VOLUME 4, ISSUE 8, AUGUST 2015
Dispersion Compensation Techniques for DWDM Optical Networks
M.Tosson, Walid S. El-Deeb, A. E. Abdelnaiem
An Optimized Design of Counter Using Reversible Logic
Md. Mizanur Rahman, Indrani Mandal, Md. Selim Al Mamun
System Engineering Based on Micro-Controller for Election Management System [EMS]
Innocent Kabandana, A.N. Nanda Kumar
Gene Sequencing Parallelization Using Smith-Waterman Algorithm
Deepa B. C, Nagaveni. V
Methodology to Detect and Diagnose Faults in Memories using BIST
S. Gayathri, V. Senthil Kumaran
Design & Implementation of Data Forwarding Mechanism with Sleep Scheduling in WSN
Isha Batra, Mr Harish Saini
Smart Trolley with Instant Billing to Ease Queues at Shopping Malls using ARM7 LPC2148: A review
Mohit Kumar, Jaspreet Singh, Anju, Varun Sanduja
1-D Cursor Movement using Brain Computer Interface
Mr. Nilesh Zodape, Dr. Narendra Bawane, Pratik Hazare
Video Shot Detection on Embedded System
Priyanka S, Dr.Jharna Majumdar, Santhosh Kumar K L
Review on Text-To-Speech Synthesizer
Suhas R. Mache , Manasi R. Baheti , C. Namrata Mahender
Evaluation of Similarity metrics for translation retrieval in the Hindi-English Translation Memory
Shashi Pal Singh, Ajai Kumar, Hemant Darbari, Sukanya Chauhan, Nandita Srivastava, Priya Singh
System Intelligent Agent in Distributed Computing
Prof.B.Murali, Ms.A.Mary Subasree
Deadline, Budget and Mobile Context Platform for Mobile Cloud Apps
Gadige Radha, G Divya Zion
Comparative Response of FIR Filter Using GA PSO BBO
Saurabh Kumar, Pradeep gaur
Design and Development of Dynamic Optimal Path Based Fault Tolerant Routing in Optical Networks
Tanu Sharma, Prof. Ashok Kumar
Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks Using Mobile Nodes
Ashwini.K, J.Gayatri, Anitha, Vani.N
Optimization of 64 bit Multiplier using Carry Save Adder and its DSP Application using Cadence
P.Rajani, G.L.Sumalata
Leakage Resilient Crypto System to Avoid Key Leakage for Data Sharing In Cloud Storage
Praveen Kumar, L. Janardhan
Supporting Privacy Preserving and Content Protection Using Location Based Query
Sherin Ansm Thomas, Seena Teresa George
Gesture Based Commands to Interact with the OS
Chaitra B H, Anupama H S, Cauvery N K, Lingaraju G M
Design and Simulation of Meander Line Antenna for RFID Passive Tag
Vikram P, Dr. H.V Kumaraswamy, R.K Manjunath
Handwritten Devanagari Character Recognition using SVM and ANN
Arjun Singh, Kansham Angphun Maring
A Research: Knowledge Representation using Fuzzy Logic in Ontology Modelling
Preksha, Mrs. Chandna Jain
EE-DSR: Energy Efficient Dynamic Source Routing in Wireless Ad Hoc Networks Using Residual Energy
G. Krishna Priya, Dr. G. Prakash Babu
A Review: Knowledge Representation using Fuzzy Logic in Ontology Modelling
Preksha, Mrs. Chandna Jain
A Fabrication Study on DCF Compensated SMF using Optsim Simulation Software
Anil Kumar, Dr. Mahipal Singh
2PDAS-Privacy Preserved Data Deduplication with Auto Attestation Strategy for Cloud Data
Mathumathi.B, Swapna.Mp
An Energy Efficient Clustering Algorithm with Adaptive Self-Organization for Wireless Sensor Networks
Akash Govil, Govind Patidar
Pervasive Computing and Brain Computer Interface
Debdutta Pal, Sayani Majumder, Anisha Ali
Automatic Building Detection Using Modified Grab Cut Algorithm from High Resolution Satellite Image
Mahak Khurana, Vaishali Wadhwa
Bit Error Rate Analysis of Block Coded Wireless System over α-µ Fading Channel
Dharmraj, Himanshu Katiyar
Analysis of Attacks in Cognitive Radio Networks
M.Padmadas, Dr.N.Krishnan, V.Nellai Nayaki
Design and Implementation of DDR3 Controller with AXI Compliancy
M. Naveen Kumar, M.Kiran
Video Background Subtraction using Multi Background Model & Robust Threshold
VinkyDhingra, Vaishali Wadhwa
A Compressed Sensing Based Direct Sequence Spread Spectrum Communication System
P. Srilatha, V. Manohar
Design and Characterization of an UWB Antenna with Multiple Band Notch using EMPro
Ravikumar Hullur, N N Nagendra
The Study of E-Security in Internet Banking
Miss Sarika B. Gaikwad, Miss Ashwini A. Yadav, Miss Pallavi H.Patil
Process Scheduling Approach for Starvation Improvement with Time Delay Analysis in Grid Resources Allocation
Er. Himanshu Jain, Kavita Khatkar
An Efficient Genetic Algorithm for Fault Based Regression Test Case Prioritization
Jyoti, Mrs. Lekha Bhambhu
Modified Genetic Algorithm for Efficient Regression Test Cases
Jyoti, Mrs. Lekha Bhambhu
PCA Algorithm for Efficient Face Recognition System
Manisha Nirania, Mr. Krishan Kumar
Efficient Face Recognition Technique using PCA in Neural Network
Manisha Nirania, Mr. Krishan Kumar
Handwritten Signature Recognition,Verification and Dynamic Updation using Neural Network
Meetu Sangwan, Mr. Daulat Sihag
Resolution Enrichment Techniques for Image incorporated with Text
Mohit, Krishan Kumar
A Practical Ant Colony Optimization Technique based Image Edge Detection
Nitin Tarar, Vikas Kamra
Conduction of Sheltered Information Providing Multiple Coatings around Data and using Audio as Transporter
Mr. Vikas Kamra, Parul
Secure Digital Images using Hidden Watermarking
Priyanka Arora, Mrs. Chandana
Efficient Watermarking Algorithm for Digital Images
Priyanka Arora, Mrs. Chandana
Performance Analysis of K-Mean Clustering on Normalized and Un-Normalized Information in Data Mining
Richa Rani, Mrs. Manju Bala
An Improved LSB Image Steganography using TSFS
Ruchi, Mr. Vipul Goyal
Image Steganography Combined with TSFS using LSB
Ruchi, Mr. Vipul Goyal
Efficient Artificial Neural Network based Practical Approach of Stock Market Forecasting
Rupinder kaur, Ms. Vidhu Kiran
Time Series based Accuracy Stock Market Forecasting using Artificial Neural Network
Rupinder kaur, Ms. Vidhu Kiran
Enhancing Data Security and Privacy on Web OS using TSFS
Preeti, Kavita Khatkar
Study on Multitier Biometric Authentication using Cryptography with Fingerprint and Eyelashes
Ms. Saranyadas S, Dr.A.Nithya
Impact of Reciever Systems’and Channel’s Parameters on Distributed Computing Power Ratio in OFDMA based Wireless Distributed Computing Network
TanguduRamji, P. Sirish Kumar, L. Rambabu, A. Rajesh
An Improvement in Data Hiding Rate on Color Images
Rose Mary kurian, Divya S B
Real Time Intrusion Alert Aggregation for Distributed Intrusion Detection System and Prevention of Attacks
Madhuri Chavan, Manjusha Deshmukh
Design Reed Solomon Decoder with Minimum Area Consumption on FPGA
Saroj Bakale, Dhananjay Dabhade, Vijay Wadhankar
Scheduling Approaches and Routing Protocols in Wireless Mesh Networks-A Survey
Prof.K.S.Mathad, Dr.S.R.Mangalwede
Spatial-Temporal Filtering for Video Denoising using Weighted Highpass Filtering Coefficients
Rubi Saluja, Ajay Boyat
Product selection from comparative question using cosine similarity analysis and weight feature analysis
Miss. Pranali Patil, Mr. Sudip Tembhurne, Mr. Rugved Deolekar
Extending Modular Software Model Checking to Peer-to-Peer Architecture systems
Kaveti Sujana, M.C.Bhanu Prasad
Minimizing Electricity Theft by Internet of Things
Maninderpal Singh, Er.Varun Sanduja
Routing Protocol in Urban Vehicular Scenarios
Mr. Prashant Maroti Adhao, Dr. Ravindra C. Thool
Detection of Vampire Attack and Prevention in MANET
Harsha.N, Rashmi.S
Spam Detection Using Data Mining Tool In Matlab
Amandeep Kaur, Jatinder Kaur
Secure Data Communication in Cloud Computing using Proposed DSA
Swati Chaudhaary, Arvind Negi, Prashant Chaudhary
Spam Web Page Detection based on Content and Link Structure of the Site
Kiran Hunagund, Santhosh Kumar K L
A Review of Different Analysing Methods to Detect Spinal Deformity
Tabitha Janumala, Dr. K B Ramesh
Efficient Auditing Mechanism for Data Storage in Cloud Using Abs
P.Suresh, R.Malathi
Data Mining Techniques for Cloud Technology
Kareemunnisa, D Swetha, P S Silpa, D Anuradha, Ravindra Changala
Design of Digital Phase Locked Loop for Wireless Communication Receiver Application
Pradnya H.Golghate, Prof.Pankaj Hedaoo
Implementation of Watermarking Technique for Secured Transmission
Ms. Nidhi Bux, Prof. K. J. Satao
Content Based Image Retrieval
Pallavi S. Devraye, Dr. Aditya Abhyankar
Detection of Double JPEG Compression on Color Images using EBSF Method
Ann Josy John, Jissy Liss Jose
Data Security and Updation of Data Lifecycle in Cloud Computing using Key-Exchange Algorithm
Sangita Rautela, Arvind Negi, Prashant Chaudhary
Development of Decision Making and Analysis on Customer Reviews using Sentiment Dictionary for Human-Robot Interaction
Gurunath H Naragund, Santhosh Kumar K L, Jharna Majumdar
Real Time Monitoring of Water Level Variations In Rivers and Flood Alerting System using Arm7
D. Mysar, M. Jagadeesh babu
A Survey on Energy Efficient Clustering Protocols in Heterogeneous Wireless Sensor Networks
Harwinderpal Singh, Lokesh Pawar
Refining Multibiometrics System by Exhausting Multiple feature Extraction
Chanda J. Jangid, Dipak R. Patil
SNR Improvement for Evoked Potential Estimation using Bi – Orthogonal Wavelet Transform
Shailesh M L, Dr. Anand Jatti, Madhushree K S, Siddesh M B
Interfacing and Controlling of Liquid Crystal Display with Single Board Computer for Communication Access Terminal
G.Hemavathi, J.T.Pramod
Optimized Hindi Script Recognition using OCR Feature Extraction Technique
Nisha Goyal, Er. Shilpa Jain
Data Mining and Knowledge Extraction in the Risk Based Insurance Audit: A Case Study (City of Tehran)
Hossein Amirinia, MA Afshar Kazemi, Zahra Alipoor Darvish
Microcontroller based Navigation System for Visually Impaired People
Chaitali Kishor Lakde, Dr. Prakash S. Prasad
A Study on Reversible Fragile Image Watermarking Scheme
Pooja Loni, V.S. Malemath, Sushma Chaugule, Anup Kalyanashetti
A Prototype for Secure Information using Video Steganography
S. Deepa, R. Umarani
Offline PLC Failure Detection Method: A Case Study
Mr Atul B. Vitekar, Prof Dr M. S. Nagmode, Alok Pawar
A Review: Performance Measurements of Transport Protocols
A. M. Anisul Huq
Design, Analysis and FPGA Implementation of N Bit Vedic Multiplier Based on Different Adder Architectures
S.Tamilselvan, V. Anil Kumar, V. Kamalkannan, CH.V.M.S.N.Pavan Kumar
Hybrid approach for Feature Extraction and Chaotic Time Series Prediction using ANFIS Model
Saurabh P. Dravyakar, Prof. Pravin Kshirsagar
Efficacy of IPv6 over IPv4 Addressing Protocol for Integration of Various Wireless Ad-hoc Networks
Pradeep Kumar Gaur, Dr. (Mrs.) Anupma Marwaha
Review: ROI Based Medical Image Compression using DCT and HAAR Wavelet
Sarvarinder Singh, Er. Sarabjit Singh
Analysis of Simulation Parameter of WCDMA for Root Raised Cosine Filter
Qazi Saeed Ahmad, Saif Ahmad, Mohd Javed Khan
Word-wise Script Identification of South Indian Document Images
Smita Biradar, V.S. Malemath, Suneel C Shinde
Watermarking of the Fingerprint Template using Optimal Frequency Band
Amanpreet Kaur Wadhwa, Monica Goyal
Performance Analysis of Vertical handoff metrics using Variance based algorithms
Abhijit Bijwe, Dr. C.G.Dethe
Privacy Preserving Using Association Rule in Data Mining Techniques
Mrs. S. Vasanthi, Ms. S. Nandhini
Design and Implementation of a Digital Accumulator for the Phase Coherent Radio Pulse Signal using FPGA
Dr.Kamal Aboutabikh, Dr.Mansour Babiker Idris, Dr.Ibrahim Haidar
Cost Optimal Approach using PSO in QOD Protocol for Hybrid Wireless Network
G.Angeline Prasanna M.Sc., M.Phil., M.C.A.,(Ph.D), K.Prabhakaran
Study on Image Compression Algorithms using Ideal Images
Dr.G.Boopathi, Dr. Narayanan Sreekumar
Identity Based Approach for Cloud Data Integrity in Multi-Cloud Environment
Ali Mohammed Hameed Al-Saffar
Estimation of Device Parameters for an Efficient Model Analysis in CV Measurement for Al/Si/P-Si Heterostructure
Mrs. Sabarna Dhar, Mrs. Parikha
A Conceptual Model For Ontology-based Mental Model
Somayeh Mohammadi, Hayedeh Saberi, Touraj Banirostam
Abstract
Dispersion Compensation Techniques for DWDM Optical Networks
M.Tosson, Walid S. El-Deeb, A. E. Abdelnaiem
DOI: 10.17148/IJARCCE.2015.4801
Abstract: Dense Wavelength Division Multiplexing (DWDM) is a promising technology introduced to enhance the channel capacity and increase the bandwidth of the optical fiber communication system. The DWDM technology is based on sending multiple information channels with different wavelengths on a single fiber cable. With high-speed transmission and long distance cables, the information signal faces undesired kind of dispersion called chromatic dispersion. This paper presents two different techniques using Fiber Bragg Grating (FBG) and Dispersion Compensation Fiber (DCF) to compensate for such kind of dispersion. This study has been performed and simulated using Optisystem7 tacking many parameters into consideration such as; Bit Error rate (BER), Quality factor (Q-factor) and Eye height. The simulation has been performed for bit rate of 40 Gbps and cable length of 150 Km.
Keywords: Bit error rate (BER), Chromatic dispersion, DCF, EDFA, FBG, NDSF, NZDSF Q-Factor.
Abstract
An Optimized Design of Counter Using Reversible Logic
Md. Mizanur Rahman, Indrani Mandal, Md. Selim Al Mamun
DOI: 10.17148/IJARCCE.2015.4802
Abstract: Reversible computing has been gaining a great deal of attention from researchers because of its low power consumption. A good amount of research work has been carried out in the area of reversible combinational logic as well as sequential design of reversible circuits. In this paper we proposed efficient designs for both the asynchronous and synchronous counter circuits that are optimized in terms of quantum cost, delay and the number of garbage outputs.
