather different requirements on database technology compared to traditional on-line transaction processing applications. This paper provides an overview of Data warehousing, Data Mining, OLAP, OLTP technologies, exploring the features, applications and the architecture of Data Warehousing. The data warehouse supports On-Line Analytical Processing (OLAP), the functional and performance requirements of which are quite different from those of the On-Line Transaction Processing (OLTP) applications traditionally supported by the operational databases. Data warehousing and OLAP have emerged as leading technologies that facilitate data storage, organization and then, significant retrieval. Decision support places some rather different requirements on database technology compared to traditional on-line transaction processing applications.
Keywords: Data Warehousing, OLAP, OLTP, Data Mining, Decision Making and Decision Support.
Abstract
An Efficient K-Means Clustering Algorithm Using Euclidean Distance Techniques
N.Suresh, Dr.K.Arulanandam
DOI: 10.17148/IJARCCE.2017.61141
Abstract: The quality of the healthcare and treatment outcome relies heavily on Data Mining field to exchange information for accurate detection of the life threatening causes. The quality of health care system can be improved by employing an intelligent system via the Data Mining Techniques. Data Mining Techniques are used to reveal the hidden patterns from the vast collection of patient�s data. Analysis of the data uses techniques and statistical measures to get insight into vast patient�s information and predict the possible causes for the health issues and its impact on individual patients. Earlier analysis of the health related issues will reduce psychological stress and gives enormous time to identify the specialist in the respective field to acquire pre-determined treatment.
Keywords: Data Mining, Agglomerative, Clustering, K-Means, K-Medoids, Dataset in Excel.
Abstract
A High Gain OTA with Slew Rate Enhancement Technique in 45nm FinFET Technology
Ankur Gupta, Satish Kumar
DOI: 10.17148/IJARCCE.2017.61142
Abstract:
Keywords:
Abstract
Design of High-Speed and Low Power Carry Skip Adder
Pritee verma, Shiva Jaishwal, Sonam Rathora
DOI: 10.17148/IJARCCE.2017.61143
Abstract: In this paper we present high speed 8-bit Carry Skip Adder (CSA) compared with Ripple Carry Adder (RAC) and conventional Carry Skip Adder (CSA). This is more efficient in terms of power consumption, area usage and speed. Instead to make multiplexer logic, the propose architecture made of AND-OR-Inverter (AIO) combination gate for carry skip adder. The propose architecture are evaluated by comparing their speed, power and area with those of other address using 180nm, 90nm and 45nm static CMOS technology.
Keywords: Ripple Carry Adder ( RCA), Carry Skip Adder(CSKA), CI-CSKA, high performance, incrimination.
Abstract
Relevance Feedback Algorithm Influenced By Quantum Detection
Shanmugha Priya B, Sharumathi R, Sruthi S
DOI: 10.17148/IJARCCE.2017.61144
Abstract: In this paper we present high speed 8-bit Carry Skip Adder (CSA) compared with Ripple Carry Adder (RAC) and conventional Carry Skip Adder (CSA). This is more efficient in terms of power consumption, area usage and speed. Instead to make multiplexer logic, the propose architecture made of AND-OR-Inverter (AIO) combination gate for carry skip adder. The propose architecture are evaluated by comparing their speed, power and area with those of other address using 180nm, 90nm and 45nm static CMOS technology.
Keywords: Ripple Carry Adder ( RCA), Carry Skip Adder(CSKA), CI-CSKA, high performance, incrimination.
Abstract
A trust oriented next-hop selection in Ad hoc Network by using Multiple Fuzzy
Lovepreet Singh Dhillon
DOI: 10.17148/IJARCCE.2017.61145
Abstract: Information Retrieval (IR) is concerned with indexing and retrieving documents including information relevant to a user�s information need. Relevance Feedback (RF) is a class of effective algorithms for improving Information Retrieval (IR) and it consists of gathering further data representing the user�s information need and automatically creating a new query. In this paper, we propose a class of RF algorithms inspired by quantum detection to re-weight the query terms and to re-rank the document retrieved by an IR system. These algorithms project the query vector on a subspace spanned by the eigenvector which maximizes the distance between the distribution of quantum probability of relevance and the distribution of quantum probability of non-relevance. The experiments showed that the RF algorithms inspired by quantum detection can outperform the state-of-the-art algorithms.
Keywords: Information retrieval, Relevance Feedback, query vector.
