VOLUME 4, ISSUE 12, DECEMBER 2015
Performance-Based Usability maturity Assessment Framework for VLS in Universities
Kelvin K. Omieno, George Raburu, Pamela Raburu
Review on Extraction of Keywords and Recommendation of Documents in Conversation
Pallavi Gopal Patil, Prashant Yawalkar
Reduced Dimensionality for Network Intrusion Detection using Principal Component Analysis
T. Manoj, Mr.S.Saravanakumar
A Review on Keyword Based Web Search using Multilevel Ranking
Vivek Kale, Dr. K. V. Metre
Survey on Fuzzy Min-Max Neural Network Classification
Bhavana Jain, Vaishali Kolhe
Turn Around Group Query Optimization System Analysis
M. Venkatasalam, V. Bakyalakshmi
Performance Analysis of Adaptive Modulation and Coding Schemes on OFDMA Physical Layer
Sayawu Yakubu Diaba, Theophilus Anafo, Zuberu Abdul-Rahman
A Survey on Mechanism of Data Hiding in Audio-Video using Anti Forensics Technique for Data Authentication
Pallavi Phartade, Vandana Nawale
Finite State Machine as a Designing Tool for Web Based Transactional Systems
Binayak Panda, Dr. Nilambar Sethi
3D Barcode Modulation Method for Data Transmission in Mobile Devices
Navale Puja Vitthal, Erande Swati Govind, Badhe Priyanka Vasant
A New Approach to Efficient Medical Image Fusion
Urba Ziyauddin Siddiqui, P.R Thorat
An Overview of Frame based Recovery of Corrupted Video files for Forensic Purpose
Uzma Siddiqui , P.R Thorat, A.B Diggikar
A Review of Hiding of Data in Mosaic Images by Reversible Color Transformations
Ms. Priyanka Nehete, Prof. Pankaj Salunkhe, Prof. Nilesh Pawar
A Survey on Efficient Mechanism of Data Embedding using Reversible Texture Synthesis
Payal T. Chaskar, Prof. Arati Dandavate
Reducing Consumption of Power in Peer to Peer System with Load Balancing of Processes
Mr. Sumit V. Dusane, Mr. Pranay Chauhan
Performance Measurement using CASE Expression over PIVOT Operator in SQL Server 2008 r2
Mr. Sudhakar Panigrahy, Mr. Pragnyaban Mishra
Simulative Analysis of Histogram Equalization Techniques for Gray Scale Images
Karamjot Kaur, Jyoti Saxena and Sukhjinder Singh
A Novel Approach to Enhance the Large Scale Computing System for Handling Distributed Data using Hadoop Framework
Ms. J. Monica Msc, Mr. P.Ponsekar Msc, MPhil.,
A Survey on Privacy Preservation for Navigation in Multiple Roadside Unit using VANET
Ms.K.Priyadharshini, Msc, Ms.J.Savitha Msc, MPhil.,
Secure Transaction for Cross-Cloud and Service Composition for Big Data Application using HIRESOME-II
M.Padmavathy, Dr.S.Babu
Enhancement of Isolation and Gain of Antenna Using Slotted Meander Line Resonator for WiMAX Applications
Pawan Kumar, Lakshmi Raj Singh, D.K. Srivastava
Design and Analysis of Triple Band Inverted T-shaped Microstrip Patch Antenna
Lakshmi Raj Singh, Pawan Kumar, D.K. Srivastava
Design of a Modified L Slot CPW Feed Multiband Antenna for Wireless Application
Juin Acharjee and Kaushik Mandal
Intelligent Strategy of Task Scheduling in Cloud Computing using Swarm Optimization with Griewangk’s function
Ms. R. Dhivya, Mrs. C. Senbagavalli Msc, MPhil
Effectiveness Estimation of Object Oriented Software: A Revisit
Pooja Gupta, Dr. Namrata Dhanda
Secured and Authenticated Anonymous Data Access on Cloud in MANET
Miss. Pooja D.Bardiya, Prof. P.L. Ramteke
An Approach for Hiding the Sensitive High Utility Itemsets without the Information Loss
Ms. M. Kanchana, Mrs. C. Senbagavalli Msc, MPhil
Retrieval of Emergency Information of Accident Victim by Using 2D Dynamic QR Code via Cloud Database
Monika Singh, Prof. G.S. Mate, Shrishti Chaturvedi, Balraj Snehi
Customer Zodiac – A Way to Understand Customer Pain Points to Improve Customer Service Satisfaction
Amit Ganesh Upadhye, A. C. Lomte
Twin Based Face Differentiation and Retrieval from a Database
Nishu, Navdeep Kaur
Wireless Network Security Framework for Mobile Sink Attack
Mr. Kaustubh K. Markande, Ms. Amruta Ammune
Location tracking using Google Cloud Messaging on Android
Prof. C. J. Shelke, Ms. Grishma R. Bhokare
Pilgrim Tracking and Health Monitoring System Using WSN
Supriya Suryawanshi, Prof. Shivani Pandita
Review on Novel Approach for Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
Ujwala M. Halde, Prof. Nilesh R. Wankhade
A Review on Confidentiality and Authentication in Content Based Publish/Subscribe System
Nileema R. Hiray, Prof. K. N. Shedge
Analysis of Dynamic Traffic Patterns on WDM Optical Networks for Different Topologies Using RWA Algorithm
Jashwant Samar, Paramdeep Singh, Yogendra Kumar Jain
An Automatic Monitoring and Swing the Baby Cradle for Infant Care
Rachana Palaskar, Shweta Pandey, Ashwini Telang, Akshada Wagh, Ramesh M. Kagalkar
Survey on Various Routing Approaches for Efficient Multimedia Transmission in CRSN
Gajanan Heddure, Asst. Prof. S.P. Pingat
RIPD: Route Information and Pothole Detection
Shrey Garg, Prof. G.S. Mate, Rohan Das, Shashank Tiple, Aswathi Panicker
ABRDBMS – A new Paradigm in Information Storage and Retrieval from RDBMS
Vishwas J Raval and Parth Shah
k-ACO: Information Retrieval from Cloud using Optimum Data Migration based on K-Means & ACO
Vishwas Raval
Analysis of Removing Noise from Modeled ECG Signals by using Adaptive Noise Cancellation Model
Mounica Thodetil, Sree Lakshmi Gutta
Effective Evaluation of Transactional Data Items – A KDD Approach toward the customer rating
Mr. Pragnyaban Mishra, Mr. Sudhanshu Shekhar Bisoyi
Mining Stream Data with Data Load Shedding Techniques using Self Adaptive Sliding Window Model
C.Nalini
Development of an Intrusion Detection System based on Big Data for Detecting Unknown Attacks
Miss Gurpreet Kaur Jangla, Mrs Deepa.A.Amne
Owner Secured Data Storage on Cloud and Sharing with Key Aggregate Cryptosystem
Mr.Nilesh Deshmukh, Mr.Arivanantham Thangavelu , Mr.Vaibhav Muddebihalkar
A Review Towards Digital Image Defogging Using Dark Channel Prior and Histogram Stretching Method
Miss. Radhika P. Yawale , Prof. A. S. Kapse
A Survey on Design and Development of Wireless Local Area Network Security and Enhancement Using Wired Equivalent Privacy
Ms. Manju Gopinathan, Mr. M. Sengaliappan MCA, M.Phil, ME
A Review on Various Underwater Image Denoising and Enhancement Techniques
Miss. Rutika S. Ingole, Prof. C. J. Shelke
A Survey on Data Mining with Big data – Applications, Techniques, Tools, Challenges and Visualization
S. Usharani, K. Kungumaraj
An Overview of Classification Algorithm in Data mining
S. Venkata Krishna Kumar, P. Kiruthika
Content Structure Extraction from Deep Web Pages using page segmentation
Mr.A.B.Majgave, Prof.(Dr.).S.K.Shirgave
Perception of relationship between Big Data and Internet of Things
Prof. Nasrulla Khan K, Prof. Anitha Kumari
User-Centered Design (UCD) Approach for Designing of Platform Independent Applications in Smartphone
Vijay R. Mendapara, Yogesh R. Ghodasara, Ghanshyam S. Poriya, Krunal C. Kamani
A Comparative Analysis of Hierarchical and Partitioning Clustering Algorithms for Outlier Detection in Data Streams
Dr. T. Christopher, Mrs. T. Divya
Shortest Path Algorithm for Spatial Query Processing in Road Network
Rambha Agrahari, Rakesh Kumar Singh, Toshika Dutta
Solving the Problems in Sharing the Information in ERP Implementation Systems
Mrs. S. Mala, Dr. K. Alagarsamy
Lossless Image Compression using Hybridization of Entropy Encoding and Data Folding
Malwinder Kaur, Navdeep Kaur
Energy Efficient DYMO Protocol for 802.15.4 over Flooding Attack
Garima Pahare, Surbhi Koushik
A Compendium for Prediction of Success of a Movie Based Upon Different Factors
Shraddha Mehta, Hitarthi Bhatt, Prof. Darshana Desai
Raspberry Pi Home Automation Based on Internet of Things (IoT)
Upadhye Madhuri Ganesh, R. A. Khan
Real Time Hand Gesture Recognition Based Image Viewer
Sujit Wankhade
A Survey – An Introduction of Zigbee
Toshika Dutta, B.P. Chaurasia, Rambha Agrahari
Performance Evaluation of Enhanced DSR Protocol under Influence of Black Attacks
