VOLUME 6, ISSUE 10, OCTOBER 2017
Design and Simulation of Constant Voltage Variable Frequency Single Phase to Single Phase Cycloconverter in Simulink
B.O Akinloye, Chinenye D. Okwudibe
Prediction of Kidney Disease using Hybrid System based on Regression, Decision Tree and K-Near Neighbour method
Mansooreh Fateh, Seyyed Javad Mirabedini
Applying Fuzzy Logic and Node Differentiation to Heterogeneous Wireless Sensor Networks
Kamal Kumar Agrawal, Dr. N.K. Joshi
Micro-Channel Heat Exchanger
Ujwal Chalse, Prof. A.A.Parlkar, Prof. V.S.Patil, Tejas Mawale
SPV Array Fed Water Pumping Machine Using A Switched Reluctance Motor (SRM) Drive
Prof.G.Muthuram,M.E, Ragul.R
Real Time Face Detection For Mouse Movement
Ainal Siddiquee, Kamran Shaikh,Shaikh Mohd Ashfaque, Maqbul Shaikh, Sohel Siroha
Survey of Parallel Implementations of Clustering Algorithms
Pranav Kadam, Sai Jadhav, Anirudh Kulkarni, Savita Kulkarni
Enhanced Robust Ad-hoc Sensor Routing (RASeR) Protocol with Trust Authentication Scheme for Wireless Sensor Networks
N. Suresh, S. Anandhan
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments
D. Rohini, Dr. S. Adaekalavan
Blind Spot Detecting Car with Accident, Drowsy Driver Detection and Alert system
Tejal U. Thakre, Prof. Mrs. V. P. Kodgirwar
Functional Context Awareness: Measuring and Utilizing Context Dependency of Android Mobile Usage
Mrs. Swati Shivaji Gore, Mrs. Prachi A. Joshi
Robust Non-rigid Object Tracking using Patch Distribution
N. Kiran Babu, P. Anil Kumar, G. Ezra Sastry
Optimal Route path Discovery in Wireless Sensor Network by Amended Ant Colony Optimization
Jaskiranpreet Kaur, Guneet Kaur
An Adaptive and Collaborative Enhanced Trust Based Intrusion Detection System MANET
Pooja Malviya, Vivek Sharma
A Novel Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
Edelli Naveen, Poladi Pramod Kumar
Reconnect Traffic Partitioned Node in Wireless Sensor Network using ETRSP (Encroach Traffic Reconnect Set-Up Partitioning) Technique
Navneet Kaur Padda, Guneet Kaur
A Review on Congestion Control Techniques in Wireless Sensor Networks
Mahesh Y Sumthane, Rambabu A Vatti
A Study to Apply Association Rule Mining on Granular Computing
K. Gnanendra, Om Prakash Samantray, G. Ezra Sastry, K. Suresh Babu
A Survey on Developing Web Services with SOAP and REST
Madhuri Surendrakumar Warvante
A Review Paper on IoT Based Coffee Vending Machine
Ashish Kumar Singh, Aditya Sinha, Rajat Vaidya, Hrishikesh Vijay Kulkarni
Handling Missing Values based on K-NN Imputation with Regression
R. Kavitha, S. Sandhya
A Review Paper on Garbage Level Monitoring System for Smart Cities
Nimisha Singh, Prajakta Wagh, Neha Sameer Shahare
A Survey on Technical Challenges in Femtocell Networks
A. Kingsly Jabakumar
Enhanced Steganography in Encoded Video Streams using Multi Motion Vector Difference Model
Ms. Nanthini.D, Mrs. Sathiya Priya.T
Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness
Ms. Abirami.P, Mrs. Sangeetha B S
SMS filtering in binary classification using Hybrid Approach of Data mining Techniques
Nikunj Chaudhari, Prof. Jayvala, Prof. Vinita Shah
Topic Based Video Search and Visualization Techniques of Video Search Results- A Survey
Dr. R. Priya, Radhika Krishnan R
Automatic Bug Triage Using Data Reduction Technique
Assistant Prof. Pratima Patil, Tejas Shingte , Pranav Kamatkar, Prachi Tikar ,Sumit Kulkarni
Navigation System Using LIFI For Shopping Mall
Assistnat Prof. Sandeep Yadav, Rushikesh Bachal, Soniya Yadav Khusbu Saroj , Prithviraj Ingole
Data Aggregation Mechanism For Distributed In Wireless Sensor Network
Dr. D. Francis Xavier Christopher M.Sc, MPhil (CS), PGDPM&IR, Ph.D., C.Akalya, MCA
Implementation of Intrusion Detection System in Cloud Environment Using Fusion Based Approach
Nishita Gangrade, Deepika Jain, Harish Patidar
Operation of Wireless Sensors for Premonition and Mitigation in Disaster
Pragati Jain, Sahana T.Edwin
Accuracy Assessment of Land Cover Classification in Jodhpur City Using Remote Sensing and GIS
S.L. Borana, S.K.Yadav
Spatial Inequalities in Accessibility of Public Amenities in Jodhpur City
S.L. Borana, S.K.Yadav
Maximum Power Point Tracking Control for Wind Energy Conversion System Using PID Controller and Fuzzy Logic
Ambika Sharma, Dinesh Kumar Arya
Implementation of WLAN network with strong authentication
HAWA HOCH DIRRANEH, HUI ZHOU
Performance Improvement of a Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle Using MATLAB
E.Juliet Priscilla Prof. Dr.K.Mathan
Misbehaving Node Identification using I-GTA in MANET
A. Sushma, T. Manjula, M.E
Deriving Attribute Relationship for Big Data Security
Bindiya M.K, Dr. RaviKumar G.K
Prediction of Crime Safety Level of Particular Location
Prof. Archana Kadam, Ms. Diksha Mhaske
Group Authentication Using Back-propagation Neural Network
Ms. Supriya K. Narad
Dimensionality Reduction for Privacy Preserving Data Mining using Random Projection Perturbation Approach in Outsourced Environment
Vijayalakshmi Pasupathy, YamunaDevi S
Automatic Toll Collection System Using RFID & GSM Technology
Vishnupriya. R Dr.N.P.Ananthamoorthy
Segmentation in Manganethi Plant using Mathematical Morphology
Dr. A. Senthil Rajan
Improved Energy Efficient Routing Protocols for UWSN
Sizeriyan Azad, Ch Satyananda Reddy
Survey on the Open Shortest Path First (OSPF) Routing Protocols
Poovizhi. A, Mahalakshmi. B
Face Recognition Based on Multi- Scale Face Components by Artificial Neural Networks
Palak Jain, Lalit Chourasia
Pothole Detection and Notification Using Smartphone for Self-driving Vehicles, Drivers and Road Authorities
Mr. Akash S. Kadam, Miss. Anjali H. Ghogare
Effective Security Model for Hybrid Cloud Using Multi-Replica with CPDP Approach
K.Vimala, K.Suganthi
Dynamic Reliable System for Reducing Collision in Vehicular Networks Using Fuzzy Logic
Harneet Kaur, Ms. Shivani Kwatra
Efficient File Search for Social Ad-Hoc Networks with Self Replica Allocation Reduction Algorithm
K.Vimala, G.Punitha, V.Kruthika
Urea Adulteration in Milk
P. V. Lokhande, S. S. Matsagar , P. P. Lokhande
Effective and Efficient High Utility Frequent Item Set Mining Using Modified LP-Tree Algorithm
P. S. Saranya, M. Narmatha M.Sc., M.Phil
A Study on Text Analytics and Categorization Techniques for Text Documents
S. Swathi, P. Lalitha
Real Time Monitoring and Data Analytics of IoT Data Servers
Rohit Tapas, Prasoon Maurya, Dr. Poorna Shankar
Differential Count of WBC in Bone Marrow with Novel Features for Disease Diagnosis
Shri N .D.Pergad, Dr. S.T.Hamde
Abstract
Design and Simulation of Constant Voltage Variable Frequency Single Phase to Single Phase Cycloconverter in Simulink
B.O Akinloye, Chinenye D. Okwudibe
DOI: 10.17148/IJARCCE.2017.61001
Abstract: Cycloconverters convert alternating current of certain magnitude and frequency to another alternating current of another magnitude or frequency. Many of the industrial applications require variable frequency. The cycloconverter plays a pivotal role in achieving this task of supplying variable frequency. There are many types of cycloconverters depending on the number of phases that it is intended to convert the AC voltage to. Simulink is a graphical extension to MATLAB for modeling and simulation of systems. One of the advantages of Simulink is the ability to model a nonlinear system, in which a transfer function is not able to do. Another advantage of Simulink is that, it has the ability to take on initial conditions. In this work, a variable frequency constant voltage cycloconverter will be designed and simulated using Simulink.
