VOLUME 4, ISSUE 4, APRIL 2015
N-Grams and Neural Networks in Early Virus Warning
Mohamed H. Almeer
Analysing the Effects of Transmission Range of Base Station on Mobile WiMAX Network Transport Layer Protocols
Zayed- Us- Salehin, Md. Javed Hossain, Mohammed Humayun Kabir, Md. Bellal Hossain
Testability Estimation of Object Oriented Software
Shweta Sivastava, Dr. Majhar Khaliq
Face and Foreground and Background Detection Estimation Using Adaptive Based Algorithm In Real Time Video’s
Annapurna Uma Gayathri, DR. Sivabalakrishnan
Enhancement of Quality of Visible And Infrared Images Using Genetic Algorithm
Rimpi Mahajan, Dr. Ajay Kumar and Dr. Parveen Lehana
Face Recognition System Invariant to Plastic Surgery
Kshitij Umredkar, Prashik Wagh, Akhil Bhoir
A Survey on Energy Efficiency of Data Transfering for Mobile-Sink In WSN
E K Girisan, Priyanka B
Design of Six Slotson Microstrip Patch Antenna
M.Minupriya, P.Kalaivani, C.Rajarajachozhan
Traffic and Criminal Vehicle Detection using Smart Phone
Prof. R.S.Badodekar, Snehal Dere, Ninny Kachirayil , Anuja More, Pooja Sharwale
Efficient fuzzy type Ahead search in XML data
Prof. A.P.Kulkarni, Akash Chaporkar, Prathamesh Chavan, Harshad Dahiwadkar, Yogesh Kale
Agent Commitments and Ranking of Commitment Protocols
Harjot Kaur, Harpreet Kaur
Text Localization and Recognition in Natural Scene Images
Mona Saudagar, S. V. Jain
A Survey Of Secure Data Transfer In Disruption Tolerant Military Network
E K Girisan, Shidha S
Resource Discovery and Load Balancing in Grid Environment
Bhairavnath Jadhav, Riyaz Shaikh, Irshad Sagar
Analysis of Agriculture Commodity Prices using MapReduce Model
Roopam Dad, Nikhil Shanmugam, Prapti Singh, S.M Nalawade
An approach for identification using ear and face biometrics employing score based image fusion and SIFT feature detection in surveillance system
Akash Pal, Avinandan Sau, Debolina Das, Sukanta Shrama, Madhuchhanda Dasgupta
Adiabatic Vedic Multipler Design Using Chinese Abacus Approach
Diksha Ruhela, Dr. Malti Bansal
Agriculture Supply Chain Management Based Android Application
Monika Chirmade, Komal Tayade, Gaurav Sham Bankar, Shounak Sugave
FPGA Implementation of Point Processing Operation using Hardware Simulation
MS. Dipika S.Warkari, DR.U.A.Kshirsagar
Test data compression and optimal power seed selection for Scan Power Reduction
G.Pavithra Devi, K.S.Neelukumari
Texture Analysis using Markov process with Bayesian Approach
N.Palanivel, P.Keerthika, K.Yazhini, P.Thamizhini
Automated PCB Drilling Machine With Efficient Path Planning
Shaikh NoorFarooque, Ansari Mohammed Faizan, Javed Shaikh, Pragati Pal
Reversible Data Hiding For Image Encryption
Aakanksha D. Londhe, Sneha R. Nigam
Defending Against Attacks in MANETs using Cooperative Bait Detection Approach
M. Ahmer Usmani, Manjusha Deshmukh
Saasprin Saas based accounting made easy
Praveen Shukla, Kunal Singh, Monika Pandey, Narendra Kumar, Prof Seeta Yadav
3D SECURE PASSWORD
Ashwini Sakpal, Kalpana Lande, Pooja Yeole, Prafull Kalokhe, Shrikant Sanas
Extensive Performance Analysis of AODV and Modified AODV for Link Stability and Network Life time in MANET
Yatin Rana, Umang Soni
Review:Performance Evaluation of Various Burst Mapping Algorithm for WiMAX Systems
Rikesh Patel, Marry Grace
ARM Controller Based Image Steganography Using LSB Algorithm
Pallavi Sunil Narule, Neha Dnyandev Patil, Priyanka Subhash Kurade, P.D.Patil, J.M.Waykule
Pattern Search Based Dimension Optimization of a Rectangular Inset-Fed Patch Antenna for Minimized VSWR and Return Loss
Prateep Kumar Sengupta, Anirban Neogi
Multi Server Password Authentication by Key Exchange Protocol in Secure Manner
S.A.Deshpande, Pawar Vishal, Rane Ashwini, Gite Supriya
A Neural Approach for Sclera Vein Recognition
Sreenith.K.S, S.Senthamilarasu
Classification of Human Eye Image using Different Methods for Medical Applications
D. Ram Nivas, T. Manigandan
Image Retrieval Using Its Visual Properties
Poonam Jundhale, Shraddha Kshirsagar, Poonam Khengale, Sonam Thorat
A Literature Review on Timetable generation algorithms based on Genetic Algorithm and Heuristic approach
Anisha Jain, Ganapathy S C Aiyer, Harshita Goel, Rishabh Bhandari
Data preprocessing approach for removal of direct and indirect discrimination
Prakash Kumar, Kapil Patil, Aditya Patnurkar, Prof. Alka Londhe
Lung Cancer Detection System on Thoracic CT Images Based on ROI Processing
Ms.Gangotri Nathaney, Prof.Kanak Kalyani
Matching Infrared Face Images to Optical Face Images using LBP
Kamakhaya Argulewar, Shweta V. Jain
Object and Scene Recognition in an Android based Mobile Application
Ms. Sonali Bhandari, Ms. Sonali Maid, Ms. Sonam Malve, Mr.Hardik Thakkar, Mr.Nilesh Sonawane
Design and Implementation of QoS in WiMAX Module using Two-ray ground and Shadowing Mobility Model under NS-2
OjasviChhaniwal, Ms. MinakshiHalder
Stimulated Raman Scattering Analysis of Wavelength Division Multiplexing (WDM) Channels in Optical Fiber Authors
Poonam Kumari, Abhishek Tiwari
Remotely Operated Underwater Vehicle for Metal Detection
Divya K, Abdul Latheef, Keerthi C, Clint A
An Architecture for Network Intrusion Detection System based on DAG Classification
Sunil Choudhary, Pankaj Dalal
Prolonging Lifetime of Wireless Sensor Network using Evolutionary Algorithms
Meena Ahlawat, Ankita mittal
MPPT using Fuzzy Logic Controller for SEPIC Converter and Three Phase Inverter
Anusuya.V, Vishnupraba.G
A Comparative Study of Reversible Watermarking Techniques
Abhishek Patanwar, Shikha Singh
Implementation and Comparative Study of PGRP,PS,VS,Modified PGRP
Miss. Vaishali k. Kosamkar, Prof. V. M. Deshmukh
Review Paper on System for Voice and Facial Recognition using Raspberry Pi
Pallavi V. Hajari, Ashwini G. Andurkar
Analysis and Evaluation of Quality Metrics in Software Engineering
Zuhab Gafoor Dand, Prof. Hemlata Vasishtha
Implementation of Area Optimized Advanced Encryption Standard
P.Kishore Raju, G.Nirosha, K.Bhargavi, S.Anjaneyulu
Medi Minder: A Blood Sugar Monitoring Application Using Android
Supriya H S, Mrs. Rekha R J
Ranking Algorithm
Viraj Anchan, Sarang Deshpande, Deep Doshi, Akshat Kedia
SIMBA – Search Images By Appearance
Mrinaldeep Chakravorty, Bijoyeta Roy
Mobile LAN-Controller
Shiva Shree Nagendra R, Bhat Geetalaxmi Jairam
Generic Rules-based Engine for Indian Card Games
Piyush Dargopatil, Ketaki Kadlaskar,Pallavi Chapole, Pooja Khaire
Analysis and Detection of Diabetic Nephropathy based on basement membranes of capillaries in kidney
Dr. Ramesh R. Manza, Ms.Yogini B.Patil
Design and Implementation of Efficient MLDD for Error Detection and Correction
Ms. Minal M. Jaiswal, Prof. Ashish E. Bhande
Hand gesture recognition system
Prof. Praveen D. Hasalkar, Rohit S. Chougule, Vrushabh B. Madake, Vishal S. Magdum
Automatic Domain Module Extraction using Machine Learning Approach from Electronic Textbooks
C. Vishnu priya, S.V.Hemalatha
Agent Reproduction In Artificial Society and Reproductive Schemes
Kawaljeet Kaur, Harjot kaur
Security Techniques in Wireless Sensor Networks : A Survey
Chanchal Yadav, Raksha K, Supriya S. Hegde, Anjana N.C, Sandeep Kumar E
Survey of Computational Trust and Reputation Models in Virtual Societies
Manpreet Kaur Shergill, Harjot Kaur
Web Image Re-ranking using Query Specific Semantic Signatures
Prof. A.G. Dongre, Anand Kumar Dubey, Rohin Bhat, Vijay Thombare, Maruti Bote
Big-SoSA:Social Sentiment Analysis and Data Visualization on Big Data
Mahalakshmi R, Suseela S
Application of Fractional Calculus in Analog Signal Processing Circuits
Chhavi Kumar Bharti, Shelender Singh, Ashish Ranjan
Norms in artificial agents society : A Review
Amarjeet kaur, Harjot kaur
Radio Packet Efficiency in Access Network
Abhishek Garg, Sunny Sakya
Design approaches for Obstacle Avoiding Rectilinear Steiner Minimum Tree: A Comparative Study
Mamatha G
Survey of E-Learning: Content Personalization
B.Yogesh Babu , G.V. Sriramakrishnan, G.Visvanathan
Performance Analysis for OFDM System Using Fourier Transform and Zero-forcing Channel Estimation on Different Modulation
Qusay Jalil, S Nagakishore Bhavanam
Energy Efficient Routing in Zigbee Wireless Sensor Network- A Review
Kavita Malav, Deepak Gupta, Vernon Murray
Design of Reversible Logic ALU using Reversible logic gates with Low Delay Profile
Monika Rangari, Prof. Richa Saraswat, Dr. Rita Jain
Performance analysis of Raman LIDAR (Light Detection and Ranging) for detecting remote trace explosives
Aishwarya Singh, Anupama Bhattacharya, Sangeetha N
Realization of Printed Monopole Antenna for Dual Band Application
Gaurav Kulkarni, Rahul Pandey, Mrunali Kothavale,Meghna Nair
Miniaturization of Microstrip Patch Antenna using Special Shaped DGS, Stub & Slots
Juin Acharjee, Vishakha, Mrinmoy Chakraborty
Buffer Sizing for Mixed TCP and UDP Traffic
Vinoth Raj S, Thiruchelvi G
Efficient Utility Based Infrequent Weighted Itemset Mining From Transactional Weighted Datasets
J.Jaya, S.V.Hemalatha
Privacy Preservation for Microdata by using K-Anonymity Algorthim
Sowmiyaa P, Tamilarasu P, Kavitha S, Rekha A, Gayathri R Krishna
A survey on variants of LEACH in WSN
Mr.Shreesha Bhat, Mr.Vasudeva Pai, Mr.Pranesh V.Kallapur
Study on Big data with Data Mining
Shobana.V, Maheshwari.S, Savithri.M
Cooperative Spectrum Sensing: Two-sample Kolmogorov-Smirnov Test under Rician Fading Channel
Serkan Özbay, Ergun Erçelebi
Extraction Of Unsupervised Web Data Using Trinity
V.Priyadharshini1, K.Tharamaraiselvi, S.Kavitha, B.Sivaranjani
Impact of Scaling Digital Circuit Design Technology on Solid State Logic Style Selection
Sachin Tyagi, Suhail Siddiqui
System on Programmable Chip Based Serial Communication
Surekha.K.S, Jyoti Chavan, Harendra Singh, Deepshikha Phogat
A New Technique for ECG Telemedicine Data Security and Privacy Using Digital Signature and XML Database
Md. MominReja, Sonia Corraya, UmmeSaymaBusra
A Review on Genetic algorithm to deal with Optimization of Parameters of Constructive Cost Model
Sonam Bhatia , Aanchal Bawa , Varinder Kaur Attri
Design and Implementation of SPI with Built-In-Self-Test Capability over SPARTAN 2
G.Sai Ram, G.Ravi Chandra, K.mohan rao, G.prameela, B.hemanth Nag
Deployment of Mobile Application for Multiplatform Operating Systems
Sayali Kamble1, Mitali Joshi1, Shreya Kale, S. Mahajan
A Review on Agent Oriented Software Engineering
Aanchal Bawa, Sonam Bhatia, Varinder Kaur Attri
Understanding the Aging Leader and Challengers Concept in PSO and its Applications
Anu Sharma, Mandeep Kaur
Incremental Development of Geographical Routing Protocols for WSNs: A Review
Kavita Khatkar, Neera Batra, Rishi Pal Singh
The Exposition of Enigma Software Defined Networking
Mansimar Singh, Gurpreet Singh
Eradicate Inconsistencies and Gaffe from Data Sets Using Data Sanitization
Dr.B.V.Subba Rao, G.reshma, L.Ravi Kumar, K.Swarupa Rani, D.Anusha
Data Hiding Using Visual Cryptography for Secure Transmission
S.M.Poonkuzhali, M.Therasa
Video Stabilization for Micro Air Vehicles
Karra Somasekhar Reddy, Lokesha.H, S.Akhila
Enhancing the Efficiency of IPv6 Tunnelling Mechanism by using Header Compression over IPv6 Header
Dipti Chauhan, Sanjay Sharma
Data Leakage Prevention by KDD-99 Intrusion Detection System
Dev Desai, Rohan Vadsola, Mihir Brahmbhatt, Nayan Mali
Inferring Multiple Search Goals Under the Implicit Guidance of Users
P.Bhavani, C.Kanimozhi, D.Bavya, S.Gokulavani
Impact of Jamming Attack in Vehicular Ad hoc Networks
Rohini Rawat, Dr. Deepti Sharma
A Comprehensive Review on Vehicular Ad hoc Network
Anuradha Singh, Mintu Singh
Using Fuzzy Logic Avoid Congestion and Buffering To Provide Intellectual Data Traffic Administration for Internet
Mr.Chougule Meghraj Balasaheb
Detection and Classification of Cardiac Arrhythmias based on ECG and PCG using Temporal and Wavelet features
Nabina N Rawther, Jini Cheriyan
Prevention Mechanism for Denial of Service in Web Application Services
Dr. D. Loganathan, K. Ramesh
A Review on Algorithm of Admission Control of Call in Cellular Networks
Vrushali N. Khairnar, Dilip S. Patil
Facial Expression Recognition Using Facial Movement Features
Abhay Fegade, Dashrath Godbole, Priyanka Sonawane, Sayali Munde, Prof. P.P.Ahire
Comparison of Free Space Optical Communication System With And Without Pointing Errors
Alina Sunny K, Karunakaran Nair
Security Enhancement Approach For Data Transfer Using Elliptic Curve Cryptography And Image Steganography
Sudipta Sahana, MadhusreeMajumdar, Shiladitya Bose, AnayGhoshal
Privacy in Offloading Data from Mobile to Cloud
Shiv Kanth B, Sriram N, Deepak S
A Study of Retinal Blood Vessel Extraction from the Retinal Images
Sandeep Singh, Dr. Dinesh Kumar
Mitigation of Threats using Secure SDLC
Ekta Bhardwaj, Devendra Kumar
Reliable Packet Transmission over Multi-Hop Wireless Network
Prof. S.A.Bhuskute, Ayesha Mulla, Komal Mohite
A novel approach for key rehabilitation using modified WEP algorithm for VANETs
Viswanatham Subbaiah, Arathi R Shankar, Bhargav Raman S
Opinion Mining Using Fuzzy String Searching
Ms. Prerna Tekchandani, Mr. Avinash Dhole
Text Processing Mechanism in EduICR System
Dung Minh Pham, Binh Van Huynh
Real time monitoring of crop growth using soil moisture sensor
Prof. Ajay V. Raipure, Dr. S . M. Deshmukh, Dr. Ashwinikumar P. Dhande
WSN Monitoring of Weather and Crop Parameters for Possible Disease Risk
Pratik Birmal, Mahesh Ware, Sagar Bhandari, Kushal Awaghad
Image Processing Techniques for Automatic Detection of Tumor in Human Brain Using SVM
Mr. Ajaj Khan, Ms. Nikhat Ali Syed
Shortest Path Computing Using Sketch Structure
Komal Ramteke, Swati Ramteke, Rajesh Dongare
Comparative Study of Various Frequent Pattern Mining Algorithms
Amit Mittal, Ashutosh Nagar, Kartik Gupta, Rishi Nahar
Mining Signatures from Event Sequences
S.H.Rajput, Chetan Jadhav, Yogesh Deshmukh, Sandip Sonawane, Hemant Jadhav
Enhanced User Motion Detection Using Multiple Smartphone Sensors
Amit Thakore, Prof. Srushti P. Soni
Measurement and control of industrial parameter using Zigbee
Associate Prof. D.G.Chougule, Ms.Rachana B.Thombare
A Review: Process Scheduling Approach for Starvation Improvement with Time Delay Analysis in Grid Resources Allocation
Er. Himanshu Jain, Kavita Khatkar
Comparison of Information Hiding by LSB Using Arithmetical Sequence on different image Format
Bassam Hasan Saghir, Elsamani Abd Elmutalib Ahmed, Abdelmajid H. Mansour, Gafar Zen A. Salh
A New Hybrid Binarization Algorithm for Manuscripts
Ashraf Nijim, Muhammad AboKresha, Ayman El Shenawy, Reda Abo Alez
Design of Sierpinski Gasket Fractal Antenna using Proximity coupled feed mechanism for Multiband Applications
Ashish Dhankhar, Jaswinder Kaur
Wireless Sensor Network Based Irrigation Management System
Associate Prof.B.T.Salokhe, Miss Shilpa G. Gadekar
Extended Bandwidth Allocation in Cloud Computing
Ganesh Sherkar, Suraj Pathak, Dhananjay Newaskar, Swapnil Bhakare, A. P. Kulkarni
Window ReFS File System: A Study
Ms. Santwana Gudadhe, Mrs. Radha Deoghare, Ms. Pallavi Dhade
Functional Analysis of Platform as a Service (PaaS)
Gagana P, Vaishak Sundaresh
Design and Analysis of Low Power High Performance 32-bit Ripple Carry Adder with Proposed Adder Cell
K. Bhaskara Rao, K. S. Kiran Kumar, G.Venkata Subbaiah
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein
Saranya.K.R, Vanitha.S, Selva priya.G, Minojini.N, Nivi.A.N
EDDDS: An Efficient Duplicate Data Detection System
Bhavana Dhake, Dr.S.S.Lomte, Prof.Y.R.Nagargoje, Prof.R.A.Auti, Prof.B.K.Patil
Optimization of Mobile Applications in Mobile Cloud Computing (MCC)
Kuljeet Kaur, Dr. Pankaj Deep Kaur
Colour Sensor Based Object Sorting Robort Using Embedded System
Dhanoj M, Reshma K V, Sheeba V3,Marymol P
Schwa Deletion: Investigating Improved Approach for Text-to-IPA System for Shiri Guru Granth Sahib
Dhanoj Sandeep Kaur, Dr. Amitoj Singh
Financial Analysis Simulation of Marketing Commodities
Avijit Jain, Amit Pathak, N Farheen Safoora, Neantha Louiza Vaz, M Prajakta
Relieve the Stress by using an Android Application
Mrs.Hanumanthappa H, Mrs. Arudra A
Switching from Vendor Lock-in to the Meta Cloud
B. SandhyaRani, Patil. SivaChandrika
Implementing Multiprime RSA Algorithm to Enhance the Data Security in Federated Cloud Computing
Dr.M.Srivenkatesh, Ms.K.Vanitha
A Secure Development Scheme of the Hash Function and its Implementation in Public Key Cryptography for Maintaining the Privacy of Data in the Federated Cloud Computing
Dr.M.Srivenkatesh, Ms.K.Vanitha
Low Power Array Multiplier using Modified GDI Cell for Full Output Swing
Mrs. Veenadevi SV, Rajavenu Pidi
Design of =100Gbps Based Optical AP-DCDM Network
Naina Khanna, Ayoush Johari, Dr. Soni Changlani
Abstract
N-Grams and Neural Networks in Early Virus Warning
Mohamed H. Almeer
DOI: 10.17148/IJARCCE.2015.4401
Abstract: This paper proposes an intelligent first-warning system for virus code detection based on neural learning in an artificial neural network (ANN). The system operates in accordance with the basic principles of ANNs for pattern matching, in which the detectors detect a virus signature after training by means of analysis of the byte content of the executable code. ANNs provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data. The proposed system is capable of accurately detecting virus codes learned by training, and gives false positive ratios within acceptable ranges. The results of experiments conducted indicate that the combination of N-grams and neural networks results in a low false positive rate. The key ideas and approaches necessary for adaptation and adjustments when implementing a neural network model as an underlying early warning virus detection system are also discussed.