Isha Sharma, Rajesh Kochher
Multimedia based information retrieval approach for lecture video indexing based on video segmentation and Optical Character Recognition
Surabhi Pagar, Gorakshanath Gagare
A Glance over the Working Methodology of VANET
Apurva Kukade, Prof. Tilotma Sharma
A Review on Extracting Top-k Lists from the web
Shreya U. Wadkar, Prof. N. G. Pardeshi
Detection and Prevention of Wormholl Attack Using AODV Protocol
Miss Asha Mansore, Miss Surbhi Koushik
Moving Object Detection, a Succinct Review
Ruchira Susar, Mahendra Dongare
A Survey on Ranking Fraud Detection Using Opinion Mining for Mobile Apps
Tejaswini B. Gade, Prof. Nilesh G. Pardeshi
Hiding of Data in Mosaic Images by Reversible Color Transformations
Ms. Priyanka Nehete, Prof. Pankaj Salunkhe
Fruit Identification and Classification Techniques A Review Using Neural Networks Approach
Ms. S.Mahalakshmi, Harini Srinivas, Meghana S, C Sai Ashwini
Implementation of Affordable Éclat Public Transportation Systems
S. Seshagiri Rao, B. Nancharaiah
Analysis of Data Virtualization
P. Srinivasulu, C. Yosepu, B. Subbarayudu, A. Kavitha
A Novel Study on Improved Re-Route Model to Reduce Traffic in MPLS Network
Mrinal Kishor, Deepak Dhadwal
A Survey on Hybrid Algorithm for Image Deblurring Techniques
Chandra Prakash Prabhakar, Mrs. Kiran Dewangan
A Review on Biomedical Image brightness preservation and segmentation technique using CLAHE and Wiener filtering
Miss. Priya S. Patil, Prof. P. P. Pawade
Intrusion Detection, Prevention and Self-Healing using Mirroring on Server
Priya N Jethani, Prof. Ankush S Narkhede
A Review of Routing Protocols for Underwater Wireless Sensor Networks
Syed Abdul Basit, Manoj Kumar
A Survey & Study on Improvements in Efficiency and Effectiveness of Multipath Routing Protocols in Wireless Sensor Networks
Er. Manish Purohit, Er. Piyush Vyas, Er. Bablu Kumar Singh
A Review on Hide the data in Encrypted video using Private Key for secure Transmission
Abhijeet Kotwal, Prof.K.N.Shedge
Importance of Professional& Social Networking for Entrepreneurs
Akash Bhojraj, Ritwik Kulkarni, Hrushikesh Korde, Bhushan Kudale
Eclat – Genetic Approach for Finding Association Rule
Santosh Kumar Satapathy, Santosh Kumar Moharana, Narendra Kumar routr, Avaya Kumar Ojha
Generate New Technology Centralized Mobile Gateway (CMG ) to Transmit Government Services in Public
Er. Niranjan Singh, Dr. Hemant Kumar Malviya
A Novel Study on an Optical Wireless Indoor System Based on Artificial Neural Network
Parveen Aggarwal, Praveen Bajaj
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
D.H.Patil, Shrikant Raikode, Swapnil Katwe, Jitendra Pawar, Manoj Pawane
Design and Implementation of Rank Based ACO approach for Multipath Routing Mechanism with Load Balancing in Ad hoc Network
Manjinder Kaur, Dr. Vinay Chopra
Performance Analysis of RCA – CSKA and CSA with Proposed Adder Cell
K. Samanna, M. Mahaboob Basha
Digital Watermarking with DWT & DCT using Bit Plane Encryption
Ragini Sharma, Er. Surbhi Gupta
Survey on Different Auto Scaling Techniques in Cloud Computing Environment
Pranali Gajjar, Brona Shah
Survey of IP Traceback Mechanisms to Overcome DoS Attacks
Sowmya Gibish, Uday Babu. P
Indian Musical Instruments Recognition Using LPC and LPI
Satish R.Sankaye, U.S.Tandon, S.C. Mehrotra
A Decisive Mining for Heterogeneous Data
Prakash R.Andhale, S.M.Rokade
Steps of Human Iris Detection for Biometric Application
Mr. Rahul A.Patil, Mr.A.H.Karode, Mr.S.R.Suralkar
Audio Watermarking By Using Reversible Contrast Mapping (RCM)
Pandit Madhurima Rajendra, Swati Patil
A Novel Enhanced Technique for PAPR reduction Using Weighted OFDM signal
CH. Nagaraju, Dr. Anil Kumar Sharma, Dr. M.V. Subramanyam
Recovery and Security in Distributed System
Ms. Gurpreet Kaur Sodhi
Estimation of CVD with reference to the People of North East India using Predictive Data Mining
Dulal Ch. Das, Prof. P.H. Talukdar
Role of Syllabification for Intonation Model of Assamese Language
Parismita Sarma, Shikhar Kr. Sarma
A study of RCS reduction using the designing of Chaotic Structures
Er. Tejasvi Thanvi, Er. Piyush Vyas, Prof. K. K. Arora
A Review on Multi-attribute Watermarking Technique for Relational Data
Ms. Vrushali B. Patil, Prof. P. M. Yawalkar
An Improved Wormhole Attack Detection and Prevention Method for Wireless Mesh Networks
Virendra Dani, Vijay Birchha
Survey on Recapture Detection Algorithms
Mr. Vinayak K. Shingote, Prof. Ashish Kumar
Combining Apriori and FP Growth algorithms with Simulated Annealing for Optimized Association Rule Mining
Manoj Ganjir, Jharna Chopra
Internet of things: A Survey on Architecture, Applications, Security, Enabling Technologies, Advantages & Disadvantages
Farheen Fatima, Batul Naeem Husain, Mohammed Azharuddin, Mohammed Abdul Mabood
MX-TCP and HS-TCP as Possible Options to Overcome TCP Limitations in Multi-Hop Ad-Hoc Networks
Aniket Deshpande, Dr. Ashok Kaushal
Developing an Enhanced Fusion Model to Classify Biomedical data
Santosh Kumar Satapathy, Avaya Kumar Ojha, Elina Patnaik
Survey on Sketch Based Image Retrieval
Dipika R. Birari, Prof. J.V. Shinde
Review on Domain Specific Bug Triage with Software Data Reduction Techniques
Supriya B Boraste, P.B. Koli
Survey on Tweet Summarization Approaches
Prashant S. Bagade, Prof. S. A. Shinde
Survey on Buddy Analytics Based on Social Media
Mangesh U. Sanap, Prof.V.S.Phad
Workload Distribution Technique in Virtualized Data Center Using Consolidation and Migration
Tejashwini Y. Bhamare, Prof. B R. Nandwalkar
Survey on Hybrid Multigroup Co-clustering Using Collaborative Filtering Model
Mr. Pramod Kale, Prof. M. R. Patil
Channel Estimation and PAPR Computation for MIMO-OFDM Systems
Palla Parasuram Yadav, R.S.K. Vaibhav, Prof. R.V.S. Satyanarayana
Surveying Wormhole Attack and Their Different Existing Detection Techniques
Niharika Shrivastava, Prof. Tilotma Sharma
Design and Implementation of IRTIV: Intelligent Routing protocol using real time Traffic for Mobile Ad Hoc Networks
Mrs. Mala kalaiarasi, Mrs. S.seedhana devi
Fine Grained Model Based Relevance Feature Discovery for Text Mining
S. H. Jadhav, P. B. Koli
Impact of Aerosols in the Atmosphere using Mie Scattering
G. Swetha, Dr. S. Varadarajan, Dr. Amit Parashuram Kesarkar
Improved ALPR system based on Smart License Plate Character Detection Algorithm
Rohollah Mazrae Khoshki, Subramanian Ganesan
Performance Measurement of Refinding Queries in Context
Sayyad F S, Prof. P.P. Kalyankar
Personal Cloudlets: Implementing a User-Centric Datastore with Privacy Aware Access Control for Cloud-based Data Platforms
Nauman Birwadkar, Mrs. Monali P. Deshmukh, Apoorva Arbooj, Suraj Todkari, Priya Agarwal
Design of Linear Feedback Shift Register using Reversible Logic
Sree Ramani Potluri, Lipsa Dash
Co-tier and Cross- tier Interference Mitigation in LTE based Femtocell Network using CASFR Scheme
Reshma Khandare
Design of A Novel Low Power Dynamic Comparator Using 90nm CMOS Technology
Binu C. Pillai, Binoshi Samuvel
A Review on High Speed CMOS Counter Using Altera MAX300A
Bindu Sebastian, Dr. Vineeth Valsan, Paulin John
A Wireless Approach towards Medical Surveillance System
Deepa D. Waingade, Meena S. Chavan
A survey of Web Service Recommendation Techniques based on QoS values
Ashwini Puri, Mansi Bhonsle
EEG signals and wireless transfer of EEG Signals
Md Belal Bin Heyat, Shaguftah, Yassir. M. Hasan, Mohd Maroof Siddiqui
An Overview of Sleep and Stages of Sleep
Yassir. M. Hasan, Md Belal Bin Heyat, Mohd Maroof Siddiqui, Shafan Azad, and Faijan Akhtar
Wideband Slot Loaded Compact Monopole Antenna
S. Das, S. Sinha, S. Kundu, S. Sen, S. Pal, Sk. S. Badsha, and K. Mandal
Mobile Ad-Hoc Networks: AODV Routing Protocol Perspective
Ayaz Ahmad, Mahfuzul Huda, Mohd Atif Kaleem, Rajendra Kr Maurya
Cooperative Black Hole Attack Detection: A Survey