Keywords: Cycloconverter, Matlab Simulink, Single-Pahse, Thyristor.
Abstract
Prediction of Kidney Disease using Hybrid System based on Regression, Decision Tree and K-Near Neighbour method
Mansooreh Fateh, Seyyed Javad Mirabedini
DOI: 10.17148/IJARCCE.2017.61002
Abstract: In the world, many people are suffering from kidney failure, and a large percentage of people are not aware until the advanced stage. Therefore, early detection and diagnosis of disease can be an effective step in the treatment and survival of the patient. In this study, the proposed model is a hybrid system consisting of decision tree, linear regression and nearest neighbour. The first step is created based on the training dataset of the decision trees models, linear regression and nearest neighbour. In the second step, the related class of the available samples in the test dataset is predicted based on the obtained models. In the last step, final output is determined based on the voting strategy. The obtained accuracy of this method is 89.47% in the proposed method, which had the best performance in comparison with the decision tree, linear regression and nearest neighbour.
Keywords: Decision Tree, Regression, K-NN, Hybrid Methods, Kidney Disease.
Abstract
ASRNC over Wireless Networks
Walid Mohamed Abdelwahab
DOI: 10.17148/IJARCCE.2017.61003
Abstract: In our contemporary world, multimedia transmission over wireless networks has grown in recent years, so there is more attention from research community. Providing a high quality multimedia transmission over wireless is challenging as it surrounds with strict timing constraint and high bandwidth demand. The Wireless communication is associated with challenges like limited bandwidth, interference and mobility which make it more difficult and challenging. In this paper we propose a new adaptive scheduled random network coding (ASRNC) scheme for video streaming over wireless IEEE 802.11 protocol. Such model is built on the fact that network coding can increase the quality of networks in terms of throughput enhancement and delay reduction. The model is practically implemented and integrated with network simulator (NS-2). BonnMotion is used as a movement generator so it helps to create different movements� scenarios. Movable and Static scenarios of the underlining wireless network were integrated with NS2 in different movement� speeds. Dynamic of movement scenarios were include the random waypoint and random street. The performance evaluation factors of the quality of multimedia streaming includes calculation of latency, jitter and packet delivery rate. The proposed ASRNC has increased multimedia streaming quality with both static and mobile movements, as it was compared to simplified multicast forwarding (SMF) as an optimized traditional broadcast scheme.
Keywords: ASRNC, network coding, wireless networks, multimedia streaming, video transmission.
Abstract
Applying Fuzzy Logic and Node Differentiation to Heterogeneous Wireless Sensor Networks
Kamal Kumar Agrawal, Dr. N.K. Joshi
DOI: 10.17148/IJARCCE.2017.61004
Abstract: Developments in wireless technologies and MEMS have led to much ease of use of wireless sensor networks. The energy issue is still an open challenge. Clustering is a good solution if it ensures even load distribution. Recently fuzzy logic is being used to combine different characteristics of nodes to decide the cluster structure of the network. This paper proposes how node differentiation can be done in heterogeneous networks based on position of the node, and then fuzzy logic is used for the cluster formation. The fuzzy system has two outputs � node selection probability and cluster size bound. Thus our proposal not only elects CH but also determines that cluster stricture should be such that potential hot spots are not given much load. Potential hot spot nodes are identified using the proposed node differentiation technique. Connectivity of the network for longer time is our main QoS parameter.
Keywords: WSN, clustering, connectivity, heterogeneous, fuzzy logic, hotspot problem
Abstract
Micro-Channel Heat Exchanger
Ujwal Chalse, Prof. A.A.Parlkar, Prof. V.S.Patil, Tejas Mawale
DOI: 10.17148/IJARCCE.2017.61005
Abstract: A heat exchanger is a device that is used to transfer thermal energy (enthalpy) between two or more fluids, between a solid surface and a fluid, or between solid particulates and a fluid, at different temperatures and in thermal contact. The goal of enhancing heat transfer while minimizing pressure drops and reducing the size and volume of energy conversion/thermal management systems has been the subject of intensive research for more than four decades. But growing energy demands, the need for increased energy efficiency and materials savings, space limitations for device packaging, and increased functionality and ease of unit handling have created revolutionary challenges for the development of high performance, next-generation heat and mass exchangers. Current heat exchanger designs rely heavily on fin-and tube or plate heat exchanger designs, often constructed using copper and aluminum. The strive for heat exchangers that are more compact and highly efficient has led to the development of micro-channel heat exchangers. The innovative micro-channel heat and mass exchangers appear to be the most promising way to meet these challenges in thermal management. When properly designed and utilized, micro-channels can distribute the flow precisely among the channels, reduce flow travel length, and establish laminar flow in the channels while achieving high heat transfer coefficients, high surface area-to-volume ratios, and reduced overall pressure drops. These are among the major advantages of micro-channels for use in a diverse range of industries.
Keywords: Heat Exchanger, Nano-fluid.
Abstract
SPV Array Fed Water Pumping Machine Using A Switched Reluctance Motor (SRM) Drive
Prof.G.Muthuram,M.E, Ragul.R
DOI: 10.17148/IJARCCE.2017.61006
Abstract: This paper gives a solar photovoltaic (SPV) array fed water pumping machine using a switched reluctance motor drive. The virtual commutation of SRM power at critical frequency gives decreased switching losses in a mid-factor converter and drastically Increases the efficiency of proposed system. The velocity of SRM is controlled by using numerous the dc-bus voltage of the mid-point converter. A DC-DC Boost converter running in continuous conduction mode (CCM) is used for dc-bus voltage manipulate. The CCM operation of inductors helps to reduce the ringing impact and decreases the losses of DC-DC converter. Present day and voltage stresses on devices which consist of switching pressure of Boost converter are also reduced in CCM. The Boost converter facilitates The non-stop and clean input/output currents to SRM force with boundless place for maximum power factor tracking (MPPT) operation. The adjustment in step length of an Incremental conductance (InC) MPPT set of policies helps the smooth starting of SRM force. The proposed system, subjected to dynamically atmospheric situations is designed, Modeled and simulated the usage of Matlab/simulink environment. A prototype of proposed configuration is likewise superior and its performance is established with test results for manipulate of pace over various insolation ranges.
Keywords: Non-stop conduction mode (CCM), Boost converter, Incremental conductance (InC), maximum power point tracking (MPPT), switched reluctance motor (SRM).
Abstract
Real Time Face Detection For Mouse Movement
Ainal Siddiquee, Kamran Shaikh,Shaikh Mohd Ashfaque, Maqbul Shaikh, Sohel Siroha
DOI: 10.17148/IJARCCE.2017.61007
Abstract: This paper gives a solar photovoltaic (SPV) array fed water pumping machine using a switched reluctance motor drive. The virtual commutation of SRM power at critical frequency gives decreased switching losses in a mid-factor converter and drastically Increases the efficiency of proposed system. The velocity of SRM is controlled by using numerous the dc-bus voltage of the mid-point converter. A DC-DC Boost converter running in continuous conduction mode (CCM) is used for dc-bus voltage manipulate. The CCM operation of inductors helps to reduce the ringing impact and decreases the losses of DC-DC converter. Present day and voltage stresses on devices which consist of switching pressure of Boost converter are also reduced in CCM. The Boost converter facilitates The non-stop and clean input/output currents to SRM force with boundless place for maximum power factor tracking (MPPT) operation. The adjustment in step length of an Incremental conductance (InC) MPPT set of policies helps the smooth starting of SRM force. The proposed system, subjected to dynamically atmospheric situations is designed, Modeled and simulated the usage of Matlab/simulink environment. A prototype of proposed configuration is likewise superior and its performance is established with test results for manipulate of pace over various insolation ranges.
Keywords: Non-stop conduction mode (CCM), Boost converter, Incremental conductance (InC), maximum power point tracking (MPPT), switched reluctance motor (SRM).
Abstract
Survey of Parallel Implementations of Clustering Algorithms
Pranav Kadam, Sai Jadhav, Anirudh Kulkarni, Savita Kulkarni
DOI: 10.17148/IJARCCE.2017.61008
Abstract: Cluster analysis is one of the primary approaches in Machine Learning. Applications involving clustering often deal with large and high dimensional datasets. Clustering of large datasets is a task having high time complexity. Clustering algorithms iterate several times before converging to the solution. A way to speed up the clustering process is Parallel Processing. Parallel programs make use of Graphical Processing Unit (GPU) and/or multi-core CPUs to reduce the computation time. There is enough scope to parallelize clustering algorithms for obtaining faster results. This paper gives a review of parallel implementations of three clustering algorithms viz. k-means, DBSCAN and Expectation-Maximization. We survey the Shared Memory and Message Passing models of parallel programming and how clustering algorithms have been performed using them. We also highlight few applications involving large data where parallel programming would be helpful.