Abstract
Clustering the Movement of Trajectory Based Data
Bhupeshwar Kumar Sahu, Dr. Vishnu Mishra
DOI: 10.17148/IJARCCE.2017.61146
Abstract: This paper group the trajectories objects of moving data. Our observation that develops the new algorithms that manage Minimum Description Length (MDL). This paper based on k-nearest algorithm with LCSS model and dimensional Euclidean. Our algorithm consists of two parts that is partitioning and grouping phase. Experimental result searching the minimum distance by using MOTRACLUS algorithm and analysis the sub-trajectories and real-trajectories. The experimental analysis gives moving object of trajectory animals.
Keywords: Data mining, Density based cluster, Trajectory algorithm, Framework grouped, Partition and group work.
Abstract
CCTA: A Review Paper
Sarthak Grover, Himanshu Sharma, Gyanendra Singh, Anmol Sharma
DOI: 10.17148/IJARCCE.2017.61147
Abstract: The CCTA (Current Conveyor Transconductance Amplifier) designed for current output signal processing in CMOS technology is reviewed in this paper. The CCTA has been brought in as the new reliable element for current mode signal processing, which should be very reliable for several applications, such as sensor generating output signals processing using CCTA. CCTA is assumed for use for the most part in current mode circuits yet it is additionally great decision if there should be an occurrence of voltage mode or potentially half and half (voltage-current) circuits (e.g. V/I converters). This modern dynamic gadget is a recently composed sort of simple piece that was built by trans impedance amplification, yet CCTA expects even significantly more adaptability in circuit applications.
Keywords: CCTA, Signal Processing, Applications of CCTA, CMOS based CCTA.
Abstract
IOT Based Fuel Monitoring for Future Vehicles
Mrs.S.A.Chiwhane, Mrs. Deepa Mishra, Akshada Kawane, Shweta Kompa, Pranali Survase, Pratiksha Thorat
DOI: 10.17148/IJARCCE.2017.61148
Abstract: Nowadays, actual record of fuel filled and fuel consumption in vehicles is not maintained. It results in a financial loss. To avoid this loss, monitoring and tracking system is implemented by an IOT based Fuel Monitoring in vehicle. The fuel monitoring system is built on ESP8266 Wi-Fi chip. This system uses Hall Effect Sensor to calculate the information about tank�s current fuel level and also the amount of currently inserted fuel. It delivers data to the ESP8266 Wi-Fi chip. ESP8266 chip is a hardware which connect flow sensor and server, then server send that data on users android app. On the unavailability of device it stores data into memory. This system is based on IOT technology which provides security to user identity to authenticate access and identify impersonated devices or fake devices in the network. The purpose of the IOT is to make possible things to connect at any time, in any place, with anything and anyone ideally using Network and service.
Keywords: IOT; ESP8266 Wi-Fi chip; Flow Sensor.
Abstract
Toll Collection Using Li-Fi
Aayushi Shaha, Shivani Shrma, Harsh Shirke, Saifalli Shaikh, Prof.Gauri Bhange
DOI: 10.17148/IJARCCE.2017.61149
Abstract: This paper focuses on faster data transmit at toll plaza by using Li-Fi module which will reduce the problems that arise in ETC. Li-Fi has the advantage of being able to be used in sensitive area such as in Aircraft and other transportation without causing interference. The Li-Fi mechanism is implemented in every vehicle (four wheelers) and at toll plaza. At the toll plaza, once the vehicle�s Li-Fi transmitter is paired with the Li-Fi receiver, the system at toll plaza automatically identifies the vehicle details. This paper is based on Li-Fi technology; the Li-Fi system uses Li-Fi which collects information of vehicle passing through the toll plaza and automatically debits the toll amount from prepaid account of vehicle owner, which in return reduces the traffic congestion and human errors. The vehicle owner has to register his vehicle with Li-Fi, creating a rechargeable account. When the vehicle will pass through toll gate the amount of toll will automatically be reduced from its account and give deduction message to vehicle owner. This OWC technology uses light from light-emitting diodes (LEDs). The light received by photodiode is converted to binary data and is fed to the microcontroller. The microcontroller is connected to the serial port of the PC. The basic advantages of the system is travelling time is decreased, congestion free network, less emissions in toll area and no infrastructure cost is required. This gives a win condition for both toll authorities and toll customers.
Keywords: Li-Fi (Light Fidelity), LED, Transmitter, Photodiode.
