IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Student, Electronics & Communication Engineering Department, VITS, Indore, India
Assistant Professor, Electronics & Communication Engineering Department, VITS, Indore, India
G.Srinivas Reddy, Prof.T.Venkat Narayana Rao, D V S Nagendra Kumar
Department of C.S.E, Mahatma Gandhi Institute of Technology, Hyderabad, A.P, India 1,
Department of C.S.E, Guru Nanak Institutions Technical Campus, Ibrahimpatnam, Hyderabad, A.P, India
M.Tech-SE, DRK Institute of Science and Technology, JNTUH, Hyderabad, India
M.Tech-CS, DRK College of Engg. and Technology, JNTUH, Hyderabad, India
HOD, Dept. of CSE, DRK Institute of Science and Technology, JNTUH, Hyderabad, India
D. B. Jagannadha Rao, Karnam Sreenu, Parsi Kalpana
Associate Professor, Dept. of Computer Applications, Sreenidhi Institute of Science and Technology, India
Assistant Professor, Dept. of Information Technology, Sreenidhi Institute of Science and Technology, India
Assistant Professor Dept. of Computer Applications, Sreenidhi Institute of Science and Technology, India
Assistant Professor, Dept. Of Computer Science & Engineering, Saintgits College Of Engineering, Kottayam, India
Section Head, Image Processing Section, DSD, AVN Scientist/Engineer, sg
Department of Electronics & Communication Engineering, Birla Institute of Technology, Mesra, Ranchi-835215, India
Department of Electronics & Communication Engineering, Birla Institute of Technology, Mesra, Ranchi -835215,India
Department of Electronics & Telecommunication Engineering, Army Institute of Technology, Pune -411015, India
Mr. Sanjeev Kumar Srivastava, Dr. Mrs. Ranjana D. Raut
Associate Professor, Department of Electronics and Telecommunication Engineering, PIIT, Mumbai University, Mumbai
India
Associate Professor (Reader), P.G. Department of Applied Electronics, Sant Gadge Baba Amravati University, Amravati
(M.S.), India
Department of Computer Science, SSES Amti's Science College, Congressnagar, Nagpur, India
Department of Computer Applications, Dhanwate NationalCollege, Congressnagar, Nagpur, India
Department of Computer Science, S.G.B. Amarvati University, Amarvati, India
Student, Electronics & Communication Engineering Department, VITS, Indore, India
Assistant Professor, Electronics & Communication Engineering Department, VITS, Indore, India
Abstract: Nowadays people are driving very fast; accidents are occurring frequently, we lost our valuable life by making small mistake while driving (school zone, hills area, and highways). So in order to avoid such kind of accidents and to alert the drivers and to control their vehicle speed in such kind of places the highway department have placed the signboards. But sometimes it may to possible to view that kind of signboards and there is a chance for accident. So to intimate the driver about the zones and the speed limit automatically, is done by means of using RF technology. The main objective is to design a Smart Display controller meant for vehicle’s speed control and monitors the zones, which can runon an embedded system. Smart Display & Control (SDC) can be custom designed to fit into a vehicle’s dashboard, and displays information on the vehicle. The project is composed of two separate units: zone status transmitter unit and receiver (speed display and control) unit. Once the information is received from the zones, the vehicle’s embedded unit automatically alerts the driver, to reduce the speed according to the zone, it waits for few seconds, and otherwise vehicle’s SDC unit automatically reducesthe speed.
Web Based Efficiency for IEEE802.11 Based Adhoc Networks
WEB BASED EFFICIENCY FOR IEEE ., BASED ADHOC NETWORKS, Amirishetty Raju, Prof.S.S.V.N. Sarma
Department of CSE, Vaagdevi College of Engineering, Warangal, India
Abstract: In the today’s competitive world, necessity of fast and convenient ways of communication was increasing day by day, wireless ad hoc networks, nodes are expected to be heterogeneous with a set of multicast destinations greatly differing in their end devices and QoS requirements. By IEEE802.11e the accuracy and efficiency of bandwidth have no mechanism in the channel .In this paper we focused on the bandwidth efficiency by using web based application. We propose an improved mechanism to estimate the available bandwidth in IEEE 802.11-based ad hoc networks our work mainly focuses on available bandwidth efficiency. These applications may benefit from a quality of service (QoS) support in the network. The aim of this paper is to reduce the collision and we want to improve the Throughput value and finally we find the Bandwidth.
Keywords: Wireless communication, IEEE 802.11, Quality of Service, available bandwidth estimation.
Calculation of the Magnetic Coupling between two Coils of Transcutaneous Energy System
JOEL FLORES, JORGE BECERRA, JAVIER HERRERA ICE, ESIME-ZAC/IPN, Mexico City, Mexico
Abstract: This paper describes the development and analysis of a magnetic coupling between two coils of a transcutaneous power system R.F., which consists of a Class E driver and a parallel LC circuit, to evaluate the magnitude of voltage induced by a transmitting coil to a receiving coil implanted in an animal model, with the purpose of consider it as energy stage of implantable electronic devices for recording bioelectric signals.