Keywords: neural networks, virus recognition, N-grams, antivirus software, ClamAV
Abstract
Analysing the Effects of Transmission Range of Base Station on Mobile WiMAX Network Transport Layer Protocols
Zayed- Us- Salehin, Md. Javed Hossain, Mohammed Humayun Kabir, Md. Bellal Hossain
DOI: 10.17148/IJARCCE.2015.4402
Abstract: All wireless cellular networks suffer with reliability issue which is directly connected with the Transport Layer Protocols, and also selection of proper Transmission Ranges for the Base Stations. In this paper we study through extensive simulation scenarios, the effects of Transmission Range of BSs for two prominent Transport Layer Protocols- Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) respectively over mobile WiMAX networks. The NIST WiMAX module is used to configure WiMAX environment in NS-2. The QoS metrics used to evaluate the performance are Packet Delivery Ratio (PDR), Throughput, Normalized Routing Overhead (NROH) and Average End to End Delay. Simulation results reveal that performance increases with increasing the transmission range of the BSs up to a certain range, after that range it degrades. Throughputs are almost similar for both TCP and UDP but TCP shows more stability and its reliability may prefer it for most of the applications.
Keywords: Mobile WiMAX, TCP, TCP New Reno, Transmission Range, Transport Layer Protocols, UDP.
Abstract
Application of Genetic Programming for Pattern Recognition
Mansoor Farooq
DOI: 10.17148/IJARCCE.2015.4403
Abstract: Genetic programming combines and extends discrete decision theory with the principles of genetic and natural selection. The programs may be in the form of decision trees or diagram. The decision trees and diagrams are used in many discipline, genetic programming has many applications. Among those applications is pattern recognition. Different genetic programming techniques exist. This section describes a general technique for programs that use mathematical function. A function is routine that take one or two arguments, performs some function and returns value. The arguments with the routine are also functional routines, the resulting programs is like a tree in which each node represents a functional routine and each subtree an argument. Genetic programming with subtree crossover technique will be used that evolves a population over much iteration until some termination is satisfied. During each iteration the existing population is replaced by a new population that is derived from the existing population. The primary operations of reproduction and crossover are used for all problems. The two operations were sufficient for most of the problem to which the technique was applied in [9]
Keywords: Genetic Programming, Crossover, Decision Tree, Decision Diagram and Pattern Recognition
Abstract
Testability Estimation of Object Oriented Software
Shweta Sivastava, Dr. Majhar Khaliq
DOI: 10.17148/IJARCCE.2015.4404
Abstract: Software developers and quality controllers need to read and understand source programs and other software artifacts. The increase in size and complexity of software considerably affects a number of quality attributes, especially effectiveness and testability. False analysis frequently leads to ambiguities, misunderstanding and hence to faulty development results. Regardless of the fact that software testability is very important and one of the most considerable components of the software development life cycle, it is weakly managed. This is mostly due to the lack of its proper supervision and control. The study highlights the importance of testability in general and as a factor of software quality. Two most important contributions are made in the paper. A relation between object oriented testability factors and properties has been established as a major contribution. Finally, a model has been proposed for estimating testability of object oriented software using design metrics.
Keywords: Software Quality, Software Design, Software Testability, Complexity, Effectiveness
Abstract
Face and Foreground and Background Detection Estimation Using Adaptive Based Algorithm In Real Time Video’s
Annapurna Uma Gayathri, DR. Sivabalakrishnan
DOI: 10.17148/IJARCCE.2015.4405
Abstract: This paper presents near to estimate the background and foreground detection. In moving objects victimization mobile camera�s to notice the human behavior or notice the external body part. In real time mobile camera�s it's tough to implement. It�s each applicable to static and dynamic background image frames of real time video victimization mobile camera. It�s supported video closed-circuit television, a true time mobile camera is employed in dynamic and wider manager vary. The advantage is while not previous data of camera motion it estimate the background and notice the foreground, hue channel information and finding occlusion within the video. Rather than victimization balloting primarily {based} rule accommodative based rule is employed. It brings home the bacon the information measure utilization and potency.
Keywords: Background estimation, foreground detection, hue, occlusion, real time video using mobile camera
Abstract
Enhancement of Quality of Visible And Infrared Images Using Genetic Algorithm
Rimpi Mahajan, Dr. Ajay Kumar and Dr. Parveen Lehana
DOI: 10.17148/IJARCCE.2015.4406
Abstract: In this paper, genetic algorithm has been investigated for the enhancement of the visible and infrared images. The algorithm was effective as the contents of the images became clear with the successive iterations. The algorithm was applied on the image for 200 random DNAs with successive iterations. The analysis of the results showed that the quality of images get enhanced with the successive iterations.
Keywords: Genetic Algorithm, Image Enhancement, DNA.
Abstract
Face Recognition System Invariant to Plastic Surgery
Kshitij Umredkar, Prashik Wagh, Akhil Bhoir
DOI: 10.17148/IJARCCE.2015.4407
Abstract: The importance of biometric authentication is increasing rapidly because it verifies the claimed user identity. There are different types of biometrics available such as finger print, facial scan, retinal scan, voice print. From these, face is one of the most commonly used biometric. Hence the development of face recognition system seems to be useful. There are many techniques people use to evade their identification. Plastic surgery is one of them. Plastic surgery is a surgical procedure to correct the facial anomalies or to improve the appearance of the face. Matching of images before and after the plastic surgery process is the difficult task for automatic face recognition systems because of the wide variations created due to plastic surgery. Facial plastic surgery changes facial features to large extend and thus creating a major problem to face recognition system. This paper proposes a method to match before and after surgery images so one can prove the identity. For this image is divided in to different granules and features are extracted using SIFT and Efficient LBP to get different information�s from the face granules. The features are selected using SWARM Optimization feature selection algorithm.
Keywords: Plastic surgery, SIFT, Efficient LBP, Local binary pattern, SWARM Optimization Algorithm.
Abstract
A Survey on Energy Efficiency of Data Transfering for Mobile-Sink In WSN
E K Girisan, Priyanka B
DOI: 10.17148/IJARCCE.2015.4408
Abstract: Wireless Sensor Networks (WSN) consists of number of sensor nodes which arranged in the wireless communication for transfer the data to avoid energy consumption. It provides the service to the network user to share the data between the users. With better transfer of data it must contains better energy consumption, and also to avoid the traffics. To achieve this better transferring of data many strategies were designed like mobile sink protocol and some other strategies were developed to transfer data through cluster node in the mobile sink approach. They were concentrated only on the transfer of data problem but failed to concentrate the energy consumption while routing. For this analysis, this survey we analyzed how to consume the energy of the each cluster nodes by electing Mobile Sink Nodes (MSN) in WSN. Mobile Sink is one which has a long-lasting life for transfer data from source to destination node in WSN. For this approach this survey shows the various researchers issues and their benefits.
Keywords: WSN, Energy efficient, Mobile Sink, Cluster node and Data transfer.
Abstract
Design of Six Slotson Microstrip Patch Antenna
M.Minupriya, P.Kalaivani, C.Rajarajachozhan
DOI: 10.17148/IJARCCE.2015.4409
Abstract: In this paper a microstrip slot patch antenna is designed for WLAN applications. The antenna is designed to operate at 2.4GHz using the Advanced Digital System(ADS) software. The proposed antenna is designed and fabricated usingFR4 substrate with the design specification dielectric constant of 4.6 and thickness (d) of 3.2mm. The antenna produces gains of 3.75dBiand a directivity of 6.58dBi at 2.4GHz which suitable for WLAN applications.
Keywords: ADS, FR4, WLAN, Patch.
Abstract
Traffic and Criminal Vehicle Detection using Smart Phone
Prof. R.S.Badodekar, Snehal Dere, Ninny Kachirayil , Anuja More, Pooja Sharwale
DOI: 10.17148/IJARCCE.2015.4410
Abstract: Nowadays, people use the radio channels and phone lines to inform the department about the traffic information. These information are fed and retrieved by the radio channels to distribute all over the city. Our system completely focuses on customers, our employees, growth, innovation and efficiency. All of these elements will drive us towards success and show us as one company that can perform and give value for money. Today, Mobiles are the most easily available communication devices.Traffic control system can be automated by using the mobile based system. Every user in the system will have to register in this application. There are four types of users in this application. Traffic police after login will set the location of the signal and once its set then the data captured from their will be set in the server which will be thrown to normal users. Traffic police will have an user interface where they can punch in the current status of the traffic at that location. Similarly, all different location will set their own status and based on that the results will be shown to user. Car entry module is accessible to traffic police as well as regional police to enter the data of criminal vehicles and stolen vehicles which get stored in centralized server. So they get an option to fed in the data of car and their car number. Every toll and parking area will be using a web based system which will help them to enter the data of vehicle which is passing on from that junction. After entering the vehicle number, it will automatically check in the server whether the vehicle is clean or its involved in some or the other criminal activity. Based on it the result will be displayed on the users screen and if its really criminally involved vehicle then a provision to the user is provided that they can push a message to the concern police department. User traffic view module will facilitate the user to retrieve the data from the server and will display the live and current status of the traffic at different location.
Keywords: Smart phones ; GPS; Algorithms.
Abstract
Efficient fuzzy type Ahead search in XML data
Prof. A.P.Kulkarni, Akash Chaporkar, Prathamesh Chavan, Harshad Dahiwadkar, Yogesh Kale
DOI: 10.17148/IJARCCE.2015.4411
Abstract: In conventional keyword based search system over Xml data, user takes a query, submit it to the system and getting relevant answer. User has limited knowledge about the data when issuing queries, and has to use a try and see approach for finding information. This paper focus on the survey of fuzzy type-ahead search in XML data which is a new information access paradigm in which the system search XML data on the fly a user type in query keyword. XML model capture more semantic information and navigates into document and display more relevant information. The keyword search is alternative method to search in XML data, which is easy to use, user doesn�t need to know about the XML data and query language. In this paper focus on the techniques used to retrieve the top-k result from the XML document more efficiently. Top-k relevant answer identify examine effective ranking function and early termination techniques achieves high search efficiency and result quality.
Keywords: Keyword Search System, Query, XML, Fuzzy.
Abstract
Agent Commitments and Ranking of Commitment Protocols
Harjot Kaur, Harpreet Kaur
DOI: 10.17148/IJARCCE.2015.4412
Abstract: The commitments play a central role in multi agent systems. The protocols specifies step by step rules of interaction between communicating agents and thus is a fundamental part of agent communication. The paper reviews the concept of agent communication and agent commitments. The agent commitment protocols are used for interaction between agents and can deliver messages between them to achieve their objectives. These protocols may be defined at design time by the designer, but it poses various problems. So protocols are generated at runtime by the agent depending on the situation. The ranking of protocols is done so as to select one protocol amongst all generated protocols. Accordingly, this paper proposes the method that can be used for the ranking of the commitment protocols, the factors that can be considered for ranking of the commitment protocols, the one with the highest rank is selected. .
Keywords: Agent, communication, commitments, protocols, ranking.
Abstract
Text Localization and Recognition in Natural Scene Images
Mona Saudagar, S. V. Jain
DOI: 10.17148/IJARCCE.2015.4413
Abstract: The extraction of text in an image is a classical problem in the computer vision. With the increasing popularity of practical vision system text recognition in natural scenes becomes a critical task. Text data present in images and video contain useful information for automatic annotation, image indexing. But as natural scene images contain complex background, multiple fonts and orientations, and different alignments make the problem of automatic text extraction extremely challenging. This paper proposes the approach for automatic detection of text from images and explains the methodology to extract and recognize multi-oriented text in natural scene images.
Keywords: Text Localization, Text extraction, Text recognition, Sobel Mask, Binarization, Bounding Box.
Abstract
A Survey Of Secure Data Transfer In Disruption Tolerant Military Network
E K Girisan, Shidha S
DOI: 10.17148/IJARCCE.2015.4414
Abstract: With this shared environment, security is one of the essential factors for the network users. Transfer of data are done through intermediate node, hence data may loss due to the unauthorized persons in the intermediate node. For this issue Disruption-tolerant network (DTN) is a technology which allows the node to communicate with each other in secure manner. DTN technology were used to transfer the data with the help of cryptographic method that provide a most security factor for the data, here the data were encrypted in some format, hence if hacker hack the data means they cannot know the message which they transmitted from the one to another node. For this issue this survey provides a various technology of transferring data with the secure manner.
Keywords: Wireless network, DTN, Military environment and secure transfer of data.
Abstract
Resource Discovery and Load Balancing in Grid Environment
Bhairavnath Jadhav, Riyaz Shaikh, Irshad Sagar
DOI: 10.17148/IJARCCE.2015.4415
Abstract: Grid technology has emerged as a new way of large scale distributed computing with high-performance orientation. Grid computing is being adopted in various areas from academic, industry research to government use. Grids are becoming platforms for high performance and distributed computing. Grid computing is the next generation IT infrastructure that promises to transform the way organizations and individuals compute, communicate and collaborate. The goal of Grid computing is to create the illusion of a simple but large and powerful self-managing virtual computer out of a large collection of connected heterogeneous systems sharing various combinations of resources. The main goal of load balancing is to provide a distributed, low cost, scheme that balances the load across all the processors. To improve the global throughput of Grid resources, effective and efficient load balancing algorithms are fundamentally important. Focus of this project is on analyzing Load balancing requirements in a Grid environment and proposing a centralized and sender initiated load balancing algorithm. In this work we have proposed an efficient load balancing algorithm which optimizes the response time and latency time with respect to the server.
Keywords: Load balancing, grid computing
Abstract
Analysis of Agriculture Commodity Prices using MapReduce Model
Roopam Dad, Nikhil Shanmugam, Prapti Singh, S.M Nalawade
DOI: 10.17148/IJARCCE.2015.4416
Abstract: India is the fastest growing economy in the world. Agriculture is the backbone of country. Agriculture continues to be main stay of life for majority of the Indian population. It contributes around 25% of the GDP and employs 65% of the workforce in the country. Big Data can help agriculture sector to chance its phase and rise with the growing economy. It can provide economists and policy makers with insightsand help in makingdecisions and crucial policies. In this paper we are proposing a system which accumulates various commodity data from open government data sources, filter it by MapReduce steps as table functions and producing current and yearly trends that canhelps farmers selling their crops at best profitable prices and provides detailed analysis for various commodities and markets.
Keywords: Data Collection, Analysis, Agriculture, MapReduce.
Abstract
An approach for identification using ear and face biometrics employing score based image fusion and SIFT feature detection in surveillance system
Akash Pal, Avinandan Sau, Debolina Das, Sukanta Shrama, Madhuchhanda Dasgupta
DOI: 10.17148/IJARCCE.2015.4417
Abstract: Biometric surveillance is any technology which measures and analyzes human physical and/or behavioural characteristics for authentication, identification, or screening purposes. Identification is an essential part of our lives. Identification of authentic candidate is essential in E-commerce, in keeping track of criminals, in airport and railway surveillance and many more aspects of the modern world. However identification of a person can be challenging especially when the person is not cooperating. This leads to classify the identification techniques broadly in to two categories: Passive and Active. In this current study an approach has been proposed combining the ear and face biometrics for the purpose of identification of a person using SIFT (Scale Invariant Feature Transform). The proposed multi biometric system achieves a recognition accuracy of 99.9958%.
Keywords: SIFT, biometric fusion, ear-face biometric.
Abstract
Adiabatic Vedic Multipler Design Using Chinese Abacus Approach
Diksha Ruhela, Dr. Malti Bansal
DOI: 10.17148/IJARCCE.2015.4418
Abstract: In this paper, we discuss the implementation of Vedic multiplier with Chinese Abacus adder design, using Reversible Logic Gates. The power consumption of the Vedic multiplier is low as it generates all partial products and their sum in one step. Since high radix of Chinese Abacus adder reduces the carry propagation delay, it is observed here that the proposed design increases the speed of operation manifold. The proposed work is implemented on the Xilinx FPGA device, Spartan-3E. The results show that multiplier implemented using Chinese Abacus approach is quite efficient in terms of area, time and speed
Keywords: Vedic Multiplier, Chinese Abacus Adder, propagation delay, Reversible Logic
Abstract
Agriculture Supply Chain Management Based Android Application
Monika Chirmade, Komal Tayade, Gaurav Sham Bankar, Shounak Sugave
DOI: 10.17148/IJARCCE.2015.4419
Abstract:
Abstract: Android platform is launched by Google which is a new generation of smart mobile phone platform. Android provides the support for mobile map and provides facility to link multiple website links, which is probably a concern of vast numbers of developers. Android is free and open source, providing an easy-to-use development kit containing real time information update and facility to link websites. Agro Supply Chain will be an advisory and information system for the farmers. Agro Supply Chain will be available on mobile phones, which will be designed for farmers to help them stay on track, avoid troubles, manage their expenses in cultivation, receive all the latest and updated information, government schemes and strategies related to the field of agriculture along with suppliers details for sugarcane. The advisory system will enable its users to receive real-time and interactive advices and alerts on crop. Different alerts will be provided for plantation, insects, diseases and nutrition. Farmers will also receive regular pest, disease alerts and market price information to support on-farm decision making.
Keywords: Budget Calculator, Schedule Calculator.
Abstract
FPGA Implementation of Point Processing Operation using Hardware Simulation
MS. Dipika S.Warkari, DR.U.A.Kshirsagar
DOI: 10.17148/IJARCCE.2015.4420
Abstract: Application areas of signal processing have grown dramatically in importance in recent times, in parallel with the growth of powerful and low-cost processing chips. This has led, in turn, to many new applications, including multimedia delivery and hand-held communications delivery. Image processing is one an important application among them, which has a strong mathematical basis. Specifically authors demonstrate point processes which use only the information in individual pixels to produce new images. Arithmetic operations, XOR operations, histograms, contrast stretching and intensity transformations are implemented using Xilinx System Generator (XSG). XSG is a useful tool to understand fundamental Digital Signal Processing (DSP) algorithms for Field Programmable Gate Array (FPGA) implementation. FPGAs provide a better platform for real-time algorithms on application-specific hardware with substantially greater performance than programmable DSPs. The study reveals that the hardware implementation results which are presented here will be extended to perform hardware-in-the-loop simulation.
Keywords: Image Processing, Point Processing, Xilinx System Generator, FPGA.
Abstract
Test data compression and optimal power seed selection for Scan Power Reduction
G.Pavithra Devi, K.S.Neelukumari
DOI: 10.17148/IJARCCE.2015.4421
Abstract: XOR network-based on-chip test compression schemes have been widely employed in large industrial scan designs due to their high compression ratio and efficient decompression mechanism. Due to the highly divergent power impact of distinct seeds appreciable power reductions in the decompressed test data can be attained through the pinpointing of the power-optimal seeds during the compression phase. This work explores the test data compression technique which searches for the power optimal seeds in the compression phase in order to reduce the scan power consumption. The seeds which are identified as power optimal alone will be decompressed in the decompression phase and the power optimization is based on the number of transitions between the seeds. The LFSR is used to generate the sequence of seeds in order to identify the power optimal one from the sequence of seeds which are fed into the XOR based decompression network. Experimental results confirm that the proposed technique delivers significant scan power reduction with negligible impact on the compression ratio.The simulation results are obtained using MODELSIM 6.3f and the power is analysed using XILINX 8.1 software.