Alphonsa George, Dhanya Narayan, Cincy Mary Sebastian
Ultrasound Image Enhancement Using Laplacian Kernel Set
Mohit Samnotra, Akshay Girdhar
Comparative Performance Analysis of PostgreSQL High Availability Database Clusters through Containment
Le Quan Ha, Jeff Xie, Darrell Millington and Amgad Waniss
Android Based Smart Water Pump Controller With Water Level Detection Technique
Souvik Paul, Mousumi Das, Anik Sau, Soumyadeep Patra
An approach of hiding digital images combining the cryptographic and steganographic techniques
Maneesha Kumari, Anand Joshi
Two stage classifierfor Arabic Handwritten Character Recognition
Omer Balola Ali, Adnan Shaout, Mohammed Elhafiz
Centralized Approach to mutual Exclusion in Distributed Systems
Ashish Chauhan, B.K. Yadav, Kanupriya
Confabulation – Inspired Association Rule Mining for Rare and Frequent Itemsets
K. Jayakumar, Mrs.N. Tamilselvi
Ambient Assisted Living using Sensor and Mobile Technologies for Elderly People
Md. Badruduja Bhuiya
Intrusion Detection System for Android Smartphone in Cloud Environment
Anirudha A. Kolpyakwar, Prof. Pragati Patil
Comparison between Local Binary Pattern and Ch109ain Code Techniques for Image Retrieval using Sketches
P. Chandana, P. Srinivas Rao, Y. Srinivas
Automated Question Paper Generator System
Mojitha Mohandas, Aishwarya Chavan, Rasika Manjarekar, Divya Karekar
Abstract
Performance-Based Usability maturity Assessment Framework for VLS in Universities
Kelvin K. Omieno, George Raburu, Pamela Raburu
DOI: 10.17148/IJARCCE.2015.41202
Abstract: Virtual learning systems are becoming an increasingly common form of education due to the need for a platform that provides ability to connect people with required sets of skills, regardless of their location in the world. However, user satisfaction has always been a major factor in the success of software, regardless of whether the software is proprietary or freeware (such as open source software). Although user-centred designs are gaining recognition among virtual learning system community, many design scenarios still do not incorporate usability as one of their primary goals. Accordingly, many individuals believe that if virtual learning system was more usable, its popularity would increase tremendously. Although there are strong usability models for information systems, there is still potential to improve the usability of virtual learning systems. The usability assessment of virtual learning systems is an area where relatively little research has been conducted, and, accordingly, the main contribution of this work is a framework that evaluates the usability maturity of a virtual learning systems. Consequently, the study presents a performance-based Virtual Learning System Usability Maturity Assessment Framework that is aimed at usability-related issues for virtual learning systems in universities.
Keywords: virtual learning systems; usability; usability assessment framework; user-centred designs.
Abstract
Pervasive Computing
Ms. Jayanti Goyal, Ms. Anjali Dadhich
DOI: 10.17148/IJARCCE.2015.41203
Abstract: Pervasive Computing environment gracefully integrates networked computing devices from tiny sensors to extremely dynamic and powerful devices � with people and their ambient environment. Service discovery is an essential element for pervasive computing to achieve �anytime, anywhere� computing without users� active attention to computing devices and network services. Privacy and security issues, however, have not been properly addressed. Therefore, devices and network services may be unprotected; personal privacy may be sacrificed; and devices and network services may be inconvenient to use. In this paper, we will present what is pervasive computing and its applications. In particular, I will focus on how pervasive computing provides various features like security, safety, convenience, telemetric etc. to a car.
Keywords: ICT, Ubiquitous Computing, Calm Technology.
Abstract
Review on Extraction of Keywords and Recommendation of Documents in Conversation
Pallavi Gopal Patil, Prashant Yawalkar
DOI: 10.17148/IJARCCE.2015.41204
Abstract: The problem of keyword extraction from conversations is with the intention to find the potentially relevant documents using the retrieval of keywords for each short conversational fragment then which are going to be recommended to participants. Short conversational fragment contains variety of words which are related to several topics; it is difficult to find out the information needed by the participants. To solve this, an algorithm to extract keywords from output of an ASR system is introduced which uses topic modeling techniques and sub modular reward function which favors diversity in keyword sets to reduce ASR noise. This method derives multiple topically separated queries from the keyword set which helps in maximizing the chances of, at least one relevant recommendation while searching these queries over English Wikipedia.
Keywords: Document recommendation, keyword extraction, topic modeling.
Abstract
Reduced Dimensionality for Network Intrusion Detection using Principal Component Analysis
T. Manoj, Mr.S.Saravanakumar
DOI: 10.17148/IJARCCE.2015.41205
Abstract: Intrusion Detection System (IDS) is the science of detection of malicious activity on a computer network. Due to the enormous volume existing and newly appearing network data, Data Mining classification methods are used for Intrusion Detection System. In this paper the classifying methods used are ID3, SVM, Decision Tree and One R. The data set used for this experiment is kddcup1999. The dimensionality reduction is being performed from 41 attributes to 6 and 14 attributes based on Principal Component Analysis and the 4 classifying methods are being applied. The result shows SVM method carries the highest accuracy and sensitivity with 6 and 14 attributes. J4.8 and ID3 holds the highest degree of specification for all three dimensionalities. One R has the worst Sensitivity with 6 and 14 attributes but the time taken by One R for classification is very less. It is found that the optimal algorithm may vary based on the dimensionality. Our approach focuses on using information obtained Kdd Cup 99 data set for the selection of attributes to identify the type of attack. Our work then compares the performance of the classification models by a randomly selected initial dataset with the reduced dimensionality. Furthermore, the results indicate that our approach provides more accurate results compared to the purely random one in a reasonable amount of time.
Keywords: IDS, Mining, ONER, SVM, PCA, KDD Cup99 dataset.
Abstract
A Review on Keyword Based Web Search using Multilevel Ranking
Vivek Kale, Dr. K. V. Metre
DOI: 10.17148/IJARCCE.2015.41206
Abstract: Keyword search is a type of search in which matching of related documents containing one or more related words specified by the user. The web not only includes textual record but also include internet of interlinked knowledge. The linked data already contains valuable data in diverse areas, such as e-government, e-commerce, and the biosciences. The growing number of datasets published on the web are consider as linked knowledge which brings possibilities of prime data availability of information. As the information increases challenges for querying also increases. It is very problematic to search in linked data using structured languages. Hence, Keyword Query searching for linked data is used. Different approaches for keyword query routing through which the efficiency of keyword search can be improved greatly. Through routing the key phrase to relevant data source the cost of processing can be reduced. The Multilevel Scoring Mechanism is used to find top-k result for relevant document retrieval. By using this mechanism relevant data can be retrieved effectively and efficiently.