Keywords: Magnetic coupling, Transcutaneousenergysystem, Implantablecoil, DriverclassE.
Department of IT1, Head, Department of CSE
Galgotias College of Engineering and Technology, Greater Noida, India
Abstract: Text mining is extracting useful or relevant information from a textual file. The extraction of information works on search engine or through a tool. Text mining is used for text retrieval and categorization. This paper focus on every word of a textual document whose frequency or occurrence in a textual document is high and those words has its own meaning i.e. they are stand-alone words. So we have developed a tool which will extract the details of textual data for a user in summarized form and the information subsequently is sufficient to know about a textual file.
Keywords: Text Mining, Morphology, n-gram, categorization, information extraction, text retrieval.
Performance Evaluation of Fixed and Mobile WiMAX Networks for UDP Traffic
Ali Nawaz Naqvi, Ash Mohammad Abbas, Tofik Ali Chouhan
Department of Computer Engineering, Zakir Hussain College of Engineering and Technology
Aligarh Muslim University, Aligarh-202002, India
Abstract: WiMAX stands for Worldwide Interoperability for Microwave Access. In this paper, Performance evaluation of WiMAX is done on network simulator NS version 2.34. Various real life scenarios have been created to see how different factors such as distance, number of subscriber stations, different modulation schemes and packet size affect the performance of the WiMAX network. Simulation of performance is carried out for UDP protocol over fixed as well as mobile WiMAX. Throughput, average delay and average jitter are used as performance metrics in this study.
An Energy Efficient Analysis of Hardware Prefetching Techniques : A Review
Mouneshwar Kanamadi
Department of CSE, Ashokrao Mane Group of Institutions, Vathar tarf vadgaon
Tal. Hatkanangle, Dist. Kolhapur, India
Abstract: The paper presents a review on different hardware prefetching techniques. It is written to be accessible to researchers familiar to hardware prefetching. Both the historical basis of the field and a broad selection of current work are summarized. Memory latency and bandwidth are progressing at a much slower pace than processor performance. A widely explored approach to improve cache performance is hardware prefetching that allows the pre-loading of data in the cache before they are referenced. Data prefetching has been considered as an effective way to mask data access latency caused by cache misses and to bridge the performance gap between processor and memory. Different hardware architecture and prefetching patterns are considered in this paper. Some of the energy preservation schemes are discussed and the results obtained from different methods are given in brief.
A Perspective Approach on Mobile World Propelling Security for Entity Cloud
Bhavya Boggavarapu
Department of Computer Science and Engineering, K L University, Andhra Pradesh, India
Abstract: The arena of cloud computing is still in its earlier state of growth as far as implementation and usage, partly because it is heavily promoted by technology advancements. Mobile Cloud Computing is the advancement done on the basis of involvement from basic cloud computing in which mobile device plays a key role for the ensuring of data storage. MCC clasps the potency to extinguish the requirements for coiffuring up of high-cost computing infrastructure for the solution and even by providing several operational facilities and services that the industries uses. MCC even stands ahead to provide multifarious security and privacy challenges. MCC access data from shared pool of entropy, thereby it increases the service providing interaction and removes risks associated with the society to reach all sorts of application goals. This paper concludes providing security tasks in dealing up with sharing of data with the accessible world linked up in MCC. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it by providing security mechanism by even ciphering the data through several implementation cryptic techniques.
Keywords: Mobile cloud computing(MCC), security issues, mobile services, Interoperability, Platform of mobile application for privacy.
Department of Computer Science, Galgotia college of Engineering, Greater Noida , India
Abstract: Data Security and Access Control is an exigent work in the environment of Cloud Computing. The users upload the personal and classified data over the cloud. Security is mandatory for such type of outsourced data, so that users are confident while processing their private and confidential data. Modern technology suffers from computational problem of keys and there exchange. This paper emphasizes the different problems and issues that arise while using cloud services such as key generation, data security and authentication. The paper addresses these problems using access control technique which ensures that only the valid users can access there data. It proposes a RSA Key Exchange Protocol between cloud service provider and the user for secretly sharing a symmetric key for the secure data access that solves the problem of key distribution and management. The Authentication will be done using Two Factor Authentication Technique with the help of key generated using TORDES algorithm. The proposed work done using Cloud is highly efficient and secure in the existing security models.