Keywords: Reversible Logic, Delay, Garbage Output, Flip-Flop, Quantum Cost.
Abstract
System Engineering Based on Micro-Controller for Election Management System [EMS]
Innocent Kabandana, A.N. Nanda Kumar
DOI: 10.17148/IJARCCE.2015.4803
Abstract: Election is one of the indicators which is used by different countries to promote their democracy for allowing the eligible citizens to elect their efficient leaders to lead their political parties, institutions, and even their countries. In present era, the technology is growing amazingly and it is playing a significant role in Election System to minimize elevated expenses of manual and paper-based systems like, money spent on paper based voting, indelible ink, man power expenditure. The technologies have also been improved to reduce the possible errors which can happen in the process of election time, in voting and counting the votes as well as in publishing the votes. This paper describes the key components on security issues in the hardware and software of Electron Voting Machine (EVM), and significance of Rivest Shamir Adleman (RSA) algorithm to assure the security of the election systems. The main objective of this paper is to pronounce the primary role of E-Voting and its security in securing the voters privacy, integrity, reliability, simplicity, verifiability, coercion and accountability.
Keywords: EVM, Micro-controller, RSA algorithm, and EMS.
Abstract
A Survey on Location Based Service
E.Anitha, Dr.M.Sornamageswari
DOI: 10.17148/IJARCCE.2015.4804
Abstract: Mobile technology is one of the fast growing technologies to improve the communication among the people. With the tremendous growth in mobile technology, people of the mobile user want to know the information regarding their needs which is based LBS (Location Based Service). LBS enable mobile users to query points-of-interest (e.g., ATM, restaurants) on various features (e.g., category, price, quality, and variety). They manage points-of-interest (POIs) specific to their applications, and enable mobile users to query for POIs that match with their preferences and time constraints and also it secures a user identity and locality within basic mobile communication services. For this approach this paper provides the survey about various techniques for providing the accurate and efficient query for the mobile users.
Keywords: Wireless Network, Mobile technology, LBS, Accurate and Efficient Query Processing.
Abstract
Gene Sequencing Parallelization Using Smith-Waterman Algorithm
Deepa B. C, Nagaveni. V
DOI: 10.17148/IJARCCE.2015.4805
Abstract: Genomics is the determination of the complete DNA sequence of an organism. The objective of modern human genomics is preventive, predictive and individual medicine. In agriculture, the goal is the production of foods with improved production characteristics and increasingly beneficial consumer traits. Post-genomics refers to the biological processes that follow from DNA sequence. Efficient sequence alignment is one of the most important and challenging activities in bioinformatics. To perform and accelerate sequence alignment activities several algorithms have been proposed. Smith-Waterman algorithm represents a highly robust and efficient parallel computing system development for biological gene sequence. The research work here gives a deep understanding and knowledge transfer about existing approach for gene sequencing and alignment using Smith-Waterman algorithm their strength and weaknesses. Smith-Waterman algorithm calculates the local alignment of two given sequences used to identify similar RNA, DNA nucleotides. To identify the enhanced local alignments of biological gene pairs Smith-Waterman algorithm uses dynamic programming approach. It is proficient in finding the optimal local alignment considering the given scoring systems.
Keywords: Smith-Waterman, Dynamic Programming, Smith-Waterman Algorithm (SW), Needleman-Wunsch Algorithm (NW).
Abstract
Methodology to Detect and Diagnose Faults in Memories using BIST
S. Gayathri, V. Senthil Kumaran
DOI: 10.17148/IJARCCE.2015.4806
Abstract: This project presents a scheme for detecting and diagnosing faults that are commonly occurred random access memory and Read only memory. The build in self test technique is used to identify permanent failures in embedded memories. The target of the project is fault detection and diagnosis in ROM and RAM such as single cell faults, row and column wise faults using Build in self test. In all the proposed test methods, Design for Test and Built-In Self-Test techniques have been proven to be very effective by the meaning of increasing the observability and controllability of the Circuit under Test thus fault is detected so as to increase the reliability of the memories. The proposed approach offers a simple test flow and does not require intensive interactions between a Build in Self Test controller and a tester. The scheme rests on partitioning of rows and columns of the memory array by employing low cost test logic. The signature is created for comparing the faulty cell and it is compared with the array of rows and columns. If there present the mismatch of signature already available with the testing cell then the fault is detected. Thus this project is designed to meet requirements of high-speed automatic test thus enabling detection of timing defects. It produces efficient way of identifying faults in memories.
Keywords: SRAM Read Only Memory (ROM), Random Access Memory (RAM).
Abstract
Design & Implementation of Data Forwarding Mechanism with Sleep Scheduling in WSN
Isha Batra, Mr Harish Saini
DOI: 10.17148/IJARCCE.2015.4807
Abstract: Energy is a scarce resource in wireless sensor networks (WSN) and conservation of energy has been the subject of extensive research. This paper proposes an optimal routing mechanism under sleep scheduling in wireless sensor networks. Duty cycling is a technique that increases energy efficiency by allowing a node to turn off part or all of its systems for periods of time. These sensor networks have certain characteristics such as limited power and battery driven. In this work, an on demand routing under asynchronous sleep scheduling is proposed for each sensor. The aim of this work is to minimize the energy consumption by nodes so that lifetime will improve. The proposed mechanism is implemented with MATLAB.
Keywords: Sleep Awake Cycle, shortest path in Networks, wireless sensor networks, sleep scheduling.
Abstract
Smart Trolley with Instant Billing to Ease Queues at Shopping Malls using ARM7 LPC2148: A review
Mohit Kumar, Jaspreet Singh, Anju, Varun Sanduja
DOI: 10.17148/IJARCCE.2015.4808
Abstract: The modern technology has increased the standard of living for the humans. Every one of us craves for a quality in everything we use in our daily lives. So, this has resulted in large crowds at shopping malls which have lead to long lines at the billing counter because the cashier has to scan every product item and then enter it into the billing record. The prevailing billing system is a bit time consuming. So, we thought of inventing a remedial electronic product to catch-up with this problem. We call it �Smart Trolley with Instant Billing to Ease Queues at Shopping Malls using ARM7 LPC2148: A Review��. This is based on arm7 microcontroller fitted with a LCD and RFID scanner and a wireless technology called zigbee. The LCD used is a 16x2 and zigbee modules make the wireless network to work even at long distance due to its wide range. The brief description of its operation is, when you pick a product and drop it into the trolley, the RFID scanner scans the product�s unique code and its price. And it gets displayed on the LCD screen. So after costumer has finished with the shopping he/she has to visit the counter and pay the bill as displayed on the LCD screen fitted on the trolley. This will save the time that was earlier being consumed to scan each item.
Keywords: Smart trolley, digital trolley, ARM7 LPC2148, Zigbee, RFID, Instant billing.
Abstract
An Efficient way to Gather Big Data in WSN using Mobile Sink Routing
Vijayalaxmi
DOI: 10.17148/IJARCCE.2015.4809
Abstract: The big data has become a popular topic because of enormous growth in the field of information technology. The distributed sensor network is the production of big data. A single sensor in a network may not give a significant data, but the data sensed by millions of sensors produce a big data. Big data gathering in densely distributed sensor network with energy efficiently is a challenging task. One of the most efficient solutions for this challenge is the utilization of sink node. This method can determine the sink node�s trajectory and data gathering method through clustering. In this paper the proposed method is establishing sink routing and clustering method based on k-medoid algorithm.
Keywords: Big Data, Wireless Sensor Network, Sink Node, Sink Routing, Routing, Clustering.
Abstract
1-D Cursor Movement using Brain Computer Interface
Mr. Nilesh Zodape, Dr. Narendra Bawane, Pratik Hazare
DOI: 10.17148/IJARCCE.2015.4810
Abstract: The main idea of the current work is to use a wireless Electroencephalography (EEG) signal as a remote control for the mouse cursor of a personal computer. The proposed system uses EEG signals as a communication link between brains and computers. Signal records obtained from the PhysioNet EEG dataset were analyzed using the Coif lets wavelets and many features were extracted using PSD. The extracted features were inputted into machine learning algorithms to generate the decision rules required for our application. The suggested online system was tested and very good performance was achieved. This system could be helpful for disabled people as they can control computer applications via the imagination of 1D-cursor movement.
Keywords: EEG; BCI; Data Mining; Machine Learning; SVMs; NNs; DWT; Feature Extraction.
Abstract
Video Shot Detection on Embedded System
Priyanka S, Dr.Jharna Majumdar, Santhosh Kumar K L
DOI: 10.17148/IJARCCE.2015.4811
Abstract: Currently digital videos are used in different fields of technology and in daily activities of human. The processing of image or video provides an understanding of the particular scene that it describe and of course it is very essential task in technologies like Robotics, Video surveillance and Multimedia. So it has become an area of research in the recent years. Video shot boundary detection is one of the research works in the field of video processing. The Shot boundary detection plays very important role for a browsing, retrieving, classifying and detecting any event. Video shot transitions provide simple jump points for browsing the videos. There are so many methods to detect the shot change, which have been proposed, many researches are trying hard to put forward various algorithms of this. In this paper, we have tried to analyse the performance of some of the video shot detection methods on embedded system such as on Beagle Board.
Keywords: Video Shot Detection (VSD), BeagleBoard, Edge Change Ratio (ECR).
Abstract
Review on Text-To-Speech Synthesizer
Suhas R. Mache , Manasi R. Baheti , C. Namrata Mahender
DOI: 10.17148/IJARCCE.2015.4812
Abstract: In this paper we try to explore various Text-to-Speech synthesis techniques developed and implemented by several speech synthesis researchers and research groups over the world during the last decades. Few Text-to-Speech synthesizer software and hardware�s are mentioned with its features. Today�s most popular device smart phone has capabilities to read a text and e-book aloud. A continues research is going on speech smoother with the help of one of the key approaches i.e. statistical parametric approach to speech synthesis. This paper aims to give an overview of speech synthesis in Indian languages, summarizes and compares the characteristics of various synthesis techniques used.
Keywords: Text processing, Text-To-Speech (TTS) synthesizer, Speech Enhancement.
Abstract
Evaluation of Similarity metrics for translation retrieval in the Hindi-English Translation Memory
Shashi Pal Singh, Ajai Kumar, Hemant Darbari, Sukanya Chauhan, Nandita Srivastava, Priya Singh
DOI: 10.17148/IJARCCE.2015.4813
Abstract: This paper discusses the bigram model with 3-operation Edit Distance (Levenshtein Distance) String matching metrics for translation retrieval in Hindi-English Translation memory system. In this method we used the statistical language modeling (N-gram approach) to compute bigrams and then implemented the dynamic programming algorithm Levenshtein Distance to find the minimum number of edit operations required transforming one bigram to another and will act as a measure to provide extent for the matching of current input and the source in the TM. This measure will decide whether the translation retrieved correspondingly will be exact match or fuzzy match. Other string matching approaches are evaluated with Levenshtein Distance proving to be more effective comparatively.
Keywords: String Matching, Bigram modelling, Levenshtein Distance, Hindi-English Translation memory (TM).
Abstract
System Intelligent Agent in Distributed Computing
Prof.B.Murali, Ms.A.Mary Subasree
DOI: 10.17148/IJARCCE.2015.4814
Abstract: The Internet is a global network connecting millions of computers. The Industries based on network and information sharing is wide spread across the world having major control on the economic sector of the world. Networking and distributed computing plays the key role for the survival of IT industries. The downtime in these sectors caused by the failure in the distributed networks is handled by various techniques. Network management agents have existed for years; System agents are one such software agents whose main job is to manage the operations of a data communications network. These agents monitor for device failures or system overloads and redirects work to other parts in order to maintain a level of performance and reliability. This paper surveys various agent techniques that reduce down time caused by system failure and states the effects of the system down time and the use of system agent in the field of distributed computing is analysed.
Keywords: Distributed computing, downtime in IT, fault tolerant agents, system agents.
Abstract
Deadline, Budget and Mobile Context Platform for Mobile Cloud Apps
Gadige Radha, G Divya Zion
DOI: 10.17148/IJARCCE.2015.4815
Abstract: Scientific applications require large computing power, traditionally exceeding the amount that is available within the premises of a single institution. Therefore, clouds can be used to provide extra resources whenever required. For this vision to be achieved, however, requires both policies defining when and how cloud resources are allocated to applications and a platform implementing not only these policies but also the whole software stack supporting management of applications and resources. Aneka is a cloud application platform capable of provisioning resources obtained from a variety of sources, including private and public clouds, clusters, grids, and desktops grids. In this paper, we present Aneka�s deadline driven provisioning mechanism, which is responsible for supporting quality of service (QoS)-aware execution of scientific applications in hybrid clouds composed of resources obtained from a variety of sources. Experimental results evaluating such a mechanism show that Aneka is able to efficiently allocate resources from different sources in order to reduce application execution times.
Keywords: Mobile Cloud Apps, Cloud Computing, IaaS, PaaS, SaaS, Mobile Computing, Cloud Providers, Cloud Services, Aneka Cloud Platform.
Abstract
Comparative Response of FIR Filter Using GA PSO BBO
Saurabh Kumar, Pradeep gaur
DOI: 10.17148/IJARCCE.2015.4816
Abstract: Digital filters have found important applications in an increasing number of fields in science and engineering, and design techniques have been developed to achieve desired filter characteristics. This paper presents optimization techniques for the design of optimal digital FIR low pass filter. The design of digital FIR filters possible by solving a system of linear equations. In this paper, design techniques of low pass FIR filters using Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Biogeography based optimization are presented and comparison of these fir low pass filter design techniques on the basis of elapsed time. The implementation is done in matlab7.5.
Keywords: Fir filter, Genetic algorithm, PSO, BBO etc.
Abstract
Design and Development of Dynamic Optimal Path Based Fault Tolerant Routing in Optical Networks
Tanu Sharma, Prof. Ashok Kumar
DOI: 10.17148/IJARCCE.2015.4817
Abstract: Wavelength Division Multiplexing (WDM) systems have increasingly been deployed to increase the capacity of optical networks. It is thus desirable to detect and locate faulty nodes to ensure the quality of service of networks. In this work, the main problem is to handle node failure and link failure in optical networks. The other problem is reliability maximization problem in the high failure probability system. To overcome this, it proposes a novel light-path routing algorithm mechanism for handling node failure & link failure in optical networks. It also proposes a mechanism of routing based on prediction to decrease the blocking probability in network. The main focus is on the design of optimized networks in which the rerouting scheme to avoid fault is as simple as possible. In this work, it works on optimal route selection in presence of large no. of faults. The new approach will provide a methodology for the Retracing of Path having good Packets with accuracy. This assessment becomes the power performance booster among the previous workout as it automatically determines the shortest path after path hopping is traced. The network performance is evaluated is terms of blocking probability. The results shows that value of blocking probability is very low (~10-7) and is reduced to zero after some time.
Keywords: Network Routing, Optical Networks, shortest path, Blocking Probability.
Abstract
Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks Using Mobile Nodes
Ashwini.K, J.Gayatri, Anitha, Vani.N
DOI: 10.17148/IJARCCE.2015.4818
Abstract: We consider the problem of gathering data from a sensor network using mobile elements. The goal is to plan the paths for the mobile elements that minimize the total length travelled. We propose an algorithmic solution that builds node disjoint tours that always include the sink, cover the network, and optimize the total length travelled. We provide an integer linear programming formulation for the problem, and propose two novel heuristics for building the tours. We evaluate the performance of our algorithm by comparing it to the optimal solution as well as to an alternative heuristic, commonly used in related time-window vehicle routing problems, and demonstrate the superior performance of our approach.