Keywords: Keyword search, Keyword query routing, Graph-structured data, RDF.
Abstract
Survey on Fuzzy Min-Max Neural Network Classification
Bhavana Jain, Vaishali Kolhe
DOI: 10.17148/IJARCCE.2015.41207
Abstract: Fuzzy min max (FMM) model is a combination of both fuzzy set and neural network for classification. It uses hyperbox structure for pattern classification which consists of min and max points of opposite corners of hyperbox. To handle overlapping region of hyperboxes during classification is a crucial role. There are various FMM models are described in which during learning phase the hyperboxes are expanded until almost the whole pattern space is covered. At the end of learning phase, there are no overlapping hyperboxes that belong to different classes. The maximum expansion of these hyperboxes is controlled by the expansion parameter ? which is used for expansion.
Keywords: Fuzzy min-max (FMM) model, hyperbox, neural network, pattern Classification.
Abstract
Turn Around Group Query Optimization System Analysis
M. Venkatasalam, V. Bakyalakshmi
DOI: 10.17148/IJARCCE.2015.41208
Abstract: The group nearest neighbor query uses group points to provide the optimal solution for the nearest group point in the dataset. The novel type of spatial keyword query called Group Nearest Group (GNG) query will be used to optimize the query. Given a data point set D, a query point set Q and an integer k, the Group Nearest Group query finds a subset of points from D, ? (|?| = k), such that the total distance from all points in Q to the nearest point in ? is no greater than any other subset of points in D. Each nearest point obtained matches at least one of the query keywords. For processing this query several algorithms are proposed. The processing of GNG query consists of Exhaustive Hierarchical Combination algorithm and Subset Hierarchical Refinement algorithm. A group nearest neighbor (GNN) query returns the location of a meeting place that minimizes the aggregate distance from a spread out group of users; for example, a group of users can ask for a restaurant that minimizes the total travel distance from them. The duplicates in the dataset can be identified to improve the search query from the given data. The dataset can be analyzed to find out the duplicates in the data set. The applications of group query come from location-based services, e.g., finding a meeting venue for a group of people such that the traveling distances is minimized. In order to prune large portion of query objects reducing the number of node accesses, this extensive experiments on spatial databases is effective in reducing group query response time which exhibits good scalability with the query objects and the number of query keywords.
Keywords: Boolean spatial keyword query, reverse k Boolean spatial keyword query, road network, query processing.
Abstract
Instruments DNA Registration and Calibration
Ahmed Sabr
DOI: 10.17148/IJARCCE.2015.41209
Abstract: In this paper, image analysis and processing has been discussed. Image analysis involves the manipulation of the patient�s 3D model to extract relevant information from the data. Computer assisted surgery (CAS) represents a surgical concept and set of methods, that use computer technology, for pre-surgical planning and for guiding or performing surgical interventions.
Keywords: DNA, MRI, Registration, CT, Calibration.
Abstract
Performance Analysis of Adaptive Modulation and Coding Schemes on OFDMA Physical Layer
Sayawu Yakubu Diaba, Theophilus Anafo, Zuberu Abdul-Rahman
DOI: 10.17148/IJARCCE.2015.41210
Abstract: The recent demand for higher data rate services from wireless network users is overwhelming. Social media influx as well as the proliferation of broadband enabled smart-phones, tablet computers and other newly improved wireless devices has erupted a new trend in wireless network traffic need where average capacity and speed is no longer appreciable. In order to cope with this trend in traffic requirement, wireless network operators are considering a gradual rollover of an existing third generation (3G) network to a fourth generation (4G) network with orthogonal frequency division multiple access (OFDMA) based technologies such as Fourth Generation Long Term Evolution (4G LTE) and Worldwide Interoperability for Microwave Access (WiMAX). This paper is devoted to the performance evaluation of Adaptive Modulation and Coding (AMC) in downlink of an orthogonal frequency division multiple access (OFDMA) network, considering Partial Usage of Sub-channels (PUSC). By using MATLAB Simulink and Origin 61, the performance of Bit Error Rate (BER) and Spectral Efficiency in two channel environments, i.e. non-fading and fading channels were examined. Results suggest better performance for AMC over individual MCS in all channel environments. Moreover, non-fading Addictive White Gaussian Noise (AWGN) channels significantly perform better than fading (Rayleigh and Rician) channels. In Rician channel environment, however, flat fading Rician channels perform better than frequency selective Rician channel which interestingly records a degraded performance against Rayleigh channels.
Keywords: third generation (3G), fourth generation (4G), Orthogonal Frequency Division Multiple Access (OFDMA), Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX), Bit Error Rate (BER), Adaptive Modulation and Coding (AMC), Partial Usage of Sub-channels (PUSC), Rayleigh channels and Rician channels
Abstract
A Survey on Mechanism of Data Hiding in Audio-Video using Anti Forensics Technique for Data Authentication
Pallavi Phartade, Vandana Nawale
DOI: 10.17148/IJARCCE.2015.41211
Abstract: Steganography is the mechanism of hiding any secret information like password, textand image, audio behind original cover file. Original message is translate into cipher text by using secret key and then hidden into the LSB of original image. The updated system provides audio-video cryptostegnography which is the combination of image steganography and audio steganography using Forensics Technique as a tool to authentication of data. Security is most important issue in digital communication. Data security means protective digital privacy measures that are applied to prevent unauthorized access to computers, huge databases and online data it is also protects data from corruption. Security is most vital issue in digital communication. Cryptography and steganography are two popular techniques available to provide security. Steganography focuses on hiding information in such a way that the message is undetectable for outsiders and only appears to the sender and intended recipient. It is vital tool that allows covert transmission of information over and over communications channel. Steganography is a most popular technique which is used to hide the message and prevent the detection of hidden message in a systematic manner. Various modern techniques of steganography are: a) Video Steganography b)Audio Steganography Audio Video stegnography is a latest stegnography of hiding information in such a way that the unwanted people may not permissible the information in any manner. The updated new method is to hide secret information and image behind the audio and video file respectively.
Keywords: Audio Stegnography, Video Stegnography, Data hiding, Stegnography, Histogram, Computer Forencies, Authentication.
Abstract
Finite State Machine as a Designing Tool for Web Based Transactional Systems
Binayak Panda, Dr. Nilambar Sethi
DOI: 10.17148/IJARCCE.2015.41212
Abstract: Web based systems are highly useful for extending business as well as information sharing. Many platforms and technologies available for development of Web based systems. For a successful Web based system the design plays a vital role where the business logic is to be realised. Many traditional design approaches available, among which choosing the appropriate one is a challenge. Many Web based systems are developed in a hit and trail manner to meet the business objective. But having a proper design helps in future enhancement and systematic understanding of the system. In this paper Finite Automaton has been chosen as a design approach for Web based transactional systems which are functionally different than Web based informative systems. Finite automaton is an oldest and efficient mechanism for modelling any mathematical problem. Software development or Web based development can be visualized as s mathematical problem hence finite automaton can be used as a design approach for developing Web based Systems. In this paper a comparison on key features has been carried out with other tradition design approaches to justify the Finite automaton is equally efficient for designing a software or Web based system.
Keywords: Finite Automaton a design approach for Web based System, Web based System development, Web based transactional System development, Web based Informative system, and Design of Web based system.
Abstract
3D Barcode Modulation Method for Data Transmission in Mobile Devices
Navale Puja Vitthal, Erande Swati Govind, Badhe Priyanka Vasant
DOI: 10.17148/IJARCCE.2015.41213
Abstract: The idea of 3-D scanner tags is of awesome importance for use in remote information transmission between handheld electronic gadgets. In a normal setup, any record on a mobile phone, for instance, can be exchanged to a second wireless through a progression of pictures on the LCD which are then caught and decoded through the second's camera PDA. In this study, another approach for information tweak in 3-D standardized tags is presented, and its execution is assessed in examination to other standard routines for scanner tag adjustment. In this new approach, orthogonal recurrence division multiplexing (OFDM) adjustment is utilized together with differential stage movement keying (DPSK) over contiguous recurrence area components. A particular point of this study is to build up a framework that is demonstrated tolerant to camera developments, picture obscure, and light spillage inside of neighboring pixels of a LCD.
Keywords: Barcode, data transfer, differential phase shift keying, orthogonal frequency-division multiplexing (OFDM) modulation.