Keywords: Cloud computing, Data security, public key cryptosystem, Symmetric encryption
An Intrusion Tolerance Approach for Internet Security
G.Srinivas Reddy, Prof.T.Venkat Narayana Rao, D V S Nagendra Kumar
Department of C.S.E, Mahatma Gandhi Institute of Technology, Hyderabad, A.P, India 1,
Department of C.S.E, Guru Nanak Institutions Technical Campus, Ibrahimpatnam, Hyderabad, A.P, India
Abstract: The Internet has become essential to most enterprises and many private individuals. However, both network and the computer systems connected to it are still vulnerable to attacks which are becoming more frequent than ever. To face this situation, traditional security techniques are insufficient and fault-tolerance techniques are becoming increasingly cost-effective. Nevertheless, intrusions are very special faults, and this has to be taken into account when selecting the fault-tolerance techniques. In classical dependability, fault tolerance has been the workhorse of many solutions. Classical security-related has less privileged solutions with a few exceptions towards intrusion detection and prevention. The paper focuses on the fundamental concepts fault tolerance and security. The main strategies and mechanisms for architecting IT systems are discussed in the study along with the recent advances in secured distributed IT system architectures.
Efficient Handling of XML Tree Pattern Matching Queries – A Holistic Approach
Sravan Kumar K, Madhu P, Raghava Rao N
M.Tech-SE, DRK Institute of Science and Technology, JNTUH, Hyderabad, India
M.Tech-CS, DRK College of Engg. and Technology, JNTUH, Hyderabad, India
HOD, Dept. of CSE, DRK Institute of Science and Technology, JNTUH, Hyderabad, India
Abstract: XML has become a defacto standard to store, share and exchange business data across homogenous and heterogeneous platforms. The interoperability is possible though XML. As enterprises are generating huge amount of data in XML format, there is a need for processing XML tree pattern queries. The existing holistic algorithms for XML tree pattern matching queries exhibit suboptimmality problem as they consider intermediate results before taking final results. This causes suboptimal performance. This suboptimality is overcome by using TreeMatch algorithm. This paper implements a prototype application that makes use of dewey labeling scheme to overcome suboptimality. The experimental results revealed that the proposed algorithm is better than the existing algorithms.
Keywords: XML, parser, XSL, algorithms, dewey labeling, xml tree pattern query.
A Study on Dynamic Source Routing Protocol for Wireless Ad Hoc Networks
D. B. Jagannadha Rao, Karnam Sreenu, Parsi Kalpana
Associate Professor, Dept. of Computer Applications, Sreenidhi Institute of Science and Technology, India
Assistant Professor, Dept. of Information Technology, Sreenidhi Institute of Science and Technology, India
Assistant Professor Dept. of Computer Applications, Sreenidhi Institute of Science and Technology, India
Abstract: An ad hoc network is a collection of wireless mobile hosts forming a temporary network without requirement of any existing infrastructure. In such an environment, to forward a packet from host to destination require a mobile host. This paper presents a protocol for routing in Mobile ad–hoc networks .Dynamic Source Routing which is a reactive routing protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. The DSR is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. Source routing allows packet routing to be trivially loop-free, avoids the need for up-to-date routing information in the intermediate nodes through which packets are forwarded, and allows nodes forwarding or overhearing packets to cache the routing information in them for their own future use. DSR is entirely on-demand.
A Novel Based Approach for Finding Motion Estimation in Video Compression
Deepa Mary Thomas, Subha Varier
Assistant Professor, Dept. Of Computer Science & Engineering, Saintgits College Of Engineering, Kottayam, India
Section Head, Image Processing Section, DSD, AVN Scientist/Engineer, sg
Abstract: This paper mainly focuses on the two main classification of motion estimation algorithms used for video compression. Motion Estimation (ME) algorithms vary with respect to the a priori information and constraints they employ, as well as the method of computation they use to obtain the estimate. The classifications for ME algorithms are based on feature/region matching, gradient based methods, spatiotemporal energy methods, deterministic model based methods and stochastic model based methods. This paper focuses more on block matching algorithms which comes under feature/region matching and gradient based methods. This paper compares 2 important ME algorithms. They are Full Search (FS) and a newly found adaptive algorithm called AMEA. In FS every candidate points will be evaluated and more time will be taken for predicting the suitable motion vectors. Based on the above noted drawback, the above said adaptive algorithm called AMEA is proposed. These algorithms are used for implementing various standards, which ranges from MPEG1 / H.261 to MPEG4 / H.263 and H.264/AVC. A very brief introduction to the entire flow of video compression is also presented in this paper.
Keywords: AMEA, block matching, gradient based method, motion estimation, MPEG, H.261, H.263, H.264/AVC, video compression.