Keywords: Wireless sensor network (WSN), WIMAX technology, novel heuristics, Wireless Distribution System (WDS).
Abstract
Cloud Computing Security with VPN
M. Judith Bellar
DOI: 10.17148/IJARCCE.2015.4819
Abstract: Cloud Storage is a service where data is remotely maintained, managed, and backed up. The service is available to users over a network, which is usually the internet. It allows the user to store files online so that the user can access them from any location via the internet. The provider company makes them available to the user online by keeping the uploaded files on an external server. As the cloud provides many features it has some drawbacks too. However, while the features are useful for providing basic computation and storage resources, they fail to provide the security and that many customers would like. Security is a top concern among organizations evaluating cloud service providers. While most service providers allow customers to implement their own security measures, few of them have comprehensive security tools to offer their customers. Among these tools, one of the most important to customers and service providers alike is the ability to securely interconnect physical and virtual datacenters with virtual private networks (VPNs). This paper describes how secure connectivity to public cloud networks with VPN.
Keywords: Cloud Computing, VPN, Security, Firewall, Tunneling.
Abstract
Optimization of 64 bit Multiplier using Carry Save Adder and its DSP Application using Cadence
P.Rajani, G.L.Sumalata
DOI: 10.17148/IJARCCE.2015.4820
Abstract: In this paper we have shown the design and implementation of multiplier in which carry save adder is used as an adder block for the addition of partial products of both multiplier and multiplicand as 64 bits and the product size is of 128 bit. Multiplication is the fundamental arithmetic operation that plays a critical role in several processors and digital signal processing systems. Digital signal processing systems need multiplication algorithms to implement DSP algorithms such as filtering where the multiplication algorithm is directly within the critical path. The Finite Impulse Response (FIR) filter is a digital filter widely used in Digital Signal Processing applications in various fields. The implementation of an FIR requires three basic building blocks i.e. Multiplication, Addition, Unit delay. In a DSP system the multiplier must be fast and must have sufficient precision (bit width) to support the desired application. A high quality filter will in general require more multiplications than one of lesser quality, so throughput suffers if the multiplier is not fast. Hence 64 bit multiplier with carry save adder is designed and the same block which is of 8 bit is implemented in FIR (8-tap) filter. A comparison between array multiplier and multiplier with carry save adder is shown and the proposed technique is efficient in terms of power. A comparison between FIR filter with array multiplier block and FIR filter with multiplier with carry save adder block is shown and the proposed technique is efficient in terms of power and speed. The code is written in Verilog and the simulation and synthesis is carried out in Cadence Encounter tool.
Keywords: Cadence Encounter, Verilog, Array Multiplier, Multiplier with Carry Save Adder, FIR Filter with Array Multiplier block, FIR Filter with Multiplier with Carry Save Adder block.
Abstract
Leakage Resilient Crypto System to Avoid Key Leakage for Data Sharing In Cloud Storage
Praveen Kumar, L. Janardhan
DOI: 10.17148/IJARCCE.2015.4821
Abstract: The requirements of facts safety measures in time intervals a new business include underwent major adjustments with final a lot of many years. Just before common usage of facts method instrumentation this safe practices of facts believed being useful to a new business was presented primarily by actual physical and management indicates. Foreign hard drive is actually getting good quality just lately Foreign computing depends upon revealing of methods to obtain coherence and economic climates of range like a power (like this energy grid) more than a circle. exploitation this fog up hard drive, customers keep the home elevators this fog up although not the burden of facts hard drive and repair and services and high-quality applications from your contributed swimming of configurable computing methods Cryptography is actually it's possible this primarily important facet of devices safety measures and is particularly growing to be gradually important like a simple source regarding laptop safety measures. Seeing that facts revealing is usually a crucial practicality with fog up hard drive. During this function we now have a new tendency showing that will methods too securely, having productivity and flexibly talk about facts having other people with fog up hard drive. All of us tend to explain new cryptosystem that will prove cipher text of frequent dimensions such decipherment protection under the law tend to be hired on them. you can easily generate these small since sole key by aggregation of almost any list of secret key. This kind of small key handily directed other people as well as tends to be keeping in an exceedingly very confined secure hard drive. This system gives very first useful general public key encryption system regarding versatile structure.
Keywords: Resilient Crypto System, Key Leakage, Data Sharing, Cloud Storage System.
Abstract
Supporting Privacy Preserving and Content Protection Using Location Based Query
Sherin Ansm Thomas, Seena Teresa George
DOI: 10.17148/IJARCCE.2015.4822
Abstract: In fast growing world, the best method for a person to know his/her location with the help of devices having GPS facility. When mobile user�s location is available to LBS, it is very easy to user to know all location dependent information like location of friends or Nearest Restaurant, whether or traffic conditions. The massive use of mobile devices its open the way for the creation of wireless networks that can be used to exchange information based on locations. This type of service is known as location based service .When the exchange of location information is done amongst entrusted parties, the privacy of the user could be in harmful. Existing protocol doesn�t work on many different mobile devices and another issue is that, Location Server (LS) should provide misleading data to user. So we are working on enhancement of this protocol.
Keywords: Location Privacy, Private Information Retrieval, Centroid.
Abstract
Gesture Based Commands to Interact with the OS
Chaitra B H, Anupama H S, Cauvery N K, Lingaraju G M
DOI: 10.17148/IJARCCE.2015.4823
Abstract: Human beings interact with a lot of things around them. One such interaction happens between humans and computers. As the technology and software are becoming complex day-by-day, the modes of interaction with computers are also varying. It may be through speech to text conversation, using sensors like accelerometers and gyros worn on the body of the interactor, using facial gestures, computer interfaces like keyboard and mouse, or by using external device like smart-phones or using hand gestures. Gesture based recognition system involves tracking a person�s movements and predicting what they may indicate. For every gesture recognized, an application program is launched which the user can use it to interact with the OS. The programs launched may be command prompt, notepad, and MS paint or file explorer. This hand gesture recognition algorithm uses AForge.Net framework for capturing frames from the webcam in real time. The frames captured are then processed for detection of the hand. The features are extracted and the gestures are identified to interact with the OS and launch different applications. The gestures include patterns like �V�, �M�, STOP and Triangle. The application program is designed in C# with .Net Framework 4 and it uses threading support to implement a parallel version of the algorithm. For the program to be compiled the compiler is set to allow unsafe code to run which is needed to accelerate the image processing steps. A frame is captured per second, the region is identified, the features are computed and hand gesture is identified and if no gestures are found, a message will be displayed. The hand gesture recognition rate using the above algorithm is 88.16%.
Keywords: Binarization, Threshold Filtering, Feature Extraction, Framework, Parallel Version, Compactness, Protrusion Ratio.
Abstract
Design and Simulation of Meander Line Antenna for RFID Passive Tag
Vikram P, Dr. H.V Kumaraswamy, R.K Manjunath
DOI: 10.17148/IJARCCE.2015.4824
Abstract: Meandering is one of the methods in order to reduce the size of the antenna. By meandering we can reduce the size of the antenna by about 70%. The meander line antenna is designed using empirical relations and simulated in Advanced Design System (ADS). The meander line antenna is of size 10.2*9.2mm is designed in UHF (Ultra High Frequency) band using flexible polyester substrate with a dielectric constant of 3.5. The antenna is resonating at a frequency of 862.5 MHz with a return loss of -39.133 db.
Keywords: RFID, EIRP, EPC, UHF.
Abstract
Handwritten Devanagari Character Recognition using SVM and ANN
Arjun Singh, Kansham Angphun Maring
DOI: 10.17148/IJARCCE.2015.4825
Abstract: Character recognition is a challenging research area due to its diverse applicable environment. It is able to solve complex problem and make easy task for human. This paper proposed a system for recognizing offline Handwritten Devanagari Characters using Artificial Neural Network and Support Vector Machines as classifiers and the results are compared. We discuss various characteristics of the classification methods that are applied successfully to handwritten Devanagari characters. It involves binarization, noise removable, and normalization. Statistical and structured based features are used for extracting the feature of characters. The feature extraction techniques: Chain Code, Zone Based Centroid, Background Directional Distribution and Distance Profile features are applied to the pre-processed images. Experiment is carried out by varying the image sizes: 30x30, 40x40, and 50x50 using MATLAB on more than 20,000 samples. The overall recognition accuracy is 97.61 % by using SVM.
Keywords: Optical Character Recognition (OCR), Artificial Neural Network (ANN), Pre-processing, Binarization, Feature Extraction, Support Vector Machine (SVM).
Abstract
A Research: Knowledge Representation using Fuzzy Logic in Ontology Modelling
Preksha, Mrs. Chandna Jain
DOI: 10.17148/IJARCCE.2015.4826
Abstract: Ontology has proved to be very useful in sharing concepts across applications in an unambiguous way. Nowadays, in ontology-based applications information is often vague and imprecise. This paper introduces a system that exploits the semantics of ontology, to improve the accuracy of machine-learning methods. In computer-aided reasoning, the predominant paradigm to manage vague knowledge is fuzzy set theory. This paper presents the proposed work. In proposed work, automate the Ontology Creation Process used along with the Databases. Our motive is to develop the efficient technique for ontology based on Fuzzy Logics along with the ontology mapping.
Keywords: Ontology, Methodology, Knowledge Analysis, Domain Analysis, Fuzzy Logic, Machine Learning Algorithm.
Abstract
EE-DSR: Energy Efficient Dynamic Source Routing in Wireless Ad Hoc Networks Using Residual Energy
G. Krishna Priya, Dr. G. Prakash Babu
DOI: 10.17148/IJARCCE.2015.4827
Abstract: Energy efficient routing is an efficient mechanism for minimizing energy cost of data communication in wireless Ad Hoc networks. Normally, routes are revealed taking into consideration the energy consumed for E2E (end-to-end) packet traversal. However, this must not result in discovery of less dependable routes in the network. Energy-efficient routing in Ad Hoc networks is neither full nor well-organized without the concern of residual energy of nodes and reliability of links. Finding consistent routes can improve quality of the service. But, taking into consideration the residual energy of nodes in routing can keep away nodes from being overused and can finally lead to an increase in the operational life span of the network. The main objective of this paper is to propose an E-E-DSR (energy efficient dynamic source routing) protocol in mobile Ad Hoc networks (MANETs) to enhance the network life time. E-E-DSR is used as the base model due to the fact that it is a typical on demand protocol with less bandwidth and energy use. The existing energy efficient routing algorithms namely RMER (reliable minimum energy routing) and RMECR (reliable minimum energy cost routing) are enhanced and implemented in E-DSR.
Keywords: Energy Efficient Routing, Dynamic Source Routing, Ad Hoc Networks, Residual Energy.
Abstract
A Review: Knowledge Representation using Fuzzy Logic in Ontology Modelling
Preksha, Mrs. Chandna Jain
DOI: 10.17148/IJARCCE.2015.4828
Abstract: Ontology is a term in philosophy and its meaning is theory of existence. Ontology is a body of knowledge describing some domain, typically common sense knowledge domain. This views ontology as an inner body of knowledge, not as the way to describe the knowledge. The most commonly quoted definition of ontology is that ontology is a formal, explicit specification of a shared conceptualization. A conceptualization, in this context, refers to an abstract model of thinking of the people about things in the world, usually restricted to a particular subject area. An explicit specification means that the concepts and relationships in the abstract model are given explicit names and definitions. The name is a term, and the definition is a specification of the meaning of the concept or relation. An agent communicates to another agent by using the constructs from some ontology. In order to understand in communication, ontology�s must be shared between agents. This paper explains the new concept of ontology. In this paper our main motive is to study about the basics of ontology, fuzzy logic and machine learning algorithm.
Keywords: Ontology, Methodology, Knowledge Analysis, Domain Analysis, Fuzzy Logic, Machine Learning Algorithm.
Abstract
A Fabrication Study on DCF Compensated SMF using Optsim Simulation Software
Anil Kumar, Dr. Mahipal Singh
DOI: 10.17148/IJARCCE.2015.4829
Abstract: This Paper deals with the analysis of the performance limitation of SMF (single mode fiber) due to nonlinear effect. With the help of optsim simulation software a combination of SMF and DCF (dispersion compensation fiber) has been simulated with a proper variation in length to tackle the effects in the transmission system. Better performance was shown when a combination of SMF length 90Km and DCF length 10km was chosen. The Q-value and BER technique has been used for show the system performance.
Keywords: Chromatic dispersion, DCF, Nonlinear effect, SMF, FWM.
Abstract
2PDAS-Privacy Preserved Data Deduplication with Auto Attestation Strategy for Cloud Data
Mathumathi.B, Swapna.Mp
DOI: 10.17148/IJARCCE.2015.4830
Abstract: Data deduplication is the best data compression techniques for eliminating duplicate copies of same data and it is widely used to reduce the amount of storage space and save only single instance of a file. These deduplication mechanisms removes duplicate files from the storage cloud and replace them with the pointer of the original file. The idea of Deduplication optimizes the cost of data storage. Lower backup data means better RTO (recovery time objective). To protect the confidentiality of sensitive data while supporting deduplication, the privacy preserved data Deduplication with auto attestation strategy (2PDAS) has been proposed to protect the data before outsourcing. This study makes the first attempt to formally address the problem of authorized attestation based data Deduplication in order to maintain the data security. This 2PDAS is entirely different from traditional deduplication systems like ALG algorithm, the differential privileges of users are further considered in duplicate check along with the data which is deduplicated. We present a novel deduplication system which can be done by each user with the mechanism of Auto correction and Attestation based Integrity Verification system. The proposed system provides Guaranteed Data freshness and data management with privacy.
Keywords: Deduplication, privacy deduplicate check, confidentiality, cloud, integrity, redundancy.
Abstract
An Energy Efficient Clustering Algorithm with Adaptive Self-Organization for Wireless Sensor Networks
Akash Govil, Govind Patidar
DOI: 10.17148/IJARCCE.2015.4831
Abstract: Wireless sensor networks are an emergent technology for monitoring physical world. The energy constriction of Wireless sensor networks requires energy (resource) saving and so elongating the network lifetime become the utmost imperative goalmouths of numerous routing conventions. Clustering is a strategic technique used to prolong the lifetime of a sensor network by plummeting energy consumption. This research work is taking traditional probabilistic clustering protocol concepts, also considering heterogeneity in wireless sensor network as an effective way to increase the network lifetime and stability. Many issues in Wireless Sensor Networks (WSNs) are formulated as multidimensional optimization problems, and approached through self-organizing concept and load balancing architecture. We are proposing a distributed energy and geographically dynamic clustering scheme with adaptive cluster formation process for efficient routing in wireless sensor network, to make an optimized cluster head selection process and adaptive cluster formation which depends upon current network conditions and resource status. Simulation results show that with this network designing the network lifetime and stability period increases extensively.
Keywords: Wireless sensor network, Energy efficient clustering, Adaptive Self-Organization, routing, Energy Distribution, Network density, Network Lifetime, Adaptive clustering.
Abstract
Pervasive Computing and Brain Computer Interface
Debdutta Pal, Sayani Majumder, Anisha Ali
DOI: 10.17148/IJARCCE.2015.4832
Abstract: The paradigm of pervasive computing describes environment that provide anytime and anywhere access to information services while making the presence of the system invisible to the user. Pervasive computing envisioned by Mark Weiser emerged at the conjunction of research and development in a number of areas which include embedded and devices and systems, wireless communications, and distributed, mobile and context-aware computing. This paper provides an overview of constituent components of pervasive computing and outlines the current progress made as a result of convergence of these areas of research. The paper closes with a discussion of usage of pervasive computing in brain computer interface.