Abstract
A New Approach to Efficient Medical Image Fusion
Urba Ziyauddin Siddiqui, P.R Thorat
DOI: 10.17148/IJARCCE.2015.41214
Abstract: Image fusion is a process of blending the complementary as well as the common features of a set of images, to generate a resultant image with superior information content in terms of subjective as well as objective analysis point of view. The ultimate aim of medical image fusion can be broadly defined as the combination of visual information contained in any number of input medical images into a single fused image without introducing distortion or information loss. This paper gives a the most efficient method to serve the fusion purpose. The objective of this proposed method is to develop a novel image fusion algorithm and its applications in biomedical field such as in image-guided surgery and radiotherapy with efficient and true diagnosis.
Keywords: Computerized tomography Scan(CT), Magnetic resonance imaging(MRI), Positron emission tomography(PET), Discrete wavelet(DWT), Stationary wavelet(SWT), Dual-tree complex wavelet(DTCWT), Contourlet (CT), Principal Component Analyses(PCA), Pulse coupled neural network(PCNN), Nonsubsampled Contourlet (NSCT), Shearlet transform(SHLT).
Abstract
An Overview of Frame based Recovery of Corrupted Video files for Forensic Purpose
Uzma Siddiqui , P.R Thorat, A.B Diggikar
DOI: 10.17148/IJARCCE.2015.41215
Abstract: The idea behind this technique is to recover the damaged or corrupted video file for forensic purposes. The concept used in this process is to recover the damaged or corrupted video using frame structure. The previous techniques were used to recover the corrupted or damaged video using file structure .The proposed technique addresses how to extract video frames from a part of a video to be restored and recover the corrupted or damaged video and then how to connect extracted video frames together according to the codec specifications. Experiment results shows that the proposed technique successfully restores corrupted or damaged video files.
Keywords: Video file restoration, frame-based recovery, video file specifications, corrupted video data.
Abstract
A Review of Hiding of Data in Mosaic Images by Reversible Color Transformations
Ms. Priyanka Nehete, Prof. Pankaj Salunkhe, Prof. Nilesh Pawar
DOI: 10.17148/IJARCCE.2015.41216
Abstract: Images are transmitted through the internet for various purposes, such as confidential enterprise archives, document storage systems, medical imaging systems, and military applications. These images may contain secret or confidential information since it should be protected from leakage during transmissions. An approach for secure image transmission is needed, which is to transform a secret image into a meaningful Secret Fragment Mosaic Image with size almost same and looking similar to the preselected target image. The mosaic image is the outcome of arranging of the block fragments of a secret image in a way so as to disguise the other image called the target image. The mosaic image looks similar to a randomly selected target image. It is used for hiding of the secret image by color transforming their characteristics similar to the blocks of the target image. The appropriate information is embedded into the mosaic image for the recovery of the transmitted secret image.
Keywords: Color transformation, data hiding, mosaic image, covert communication.
Abstract
A Survey on Efficient Mechanism of Data Embedding using Reversible Texture Synthesis
Payal T. Chaskar, Prof. Arati Dandavate
DOI: 10.17148/IJARCCE.2015.41217
Abstract: An updated steganographic method using reversible texture synthesis is implemented in this paper. A texture synthesis mechanism re-samples a smaller texture image which synthesizes a new texture image with a similar local appearance and arbitrary size. Along with reversible texture synthesis mechanism, reserving room method is utilized to embed additional data, which is the highlight of this paper. Traditional RDH algorithm is implemented for reserving room method. Data hider can reversibly embed additional data in stegosynthetic texture image. The modified method can achieve real reversibility, that is, texture image recovery and data extraction cause no error. Stenography is to hide the secret information and data within the cover image. The word stegno specify �covered �and graph means �writing�, therefore it used to write the secret data on cover image. The steg analytic Algorithm deal with the source texture image and embeds secret messages through the mechanism of texture synthesis. We weave the texture synthesis Mechanism into stenography to conceal secret message that permits extracting secret images and source texture synthesis from the stego synthetic structure. In video texture synthesis is the Mechanism of providing continuous and infinitely varying stream of frames, which. Embedding is a technique to embed the secret images into cover images. Images data hiding is a technique for increasing the embedding efficiently .In the traditional method, secret or valuable information is hidden in cover image. In this project, steganalytic algorithm using reversible texture synthesis method is implemented d to resample the smaller texture image and which synthesis a new texture image with a similar local appearance and arbitrary size. Our plays a vital role in computer vision and graphics. However, it still remains a challenging problem to generate high-quality synthesis results. It is difficult to find the continuous changing frames in video texture synthesis. Histogram shifting utilizes reversible data hiding for embedding the information. In line based cubism like image segmentation is used to embed the data, but we implement reversible texture synthesis mechanism for embedding the data which improves the data embedding without any distortion technique.
Keywords: Texture synthesis, Stego image, cover image, optimal value transfer, Data embedding, Reversible data hiding and Texture synthesis.
Abstract
Reducing Consumption of Power in Peer to Peer System with Load Balancing of Processes
Mr. Sumit V. Dusane, Mr. Pranay Chauhan
DOI: 10.17148/IJARCCE.2015.41218
Abstract: As we know today in the world information in which sending and receiving the information is popular and which is based on peer to peer system. In this type every computer in the network acts as the peer i.e. node and there is no centralized server in the peer to peer system. As we know the required data is distributed among the different sites and servers so many clients are trying to access that data concurrently. As simultaneous requests arises at the server its performance deviates due to heavy load. Information Systems are composed of various types of computers interconnected in network. In information system, traditional client-server model move towards P2P model. P2P systems are fully distributed i.e. absence of centralized coordinator. P2P system is another type of information system which is composed of huge number of peer computers. There is need to reduce power consumption of server. Here, it is getting more significant to discuss how to reduce power consumption of server in P2P systems. In this paper we presented how proposed algorithm reduces the power consumption of server in P2P system and how it is more efficient than Round robin algorithm and Consumption Laxity Based algorithm. Proposed Algorithm overcomes all drawbacks of Round robin and Consumption Laxity Based algorithm.
Keywords: Round Robin, Consumption Laxity Based.
Abstract
Performance Measurement using CASE Expression over PIVOT Operator in SQL Server 2008 r2
Mr. Sudhakar Panigrahy, Mr. Pragnyaban Mishra
DOI: 10.17148/IJARCCE.2015.41219
Abstract: Data aggregation using PIVOT operator is useful in many aspects by converting data from rows into column as per the common values. The execution can be faster by using CASE expression in SQL Server 2008 r2. So, CASE expression can be used in the place of PIVOT operator. Some of the major issues in PIVOT operator are the grouping elements can�t be defined explicitly. Thus, when database schema changes by adding new column in the existing tables results NULL value in the report. Getting row and column wise aggregated value not possible with PIVOT operator. At a time only one grouping function can be used i.e Different grouping functions can�t be applied in different pivot columns. These problems can be solved by using CASE expression. In this paper it is explained the difficulties observed in PIVOT operator and solved using CASE Expression.
Keywords: SQL Server 2008 r2, CASE expression, NULL value, PIVOT operator.
Abstract
Simulative Analysis of Histogram Equalization Techniques for Gray Scale Images
Karamjot Kaur, Jyoti Saxena and Sukhjinder Singh
DOI: 10.17148/IJARCCE.2015.41220
Abstract: Histogram equalization techniques are used for enhancing images. The aim of an image enhancement is to improve the quality of the image for better visualization. This paper presents implementation of three methods of histogram equalization namely BHE, DHE and BPDFHE taking a common dataset using MATLAB platform. Moreover the performance of above mentioned techniques has been evaluated on the basis of visual results and objective image quality parameters namely PSNR, RMSE, AD, SC and MD. A comparative analysis has been carried out and it has been observed that for gray level images, BHE and DHE introduce impractical and improbable effects in the enhanced images. However the BPDFHE technique overcomes this limitation by fuzzifying the weight of histogram region to avoid contouring.
Keywords: Histogram Equalization, Image Enhancement, MD, PSNR, SC, RMSE and Visual Quality.
Abstract
A Novel Approach to Enhance the Large Scale Computing System for Handling Distributed Data using Hadoop Framework
Ms. J. Monica Msc, Mr. P.Ponsekar Msc, MPhil.,
DOI: 10.17148/IJARCCE.2015.41221
Abstract: Data analysis is an important functionality in Big Data processing and computing which allows a huge amount of data to be processed over very large clusters. Map Reduce is recognized as a popular way to handle data in the data intensive environment due to its excellent scalability and good fault tolerance features. Cost analysis shows that the user server cost still dominates the total cost of high scale data centers or cloud systems. Heterogeneous workloads are the problems in large scale data centers. Data analysis on huge datasets is processed by proposing an analysis framework for the task and resource provisioning which reduce the peak resource. Building indexes in data centres for analyzing the data. The Map reduce model uses effective processing to process the datasets in hybrid structure. It reduces the server cost on data centre. This process establishes hadoop distributed file system and parallel database for processing and indexing. An analysis framework is constructed through PSO, which incorporates parallel database and handles workloads.