Evaluation of CDMA Microwave Links at Different Environments for VoIP Applications
Manas Ray, Dr. Mahesh Chandra, Dr. B.P. Patil
Department of Electronics & Communication Engineering, Birla Institute of Technology, Mesra, Ranchi-835215, India
Department of Electronics & Communication Engineering, Birla Institute of Technology, Mesra, Ranchi -835215,India
Department of Electronics & Telecommunication Engineering, Army Institute of Technology, Pune -411015, India
Abstract: VoIP is the most important communication technology in the modern communication world. Even though it has became a viable alternative to wired telephony , it is still in development stage in the microwave domain .This paper addresses the challenges faced by VoIP in Microwave domain and tries to establish a relation between Bit Error Rate (BER) with frequency of operation , Transmitted Power and PN Codes in a commercial Microwave VoIP applications using CDMA link by studying their performance in different geographical networks.
Study and Analysis of Characterizing the Capacity of Wireless Ad Hoc Networks
Mr. Sanjeev Kumar Srivastava, Dr. Mrs. Ranjana D. Raut
Associate Professor, Department of Electronics and Telecommunication Engineering, PIIT, Mumbai University, Mumbai
India
Associate Professor (Reader), P.G. Department of Applied Electronics, Sant Gadge Baba Amravati University, Amravati
(M.S.), India
Abstract: This paper provides an overview of metrics for capacity evaluation of Ad hoc wireless networks. The capacity metrics based on statistical approach incorporate aspect from the physical layer and from the network layer. These metrics are suitable for network design and parameter optimization. Whereas the capacity metrics based on network scalability describe how network capacity behaves when the number of nodes in the network grows. Therefore even though the scaling laws are rather pessimistic, it can be used to design of more appropriate transmission schemes. A set of simple powerful tool is applied to quickly determine the capacity scaling laws for various physical layer technologies under the protocol model.
Keywords: Expected forward progress, Information efficiency, Transmission capacity, Aggregate multi-hop information efficiency, Transport capacity, the protocol interference model, the physical interference model etc.
Department of Computer Science, SSES Amti's Science College, Congressnagar, Nagpur, India
Department of Computer Applications, Dhanwate NationalCollege, Congressnagar, Nagpur, India
Department of Computer Science, S.G.B. Amarvati University, Amarvati, India
Abstract: Cluster analysis divides data into meaningful or useful groups (clusters). If meaningful clusters are the goal, then the resulting clusters should capture the “natural” structure of the data. For example, cluster analysis has been used to group related documents for browsing, to find genes and proteins that have similar functionality, and to provide a grouping of spatial locations prone to earthquakes. However, in other cases, cluster analysis is only a useful starting point for other purposes, e.g., data compression or efficiently finding the nearest neighbors of points. Whether for understanding or utility, cluster analysis has long been used in a wide variety of fields: psychology and other social sciences, biology, statistics, pattern recognition, information retrieval, machine learning, and data mining. In this paper, a survey of several clustering techniques that are being used in Data Mining is presented. Data mining adds to clustering the complications of very large datasets with very many attributes of different types. This imposes unique computational requirements on relevant clustering algorithms. A variety of algorithms have recently emerged that meet these requirements and were successfully applied to real-life data mining problems.
Keywords: Clustering, partitioning, data mining, hierarchical clustering, k-means, density-based, grid-based
A Clustering Scheme for Peer-to-Peer File Searching in Mobile Ad Hoc Networks
Tanzeem Bin Noor, Md. Rounok Salehin, Sheikh Rabiul Islam
Department of Computer Science and Information Technology1, 2,
Islamic University of Technology (IUT), Gazipur, Bangladesh1, 2,
Abstract: Peer-to-peer computing is a popular paradigm for different applications that allow direct message passing among peers. The existing P2P search algorithms in MANET (Mobile Ad-hoc Network) are flooding-based search that produces much traffic and network overhead. File searching efficiency of peer-to-peer (P2P) network mainly depends on the reduction of message overhead. This paper deals with a full form of cluster based P2P file searching approach for MANETs, which focuses mainly over reduction of control messages. For searching, our mechanism uses cluster head within the cluster but it also allows inter-cluster communication. Moreover, secondary cluster head concept of our proposal ensures lower message overhead during cluster formation stage. Our clustering scheme utilizes request suppression to reduce the number of responses for searching process. Cconsideration of alternative paths to a node facilitates to overcome link failure. In detailed simulation, we have showed that our clustering approach for file searching outperforms the existing ORION approach in case of reducing message overhead.
Abstract: This paper shows current situation of education in Mexico and how technology can improve the overall picture of higher education. Two digital tools are described, developed to support topics of courses corresponding to the bachelor's degree in Computer Sciences (LCC), offered by the Faculty of Mathematics of the Autonomous University of Yucatan. The tools consist in a simulation of operating systems processing algorithms and an animation of the conversion of numbering systems used in network addressing. It is presented a description of each tool, as well as the implemented methodology used to develop such tools. The subsequent use of these tools in the classroom is intended to strengthen the teaching-learning process on university students.
Keywords: Digital tools, higher education, teaching-learning, simulation.