Keywords: Pervasive Computing, Brain Computer Interface, RFID, Neuro Phone.
Abstract
Automatic Building Detection Using Modified Grab Cut Algorithm from High Resolution Satellite Image
Mahak Khurana, Vaishali Wadhwa
DOI: 10.17148/IJARCCE.2015.4833
Abstract: Understanding aerial image / satellite image is highly demanded for generating maps, analyzing disaster scale, detecting changes to manage estate, etc. But it�s been usually done by human experts, so that it�s both slow and costly. Remote sensing community has been focused on this task but it�s still difficult to detect terrestrial objects automatically from high resolution satellite image with high accuracy. An important Object detection problem in remote sensing is the automated detection of buildings from satellite images. In this paper , Modified grab cut partitioning algorithm will be used to detect buildings in image which will take input from the previous objective and rather than min-max evaluation used in grab cut, we will use bio inspired optimization which will find a global optimal solution for maximum energy better than min max algorithm.
Keywords: Satellite Image, Thresholding, Shadow Detection, Grab cut Algorithm, Bacterial Foraging optimisation, Fuzzy Landscape.
Abstract
Bit Error Rate Analysis of Block Coded Wireless System over α-µ Fading Channel
Dharmraj, Himanshu Katiyar
DOI: 10.17148/IJARCCE.2015.4834
Abstract: In this paper error performance of block coding such as systematic block coding and cyclic coding over a-� fading channel is analyzed. In wireless channel error burst can be removed with the help of interleaver hence performance of random interleaver is also analyzed. Improvement in bit error rate (BER) performance after systematic block coding and cyclic coding with and without random interleaving, have been shown with simulation results.
Keywords: a-� fading, systematic block coding, cyclic coding, interleaving, bit error rate.
Abstract
Analysis of Attacks in Cognitive Radio Networks
M.Padmadas, Dr.N.Krishnan, V.Nellai Nayaki
DOI: 10.17148/IJARCCE.2015.4835
Abstract: As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services and their application leads to the spectrum scarcity. To efficiently access the unavailable spectrum cognitive radio is used. The demanding technology is introduced new spectrum allocation policies, which will allow unlicensed users (i.e., secondary users) to access the radio spectrum when it is not occupied by licensed users (i.e., primary users) will be exploited by the cognitive radio (CR) technology. Security is one of the critical attributes of any communication network. There are various papers covering the security issues over the threats in cognitive radio, but this paper provides an analysis of attacks and com�mon threats and the possibility of securing the available spectrum from the attackers.
Keywords: Cognitive Radio, Primary User, Secondary user.
Abstract
Design and Implementation of DDR3 Controller with AXI Compliancy
M. Naveen Kumar, M.Kiran
DOI: 10.17148/IJARCCE.2015.4836
Abstract: This project describes Design and Implementation of DDR3 Controller with AXI Compliancy. It explains the architecture of the DDR3 controller along with the detailed design and operation of its individual sub blocks. It also discusses the advantage of DDR3 memories over DDR2 memories and the AXI protocol operation. The AXI DDR3 Controller provides access to DDR3 memory. It accepts the Read / Write commands from AXI and converts it into DDR3 access. While doing this it combines AXI burst transactions into single DDR access where ever possible to achieve the best possible performance from DDR3 memory subsystem.
Keywords: Verilog HDL, Xilinx ISE, Model Sim Simulator, AXI, DDR3 Memory, DDR3 Controller, FIFO.
Abstract
Video Background Subtraction using Multi Background Model & Robust Threshold
VinkyDhingra, Vaishali Wadhwa
DOI: 10.17148/IJARCCE.2015.4837
Abstract: Video object segmentation and tracking are two essential building blocks of smart surveillance systems. An efficient moving object segmentation algorithm suitable for real-time content-based multimedia communication systems is proposed in this paper. First, the basic idea is to construct a reliable background image using background registration technique. The moving object region is then separated from the background region by comparing the current frame with the constructed background image. An efficient thresholding approach is developed and whole algorithm is divided into four steps and frame difference mask, background difference mask are generated using proposed threshold scheme.
Keywords: Background registration, Thresholding, Background difference mask, Frame difference mask.
Abstract
A Compressed Sensing Based Direct Sequence Spread Spectrum Communication System
P. Srilatha, V. Manohar
DOI: 10.17148/IJARCCE.2015.4838
Abstract: To lower the sampling rate in a spread spectrum communication system, compressive sampling process is applied to take out the received signal. This may cause a decrease within the power consumption or the producing value of wireless receiver�s using spread spectrum technology. The most novelty of this paper is that the discovery that in spread spectrum systems it's potential to use compressive sensing with a far easier hardware design than in alternative systems, creating the implementation easier and more energy economical. Our theoretical work is illustrated with a numerical experiment using the IEEE 802.15.4 standard's 2.4 GHz band speci?cation. The numerical results support our theoretical ?ndings and indicate that compressive sensing could also be used with success in spread spectrum communication systems. The results obtained here may also be applicable in alternative spread spectrum technologies, like Code Division Multiple Access (CDMA) systems.
Keywords: Compressive Sensing, Direct Sequence Spread Spectrum communication System.
Abstract
Design and Characterization of an UWB Antenna with Multiple Band Notch using EMPro
Ravikumar Hullur, N N Nagendra
DOI: 10.17148/IJARCCE.2015.4839
Abstract: In recent years, there has been an explosive growth in Ultra-wideband communication because of its characteristics like higher data rates, saturation of the frequency spectrum, low power consumption, etc. In this paper, an ultra-wide band (UWB) antenna which operates in the frequency band 3.1-10.6 GHz is designed. The designed antenna has an eye geometry patch and a ground layer. The antenna exhibits a 10 dB return loss bandwidth over the entire frequency band. By modifying the physical structure, the RCS (radar cross section) of the designed antenna is reduced. To avoid electromagnetic interference (EMI) with narrow band systems, the four pairs of meanders lines (MLs) are added to the antenna to generate multi band notch characteristic. These MLs act as resonators and main advantage of this technique is no extra space is required so that overall antenna is maintained. The EMPro simulation tool is used for antenna simulation.
Keywords: Ultra Wide Band (UWB), Antennas, Radar Cross Section (RCS), Electromagnetic Interference (EMI).
Abstract
The Study of E-Security in Internet Banking
Miss Sarika B. Gaikwad, Miss Ashwini A. Yadav, Miss Pallavi H.Patil
DOI: 10.17148/IJARCCE.2015.4840
Abstract: Today�s world is an electronic or digital world. The use of online services is increasing day by day. Most used and growing part of online services is Internet Banking. That provides different banking facilities with internet but banks should provides online services with safety and securely. The present study shows different cyber attacks used by cyber criminals to access bank customer�s confidential information in India. This paper tries to explore several of Technologies and Security Standards recommended to banks for safe internet banking.
Keywords: Internet Banking, Security Standards, Security Tools, Threats.
Abstract
Process Scheduling Approach for Starvation Improvement with Time Delay Analysis in Grid Resources Allocation
Er. Himanshu Jain, Kavita Khatkar
DOI: 10.17148/IJARCCE.2015.4841
Abstract: Grid computing has been a buzzword in information technology since past few years. Grid computing is an infrastructure involving collaboration of computers, databases & network resources available, to perform manipulation of intensive and large scale data set problems. The hike in the complexities of computational problems in modern era of science and technology forced the engineers and scientists to cross the organizational boundaries to get desired data manipulation. The best logical solution to this issue is creating Cache to reduce load on each grid to improve average waiting and response time.
Keywords: VO (virtual organization), ELBDGBJS (Efficient Load Balancing Dynamic Grouping based Job Scheduling).
Abstract
An Efficient Genetic Algorithm for Fault Based Regression Test Case Prioritization
Jyoti, Mrs. Lekha Bhambhu
DOI: 10.17148/IJARCCE.2015.4842
Abstract: Software Testing is the process of validation and verification of product to provide the quality and efficiency and regression testing is the process of validating the modified software to detect errors that have been introduced into previously tested code. The test cases need to be generated as the software is modified and size of test suites will also increase. In this case, there is need of prioritization of test cases to reduce the cost of regression testing. There are number of methods for improving the efficiency in terms of time. The prioritization improves the effectiveness of regression testing by re ordering the test cases. The genetic algorithm (GA) has been proposed and implemented for prioritizing the test cases on the basis of fault coverage and execution time. The execution time and faults coverage has been given as input for test case number. The proposed algorithm has been automated and the results have been analyzed. The results representing the effectiveness of algorithm are presented with the help of GA. Total fault coverage with in time constrained environment on different examples is used for prioritization of test cases and their finite solution is obtained. Through Genetic Algorithm technique, an approach has been identified to find a suitable population, which was further formulated by GA operations to make it more flexible and efficient. The elaborations of results are shown with the help of .Net Technology. The algorithm has been automated and is analyzed for various examples.
Keywords: GA (Genetic Algorithm).
Abstract
Modified Genetic Algorithm for Efficient Regression Test Cases
Jyoti, Mrs. Lekha Bhambhu
DOI: 10.17148/IJARCCE.2015.4843
Abstract: Regression testing is the process of validating modified software to detect errors that have been introduced into previously tested code. As the software is modified, the size of the test suite grows and the cost of regression testing increases. In this situation, test case prioritization aims to improve the effectiveness of regression testing by ordering the test cases so that most beneficial test cases are executed first. In this research paper, a modified genetic algorithm is introduced that will prioritize regression test suite within a time constrained environment on the basis of total fault coverage. The proposed algorithm has been automated and the results are analysed. The results representing the effectiveness of algorithm are presented with the help of Average Percentage of Faults Detected (APFD). Our objective is to achieve more efficiency than existing results.
Keywords: GA (Genetic Algorithm).
Abstract
PCA Algorithm for Efficient Face Recognition System
Manisha Nirania, Mr. Krishan Kumar
DOI: 10.17148/IJARCCE.2015.4844
Abstract: The Security is the main aspect to protect the confidential information from the intruder. The features are initially required for recognize any object. Feature extraction technique is used for extract the face features. Face Recognition is a term to describe the feature selection, detection and image processing to analyze and classification. In the past years, feature selection techniques have been proposed to make the possible for classification using neural network, supervised Learning and Un-supervised learning. In this work, the PCA technique has been proposed and training will be initial points for train the proposed algorithm and this complete work has been chosen for analyze and improve the efficiency of algorithm. The complete steps will be implementing in MATLAB for simulation of work and accuracy will be calculated by providing the different training images to the learning algorithm and then detection of face will be analyzed.
Keywords: Face Recognition, Neural Network, Face Recognition, PCA.
Abstract
Efficient Face Recognition Technique using PCA in Neural Network
Manisha Nirania, Mr. Krishan Kumar
DOI: 10.17148/IJARCCE.2015.4845
Abstract: The Security is the main aspect to protect the confidential information from the intruder. The features are initially required for recognize any object. Feature extraction technique is used for extract the face features. Face Recognition is a term to describe the feature selection, detection and image processing to analyze and classification. In the past years, feature selection techniques have been proposed to make the possible for classification using neural network, supervised Learning and Un-supervised learning. In this work, the PCA learning technique has been proposed and training will be initial points for train the proposed algorithm and this complete work has been chosen for analyze and improve the efficiency of algorithm. The complete steps will be implementing in MATLAB for simulation of work and accuracy will be calculated by providing the different training images to the learning algorithm and then detection of face will be analyzed.
Keywords: Face Recognition, Neural Network, Face Recognition, PCA.
Abstract
Handwritten Signature Recognition,Verification and Dynamic Updation using Neural Network
Meetu Sangwan, Mr. Daulat Sihag
DOI: 10.17148/IJARCCE.2015.4846
Abstract: The hand written signature is regarded as the primary means of identifying the signer of a written document based on the implicit assumption that a person�s normal signature changes slowly and is very difficult to erase, alter or forge without detection. The handwritten signature is one of the ways to authorize transactions and authenticate the human identity compared with other electronic identification methods such as fingerprints scanning, face recognition and retinal vascular pattern screening. It is easier for people to migrate from using the popular pen-and-paper signature to one where the handwritten signature is captured and verified electronically. The signature of a person is an important biometric attribute of a human being and is used for authorization purpose. Various approaches are possible for signature recognition with a lot of scope of research. Here, we deal with an off-line signature recognition technique. Signatures are composed of special characters and flourishes and therefore most of the time they can be unreadable. Also intrapersonal variations and interpersonal differences make it necessary to analyze them as complete images and not as letters and words put together. Signature recognition is the process of verifying the writer�s identity by checking the signature against samples kept in the database. The result of this process is usually between 0 and 1 which represents a fit ratio (1 for match and 0 for mismatch). Signature recognition is used most often to describe the ability of a computer to translate human writing into text. This may take place in one of two ways either by scanning of written text (off-line method) or by writing directly on to a peripheral input device.
Keywords: OCR (Optical Character Recognition), FRR (False Rejection Rate).
Abstract
Resolution Enrichment Techniques for Image incorporated with Text
Mohit, Krishan Kumar
DOI: 10.17148/IJARCCE.2015.4847
Abstract: Resolution is designated as significant holding for images. Resolution is an underlined expression of any image. Gratifying quality images are required almost in every field. For this we propose new modified algorithm having the extention in scaling and the algorithm is applied on image mingled with text for producing the pleasing quality of image. This paper presents a resolution method for enhancing digital gray images. The proposed enhancement technique is based on the interpolation of the high frequency sub-bands obtained by DWT and SWT. The proposed technique uses DWT to decompose an image into different sub-bands, and then the high frequency sub-band images have been interpolated. The interpolated high frequency sub-band coefficients have been corrected by using the high frequency sub-bands achieved by SWT of the input image. The lower sub band obtained by DWT decomposition is interpolated with the same interpolation factor. Afterwards all these images have been combined using IDWT to generate a super resolved imaged. Further we have made up extra enhancement in the image with the help of the fusion.
Keywords: Discrete wavelet transform (DWT), Inverse dual-tree complex wavelet transform (IDT-CWT), DWT-SWT.
Abstract
A Practical Ant Colony Optimization Technique based Image Edge Detection
Nitin Tarar, Vikas Kamra
DOI: 10.17148/IJARCCE.2015.4848
Abstract: Edge detection could be a cardinal mechanism to be enforced within the image process. Edge detection recognises the points within the digital image wherever the disruptions occur within the digital image. Hymenopterous insect colony improvement is Associate in Nursing expedient for the illumination of the improvement based complication. ACO is galvanized by masticating behaviour of ants. This ransack behaviour of ants is employed for unfold the matter of expose of edges. In this paper we have a tendency to projected a restored ACO algorithmic rule for digital pictures edge chase down. We�ve projected a replacement changed ACO algorithmic rule for higher perception within the pictures, additionally which provides excellent performance of the improved algorithmic rule and it correlate the experimental results with antecedent normal one. The crucial factor ought to be thought-about within the ACO algorithms are that the acquaintance of framework of revelation with post scholarship regarding the framework of previous outcomes. The implementation work shows the efficiency and parameters such as PSNR (peak Signal to Noise Ration) has been calculated.
Keywords: Acquaintance, Edges, ACO, Shortest path.
Abstract
Conduction of Sheltered Information Providing Multiple Coatings around Data and using Audio as Transporter
Mr. Vikas Kamra, Parul
DOI: 10.17148/IJARCCE.2015.4849
Abstract: The exploration work is regarding the learning of cryptographic and steganography techniques and make available the advancement in security with the amalgamation of these procedures by the side of with the hashing techniques such as MD5 hash method has been worn out for offering the secrecy of information over the network. The communication of information necessitates being secured over the network. This paper projected the multiple coatings approach for security of data which comprises the hashing, cryptographic steps and steganography procedures for encryption and hiding of data. For supplementary security, the LSB technique has been regarded with audio file for hiding of encrypted data. The result has been generated with the MATLAB 2010 version.