Abstract
RFID Based Medical Decision System
Shubham Garge, Shashank Agrawal, Vivek Rohan, Omkar Mundlik
DOI: 10.17148/IJARCCE.2017.61150
Abstract: Health care is the linchpin of a developed society. The general trend in developed countries is to increase public spending to improve the quality of health care. RFID is a technology being adopted in many business fields, especially in the medical field. Most patient health records are stored in separate systems and there are still huge paper trails of records that health-care providers must keep to comply with different regulations The proposed system uses RFID tags in order to make patient emergency care as efficient and risk-free as possible, by providing doctors with as much information about a patient as quickly as possible. We will concentrate on the RFID technology and how it could be used in emergency care. We describe a general purpose architecture and data model that is designed for collecting data from various existing devices and systems.
Keywords: Patient monitoring; Machine learning; Early diagnosis of clinical events; RFID; Clustering analysis.
Abstract
Survey on Secure Triple Level Encryption Method using Binary Field
Apurva Singh, Meera Makadia, Yogini Saste, Prof. N.I.Dalvi
DOI: 10.17148/IJARCCE.2017.61151
Abstract: Data sharing is an critical functionality in cloud storage. In this article, we display a way to securely, efficiently, and flexibly share information with others in cloud storage. We describe new public-key cryptosystems which produce encryption in three level. The novelty is that possible aggregate any set of secret keys and lead them to compact as a single key, however encompassing all of the three keys being aggregated. In other phrases, the secret key holder can launch a constant-size mixture key for flexible alternatives of cipher text set in cloud storage, however the different encrypted files outside the set stay private. This compact key can be conveniently dispatched to others or be saved in a clever card with very limited comfortable storage. We offer formal security evaluation of our schemes inside the trendy version. We additionally describe other utility of our schemes. In precise, our schemes provide the first public-key encryption hierarchy, which turned into but to be acknowledged.
Keywords: Searchable encryption, data sharing, cloud storage, data privacy.
Abstract
Achieving Flatness: Selecting the Honeywords from Existing User Passwords
Supriya Bhosale, Ashwini Kale, Sunita Patil, Shubhangi Sonone
DOI: 10.17148/IJARCCE.2017.61152
Abstract: Username is helpful to locate the specific client and the secret key for the approval of the client. The username-secret word checking is more essential in the security framework, so to shield watchword from outsider we actualize for every client account, the substantial watchword is changed over new watchword utilizing honeywords and hash secret word. new secret word is the mix of existing client passwords called honeywords .fake watchword is only the honeywords, If honeywords are decision legitimately, a digital assailant who to take a document of hashed passwords can't make sure in the event that it is the genuine secret key or a honeyword for any record. In addition, entering with a honeyword to login will trigger a caution educate the chairman about a secret word record an infraction, so we present a simple and skilled, answer for the identification of watchword document presentation occasions? In this review, we to analyze in detail with cautious consideration the honeyword framework and present some remark to center be utilized frail focuses. Additionally concentrate on practical watchword, decrease stockpiling expense of secret word, and interchange ay to decision the new secret key from existing client passwords.
Keywords: Authentication, honeypot, honeywords, login, passwords, password cracking.
Abstract
Smart Security System for Online Social Networks
Bhushan Patil, Sagar Chougule, Kiran Thorat, Prof.Monika Dangore
DOI: 10.17148/IJARCCE.2017.61153
Abstract: Photo sharing is an attractive feature which popularizes Online Social Networks (OSNS). Unfortunately, it may leak users� privacy if they are allowed to post, comment, and tag a photo freely. We attempt to address this issue and study the scenario when a user shares a photo containing individuals other than him/her. To prevent possible privacy leakage of a photo, we design a mechanism to enable each individual in a photo be aware of the posting activity and participate in the decision making on the photo posting. For this purpose, we need an efficient facial recognition (FR) system that can recognize everyone in the photo.We also develop a distributed consensusbased method to reduce the computational complexity and protect the private training set. We show that our system is superior to other possible approaches in terms of recognition ratio and efficiency.
Keywords: Photograph protection, Social media, Secure Multi Calculation, Facial RecognitionAuthentication, honeypot, honeywords, login, passwords, password cracking.