Keywords: PSO, Map Reduce, Hadoop Framework, Clusters.
Abstract
A Survey on Privacy Preservation for Navigation in Multiple Roadside Unit using VANET
Ms.K.Priyadharshini, Msc, Ms.J.Savitha Msc, MPhil.,
DOI: 10.17148/IJARCCE.2015.41222
Abstract: VANET is collected of vehicles and roadside infrastructure units (RSUs). Vehicles are equipped with wireless communication devices, which are called On-Board Units (OBUs). The wireless communication devices enable vehicles to exchange traffic related information with each other and with RSUs. VANETs raise many security and privacy concerns at the same time. Malicious users can take advantage of VANET and disturb the whole system. In the previous researchers introduced many techniques and methods, Road information collected to provide navigation service to drivers. Based on the destination and the current location of the driver the system can automatically search for a route that yields minimum traveling delay in a distributed manner using the online information of the road condition. In this survey discuss various VANET security techniques and algorithms to detect and prevent the malicious users in the roadways.
Keywords: VANET, RSUs, OBUs, GPS, TMC, TACKS.
Abstract
Secure Transaction for Cross-Cloud and Service Composition for Big Data Application using HIRESOME-II
M.Padmavathy, Dr.S.Babu
DOI: 10.17148/IJARCCE.2015.41223
Abstract: Cloud computing promises a scalable infrastructure for processing big data applications such as medical data analysis. Cross-cloud service composition provides a concrete approach capable for large-scale big data processing. However, the complexity of potential compositions of cloud services calls for new composition and aggregation methods, especially when some private clouds refuse to disclose all details of their service transaction records due to business privacy concerns in cross-cloud scenarios. Moreover, the credibility of cross-clouds and on-line service compositions will become suspicional, if a cloud fails to deliver its services according to its ��promised�� quality. In view of these challenges, we propose a privacy-aware cross-cloud service composition method, named HireSome-II (History record-based Service optimization method) based on its previous basic version HireSome-I. In this paper provides the review for comparing various QoS to secure cloud.
Keywords: Cloud, Service Composition, QoS, Big Data, Transaction History Records.
Abstract
Enhancement of Isolation and Gain of Antenna Using Slotted Meander Line Resonator for WiMAX Applications
Pawan Kumar, Lakshmi Raj Singh, D.K. Srivastava
DOI: 10.17148/IJARCCE.2015.41224
Abstract: In this paper, method of moments based IE3D software is used to design a Microstrip Patch Antenna with Slotted meander line resonators. The aim of the paper is to design a Microstrip Patch antenna with slotted meander line resonator to enhance the isolation and gain of microstrip patch antenna. Microstrip patch antennas with mutual coupling are proposed for WiMAX applications. To reduce mutual coupling between patch antennas using different methods like Split Ring Resonators (SRR), Slotted Meander Line Resonators (SMLR), Wave Guided Metamaterials (WGMTM) structures are designed for WiMAX applications. The antenna is designed by applying FR4 substrate of thickness 1.6mm with permittivity 4.4 and obtained excellent isolation and improvement in gain.
Keywords: Microstrip patch antenna, SMLR, design, bandwidth, gain, efficiency.
Abstract
Design and Analysis of Triple Band Inverted T-shaped Microstrip Patch Antenna
Lakshmi Raj Singh, Pawan Kumar, D.K. Srivastava
DOI: 10.17148/IJARCCE.2015.41225
Abstract: The aim of the paper is to design a triple band inverted T-shaped microstrip patch antenna. In this paper, method of moments based IE3D software is used to design a Triple Band inverted T shaped Microstrip Patch Antenna. The proposed antenna made from a two strip patch which made a shape of inverted T type so this antenna named as inverted T shaped MPA. This antenna operated at three frequency band with resonance frequencies 1.91 GHz (with a bandwidth of 19.63%), 2.256 GHz (with a bandwidth of 28.97%) and 5.676 GHz (with a bandwidth of 7.03%). So this antenna can be used for both mobile and satellite communication purpose. The simulated results for various parameters like radiation patterns, gain, reflection coefficient or return loss, VSWR and radiation efficiency of proposed antenna are also calculated with simulation software IE3D.
Keywords: Microstrip Patch Antenna, Inverted T-shape, Multiband, Return loss, Efficiency, Gain.
Abstract
Design of a Modified L Slot CPW Feed Multiband Antenna for Wireless Application
Juin Acharjee and Kaushik Mandal
DOI: 10.17148/IJARCCE.2015.41226
Abstract: In this paper a new multiband compact CPW feed complementary antenna has been proposed which is suitable for wireless communication. This multiband characteristic is achieved with the help of one L-shaped slot on the radiating patch. By controlling the position and length of the slot multiband position can be varied. The size of the antenna is 27.4�23.6 mm2 and it is printed on FR4 EPOXY substrate with height of 1.6 mm, dielectric constant 4.4. Simulation result shows the proposed antenna exhibits a good impedance matching over a wide frequency range of 2.41to2.46GHz and 4.79 GHz to 6.67 GHz with a gain of 1.5dBi and 2.6dBi respectively. This proposed antenna produces good performance, and small size.
Keywords: WLAN, CPW Feed, Microstrip Antenna.
Abstract
Intelligent Strategy of Task Scheduling in Cloud Computing using Swarm Optimization with Griewangk’s function
Ms. R. Dhivya, Mrs. C. Senbagavalli Msc, MPhil
DOI: 10.17148/IJARCCE.2015.41227
Abstract: The cloud computing has become a popular platform for scientific applications. Cloud computing is a term used to describe a new class of network based computing that takes place over the internet. It offers dynamic flexible resource allocation for reliable and guaranteed services in pay-as-you-use manner to cloud service users. Scheduling the job is most important task in cloud computing environment. The goal of task scheduling is to achieve high system throughput, resource utilization and response time. In a cloud environment, traditional scheduling methods are infeasible owing to its properties - dynamical, distributed, and sharable. The aim of resource allocation to tasks is for all services to meet their performance targets. Several jobs demand different resources while running simultaneously. It is important for efficient working of cloud to balance these jobs on appropriate resources for optimal performance, and various task parameters need to be considered for proper scheduling. Therefore, there is a need for better algorithms to schedule tasks on these systems. This research work focus on Griewangk�s functions task Optimization Algorithm. This task scheduling algorithm is done under cloud computing environment based on life cycle of bird called cuckoo. The Cuckoo Optimization Algorithm is evaluated by using the Griewangk�s function with Rastrigin function. By using this function, the best task is founded among the entire given task.
Keywords: Cloud Computing, Cuckoo Optimization Algorithm, Griewangk�s functions, Swarm Optimization.
Abstract
Effectiveness Estimation of Object Oriented Software: A Revisit
Pooja Gupta, Dr. Namrata Dhanda
DOI: 10.17148/IJARCCE.2015.41228
Abstract: Effectiveness has always been an indefinable concept. Its truthful measurement or assessment is a complex exercise for the reason that of the various potential factors influencing effectiveness. It has been find out from systematic literature review that area researchers, quality controllers and industry personnel had made significant efforts to estimate software effectiveness but at the source code level. Calculating effectiveness at source code level directs to late arrival of desired information. An exact measure of software quality fully depends on effectiveness estimation. This paper shows the results of a systematic literature review conducted to collect related evidence on effectiveness estimation of object oriented software. In this revisit paper, our objective is to find the known complete and comprehensive software effectiveness estimation model and related framework for estimating the effectiveness of object oriented software at an initial stage of development life cycle.
Keywords: Effectiveness, Quality, Object Oriented properties, Quality Factors.
Abstract
Secured and Authenticated Anonymous Data Access on Cloud in MANET
Miss. Pooja D.Bardiya, Prof. P.L. Ramteke
DOI: 10.17148/IJARCCE.2015.41229
Abstract: This Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client Mobile Cloud Computing usually consists of front-end users who possess mobile devices and back-end cloud servers During the period between uploading and downloading files (data), the privacy and integrity of files need to be guaranteed. Access control in clouds is gaining attention because it is Important that only authorized users have access to valid Service. Attribute-based access control (ABAC) in which users are given attributes, and the data has attached access policy. Only users with valid set of attributes, satisfying the access policy, can access the data. This research paper consists of the security of ABE and ABS Algorithm. Using ABE, the records are encrypted under some access policy and stored in the cloud. Users are given sets of attributes and corresponding keys. Only when the users have matching set of attributes, can they decrypt the information stored in the cloud. In ABS, users have a claim predicate associated with a message. The claim predicate helps to identify the user as an authorized one, without revealing its identity. Other users or the cloud can verify the user and the validity of the message stored. ABS can be combined with ABE to achieve authenticated access control without disclosing the identity of the user to the cloud. There are two type of authentication provided that is from trustee side in terms of token and KDC in terms of skey and pkey.