Keywords: Machine Learning, Clustering, Clustering Algorithms, Parallel Processing, High Dimensional Data.
Abstract
Enhanced Robust Ad-hoc Sensor Routing (RASeR) Protocol with Trust Authentication Scheme for Wireless Sensor Networks
N. Suresh, S. Anandhan
DOI: 10.17148/IJARCCE.2017.61009
Abstract: Robust Ad-hoc Sensor Routing (RASeR) protocol is designed to be a reliable solution, even with the high frequency topology changes of a mobile network. It uses a simple hop-count gradient to allow sensor nodes to blindly forward data towards a single sink. A key issue with this type of routing is in keeping the gradient metric up to date, for this reason RASeR uses a design that combines a global time division multiple access (GTDMA) medium access control (MAC) scheme with the routing protocol. In proposed work, the communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The proposed analysis shows significant improvement in packet delivery ratio of AODV in the presence of attacks, with marginal rise in control traffic overhead. The forwarding technique used inherently takes advantage of route diversity, which is designed to utilize multiple paths simultaneously, such that if one route fails there is another still active to deliver the packet. This makes the protocol very dependable in terms of packet delivery and very robust to link failure.
Keywords: Raser Protocol, Routing, MAC, AODV, EAODV.
Abstract
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments
D. Rohini, Dr. S. Adaekalavan
DOI: 10.17148/IJARCCE.2017.61010
Abstract: Overhead network packets are a big challenge for Intrusion Detection Systems (IDSs),which may increase system burden, degrade system performance and even cause the whole system collapse, when the number of incoming packets exceeds the maximum handling capability. To address this issue packet filtration is considered as a promising solution and our previous research efforts have proven that designing a trust-based packet filter was able to refine unwanted network packets and reduce the workload in a local IDS. With the development of internet co-operation, Collaborative Intrusion Detection Environments (eg., CIDNs) has been developed, which allow IDS nodes to collect information and learn experience from others. However, it wouldnot be effective for the previously built trust-based packet filter to work in such a collaborative environment. Since the process of trust computation can be easily compromised by insider attacks. In this paper, we adopt the existing CIDN framework and aim to apply a collaborative trust-based approach to reduce unwanted packets. More specifically, we develop a collaborative trust-based packet filter which can be deployed in collaborative networks and be robust against typical inside attacks (eg., betrayal attacks). Experimental results in various simulated and practical environments demonstrate that our filter can perform effectively in reducing unwanted traffic and can defend against insider attacks through identifying in reducing unwanted traffic and can defend against insider attacks through identifying malicious nodes in a quick manner as compared to similar approaches.
Keywords: Intrusion Detection System, Network, Trust based packet filtering.
Abstract
Blind Spot Detecting Car with Accident, Drowsy Driver Detection and Alert system
Tejal U. Thakre, Prof. Mrs. V. P. Kodgirwar
DOI: 10.17148/IJARCCE.2017.61011
Abstract: On an increase in demand of vehicular transportation, the vehicular traffic has increased. This resulted in need for constant alertness of the drivers, especially for the four wheel drivers. They have to maintain their proper state of driving to maintain safety of goods and people. In this paper we are studying about the driver�s condition for driving and driver�s safety. The general reason for the road accident are the drowsy condition of the driver and the blind spot region while lane changing or overtaking. These two are the main highlighted things to be considered in this paper. Firstly, for the detection of drowsiness the eye blink detection is used, in which the eye blink rate is taken as parameter for determining the drowsiness of the driver. The drowsiness detection system is implemented using Android App. In our project we are going to use Ultrasonic sensors, as image processing will take more time for processing than sensor processing. We are going to check whether there is vehicle in the sensor range or not. If vehicle is detected, immediate alert will be given to the driver, from which side there is chance of crash if we try to change lane. In addition we are implementing a safety system in the vehicle which will detect the accident of the vehicle. And if accident is detected then immediately vehicles location will be sent to the number so that family members and Ambulance service provider will come to know about accident and both can take proper action.
Keywords: Blind spot detection, Drowsiness detection, Android app, Accident alert system.
Abstract
Functional Context Awareness: Measuring and Utilizing Context Dependency of Android Mobile Usage
Mrs. Swati Shivaji Gore, Mrs. Prachi A. Joshi
DOI: 10.17148/IJARCCE.2017.61012
Abstract: Contextual data brings new open doors for productive and compelling applications and services on mobile devices. A wide variety of examinations have abused context dependency, i.e. relationships in the middle of the context (s) and outcome, to achieve enormous, evaluated performance, A range of applications and services. This work generally needs to manage the difficulties of many contextual sources, resulting in inadequate data preparation and the difficulties of context sensors starved by energy. On a regular basis, they address these difficulties in a particular and specially designated application. We offer mobile application planners and analysts from these weights by providing a systematic way to cope with these challenges. More precisely, we 1) characterize and measure the contextual dependence of three types of mobile use (by site, phone calls and application usage) in a free mode of demand, but viable, Possible application. 2) Adapt to the condition of evaluation of the state of evaluation when managing various contextual sources effectively. 3) Introduce Android based Smart Context to meet the energy challenge by choosing from among the sources of context while guaranteeing a basic accuracy for each estimate. Our review and discoveries depend on the usage and context follows the collection, in reality, of the different Android client settings. We show findings with respect to the context dependence of three types of mobile usage of different clients, but our philosophy and the lessons we learn can quickly be extended to different kinds of use and, in addition, the assets of frame. Our findings control the improvement of contextual frameworks and highlight the difficulties and assumptions regarding the contextual dependence of mobile use.
Keywords: Mobile computing, mobile applications, human factors.
Abstract
Robust Non-rigid Object Tracking using Patch Distribution
N. Kiran Babu, P. Anil Kumar, G. Ezra Sastry
DOI: 10.17148/IJARCCE.2017.61013
Abstract: We propose a novel tracking algorithm for targets with drastically changing geometric appearance over time. To track such objects we use online update of appearance and shape. The problem here is to model foreground appearance of target with histograms in such a way that is accurate and efficient. In this paper, the constantly changing target foreground shape is modelled as a small number of patches or rectangular blocks, whose position within the tracing window are adaptively determined. We show that the robust tracking is possible by adaptively adjusting these patches. Moreover, object segmentation result is integrated into the proposed model to further enhance it. Experimental results show that the algorithm is able to track non-rigid objects undergoing large variation is appearance and shape.
Keywords: Non-rigid Object, Object Tracking, Histograms, Segmentation.
Abstract
Optimal Route path Discovery in Wireless Sensor Network by Amended Ant Colony Optimization
Jaskiranpreet Kaur, Guneet Kaur
DOI: 10.17148/IJARCCE.2017.61014
Abstract: Ant colony optimization (ACO) is a technique for optimization that was introduced in the early 1990�s. The inspiring source of ant colony optimization is the foraging behavior of real ant colonies. This behavior is exploited in artificial ant colonies for the search of approximate solutions to discrete and continuous optimization problems and to important problems in telecommunications, such as routing and load balancing. We proposed on some of the advancements occurring in the domain of ant colony optimization and provides a possible classification based on the developments that took place. The merits of the advanced ACO algorithms as well as their applications are also discussed.
Keywords: ACO, WSN, Pheromone, Optimal path, AACO.
Abstract
An Adaptive and Collaborative Enhanced Trust Based Intrusion Detection System MANET
Pooja Malviya, Vivek Sharma
DOI: 10.17148/IJARCCE.2017.61015
Abstract: MANET provides a flexible framework for the wireless communication which does not requires infrastructure or centralized controlling, because of the these abilities the MANET has great applicability in the applications where the other system cannot be deployed such as remote sensing, disaster management and military applications. However such flexibility comes with the cost of a number of limitations which can be exploited to compromise the security of the system. This paper we are presents an adaptive and enhanced trust based mechanism to detect and remove the malicious nodes from the network. In the proposed technique each node observes the packets transmission around it, and analyse it on the bases of trust estimation function which relates the RREQ, RREP and DATA packets. Furthermore these individual trust ratings are shared with other nodes to make it a collaborative system which provides much reliable detection of malicious nodes and minimizes the false detection probabilities. The proposed technique can also be integrated into MANET protocols with minimum efforts and it also have minimal impact of traffic overheads. The experimental result verifies that the proposed technique can successfully counter the black hole attack, selfish attack, collaborative attacks etc.
Keywords: Intrusion detection technique (IDS), Mobile Ad-Hoc Network (MANET).