Keywords: MD5, LSB, Audio, wav.
Abstract
Secure Digital Images using Hidden Watermarking
Priyanka Arora, Mrs. Chandana
DOI: 10.17148/IJARCCE.2015.4850
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. Most watermarking ways for pictures and video are projected are supported ideas from unfold spectrum radio communications, specifically additive embedding of a (signal adaptative or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even ways that don't seem to be bestowed as unfold spectrum ways typically hinge on these principles. Recently, some skepticism regarding the strength of unfold spectrum watermarks has arisen, specifically with the final availableness of watermark attack software system that claim to render most watermarks undetectable. In fact, unfold spectrum watermarks and watermark detectors in their simplest kind ar at risk of a spread of attacks. However, with applicable modifications to the embedding and extraction ways, unfold spectrum ways may be created way more resistant against such attacks. During this paper, we have a tendency to consistently review projected attacks on unfold spectrum watermarks. Further, modifications for watermark embedding and extraction ar bestowed to avoid and counterattack these attacks. Vital ingredients are, as an example, to adapt the ability spectrum of the watermark to the host signal power spectrum, ANd to use an intelligent watermark detector with a block-wise multi-dimensional slippery correlator, which might recover the watermark even within the presence of geometric attacks.
Keywords: WM (Watermark), SS (spread-spectrum), DWT (Discrete Wavelet Transform).
Abstract
Efficient Watermarking Algorithm for Digital Images
Priyanka Arora, Mrs. Chandana
DOI: 10.17148/IJARCCE.2015.4851
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented as spread spectrum methods often build on these principles. Recently, some scepticism about the robustness of spread spectrum watermarks has arisen, specifically with the general availability of watermark attack software which claim to render most watermarks undetectable. In fact, spread spectrum watermarks and watermark detectors in their simplest form are vulnerable to a variety of attacks. However, with appropriate modifications to the embedding and extraction methods, spread spectrum methods can be made much more resistant against such attacks. In this paper, we systematically review proposed attacks on spread spectrum watermarks. Further, modifications for watermark embedding and extraction are presented to avoid and counterattack these attacks. Important ingredients are, for example, to adapt the power spectrum of the watermark to the host signal power spectrum, and to employ an intelligent watermark detector with a block-wise multi-dimensional sliding correlator, which can recover the watermark even in the presence of geometric attacks.
Keywords: WM (Watermark), SS (spread-spectrum), DWT (Discrete Wavelet Transform).
Abstract
Performance Analysis of K-Mean Clustering on Normalized and Un-Normalized Information in Data Mining
Richa Rani, Mrs. Manju Bala
DOI: 10.17148/IJARCCE.2015.4852
Abstract: The research includes the concept of data mining, clustering and clustering techniques. Data mining is used for extract the useful information and Clustering is the concept used to groups which can be creating by identifying similar kind of data and this can done by identify one or more attributes or classes. There are different types of clustering techniques such as K-Means clustering, K-Means Clustering, etc. The analysis has been done using the K-Means Clustering technique and by normalizes the data using data mining normalization techniques. Furthermore, the research work is about the study of data such as Normalized data and Un-normalized Data and analyzes the Data using Clustering Algorithm such as K-Means Clustering algorithm. The data mining means extract the useful information from the large dataset and clusters the records. The basic principles of data mining is to analyze the data from different angle, categorize it and finally to summarize it. The need for data mining is that there have been too much data, too much technology but don�t have useful information. Data clustering is a process of putting similar data into groups.
Keywords: Data Mining, K-Means clustering algorithm, Normalized data, Un-normalized Data.
Abstract
An Improved LSB Image Steganography using TSFS
Ruchi, Mr. Vipul Goyal
DOI: 10.17148/IJARCCE.2015.4853
Abstract: This paper proposes steganalysis methods for extensions of least-significant bit (LSB) overwriting to both of the two lowest bit planes in digital images: there are two distinct embedding paradigms. The author investigates how detectors for standard LSB replacement can be adapted to such embedding, and how the methods of �structural steganalysis,� which gives the most sensitive detectors for standard LSB replacement, may be extended and applied to make more sensitive purpose-built detectors for two bit plane steganography. The literature contains only one other detector specialized to detect replacement multiple bits, and those presented here are substantially more sensitive. The author also compares the detectability of standard LSB embedding with the two methods of embedding in the lower two bit planes: although the novel detectors have a high accuracy from the steganographer�s point of view, the empirical results indicate that embedding in the two lowest bit planes is preferable (in some cases, highly preferable) to embedding in one.
Keywords: Steganography, Cryptography, Image, LSB (Least significant bit).
Abstract
Image Steganography Combined with TSFS using LSB
Ruchi, Mr. Vipul Goyal
DOI: 10.17148/IJARCCE.2015.4854
Abstract: Steganography is derived from the Greek word steganographic which means covered writing. It is the science of secret communication. The goal of steganography is to hide the existence of the message from unauthorized party. The modern secure image steganography presents a task of transferring the embedded information to the destination without being detected by the attacker. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. In this thesis a process to Increase security of hidden data in Image and Prevent data extraction has been presented. We will encrypt data by use key1 and hide data using LSB technique using key2. In the LSB approach, the basic idea is to replace the Least Significant Bits (LSB) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The LSB-based technique is the most challenging one as it is difficult to differentiate between the cover-object and stego-object if few LSB bits of the cover object are replaced. By using the key, the chance of getting attacked by the attacker is reduced.
Keywords: TSFS, LSB (Least Significant Bit), Hidden message.
Abstract
Efficient Artificial Neural Network based Practical Approach of Stock Market Forecasting
Rupinder kaur, Ms. Vidhu Kiran
DOI: 10.17148/IJARCCE.2015.4855
Abstract: Forecasting accuracy is that the most vital think about choosing any foretelling strategies. Analysis efforts in rising the accuracy of foretelling models square measure increasing since the last decade. The {suitable} stock alternatives those square measure suitable for investment may be a tough task. The key issue for every capitalist is to earn most profits on their investments. Available market 2 opposite group�s square measure involves in any kind of group action during which they exchange stocks from client to marketer. Patterns of the exchange square measure of non uniform nature. Holding and marketing of shares available market is completed by the thought of some higher cognitive process algorithms. Main Objective of labour is to development of a Time-Series neural network that achieved a highest % likelihood of predicting a market rise and market drop as compare to existing strategies. Thus to supply the consistent and correct results, there's have to be compelled to manufacture the new changed rule. This new increased and changed rule produces the predictions in timely manner with acceptable accuracy. The accurate results have been shown in this paper.
Keywords: Neural Network, Forecasting, Stock Market, Time Series, Data Mining.
Abstract
Time Series based Accuracy Stock Market Forecasting using Artificial Neural Network
Rupinder kaur, Ms. Vidhu Kiran
DOI: 10.17148/IJARCCE.2015.4856
Abstract: Forecasting accuracy is the most important factor in selecting any forecasting methods. Research efforts in improving the accuracy of forecasting models are increasing since the last decade. The appropriate stock selections those are suitable for investment is a difficult task. The key factor for each investor is to earn maximum profits on their investments. In stock market two opposite teams are involves in any type of transaction in which they exchange stocks from buyer to seller. Patterns of the stock market are of non uniform nature. Holding and vending of shares in stock market is done by the consideration of some decision making algorithms. Main Objective of work is to development of a Time-Series neural network that achieved a highest percent probability of predicting a market rise and market drop as compare to existing methods. So to produce the consistent and accurate results, there is need to produce the new modified algorithm. This new enhanced and modified algorithm produces the predictions in timely manner with appropriate accuracy.
Keywords: Neural Network, Forecasting, Stock Market, Time Series, Data Mining.
Abstract
Enhancing Data Security and Privacy on Web OS using TSFS
Preeti, Kavita Khatkar
DOI: 10.17148/IJARCCE.2015.4857
Abstract: WebOS (Web based operating system) is a new form of Operating Systems. You can use your desktop as a virtual desktop on the web, accessible via a browser, with multiple integrated built-in applications that allow the user to easily manage and organize her data from any location. This paper starts with a introduction of WebOS and its benefits. We have identified some parameters for secure WebOS. A technical review is given with research design of TSFS Algorithm to provide security.
Keywords: AES (Advanced Encryption Standard), TSFS (Transposition-Substitution-Folding-Shifting encryption).
Abstract
Study on Multitier Biometric Authentication using Cryptography with Fingerprint and Eyelashes
Ms. Saranyadas S, Dr.A.Nithya
DOI: 10.17148/IJARCCE.2015.4858
Abstract: Security on an Automated Teller Machine (ATM) is the major issue in the current world. Improving the security is necessary to customer�s transaction protection. So the best solution for security and authentication is biometric system, it offers convient and secure mode of authentication to the user numbers of threatens are there hacking of password etc all of them have the solution is biometric. Authentication is a critical part of trustworthy computing system, which want to ensure to the customer that only individuals with corroborated identifiers can log on to the system or access the resource. The biometric authentication with cryptography improves the security level of authentication. In this paper propose a bio-metric system for encrypting the user password is for secure ATM transaction. A fingerprint and eyelash image is required at transaction time. Then it will compare with server database only further transaction will allow matching occur with server database.
Keywords: Biometric, Authentication, Cryptography, Finger print , Eyelashes, Automated Teller Machine, Security, Harris Corner Detection ,Encryption, Decryption.
Abstract
Impact of Reciever Systems’and Channel’s Parameters on Distributed Computing Power Ratio in OFDMA based Wireless Distributed Computing Network
TanguduRamji, P. Sirish Kumar, L. Rambabu, A. Rajesh
DOI: 10.17148/IJARCCE.2015.4859
Abstract: In present days, high data rates transmissions and their manipulations are almost completing by wireless distributed computing (WDC) network, generally for minimize the time consumption. But we are unable to minimize the distributed computing power ratio (DCPR) in much manner for same network. The parameters, which are influencing on this DCPR, are network size, bandwidth, computing density, and switching frequency. In this paper, the main objective is to minimize the DCPR with proper allocation of mentioned parameters for a WDC network. I propose OFDMA based WDC system, to achieve the very less interference and to satisfy the above specified objective. This paper uses soft and evolutionary computing algorithm, called the particle swarm optimization (PSO). This algorithm gives global optimum solution to above specified objective. The performance of proposed system with specified algorithm is analyzed using computer MATLAB simulation.
Keywords: Wireless Distributed Computing Network, OFDMA, DCPR.
Abstract
Solving Management Problems Using RSTDB a Frequent Pattern Mining Technique
Vaibhav Kant Singh
DOI: 10.17148/IJARCCE.2015.4860
Abstract: We are living in a highly competitive environment where time to make critical decision is getting lesser and lesser. Data Mining which is the exploration and extraction of meaningful information from the large source of data generated as a result of various data processing activities is capable to help the higher management authorities to make important decisions on time. Data mining which is basically a step in Knowledge Discovery from Database process uses several techniques to implement the above objective. Association rule mining is one of the data mining techniques used, which require the mining of frequent data sets in the transaction database. Thus, Data Mining basically helps in creation of decision support system for higher managers. In this paper we have proposed the use of RSTDB algorithm for the extraction of Information from large databases for solving management problem.
Keywords: I Data-mining, Knowledge Discovery from Database, Association rule, Frequent Pattern Mining.
Abstract
An Improvement in Data Hiding Rate on Color Images
Rose Mary kurian, Divya S B
DOI: 10.17148/IJARCCE.2015.4861
Abstract: In this paper, a novel reversible data hiding (RDH) algorithm is proposed for color images. The proposed algorithm mainly aims at maximizing the data hiding rate on images through various methods. This algorithm also enhances the contrast of the host image in order to improve its visual quality. Data are hidden into the three different layers of color images i.e. red, green and blue. This will help to increase the size of the data that can be hidden in the images which can be either binary values or images. In order to increase data hiding rate further, data can also be hidden into the least significant bits (LSBs) of all the bins with highest pixel value in the histogram. A location map is generated for memorizing the positions of these bins in the histogram. By applying all the above in data hiding will increase both data hiding rate as well as size of the data that can be embedded drastically. This paper also compares the time consumed for data hiding by different images. Data hiding can be extended to video images as future work.
Keywords: Contrast enhancement, histogram modification, location map, reversible data hiding, visual quality.
Abstract
Real Time Intrusion Alert Aggregation for Distributed Intrusion Detection System and Prevention of Attacks
Madhuri Chavan, Manjusha Deshmukh
DOI: 10.17148/IJARCCE.2015.4862
Abstract: Real time intrusion alert aggregation is a concept of aggregating intrusion alerts which are generated in real time environment. The System present a real time intrusion alert aggregation strategy for distributed system. Organization use different intrusion detection System to detects unauthorized activities and different attack performed by intruder but a lot of alert is generated. Security personnel are confused with bulk of alerts. This makes them difficult to take decision immediately. They take a lot of time to analyse the alerts. The proposed system generates meta-alerts on real time alert data. IDS system cluster similar alerts and form one Meta alert and that Meta alert is send to admin by email. System consists of multiple IDS Server (IDS) and multiple Client Systems over a network. All IDS communicates with each other and central server. IDS stores alerts in central IDS Server. Central IDS server analysis all alerts which are stored in database and shows different types of attack instance occurred on system and generates Reports.
Keywords: IDS, Intrusion, Alert, Real Time Alert Aggregation, Attack, DIDS.
Abstract
Design Reed Solomon Decoder with Minimum Area Consumption on FPGA
Saroj Bakale, Dhananjay Dabhade, Vijay Wadhankar
DOI: 10.17148/IJARCCE.2015.4863
Abstract: This paper presents a design on Reed Solomon Code for Wi-Max Network. The implementation, written in Very High speed hardware description Language (VHDL) is based on Berlekamp Massey, Forney and Chain Algorithm. The 802.16 network standard recommends the use of Reed-Solomon code RS (255,239), which is implemented and discussed in this paper. It is targeted to be applied in a forward error correction system based on 802.16 network standard to improve the overall performance of the system. The objective of this work is to implement a Reed- Solomon VHDL code to measure the performance of the RS Decoder on Xilinx Spartan 6 (xc6slx100t-3-fgg484) and Xilinx Spartan 3e (xc3s500e-4-fg320) FPGA. The performance of the implemented RS codec on both FPGAs will be compared. The performance metrics to be used are the area occupied by the design and the frequency at which the design can run.
Keywords: Reed Solomon (RS), Galois Field, Generator polynomial, Syndrome calculator, Berlekamp-Massey, Chain search, VHDL, FPGA.
Abstract
OLAP Technology in Data Warehouses
Dr. Atul Khurana
DOI: 10.17148/IJARCCE.2015.4864
Abstract: Recently, a set of significant new concepts and tools have evolved into a new technology that makes it possible to attack the problem of providing all the key people in the enterprise with access to whatever level of information needed for the enterprise to survive and prosper in an increasingly competitive world. The term that has come to characterize this new technology is �Data Warehousing� The problem of getting combined and generalized information fast from an active enterprise database becomes actual having its data been accumulated for some years. The classical reports even if optimized for particular purposes do not let one obtain fast the enterprise information with differently data-dependent views. The problem is proper to absolutely all the systems that accumulate large data volumes of information for further processing. To solve the problem is the destiny of the OLAP (On-Line Analytical Processing) technology. The technology nowadays acquiring more and more popularity is assigned to be active and operative handle for multidimensional data and Knowledge Discovery is defined as �the non-trivial extraction of implicit, unknown, and potentially useful information from data''. This paper shows the role of OLAP Technology in Data Warehousing for Knowledge Discovery.