Keywords: Mobile Cloud Computing, MANET, Attribute based Encryption (ABE), Attribute Based Signature (ABS), Proposed Architecture.
Abstract
Predictive Analytics in Higher Education
Shankar M. Patil
DOI: 10.17148/IJARCCE.2015.41230
Abstract: Higher education institutions have multiple technologic subsystems for administrative, pedagogical management, and quality purposes, which gather an immense volume of data from various sources and which do not analyzed. The domain of the analytic performances in education emerges from the need to aggregate multiple sources of data, which the selected information will make it possible to understand reality and optimize management actions. Using predictive analytics has several key benefits, including better future business performance, more insight into business dynamics, and optimum use of available data. Higher education has access to realms of data which can be used to improve decision making.
Keywords: Predictive Analytics, Higher Education, Business Dynamics, Decision Making.
Abstract
An Approach for Hiding the Sensitive High Utility Itemsets without the Information Loss
Ms. M. Kanchana, Mrs. C. Senbagavalli Msc, MPhil
DOI: 10.17148/IJARCCE.2015.41231
Abstract:
Abstract: The Association Rule Mining is the traditional mining technique which identifies the frequent itemsets from the databases and this technique generates the rules by considering the each items. The traditional association rule mining fails to obtain the infrequent itemsets with higher profit. Since association rule mining technique treats all the items in the database equally by considering only the presence of items within the transaction. The above problem can be solved using the Utility Mining technique. The Utility Mining technique identifies the product combinations with high profit but low frequency itemsets in the transactional database. Hiding High Utility Itemsets (HUIs) is the main challenges faced in the utility mining. The proposed MHIS algorithm computes the sensitive itemsets by utilizing the user defined threshold value. In order to hide the sensitive itemsets, the frequency value of the itemsets is changed. If the utility values of the items are same, the algorithm selects the accurate items and then the frequency values of the selected items are modified. The proposed algorithm MHIS reduces the computational complexity as well as improves the hiding performance of the itemsets.
Keywords: Hiding High Utility Itemsets (HUIs), MHIS, Utility Mining technique, Association Rule Mining (ARM).
Abstract
Retrieval of Emergency Information of Accident Victim by Using 2D Dynamic QR Code via Cloud Database
Monika Singh, Prof. G.S. Mate, Shrishti Chaturvedi, Balraj Snehi
DOI: 10.17148/IJARCCE.2015.41232
Abstract: As cloud computing based technology is growing, so is the number of services offered over the cloud. Due to this rapid growth in cloud based technology, service providers must be able to deploycloud service environments very quickly and very easily. Ezilla toolkit will be used for private cloud creation. Quick Response (QR) codes seem to appear everywhere these days. Using the QR codes is one of the most intriguing ways of digitally connecting consumers to the internet via mobile phones since the mobile phones have become a basic necessity thing of everyone. For creating QR codes, the admin will enter text into a web browser and will get the QR code generated. While QR codes have many advantages that make them very popular, there are several security issues and risks that are associated with them. Running malicious code, stealing users� sensitive information and violating their privacy and identity theft are some typical security risks that a user might be subject to in the background while he/she is just reading the QR code in the foreground. A security system for QR codes that guarantees both users and generators security concerns will be implemented.
Keywords: 2D dynamic QR code, Quick Response Code, TTP, GPU, Cloud database, GPR, URL, EzillaToolkit, QRStuff, Norton Snap QR Reader.
Abstract
Customer Zodiac – A Way to Understand Customer Pain Points to Improve Customer Service Satisfaction
Amit Ganesh Upadhye, A. C. Lomte
DOI: 10.17148/IJARCCE.2015.41233
Abstract: Now days customer satisfaction has become crucial aspect of success of any product or organization as it directly impacts if customer would keep using same product or choose to an alternative. Most of service industries focus on providing best service and support for products and concentrates on time to answer customer concerns, having correct resources like domain experts. Considering customer support engineers its hard to sense nature of customer for avoiding dissatisfaction, its always needed to relay on static guidelines followed by organization like time to respond, keeping up with domain knowledge, communication skills. The goal of this project is to provide guidelines on each support case by understanding customer interaction using historical data. The historical data of customer would help to understand which things are important to customer, what he or she likes or dislikes, what kind of interaction is mostly preferred by customer, does he have problem with any specific product. By applying data mining techniques on historical data of customer interaction with customer support it would help to understand these trends which should help to improve customer satisfaction.
Keywords: Artificial Neural Network, Data Mining, Machine Learning.
Abstract
Cluster Based Subset Selection Methodology Using FAST Decrees
S. Surya
DOI: 10.17148/IJARCCE.2015.41234
Abstract: Feature selection process plays a vital role in data mining domain, which engrosses recognizing a subset of the good number of practical features that constructs well-matched outcomes as the innovative complete deposit of features. In this paper the algorithm called Feature Selection could be experimented by means of both competence and usefulness. At the same time as the competence apprehensions the time obligatory to come across a subset of features, the usefulness is associated to the eminence of the subset of features. An innovative algorithm called a �Fast Cluster Based Feature Selection (FAST)� is proposed and the experimental results show that FAST not only produces lesser subsets of features but also get better the presentations of the classifiers.
Keywords: Feature Extraction, Subset, Clusters, FAST, Filtering Process.
Abstract
Twin Based Face Differentiation and Retrieval from a Database
Nishu, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.41235
Abstract: In face recognition technology, facial marks identification method is one of the unique facial identification tasks using soft biometrics. Also facial marks information can enhance the face matching score to improve the face recognition performance. As numbers of folk apply their face with cosmetic items.Some of the facial marks are invisible from their faces. Iris recognition is the most accurate biometrics which received increasing attention in departments which require high security. In this paper, we make a comparative study of performance of image transforms using principle of component analysis (PCA).The main aim of this paper is to show that how can we get better overall accuracy than the existing methods of feature extraction of iris recognition system.
Keywords: Face recognition, PCA, edge detection, Iris recognition, edge detection, CBIR, Facial marks detection and differentiating twins.
Abstract
Wireless Network Security Framework for Mobile Sink Attack
Mr. Kaustubh K. Markande, Ms. Amruta Ammune
DOI: 10.17148/IJARCCE.2015.41236
Abstract: In wireless sensor network sensor node are prohibits to computational resource and always created in hash unwanted and unattended environment. Security concern comes into picture in the form of authorization and authentication of data in wireless network. Development of wireless Sensor network has many applications such as military sensing and monitoring, health monitoring and traffic monitoring. Mobile sink is play a vital role in the wireless sensor network for data accumulation, localize, sensor programming and revoking compromising sensor node. Authentication problem and pair wise key establishment problem in wireless sensor network with mobile sink. This Framework, two separate key pool are used one for the sink node access and one for the pair wise key establishment between the between the sensor nodes for reducing attack on the network. We are used a stationary access network for authentication mechanism provide in sensor node and stationary access node as a Access point. This framework provides higher network resilience to mobile sink replication attack as compared to polynomial pool based scheme.
Keywords: Wireless Sensor Network (WSN), Mobile Sinks (Ms), Replication Attack and Polynomial Pool.
Abstract
Location tracking using Google Cloud Messaging on Android
Prof. C. J. Shelke, Ms. Grishma R. Bhokare
DOI: 10.17148/IJARCCE.2015.41237
Abstract: Everyone in this world needed to know where is the family member and the most common way is �Make A Call To Each One �Is this a feasible way of doing ? What if someone is busy, or driving a vehicle, or he/she not able to take that call right now, so in that case what will you do drop a message (WhatsAPP) is this what you thinking about then again think about it. You call a person he/she not taking your call then you drop a message to theme again �NO REPLY �but you desperately want to know his/her current location and you again and again call him or message but many times we are in some situation in which we are not able to reply that call/message and we also think that the person should know where am i. Today many peoples have smartphone running latest android operating system which can be useful to track them and to know their locations. In contrast to traditional solutions, where the calling to the person and asking for their locations is not a feasible and reliable solution. Aim of this application is to track the members by person sitting at home. This paper presents solution to track the locations and communicate with the members using Google MAPs API, GCM (Google Cloud Messaging) and Android Operating System.