Abstract
A Novel Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
Edelli Naveen, Poladi Pramod Kumar
DOI: 10.17148/IJARCCE.2017.61016
Abstract: In particular, we exploit the region's realities of sensors and arbitrarily pick witnesses set in a ring region to verify the authenticity of sensors and to record identified clone assaults. The ring structure helps vitality green data forwarding along the heading toward the witnesses and the sink. We hypothetically demonstrate that the proposed convention can attain one 100% clone location opportunity with trustfulwitnesses. We furthermore amplify the work through perusing the clone discovery general execution with untruthful witnesses and show that the clone identification plausibility in any case approachesninety 8% while 10% of witnesses are traded off. Moreover, in most existing clone identification conventions with randomwitness decision conspire, the required support, carport of sensors is regularly reliant on the hub thickness, i.e., O (n), whilst in our proposed convention, the required cradle storage of sensors is unprejudiced of n however a component of the hoplength of the group sweep h, i.e., O (h). Extensive simulations show that our proposed convention can obtain longer system lifetime by methods for successfully appropriating the traffic stack over the system.
Keywords: remote sensor systems, clone detection convention, vitality effectiveness, and system lifetime.
Abstract
Reconnect Traffic Partitioned Node in Wireless Sensor Network using ETRSP (Encroach Traffic Reconnect Set-Up Partitioning) Technique
Navneet Kaur Padda, Guneet Kaur
DOI: 10.17148/IJARCCE.2017.61017
Abstract: In wireless sensor network various Technique have been suggested for re-establish connectivity and energy consumption while efficient data collection ETRSP (Encroach Traffic Reconnect Set-Up Partitioning) Technique is proposed for finding irregularities in path while transmission. The proposed technique is used for reconstructing the network according to network framework .and provide optimal and reliable path for data transmission in network.
Keywords: WSN; TRSP; ETRSP; MASP.
Abstract
A Review on Congestion Control Techniques in Wireless Sensor Networks
Mahesh Y Sumthane, Rambabu A Vatti
DOI: 10.17148/IJARCCE.2017.61018
Abstract: IEEE 802.15.4 high density Wireless sensor network consist of large number of nodes, when any event occurs these sensor node becomes active in transmitting, it increases data traffic. Due to large volume of data transmission and restricted bandwidth congestion occurs. This leads packets to get delay, they even may get drop, throughput is reduced energy consumption is increased. A congestion control scheme in wireless sensor network based on IEEE 802.15.4 standard is necessary to regulate traffic level at an acceptable value. Congestion may occur in wireless sensor network based on IEEE 802.15.4 standard when data packets arrive at node and there is no space in the buffer. Congestion may also occur when all sensors send the data at the same time. This causes throughput reduction, packet loss and packet delay and wastage of limited energy. This seminar presents a survey of traffic control and resource control mechanisms to control congestion in wireless sensor networks based on IEEE 802.15.4 standard. It presents their significance, limitations and makes a comparison among them on the basis of various factors which would help in the future research and investigation in this particular area.
Keywords: IEEE 802.15.4, Network Congestion, Wireless Sensor Network, Congestion Control.
Abstract
A Study to Apply Association Rule Mining on Granular Computing
K. Gnanendra, Om Prakash Samantray, G. Ezra Sastry, K. Suresh Babu
DOI: 10.17148/IJARCCE.2017.61019
Abstract: Popular assessment of the faults of Apriori association rule mining algorithm required to scan database regularly and create a standard of huge aspirant. The binary sequence remained to use and prompt facts granule, using grain-bit binary abstraction frequent item sets and determining association rules. This allows the possibility to extract, analyse and organize information and knowledge through relationships between granules and between granulations Through research, the classical Apriori algorithm and the system that established on granular computing association rules extraction keep on associated to the experimental results are evaluated. The results illustrate that the algorithm for mining association rules based on granular computing for mining association rules is realistic and in effect.
Keywords: Association Rule Mining, Granular Computing, Apriori algorithm.
Abstract
A Survey on Developing Web Services with SOAP and REST
Madhuri Surendrakumar Warvante
DOI: 10.17148/IJARCCE.2017.61020
Abstract: A web service is a software system designed to support interoperable machine-to-machine interaction over a network. Web service is a service offered by one electronic device to another electronic device by communicating with each other over World Wide Web. Web services can be classify in two classes REST-compliant web services and arbitrary web services. SOAP (Simple Object Access Protocol) is intermediate language so that the applications written in different language can talk with each other. That means SOAP is language independent. SOAP is also platform independent. SOAP is based on XML and XML is light-weight so SOAP is also light-weight. REST stands for Representational State Transfer. It relies on a stateless, client-server, cacheable communications protocol and in virtually all cases, the HTTP protocol is used. REST is an architecture style for designing networked applications. The idea is that, rather than using complex mechanisms such as CORBA, RPC or SOAP to connect between machines, simple HTTP is used to make calls between machines. If we used SOAP or CORBA then there is requirement for client side to use the same because there is tight coupling. In many ways, the World Wide Web itself, based on HTTP, can be viewed as a REST-based architecture. RESTful applications use HTTP requests to post data (create and/or update), read data (e.g., make queries), and delete data. Thus, REST uses HTTP for all four CRUD (Create/Read/Update/Delete) operations. In REST two software can be integrated. In REST each data element is a resource, addressed by a URI (Uniform Resource Identifier).
Keywords: web service, SOAP, WSDL, UDDI, RPC, REST.
Abstract
A Review Paper on IoT Based Coffee Vending Machine
Ashish Kumar Singh, Aditya Sinha, Rajat Vaidya, Hrishikesh Vijay Kulkarni
DOI: 10.17148/IJARCCE.2017.61021
Abstract: The rise of the Internet of Things has led to an explosion of sensor computing platforms. The complexity and applications of IoT devices range from simple devices in vending machines to complex, interactive artificial intelligence in smart vehicles and drones. In the paper we put forward the design of the coffee vending machines based on the technology of internet of things and its remote management system, which is aiming at the present problems, such as the high administrative cost and the difficulties in data analysis. This design not only makes the sales and supply information available, it can survey this information into cloud corner through WIFI as well.
Keywords: Internet of Things, Sensors, coffee vending, notification.
Abstract
Blockchain Approach for Smart Health Wallet
Meetkumar Patel
DOI: 10.17148/IJARCCE.2017.61022
Abstract: Health being a very important issue nowadays, A major problem facing health care systems throughout the world is how to share medical records/data with more collaborator for more purposes, and we also ensure about data integrity and protecting patient privacy. With our study hospitals and the clinic will be able to give all control of medical records to patients and increasing accessibility of medical records and also enhancing the security of records through the power of Blockchain and cloud structure. Each and every patient will have its own secure manageable cloud space. Patients can store and manage medical records in their cloud health wallet anytime anywhere. The patient can replace hardcopy of medical records with their cloud medical wallet.
Keywords: Blockchain, Health Wallet, Medical Record, Cryptography.
Abstract
Handling Missing Values based on K-NN Imputation with Regression
R. Kavitha, S. Sandhya
DOI: 10.17148/IJARCCE.2017.61023
Abstract: The present information era needs knowledge discovery from the vast volume of data. As computer technology has developed to greater height, specifically the Internet led to bang of data. Data availability has gone beyond the human capability of absorption. This increase in enormous volume and varied data paves the way for advances in method to recognize, develop and summarize the data. The data set taken from the microarray experiments often contain some missing values which may primarily occur due to scratches or spots on the slide, dust, inadequate resolution, image corruption and hybridization failures. In this paper, a novel approach is proposed for estimating (predicting) missing values using k-NN regression imputation method to handle incomplete data set. The proposed work provides considerably better results when compared to existing work.
Keywords: k-NN with regression, missing value, data mining, microarray.
Abstract
Weather Forecast Voice System
Do Dinh Thanh
DOI: 10.17148/IJARCCE.2017.61024
Abstract: This paper introduces Weather Voice System applied to information commands-responses system through Public Switched Telephone Network (PSTN). Being able to understand users' voice commands, our system would assist them during their searching weather forecast in Vietnamese towns and cities by communicating in Vietnamese through Telephone Network. What makes this system different from others consists of its ability to analyze syntax and semantics of voice commands after their being recognized by speech recognizer component. Weather Voice is composed of main components that are there: 1) Telephone network communicator, 2) Vietnamese speech recognizer, 3) Natural language processor, and 4) Vietnamese speech synthetizer. To the best of our knowledge, this is one of the first systems in Vietnam to combine text language processing and speech processing. This event could make voice applications more intelligent with aim to communicate with humans in natural language at high precision and at quick speed. The fact that experiments have proved our expectation as well as the friendliness of the system to users reveals the practicality of our research.