Keywords: on-chip test compression, XOR decompression network, scan power reduction, seed selection.
Abstract
Texture Analysis using Markov process with Bayesian Approach
N.Palanivel, P.Keerthika, K.Yazhini, P.Thamizhini
DOI: 10.17148/IJARCCE.2015.4422
Abstract: To analysis the textures in the image and that are identified and distinguished from untextured regions with edges. To represent the textures present in a small image region. Proposed texture analysis methods such as texture Identification, unique representation, description, and classification. The parameters of the model are estimated based on the Bayesian approach. To obtain the significance of the texture based on the classification method we processed two types of classification namely supervised and unsupervised classification
Keywords: Markov process, Classification, Textured, Untextured
Abstract
Smart Notice Board
Bhumi Merai, Rohit Jain, Ruby Mishra
DOI: 10.17148/IJARCCE.2015.4423
Abstract: Notice board is primary thing in any institution or organization or public utility places like bus stops, railway stations or parks. But sending various notices day to day is a tedious process. This project deals with advanced notice board. It presents an SMS based notice board incorporating the widely used GSM to facilitate the communication of displaying message on noticeboard via user�s mobile phone. Its operation is based on microcontroller AT89c52 programmed in assembly language. A SIM300 GSM modem with a SIM card is interfaced to the ports of the microcontroller with the help of AT commands. When the user sends a SMS via a registered number from his mobile phone, it is received by SIM300 GSM modem at the receiver�s end. SIM300 is duly interfaced to the microcontroller. The messaged is thus fetched into the microcontroller. It is further displayed on an electronic notice board which equipped with LCD display interfaced to microprocessor powered by a regulated power supply from mains. This project is our experiment on real time noticing.
Keywords: SMS Notice Board, GSM MODEM SIM 300A, LCD 16x4, Microcontroller At89c52, Mobile Phone
Abstract
Automated PCB Drilling Machine With Efficient Path Planning
Shaikh NoorFarooque, Ansari Mohammed Faizan, Javed Shaikh, Pragati Pal
DOI: 10.17148/IJARCCE.2015.4424
Abstract: This paper presents the design of a PCB drilling machine, where the drill holes are automatically detected from an image of the circuit eliminating the need to manually enter the drill hole coordinates. The goal of this project is to design and implement an Arduino controlled PCB drilling machine. Further the drilling machine uses path planning method which is used to make the system more stable and accurate.
Keywords: CNC, NC, PCB, PLC.
Abstract
Reversible Data Hiding For Image Encryption
Aakanksha D. Londhe, Sneha R. Nigam
DOI: 10.17148/IJARCCE.2015.4425
Abstract: Recently, the rapid development in information technology more and more images and data are available on the internet .So there is a need to provide authentication to important data. Security and integrity of data are two challenging areas for research. There are number of techniques to secure the data. Reversible data hiding is a technique that is used to hide data inside an image. The data is hidden in such a way that the original data is not visible. All previous methods embedding data into image by reversibly vacating room in the encrypted images, which may be result as some errors on data extraction. That mean some secrete information is loss in data extraction. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image .This method provides improved PSNR ratio and recovers image with its original quality.
Keywords: Reversible Data Hiding, image encryption , PSNR.
Abstract
Defending Against Attacks in MANETs using Cooperative Bait Detection Approach
M. Ahmer Usmani, Manjusha Deshmukh
DOI: 10.17148/IJARCCE.2015.4426
Abstract: Wireless networks are computer networks that are not connected by cables of any kind. The use of wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. Wireless networks are susceptible to many attacks. One such specific attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh and shortest path to the destination. This paper attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactive defense architectures. Our CBDS method implements a reverse tracing technique to help in achieving the stated goal. Proposed system helps us in defending against the blackhole attack without any requirement of hardware and special detection node.
Keywords: Cooperative bait detection scheme (CBDS), dynamic source routing (DSR), Twice Acknowlegement (2 Ack), grayhole attacks, malicious node, mobile ad hoc network (MANET).
Abstract
Saasprin Saas based accounting made easy
Praveen Shukla, Kunal Singh, Monika Pandey, Narendra Kumar, Prof Seeta Yadav
DOI: 10.17148/IJARCCE.2015.4427
Abstract: SaaS is used by most of the applications run under any project. The SaaS providers charge the companies and the SaaS users for the same. Bills and invoices are produced based on the usage and sent to the users. The accounting team solves the hassle of sorting and compiling the invoices and paying them. SAASPRIN is the software for the automation of this very process of attending and calculating the amount to be paid mentioned in these invoices. Considering the logical flow of data there are many factors which have been taken care of in designing of Saasprin. Analysis of which regular expressions to be used for scraping the relevant data from the invoices, which all methodologies can be employed for effective and self-explanatory representations of bill amounts and expenses are few among such factors .Also cost effective and fast cryptographic algorithm have been analyzed and used for better security and privacy. Saasprin is made as an open source software and can be customized as per the user requirements.
Keywords: Saasprin; Saas;Regular expression
Abstract
3D SECURE PASSWORD
Ashwini Sakpal, Kalpana Lande, Pooja Yeole, Prafull Kalokhe, Shrikant Sanas
DOI: 10.17148/IJARCCE.2015.4428
Abstract: Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, a technique is proposed to generate session passwords using colors which are resistant to shoulder surfing. This method is suitable for Personal Digital Assistants.
Keywords: Authentication, session passwords, shoulder surfing.
Abstract
Extensive Performance Analysis of AODV and Modified AODV for Link Stability and Network Life time in MANET
Yatin Rana, Umang Soni
DOI: 10.17148/IJARCCE.2015.4429
Abstract: Mobile Ad-hoc Network (MANET) is consisting of independent wireless mobile nodes which animatedly form a temporary network without use of any fixed infrastructure or centralized management. A major anxiety that affects such a network that characterized by dynamically changing topology is the performance, where routing with robustness performance is one of the key challenges in deploying MANET. In this work we concentrate on AODV routing protocol which is widely used in MANET, It is widely simulated in this paper by varying number of nodes in MANET for standard AODV routing protocol and modified AODV which will take forwarding decision based on two parameters that are energy of node and link expire time (LET) and scrutinize the impact on network stability. Routing protocols are analyzed against several performance metrics. Modified AODV employs a novel route discovery process that takes into account the links stability and the nodes residual energy to perform data routing.
Keywords: MANET, AODV, Energy Aware Routing, Link Stability, LET.
Abstract
Review:Performance Evaluation of Various Burst Mapping Algorithm for WiMAX Systems
Rikesh Patel, Marry Grace
DOI: 10.17148/IJARCCE.2015.4430
Abstract: WiMAX is an emerging technology and has many issues that are yet to be addressed. This paper aims at the burst mapping analysis and improvement of the resource allocation scheme for WiMAX. The main aim is to do Performance Improvement of WiMAX downlink OFDMA using Various Burst Mapping algorithms.
Keywords: WiMAX, OFDMA, IEEE 802.16e, Resource Utilization
Abstract
ARM Controller Based Image Steganography Using LSB Algorithm
Pallavi Sunil Narule, Neha Dnyandev Patil, Priyanka Subhash Kurade, P.D.Patil, J.M.Waykule
DOI: 10.17148/IJARCCE.2015.4431
Abstract: Steganography is one of the most powerful techniques to conceal the existence of hidden secret data inside a cover object. Images are the most popular cover objects for Steganography and in this work image steganography is adopted. Embedding secret information inside images requires intensive computations and therefore designing Steganography in hardware speeds up Steganography. This is implemented using ARM7TDMI processor. Steganography differs from cryptography in the sense that where cryptography focuses on keep in the contents of a message secret, steganography focuses on keeping the existence of a message secret. This paper intends to offer a state of the art overview of the LSB algorithms used for image steganography to illustrate the security potential of steganography for business and personal use. After the overview it briefly reflects on the introduction to embedded system used in this paper i.e. ARM. The Least Significant Bit embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-Bit, 8-Bit, Gray scale format. This paper explains the LSB embedding technique and Presents the evaluation for various file Formats.
Keywords: Steganography, LSB Algorithm.
Abstract
Pattern Search Based Dimension Optimization of a Rectangular Inset-Fed Patch Antenna for Minimized VSWR and Return Loss
Prateep Kumar Sengupta, Anirban Neogi
DOI: 10.17148/IJARCCE.2015.4432
Abstract: Microstrip Patch Antennas have made great progress in recent years and are one of the most important printed antennas for wireless applications ranging from GSM, WLAN, Wi-Fi, Wi-Max to mid and long-range RADAR tracking. Microstrip antennas have many advantages with respect to conventional antennas, which include smaller size, low cost, ease of fabrication and integration with MMIC, as well as ease of obtaining circular polarization using dual-feed or slotted patch structures. Recently, those same properties, with additional size reduction using high dielectric constant materials, have made patch antennas common in handsets, GPS receivers and other mass-produced wireless products. This paper mainly concentrates on the length and width parameters optimization of an inset-fed rectangular patch antenna with resonating frequency 3 GHz, using Hooke-Jeeves Pattern Search Algorithm for minimized VSWR as well as Return Loss. The patch antenna designs as well as optimizations are done using Ansoft HFSS 13.
Keywords: Pattern Search Algorithm, Optimization, Patch Antenna, VSWR, Return Loss
Abstract
Multi Server Password Authentication by Key Exchange Protocol in Secure Manner
S.A.Deshpande, Pawar Vishal, Rane Ashwini, Gite Supriya
DOI: 10.17148/IJARCCE.2015.4433
Abstract: Client and a server share a password using Password-authenticated key exchange (PAKE) to authenticate each other and establish a cryptographic key by exchanging previously generated shares. In this scenario, all the passwords are stored in a single server which will authenticate the client. If the server is hacked, for example, hacking or even insider attack, passwords stored in database will become publicly known. In this paper, we consider a setting where two servers are used to authenticate a client and if one server is compromised, the attacker still cannot be able to view the client�s information from the compromised server. In this paper we are going to provide the system which uses the El-gamal encryption and collectively AES (Advance encryption standard) algorithm. And also uses the Diffee-hellman for key exchange. In this paper, we are going to provide the solution for SQL_INJECTION attack which is commonly happens on the database. The proposed scheme is a password-only system in the sense that it requires no public key cryptosystem and, no PKI. In the given authentication schema we also use SMS integration API for two step verification like Gmail, it will provide the additional security to end user.
Keywords: Diffie-Hellman key exchange, El-gamal encryption, AES algorithm, SQL_INJECTION attack.
Abstract
A Neural Approach for Sclera Vein Recognition
Sreenith.K.S, S.Senthamilarasu
DOI: 10.17148/IJARCCE.2015.4434
Abstract: This research involves the study of Sclera vein recognition, its shown to be a promising method for human identification. However, its matching speed is slow, which could impact its application for real-time applications. To improve the matching efficiency, we proposed a new parallel sclera vein recognition method using a two-stage parallel approach for registration and matching. We designed a rotation- and scale-invariant Y shape descriptor based feature extraction method to efficiently eliminate most unlikely matches. We developed a weighted polar line sclera descriptor structure to incorporate mask information to reduce memory cost. We designed a coarse-to-fine two-stage matching method. The experimental results show that our proposed method can achieve dramatic processing speed improvement without compromising the recognition accuracy.
Keywords: Line Descriptor, Morphological, Gabor Filter, Vein Pattern Enhancement, Feature Extraction, Template Matching.
Abstract
Classification of Human Eye Image using Different Methods for Medical Applications
D. Ram Nivas, T. Manigandan
DOI: 10.17148/IJARCCE.2015.4435
Abstract: The image classification is the method of assigning one or more category labels to an input image pattern. The Eye image classification aims to classify the iris and pupil to an application specific category as drug effect detection, left to right classification and fake classification. Iris texture is regarded as a genotypic biometric pattern which is stable during life time so that iris recognition and classification are reliable methods for individual authentication. The framework includes iris image pre-processing, low level feature extraction, statistical representation and iris image classification. The eye image database consists of eye images collected from different Persons and are used for testing the classification system. The Pupil is helpful in the detection of effect of drug. The Support Vector Machine Classifier is the well established classifier. It can be used to predict the class labels. In addition to this the classification is done by using total number of key points extracted and Diameter of the pupil.
Keywords: Support Vector Machine, Key points, Descriptors, Pin Point, Dilated.
Abstract
Image Retrieval Using Its Visual Properties
Poonam Jundhale, Shraddha Kshirsagar, Poonam Khengale, Sonam Thorat
DOI: 10.17148/IJARCCE.2015.4436
Abstract: The visual properties of images are color, shape and texture etc. By using these properties it is possible to interactively find any kind of image from the huge database of images. Color and texture are two important visual features in order to find an image. And the technique used for this is Content Based Image Retrieval (CBIR). Searching of images from a huge database is becoming a serious problem in data management field. The Traditional method i.e. text based method of searching does not meet the requirements of user. The system content Based Image Retrieval involves relevant searching of images from the query image based on extracted features.
Keywords: CBIR; Feature Extraction; Color; Texture; Shape; RGB
Abstract
A Literature Review on Timetable generation algorithms based on Genetic Algorithm and Heuristic approach
Anisha Jain, Ganapathy S C Aiyer, Harshita Goel, Rishabh Bhandari
DOI: 10.17148/IJARCCE.2015.4437
Abstract: The problem of timetable scheduling is described as a highly constrained NP-hard problem. It is known as the timetabling problem by most researchers. A lot of complex constraints need to be addressed for development of an efficient algorithm to solve this problem. In this paper, we present a comparison among the different techniques that have been developed for timetable generation using Genetic Algorithm and heuristic algorithm.
Keywords: Genetic algorithm, Active Rules, Rule based agents, resource scheduling, heuristic algorithms, Bacterial Foraging, Chemotaxis.
Abstract
A Highly Adaptive Distributed Neighbour Table Shortcut Zigbee Tree Routing In WSN
Jothi
DOI: 10.17148/IJARCCE.2015.4438
Abstract: Wireless device Networks (WSNs) unit of measurement a main think about several area. zigbee routing protocol does not provide the precise path and restricted link throughout a} terribly tree topology. zigbee tree routing as AN flinch like orphan node , traffic and detour approach flinch .The node that ineffectual to urge the network address from his people is termed as orphan node .We used a mechanism(DAAM) to beat these flinch, there is 3 method: Two-LAYER DAAM uses stratified theme such the 16-bit short address is split into 2 elements. The utilized in master layer, and collectively the tiniest quantity necessary bits in slave layer. as associate example, if the foremost vi bits forms the master-layer and collectively the rest ten bits constitutes the slave layer, LDAAM it\'s accustomed calculate the data of node that is in tree based totally to remain with the house between every node , RSSI is use to the measurement that utilized at intervals the positioning of device network.
Keywords: Include at least 4 keywords or phrases.
Abstract
Data preprocessing approach for removal of direct and indirect discrimination
Prakash Kumar, Kapil Patil, Aditya Patnurkar, Prof. Alka Londhe
DOI: 10.17148/IJARCCE.2015.4439
Abstract: Data mining is an important technology for extract the useful knowledge hidden in large collection of data. Automated data collection and data mining techniques such as classification rule mining have proved the way to making automated decisions, like loan granting, insurance premium computation, etc. If the training data set is biased in what regards sensitive attributes like gender, race, religion, colour, etc., . For this reason, anti-discrimination techniques including discrimination discovery and prevention have been introduced in data mining. Discrimination can be direct or indirect. Direct discrimination occurs only when decisions are made based on their sensitive attributes where indirect discrimination occurs when decisions are made based on their no sensitive attributes which are strongly related with biased sensitive ones. In this paper, we focus discrimination prevention in data mining and propose a new techniques applicable for direct or indirect discrimination prevention individually or both at the same time. Also we discuss how to clean training data set and outsourced data sets in such a way that direct and indirect discriminatory decision rules are converted to legitimate (non-discriminatory) classification rules. We also propose new metrics to evaluated the utility of the proposed approach and we compare these approach. The experimental evaluations implemented that the proposed techniques are effective removed by direct and/or indirect discrimination biases in the original data set while preserving data quality.
Keywords: Data mining, that direct and indirect discriminatory decision rules
Abstract
Lung Cancer Detection System on Thoracic CT Images Based on ROI Processing
Ms.Gangotri Nathaney, Prof.Kanak Kalyani
DOI: 10.17148/IJARCCE.2015.4440
Abstract: The goal is to outline and to develop programmed system for detecting lung cancer and to build efficient outcome within an interactive time frame with least false negative rate. Many systems ensue to increase the accuracy and performance rate. Many imaging techniques are now accessible in the field of medical analysis such as computed tomography (CT), radiography, and magnetic resonance imaging (MRI). Medical image segmentation is very delicate part in analyzing the image. A new approach is used to segment the images and to classify focal areas in lung region. Instead of simple thresholding; adaptive threshold method is applied on dicom images and ROI processing is used to segment the cautious region. Experiments are accomplished using real time datasets to scrutinize our method.
Keywords: Computed Tomography, Gray level Co-occurrence Matrix, Lung Cancer, Minimum False Negative Rate, Neural Network Classifier, ROI, Segmentation.
Abstract
Web Services: An Overview
Sonia Jasrotia
DOI: 10.17148/IJARCCE.2015.4441
Abstract: Service-oriented computing (SOC) has emerged as an vital computing model and changed the way of designing, delivered and consuming of software. In SOC, services are used as fundamental elements to support fast, low-cost development of distributed applications in heterogeneous environments. Web services technology is the most capable choice to implement service oriented architecture and its strategic objectives, it can provide a flexible solution to the problem. With the help of WSDL, SOAP, and UDDI, Web services are becoming popular in Web applications In this paper, a survey on web services has been done.
Keywords: Web servies, atomic, composite web services, web service model, deveoplment life cycle.
Abstract
Matching Infrared Face Images to Optical Face Images using LBP
Kamakhaya Argulewar, Shweta V. Jain
DOI: 10.17148/IJARCCE.2015.4442
Abstract: In biometric research and many security areas, it is very difficult task to match optical face images to infrared face images. infrared and optical face images captured by different devices such as infrared imaging device and optical imaging device large difference exist between infrared face images and optical face images because they belongs to multiple modality. Converting the samples of multimodality into common feature space is the main objective of this project. The new method has been developing for identification of heterogeneous face identification. Training set contains the images from different modalities. Initially the infrared image is preprocessed by applying Gaussian filter, difference of Gaussian and CSDN filters are apply on infrared face image. After preprocessing next step to extracting the feature by using LBP(local binary pattern) feature extraction then relevance machine classifier is used to identify the best matching optical image from the corresponding infrared images from the optical images dataset.
Keywords: Image matching, infrared and optical face images, LBP (local binary pattern), RVM (relevance machine classifier).
Abstract
Object and Scene Recognition in an Android based Mobile Application
Ms. Sonali Bhandari, Ms. Sonali Maid, Ms. Sonam Malve, Mr.Hardik Thakkar, Mr.Nilesh Sonawane
DOI: 10.17148/IJARCCE.2015.4443
Abstract: Around 285 million people are estimated to be visually impaired worldwide out of which 39 million are blind and 246 have low vision. About 90% of the world's visually impaired live in low-income setting and 82% of people living with blindness are aged 50 and above. So this project aims to improve the day to day lives of the blind user by providing them some information about the environment. Keeping in mind the challenges faced by the blind we had come up with an android application [1]. In this paper we present the main features and appearance of software modules dedicated to the aid of visually impaired or blind users. The main aim of developing this Application is to reduce and collapse the need of separated devices for object recognition and detection. The software modules are designed for Android operating system, used in majority of the smart phones today. There are two main trainable and educable modules, namely, the object recognition module and the Object detection module. Image Processing (Euclidean) algorithms used to identify the objects. Notification to the users is given by means of voice actions.
Keywords: Image Processing, Motion Detection, Object Recognition, Visually Impaired.