Keywords: Data Warehousing, OLAP Technology, Knowledge Discovery, Multidimensional Data.
Abstract
Scheduling Approaches and Routing Protocols in Wireless Mesh Networks-A Survey
Prof.K.S.Mathad, Dr.S.R.Mangalwede
DOI: 10.17148/IJARCCE.2015.4865
Abstract: Wireless Mesh Networks (WMN) is an emerging distributed broadband network which has the potential to provide internet to stationary and mobile mesh clients. The mesh clients are interconnected by wireless backbone managed by Mesh routers. Routing protocol and Scheduling are the main challenges faced by Wireless Mesh Networks. This paper provides a review of routing protocol for WMN to efficiently utilize the resources available in the network. It also provides a review on various mechanisms of scheduling in WMNs.
Keywords: WMN, BS, MR.
Abstract
Spatial-Temporal Filtering for Video Denoising using Weighted Highpass Filtering Coefficients
Rubi Saluja, Ajay Boyat
DOI: 10.17148/IJARCCE.2015.4866
Abstract: This paper proposed a novel spatial-temporal filtering method for video denoising in wavelet domain. In proposed video denoising algorithm, spatial adaptive noise filtering in wavelet domain is combined with temporal filtering in time domain. Spatial filtering of individual frames is done by taking discrete wavelet transform (DWT) and modified wavelet coefficients by Weighted Highpass Filtering Coefficients (WHFC). Further apply adaptive wiener filter to the reconstructed frames. But, the denoising artifacts and the remaining noise differed from frame to frame and produce unpleasant visual effects. So temporal filtering is essential. In our method modified spatial filtering is associated with temporal filtering, which is based on block based motion detector and on selective recursive time averaging of frames. The performance of proposed algorithm is evaluated in terms of Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM). Experiment results show that the proposed algorithm gives higher PSNR as well as better visual quality.
Keywords: DWT, Adaptive wiener filter, WHFC, PSNR and SSIM.
Abstract
Product selection from comparative question using cosine similarity analysis and weight feature analysis
Miss. Pranali Patil, Mr. Sudip Tembhurne, Mr. Rugved Deolekar
DOI: 10.17148/IJARCCE.2015.4867
Abstract: Comparing one product with another product when anyone want to purchase products is very typical decision making process. However it is not always easy to know what product compare and what are the alternatives are available so to address such difficulty we propose a novel way that can help user to get best product by calculating feature weight of respective products. The feature weight of product is calculated by using weight analysis. When any new product is added or any new user given rank then the table where total rank is going to calculate for every product and for every feature is updated as per weighted feature algorithm .On that basis when user gives query to application then it will check first is that is a comparable question or not by using cosine similarity analysis and show result the best from those products respectively.
Keywords: Data mining, compare, weight feature analysis, cosine similarity algorithm.
Abstract
Extending Modular Software Model Checking to Peer-to-Peer Architecture systems
Kaveti Sujana, M.C.Bhanu Prasad
DOI: 10.17148/IJARCCE.2015.4868
Abstract: Appropriated frameworks are unpredictable, being typically made out of a few subsystems running in parallel. Simultaneous execution and between procedure correspondence in these frameworks are inclined to lapses that are hard to recognize by customary testing, which does not cover each conceivable system execution. Not at all like testing, model checking can distinguish such blames in a simultaneous framework by investigating each conceivable condition of the framework. In any case, most model-checking strategies oblige that a framework be portrayed in a modeling dialect. In spite of the fact that this improves check, shortcomings may be presented in the execution. As of late, some model checkers check system code at runtime yet have a tendency to be constrained to remain solitary projects. This paper proposes cache based model checking for peer to peer systems, which unwinds the restriction to some degree by checking one procedure at once and running different procedures in another execution environment. This methodology has been executed as an augmentation of Java PathFinder, a Java model checker. It is a versatile and promising procedure to handle conveyed frameworks. To bolster a bigger class of circulated frameworks, a check pointing apparatus is additionally coordinated into the check framework. Test results on different conveyed frameworks demonstrate the ability and adaptability of store based model checking.
Keywords: Model checker, I/O Cache, Peer process.
Abstract
Minimizing Electricity Theft by Internet of Things
Maninderpal Singh, Er.Varun Sanduja
DOI: 10.17148/IJARCCE.2015.4869
Abstract: IOT use things to things connection to access the internet of things, allow data to store and access services. Services over internet of things development according to need of person to person and thing to person, machine to machine interaction without human interaction. As there is limited non-renewable resources are present in our daily life, Electricity is one of them which utilized in every country that results abundant losses due to electricity larceny. Power theft is going to be the key challenges. A smart energy meter is used to minimize the electricity larceny. Basically energy meter is a device that calculates the cost of electricity consumed by homes, business, or an electrical device. It reduces the theft of electricity. In this paper a government person can find the dishonest user by showing the status of energy meter at the back end of electricity office. To attain this, energy meter communicate with raspberry pi through GPIO pins. GPIO pins fetch the effective data from energy meter and it send effective data to the raspberry pi and connect raspberry pi with the internet. At the backend, government person can see the status of energy meter in the form of graphs.
Keywords: IOT (Internet of Things), Electric Energy, Energy Meter, Raspberry pi.
Abstract
A Study on Analog and Digital Hybrid Modulation
Jayati Routh
DOI: 10.17148/IJARCCE.2015.4870
Abstract: This paper seeks to present ways to eliminate the inherent quantization noise component in digital communications, instead of conventionally making it minimal. It deals with a new concept of signaling called the Signal Code Modulation (SCM) Technique. The primary analog signal is represented by: a sample, which is quantized and encoded digitally, and an analog component, which is a function of the quantization component of the digital sample. The advantages of such a system are two sided offering advantages of both analog and digital signaling. The presence of the analog residual allows for the system performance to improve when excess channel SNR is available. The digital component provides increased SNR and makes it possible for coding to be employed to achieve near error-free transmission.
Keywords: Quantization, QAM, SCM, PAM, bandwidth, SNR.
Abstract
Routing Protocol in Urban Vehicular Scenarios
Mr. Prashant Maroti Adhao, Dr. Ravindra C. Thool
DOI: 10.17148/IJARCCE.2015.4871
Abstract: Vehicular Ad Hoc Networks (VANET) is an emerging technology to achieve intelligent inter-vehicle communications, seamless internet connectivity resulting in improved road safety, essential alerts and accessing comforts and entertainments. But the key hindrance in operation of VANET comes from the high speed and uncertain mobility (unlike MANET) of the mobile nodes (vehicles) along the paths. This suggested that the design of efficient routing protocol demands up gradation of MANET architecture to accommodate the fast mobility of the VANET nodes in an efficient manner. Geographic routing has become a popular routing method in VANET because of its simplicity and low overhead. That�s why Geographic stateless routing schemes such as GPSR, GpsrJ+ have been widely used to routing in VANET. However, due to the particular urban topology and the non-uniform distribution of cars, the greedy routing mode often fails and needs a recovery strategy such as GPSR�s perimeter mode to deliver data successfully to the destination. This warranted various research challenges to design appropriate routing protocol. In this paper, we describe NewGpsr, a solution that further improves the packet delivery ratio of GPSR, GPCR and GpsrJ+ with minimal modification by predicting on which road segment node will forward packets to. NewGpsr differs from GPSR, GPCR, and GpsrJ+ as decisions about which road segment to turn does not need to be made by junction nodes. Consequently, GpsrJ+ reduces the hop count used in the perimeter mode by and also increases the throughput. It therefore allows geographic routing schemes to return to the greedy mode faster.
Keywords: Greedy Fording, GPSR, GPCR, NewGpsr, VANET.
Abstract
Detection of Vampire Attack and Prevention in MANET
Harsha.N, Rashmi.S
DOI: 10.17148/IJARCCE.2015.4872
Abstract: Ad-hoc low-power wireless networks are the most promising research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of service at the routing or medium access control levels. Earlier, the resource depletion attacks are considered only as a routing problem, very recently these are classified in to a new group called �vampire attacks�. Vampire attacks are not protocol-specific, in that they do not rely on design properties or implementation faults of particular routing protocols, but rather exploit general properties of protocol classes such as link-state, distance vector, source routing, and geographic and beacon routing .It is clear that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. In this paper, we present an approach to detect and prevent the vampire attack in MANET.
Keywords: Vampire attacks, Ad-hoc low-power wireless networks, MANET etc.
Abstract
Spam Detection Using Data Mining Tool In Matlab
Amandeep Kaur, Jatinder Kaur
DOI: 10.17148/IJARCCE.2015.4873
Abstract: Our research is focused on distinguish between spam and non spam. The whole procedure is focused on reducing error rate of data being misclassified. Rather than the previous researches where there were issues of classification error, we are going to modify the classification techniques through which better results and minimal error rates are found. This will augment system performance too.
Keywords: Spam detection, Filtering, Decision tree algorithm, Naive Bayes algorithm.
Abstract
Secure Data Communication in Cloud Computing using Proposed DSA
Swati Chaudhaary, Arvind Negi, Prashant Chaudhary
DOI: 10.17148/IJARCCE.2015.4874
Abstract: Cloud computing allows for on-demand entry to shared property. It enables to utilize records and purposes over the web. Since they share the information through the net, security is regarded as a major issue so that Cloud computing services need to address the security in the coursework of the transmission of sensitive information and critical applications to shared and public cloud environments. The cloud computing supports distributed services multi-domain Infrastructure, and multi-users. This paper has presented the concept of secure authenticated information and secure cloud storage to deal with security issues that occurs in cloud as a result of malicious activities of attacker.
Keywords: Encryption, Decryption, Digital Signature, DSA, Data Security.
Abstract
Spam Web Page Detection based on Content and Link Structure of the Site
Kiran Hunagund, Santhosh Kumar K L
DOI: 10.17148/IJARCCE.2015.4875
Abstract: Spam Web page is a website which does not contain any useful information. Spammer will create such spam pages for fun or to increase page rank in turn to generate their revenue. The Spam webpage Detection is one of the top challenges for the search engines. There are two different approaches for the detection of spam web page such as Link and Content based analysis. In this paper, we mainly focus on Content based analysis. We have used parameters such as average length of a word, keyword stuffing, and content of a body, number of stop words, unique count for body and title of page are used to identify spam.
Keywords: Search engine, Web mining, Spam web page, Content based analysis.
Abstract
A Review of Different Analysing Methods to Detect Spinal Deformity
Tabitha Janumala, Dr. K B Ramesh
DOI: 10.17148/IJARCCE.2015.4876
Abstract: Diagnosis of a disease needs early estimation of the important factors relating to it. Treatment of scoliosis must be done in its initial stage. The treatment method of scoliosis depends on the degree of scoliosis. It may occur mainly in the thoriac area, lumbar area, or thoracolumbar area. For detection of Scoliosis, authors have used various methods such as posterior anterior radiography, computer aided technique for the measurement of Cobb angle, reformatted thoracolumbar CT images for Cobb angle measurement, mask segmentation, analysis of depth image, etc. In this paper different techniques and methods of detection of scoliosis is analysed. Different results are obtained from these methods and the limitations are highlighted.
Keywords: Mask Segmentation, Cobb Angle, Posterior Anterior Radiography, Edge detection, Screening, Scolio MedIS, Kinect sensor.
Abstract
Efficient Auditing Mechanism for Data Storage in Cloud Using Abs
P.Suresh, R.Malathi
DOI: 10.17148/IJARCCE.2015.4877
Abstract: Cloud comp ting's multi-tenancy feature, which provides privacy, security and access control challenges, because of sharing of physical resources among untrusted tenets. In order to achieve safe storage, policy based file access control, poly based file assured delectation and policy based renewal of a file stored in a cloud environment. a suitable encryption technique with key management should be applied before outsourcing the data. Exciting system attribute based encryption is new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. key policy attribute based encryption (KP-ABE) is an important type of ABE, which enable senders to encrypt message under a set of attribute and private keys are associated with access structure that specify which cipher texts the key holder will be allowed to decrypt. in this paper (ABS) attribute based signature new algorithm can be easily implemented and greatly raise the computational efficiency of original ABS algorithm. a verifier will be convinced of the fact that whether the signer's attribute satisfy the predicate while remaining completely ignorant of the identity of signer.ABS is much useful in a wide range of application including private access control for ad hoc networks, attribute based messaging, etc.
Keywords: Attribute based signature, Cloud storage, Cloud service provider, Data owner, Encryption.
Abstract
Data Mining Techniques for Cloud Technology
Kareemunnisa, D Swetha, P S Silpa, D Anuradha, Ravindra Changala
DOI: 10.17148/IJARCCE.2015.4878
No abstract available.
Abstract
Design of Digital Phase Locked Loop for Wireless Communication Receiver Application
Pradnya H.Golghate, Prof.Pankaj Hedaoo
DOI: 10.17148/IJARCCE.2015.4879
No abstract available.
Abstract
Implementation of Watermarking Technique for Secured Transmission
Ms. Nidhi Bux, Prof. K. J. Satao
DOI: 10.17148/IJARCCE.2015.4880
No abstract available.
Abstract
Content Based Image Retrieval
Pallavi S. Devraye, Dr. Aditya Abhyankar
DOI: 10.17148/IJARCCE.2015.4881
Abstract: This document describes Content based Image Retrieval(CBIR) is a technique for retrieving images on the basis of automatically-derived features like edge for database images. It shows how Edge Histogram Descriptor of MPEG-7 can be efficiently utilized for matching of images. In this paper, we propose to use the global and semi-local edge histograms generated directly from the local histogram bins to increase the matching performance. Then, the global and local histograms of two images are compared to evaluate the similarity measure. Thus we exploit the absolute locations of edges in the image as well as its global composition. The proposed matching method is considered to be a more image content-based retrieval.
Keywords: Image retrieval, edge feature, edge histogram, similarity matching.
Abstract
Detection of Double JPEG Compression on Color Images using EBSF Method
Ann Josy John, Jissy Liss Jose
DOI: 10.17148/IJARCCE.2015.4882
Abstract: Detection of double jpeg compression with in an image with the same quantization matrix is a challenging problem. Detection of double JPEG compression plays an important role in digital image forensics. Some successful approaches have been proposed to detect double JPEG compression when the primary and secondary compressions have different quantization matrices. However, detecting double JPEG compression with the same quantization matrix is still a challenging problem. Here, an effective error based statistical feature extraction scheme is presented to solve this problem. First, a given JPEG file is decompressed to form a reconstructed image. An error image is obtained by computing the differences between the inverse discrete cosine transform coefficients and pixel values in the reconstructed image. Two classes of blocks in the error image, namely, rounding error block and truncation error block, are analyzed. Then, a set of features is proposed to characterize the statistical differences of the error blocks between single and double JPEG compressions. Finally, the K nearest neighbour classifier is employed to identify whether a given JPEG image is doubly compressed or not.
Keywords: Double JPEG compression, rounding error, truncation error,,color image.
Abstract
Data Security and Updation of Data Lifecycle in Cloud Computing using Key-Exchange Algorithm
Sangita Rautela, Arvind Negi, Prashant Chaudhary
DOI: 10.17148/IJARCCE.2015.4883
Abstract: Cloud Computing is an emerging paradigm which has become today�s hottest research area due to its ability to reduce the costs associated with computing and provides various types of facilities to the users. In today�s era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet and based on based on the concept of storage, virtualization, connectivity and processing power to store resources. Since Cloud Computing stores the data and disseminated resources in the open environment, security has become the main obstacle which is hampering the deployment of Cloud environments. Even though the Cloud Computing is promising and efficient, there are many challenges for data security as there is no vicinity of the data for the Cloud user. To ensure the security of data, in this paper authors proposed a modern data lifecycle model using implementation of DIFFIE-HELLMEN algorithm. It allows two parties to communicate with each other also exchange their secret keys over an unsecure transmission channel without knowing to each other.