Keywords: Voice Application, Natural Language Processing, Voice Server, Weather Voice.
Abstract
Lossless Image Compression using Remove Redundancy Technique
Rahul
DOI: 10.17148/IJARCCE.2017.61025
Abstract: Image compression is process to remove the redundant information from the image so that only essential information can be stored to reduce the storage size, transmission bandwidth and transmission time. The essential information is extracted by various transforms techniques such that it can be reconstructed without losing quality and information of the image. The development of transmission and digital imaging has junction rectifier to high amount of knowledge needed to represent fashionable im-agery. this needs giant space for storage, and durable for transmission over Computer networks, and these are comparatively high-ticket. These factors prove the necessity for pictures compression. compression addresses the problem of reducing the quantity of house needed to represent a digital image yielding a compact illustration of a picture, and thereby reducing the image storage/transmission time necessities. The key plan here is to get rid of redundancy data bestowed among a picture to scale back its size while not moving the essential information of it.
Keywords: Image Processing, compression.
Abstract
Lossless Image Compression using Remove Redundancy Technique: A Review
Rahul
DOI: 10.17148/IJARCCE.2017.61026
Abstract: Image compression is process to remove the redundant information from the image so that only essential information can be stored to reduce the storage size, transmission bandwidth and transmission time. The essential information is extracted by various transforms techniques such that it can be reconstructed without losing quality and information of the image. The development of transmission and digital imaging has junction rectifier to high amount of knowledge needed to represent fashionable im-agery. this needs giant space for storage, and durable for transmission over Computer networks, and these are comparatively high-ticket. These factors prove the necessity for pictures compression. compression addresses the problem of reducing the quantity of house needed to represent a digital image yielding a compact illustration of a picture, and thereby reducing the image storage/transmission time necessities. The key plan here is to get rid of redundancy data bestowed among a picture to scale back its size while not moving the essential information of it.
Keywords: Image Processing, compression.
Abstract
A Review Paper on Garbage Level Monitoring System for Smart Cities
Nimisha Singh, Prajakta Wagh, Neha Sameer Shahare
DOI: 10.17148/IJARCCE.2017.61027
Abstract: As the population is increasing day by day, the environment should be clean and hygienic. In many of the cities the overflowing garbage bins are creating an unhygienic environment. This further leads to arise of different types of diseases. To cope up with the situation, Shree Narendra Modi, PM of India has presented a unique example of a way to achieve cleanliness by launching a campaign popularly known as SWACCHHA BHARAT ABHIYAN (Clean India Mission) in which every individual irrespective posts and authority, has to maintain clean surrounding. In this contemporary busy world, it is almost impossible to maintain the clean and hygienic environment. To overcome these situations, we need to implement a smart garbage level monitoring system, which will alert the municipal corporation or higher authorities about the current level of garbage in different zones of cities. As level reaches its threshold level the alert is send to corporation. As the notification is received by the municipal corporation, the rag picking truck will reach to that dustbin and will empty the bin. Hence the bins are emptied before the garbage starts overflowing.
Keywords: ultrasonic sensor, wi-fi module, IoT.
Abstract
A Survey on Technical Challenges in Femtocell Networks
A. Kingsly Jabakumar
DOI: 10.17148/IJARCCE.2017.61028
Abstract: The phenomenon of improving the indoor coverage and enhancing network capacity to provide high data rate services in a cost effective manner is a major challenge to the next generation wireless communication. To overcome this challenge, the transmitters and receivers may be made closer to each other as per the traditional approach. But this may lead to installing several base stations. Hence, the home base stations, commonly called as femtocells, have to be used over a macrocell. Since the femtocells share the same spectrum, the interference mitigation among neighbouring femtocells and among femtocells and macrocell will be the major challenges in wireless networks. Hence, the aim of this survey is to analyze the technical challenges in designing femtocell networks such as access modes, handover, mobility management, self organization, security, timing and synchronization and interference management.
Keywords: Femtocell, technical challenges, interference management, survey, wireless networks.
Abstract
Enhanced Steganography in Encoded Video Streams using Multi Motion Vector Difference Model
Ms. Nanthini.D, Mrs. Sathiya Priya.T
DOI: 10.17148/IJARCCE.2017.61029
Abstract:
Keywords:
Abstract
Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness
Ms. Abirami.P, Mrs. Sangeetha B S
DOI: 10.17148/IJARCCE.2017.61030
In this paper analysis a DTNs backup network for infrastructure intensive areas or a low-cost communication structure in severe environments. This paper focus on distributed peer-to-peer file search in a delay tolerant network (DTN) formed by mobile devices, the holders of which exhibit certain social network properties. However, due to sparse node distribution and continuous node mobility, DTNs are featured by frequent network partition and intermittent connections. DTN Packet forwarding is often realized in a store-carry-forward manner in DTN routing algorithms, which means that a message is carried by current holder until meeting another forwarder. Furthermore, due to the distributed network structure, it is almost impossible to maintain global file distribution information in DTNs. In this existing we design three components in Contact and Content model: community creation, neighbor table construction and update and content and contact based file search. Common-interest communities benefit file searching from two aspects: (1) it increases the probability that a node finds its interested files in its own community since common-interest nodes tend to meet more frequently and (2) it can enable a request to learn the destination community directly. The neighbor table provides organized information regarding how to find the requested file efficiently and the propose system implement a advanced techniques that can further enhance file searching efficiency, thought at additional costs.
Abstract:
Keywords: DTN, store-carry forward, packet forwarding.
Abstract
SMS filtering in binary classification using Hybrid Approach of Data mining Techniques
Nikunj Chaudhari, Prof. Jayvala, Prof. Vinita Shah
DOI: 10.17148/IJARCCE.2017.61031
Abstract:
Keywords:
Abstract
The Best of the Machine Learning Algorithms Used in Artificial Intelligence
Indrasen Poola
DOI: 10.17148/IJARCCE.2017.61032
Abstract: Data Mining is the process of �Extracting� Use full information from large amount of Data. It is called the Data mining. Data mining is also called the knowledge discovery in Database today days Short Message Service(SMS) is the most popular way to communication for Short message Service for mobile phone user because it is the cheapest mode of Communication compare to other. The advantages to this Fact some company or Spammer used this service for marketing and send the unwanted Spam message to cell phone user and create the disturbance in communication and also consume the networked bandwidth so decrease the network efficiency. To Avoid this Problem SMS in this paper provide the Detail of hybrid Approach for Spam SMS filtering using Booyer more and SVM Algorithms which will help to overcome this Problem.
Keywords: Data mining; Spam SMS, filtering techniques, Evolutionary Algorithms.
Abstract
Topic Based Video Search and Visualization Techniques of Video Search Results- A Survey
Dr. R. Priya, Radhika Krishnan R
DOI: 10.17148/IJARCCE.2017.61033
Abstract: Today�s internet contains huge number of videos, due to the technology popularity, everyone using the social network to store and share the videos. This poses a huge challenge on the video search and retrieval. So, an effective technique to perform the video search and retrieval from large video repository is necessary in several applications. Currently, YouTube performs a best video searching process with several unique features. However, the complex query handling to retrieve accurate videos is more difficult. Data mining is the best way to handle such complex queries and visualizing them. This paper gives the survey about the problems associated with the video search and existing video search and visualization techniques. This paper gives the general description about the process of video retrieval and visualization process with hierarchical structures. Finally gives the solutions to perform effective video search.
Keywords: Video Search, Video Retrieval, Visualization, Hierarchical Structure, Visual Analysis.
Abstract
Automatic Bug Triage Using Data Reduction Technique
Assistant Prof. Pratima Patil, Tejas Shingte , Pranav Kamatkar, Prachi Tikar ,Sumit Kulkarni
DOI: 10.17148/IJARCCE.2017.61034
Abstract:
Keywords:
Abstract
Navigation System Using LIFI For Shopping Mall
Assistnat Prof. Sandeep Yadav, Rushikesh Bachal, Soniya Yadav Khusbu Saroj , Prithviraj Ingole
DOI: 10.17148/IJARCCE.2017.61035
Abstract: This paper shows an approach for remote information correspondence between two frameworks through unmistakable light. This approach makes a way which can make information transmission quicker than current remote correspondence innovation. Utilization of noticeable light for remote correspondence can fathom issue of absence of radio wave range space that will build the information transmission rate. The proposed framework exhibits transmission and gathering of information by turning LED on and off at high force which is too quick to possibly be seen by human eye. We can encode different information by fluctuating the rate at which LEDs flash also, transmit it. This paper depicts the plan, manufacture, and abilities of unmistakable light based information correspondence, and in addition the improvement of the LED and photograph sensor based optical remote correspondence framework. The information is to be send from one PC to another PC utilizing COM serial correspondence.