Abstract
Design and Implementation of QoS in WiMAX Module using Two-ray ground and Shadowing Mobility Model under NS-2
OjasviChhaniwal, Ms. MinakshiHalder
DOI: 10.17148/IJARCCE.2015.4444
Abstract: WiMAX is the short form of the Worldwide Interoperability for Microwave Access. Typically, fixed WiMAX networks have a higher-gain directional antenna installed near the client results in greatly increased range and throughput. Mobile WiMAX networks are usually made of indoor Customer Premises Equipment (CPE) such as desktop modems, compared to directional antennas but they are more portable. The mobility model is designed to describe the movement pattern of mobile users, and how their location, velocity and acceleration change over time. Since mobility patterns play a significant role in determining the protocol performance, it is desirable for mobility models to emulate the movement pattern of real life applications in a reasonable way. We have provided a categorization for various mobility models onto several classes based on their specific mobility characteristics. For some mobility models, the movement of the WiMAX node is likely to be affected by its movement history. The authors are aware that this performance comparison of mobility scenarios has not attempted in WiMAX Environments or IEEE 802.16 module. We have taken scenario file as IEEE 802.16 Standard in which we have implemented reactive and proactive routing protocols, In our TCL scripts which consist of various routing protocols such as AODV (Ad-hoc On-Demand Distance Vector Routing) and DSDV (Dynamic Destination Sequenced Distance-Vector Routing) than a particular WiMAX scenario or topology with various node densities i.e. 20 nodes, 40 nodes and 60 nodes. The protocol result metrics are Packet Delivery Ratio (PDR), End to End Delay and Throughput, by using network simulator (NS-2).
Keywords: WiMAX, AODV, DSDV, NS-2.35, IEEE 802.16
Abstract
Stimulated Raman Scattering Analysis of Wavelength Division Multiplexing (WDM) Channels in Optical Fiber Authors
Poonam Kumari, Abhishek Tiwari
DOI: 10.17148/IJARCCE.2015.4445
Abstract: This paper analyses the performance of the systems affected by the cross talk induced Stimulated Raman Scattering (SRS). SRS has very little impact on system performance for a single channel system, however, it is one of the major non-linear effects in the dense wavelength division multiplexed (DWDM) fiber optics communication systems. The effect of SRS causes power to be transferred from lower wavelength channels to higher wavelength channels. This unwanted Power tilt reduces the optical signal to noise ratio (OSNR) which in turn increases the Bit Error Rate (BER). SRS effect could be reduced by setting optimum power in the fiber. The analysis of SRS was performed by setting various power levels and channel spacing of individual channels in DWDM system in the sample mode of OptSim software to get the effects of SRS like power tilt in the optical spectrum. Power tilt was observed for different cases like unequal channel spacing, equal channel spacing and different input power are provided to the system. It was found that unequal channel spacing between channels reduced the unwanted power tilt value. When the Input power was decreased, there was reduction in the unwanted tilt in optical power. However by reducing the input power, number of channels in a DWDM system decreased. Hence Optimum power level settings in the fiber have to be set for DWDM. Therefore, to reduce the power tilt value, minimum Input power and unequal channel spacing is to be given for the individual channels.
Keywords: WDM, SRS, OptSim, OSNR, BER.
Abstract
Remotely Operated Underwater Vehicle for Metal Detection
Divya K, Abdul Latheef, Keerthi C, Clint A
DOI: 10.17148/IJARCCE.2015.4446
Abstract: Underwater Remotely Operated Vehicles (ROVs) play an important role in a number of shallow and deepwater missions for marine science, oil and gas extraction, exploration and salvage. In these applications, the motions of the ROV are guided either by a human piloton a surface support vessel through an umbilical cord providing power and telemetry, or by an automatic pilot. In the case of automatic control, ROV state feedback is provided by acoustic and inertial sensors and this state information, along with a controller strategy, is used to perform several tasks such as station-keeping and auto immersion/heading, among others.
Keywords: Remotely Operated Vehicles (ROVs), tether management system (TMS)
Abstract
An Architecture for Network Intrusion Detection System based on DAG Classification
Sunil Choudhary, Pankaj Dalal
DOI: 10.17148/IJARCCE.2015.4447
Abstract: Intrusion detection is an effective approach of dealing with problems in the area of network security. Rapid development in technology has raised the need for an effective intrusion detection system as the traditional intrusion detection method cannot compete against newly advanced intrusions. In this paper we proposed a feature based intrusion data classification technique. The reduced feature improved the classification of intrusion data. The reduction process of feature attribute performs by DAG function along with feature correlation factor. The proposed method work as feature reducers and classification technique, from the reduction of feature attribute also decrease the execution time of classification. For evaluation purposes, this model is applied to KDD �99 dataset.
Keywords: Network Intrusion Detection System, Directed acyclic graph, Classification, KDD�99 Data set, Support Vector Machine (SVM), Ensemble Technique, Neural Network.
Abstract
Prolonging Lifetime of Wireless Sensor Network using Evolutionary Algorithms
Meena Ahlawat, Ankita mittal
DOI: 10.17148/IJARCCE.2015.4448
Abstract: The popularity of wireless sensor have been increased in recent time due to growth in MEMS technology. Wireless sensor networks made up of hundreds or thousands of sensing nodes. It is necessary to make these nodes cheap and energy efficient. Most of the attention given to the routing protocol for energy efficient solutions. LEACH has been widely accepted WSN routing protocol for its energy efficiency. Evolutionary algorithm (EA) also used by researcher to resolve cluster based protocol in WSNs. The main goal of EA based clustered routing protocol is to dynamically form clusters in WSNs such that the use of energy resources of the network is minimized and prolong network lifetime. Aim of this paper is to ease the difficulty of undesirable behaviour of EA by formulating a new fitness function by introducing the concept of residual energy. Simulation shows that modified evolutionary routing protocol (ERP-M) prolong the network lifetime and saved more energy as compared to LEACH, SEP and ERP.
Keywords: WSN, LEACH, EA, SEP, ERP, MEMS.
Abstract
MPPT using Fuzzy Logic Controller for SEPIC Converter and Three Phase Inverter
Anusuya.V, Vishnupraba.G
DOI: 10.17148/IJARCCE.2015.4449
Abstract: The solar photovoltaic power has received great attention and experienced impressive progress all over the world in recent years because of more and more serious energy crisis and environmental pollution. The system consists of a photovoltaic solar module connected to a DC-DC Buck-boost converter. The system has been experienced under disturbance in the photovoltaic temperature and irradiation level. The fuzzy controller for the SEPIC MPPT scheme shows high precision in current transition and keeps the voltage without any changes, in the variable-load case, represented in small steady-state error and small overshoot. The proposed scheme ensures optimal use of PV array and proves its efficacy in variable load conditions, unity, and lagging power factor at the inverter output (load) side. The performance of the proposed FLC-based MPPT operation of SEPIC converter is compared to that of the conventional proportional�integral (PI)-based SEPIC converter. The system consists of a photovoltaic solar module connected to a DC-DC Buck-boost converter and towards three phase inverter.
Keywords: MPPT-maximum power point tracking, SEPIC-single ended primary inductor converter, FLC-fuzzy logic controller, PI-proportional integral, PV-photo voltaic.
Abstract
A Comparative Study of Reversible Watermarking Techniques
Abhishek Patanwar, Shikha Singh
DOI: 10.17148/IJARCCE.2015.4450
Abstract: Reversible watermarking has fetched enormous attention of researchers in its domain in past decade as the need of recovering the original work image after extracting the watermark. There are many researches in this field are done and various techniques are available. So to choose which one is the best technique, a definite need arises to compare those techniques on some parameter like PSNR and others. This paper presents a comparative study of three basic robust techniques, which are Least Significant Bit (LSB), Difference Expansion (DE) and Reversible Contrast Mapping (RCM) technique. This work has been implemented through MATLAB.
Keywords: Reversible Watermarking, Difference Expansion (DE), Least Significant Bit (LSB), Reversible Contrast Mapping (RCM), PSNR (Peak Signal to Noise ratio), Processing Time.
Abstract
Implementation and Comparative Study of PGRP,PS,VS,Modified PGRP
Miss. Vaishali k. Kosamkar, Prof. V. M. Deshmukh
DOI: 10.17148/IJARCCE.2015.4451
Abstract: Authentication to users account to access web services online is achieved using passwords. These passwords are prone to guessing attacks namely brute force and dictionary attacks. Password guessing attack is a method of gaining unauthorized access to one�s computer system. Online guessing of passwords is commonly observed in web based applications where users login a number of time to access the details. The guessing attacks on passwords over online are widely spread which reduces the convenience to the legitimate users. Different types of Turing tests are used to prevent legitimate users from such attacks with certain inconvenience to the valid users. On the other hand users also generally prefer common and easy passwords which are weak and make online guessing attacks much easier. The modified password guessing resistant protocol overcomes these online guessing attacks mainly brute force and dictionary attacks. This is achieved by limiting the number of attempts made during login. Aim of this paper is to provide convenient and secured login to the legitimate users which is by blocking the IP address from which there are more number of failed login attempts.
Keywords: Online Password Guessing Attacks, Brute Force Attacks, Dictionary Attack, PGRP, ATTs.
Abstract
Review Paper on System for Voice and Facial Recognition using Raspberry Pi
Pallavi V. Hajari, Ashwini G. Andurkar
DOI: 10.17148/IJARCCE.2015.4452
Abstract: The technology introduces an intelligent home security system. The basic system consists of two parts; facial recognition and voice recognition. The system provides a voice actuated security camera system. Facial recognition will recognize the face of family member who will be outside the door. If the face found to be among the family member then will display �Recognized family face�. The term voice recognition refers to finding the identity of words spoken by the person outside the door. The proposed system aims to implement a face recognition software code and to successfully implement this code on the Raspberry Pi platform for real time recognition.
Keywords: Facial recognition, Voice recognition, Raspberry Pi platform, Home security
Abstract
Analysis and Evaluation of Quality Metrics in Software Engineering
Zuhab Gafoor Dand, Prof. Hemlata Vasishtha
DOI: 10.17148/IJARCCE.2015.4453
Abstract: In this research paper the study of various software metrics are performed which are classified into three categories: primitive, abstract and structured. The study is performed to provide software developers, users and management with a correct and consistent evaluation of a representative sample of the software metrics available. The analysis and evaluation of metrics was performed in an attempt to: assist the software developers, users and management in selecting suitable quality metric(s) for their specific software quality requirements and to examine various definitions used to calculate these metrics.
Keywords: Software Quality Matrices and Software Engineering
Abstract
Implementation of Area Optimized Advanced Encryption Standard
P.Kishore Raju, G.Nirosha, K.Bhargavi, S.Anjaneyulu
DOI: 10.17148/IJARCCE.2015.4454
Abstract: Advanced Encryption Standard (AES) is the current standard for secret key encryption. AES was created by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, to overcome the disadvantages of Data Encryption Standard (DES). The Federal Information Processing Standard 197 used a standardized version of the algorithm called Rijndael for the Advanced Encryption Standard. The algorithm uses a combination of Exclusive-OR operations (XOR), substitution with an S-box transformation, row and column rotations, and a MixColumns. All the transformations of encryption are simulated using an iterative design approach in order to minimize the hardware consumption.To reduce manual operations a verilog code is developed ,synthesis and simulations of code is done by using Xilinx and Modelsim.It was successful because it was easy to implement and could run in a reasonable amount of time on a regular computer.
Keywords: EDK, REAL TIME COMMUNICATION, AGS, SECURITY, XPS, RTOS.
Abstract
Medi Minder: A Blood Sugar Monitoring Application Using Android
Supriya H S, Mrs. Rekha R J
DOI: 10.17148/IJARCCE.2015.4455
Abstract: Diabetes is a chronic disease that needs to be consistently monitored to maintain the blood sugar levels within normal ranges. Here is an android application to reduce the time and travelling expense, which is easy to use by any user and for immediate response as to what has to be done when you get to know your blood sugar level, using a smartphone and android compatible glucometer. The application records the sugar level of the patient, confirms it whether it is high, low or normal and tells what immediate steps needs to be taken in a critical situation and also informs the same to the doctor and the caretakers, who have been registered, through a notification.
Keywords: Android Smart Phone, Glucomete, Diabetes, Blood Glucose, Patient Care.
Abstract
Ranking Algorithm
Viraj Anchan, Sarang Deshpande, Deep Doshi, Akshat Kedia
DOI: 10.17148/IJARCCE.2015.4456
Abstract: In this paper, different ranking methods have been compared along with the applications using them. We have also proposed our own ranking algorithm that can be used in any Android application to rank the different advertisements or posts, posted within the application. We have also considered further possibilities that could be used within our algorithm.
Keywords: Ranking, Android, User Rating, Sorting
Abstract
SIMBA – Search Images By Appearance
Mrinaldeep Chakravorty, Bijoyeta Roy
DOI: 10.17148/IJARCCE.2015.4457
Abstract: SIMBA is a content based image retrieval system performing queries based on image appearance. SIMBA uses two feature extraction techniques: color and texture feature extraction, provided by Content Based Image Retrieval System. In SIMBA, object position is irrelevant for image similarity hence invariant features are used for the purpose. Based on general construction method, i.e. integration over the transformation group, the invariant feature histograms are derived that catch different cues of image content: features that are strongly influenced by colour and textural features that are robust to illumination changes. The feature extraction does not require any manual interaction, so that it might be used for fully automatic annotation in heavily fluctuating image databases.
Keywords: SIMBA, invariant features, content based image retrieval, colour and texture features.
Abstract
QoS Enhancement by Varying Transmission Range FOR Wireless Sensor Networks
Shallu Singla
DOI: 10.17148/IJARCCE.2015.4458
Abstract: Wireless sensor networks(WSNs) is a network that is formed when a set of small sensor devices those are deployed in an adhoc fashion cooperates for sensing a physical phenomenon.In this paper, we evaluate some of the widely used efficient routing protocols with varying transmission range of the node. Data transmitted by a node is received by all the nodes within its communication range. Our main focus is on the analysis of varying a range of the transmission in rhe terms of distance. The evaluation is made on the three routing protocols such as : directed diffusion, flooding and omniscient multicast, which are simulated in Network Simulator (NS-2) .The performance of these data dissemination protocols, is analyzed with selected metrics.
Keywords: Wireless sensor networks(WSNs); Quality of service(QOS); Directed diffusion (DD);NS-2(network simulator-2).
Abstract
Mobile LAN-Controller
Shiva Shree Nagendra R, Bhat Geetalaxmi Jairam
DOI: 10.17148/IJARCCE.2015.4459
Abstract: When the network administrator is placed near the LAN, He/she will be able to take care of all the activities of LAN. What if he/she is to monitor a LAN consisting of hundreds of machines? It is easy to monitor the work of the sub ordinates when the supervisor or manager is in the same physical location as that of the sub ordinates. However, if the managing authority is situated somewhere else apart from the location of its team, it is a tedious task to monitor its activities. The system proposed in this documentcan be used to monitor the LAN of an organization. The system proposed in this document provides an integrated solution wherein the work of the team members situated in a LAN can be monitored through the mobile phone of the manager without the notice of the members thereby improvising the productivity of the team. This system can also be used in a corporate training center where all the training activities are online. By using this Mobile LAN-Controller system, the trainers/invigilators can keep a watch on the whereabouts of the trainee employees.
Keywords: LAN, GSM, J2ME, Client, Server.
Abstract
Generic Rules-based Engine for Indian Card Games
Piyush Dargopatil, Ketaki Kadlaskar,Pallavi Chapole, Pooja Khaire
DOI: 10.17148/IJARCCE.2015.4460
Abstract: Card games have become popular on the computer and have been extended to a multiplayer network format in recent years. There is a paucity of single platforms which would enable the game creators to define the rules for particular game, specifically for Indian Card Games. The Rule Engine developed for filling this lacuna aims to facilitate the creators to create any custom game belonging to the family of standard and well-known trick-taking games like Seven-Eight, Five-Three-Two, Judgment, etc. Creators are provided with a desktop app which allows them to choose rules from a generic set of trick-taking game rules resulting into custom game database. This rule-set is then used to build the application package for that particular game. The game created would be in the form of a hybrid application. AI Engine for a couple of popular trick-taking games is also provided.
Keywords: multiplayer, trick-taking, hybrid application, rule-set, AI Engine
Abstract
Analysis and Detection of Diabetic Nephropathy based on basement membranes of capillaries in kidney
Dr. Ramesh R. Manza, Ms.Yogini B.Patil
DOI: 10.17148/IJARCCE.2015.4461
Abstract: Diabetic Nephropathy(DN) is one of fast growing disease. The survey tells that 41312 peoples are under treatment of end stage renal disease in 2001.$22.8 are spend to take care of them.15% national health budget is spend on Diabetic Nephropathy if it at last stage that end stage renal disease(ESRD) then it is serious so the proposed research will helpful because here we are trying to detect DN at early stage by analyzing capillaries basement membrane and implementation will be done in Python a new approach for image processing as this research will contain image data of various DN patients.
Keywords: DN, Glomeruli, ESRD, Nephron
Abstract
Design and Implementation of Efficient MLDD for Error Detection and Correction
Ms. Minal M. Jaiswal, Prof. Ashish E. Bhande
DOI: 10.17148/IJARCCE.2015.4462
Abstract: A small transition delays and little faults create major concern in digital circuits. It Produce greater impact on not only for simple memory but also for most of the memory applications. During encoding and decoding process, the error may occur in the codeword which results in the mismatching or loss of information. Error detection and correction are main issues in the memory which needs to be identified and corrected. The proposed method will identify the error and correct the error in the memory application using Majority Logic Decoder and Detector (MLDD). MLDD corrects the error based on number of parity check equation. This technology reduces the N-iteration to three iteration, if the codeword doesn�t contain any fault. It reduces the memory access time when there is no fault in data read. However it reduces the decoding time that increase memory application. Therefore delay is reduced. All the codes for MLDD design are written in VHDL. Modelsim SE 6.3f used for simulation process and the system is implemented on Sparatan-6 - XC6SLX16 - CSG324C FPGA kit.
Keywords: Encode, Error correction, Fault detection, Serial one step MLD, Majority logic decoder/detector, Memory, Soft error, sorting network
Abstract
Hand gesture recognition system
Prof. Praveen D. Hasalkar, Rohit S. Chougule, Vrushabh B. Madake, Vishal S. Magdum
DOI: 10.17148/IJARCCE.2015.4463
Abstract: In this paper, we introduce a hand gesture recognition system to recognize real time gesture in unconstrained environments. Many approaches to gesture recognition have been developed. Present an extensive review of existing technique for interpretation of hand gestures. A large variety of techniques have been used for modelling the hand. Building applications with OpenCV inside MS Visual Studio 2010. The main aim of the system is to use the most natural form i.e., hand gestures to interact with the computer system. These gestures would be implemented such that they are easy to perform, fast, efficient and ensuring an immediate response. Various UI controls and operating system applications like VLC Media Player and MS PowerPoint can be operated using the hand gestures. Extended implementation can include extending to other OS applications and/or web-based deployment. Some of the applications include automated homes, operating visual devices like television solely with gestures and also medical applications like that implemented at the Ben Gurion University which enables doctors to manipulate digital images during medical procedures using hand gestures instead of touch screens or keyboards owing to sterile human- machine interfaces.
Keywords: OpenCV, Visual Studio C++, Gesture, Recognition.
Abstract
Automatic Domain Module Extraction using Machine Learning Approach from Electronic Textbooks
C. Vishnu priya, S.V.Hemalatha
DOI: 10.17148/IJARCCE.2015.4464
Abstract: In recent days, technology-supported learning systems (TSLSs), such as intelligent tutoring systems (ITSs), adaptive hypermedia systems (AHSs), and especially, learning management systems (LMSs) are being extensively used in many studious institutions and becoming necessary for learning. The Domain Module is measured the core of any TSLSs as it represents the data about a topic matter to be communicated to the learner. In the existing system, a DOM-Sortze is a system that uses NLP techniques, heuristic analysis, and ontologies for the semiautomatic structure of the Domain Module from electronic textbooks. But in this system, still lack in the identification of pedagogical relationships. This is needed to improve in this system. In other words, DOM-Sortze system is not able to including the new rules of the pedagogical relationships. To overcome this issue, using learning techniques to learn the new rules in the pedagogical relationships. In our proposed system, we are proposing the SVM (support vector machine) learning approach intended for learning process. Our machine learning methods are used to infer new rules in order to improve the identification of pedagogical relationships or the DRs in the electronic textbooks.