Keywords: Encryption, Decryption, Data lifecycle, Key-exchange.
Abstract
Development of Decision Making and Analysis on Customer Reviews using Sentiment Dictionary for Human-Robot Interaction
Gurunath H Naragund, Santhosh Kumar K L, Jharna Majumdar
DOI: 10.17148/IJARCCE.2015.4884
Abstract: Online Shopping is becoming more and more popular day by day because - most of the people will buy electronic products through e-commerce websites such as Amazon, Flipkart, Snapdeal etc. Now a day, the web provides valuable resources for obtaining consumer reviews which is useful for business analyst to analyse the data for marketing strategies. The online products receive hundreds or thousands of consumerreviews that is increasing rapidly. The reviews or comments expressed on the websites, forums, and blogs will vary the quality of expressiveness. If we consider prominent product, the various reviews expressed on such products may be in large. It is very hard for a dormant buyer to read them to make final decision whether to buy the product or not. It can be hard for the seller to keep track on particular product and to manage consumer opinions which receives enormous reviews. The Decision Making and Analysis (DMA) on customer reviews using sentiment analysis areto make firm decision whether to purchase the product or not. The decision making will purely depend on consumer reviews or sentiments expressed towards particular product. The work rely on automatic identification of consumer reviews, extracting opinions and features, data cleaning and building various dictionary. The work also concentrates on sentiment analysis which includes identification of positive and negative sentiment orientations. Further, validating the review results based on various analysis techniques. Finally, we embed this software into robot so that it can provide step by step voice instruction of running DMA tool and at the end it gives desired result to the end user about the selected product.
Keywords: Decision Making and Analysis, Opinion Mining, Sentiment Analysis Dictionary, Human Robot Interaction.
Abstract
Real Time Monitoring of Water Level Variations In Rivers and Flood Alerting System using Arm7
D. Mysar, M. Jagadeesh babu
DOI: 10.17148/IJARCCE.2015.4885
Abstract: The main objective of this paper is monitor the water level variations in rivers and the monitored valued regularly stored in the web server which is useful to send flood alerts to corresponding authority for proper action and the same can be viewed through the web. In this paper monitoring the water related data like water level and flow rate in rivers and flood conditions using a typical ARM 7 will process the data and GPRS/GSM SIM 900a module is used to transmit measured data to the database and application server. Sensors are distributed in rivers so that changes of the water level can be effectively monitored. The database and application server is implemented as a web-based application to allow users to view real-time water-related data as well as historical data. The application server is also able to send warnings to the responsible authorities in case of emergency.
Keywords: ARM 7, Sensors, GPRS/GSM Sim 900a module, Flood alerting System.
Abstract
A Survey on Energy Efficient Clustering Protocols in Heterogeneous Wireless Sensor Networks
Harwinderpal Singh, Lokesh Pawar
DOI: 10.17148/IJARCCE.2015.4886
Abstract: Cloud comp ting's multi-tenancy feature, which provides privacy, security and access control challenges, because of sharing of physical resources among untrusted tenets. In order to achieve safe storage, policy based file access control, poly based file assured delectation and policy based renewal of a file stored in a cloud environment. a suitable encryption technique with key management should be applied before outsourcing the data. Exciting system attribute based encryption is new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. key policy attribute based encryption (KP-ABE) is an important type of ABE, which enable senders to encrypt message under a set of attribute and private keys are associated with access structure that specify which cipher texts the key holder will be allowed to decrypt. in this paper (ABS) attribute based signature new algorithm can be easily implemented and greatly raise the computational efficiency of original ABS algorithm. a verifier will be convinced of the fact that whether the signer's attribute satisfy the predicate while remaining completely ignorant of the identity of signer.ABS is much useful in a wide range of application including private access control for ad hoc networks, attribute based messaging, etc.
Keywords: Attribute based signature, Cloud storage, Cloud service provider, Data owner, Encryption.
Abstract
Cloud Computing: Network/Security Threats and Counter measures
M. Chandni Jain
DOI: 10.17148/IJARCCE.2015.4887
Abstract: Introducing a new concept of cloud computing in their environment. Cloud computing improves organizations performance by utilizing minimum resources and management support, with a shared network, valuable resources (The NIST Definition of Cloud Computing, 2009), bandwidth, software�s and hardware�s in a cost effective manner and limited service provider dealings. Basically it�s a new concept of providing virtualized resources to the consumers. Consumers can request a cloud for services, applications, solutions and can store large amount of data from different location. But due to constantly increase in the popularity of cloud computing there is an ever growing risk of security becoming a main and top issue. Current paper proposes a backup plan required for overcoming the security issues in cloud computing.
Keywords: Cloud computing, Network issues, Security issues, Counter measures.
Abstract
Refining Multibiometrics System by Exhausting Multiple feature Extraction
Chanda J. Jangid, Dipak R. Patil
DOI: 10.17148/IJARCCE.2015.4888
Abstract: Multibiometrics system is the combination of two or more biometric systems. These systems are more trustworthy due to the occurrence of multiple independent evidences. Multibiometric systems are very popularly deployed in many large-scale biometric applications like FBI, UID in India and banking etc. The problems due to unimodal biometrics are tried to resolve by multibiometric system. The main objective is to secure the biometric template by producing a secure sketch with the use of multibiometric cryptosystem and then put in a database. Investigators are concentrating on �How to offer security to the organization�. To protect the system template should be secure. If the multibiometric template is stolen it should be a serious issue for the safety of the organization and also for operator privacy. In this paper, present a feature-level fusion framework to defend multiple templates of a user as single secure sketch and compress the secure sketch to generate a compact multibiometric template that contain most of the information fulfilled in the individual template.
Keywords: Biometric cryptosystem, Multibiometrics, fuzzy commitment, fuzzy vault, fusion, secure sketch, template security.
Abstract
SNR Improvement for Evoked Potential Estimation using Bi – Orthogonal Wavelet Transform
Shailesh M L, Dr. Anand Jatti, Madhushree K S, Siddesh M B
DOI: 10.17148/IJARCCE.2015.4889
Abstract: Biomedical signals are those signals which are generated by the physiological activities of the body, which can be measured & monitored continuously and is an interdisciplinary subject. These signals take on one of the forms of chemical or electrical or acoustics, it can be in the form of continuous or discrete form. It is of utmost importance to study these signals which helps us to know the conditions of the human body. There are different types of biomedical signals, to name a few are Electroencephalogram (ECG), Electroencephalogram (EEG), Electromyography (EMG), Magnetoencephalogram (MEG), Mechanomyogram (MMG) & Electrooculography (EOG) which measure the electrical activities of a particular organ in the human body. Evoked Potentials (EP) or Event Related Potentials (EVP) is the potential developed in the body due to the application of external stimulus.. The stimulus can be visual or auditory or sensual accordingly they are called Visual Evoked Potential (VEP), Auditory Evoked Potential (AEP) & Somato Sensory Evoked Potential (SEP). These evoked potentials are embedded in the EEG signals and have very low amplitude. Extraction of visual evoked potentials (VEPs) from the human brain is generally very difficult due to its poor signal-to-noise ratio (SNR) property. Wavelet transform technique of estimation improves the SNR by a large amount in almost one sweep of EvokedPotential EP. The two different wavelet transforms such as Bi � Orthogonal wavelet transform and this wavelet transform has been used to improve the SNR. SNR comparison is made with the conventional ensemble averaging technique, where this technique requires more number of sweeps to improve the SNR. Comparison is made to understand the best Bi � Orthogonal wavelet transform for estimating the EP signal. In this paper, Visual Evoked Potential signals have been considered for the analysis.
Keywords: Bi � Orthogonal, Evoked Potential, Ensemble Averaging, SNR.
Abstract
Interfacing and Controlling of Liquid Crystal Display with Single Board Computer for Communication Access Terminal
G.Hemavathi, J.T.Pramod
DOI: 10.17148/IJARCCE.2015.4890
Abstract: Advanced Composite Communication System is an IP based integrated communication system designed to provide quick and reliable communication over Very Low Frequency, Medium Frequency, High Frequency and Very/Ultra High Frequency bands on board naval ships and submarines for facilitating ship to ship, ship to shore and ship to air communication. The Communication Access Terminal (CAT) is an important and integral part of ship communication system. CAT is a PC104 Single Board Computer (SBC) based system for internal and external communication. To provide visual information to the end user about line status, network status, information about connected radio number, CAT number etc. As a part of CAT development, interfacing of LCD board to PC104 Mother Board using RS232 based serial protocol is the main objective of this project. Programming the board is done using Qt Creator in C++ language. The Liquid Crystal Display interfaced to the PC104 mother board is tested using Graphical User Interface (GUI) application developed in Qt. The testing steps of display include 1) Displaying a preloaded logo on startup. 2) Faulty display detection using full pixel illumination. The current CAT is a simplified version of earlier CAT, which best suits for extreme weather conditions. The current CAT is designed so as to withstand the temperature range of -400C to +850C, relative humidity up to 80% at 250C, vibration 10g.
Keywords: PC104 Mother Board, Communication Access Terminal, RS232 serial protocol, Qt creator, Graphical User Interface, Liquid Crystal Display.
Abstract
Optimized Hindi Script Recognition using OCR Feature Extraction Technique
Nisha Goyal, Er. Shilpa Jain
DOI: 10.17148/IJARCCE.2015.4891
Abstract: Feature Extraction in any handwritten script is very important part of OCR. If right feature extraction technique is used, then it will make the recognition of individual character easy. In this we will try to use some technique that extracts the feature of individual character. Devanagari script is the popular and widespread script of India which is mostly used in India. It is used to write Hindi, Nepali and Marathi. We will try to extract feature of Hindi language. Hindi Language consists of vowels, constants and various modifiers. Proper Feature Extraction technique on Hindi character is challenging task. In this we use simple Feature Extraction technique to recognize handwritten Devanagari script.
Keywords: OCR (Optical character recognition), Feature Extraction, Zoning.
Abstract
Data Mining and Knowledge Extraction in the Risk Based Insurance Audit: A Case Study (City of Tehran)
Hossein Amirinia, MA Afshar Kazemi, Zahra Alipoor Darvish
DOI: 10.17148/IJARCCE.2015.4892
Abstract: Nowadays, data mining techniques are widely used in various industries. The Social Security Insurance Audit, with more than two million audit cases nationwide and limited manpower, cannot respond to all cases. The present research, using data mining techniques, aims to propose an efficient method for the detection of high-risk companies and fraud in the insurance industry. Materials and Methods: After randomly collecting 2000 records from the Social Security Audit database in 2014 and extracting various features for each company, a pre-processing of the data was conducted. The data was then divided into the two categories of Training Set and Test Set and given to the following four algorithms: Neural Network, Decision Tree, Bayesian and Support Vector Machine. Ultimately the accuracy of each algorithm was measured by the confusion matrix. Findings: By comparing the four algorithms mentioned above, it can be seen that all of these algorithms can provide a proper level of accuracy, with the neural network algorithm showing 90.6% accuracy, was found to be the best algorithm for the identification of high-risk companies. The findings of this study enable the Social Security Audit to develop software which can identify companies with high insurance risk in order to achieve higher levels of efficiency in the face of current limitations in manpower.
Keywords: Data Mining; Insurance Audit; Fraud; Neural Networks.
Abstract
Microcontroller based Navigation System for Visually Impaired People
Chaitali Kishor Lakde, Dr. Prakash S. Prasad
DOI: 10.17148/IJARCCE.2015.4893
Abstract: Navigation assistance for visually impaired (NAVI) refers to systems that are capable to assist or guide people with vision loss, ranging from partially sighted to totally blind, by means of sound commands. Many researchers are working to assist visually impaired people in different ways like voice based assistance, ultrasonic based assistance, camera based assistance and in some advance way researchers are trying to give transplantation of real eyes with robotic eyes which can capable enough to plot the real image over patient retina using some biomedical technologies. In other way creating a fusion of sensing technology and voice based guidance system some of the products were developed which could give better result than individual technology by the use of microcontroller. There are some limitation in system like obstacle detection which could not see the object but detection the object and camera based system can�t work properly in different light level so the proposed system is a fusion of color sensing sensor and the obstacle sensor along with the voice based assistance system. The main idea of the proposed system to make person aware of path he is walking and also the obstacle in the path.
Keywords: Navigation system; visually impaired; obstacle detection; mobility; microcontroller.
Abstract
A Study on Reversible Fragile Image Watermarking Scheme
Pooja Loni, V.S. Malemath, Sushma Chaugule, Anup Kalyanashetti
DOI: 10.17148/IJARCCE.2015.4894
Abstract: Digital watermarking is the way that is used to protect the confidential information in the form of images from the hackers or intruders. Images like medical images, military images contain vital information they must be protected from modification and attacks. Irreversible watermarking schemes have various limitations such as permanent embedding distortion. The problem of the embedding capacity depends on signal, that is the capacity of embedding depends on nature of the host signal and the block-wise dependence problem were not addressed by the researches of reversible watermarking schemes. This work proposes a reversible watermarking scheme which reduces the discussed limitations of irreversible and reversible schemes with different parameters.
Keywords: Fragile; Watermark; Reversible; Embed; Extract.
Abstract
A Prototype for Secure Information using Video Steganography
S. Deepa, R. Umarani
DOI: 10.17148/IJARCCE.2015.4895
Abstract: Steganography is a science that considers the method to hide information in the cover media. The direct purpose is the communication with the secret information. The methods can be classified based on the cover media and secret message type. The cover media can be audio, video, image or even text message. Similarly, the secret message can be images, audio, video and text messages. The challenge here is to cover the secret information properly without degrading the cover media, without noticing and with security. The proposed steganography algorithm based on color histograms for data embedding into Video clips directly, where each pixel in each video frame is divided in two parts, the number of bits which will be embedded in the right part are counted in the left part of the pixel. This algorithm is characterized by the ability of hiding larger size of data and the ability of extracting the written text without errors, besides it gives a high level of authentication to guarantee integrity of the video/images before being extracted. Furthermore, the data were embedded inside the video/images randomly which gave the video/images a higher security and resistance against extraction by attackers.
Keywords: Video Steganography, Signal-to-Noise Ratio (SNR), Histogram, Threshold.
Abstract
Offline PLC Failure Detection Method: A Case Study
Mr Atul B. Vitekar, Prof Dr M. S. Nagmode, Alok Pawar
DOI: 10.17148/IJARCCE.2015.4896
Abstract: Today�s automotive industry are demanding for flexible and capable of producing multiple vehicles in multiple variations on a single line. Such automation also requires guaranteed output with safety critical consideration. With the increase in flexible manufacturing comes more parts, more variation and programs, and more interfaces to robots and other devices. To maintain continual operations without reprogramming all of the equipment or reconfiguring entire control architecture to ensure output and productivity remain high. This paper discusses about the implementing offline failure detecting method of any Programmable Logic Controllers (PLCs) and the test result.
Keywords: Ladder Diagram, Logic Analyser, PLC, State Machine, VHDL.