Keywords: Wi-Fi, Radio Spectrum, Li-Fi, Visible Spectrum
Abstract
Data Aggregation Mechanism For Distributed In Wireless Sensor Network
Dr. D. Francis Xavier Christopher M.Sc, MPhil (CS), PGDPM&IR, Ph.D., C.Akalya, MCA
DOI: 10.17148/IJARCCE.2017.61036
Abstract:
Keywords:
Abstract
Implementation of Intrusion Detection System in Cloud Environment Using Fusion Based Approach
Nishita Gangrade, Deepika Jain, Harish Patidar
DOI: 10.17148/IJARCCE.2017.61037
Abstract: Security of software system and network resources, data and information communications based on cloud computing environment has turn into a foremost problem for the improvement of cloud computing. based on the description and model of introduction of intrusion detection system(IDS), collective with characteristics of cloud computing, this paper use subspace partition and outline coefficient with intersect K-means algorithm, consequently it is probable to predict dissimilar types of attacks effectively. In the case lacking prior knowledge, it clusters events with the similar or comparable characteristics to determine unknown attacks, which has enhanced self-learning capability. Precise giving of this paper is as follow. Primary, it summarize cloud computing intrusion detection approach and proposes an enhanced intersect fuzzy intrusion detection technique and The proposed methodologies include fuzzy clustering, fuzzy clustering by local approximation of memberships based on ANN. The accessible anomaly-based approach is assessing by simulation experiments and comparison of the obtained results.
Keywords: Hybrid intrusion detection; Cloud computing, Distributed event correlation, security; complex event processing.
Abstract
Operation of Wireless Sensors for Premonition and Mitigation in Disaster
Pragati Jain, Sahana T.Edwin
DOI: 10.17148/IJARCCE.2017.61038
Abstract: Many areas of world are getting affected due to natural calamity. Disasters are exceptional & unstoppable events that are either man made or natural, such as terrorist attacks, earthquakes, wildfires and floods etc. Disasters create emergency situations to provide basic services to the victims must be coordinated quickly. Many times we observe that many people dies by trapping in these disasters but the people also dies on large scale just because they didn�t get help at instant time or the help provided to them is late. This project proposes a system based on Wireless Sensor Network (WSN) which is designed for human existence & detection in an unmanned area can be done only by an automated system. This system proposed a monitoring system using sensors unit and transmit data. Mobile robots perform cooperative Simultaneous human body localization function and communicate over the WSN. The main objective of this thesis is to rescue more & more number of people from the adverse condition.
Keywords: Wireless Sensor Network (WSN), Negative Temperature Coefficient (NTC), Positive Temperature Coefficient (PTC)
Abstract
Accuracy Assessment of Land Cover Classification in Jodhpur City Using Remote Sensing and GIS
S.L. Borana, S.K.Yadav
DOI: 10.17148/IJARCCE.2017.61039
Abstract:
Keywords:
Abstract
Spatial Inequalities in Accessibility of Public Amenities in Jodhpur City
S.L. Borana, S.K.Yadav
DOI: 10.17148/IJARCCE.2017.61040
Abstract: A broad range of socio-economic inequalities are commonly appear in the Indian cities. Such an undesirable occurrence reflect on the spatial variation of quality of life. The paper shows the ward-wise inequality in the distribution and accessibility of public amenities in a Jodhpur city. Inequality in the study area evident in the form of unequal provision of urban amenities within city. Provision of two urban amenities i.e. education and, health facility were studied. The Z-score was then used to determine the spatial pattern of provision of the two facilities in this study. The results of the analysis showed that inequalities exist in the provision of accessibility of education and health facility in study area. The paper suggests that local planning authority must keep pace with the urban sprawl in order to make certain the equitable distribution of public amenities in the city.
Keywords: Spatial, Public Amenities, Inequalities, Z-score, GIS.
Abstract
Maximum Power Point Tracking Control for Wind Energy Conversion System Using PID Controller and Fuzzy Logic
Ambika Sharma, Dinesh Kumar Arya
DOI: 10.17148/IJARCCE.2017.61041
Abstract: The use of wind energy has become an important part of world sustainable energy development. Wind energy systems are being studied much because of its great benefits as it�s an environment friendly and a sustainable source of energy. Due to it�s this erratic nature, power maximization concepts are necessary for extraction as much power as possible from the wind energy systems. In this paper some algorithms have been discussed to preserve the system at its highest possible plenty at all times and PID controller and Fuzzy Logic is applied. The algorithms have been used to obtain the operating points for transfer of maximum power. As such, so many maximum power point tracking techniques have been implemented and developed. These algorithms are studied and analysed, a comparative analysis and improvement is performed between PID MPPT and Fuzzy based MPPT.
Keywords: MPPT, Wind Energy, PID, Fuzzy Logic, MATLAB
Abstract
Implementation of WLAN network with strong authentication
HAWA HOCH DIRRANEH, HUI ZHOU
DOI: 10.17148/IJARCCE.2017.61042
Abstract: The Wi-Fi network is increasingly becoming a great technology, and it has excelled itself over the decade. Enabling users to access to the Internet and local networks of corporate or personal without cables�constraints. The current rate achieved through Wi-Fi network make it possible to transfer multimedia streams, but due to the wireless link itself, a strong security constraint also was imposed. The solutions used in wire networks are not adequate and efficient for WLANs. Thus, there is a great interest for me to find and implement the solutions specific to WLAN, even if sometimes they are inspired by an existing solution. The purpose of this article is to choose and deploy the most efficient solution on a test network through studying and analyzing the various authentication solutions on WLANs.
Keywords: Wireless Security, 802.1X, Radius, NPS, Attacks
Abstract
Performance Improvement of a Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle Using MATLAB
E.Juliet Priscilla Prof. Dr.K.Mathan
DOI: 10.17148/IJARCCE.2017.61043
Abstract:
Keywords:
Abstract
Misbehaving Node Identification using I-GTA in MANET
A. Sushma, T. Manjula, M.E
DOI: 10.17148/IJARCCE.2017.61044
Abstract: VANETs (Vehicular Ad-hoc Network) are characterized by a very dynamic topology with partial infrastructure support, patterned mobility, and mobile nodes with sufficient amount of resources, intermittent connectivity and varied channel behavior. For this purpose, we always use the location information that vehicles share among them through repetitive messages that are transmitted in the VANET system. This paper proposes a methodical approach to improve the Quality of Service (QoS) evaluation in wireless and mobile networks. In this proposed framework, we used novel schemes for secure transmission and big data collection in Vehicular Ad hoc Networks. Secure information collection scheme for big data in large scale IoV. Single sign-on algorithm for authentication are utilized with improved efficiency. The proposed secure data exchange algorithm using message digest and random key contributes to overhead reduction. The business data is transferred in plain text form while the confidential data is transferred in cipher text form. The collected big data will be processed using hadoop architecture to achieve the unified management. In experimental results the proposed secure information collection scheme achieves high efficiency and security for big data in large scale IoV.
Keywords: Vehicular ad-hoc network, Quality of Service, Security Mechanism, Big Data Collection.
Abstract
Respiration Monitoring System
D. Bala Tharani R.Rajeshkanna M.E
DOI: 10.17148/IJARCCE.2017.61045
No abstract available.
Abstract
Deriving Attribute Relationship for Big Data Security
Bindiya M.K, Dr. RaviKumar G.K
DOI: 10.17148/IJARCCE.2017.61046
Abstract:
Keywords:
Abstract
Prediction of Crime Safety Level of Particular Location
Prof. Archana Kadam, Ms. Diksha Mhaske
DOI: 10.17148/IJARCCE.2017.61047
Abstract: In today�s world most of the crime data is available in enormous volume, but proper filtering is required to get the knowledge from the data. In our system we are giving analysis of crime level for particular location of person�s interest. The existing solutions to crime are not sufficient to give the proper recommendation on the basis of the crime prediction. There is not a system available to give the proper judgment of the crime on the prediction basis. In this system we are using prediction technique to get the correct prediction of crime. Final report of crime will help person to understand what kind of crime is happening in particular region. This will help them to take the decisions of travelling, migrating for education, job etc. Our system will also recommend security of particular location i.e. hotspot areas and hence help the people to take right decisions.
Keywords: Crime Prediction, Hotspot, Crime analysis, Recommendation.