Keywords: knowledge acquisition, SVM, domain extract, ontology learning
Abstract
Agent Reproduction In Artificial Society and Reproductive Schemes
Kawaljeet Kaur, Harjot kaur
DOI: 10.17148/IJARCCE.2015.4465
Abstract: creating agents that are capable of emulating the same kind of socio-cultural dynamics found in human interaction remains one of the hardest challenges of artificial intelligence. this problem becomes important when we consider embodied agents that are meant to interact with humans in a believable and empathic manner. our application context is an artificial society, i.e., the whole work will be a simulation of a social system which is not possible experimentally in a real world. In this paper we also study various reproductive schemes in an evolving population of agents. we classify reproduction schemes in temporal and spatial terms, that is , by distinguishing when and where agents reproduce.
Keywords: agent reproduction, artificial society, agents, virtual environment.
Abstract
Security Techniques in Wireless Sensor Networks : A Survey
Chanchal Yadav, Raksha K, Supriya S. Hegde, Anjana N.C, Sandeep Kumar E
DOI: 10.17148/IJARCCE.2015.4466
Abstract: Wireless Sensor Network (WSN) is a special kind of ad-hoc network. WSNs are useful in many critical applications like military and surveillance, habitat monitoring, etc. Security has been a major concern in these networks due to restrictions of resources in the sensor nodes and less human intervention during its operation. This paper outlines the security requirements, threats and vulnerabilities in WSN operations and the associated existing works towards defending against malicious attacks..
Keywords: security threats, WSN , ad- hoc networks ,security requirements ,sensor nodes.
Abstract
Survey of Computational Trust and Reputation Models in Virtual Societies
Manpreet Kaur Shergill, Harjot Kaur
DOI: 10.17148/IJARCCE.2015.4467
Abstract: The technical research in the field of computational mechanisms for trust and reputation in virtual societies is a latest discipline oriented to increase the reliability and overall performance of electronic communities.Research in the area of trust and reputation systems has put a lot of effort in developing various trust models. In open multi-agent systems trust and reputation is fundamental to improve cooperation by enabling agents to select good partners. In this paper we provide and discuss existing works on trust and reputation models based on centralized and decentralized approach in the area of Multi Agent virtual societies and highlight the limitations as well.Each model presents specific ideas related to calculation of trust. These different trust models are studied and thus subjected to comparison.Trust models play a vital role in determining how communications take place between various agents.
Keywords: Trust, Reputation, Centralized, Decentralized
Abstract
Web Image Re-ranking using Query Specific Semantic Signatures
Prof. A.G. Dongre, Anand Kumar Dubey, Rohin Bhat, Vijay Thombare, Maruti Bote
DOI: 10.17148/IJARCCE.2015.4468
Abstract: Image re-ranking, as an effective way to improve the results of web-based image search, has been adopted by current commercial search engines. Given a query keyword, a pool of images are first retrieved by the search engine based on textual information. By asking the user to select a query image from the pool, the remaining images are re-ranked based on their visual similarities with the query image. This paper uses a novel image re-ranking framework, which automatically offline learns different visual semantic spaces for different query keywords through keyword expansions. The visual features of images are projected into their related visual semantic spaces to get semantic signatures. At the online stage, images are re-ranked by comparing their semantic signatures obtained from the visual semantic space specified by the query keyword.
Keywords: Image re-ranking, SINFO, Local-Global Discriminative
Abstract
Big-SoSA:Social Sentiment Analysis and Data Visualization on Big Data
Mahalakshmi R, Suseela S
DOI: 10.17148/IJARCCE.2015.4469
Abstract: In recent years, due to the popularity of social networking has dramatically increased and the vast amount of data being produced by social networks such as Twitter, Facebook, Google+, etc.,. Social networks become popular among millions of people who share�s their thoughts in everyday life. Social media web sites are rich source of data for sentiment analysis. Sentiment Analysis, has been used to understand the people�s opinion on particular product or service. Twitter, one of the biggest and most popular social web site which contains unstructured data. In order to analysis such a data we need effective methodology which can process huge volume of data. Therefore, in this paper, we propose a method of sentiment analysis on twitter by using Hadoop and its ecosystems that will process the large volume of data on a Hadoop and the MapReduce function will perform the sentiment analysis.
Keywords: Social media; Sentiment analysis; TwitterAPI; Hadoop; MapReduce; Flume;
Abstract
Application of Fractional Calculus in Analog Signal Processing Circuits
Chhavi Kumar Bharti, Shelender Singh, Ashish Ranjan
DOI: 10.17148/IJARCCE.2015.4470
Abstract: In this Article various methods for realization of fractional element has been presented. This Article brings lot of facts and information for those researchers who are going to begin their research work in the field of fractional calculus and fractional circuits. A lot of motivation and direction for beginners has been given in this article. Also the application and advantages of fractional order over integer order systems for control system, signal processing and biomedicine has been discussed. This Article will validate the advantages of mathematics and will shows the relationship of mathematics with circuits designing. This work will also attract our researchers toward mathematics. The application of fractional element is verified using MATLAB software.
Keywords: Fractional Calculus, FO low pass filter, Continued fraction expansion, rational approximation.
Abstract
Norms in artificial agents society : A Review
Amarjeet kaur, Harjot kaur
DOI: 10.17148/IJARCCE.2015.4471
Abstract: Norm is a something that is usual, typical or standard. Shaking hands after a sports match is an example of social. Norm� is a term used to refer to a variety of behaviors, and accompanying expectations�� The concept of a norm is problematic. It is not only due to the different views on norms in different research areas, but also since the concept is used in everyday life in ambiguous ways. In this paper, we discuss different types of norms. We also discuss the life cycle of a norm which are made of four phases,i.e., norm creation, spreading, enforcement, and emergence. In addition to this, we also discuss relationship of norms and culture.
Keywords: Norms, types of norms, norm life cycle, culture and norms
Abstract
Radio Packet Efficiency in Access Network
Abhishek Garg, Sunny Sakya
DOI: 10.17148/IJARCCE.2015.4472
Abstract: In view of increased penetration of Smartphone/M2M devices among users & high growth in data uses over mobile network, following document provides GSM radio resource allocation strategies& how we canachieveHigh GSM spectral efficiency. By modification in radio resource allocation strategies- form multislot assignment to single slot assignment in initial duration of packet data connection&by some modification in on-demand data resource allocation. After this we can observereduction in total Number of PDCH requirement for the increased payload.
Keywords: Multislot,Packet Data Efficiency, PDCH (Packet Data Channels),OPDCH (On-Demand Packet Data Channels), TBFs (Temporary Block Flow).
Abstract
Design approaches for Obstacle Avoiding Rectilinear Steiner Minimum Tree: A Comparative Study
Mamatha G
DOI: 10.17148/IJARCCE.2015.4473
Abstract: With the advances in the field of VLSI design, routing a net the basic function of Global routing and Detailed routing stages of Physical design are required to be conducted at the earliest. Many efficient algorithms are proposed to construct the Rectilinear Steiner Minimum Tree (RSMT) which routes the net and can be used in the estimation of wire-length and timing for Floor-planning and Placement stages of IC-design. RSMT connects the terminals of a net rectilinearly without considering the presence of obstacles in the routing region, but blockages like pre-routed nets, macro-cells, IP-blocks and others cannot be ignored as they form the major components of the routing area. This leads for the construction of an extended RSMT called Obstacle Avoiding Rectilinear Steiner Minimum Tree (OARSMT), many exact and heuristic algorithms are proposed for the construction of OARSMT based on approaches like Geo-Steiner, Look-up table, Extended-Hanan grid, Maze routing and Spanning graph. This paper discusses OARSMT algorithms that belongs to different approaches and makes a comparative study of the features and performance of OARSMT designs. Making way for the selection of the key features of the existing algorithms and to improve them in the new designs of OARSMT, to match with the current VLSI technologies.
Keywords: Rectilinear Steiner Tree, Obstacle Avoiding RST, Global Routing, VLSI design.
Abstract
Survey of E-Learning: Content Personalization
B.Yogesh Babu , G.V. Sriramakrishnan, G.Visvanathan
DOI: 10.17148/IJARCCE.2015.4474
Abstract: Data Mining is a process of identifying hidden patterns and relationship within data that can help for decision making. E-learning is a technology which supports teaching and learning using a computer web technology. The main aim of the e-learning is to provide sufficient amount of content to the well know student�s profiles and preferences and also to specific the better content for each student. In this paper we proposed the comparison of techniques and algorithms which used in the system to improve the student knowledge level and academic progress, but the quality of e-learning service is low and so there is a lack of interaction among e-learners.
Keywords: Content Personalization, E-learning Planning, Learning Object, Intelligent E-Learning System, Educational technology
Abstract
Performance Analysis for OFDM System Using Fourier Transform and Zero-forcing Channel Estimation on Different Modulation
Qusay Jalil, S Nagakishore Bhavanam
DOI: 10.17148/IJARCCE.2015.4475
Abstract: In OFDM multiple carriers are used and it provides higher level of spectral efficiency as compared to Frequency Division Multiplexing (FDM). In OFDM because of loss of orthogonality between the subcarriers there is inter carrier interference (ICI) and inter symbol interference (ISI) and to overcome this problem use of cyclic prefixing (CP) is required, which uses 20% of available bandwidth. Comparison between the conventional FFT based OFDM systems of conventional modulation methods over AWGN. in-depth analysis of the zero forcing (ZF) and minimum mean squared error (MMSE) equalizers applied to wireless multi-input multi-output (MIMO) systems with no fewer receive than transmit antennas. In spite of much prior work on this subject, we reveal several new and surprising analytical results in terms of output signal-to-noise ratio (SNR), by comparing the Bit Error Rate (BER) and the average detection time consuming. Simulation based on the platform of MATLAB.
Keywords: ICI, ISI , ZF, MMSE, MIMO.
Abstract
Energy Efficient Routing in Zigbee Wireless Sensor Network- A Review
Kavita Malav, Deepak Gupta, Vernon Murray
DOI: 10.17148/IJARCCE.2015.4476
Abstract: as we distinguish, the data communication in the wireless networks is more untrustworthy than it is in the wired network environment. Even though the virtual carrier sensing scheme can be used in the wireless unicast transmission, the multicast and broadcast still not exploit the acknowledgement instrument for reliable transmission. This is due to the acknowledgement packets of broadcast programme will cause much sophisticated communication traffic and overhead. Since reliable data broadcast is critical and obligatory in many applications in the wireless sensor networks, our study focuses on the ZigBee network which is a new industrial standard for sensor networks. Some previous related papers improved the broadcast reliability by introducing redundant transmission and increasing coverage ratio of every receiver node, but there still exists probability of packet loss and extra communication cost due to redundant broadcast. Wireless sensor networks are functioning in several applications, including military, medical, environmental and domestic. In all these applications, energy usage is the determining factor in the performance of wire- less sensor networks. As a result, methods of zigbee based data routing and transferring to the base station are very important because the sensor nodes run on battery power and the energy available for sensors is limited. This Paper reviews all the aspects and constraints related to data routing within zigbee wireless sensor network.
Keywords: Zigbee Specifications, wireless sensor network, cluster based routing, energy efficiency, IEEE 802.15.4.
Abstract
Design of Reversible Logic ALU using Reversible logic gates with Low Delay Profile
Monika Rangari, Prof. Richa Saraswat, Dr. Rita Jain
DOI: 10.17148/IJARCCE.2015.4477
Abstract:
Keywords:
Abstract
Performance analysis of Raman LIDAR (Light Detection and Ranging) for detecting remote trace explosives
Aishwarya Singh, Anupama Bhattacharya, Sangeetha N
DOI: 10.17148/IJARCCE.2015.4478
Abstract: The aim of this paper is to analyze the performance of Raman Light Detection and Ranging (LIDAR) technique to detect trace explosives such as Research Department Explosive (RDX) and Trinitrotoluene (TNT). In various situations, when explosives are prepared, transported or handled, a quantifiable amount of explosive material ends up on surfaces. The main focus lies on the rapid detection of explosives in such surfaces. This standoff technique is implemented under the principle of Raman spectroscopy. Raman spectroscopy is a spectroscopic technique which involves inelastic scattering from a monochromatic light usually a laser source. The advantages and disadvantages of different lasers used in the process have been discussed. The limitations of Raman Spectroscopy have been studied and methods to overcome them have been experimented.
Keywords: Raman LIDAR, Raman shift, Raman spectroscopy, , RDX, TNT
Abstract
Realization of Printed Monopole Antenna for Dual Band Application
Gaurav Kulkarni, Rahul Pandey, Mrunali Kothavale,Meghna Nair
DOI: 10.17148/IJARCCE.2015.4479
Abstract: This paper describes the design of a small dual band planer antenna to operate in the ISM (2.4-2.48 GHz) and WLAN (5-6 GHz) band. Dual band operation is achieved by choosing proper microstrip antenna shape and reduced ground plane which becomes a monopole antenna. Simulation of the antenna is carried out using IE3D software. The simulated results in terms of return loss and radiation patterns are studied. It exhibits broadband impedance matching, consistent omnidirectional radiation patterns and appropriate gain characteristics (>2.5 dBi) in the RFID and WLAN frequency regions. The designed antenna can be suitable for the ISM band (2.4-2.48 GHz) and WLAN (5-6 GHz) band.
Keywords: ISM Band, WLAN band, Microstrip patch antenna, Printed monopole, Return Loss
Abstract
Miniaturization of Microstrip Patch Antenna using Special Shaped DGS, Stub & Slots
Juin Acharjee, Vishakha, Mrinmoy Chakraborty
DOI: 10.17148/IJARCCE.2015.4480
Abstract: This paper presents the design of circular Microstrip patch antenna (CMPA) and rectangular Microstrip patch antenna (RMPA) with DGS, stub and slots and experimentally studied. Both patch are designed on a Roger RT/duroid 5880(tm) with relative permittivity 2.2. In the absence of DGS, stub and slots, both structure found to resonant at 5.2 GHz. After introducing all these, the CMPA found to resonant at 2.4GHz with bandwidth 60MHz (2.37-2.44 GHz) and RMPA found at 2.5GHz with bandwidth 13MHz (2.44-2.57 GHz). Simulated results show the favourable characteristics in the resonating frequency. The main attractive features for both antennas are miniaturization of near about 117% with simple structure. Both modelled antennas find its applications in wireless communication.
Keywords: DGS, Miniaturization, Return loss, Radiation pattern, Stub, CMPA, RMPA
Abstract
Buffer Sizing for Mixed TCP and UDP Traffic
Vinoth Raj S, Thiruchelvi G
DOI: 10.17148/IJARCCE.2015.4481
Abstract: A Packet switched networks consist of TCP and UDP traffic. In Recent years most of the internet traffic is open loop traffic i.e., UDP. The increase in streaming services like music, movies, video games and VOIP have in-turn increased the UDP traffic in a packet-switched network. A router is a device which forwards packets between source and the destination. The buffer is a small storage space which will store the incoming packets during the Transmission. The buffer size in routers play a vital role in transmitting packets from source to destination. An optimal buffer size will reduce the congestion and increase the throughput of a bottleneck link where else the opposite will lead to buffer overflow or underflow which will leads to packets loss and lower throughput etc. In previous studies researchers only considered TCP Traffic and ignored the UDP. We found that it is necessary to analyse both TCP and UDP so that we can present buffer sizes for routers which will increase throughput for open and closed loop traffic and also have minimal packet loss. Our results are confirmed with Network Simulator � 2.
Keywords: Buffer size, Network simulation, Throughput.
Abstract
Efficient Utility Based Infrequent Weighted Itemset Mining From Transactional Weighted Datasets
J.Jaya, S.V.Hemalatha
DOI: 10.17148/IJARCCE.2015.4482
Abstract: Traditional data mining techniques have focused mainly on detecting the statistical correlations between the items that are more frequent in the transaction databases. Also termed as frequent itemset mining, these techniques were based on the rationale that itemsets which appear more frequently must be of more importance to the user from the business perspective. In recent years, the research community has also been focused on the infrequent itemset mining problem, i.e., discovering itemsets whose frequency of occurrence in the analyzed data is less than or equal to a maximum threshold. This work addresses the discovery of infrequent and weighted itemsets, i.e., the infrequent weighted itemsets, from transactional weighted data sets. To address this issue, the IWI-support measure is defined as a weighted, frequency of occurrence of an itemset in the analyzed data. In particular, we focus our attention on two different IWI-support measures: (i) The IWI-support- min measure, (ii) The IWI-support-max measure. Furthermore, two algorithms that perform IWI and Minimal IWI mining efficiently. Here, we throw light upon an emerging area called Utility Mining which not only considers the weighted frequency of the itemsets but also considers the utility associated with the itemsets. The term utility refers to the importance or the usefulness of the appearance of the itemset in transactions quantified in terms like profit, sales or any other user preferences. To address this issue, in our system we are proposing the Utility based Infrequent Weighted Itemset mining (UIWIM) to find high utility Infrequent weighted itemset based on minimum threshold values and user preferences
Keywords: Association rule, Utility mining, clustering.
Abstract
Privacy Preservation for Microdata by using K-Anonymity Algorthim
Sowmiyaa P, Tamilarasu P, Kavitha S, Rekha A, Gayathri R Krishna
DOI: 10.17148/IJARCCE.2015.4483
Abstract:
Keywords:
Abstract
A survey on variants of LEACH in WSN
Mr.Shreesha Bhat, Mr.Vasudeva Pai, Mr.Pranesh V.Kallapur
DOI: 10.17148/IJARCCE.2015.4484
Abstract: In Sensor network Sensor node has a limited source of power. So, it is essential to have long lifetime of network by energy effective routing. To have consistent long lifetime among sensor nodes, it is prerequisite to utilize efficient clustering algorithm. LEACH is a well known routing protocol based on cluster, but it has several disadvantage about short network lifetime because of the inefficient energy consumption. Here analysis of variants of LEACH namely LEACH-E, MODLEACH, Distance-LEACH is done using MATLAB. Simulation results show that the three variant protocol performs better than LEACH in terms of the parameters under consideration. The paper will be concluded by mentioning the observations made from analyses of results about these.
Keywords: LEACH; LEACH-E; MODLEACH; Distance-LEACH, Clustering.
Abstract
Study on Big data with Data Mining
Shobana.V, Maheshwari.S, Savithri.M
DOI: 10.17148/IJARCCE.2015.4485
Abstract: We are in a world of increasing data, the day-by-day generation of data becomes very vast. The true of it lies in collecting these data, analyze and perform some computations to obtain some meaningful information. These meaningful information can be derived using some data mining tasks. In short we can call big data as an �asset� and data mining is a �handler� that is used to provide beneficial results. To perform these analysis data mining algorithms can be used and also the big data methods.
Keywords: Big data, Data Mining, HACE theorem, structured and unstructured.
Abstract
Cooperative Spectrum Sensing: Two-sample Kolmogorov-Smirnov Test under Rician Fading Channel
Serkan Özbay, Ergun Erçelebi
DOI: 10.17148/IJARCCE.2015.4486
Abstract: Signal detection performance in cognitive radio architecture is enhanced by the cooperation of sensing detectors if the fading and shadowing effects exist on the channel. A cooperative spectrum sensing technique in cognitive radio networks based on two-sample Kolmogorov-Smirnov test is proposed in this paper and proposed sensing scheme is examined under Rician fading channel. The performance of the algorithm is investigated on real communication environment and real data; results show that two-sample Kolmogorov-Smirnov test based sensing offers robust and superior performance under Rician fading channel with low signal-to-noise ratio (SNR) values.
Keywords: Cognitive radio, Cooperative spectrum sensing, Two-sample Kolmogorov-Smirnov test, Rician fading channel.
Abstract
Extraction Of Unsupervised Web Data Using Trinity
V.Priyadharshini1, K.Tharamaraiselvi, S.Kavitha, B.Sivaranjani
DOI: 10.17148/IJARCCE.2015.4487
Abstract: Web knowledge extractors area unit accustomed extract knowledge from internet documents so as to feed machine-controlled processes. The article have a tendency to proposed a way that works on two or additional internet documents generated by constant server-side templet and learns an everyday expression that models it and may later be accustomed extract knowledge from similar documents. The technique builds on the hypothesis that the templet introduces some shared patterns that don't offer any relevant knowledge and may therefore be unheeded. we've got evaluated and compared our technique to others within the literature on an outsized assortment of internet documents; our results demonstrate that our proposal performs higher than the others which input errors don't have a negative impact on its effectiveness; moreover, its potency is simply boosted by suggests that of some of parameters, while not sacrificing its effectiveness.