Abstract
A Review: Performance Measurements of Transport Protocols
A. M. Anisul Huq
DOI: 10.17148/IJARCCE.2015.4897
Abstract: Seamless integration of wireless devices into the global Internet still poses a formidable challenge for the telecommunication industry. The main obstacle here is that, TCP was designed for wire-line networks and hence it interprets difficulties/errors in radio transmission differently. The objective of this paper is to review the measured performances of TCP in various operating conditions. The measurement results demonstrate the impact of different operating paradigms (e.g. WAN, WLAN etc.) on the performance of TCP.
Keywords: round trip time (RTT), bandwidth-delay product, Multiple Access with Collision Avoidance for Wireless (MACAW), Carrier sense multiple access (CSMA), bit error rates (BER).
Abstract
Design, Analysis and FPGA Implementation of N Bit Vedic Multiplier Based on Different Adder Architectures
S.Tamilselvan, V. Anil Kumar, V. Kamalkannan, CH.V.M.S.N.Pavan Kumar
DOI: 10.17148/IJARCCE.2015.4898
Abstract: The speed of the multipliers depends on the speed of the adders which are used for addition of partial products. The papers main focus is on the time delay of the multiplication operation on multipliers based on the ancient Vedic mathematical Sutra called Urdhva Tiryakbhyam i.e. vertically and cross wise Sutra. This Vedic multiplier is implemented using adder which has lesser time delay among carry look ahead adder, ripple carry adder, carry skip adder and carry select adder. The Vedic multiplier is coded in Verilog HDL and simulated using Xilinx ISE 14.3 software. This multiplier is implemented on Spartan 6 FPGA devices. The Vedic multiplier is compared in terms of time delay with conventional multiplier and it is used in Fast Fourier Transform algorithm.
Keywords: Ripple Carry Adder (RCA), Carry Look Ahead Adder (CLA), Carry Select Adder (CSA), Urdhva Tiryakbhyam, Fast Fourier Transform.
Abstract
Hybrid approach for Feature Extraction and Chaotic Time Series Prediction using ANFIS Model
Saurabh P. Dravyakar, Prof. Pravin Kshirsagar
DOI: 10.17148/IJARCCE.2015.4899
Abstract: Nonlinear dynamic signal processing is attracting several researchers owing to its complex behavior which may be deterministic at macro level and may be in order but unruly behavior with respect to time is difficult to understand and interpret. EEG signals fall under such categories. There are many methods uses for feature extraction e.g. correlation dimension, lyapunov exponent, wavelet transform etc. This paper gives a neuro fuzzy approach to the modeling on EEG signals data in presence of chaos if any. In local modeling approaches, the independent models which work on different nonlinear systems and processes are very successful in modeling, identification, and prediction applications. Chaotic time series are therefore used in our analysis. The results thus produced give a meager prediction error which is desirable to get an efficient analogy to create a much better prediction model for chaotic neuro fuzzy or adaptive neural network systems.
Keywords: EEG signals, feature extraction,Correlation Dimension,Lyapunov Exponent,ANFIS Model.
Abstract
Efficacy of IPv6 over IPv4 Addressing Protocol for Integration of Various Wireless Ad-hoc Networks
Pradeep Kumar Gaur, Dr. (Mrs.) Anupma Marwaha
DOI: 10.17148/IJARCCE.2015.48100
Abstract: Many Computer Vision and Machine Vision researchers are working very hard to connect the world together by enhancing the standards of wireless communication. In this concept of globalization, Wireless ad hoc networks (WANET) plays an important role due to their infrastructure less and autonomous attributes. In this paper we presented a concept of auto assignment of addresses to ad hoc nodes for allowing efficient duplex communication with corresponding nodes of infrastructure based network. To work with heterogeneous network of nodes, we consider four different wireless networks for the purpose of simulation. These networks are WiFi, ZigBee, UMTS and Satellite network. We analyze the performance of IPv6 based addressing over IPv4 based addressing for mobile nodes on the basis of parameters Average Packet Drop (APD), Delay, Routing Overhead (RO), Packet Receiving Rate (PRR) with respect to simulation time. In our study we found the improved performance of IPv6 based addressing over IPv4 based addressing when communicating in between network containing networks of different standards.
Keywords: Ad hoc networks, Duplex Communication, Infrastructure less, WANET, RERR.
Abstract
Review: ROI Based Medical Image Compression using DCT and HAAR Wavelet
Sarvarinder Singh, Er. Sarabjit Singh
DOI: 10.17148/IJARCCE.2015.48101
Abstract: Image compression addresses the problem of reducing the amount of data required to represent a digital image. There are some areas of medicine where it is sufficient to maintain high image quality only for diagnostically significant regions, for example, tumor section of the brain MRI. This paper represents a compression method based on ROI and its performance analysis focusing on Discrete Cosine Transform technique. It is used for reducing the redundancy that is nothing but avoiding the replica data. The DCT is a mathematical function that transforms digital image data from the spatial domain to the frequency domain.
Keywords: Images, lossy compression, Medical image compression, Region of Interest, Discrete Cosine Transform.
Abstract
Analysis of Simulation Parameter of WCDMA for Root Raised Cosine Filter
Qazi Saeed Ahmad, Saif Ahmad, Mohd Javed Khan
DOI: 10.17148/IJARCCE.2015.48102
Abstract: This Paper basically Represents simulation modal of root raised cosine filter for WCDMA with different parameters of filter. Here we have study the Simulation Parameters (Number of Bits, Bit error rate) of Pulse Shaping FIR Filter at different group delay for WCDMA. W-CDMA is a third-generation (3G) mobile wireless technology that promises much higher data speeds to mobile and portable wireless devices than commonly offered in today's market. It enables several users to transmit their information over the same channel bandwidth. In the mode of transmission a trade off exists between bandwidth containment in frequency domain and ripple attenuation in time domain. It is this trade off of bandwidth containment versus ripple amplitude is considered during system design when developing a data transmission system that employs pulse shaping.
Keywords: WCDMA, RRC Filter, DSSS, BER, QPSK, SNR.
Abstract
Word-wise Script Identification of South Indian Document Images
Smita Biradar, V.S. Malemath, Suneel C Shinde
DOI: 10.17148/IJARCCE.2015.48103
Abstract: A document page may consist of text words, numerical in different regional script along with the English and/or National language.Especially the documents in multilingual country or in the border area may have this scenario to convey information at mass. The monolingual OCR fails to identify such other script words and hence script identification becomes essential in such cases. Script identification is one of the challenging steps in the Optical Character Recognition system for multi-script documents. In this work we propose a word-wise script identifier considering all the south Indian languages. The proposed method uses morphological features such as dilation and erosion and reconstruction as base and a nearest neighbor classifier is used to classify the script. The method showed robustness in the estimation of script when tested on 600 word document images.The overall accuracy is found to be 98.1%
Keywords: OCR, Script Identification, morphological reconstruction, multilingual documents, multi script documents, NN classifier.
Abstract
Watermarking of the Fingerprint Template using Optimal Frequency Band
Amanpreet Kaur Wadhwa, Monica Goyal
DOI: 10.17148/IJARCCE.2015.48104
Abstract: Fingerprint is the most appreciated biometric identification system in the world today. The latest technology of the fingerprint identification has made the identification and verification of the human beings easy. But the database of the fingerprint templates is still unprotected except physical security. On the other hand invisible watermarking has enhanced the security in images. My topic is a combined approach for the security and image quality preservation of the fingerprint template images which are stored inside the database for future reference. The templates are watermarked with invisible logo, which is checked before the minutiae extraction process of the verification process. If the invisible watermark is missing or distorted then the template is considered to be a bogus or tampered one and the identification process fails.
Keywords: : Discreet Cosine Transform (DCT), Watermarking, Fingerprint Template, Invisible Watermark, Frequency Distribution, Spatial Domain.
Abstract
Performance Analysis of Vertical handoff metrics using Variance based algorithms
Abhijit Bijwe, Dr. C.G.Dethe
DOI: 10.17148/IJARCCE.2015.48105
Abstract: Vertical handover is the evolving concept in 4G for seamless communication between heterogeneous networks. In this paper, our main objective is to analyze handover between two WLAN, two Wimax, two UMTS networks. The vertical handover decision is taken based on the variance based algorithm, which calculates the variance of parameters such as delay, jitter, bandwidth and packet loss for various above mentioned networks and the network with most of the parameters with minimum variance is selected. This algorithm is also compared with with other algorithms such as MEW (Multiplicative experiment weighting), SAW (Simple Additive Weighting), TOPOSIS (Technique for order preference by similarity to ideal solution) and GRA (Grey Relational Analysis). These algorithms are appropriate for different traffic classes. Simulation results for proposed variance based algorithm in Matlab is discussed and compared with other Multiple attribute decision making algorithm basis of bandwidth; jitter, delay etc. are discussed in the paper. It can be seen that the proposed variance algorithm gives less packet delay than all the algorithms, Jitter is also is least than all the other algorithms.
Keywords: SAW, TOPOSIS, GRA, MEW.
Abstract
Privacy Preserving Using Association Rule in Data Mining Techniques
Mrs. S. Vasanthi, Ms. S. Nandhini
DOI: 10.17148/IJARCCE.2015.48106
Abstract: This paper describes the problem of Privacy Preserving Data Mining (PPDM). It describes some of the common cryptographic tools and constructs used in several PPDM techniques. The paper describes an overview of some of the well known PPDM algorithms, - ID3 for decision tree, association rule mining, EM clustering, frequency mining and Na�ve Bayes. Most of these algorithms are usually a modification of a well known data mining algorithm along with some privacy preserving techniques. The paper finally describes the problem of using a model without knowing the model rules on context of passenger classification at the airlines security checkpoint by homeland security. This paper is intended to be a summary and a high level overview of PPDM.
Keywords: Anonymization, Data Mining, Sensitive Information, Privacy preserving data Mining, Provenance.
Abstract
Design and Implementation of a Digital Accumulator for the Phase Coherent Radio Pulse Signal using FPGA
Dr.Kamal Aboutabikh, Dr.Mansour Babiker Idris, Dr.Ibrahim Haidar
DOI: 10.17148/IJARCCE.2015.48107
Abstract: In this paper, we introduce a practical mechanism of forming and accumulating phase coherent radio pulses signal in presence of additive white Gaussian noise (AWGN) by a digital pulses accumulator using FPGA to improve the signal-to-noise ratio (SNR) through designing a direct digital frequency synthesizer (DDFS) to synthesize the phase coherent radio pulses signal in presence of AWGN by digital pseudo noise generator (DPNG) at different SNRinp and design a digital accumulator for 20 phase coherent radio pulses, and this maximizes SNRout by 13 dB using Quartus II 9.1 design environment.
Keywords: AWGN ,Radio Pulse, DDFS, DPNG, Digital Accumulator ,FPGA.
Abstract
Cost Optimal Approach using PSO in QOD Protocol for Hybrid Wireless Network
G.Angeline Prasanna M.Sc., M.Phil., M.C.A.,(Ph.D), K.Prabhakaran
DOI: 10.17148/IJARCCE.2015.48108
Abstract: To support real-time transmission with rigorous Quality of Service (QoS) requirements for wireless applications, substantial research has been committed. At the same time, a wireless hybrid network which incorporates a wireless and MANET is better alternate for the next generation wireless networks. By verbatim acceptation of resource reservation-based QoS routing for MANETs, acquire invalid reservation and race condition issues in MANETs. To ensure the QoS in hybrid networks, QOD protocol has been enforced to provide prominent QoS performance. In this paper PSO based QoD protocol has been proposed, by using PSO (practical swarm optimization) algorithm for identifying the nearest neighbour. By using PSO the computational cost is diluted. Thus providing, an economic hybrid wireless network. By relying on an observation, the PSO based QOD protocol shows improved performance than QOD.
Keywords: QoS, QOD, Cost Optimization, PSO, Hybrid Wireless Network, MANET.
Abstract
Study on Image Compression Algorithms using Ideal Images
Dr.G.Boopathi, Dr. Narayanan Sreekumar
DOI: 10.17148/IJARCCE.2015.48109
Abstract: Compression basically employs redundancy in the data. Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information. In effect, a smaller file size is generated in order to achieve a faster transmission of electronic files and a smaller space required for its downloading. Compression is done by using compression algorithms that rearrange and reorganize data information so that it can be stored more economically. This is done by using a compression/decompression program that alters the structure of the data temporarily for transporting, reformatting, archiving, saving, etc. Lossless Compression is a type of compression that can reduce files without a loss of information in the process. The original file can be recreated exactly when uncompressed. Huffman compression is a lossless compression algorithm that is ideal for compressing text or program files. This probably explains why it is used a lot in compression programs like ZIP or ARJ. In this article we represent principles of Huffman code which is used for compression. Huffman coding is based on the frequency of occurrence of a data item. The principle is to use a lower number of bits to encode the data that occurs more frequently. Codes are stored in a Code Book which may be constructed for each image or a set of images. In all cases the code book plus encoded data must be transmitted to enable decoding.
Keywords: JPEG, image compression, JPEG compression, Huffman code, reconstruction.
Abstract
Identity Based Approach for Cloud Data Integrity in Multi-Cloud Environment
Ali Mohammed Hameed Al-Saffar
DOI: 10.17148/IJARCCE.2015.48110
Abstract: Cloud computing is a new computing model which enables individuals and organizations to gain access to huge computing resources without capital investment. It does mean that users can utilize computing resources in pay per use fashion. With virtualization technology the commoditization of computing resources has become a reality. The world is experiencing the advantages of cloud computing as industry giants like Microsoft, Google, Amazon etc. are providing cloud computing services. However, the cloud environment is considered in trusted as it is accessed through Internet. Therefore people have security concerns on data storage security of cloud computing. Many techniques have been proposed in the literature for ensuring data storage security in cloud computing. This paper proposes a model for cloud data integrity in the distributed multi-cloud environment. The proposed method is testing using a prototype application which demonstrates the proof of concept. The empirical results revealed that the proposed system is exhibits higher performance when compared with existing solution.
Keywords: Cloud computing, security, data integrity, multi-cloud.
Abstract
Estimation of Device Parameters for an Efficient Model Analysis in CV Measurement for Al/Si/P-Si Heterostructure
Mrs. Sabarna Dhar, Mrs. Parikha
DOI: 10.17148/IJARCCE.2015.48111
Abstract: C-V measurements provide a wealth of information about device and material characteristics. Capacitance versus (usually reverse) voltage, referred to as C-V, measurements can be used to study the most basic properties of semiconductor rectifying junctions. In addition to obtaining simple capacitance values at a given bias, which may be important for circuit simulation, the data can be manipulated to yield a number of other parameters such as the built-in potential, Vbi, the doping profile as a function of depth and the barrier height. This paper will present the principle of c-v measurement and c-v measurement of metal /porous silicon/silicon/metal (MISM) structure. To do the C-V measurement of (MISM) structure, metal �porous silicon contact must be needed. So metal-porous silicon contact (both ohomic and rectifying) are also being discussed.
Keywords: C-V Measurement, metal-porous silicon, semiconductor etc.
Abstract
A Conceptual Model For Ontology-based Mental Model
Somayeh Mohammadi, Hayedeh Saberi, Touraj Banirostam
DOI: 10.17148/IJARCCE.2015.48112
Abstract: Utilizing mental models by different fields leads to generation of various definitions for this concept. In this paper, these field�s significant definitions for mental models will be presented and their key concepts in each field will be analysed. By using regarded features of mental models definitions, ontology will be presented. In the ontology, the main fundamental concepts and their relations have been presented and analysed and then presented in the proposed model. Thirteen basic characteristics have been used to describe the proposed model�s functionality. In additional to, types of memory will be analysed and relations between them and presented model will be studied and then illustrated in a conceptual model. The aim of proposed model is to design cognitive agent that thought human-like.
Keywords: Cognition, Memory, Mental Models, Modelling, Ontology.