Abstract
Group Authentication Using Back-propagation Neural Network
Ms. Supriya K. Narad
DOI: 10.17148/IJARCCE.2017.61048
Abstract: In recent days, usage of internet is increasing so; authentication becomes the most important security services for communication purpose. Keeping this into consideration, there is need of robust security services and schemes. This paper proposes Group Authentication authenticates all users at a time belonging to the same group. The (n, n) Group Authentication Scheme is very efficient since it authenticates all users if they are group members. If they are nonmembers, then it may be used as a preprocess and apply authentication before and it identifies the non-members. Also, if any of the users present in group authentication is absent then the group is not authenticated at all, as each share is distributed to each user. It results in best authenticated system as the Group Authentication is implemented with Neural Network. So it becomes complicated for hackers to hack each neuron in a neural network. The Neural Network based group authentication is specially designed for applications performing group activities using Shamir Secret Sharing Scheme.
Keywords: Group Authentication; Backpropogation Neural Network; Shamir Secret Sharing Scheme.
Abstract
Dimensionality Reduction for Privacy Preserving Data Mining using Random Projection Perturbation Approach in Outsourced Environment
Vijayalakshmi Pasupathy, YamunaDevi S
DOI: 10.17148/IJARCCE.2017.61049
Abstract:
Keywords:
Abstract
Automatic Toll Collection System Using RFID & GSM Technology
Vishnupriya. R Dr.N.P.Ananthamoorthy
DOI: 10.17148/IJARCCE.2017.61050
Abstract: Most Electronic toll collection systems around the world are implemented using Dedicated Short Range Communication technology .The Automatic toll tax payment system is proposed and the amount transaction information sends to the cell phone of the motorists through the GSM modem technology. It is an innovative technology for expressway network automatic toll collection method. The aim of the project is to design a system, which automatically identifies an approaching vehicles and records vehicles number and time. The vehicle belongs to the authorized person, it automatically opens the toll gate and predetermined amount is automatically deducted from its account. Suppose the illegal entry through gate is observed, then it will be registered and providing the warning sound. Each vehicle will hold an RFID tag and it contain unique identification number assigned. Whenever the vehicle passes the toll booth, the amount will be deducted from his prepaid balance. New balance will be updated. Incase if one has insufficient balance, his updated balance will be negative one. The data information is exchanged between the motorists and the toll authorities, thereby enabling a more efficient toll collection by reducing traffic and eliminating possible human errors.
Keywords: RFID Tag, GSM, Automatic toll gate
Abstract
Segmentation in Manganethi Plant using Mathematical Morphology
Dr. A. Senthil Rajan
DOI: 10.17148/IJARCCE.2017.61051
Abstract: Weeds is a widely procedure to be remove in agriculture field. Often for the subsequent analysis of the weeds it is needed to measure the roots and size of the plant in terms of length. For this purpose segmentation and filtering techniques are used in a noise captured image.
Keywords: Filters, Segmentation, Noise, Weeds, Agriculture
Abstract
Improved Energy Efficient Routing Protocols for UWSN
Sizeriyan Azad, Ch Satyananda Reddy
DOI: 10.17148/IJARCCE.2017.61052
Abstract: Geographical Clustering Energy Efficient Routing Protocol (GCEER) protocol has been proposed for UWSNs. It is a geographic and opportunistic routing protocol. Increasing attention has recently been devoted to underwater sensor networks (UWSNs) because of their capabilities in the ocean monitoring and resource discovery. UWSNs are faced with different challenges, the most notable of which is perhaps how to efficiently deliver packets taking into account all of the constraints of the available acoustic communication channel. In this paper, we propose an enhanced routing protocol, called Geographical Clustering Energy Efficient Routing Protocol (GCEER). This address the void problem and the energy reliability trade-off in the selection of forwarding set. GCEER takes advantage of distributed beaconing, constructs the adjacency graph at each hop and selects a forwarding set that holds the best trade-off between reliability and energy efficiency. The unique features of GCEER in selecting the candidate nodes near each other leads to the resolution of the Using geographical information for distributing the queries to the appropriate regions which is done by neighbor selection on the basis of energy and the location to route the packet.
Keywords: Underwater sensors, opportunistic routing.
Abstract
Survey on the Open Shortest Path First (OSPF) Routing Protocols
Poovizhi. A, Mahalakshmi. B
DOI: 10.17148/IJARCCE.2017.61053
Abstract: Open shortest path first (OSPF) is the most commonly used intera-domain routing protocol. Open Shortest Path First (OSPF) is a link state routing protocol. In exiting different type of routing protocols can be extant, but the most well-known routing protocols are Routing Information protocol (RIP) and the Open Shortest Path First (OSPF). In this paper, surveyed OSPF protocols and algorithm. OSPF router saves path of the state of all the various network connections (links) between itself and a network it is trying to send data to. This makes it a link-state routing protocol. Open Shortest Path First (OSPF) is one of the most broadly used intra-domain routing protocol. The OSPF protocol does not provide efficient routing in terms of packet sending to achieve any network optimization neutral. The high cost of network assets and profitable and modest nature of Internet service provisioning. The service providers are absorbed in performance optimization of their networks. This help to reducing congestion network and improving resource consumption across the network, which, in turn, results in an increased income collection. One way of achieving this is through Traffic Engineering.
Keywords: Open Shortest Path First.
Abstract
Face Recognition Based on Multi- Scale Face Components by Artificial Neural Networks
Palak Jain, Lalit Chourasia
DOI: 10.17148/IJARCCE.2017.61054
Abstract: Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. Face recognition is a challenge in image analysis and computer vision and received a great attention in last few years. Here we have mentioned some of the face recognition techniques that are worth useful and there are many like these techniques. Recognizing objects from large image databases, histogram based methods have proved simplicity and usefulness in last decade. Initially, this idea was based on color histograms. For achieving the perfection in accuracy of proposed system, the merger of histogram and Phase-Only Correlation (POC) techniques is used in implementation of suggested system. For training, grayscale images with 256 bins are used.
Keywords: Face recognition, Phase-Only Correlation (POC) techniques. Processed Histogram Phase Only correlation. Principal Component Analysis (PCA). Olivetti Research Laboratory (ORL)
Abstract
Pothole Detection and Notification Using Smartphone for Self-driving Vehicles, Drivers and Road Authorities
Mr. Akash S. Kadam, Miss. Anjali H. Ghogare
DOI: 10.17148/IJARCCE.2017.61055
Abstract: World is developing rapidly, roads without pothole is challenge for the every country. Different countries have different strategy to develop roads. But bad roads lays many problems like accidents, slowdown the transport system, harm to vehicle and humans. Condition of roads indirectly effects on growth of the country. Hence there is need for such system that can detect potholes, notify the correct information of pothole to driver and driverless car and also notify to respective central service in order to repair the pothole. The proposed system is to detect the potholes using smartphones using inbuilt sensor (accelerator and gravity sensor).This system collect pothole information using step counting algorithm and send it to the central server, server processes data using simple machine learning algorithm and classify the potholes into different category .System will process data from thousands of smart phone and i.e. system takes experience of every smart phone and learn from it. Due to inheritance of experience system is much more accurate. This system is easy to implement with no any extra sensor, cost effective and gives accurate results.
Keywords: potholes, smartphone sensors, Autonomous vehicle, android application.
Abstract
Effective Security Model for Hybrid Cloud Using Multi-Replica with CPDP Approach
K.Vimala, K.Suganthi
DOI: 10.17148/IJARCCE.2017.61056
Abstract: World is developing rapidly, roads without pothole is challenge for the every country. Different countries have different strategy to develop roads. But bad roads lays many problems like accidents, slowdown the transport system, harm to vehicle and humans. Condition of roads indirectly effects on growth of the country. Hence there is need for such system that can detect potholes, notify the correct information of pothole to driver and driverless car and also notify to respective central service in order to repair the pothole. The proposed system is to detect the potholes using smartphones using inbuilt sensor (accelerator and gravity sensor).This system collect pothole information using step counting algorithm and send it to the central server, server processes data using simple machine learning algorithm and classify the potholes into different category .System will process data from thousands of smart phone and i.e. system takes experience of every smart phone and learn from it. Due to inheritance of experience system is much more accurate. This system is easy to implement with no any extra sensor, cost effective and gives accurate results.
Keywords: potholes, smartphone sensors, Autonomous vehicle, android application.
Abstract
Dynamic Reliable System for Reducing Collision in Vehicular Networks Using Fuzzy Logic
Harneet Kaur, Ms. Shivani Kwatra
DOI: 10.17148/IJARCCE.2017.61057
Abstract: This paper mainly concentrates on providing secure access of cloud data. As the data stored in the third party server maintains access permission details such that who can access the data. Since the access environment is cloud, multiple user may intends to store and fetch the data. Retrieval details of one user would not reveal to other users due to security reasons. Moreover, this paper provides the achievable security merits by making use of multiple distinct clouds environments with simultaneously in confidential mode. The dual encoding is carried out in the cloud environment which is varied from one group to another for secure data transmission process. Thus, different users are allowed to decode different pieces of data as per the security policy. This effectively eliminates the need to rely on the storage server for preventing unauthorized data access. The paper implements an algorithm namely Enhanced Multi Replica Strategy to CPDP (MRS-CPDP) control policies with user revocation capability. However, secure cloud storage system supports secrecy of the information.