Keywords: Web data extraction, automatic wrapper generation, wrappers.
Abstract
Impact of Scaling Digital Circuit Design Technology on Solid State Logic Style Selection
Sachin Tyagi, Suhail Siddiqui
DOI: 10.17148/IJARCCE.2015.4488
Abstract: Privacy for microdata is common problem in external database and data publishing. K-anonymity is one technique to protect micro data against linkage and identification of records. While in previous k-anonymity algorithms exist for producing k-anonymous data, due to privacy issues, the common data from different sites cannot be shared directly and assumes existence of a public database that can be used to breach privacy. During anonymization process, public database are not utilized. In existing generalization algorithm creates anonymous table by using microdata table and focusing on identity disclosure, and k-anonymity model fails to protect attribute disclosure to some extent. In propose two new privacy protection models called (p, a)-sensitive k-anonymity and (p+, a)-sensitive k-anonymity, respectively. It is different from previous the p-sensitive, these new introduced models allow us to release a lot more information without compromising privacy. Moreover, we prove that the (p, a)-sensitive and (p+, a)-sensitive k-anonymity problems are NP-hard and include testing and heuristic generating algorithms to generate desired micro data table.
Keywords: Microdata, Privacy, k-anonymity, k-join-anonymity,(p, a)-sensitive k-anonymity and (p+,a)-sensitive k-anonymity.
Abstract
System on Programmable Chip Based Serial Communication
Surekha.K.S, Jyoti Chavan, Harendra Singh, Deepshikha Phogat
DOI: 10.17148/IJARCCE.2015.4489
No abstract available.
Abstract
A New Technique for ECG Telemedicine Data Security and Privacy Using Digital Signature and XML Database
Md. MominReja, Sonia Corraya, UmmeSaymaBusra
DOI: 10.17148/IJARCCE.2015.4490
Abstract: Security of telemedicine information is an uncompromising issue as this is a matter of life risk. Outdated security standards affect the overall efficiency of telemedicine system. Recent studies on latest telemedicine security research shows that only 61% proposed a solution and 20% of these tested the security solutions that they proposed. In this paper a new methodology is proposed for ECG telemedicine system using advance technology. In this new technique ECG data is digitally signed and stored in Sedna XML database before sending to doctor.Medical care is only provided by the physician only after successful data retrieval with valid authentication. Subsequently the proposed technique is tested with 30 sample ECG medical records and evaluated by comparing the results from both traditional and proposed new ECG telemedicine system with XML Digital Signature. Initial finding shows promising result; the new security scheme reduced the security risk to 3.33% only from 20%
Keywords: XML; Digital Signature; Sedna; Telemedicine; ECG; Pushmodel; XCA
Abstract
A Review on Genetic algorithm to deal with Optimization of Parameters of Constructive Cost Model
Sonam Bhatia , Aanchal Bawa , Varinder Kaur Attri
DOI: 10.17148/IJARCCE.2015.4491
Abstract: Software cost estimation is one of the most challenging issues in software project management. To produce the accurate estimation, many models have been developed, but no model has efficient with the uncertainty of the project development. Most of these models are based on the size measure, such as Lines of Code (LOC) and Function Point (FP). Size estimation accuracy directly effect on cost estimation accuracy. The COCOMO model is the most important model for Software Cost Estimation. Today�s effort estimation models are based on soft computing techniques as, genetic algorithm, the fuzzy logic, neural network etc for finding the accurate predictive software development effort and time estimation. The aim of this paper is to optimize the parameters of COCOMO Model with genetic algorithms.
Keywords: Software cost estimation, COCOMO model, genetic algorithm, Variance Account
Abstract
A Review of Applications of Data Mining in the Field of Education
Hardeep Kaur
DOI: 10.17148/IJARCCE.2015.4492
Abstract: Data mining is the process of analysis of large amount of data to find out useful patterns and rules. Data mining is the process of taking information from a data set and convert it into an understandable and meaningful structure for further use. There are various techniques of data mining like classification, clustering, association rule mining etc. Each technique has its own importance according to his role. There are various applications of data mining in various fields like education, scientific and engineering, healthcare, business and many more. In this paper we will discuss basics of educational data mining. In this paper we will mainly focus on the applications of data mining in the field of education
Keywords: Data mining, Data Mining Elements, Educational Data Mining (EDM), Applications in education.
Abstract
Design and Implementation of SPI with Built-In-Self-Test Capability over SPARTAN 2
G.Sai Ram, G.Ravi Chandra, K.mohan rao, G.prameela, B.hemanth Nag
DOI: 10.17148/IJARCCE.2015.4493
Abstract: The Serial-Peripheral Interface (SPI) protocol is a very essential protocol for connecting between the peripherial devices and microprocessors. As the number of devices in the circuit increased as the advancement of IC technology. So, in order to lessen the product failure self-testability in hardware is demanded a lot in recent times. For the testing of devies we can use self-testability which is called as Built-in-self-test (BIST). BIST is an effective solution to reduce the huge circuit testing cost. This paper represents designing and implementation of SPI protocol with BIST capability over FPGA. An EEPROM and FPGA Spartan 2 are used for the communication testing where the FPGA is master and EEPROM is a Slave. The need of programming for setting up a network with two devices is no longer needed in this proposed system. To accomplish compact, stable and reliable data transmission, the SPI is designed with VHDL language and synthesized on Spartan 2 FPGA.
Keywords: Serial-Peripheral Interface; Embedded built-in-self-test architecture; Verilog HDL; FPGA
Abstract
Deployment of Mobile Application for Multiplatform Operating Systems
Sayali Kamble1, Mitali Joshi1, Shreya Kale, S. Mahajan
DOI: 10.17148/IJARCCE.2015.4494
Abstract: Due to the current restrictions and differences between iOS and Android platforms, to have an application deployed on both platforms requires it to be developed twice. Hence this doubles the effort and time needed for development of the application. The mobile applications are used more than the calls. People use the applications as per their need. There are various mobile operating systems like Android, iOS, Blackberry, Windows, etc. Each operating system has its own specialization. The applications defer from one operating system to the other. So the customer needs to use more than one mobile operating system to fulfill their requirements. We�ll be developing a mobile application for Multiplatform Operating Systems which will reduce the code development time and energy to half.
Keywords: Mobile Appllication, Android, iOS, Multiplatform.
Abstract
A Review on Agent Oriented Software Engineering
Aanchal Bawa, Sonam Bhatia, Varinder Kaur Attri
DOI: 10.17148/IJARCCE.2015.4495
Abstract: Agent oriented software engineering is one of the important areas of software engineering which deals with agents and multi agents. These agents are the intelligent, robust modules specialized to perform work in the area it is being specialized. There exist various methodologies to design and execute them having various characteristics to support different types of agents. The paper concentrates on analyzing the limitations of different methodologies and solutions to them so as to have more reliable and efficient methodology
Keywords: Gaia, MaSE, Message, Prometheus
Abstract
Understanding the Aging Leader and Challengers Concept in PSO and its Applications
Anu Sharma, Mandeep Kaur
DOI: 10.17148/IJARCCE.2015.4496
Abstract: Geographical routing has been widely deployed by many researchers to overcome the pitfalls of traditional routing strategies. Initially, geographical routing is merely based on location service and forwarding strategies. But this paper presents the review of conceptual and application specific idea behind their development. We investigate the ways that defines which type, how and swhy new geographical routing algorithms are developed. This paper have reviewed new paths towards development of other location based routing protocols with advanced feature. This paper represents an overview on the benefits as well as limitations of location based routing protocols on the basis of their evolution like routing with or without location information, network topological challenges, transmission ranges problem and Link Asymmetry solution.
Keywords: Sensor Networks; Geographical Routing Protocol; Link asymmetry; Location errors.
Abstract
Incremental Development of Geographical Routing Protocols for WSNs: A Review
Kavita Khatkar, Neera Batra, Rishi Pal Singh
DOI: 10.17148/IJARCCE.2015.4497
Abstract: Geographical routing has been widely deployed by many researchers to overcome the pitfalls of traditional routing strategies. Initially, geographical routing is merely based on location service and forwarding strategies. But this paper presents the review of conceptual and application specific idea behind their development. We investigate the ways that defines which type, how and swhy new geographical routing algorithms are developed. This paper have reviewed new paths towards development of other location based routing protocols with advanced feature. This paper represents an overview on the benefits as well as limitations of location based routing protocols on the basis of their evolution like routing with or without location information, network topological challenges, transmission ranges problem and Link Asymmetry solution.
Keywords: Sensor Networks; Geographical Routing Protocol; Link asymmetry; Location errors.
Abstract
The Exposition of Enigma Software Defined Networking
Mansimar Singh, Gurpreet Singh
DOI: 10.17148/IJARCCE.2015.4498
Abstract: SDN helps networks keep up with the speed of change, made possible by virtualization, convergence and cloud, by centralizing and simplifying control thereby making them more agile and programmable. The basic idea is unriddled and whys, whats, hows and whens of software defined networking(SDN) are to be discussed along with its pros and cons. The basic idea behind SDN and the OpenFlow protocol will be explained in detail. Some light would ne shone on the traditional data network along with illuminating the shift to software and why is it needed.
Keywords: OpenFlow, traditional data networks, centralisation of control plane, separation of control, data plane.
Abstract
Eradicate Inconsistencies and Gaffe from Data Sets Using Data Sanitization
Dr.B.V.Subba Rao, G.reshma, L.Ravi Kumar, K.Swarupa Rani, D.Anusha
DOI: 10.17148/IJARCCE.2015.4499
Abstract: The problem of data cleaning, which consists of removing inconsistencies and errors from original data sets, is well known in the area of decision support systems and data warehouses. This holds regardless of the application - relational database joining, web-related, or scientific. In all cases, existing ETL (Extraction Transformation Loading) and data cleaning tools for writing data cleaning programs are insufficient. The main reason for using the computers is to organize the data in an efficient and effective manner .In early days for valuable data can be organization sake we have to use the tools like Queries. In these some problems are arises. That is why these languages are called as Data Management systems. There were so many limitations in the management system like data inconsistency, inconvenience in retrieval of data etc. Because of all these limitations we have to face the problems like memory inefficiency and heavy in consumption of time and also lack of quality. To overcome all these problems we have designed software (mean ETL tool) which organizes the data in a very efficient manner with respect to redundant data. Our project deals with the data organization by giving all data oriented features and by solving the problems like data inconsistency and data redundancy.
Keywords: Data cleansing, Data warehouse, ETL, Redundancy.
Abstract
Data Hiding Using Visual Cryptography for Secure Transmission
S.M.Poonkuzhali, M.Therasa
DOI: 10.17148/IJARCCE.2015.44100
Abstract: Now days the secured data transmission and data integrity are the two challenging areas for research. This work describes the concept of data hiding using visual cryptography. Encrypted video is split into audio, video and frames using FFMPEG tool. Then randomly two frames are selected to hide secured message and image for converting this image to a grey scale and from grey scale to binary images for splitting into two shares using visual cryptography scheme. To hide steganography technique the cipher text is embedded into the two shares. Then by using invisible watermarking technique hide those two shares into the selected frames and the image is hided and finally all the frames are again converted into video using the FFMPEG tool and video is encrypted using the base64 encoder with asymmetric cryptographic technique .In the receiver system, the video was decrypted and split into frames and extracting the shares and data by selecting the frames which was watermarked.
Keywords: Data hiding, visual cryptography, paillier cryptosystem, base64 encoder with asymmetric cryptography.
Abstract
Video Stabilization for Micro Air Vehicles
Karra Somasekhar Reddy, Lokesha.H, S.Akhila
DOI: 10.17148/IJARCCE.2015.44101
Abstract: In Today�s world, Micro Air Vehicles (MAVs) equipped with digital cameras are increasing in number for real time applications. MAVs are widely used because of small, low weight, low cost and flexibility in the design. However, the video captured by MAVs will consist of unwanted translations and rotations due to atmospheric conditions. Hence, a video stabilization algorithm is needed to compensate the frames and then to avoid losing of any valuable information in video. This paper presents a real time video stabilization algorithm and mainly consists of three steps. Firstly, the key points from each frame are calculated by using Harris Corner Detection algorithm. Secondly, the descriptors between the two frames are used to calculate the affine transformation. Finally, this affine transformation is used to compensate the two successive frames in a video. This work mainly focuses on the digital image processing based video stabilization. The programming was primarily using MATLAB and later the algorithm was implemented on Raspberry Pi using Opencv-Python Programming.
Keywords: Micro Air Vehicles, Video stabilization, Harris Corner Detection, Affine transformation, Motion Compensation.
Abstract
Enhancing the Efficiency of IPv6 Tunnelling Mechanism by using Header Compression over IPv6 Header
Dipti Chauhan, Sanjay Sharma
DOI: 10.17148/IJARCCE.2015.44102
Abstract: Internet is growing at a tremendous rate and with this rate of growth it's not possible to sustain with the IPv4 and therefore the solely alternative is to adopt IPv6, the new internet protocol. Despite of numerous advantages that IPv6 offers over IPv4 the adoption rate of IPv6 by the users and is very slow. The main overhead involved with IPv6 protocol is header overhead of 40 bytes, and this overhead is even more when we are using tunneling mechanism, where one header is encapsulated inside the other. This overhead may have an effect on the performance particularly over wireless links where resources are scarce. In this paper we want to improve the efficiency of tunneling mechanism over IPv6 networks by using Header Compression technique. Here we are compressing the IPv6 Header of the packet as IPv6 header is of largest length and the results are analyzed on the basis of different packet sizes, different parameters like throughput, jitter, end-to-end delay and packet delivery ratio are calculated. These results are the compared with uncompressed network. Simulations are carried out over Qualnet 5.1 Simulator. These results show that the using header compression over IPv6 tunneling mechanism performing better than uncompressed network.
Keywords: Context id, Header Compression, Header Decompression, IPv4, IPv6, Profile id, Tunneling.
Abstract
Data Leakage Prevention by KDD-99 Intrusion Detection System
Dev Desai, Rohan Vadsola, Mihir Brahmbhatt, Nayan Mali
DOI: 10.17148/IJARCCE.2015.44103
Abstract: It is not possible to detect all the security attacks together. The detection that is available is on various platforms. This in turn exploits security problems which are way too difficult and expensive to resolve. The integrity, availability and confidentiality of a system is compromised by an intrusion. The Intrusion Detection System (IDS) is used to detect such intrusions in a network. For this the Data Mining is integrated with the IDS to detect such intrusions. Algorithms such as EDADT algorithm, varying HOPERAA algorithm, Hybrid IDS model, and semi supervised approach are used for detection of such attacks. All the algorithms are quite accurate and false alarm rate is reduced
Keywords: Anomaly based algorithm, classification algorithm, data communication, Denial of Service attack, Intrusion Detection, EDADT algorithm, HOPERAA algorithm, hybrid IDS model, semi-supervised approach
Abstract
Inferring Multiple Search Goals Under the Implicit Guidance of Users
P.Bhavani, C.Kanimozhi, D.Bavya, S.Gokulavani
DOI: 10.17148/IJARCCE.2015.44104
Abstract: In this paper we propose a method to get the exact output for the query what a user enters, Since the search process becomes in-effective nowadays. To overcome this problem we can subdivide inferring process into different steps. When the query is submitted to the search engine, the query is forwarded to analyse. Analysing process is based on number of search results for that particular query and click through log is obtained. A framework is discovered from user click through log to cluster feedback session. From feedback session pseudo documents are generated to cluster search goals. Then CAP is formulated to evaluate the performance of inferring user search goal.
Keywords: Click-through Log, Feedback session, Pseudo Document, Calculate Average Precision.
Abstract
Impact of Jamming Attack in Vehicular Ad hoc Networks
Rohini Rawat, Dr. Deepti Sharma
DOI: 10.17148/IJARCCE.2015.44105
Abstract: Vehicular Ad Hoc Networks (VANET) has attracted today�s research efforts. Despite the attention that VANET research got, current solutions to attain secure VANET still undergoing to protect the network from oppose and attacks. The necessity for a secure VANET networks is powerfully tied to the security and privacy features. This Jamming attacks are one of them. These occur by transmitting continuous radio ways to inhibit the transmission among sender and receiver. These attacks affect the network by decreasing the network performance. Previously there had been considerable research in the field of increasing the performance of network by using routing protocols. In this paper we are analysing the performance of Vehicular ad hoc networks under jamming attack. This work includes a network with high mobility, using IEEE Along g standard with improved AODV (Ad hoc On Demand Distance Vector) routing protocol parameters. Video conferencing and FTP with high data rate are being generated in the network. For the Simulation purpose we employed OPNET (Optimized Network Engineering Tool) MODELER 14.5 is used for simulation. The performance of network is measured with respect to the QoS parameters like, network load, retransmission attempts, media access delay and. Throughput.
Keywords: AODV, FTP, MANET, VANET, OPNET
Abstract
A Comprehensive Review on Vehicular Ad hoc Network
Anuradha Singh, Mintu Singh
DOI: 10.17148/IJARCCE.2015.44106
Abstract: Vehicular Ad-hoc Network (VANET) is a most critical class of mobile ad-hoc network (MANET) which enables intelligent communication among vehicles and also between vehicle and roadside infrastructures. It is a promising approach for the Intelligent Transport System (ITS). There are many challenges to be addressed when employing VANET. It has a very high dynamic topology and constrained mobility which makes the traditional MANET protocols unsuitable for VANET. The aim of this review paper is to give an overview of the vehicular ad hoc networks, its standards, applications, security issues and the existing VANET routing protocols.
Keywords: VANET, ITS, dynamic topology, mobility, routing protocols.
Abstract
Using Fuzzy Logic Avoid Congestion and Buffering To Provide Intellectual Data Traffic Administration for Internet
Mr.Chougule Meghraj Balasaheb
DOI: 10.17148/IJARCCE.2015.44107
Abstract: FLC (Fuzzy Logic Control) [11] has been considered for IC (Intelligence Control). It is a methodology used to design robust systems that provide factors such as system nonlinearity, parameter uncertainty, measurement and modelling imprecision. In fact, fuzzy logic control showed extraordinary and mature control performance in accuracy, transient response, robustness and stability [12], [13]. Fuzzy logic control use to avoid buffering using by avoiding variation of queuing delay (Queuing jitter) due to the dynamics queue length. Queuing flows can be buffered on the receiving side before being delivered. Buffering them does not affect the reliability or bandwidth, and increases the delay, but it smooth out the jitter.
Keywords: Congestion control, fuzzy logic control, quality Of service, max-min fairness, robustness, traffic management, buffering, jitter.
Abstract
Detection and Classification of Cardiac Arrhythmias based on ECG and PCG using Temporal and Wavelet features
Nabina N Rawther, Jini Cheriyan
DOI: 10.17148/IJARCCE.2015.44108
Abstract: Arrhythmias are abnormal rhythms of heart. Sudden Cardiac Arrest is most often caused by life threatening arrhythmias such as Ventricular Tachycardia (VT) and Ventricular Fibrillation (VF). Early detection of life threatening arrhythmias is crucial for successive defibrillation therapy. In general heart diseases have been investigated by various methods. Among these Electrocardiography (ECG) test is considered as the best noninvasive method of investigation. ECG test is varied if the heart sound from the Phonocardiogram shows any abnormalities. So Phonocardiography (PCG) is also considered for more efficiency. Commonly used arrhythmia detection and classification algorithms are only based on surface Electrocardiogram analysis. So an algorithm corresponds to multiresolution wavelet analysis using temporal and wavelet features of Electrocardiogram and Phonocardiogram along with Electrocardiogram-Phonocardiogram relationships is designed so as to increase the efficiency of the heart diagnostics. Temporal and wavelet features of ECG and PCG along with the linear prediction coefficients representing ECG and PCG are fed to the classifier for classification. The goal of this work is to achieve an efficient arrhythmia detection system that can lead to high performance heart diagnostics.