Abstract
Maintaining Privacy on Photo Sharing
Rajat Agrawal, Karan Gidwani, Dakshayani Kamble, Maheshwari Chaudhari
DOI: 10.17148/IJARCCE.2017.61154
Abstract: Photo sharing refers to the transfer or publishing of a user�s digital photos online and the website which provides such acquaintances offer services such as hosting, uploading, sharing and managing of photos through online system. This function provides the upload and display of images through the websites and applications. The usage of online photo galleries including photo blogs is increased. The photo sharing term can be set up and managed by individual users. It means that other users can view but not essentially download the photos, users being able to select different copy-right options for their photos. Unfortunately, it may reveal users privacy if they are permitted to post, comment, and tag a photo liberally. Communication feature on social network is not secured. Users can not send confidential message through social chat. To address these problem, this project proposes an efficient facial recognition system that can recognize everyone in the photo. Online photo sharing applications have become popular. To share photos with a range of people, it provides users various new and innovative alternatives. The photo sharing feature is incorporated in many social networking sites which allow users to post photo for their loving ones, families and friends. Encryption technique is applied for communication between users. AES algorithm is implemented for encrypting chat. For users of social networking sites such as Facebook, this system focuses on the privacy concerns and needs of the users, at the same time explores ideas for privacy protection mechanisms. By considering users current concerns and behaviors, the tool can be designed as per the user�s desire which they can adopt and then can be motivated to use.
Keywords: Social network, Photo Privacy, Secure Multi-Party Computation, Collaborative Learning.
Abstract
Expansion of Networks (1G-5G)
Dr.D.Vimal Kumar, K.Sumathi, S.Poorani
DOI: 10.17148/IJARCCE.2017.61155
Abstract: Today 3G mobile systems are on the ground providing IP connectivity for real-time and non- real-time services. On the other side, there are many wireless technologies that have proven to be important, with the most important ones being 802.11Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), as well as ad-hoc Wireless Personal Area Network (WPAN) and wireless networks for digital TV and radio broadcast. Then, the concepts of 4G is already much discussed and it is almost certain that 4G will include several standards under a common umbrella, similarly to3G, but with IEEE 802.xx wireless mobile networks included from the beginning. The main contribution of this paper is definition of 5G (Fifth Generation) mobile network concept which is seen as user-centric concept instead of operator-centric as in 3G or service-centric concept as seen for 4G. In the proposed concept the mobile user is on the top of all. The 5G terminals will have software defined radios and modulation scheme as well as new error-control schemes can be downloaded from the Internet on the run. The development is seen towards the user terminals as a focus of the 5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. Each network will be responsible for handling user- mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. The paper also proposes intelligent Internet phone concept where the mobile phone can choose the best connections by selected constraints and dynamically change them during a single end-to- end connection. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near- soon 4G mobile technologies, and this concept is called here the 5G.
Keywords: Mobile Network, Internet, Mobile Technologies
Abstract
An Novel Approach of Video Resource Delivery for CD Networks
Srimantula Siva Kumar, Mr.Y.Ramesh Kumar
DOI: 10.17148/IJARCCE.2017.61156
Abstract: Content Delivery Networks (CDNs) have been widely implemented to provide scalable cloud services. Such networks support resource pooling by allowing virtual machines or physical servers to be dynamically activated and deactivated according to current user demand. Significant portion of today�s internet traffic emerge from multimedia services. When coupled with growth in number of users accessing these services, there is tremendous increase in network traffic. CDNs aid in handling this traffic and offer reliable services by distributing content across different locations. The concept of virtualization transformed traditional data centers into flexible cloud infrastructure. With the advent of cloud computing technology, multimedia providers have scope for establishing CDN using network operator�s cloud environment. However, the main challenge while establishing such CDN is implementing a cost efficient and dynamic mechanism which guarantees good service quality to users. This thesis aims to develop, implement and assess the performance of a model that coordinates deployment of virtual servers in the cloud. A solution, which dynamically spawns and releases virtual servers according to variations in user demand has been proposed. Cost-based heuristic algorithm is presented for deciding the placement of virtual servers in OpenStack based federated clouds. Further, the proposed model is implemented on XIFI cloud and its performance is measured. Results of the performance study indicate that virtual CDNs offer reliable and prompt services. With virtual CDNs, multimedia providers can regulate expenses and have greater level of flexibility for customizing the virtual servers deployed at different locations.
Keywords: Content Delivery Networks, Resource Management, Video Streaming.
Abstract
Disjoint Route Vector Algorithm for Heterogeneous Wireless Sensor Networks
Dr.P.Swetha, Kolichala Rajashekar
DOI: 10.17148/IJARCCE.2017.61157
Abstract: In a distributed wireless sensor networks,maintaining topology and reducing frame loss is much needed for effective transmission. The wireless sensor network consists of a various number of sensor nodes which used for sensitive data collection like military surveillance. Conventional topology networks are used for homogeneous networks. Whenever a node failure occurs in the network topology, existing protocols initiates route discovery process. However, to find a route, the existing protocol flood the network which is independent of the node location. This also reduces the overall performance of the network with unnecessary packet retransmission. We overcome this problem by making efficient topology network with fault detection. In this paper, we propose an algorithm called disjoint route vector. It is used in a hetero genius wireless sensor networks. In this algorithm, assigning transmission range for each sensor node such that forming p-disjoint paths in heterogeneous networks. So if a node failure occurs it only checks p-1 nodes in the worst case instead of all the nodes in the network. Our simulation results show the time taken for proposed algorithm is relatively less.