Keywords: Hybrid Cloud, Security Metrics, Revocation, Multi Replica Strategy, CPDP, Hash Index Hierarchy.
Abstract
Efficient File Search for Social Ad-Hoc Networks with Self Replica Allocation Reduction Algorithm
K.Vimala, G.Punitha, V.Kruthika
DOI: 10.17148/IJARCCE.2017.61058
Abstract: In this paper analysis Social Ad hoc networks (SANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A SANET is a peer-to-peer multi-hop social wireless network that has neither a fixed infrastructure nor a central server. Each node in a SANET acts as a router, and communicates with each other. A large variety of SANET applications have been developed. For example, a SANET can be used in special situations, where installing infrastructure may be difficult, or even infeasible, such as a battlefield or a disaster area. A mobile peer-to-peer file sharing system is another interesting SANET application. In reality, however, some nodes may selfishly decide only to co-operate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. This paper examines the impact of selfish nodes in a social ad hoc network from the perspective of replica allocation. This is termed as selfish replica allocation. In particular, a selfish node detection algorithm is developed that considers partial selfishness and novel replica allocation techniques to properly cope with selfish replica allocation. The conducted simulations demonstrate the proposed approach outperforms traditional cooperative replica allocation techniques in terms of data accessibility, communication cost, and average query delay.
Keywords: Social Ad-hoc Network, Social Content, Replication Allocation, Reduction Model, SCF-T
Abstract
Urea Adulteration in Milk
P. V. Lokhande, S. S. Matsagar , P. P. Lokhande
DOI: 10.17148/IJARCCE.2017.61059
Abstract: The nutritional value of milk to human health needs no introduction. But it is alarming that many people are adulterating it with water, detergents, caustic soda, starch, formalin, urea, ammonium sulphate, sodium carbonate which have harmful effect on the human health. The greed for money has pushed them to the extent of producing synthetic milk which has no nutritional content. Many analytical techniques have been developed to qualitatively and quantitatively measure these adulterations. Focus on the quantification of urea which is one amongst the many adulterants and provide an exhaustive literature survey of the available techniques for doing the same.Milk being highly perishable product, it is desirable to test it at the earliest opportunity rather than taking it to laboratory for analysis. With this mindset propose a new technique to quantify the amount of urea in milk.
Keywords: Milk, urea, adulterants etc.
Abstract
Effective and Efficient High Utility Frequent Item Set Mining Using Modified LP-Tree Algorithm
P. S. Saranya, M. Narmatha M.Sc., M.Phil
DOI: 10.17148/IJARCCE.2017.61060
Abstract: Mining high utility item set from large database refers to the discovery of item sets with high utility like profits. Although a number of relevant approaches have been proposed in recent years, they incur the problem of producing large number of candidate item set for high utility item sets. Such a large number of candidate item set degrades the mining performance in terms of execution time and space requirement. The situation may become worse when the database contains large number of long transactions or long high utility item sets (HUIs). Utility mining is the best solution for the above problems explained. In utility mining, each item is associated with a utility (e.g. unit profit) and an occurrence count in each transaction (e.g. quantity). The utility of an item set represents its importance, which can be measured in terms of weight, value, quantity or other information depending on the user specification. The algorithm used here is Modified LP-Tree algorithm (Modified Linear Prefix Tree) for mining high utility item sets with a set of techniques for pruning candidate item sets. The information of high utility item sets is maintained in a special data structure named Modified LP-Tree such that the candidate item sets can be generated efficiently with only two scans of the database. This method not only reduces the number of candidates effectively but also out performs other algorithms substantially in terms of execution time, especially when the database contains lots of long transactions.
Keywords: Data mining, high utility item sets, Modified LP-Tree algorithm.
Abstract
A Study on Text Analytics and Categorization Techniques for Text Documents
S. Swathi, P. Lalitha
DOI: 10.17148/IJARCCE.2017.61061
Abstract:
Keywords:
Abstract
Avoiding Duplication of Encrypted Data on Big Data
Abhyuday Patil
DOI: 10.17148/IJARCCE.2017.61062
Abstract: Text Mining is termed as extraction of relevant yet hidden information from the text document. One of the essential concepts in the field of text mining is Text classification. Through the sudden growth in digital world and available documents, the task of organizing text data becomes one of the principal problems. The order issue need been broadly examined clinched alongside information mining, machine learning, database, and majority of the data recovery. On the foundation of quick majority of the data processing, we need made An investigation of backing vector machine in quick classification. Eventually Tom's perusing presenting that essential rule from claiming SVMs, we portrayed those transform from claiming quick arrangement. Similar investigation from claiming different order calculation may be done What's more this paper states that how SVM will be an powerful machine Taking in calculation for order. A hypothetical consider for SVM Furthermore other machine taking in systems might make found in this paper alongside their favorable circumstances Also Hindrances.
Keywords: Term Frequency, Inverse Document Frequency, NLP, Topic modeling, Entity recognition, Event Extraction.
Abstract
Survey on Data Lake System for Handling Exponential Growth of Multi-Structure Data
Abhyuday Patil
DOI: 10.17148/IJARCCE.2017.61063
Abstract: De-duplication is the way toward deciding all classes of data inside an informational collection that imply a similar genuine life/world element. The information accumulated from different assets may have quality issues in it. The idea to recognize copies by utilizing windowing and blocking procedure. The goal is to accomplish better exactness, great effectiveness and furthermore to decrease the false positive rate all are as per the assessed similitudes of records. De-duplication is a property which gives extra data of similitudes between the two substances. In this paper the essential concentrate is given on correct ID of copies in the database by applying idea of windowing and blocking. The goal is to accomplish better exactness, great proficiency and furthermore to diminish the false positive rate all are as per the evaluated likenesses of records
Keywords: Access control, big data, cloud computing, data deduplication, proxy re-encryption.
Abstract
Real Time Monitoring and Data Analytics of IoT Data Servers
Rohit Tapas, Prasoon Maurya, Dr. Poorna Shankar
DOI: 10.17148/IJARCCE.2017.61064
Abstract: In businesses today it is very important to understand the importance of real time monitoring of the data servers that are connected through internet and distributed globally. Such servers holds the real-time enterprise data which will be used to improve the business. To ensure peak performance of applications running on servers, the server hardware must be working well, the servers should be sized well to handle their workload, and there should be no resource bottlenecks. Hence, we have to make sure that these servers work properly without any faults. The servers should be properly monitored to ensure optimum throughput from the system. Server Monitoring helps understanding servers� system resource usage which can help in capacity planning and provide a better end-user experience. Logging can also be monitored to analyze the event occurrences. Performance and configuration monitoring is also mandatory to reduce the downtime of servers and increase the efficiency of processors. Server monitoring provides the data relating to operating system and when used in conjunction with other monitoring data from the application a true glimpse can be obtained into the working of the system. Our proposed system monitors services like CPU Usage, Memory Consumption, I/O, Network, Disk Usage, Processes, Component reachability etc. Moreover, alerts can be sent to authorities in various forms when a specified event takes place. Thus, the concerned authorities can make changes to keep the system up and running.
Keywords: Server, Monitoring, Services, Resources, Faults, Alerts
Abstract
Differential Count of WBC in Bone Marrow with Novel Features for Disease Diagnosis
Shri N .D.Pergad, Dr. S.T.Hamde
DOI: 10.17148/IJARCCE.2017.61065
Abstract:
Keywords:
Abstract
Towards Efficient Intrusion Detection using Deep Learning Techniques: A Review
R.Vani
DOI: 10.17148/IJARCCE.2017.61066
Abstract: Intrusion Detection Systems are core part of cyber security measures in all organizations. With increasing amount of data available online in digitized form, this has resulted in an ever growing need for stringent cyber security measures against data breaches and malware attacks. Rising number of attacks coupled with new variants of malware being released on a frequent basis require automated intrusion detection systems. With the state of the art performance of the Deep Learning based Models in the field of computer vision, natural language processing and speech recognition, Deep learning techniques are now being applied to the field of cyber security. The review classifies the Deep Learning models and examines 23 papers in which Deep Learning has been efficiently implemented in Intrusion Detection Systems.
Keywords: Deep Learning; Intrusion Detection Systems; Anomaly Based Detection; IDS