Keywords: DWT,ECG, HRV,LPC, Multiresolution, Massachusetts Institute of Technology/Beth Isrel Hospital (MIT-BIH) ECG arrhythmia database, PCG, SVM.
Abstract
Prevention Mechanism for Denial of Service in Web Application Services
Dr. D. Loganathan, K. Ramesh
DOI: 10.17148/IJARCCE.2015.44109
Abstract: Rapid growth of Internet, and Communication technologies, Web services has introduced number of new standards and technologies. Web services are not more resistant to attacks than other open network systems. Web Services are exposed to attacks well known from common Internet Protocols and additionally to new kinds of attacks pointing the web services. Attacker can make severe impact to major business. Attacks can be performed with small effort from the attacker�s side. The attacks aim to consume the network resources, thrashing web service applications, and reduce performance. These attacks cannot be detected on the web applications. The current web security standard induces crucial vulnerabilities availability in certain web services implementations. Web Services Security can provide message integrity, confidentiality, user authentication and authorization. The existing prevention mechanism has some unique advantages and disadvantages feature over the other mechanism. This is motivated to propose the Malicious Request Filtering mechanism. It would prevent internet users from taking part in Denial of Service attacks unknowingly and protecting web services from Denial of Services attacks. The new technique will provide strengthen to application level Web Services. The proposed solution is helped to test on Web Services applications and effectively filter out the malicious request from the application users.
Keywords: Web Application, Denial of Service, Attacks, Web Security issues, UDDI, SOAP.
Abstract
A Review on Algorithm of Admission Control of Call in Cellular Networks
Vrushali N. Khairnar, Dilip S. Patil
DOI: 10.17148/IJARCCE.2015.44110
Abstract: The major use of wireless network systems is the ability to offer end user wireless services. In this paper, many call admission control schemes have been proposed. Call admission control schemes play more important role in QOS of wireless cellular networks. They achieve some desired quality of service parameters. The design of call admission control algorithms is challenging with the limited and variable resources, and the mobility of users in such networks. This paper includes a survey of call admission control schemes for cellular networks and the research in this area. The goal is to provide a broad classification of existing call admission control schemes. We describe several admission control schemes
Keywords: Call Admission Control (CAC), Dynamic Channel Allocation (DCA), Handoff, Quality of Service, Radio Resource Management, User Mobility.
Abstract
Facial Expression Recognition Using Facial Movement Features
Abhay Fegade, Dashrath Godbole, Priyanka Sonawane, Sayali Munde, Prof. P.P.Ahire
DOI: 10.17148/IJARCCE.2015.44111
Abstract: This paper present an approach to recognize human face expression and emotions based on some fuzzy pattern rules. Facial features for this specially eye and lips are extracted an approximated into curves which represents the relationship between the motion of features and change of expression. This paper focuses the concepts like face detections, skin color segmentation, face features extractions and approximation and fuzzy rules formation. Conclusion based on fuzzy patterns never been accurate but still our intension is to put more accurate results.
Keywords: Face Detection, Skin Color Segmentation, Face Futures, Curve Formation and Approximation, Fuzzy Patterns
Abstract
Comparison of Free Space Optical Communication System With And Without Pointing Errors
Alina Sunny K, Karunakaran Nair
DOI: 10.17148/IJARCCE.2015.44112
Abstract: From several years Free Space Optical (FSO) Communication system has become more and more interesting and also which can be used as an exchange or alternative to radio frequency (RF) communication system. In this paper the effect of atmospheric turbulence mainly called pointing error on Free Space Optical communication system is investigated. The end to end capacity of dual hop Free Space Optical communication system assuming that the channel state information is only known at the receiver part. The performance of the considered system is mainly affected by misalignment fading, atmospheric turbulence induced fading, pointing errors. Numerically evaluated and computer simulation results are further provided to demonstrate the comparison of Free Space Optical communication system with and without pointing errors in dual amplify and forward relayed system over turbulence channel.
Keywords: Amplify and Forward, Atmospheric turbulence, Dual-hop system, Free Space Optics, Pointing errors
Abstract
Security Enhancement Approach For Data Transfer Using Elliptic Curve Cryptography And Image Steganography
Sudipta Sahana, MadhusreeMajumdar, Shiladitya Bose, AnayGhoshal
DOI: 10.17148/IJARCCE.2015.44113
Abstract: Securing data is a challenging issue in today�s era. Keeping it in mind we have proposed a new technique which is the combination of Elliptic Cryptography and image Steganography enhanced with a new secure feature for generation of a new, robust security system. Encryption is used to transmit data securely in open public networks. Each type of data has its own added features. With the evolution of internet, security of digital images has become more and more important. Therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper we have encrypted data using matrix and elliptic curves and used the concept of Steganography by hiding the generated points of the encrypted data in an image. Basically we have proposed a hybrid model using public key based Elliptical Curve Cryptography (ECC) and image Steganography which provide more security than a Single ECC or Steganography methods alone. Encryption and Decryption process are given in details with example. The comparative study of proposed scheme and the existing scheme is made. Our proposed algorithm is aimed at better encryption for all types of data and the output stego images reveal that our proposed method is robust. The main objective is to help users from different community to transfer crucial information securely who are using public network for communication.
Keywords: Elliptic Curve Cryptography, Image Stegnography, Co-ordinate geometry, Prime Matrix, Mask Matrix.
Abstract
Privacy in Offloading Data from Mobile to Cloud
Shiv Kanth B, Sriram N, Deepak S
DOI: 10.17148/IJARCCE.2015.44114
Abstract: Mobile devices namely smart phones and tablets play a significant role in life of a common man and thus they become a necessary tool in providing various services from different applications. But these devices are more limited with respect to desktop computers in terms of on-board memory, processors, and available network bandwidth. Offloading data to the high storage cloud servers invariably improves performance of mobile systems but technical challenges do remain. Moreover, the cloud based data is constantly being accessed by the mobile devices that are resource constrained for which the cost of processing must be minimised. Thus in this paper we propose a technique using attribute and re-encryption based key management with Manager as a trusted entity independent of CSP(Cloud Service Provider) in order to overcome the privacy issues.
Keywords:
Abstract
A Data Acquisition and Detection Algorithm for Signal Analysis in Material Detection
Payal
DOI: 10.17148/IJARCCE.2015.44115
Abstract: With the increasing demand for security, the detection of explosives is of utmost importance. Rapid detection of the materials is possibly achieved in a standoff manner by using this technique. In this paper, we discuss about the detection of materials like TNT,DNT,C4,Acetone etc. with the help of labview software. This employs various additional features like spectral analysis and noise removal before processing the sample spectrum for detection. It proves to be a accurate ,small and a user-friendly reliable system which can be easily implemented for any sensitive detection. In this paper, we illustrate various VI with outputs and present results for signal analysis and detection in further sections.
Keywords: spectral analysis, explosive detection, Spectroscopy, data acquisition
Abstract
A Study of Retinal Blood Vessel Extraction from the Retinal Images
Sandeep Singh, Dr. Dinesh Kumar
DOI: 10.17148/IJARCCE.2015.44116
Abstract: Detecting abnormalities such as venous looping or beading sis critical for early treatment as they are in most cases indication of potentially sight-threatening retinopathy. In order to utilize these useful characteristics of retinal blood vessels, it is very important to obtain their locations and shapes accurately. Blood vessels appeared as networks of either deep red or orange-red filaments that originated within the optic disc and were of progressively diminishing width. The major problem of Patients suffering from the disease over a long period of time is more likely to develop eye problems known as diabetic retinopathy. The detection of blood vessels is a major problem in the automatic processing of retinal images. On the one hand, the vessels have certain properties such as diameter which may be the key indicators in the evolution of certain retinopathies. Two major problems in the segmentation of retinal blood vessels are the presence of a wide variety of vessel widths and the heterogeneous background of the retina. The problem is to identify the segmentation of green veins and red veins in retina.
Keywords: veins, retina, abnormalities, Blood vessels etc.
Abstract
Mitigation of Threats using Secure SDLC
Ekta Bhardwaj, Devendra Kumar
DOI: 10.17148/IJARCCE.2015.44117
Abstract: Security agencies still consider this threat as one of the most common software vulnerabilities. Aiming to increasing security resistance against this software threat, emphasize on software design phase is highly reasonable where cost and time required for fixing error in design level is several times lesser than coding or implementation levels. In this purpose, we use the Secure SDLC . In this paper, we describe how to apply the secure SDLC. Software design phase in such a way that additional cost and time are not required for system analyzing and defining threat scenario.
Keywords: Secure software, software design, software threats, security analysis, SDLC
Abstract
Reliable Packet Transmission over Multi-Hop Wireless Network
Prof. S.A.Bhuskute, Ayesha Mulla, Komal Mohite
DOI: 10.17148/IJARCCE.2015.44118
Abstract:
Keywords:
Abstract
Implementation of Association Rule Mining for different soil types in Agriculture
M.C.S Geetha
DOI: 10.17148/IJARCCE.2015.44119
Abstract: Agriculture sector is the mainstay and backbone of the Indian economy. Despite the focus on industrialisation, agriculture remains a main sector of the Indian economy both in terms of contribution to gross domestic product (GDP) as well as a source of employment to millions across the country. The total Share of Agriculture & Allied Sectors (Including livestock, agriculture, forestry and fishery sub sectors) in terms of percentage of GDP is 13.9 percent during 2013-2014 at 2004-2005 prices. Agricultural exports constitute a fifth of the total exports of the country. At 157.35 million hectares, India holds the second leading agricultural land worldwide. All the 15 major climates are initiated in India and the country also possess 45 of the 60 soil types in the earth. India is the biggest producer of milk, tea, pulses, cashew and jute, and the second biggest producer of rice, wheat, fruits and vegetables, cotton, sugarcane and oilseeds [1]. In agricultural decision production process, both weather and soil characteristics plays a vital role. This research aimed to assess a variety of association techniques of data mining and apply them to a soil science database to establish if meaningful relationships can be created. A huge data set of soil database is extracted from the Soil Science India. This paper provides the data mining association techniques used in agriculture which includes Apriori.
Keywords: association, apriori algorithm, agriculture, soil types.
Abstract
A novel approach for key rehabilitation using modified WEP algorithm for VANETs
Viswanatham Subbaiah, Arathi R Shankar, Bhargav Raman S
DOI: 10.17148/IJARCCE.2015.44120
Abstract: Communication between vehicles plays a major role in avoiding accidents at crowded areas. Security of the data to be communicated is another aspect to be thought of. In this paper authors have made an attempt to establish secure communication within a VANET network using IEEE standard 802.11p protocol which covers 1000 meters range. Authors have proposed a novel approach to ensure more security with which a 40% more secure VANET network can be realized.
Keywords: WEP, security, VANET, 802.11p.
Abstract
Opinion Mining Using Fuzzy String Searching
Ms. Prerna Tekchandani, Mr. Avinash Dhole
DOI: 10.17148/IJARCCE.2015.44121
Abstract: One of the important types of information on the Web is the opinions expressed in the user generated content, e.g., customer reviews of products, forum posts, and blogs. In this paper, we focus on customer reviews of products. In particular, we study the problem of determining the semantic orientations (positive, negative or neutral) of opinions expressed on product features in reviews. This problem has many applications, e.g., opinion mining, summarization and search. Here weutilize a list of opinion words(also called opinion lexicon) for the purpose. Opinion words are words that express desirable (e.g., great, amazing, etc.) or undesirable (e.g., bad, poor, etc.) states. Sometime customers writes the wrong spellings for the product property so we solve this problem here by using fuzzy string searching. Approximate string matching (often colloquially referred to as fuzzy string searching) is the technique of finding strings that match a pattern approximately (rather than exactly).
Keywords: opinion mining, sentiment analysis, Fuzzy String Searching, Levenshtein distance, Semantic orientation.
Abstract
Text Processing Mechanism in EduICR System
Dung Minh Pham, Binh Van Huynh
DOI: 10.17148/IJARCCE.2015.44122
No abstract available.
Abstract
Real time monitoring of crop growth using soil moisture sensor
Prof. Ajay V. Raipure, Dr. S . M. Deshmukh, Dr. Ashwinikumar P. Dhande
DOI: 10.17148/IJARCCE.2015.44123
Abstract: In this paper, we have addressed the issues which relates to loss of soil fertility and waste of water resource in agriculture. We designed irrigation system based on wireless sensor networks and fuzzy control. The system mainly consists of wireless sensor networks and the monitoring center. All of the nodes in Monitoring area collect the information of soil moisture. Soil moisture is considered as input variable of fuzzy logic controller. The monitoring center receives the signals from wireless sensor network node, and output information controls opening and closing time of the valve in crop areas. The results show that the system achieve real-time monitoring of soil on crop growth, give a right amount of irrigation based on crops growth information.
Keywords: water-saving irrigation, wireless sensor network, fuzzy control strategy, sensor.
Abstract
WSN Monitoring of Weather and Crop Parameters for Possible Disease Risk
Pratik Birmal, Mahesh Ware, Sagar Bhandari, Kushal Awaghad
DOI: 10.17148/IJARCCE.2015.44124
Abstract: Tomato powdery mildew caused by Oidum Neolyco persici is an important weather- related disease that can potentially cause heavy losses in production quality and quantity each year and especially serious in climates with high rain fall and high relative humidity imparting long period of leaf wetness. Disease management generally requires frequent use of fungicides applied sever all times during the growing season. High cost due to frequent applications of fungicide and the desired to reduce pesticide levels in the environment have motivated considerable efforts to develop disease prediction or warning systems. Agro meteorological variables i.e. Air Temperature, Air Humidity and Leaf Wetness Duration(LWD) are known to be the parameters, which strongly influence the disease development. The WSN system deployed consisted of battery- powered nodes equipped with sensors used for continuously monitoring the agricultural and weather parameters, served as input of the models.
Keywords: Powdery Mildew, Tomato, Leaf Wetness Duration, Wireless Sensor Network
Abstract
Image Processing Techniques for Automatic Detection of Tumor in Human Brain Using SVM
Mr. Ajaj Khan, Ms. Nikhat Ali Syed
DOI: 10.17148/IJARCCE.2015.44125
Abstract: Human brain tumor creates problem in speaking, learning, loss in memories, hearing problem, problems in talking and understanding or gaining anything etc. Magnetic Resonance images are used to find the presence of brain tumor in brain. Magnetic resonance imaging (MRI) is an imaging technique that has played an important role in neuro science research for studying brain images. Classification of MRI images is an important part to differentiate between normal patients and a patient who has tumor in brain. The proposed method has two stages: First is feature extraction and second one is classification. First stage is used to extract the features from images using GLCM. In the second stage extracted features that are used as input to Support Vector machine (SVM) classifier.
Keywords: Brain tumor detection, Imaaging technique,brain tumor, medical image processing, MRI images.
Abstract
Shortest Path Computing Using Sketch Structure
Komal Ramteke, Swati Ramteke, Rajesh Dongare
DOI: 10.17148/IJARCCE.2015.44126
No abstract available.
Abstract
Comparative Study of Various Frequent Pattern Mining Algorithms
Amit Mittal, Ashutosh Nagar, Kartik Gupta, Rishi Nahar
DOI: 10.17148/IJARCCE.2015.44127
Abstract: Frequent pattern mining has become an important data mining task and has been a focused theme in data mining research. Frequent pattern mining aims to find frequently occurring subsets in sequence of sets. The frequent pattern mining appears as a sub problem in many other data mining fields such as association rules discovery, classification, clustering, web mining, market analysis etc. Different frameworks have been defined for frequent pattern mining. The most common one is the support based framework, in which item sets with frequency above a given threshold are found. This paper presents review of different frequent mining algorithms including Apriori, FP-growth and DIC. A brief description of each technique has been provided. In the last, different frequent pattern mining techniques are compared based on various parameters of importance.
Keywords: Data mining; Frequent patterns; Frequent pattern mining (FPM); support; itemset.
Abstract
Controlling Malicious Behavior of Nodes Using Energy and Buffer Mechanism in DSR
Priyanka
DOI: 10.17148/IJARCCE.2015.44128
Abstract: MANET�s is the form of wireless network (WLAN). And Ad-hoc network is infrastructure less. They does not need any centralized system or any kind of infrastructure. Each node in the Ad-hoc network will act as router and will route the packet to the destination. DSR is an on-demand routing protocol. This means routes are not pre-established routes and routes are only active during the transmission. The main problem in the MANET is attack on data. As we know in MANET we cannot differentiate which node is the attacker node and which is benign node. So, the attacker node can easily capture the data. And these types of attacks are known as Black-hole, worm-hole and gray-hole attack. So, identifying which node is genuine node or for preventing the data from the attacker node is necessary in MANETs. This paper provides the good technique which helps in preventing from these types of routing attacks during data transmission. And this leads to the secure communication as we select the intermediate node on the basis of its energy and buffer state. This paper consider the two parameters for selecting the forwarding nodes, first one is their energy state and their buffer value. Only those nodes will participate in the transmission which have their energy state equal to some threshold value and have the less buffer value. Because the attacker nodes have less energy due to continuously sending the RREP message to the nodes and have high buffer value as it always attract the neighbor nodes for transmission. So, the implemented technique only selects the nodes which seem to be genuine on the basis of measuring two factors its thresh-hold energy and buffer value of the IN. And this result into the less packet loss as compared to the DSR. And even if the attacker captures the packets, the packets will be in encrypted form. Attackers have to decrypt the packet for reading it and its really hard to decrypt them. The packet loss will be less in the proposed technique and throughput will be increased
Keywords: DSR, WLAN, MANET, IN, RREP and RREQ.
Abstract
Mining Signatures from Event Sequences
S.H.Rajput, Chetan Jadhav, Yogesh Deshmukh, Sandip Sonawane, Hemant Jadhav
DOI: 10.17148/IJARCCE.2015.44129
Abstract: This paper proposes a novel secular knowledge representation and learning framework to proposed large-scale secular signature mining of longitudinal heterogeneous occasional data. The framework allows the presentation, extra4ction, and mining of high order latent occasion event structure and relationships between single and many sequences. The prescribed data representation maps the heterogeneous sequences to a image by encoding occasions as a structured spatial-secular shape process. We have suggested clinical assessment for naked interactive knowledge discovery in large electronic health record databases.
Keywords: Secular signature mining, sparse coding, dictionary positive matrix factorization.
Abstract
Enhanced User Motion Detection Using Multiple Smartphone Sensors
Amit Thakore, Prof. Srushti P. Soni
DOI: 10.17148/IJARCCE.2015.44130
Abstract: Number of research papers have been published in recent years which demonstrate how data received from sensors can be used for context aware computing. Also due the fact that nowadays smartphones come equipped with many motion sensors, people have begun developing interesting mobile applications that do automatic context aware computing. In this paper we discuss how data sensed from smartphone�s motion sensors like accelerometer and gyroscope, can be used to predict user�s motion type like cycling, walking, driving car and travelling in train, and furthermore do automatic motion profiling like putting the phone on vibrate mode or opening an application etc. First of all, we compared performance of various algorithms like Random Forest, J48, REPTree, Na�ve Bayes, Rotation Forest (ensemble method) etc. while classifying motion types. Secondly, we pointed out the challenges faced when using only two sensors (i.e. accelerometer & gyroscope) to predict motion type and also when an identical motion type exists in data set like walking and cycling. Thirdly, we proposed a technique that makes use of an additional sensor GPS & google maps along with accelerometer & gyroscope to correct wrong predictions made by classifying algorithm to further improve the existing model with aim to deploy it for practical situation. This technique is based on usage of speed and location parameters that logically corrects wrong classes.
Keywords: Context Awareness; Motion Type Prediction; Algorithm Comparison; Error Correction.
Abstract
Measurement and control of industrial parameter using Zigbee
Associate Prof. D.G.Chougule, Ms.Rachana B.Thombare
DOI: 10.17148/IJARCCE.2015.44131
Abstract: Wireless based industrial automation is a prime concern in our day-to-day life. The approach to Zigbee Based Wireless Network for Industrial Applications standardized nowadays. In this paper, we have tried to increase these standards by combining new design techniques to wireless industrial automation. The personal computer based wireless network for industrial application using Zigbee can be adopted at micro and macro Industries, it has various types of Processors and Microcontrollers. Here Microcontrollers,Sensors, Relays are used. The system is fully controlled by the Personal Computer through ADC (Analog to digital converter). All the processor and controllers are interconnected to personal computer through Zigbee. The Personal Computer will continuously monitor all the Data from remote processing unit and compare with value preloaded process structure. If any error is found the personal computer takes necessary action. Here star topology three node Zigbee network is tried. The first Zigbee is connected to the personal computer it acts as full function devices and is used to send and receive data from other nodes. The second and third Zigbee are reduced function devices and they are used to control the temperature, humidity, pressure and level respectively. All the Zigbee�s are interconnected with processing unit through RS232 protocol.