Keywords: WSN, disjoint route,transmission range,supernode,sensor node.
Abstract
Analysis of Information Security through Crypto-Stenography with Reference to E-Cipher Methods
Padmaja Patel, Sibo Prasad Patro
DOI: 10.17148/IJARCCE.2017.61158
Abstract: This paper shows the possibility of exploiting the features of E- cipher method by using both cryptography as well as Steganography methods to send and receive the message in more secured way and shows the different methods are available and an comparative study on Substitution cipher. Proposed methodology shows that successfully using these Poly substitutions methods (Proposed E-Cipher) to evolve a new method for Encrypting and decrypting the messages. In poly-alphabetic substitution ciphers (E-Cipher) the plaintext letters are enciphered differently depending upon their placement in the text. As the name poly-alphabetic suggests this is achieved by using several two, three keys and random keys. Combinations instead of just one, as is the case in most of the simpler crypto systems. We can use Poly substitution method combining the features of cryptography for text encryption by 2 keys and 3 keys and even more then 3 keys to make the decryption process more complicated. After this process, file is compressed; the compressed file is hidden in image file using LSB method, the same process is applied reversely to retrieve the source message by Genetic keys.
Keywords: Genetic Algorithm, Encryption, Decryption, Genetic Keys, Mono Substitution, Poly Substitution., object.
Abstract
Location Based Travel Route Recommendation
Divya Haridas, Prof. T.K.P. Rajagopal
DOI: 10.17148/IJARCCE.2017.61159
Abstract: Trajectory search has long been an attractive and challenging topic which blooms various interesting applications in spatial-temporal databases. In this work, we study a new problem of searching trajectories by locations, in which context the query is only a small set of locations with or without an order specified, while the target is to find the k Best-connected Trajectories (k-BCT) from a database such that the k-BCT best connect the designated locations geographically. Different from the conventional trajectory search that looks for similar trajectories w.r.t. shape or other criteria by using a sample query trajectory, we focus on the goodness of connection provided by a trajectory to the specified query locations. This new query can benefit users in many novel applications such as trip planning.
Keywords: Location, Route, Travel, Recommendation, Trajectories
Abstract
Future Research Directions in Crowd Computing: A Novel Perspective
Manas Kumar Yogi, Sirisha Ratnala
DOI: 10.17148/IJARCCE.2017.61160
Abstract: This paper discusses areas where crowd computing needs attention to optimize crowd resources as well as increase the efficiency of crowd computing. We explore only three horizons namely user modeling,labels integration, sample selection. We observe that each one is a research area in its own where work has been progressing at appreciable rate.But they are open issues, so scope of improvement exists in all the areas of crowd computing. Our paper is a sincere attempt to bring out the shortcomings of current strategies used in development of crowd computing applications. This paper will serve as a readymade guide for researchers who attempt to treadin the path of crowd computing research.
Keywords: Crowd sourcing, Crowd computing, model selection, label classification, uncertainty.
Abstract
WBAN and Cloud Computing- 2
Vishesh S, Pradhyumna M, Suchit Shavi, Sujaya HS, Suraj N, Kavya P Hathwar
DOI: 10.17148/IJARCCE.2017.61161
Abstract: Computer networks and data communication networks can be classified based on the range or span of the network. One such classification is the Body Area Network. Serious research and an outlook for alternatives in this field are in progress and in this paper; a small module of it is presented. An inter-body network or inter-Body Area Network is considered to be one Autonomous entity and its behaviour within and between two are more autonomous entities are analysed and the result is stored in the cloud. Simple algorithms enable the person or systems entitled to receive or dump the real-time data from/to the cloud. Open Shortest Path First protocol or the OSPF protocol is used as the Interior Gateway Protocol (IGP) and Border Gateway Protocol (BGP) is used as the Exterior Gateway Protocol (EGP). As BANs generate large volumes of data, the need to manage and maintain these datasets is of utmost importance. A robust Database Management System (DBMS) is essential and must dynamically store and share real-time data of the network.
Keywords: Inter-Body network or Inter-Body Area Network, Real-time data from/to the cloud, OSPF protocol, Interior Gateway Protocol (IGP) and Border Gateway Protocol (BGP).