Keywords: Wireless Communication; Zigbee Network; Secured data transmission; Analog to digital converter.
Abstract
A Review: Process Scheduling Approach for Starvation Improvement with Time Delay Analysis in Grid Resources Allocation
Er. Himanshu Jain, Kavita Khatkar
DOI: 10.17148/IJARCCE.2015.44132
Abstract: This paper is about the study of the Grid Resources Allocation for tackle the problem of the Starvation and scheduling the resources efficiently for reduces the time delay in processing. The work has been proposed for improve the steps of scheduling during resources allocation. The existing proposed work is the FCFS (First Come First Serve) scheduling mechanism which has been improved by implementing the priority rule. In existing work a deadline gap is been analyzed to set the prioritization. In this research work, the cache contents are maintained based on the current requirement and the previous history. The work is very similar to the recommender system that will analyze the frequency of the data requirement in previous history. The system will perform the improvement over the best first algorithm along with delay analysis. The system is about to reduce the delay and to minimize the starvation over the process allotment.
Keywords: FCFS, Grid Computing, Resource Allocation, Scheduling, Starvation.
Abstract
Comparison of Information Hiding by LSB Using Arithmetical Sequence on different image Format
Bassam Hasan Saghir, Elsamani Abd Elmutalib Ahmed, Abdelmajid H. Mansour, Gafar Zen A. Salh
DOI: 10.17148/IJARCCE.2015.44133
Abstract: Information hiding recently become an important area in many applications, and the large demand of internet implementations requires data to be transferred in a secure state, there are many techniques of Information hiding exist for the securing process. The aim of this paper is to compare the hiding of information in images by the least significant bit �LSB�. This done through inclusion of the secret message inside the image file in a complex form, so that as to make the finding of scattered information inside the image difficult, by using BMP, PNG and JPEG image format. In order to increase the security of the algorithm.
Keywords: Steganography, Information hiding, Cover image, Least Significant Bit (LSB), Stego image, spatial domain, security.
Abstract
A New Hybrid Binarization Algorithm for Manuscripts
Ashraf Nijim, Muhammad AboKresha, Ayman El Shenawy, Reda Abo Alez
DOI: 10.17148/IJARCCE.2015.44134
Abstract: In this paper a new binarization algorithm for ancient manuscripts and historical documents with bleeding noise has been proposed. This algorithm consists of three primary processes. In the first process, a given gray-scale image has been classified into three classes: black-foreground pixels class, white-background pixels class and confused pixels class. In the second process, the confused pixels class will be classified into either of the two black and white classes. The classified image was cut into rectangles using the confused-pixels vertical and horizontal histograms. Each rectangle is a sub-image containing a region of the image with pixels having similar properties. The third is a voting process where a threshold value is selected to binarize each sub-image separately. Seven thresholding values driven from six different global binarization techniques contribute to the voting process. The binarized image is the collection of the sub-images binarization results. Four different measuring metrics have been used to evaluate the results of the proposed algorithm. The performance of the algorithm has been compared with two widely used binarization algorithms which yield a significant improvement in the binarization process of ancient manuscripts and historical documents with bleeding noise.
Keywords: binarization, thresholding, hybrid algorithm, global binarization algorithms, image measuring metrics
Abstract
Design of Sierpinski Gasket Fractal Antenna using Proximity coupled feed mechanism for Multiband Applications
Ashish Dhankhar, Jaswinder Kaur
DOI: 10.17148/IJARCCE.2015.44135
Abstract: In this paper, the design of Sierpinski Gasket fractal antenna using proximity coupled feed for multiband applications is presented. Certain properties of designed antenna structure like return loss and directivity are analyzed and simulated using 3D electromagnetic simulator CST MWS 14.0. The proposed antenna is designed on FR-4 lossy substrate with thickness 1.6 mm and relativity permittivity 4.4. The proposed antenna has resulted after the successful combination of first, second and third iterations. Simulated results show that from second iteration onwards, the antenna starts showing multiband behaviour at different frequency bands. The broadband and multiple frequency features of fractal antenna are presented and discussed.
Keywords: Sierpinski Gasket, Proximity coupled Feed, CST MWS V14.0, Return Loss, Directivity, Fractal antenna and Multiband.
Abstract
Wireless Sensor Network Based Irrigation Management System
Associate Prof.B.T.Salokhe, Miss Shilpa G. Gadekar
DOI: 10.17148/IJARCCE.2015.44136
Abstract: Irrigation plays an important role in crops production. Irrigation procedures are based on farmer�s experience, soil properties and environmental conditions that are affected by changes in environmental conditions but these procedures are labor expensive, time consuming and wastage of the resources because it requires regular visits and attention. Therefore, adaption of technology is necessary for efficient utilization and saving of fresh water. Wireless sensor network is desirable solution for automating irrigation procedures, efficient utilizations of water and yield production etc. It presents an irrigation scheduling mechanism for the farmers having fewer resources that can be followed during four different seasons. In this paper, an effective irrigation management system is presented for various crops. It utilizes wireless sensor network for obtaining soil properties and environmental data continuously. Irrigation schedule of different plants is planned according to their requirement which is based on the data obtained from sensor nodes deployed at different locations.
Keywords: Wireless sensor networks (WSN), Environmental parameters, Container grown crops, Zigbee, Irrigation management system (IMS).
Abstract
Extended Bandwidth Allocation in Cloud Computing
Ganesh Sherkar, Suraj Pathak, Dhananjay Newaskar, Swapnil Bhakare, A. P. Kulkarni
DOI: 10.17148/IJARCCE.2015.44137
Abstract: We have entered into a new era of computing, Enterprises are clearly moving from the �kicking the tires� stages to initial implementation of cloud computing and it's all about the �cloud� where Data sharing is an important functionality in cloud storage over the internet There is a great deal of interest in better leveraging the benefits of cloud computing as Cloud computing is a model which enables universal, convenient, on-demand network access to computing resources that can be rapidly accessed and released with minimal effort or service provider interaction. Capabilities in Cloud can be rapidly and elastically provisioned � in some cases automatically � to quickly scale out and rapidly released to quickly scale in. Bandwidth allocation plays a major role in sharing the resources towards the data center networks. Server performance is the major problem in cloud computing. When multiple users requests for the same server at a time, the performance of the server degrades. So we describe a innovative method of re-arranging the bandwidth dynamically from passive users to active users and vice versa as well as some users are allocated bandwidth statically using bandwidth mutual sharing and fair sharing technique.
Keywords: Performance analysis, Bandwidth mutual sharing, Fair sharing techniques.
Abstract
Window ReFS File System: A Study
Ms. Santwana Gudadhe, Mrs. Radha Deoghare, Ms. Pallavi Dhade
DOI: 10.17148/IJARCCE.2015.44138
Abstract: Today file system is the important concept in the design of computer operating system. Fie system is used to store and retrieve data. With the file system it is easy to identify any information stored in it. Various file systems are available in market. Some file system are design for specific application. Today as demand is increasing for large storage space, most researchers are paying attention to increase the storage capacity of file system. Recently window release the new file system ReFS called Resilient File System supports the large storage requirement.This paper presents the overall study of Window ReFS file system. In this paper, ReFS goals and features are discussed in section 1 and 2. Section 3 include the detail study of ReFS. And finally comparison and related study given in section 5 end with the conclusion.
Keywords: ReFS,NTFS, Bit-rot,salvage
Abstract
Functional Analysis of Platform as a Service (PaaS)
Gagana P, Vaishak Sundaresh
DOI: 10.17148/IJARCCE.2015.44139
Abstract:
Keywords:
Abstract
Design and Analysis of Low Power High Performance 32-bit Ripple Carry Adder with Proposed Adder Cell
K. Bhaskara Rao, K. S. Kiran Kumar, G.Venkata Subbaiah
DOI: 10.17148/IJARCCE.2015.44140
Abstract: In this work one bit Full Adder with Ten transistors have been proposed. Reducing Power dissipation, supply voltage, leakage currents, area of chip are the most important parameters in today`s VLSI designs. The system reliability can be increased by reducing the cost, weight and physical size and it is achieved by decreasing the transistor count. Therefore the minimum power consumption target and lower area can be meet by reducing the hardware size. Digital circuits can be minimize in two methods. One is human method and another is Computational method. This paper propose one-bit Full Adder based on human method with ten transistors and simulation for the designed circuits were also performed with 4-bit, 16-bit and 32-bit ripple carry adder. Finally the simulation analysis were compared with conventional and proposed Adder in terms of total power consumption, delay, area and power delay product.
Keywords: CMOS; Conventional Full Adder; Low Power design; 4-bit RCA;16-bit RCA;32-bit RCA.
Abstract
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein
Saranya.K.R, Vanitha.S, Selva priya.G, Minojini.N, Nivi.A.N
DOI: 10.17148/IJARCCE.2015.44141
Abstract: In this work one bit Full Adder with Ten transistors have been proposed. Reducing Power dissipation, supply voltage, leakage currents, area of chip are the most important parameters in today`s VLSI designs. The system reliability can be increased by reducing the cost, weight and physical size and it is achieved by decreasing the transistor count. Therefore the minimum power consumption target and lower area can be meet by reducing the hardware size. Digital circuits can be minimize in two methods. One is human method and another is Computational method. This paper propose one-bit Full Adder based on human method with ten transistors and simulation for the designed circuits were also performed with 4-bit, 16-bit and 32-bit ripple carry adder. Finally the simulation analysis were compared with conventional and proposed Adder in terms of total power consumption, delay, area and power delay product.
Keywords: CMOS; Conventional Full Adder; Low Power design; 4-bit RCA;16-bit RCA;32-bit RCA.
Abstract
EDDDS: An Efficient Duplicate Data Detection System
Bhavana Dhake, Dr.S.S.Lomte, Prof.Y.R.Nagargoje, Prof.R.A.Auti, Prof.B.K.Patil
DOI: 10.17148/IJARCCE.2015.44142
Abstract: Multimodal biometrics use more than one means of biometric identification to achieve higher detection accuracy, since sometimes a single biometric is not good enough used to do identification and codification. Sclera and finger print strain is a new counterpart vein recognition method using a two-stage parallel approach for documentation and bouting. First, modeled a rotation- and rule-invariant Y shape descriptor based feature extraction method to efficiently eliminate most unlikely matches. Second, developed a weighted polar line sclera descriptor structure to incorporate mask information to reduce Graphics processing unit (GPU) awareness cost. Third, modeled a coarse-to-fine two-rung matching approach. Finally, developed a weighing scheme to map the subtasks to GPU processing things. The experimental upshots show that the urged method can achieve dramatic processing speed improvement without compromising the detection accuracy. Here examined the previously proposed finger-strain identification approaches and develop a new approach that illustrates it superiority over prior published efforts. Then is to progress and examine two new score-level blends, i.e., holistic and non linear fusion, and comparatively evaluate them with more popular score-level fusion approaches to ascertain their effectiveness in the proposed scheme. The aim is to combine the upshots obtained by different biometric traits and significantly improve the overall accuracy of the biometric system.
Keywords: Holistic, Fusion, Traits, GPU.
Abstract
Optimization of Mobile Applications in Mobile Cloud Computing (MCC)
Kuljeet Kaur, Dr. Pankaj Deep Kaur
DOI: 10.17148/IJARCCE.2015.44143
Abstract: Duplicate Detection is critical task of any database of any organization. Duplicates are nothing but the same real time entities or objects are presented in the form of different structure and in the different formats. We can find out the duplicates in relational data, in complex data and hierarchical data like XML. There are lots of works already presented in the past for finding the duplicates in the relational data. But nowadays there is more focus on finding duplicates in the XML data. Because of XML is very popular for data storing and extensively used for data exchange between the organizations. Here we have done an extensive literature survey on this topic and proposed a duplicate detection method that incorporates some of the existing paper's ideas and some of our original ideas. In addition to improving the efficiency and effectiveness, we also checks for its typographical errors when comparing the two XML elements. To test the correctness of our method, we are comparing it with existing duplicate detection system, and giving more focus on how we get higher precision and recall values in the various datasets we have used.
Keywords: Duplicate detection, record linkage, entity resolution, XML, Bayesian networks, data cleaning, optimization
Abstract
Colour Sensor Based Object Sorting Robort Using Embedded System
Dhanoj M, Reshma K V, Sheeba V3,Marymol P
DOI: 10.17148/IJARCCE.2015.44144
Abstract: This paper presents an application to sort colored objects with a robotic arm. We have a robotic arm which picks different colored cubes and sorts them placing in different cups. The detection of the particular colour is done by a light intensity to frequency converter method. The robotic arm is controlled by a microcontroller based system which controls DC servo motors.
Keywords: Robotic arm, Microcontroller, Light to frequency converter, DC servo motor.
Abstract
Schwa Deletion: Investigating Improved Approach for Text-to-IPA System for Shiri Guru Granth Sahib
Dhanoj Sandeep Kaur, Dr. Amitoj Singh
DOI: 10.17148/IJARCCE.2015.44145
Abstract: Punjabi (Omniglot) is an interesting language for more than one reasons. This is the only living Indo-Europen language which is a fully tonal language. Punjabi language is an abugida writing system, with each consonant having an inherent vowel, SCHWA sound. This sound is modifiable using vowel symbols attached to consonant bearing the vowel. Shri Guru Granth Sahib is a voluminous text of 1430 pages with 511,874 words, 1,720,345 characters, and 28,534 lines and contains hymns of 36 composers written in twenty-two languages in Gurmukhi script (Lal). In addition to text being in form of hymns and coming from so many composers belonging to different languages, what makes the language of Shri Guru Granth Sahib even more different from contemporary Punjabi. The task of developing an accurate Letter-to-Sound system is made difficult due to two further reasons: 1. Punjabi being the only tonal language 2. Historical and Cultural circumstance/period of writings in terms of historical and religious nature of text and use of words from multiple languages and non-native phonemes. The handling of schwa deletion is of great concern for development of accurate/ near perfect system, the presented work intend to report the state-of-the-art in terms of schwa deletion for Indian languages, in general and for Gurmukhi Punjabi, in particular.
Keywords: Gurmukhi Punjabi, IPA, Schwa deletion, Sikhism
Abstract
Financial Analysis Simulation of Marketing Commodities
Avijit Jain, Amit Pathak, N Farheen Safoora, Neantha Louiza Vaz, M Prajakta
DOI: 10.17148/IJARCCE.2015.44146
Abstract: This document presents the aim and implementation details that are necessary to get the desired output and arrive at an appropriate conclusion. According to the geometric Brownian motion model the future price of financial stocks has a lognormal probability distribution and their future value therefore can be estimated with a certain level of confidence. The goal of this paper is to study the modelling future stock prices. The assumptions on which this model is based meet the financial market laws and rules imposed by the Market Efficiency Hypothesis. These rules and laws suppose that only present information about a stock efficient to determine the future price of this that stock. Data mining is a process that is used to search for patterns or relationship between various elements of a given set of data. Data mining also refers to the derivation of relevant information from a given data set.
Keywords: Stochastic Modelling, Agricultural economics, Random walk, futures market, data analysis, Data Mining.
Abstract
Relieve the Stress by using an Android Application
Mrs.Hanumanthappa H, Mrs. Arudra A
DOI: 10.17148/IJARCCE.2015.44147
Abstract: A key challenge for mobile health is to develop a new technology that can assist individuals in maintaining a healthy life style. Now a day�s people are so busy in their daily schedules and not having enough time to contribute physically all joys & sorrows. At last they are out of society and finally nowhere in the world and went to depression. Peoples are taking odd steps in unnatural manner by facing any long depression, long frustration, cowardliness, and failures in life, related to study, related to married life as they are not getting any proper solution or consultation. If the patient is in depression status he/she has to visit hospital frequently it seems to be tiring and time consuming for both doctor and patients. Stay smiling app which will aid/assist the people who needs some counselling, the people who needs to be monitored, given special attention to come out of their stress/addiction/depression. It also aids/assists the psychiatrist or the counsellor to keep track of their patients moods, their feelings at frequent intervals through this app, give the patients motivational/inspirational videos/quotes, remind them and keep them in positive mood. When the patient repeats after 15days/1month,each and everyday�s feelings/moods and all the questionnaires(framed by the counsellors) answered will be accessed, for better understanding of the pattern of mood swings and how the patients more coping-up during that period. If that patient goes to long depression he/she can chat with any consultant as per the different categories and share their views so that they can get out of taking any odd steps and patients take care of them.
Keywords: Long depression, cowardliness, stress/addiction/depression, psychiatrist, counselling, Counsellor, Android.
Abstract
Switching from Vendor Lock-in to the Meta Cloud
B. SandhyaRani, Patil. SivaChandrika
DOI: 10.17148/IJARCCE.2015.44148
Abstract: Business locked into cloud doesn�t guarantee that the provision of service quality will be continued. By considering the above problem there is a need for the business to permanently caring the cloud that is used and switching to another cloud if problems are discovered. Currently migrating to another cloud is not ignorable. Services like EC2 and S3 are incompatible and doesn�t follow specific standards but follow their own. For complicating still more many companies not only build on public on Public Clouds but their own Private Clouds will be combined with public cloud, evolving to the hybrid cloud. The concept of Meta Cloud is introduced that includes runtime and design time components. This Meta Cloud minimizes the technical incompatibilities and thus switching to another cloud. This helps the customers to choose appropriate cloud services for particular appropriate use case.
Keywords: Cloud Computing, Meta Cloud, SLA, DSL.
Abstract
Implementing Multiprime RSA Algorithm to Enhance the Data Security in Federated Cloud Computing
Dr.M.Srivenkatesh, Ms.K.Vanitha
DOI: 10.17148/IJARCCE.2015.44149
No abstract available.
Abstract
A Secure Development Scheme of the Hash Function and its Implementation in Public Key Cryptography for Maintaining the Privacy of Data in the Federated Cloud Computing
Dr.M.Srivenkatesh, Ms.K.Vanitha
DOI: 10.17148/IJARCCE.2015.44150
Abstract: FederatedCloud computing is an internet based technology where a large amount of resources are shared as a service among several cloud service providers. Privacy of Data is very critical issues in federated cloud computing. We propose hash function and its implementation in public key cryptography for maintaining the privacy of data in the federated cloud computing.
Keywords: Federated Cloud computing, privacy of data, MD5.
Abstract
Low Power Array Multiplier using Modified GDI Cell for Full Output Swing
Mrs. Veenadevi SV, Rajavenu Pidi
DOI: 10.17148/IJARCCE.2015.44151
Abstract: One of the mostly used circuits in the digital designs is Multiplier. In digital signal processing multiplication is the most commonly used function. Due to high throughput hardware multiplication is most commonly used. Many designs of multiplier have already been proposed for low power. GDI (Gate diffusion Input) a new technique for low power Multiplier design has a limitation of low output swing. Here a modified GDI cell based multiplier is designed and used for Low power and full output swing.
Keywords: GDI- Gate diffusion Input, Multiplier, Multiplexor, Adder, Low power
Abstract
Design of =100Gbps Based Optical AP-DCDM Network
Naina Khanna, Ayoush Johari, Dr. Soni Changlani
DOI: 10.17148/IJARCCE.2015.44152
Abstract: Multiplexing is a technique that increases channel capacity and reduces the cost of overall system. In this paper five user Absolute Polar Duty Cycle Division Multiplexing (APDCDM) is done in electrical domain. Here each user generates different RZ duty cycle pulses and data rate of 20Gbps, the 100Gbps signal is transmitted through a Standard Single Mode Fibre. It has been observed that at the signal is successfully transmitted up to 75 Km distance and Q-factor also calculated as 15dB.
Keywords: APDCDM, BER, Q-factor.