Keywords: Track; Google Maps; Location; GCM (Google Cloud Messaging), Android.
Abstract
Pilgrim Tracking and Health Monitoring System Using WSN
Supriya Suryawanshi, Prof. Shivani Pandita
DOI: 10.17148/IJARCCE.2015.41238
Abstract: In India, every year about thousands of pilgrims go to different religious places and participate in pilgrimage to offer prayers. As the count of pilgrims taking part in pilgrimage is random and high, it is very difficult for managing authorities to track the movement and location of pilgrims as they reach to any one destination point. In order to avoid the mishaps/ accidents due to medical emergencies and to discover the exact location of person in need of any help to managing authorities, we are implementing the system which relies on a Wireless Sensor Network (WSN). WSN are consists of distributed autonomous sensors to monitor physical conditions such as temperature, sound, pressure etc. These parameters are sensed and cooperatively transmitted through wireless network to main location. Each pilgrim is equipped with a mobile unit which consists of micro-controller, GPS, GSM module, LCD, heartbeat sensor, temperature sensor, keypad and battery. Server unit will initiate and transmit the query to mobile unit. On receiving the query by Mobile unit, it will transmit its UID, latitude, longitude and a time stamp as a reply of received query to the server. As soon as server receives the reply transmitted by mobile unit, it will update the data of respective pilgrim in its storage memory and re-transmit the information about the individual to their respective relative and Guardian. As the mobile unit held by pilgrim is embedded with keypad, the push buttons provided on keypads can be used to generate and transmit the alarm/message in case of any emergency or difficulty faced by the pilgrim.
Keywords: GPS, Heart Beat Sensor, Temperature Sensor.
Abstract
Review on Novel Approach for Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
Ujwala M. Halde, Prof. Nilesh R. Wankhade
DOI: 10.17148/IJARCCE.2015.41239
Abstract: Current survey on overlay networks has revealed that user-perceived network performance could be improved by an overlay routing mechanism. In the massive distributed simulation, the way in which constituent parts are interrelated or arranged of the overlay network can�t continuously and promptly adjust to route the traffic to reduce the overall traffic cost. Overlay routing has been suggested over the last few years as powerful approach to accomplish definite routing attributes, besides going with lengthy and exhausting method of standardization and universal deployment of a new routing protocol. To Develop Internet traffic route over good quality is an assurance to succeed greater-quality streaming, Overlay network is proposed. Deploying overlay routing requires the placement and maintenance of overlay infrastructure rise to the optimization problems like catch a least group of overlay nodes such that the needed sending the way properties are pleased. It is NP-hard and derives a nontrivial approximation algorithm for it, where the approximation ratio depends on specific properties of the problem at hand. [1] In this Review Paper I examine the practical aspects of the scheme by evaluating the gain one can get over several real scenarios.
Keywords: Overlay routing, Resource Allocation, Network Nodes.
Abstract
A Review on Confidentiality and Authentication in Content Based Publish/Subscribe System
Nileema R. Hiray, Prof. K. N. Shedge
DOI: 10.17148/IJARCCE.2015.41240
Abstract: Publish/Subscribe System is an emerging communication model which runs in distributed environment. It is a messaging system, where the messages/events are published by publishers and received by subscribers based on their subscription. In the existing messaging systems, broker acts as a middleware in between two parties and all the communication is done through the broker. In this case, the broker failure can be the bottleneck of whole system. To overcome this drawback, there is a system proposed which uses brokerless architecture for the content based publish/subscribe system. In publish/subscribe system, publisher and subscriber are loosely coupled and do not keep trust on each other. So, the basic security mechanisms like authentication and confidentiality are difficult to achieve and hence, a challenging task. The proposed system provides the novel approach to achieve authentication and confidentiality in a brokerless content based publish/subscribe system using the identity based encryption.
Keywords: Publish/subscribe, Content-based, Broker-less, Publisher, Subscriber, Security, Identity based encryption.
Abstract
Analysis of Dynamic Traffic Patterns on WDM Optical Networks for Different Topologies Using RWA Algorithm
Jashwant Samar, Paramdeep Singh, Yogendra Kumar Jain
DOI: 10.17148/IJARCCE.2015.41241
Abstract: In this technologically advanced world where capabilities of the communicating devices and transmission media is increasing. Fiber optic cable has played an important role. Itutilizesthis, high capability media of transmission by performing multiplexing. Wavelength Division Multiplexing (WDM) is one such technology used in optical networks. Every single link in optical network has the capability to transmit gigabytes of data. Using WDM, data of multiple users is sent simultaneously through the same link by assigning distinct wavelengths. Such algorithm is referred as Routing and Wavelength Assignment Algorithm (RWA). In this paper, all the optical network topologies are simulated using MATPLAN WDM tool based on MATPLAN. All such topologies are analyzed for different dynamic traffic loads. Comparison between all the topologies is performed on the basis of some governing parameters like message propagation delay, channel utilization, traffic handling capacity and others. It is found that mesh topology is better for high traffic but it is costly due to large number of links. So ring topology is found better in all aspects.
Keywords: Wavelength Division Multiplexing (WDM), Routing and Wavelength Assignment Algorithm (RWA), MATPLAN.
Abstract
An Automatic Monitoring and Swing the Baby Cradle for Infant Care
Rachana Palaskar, Shweta Pandey, Ashwini Telang, Akshada Wagh, Ramesh M. Kagalkar
DOI: 10.17148/IJARCCE.2015.41242
Abstract: This paper presents a brand new approach in coming up with associate automatic swinging cradle system. Proposed system helps the oldsters and nurses in taking care of their kid while not physical attention. We have design of a low cost automatic baby monitoring cradle that swings automatically when baby cries, for this it has a cry analysing system which detects the baby cry voice and accordingly the cradle swings till the baby stops crying. The system has inbuilt alarm that indicates two conditions � first when the mattress is wet, which is an important parameter to keep the baby in hygienic condition, second when baby does not stop crying with in a stipulated time, which intimated that baby needs attention. Here a video camera is positioned above the infant's cradle which captures video. This system may be in the main employed in hospitals, cr�ches and reception.
Keywords: Swinging, Wet sensor, Bassinet.
Abstract
Survey on Various Routing Approaches for Efficient Multimedia Transmission in CRSN
Gajanan Heddure, Asst. Prof. S.P. Pingat
DOI: 10.17148/IJARCCE.2015.41243
Abstract: Cognitive radio (CR) is a technology used for wireless networks to solve the problem of spectrum underutilization. It can be achieve by opportunistically exploiting portions of the spectrum temporarily by vacating licensed primary users. In this paper, we make a survey of traditional and recent routing protocols used for successful multimedia routing in Cognitive Radio Networks (CRNs). First we focus on how CRNs are different from other wireless networks and then list out the number of challenges and main issues of routing in Cognitive Radio Networks (CRNs). We then present different routing protocols that are specially designed for CRNs. The main aim in designing the routing protocols for the cognitive radio networks is the combine design of routing and spectrum management. Works on such issues have just started and are still in a progressing stage.
Keywords: CRSN, multimedia routing, routing protocol, spectrum, cross layer routing.
Abstract
RIPD: Route Information and Pothole Detection
Shrey Garg, Prof. G.S. Mate, Rohan Das, Shashank Tiple, Aswathi Panicker
DOI: 10.17148/IJARCCE.2015.41244
Abstract: The most common problems faced by a daily commuter are � waiting for public transport vehicle to arrive and experiencing unnecessary body fatigue due to poor road conditions such as potholes. In this paper, we have discussed a system which will overcome these problems. In this system, we have used Android OS based smartphones as they not only contain sensors like Accelerometer, GPS (Global Positioning System), GPRS (General Packet Radio Service) but also contain a wide range of other sensors which can be used for future applications. These smartphones will be integrated in public transport vehicles, with unique vehicle IDs, which will be continuously monitoring the road conditions while transmitting the real-time location co-ordinates of the vehicle that will be displayed on maps using Google Maps API.
Keywords: RIPD, GPS (Global Positioning System), GPRS (General Packet Radio Service), Google Maps API.
Abstract
Rezence – Wireless Charging Standard based on Magnetic Resonance
Pratik Dubal
DOI: 10.17148/IJARCCE.2015.41245
Abstract: With the advancement in Wireless Technology, Wireless Power Transfer (WPT) is one aspect of the field which has garnered immense recognition over the past couple of years. Different Wireless Charging Standards are based on different principles, namely Magnetic Induction and Magnetic Resonance. Rezence is an interface standard developed by the Alliance for Wireless Power (A4WP) which is based on the principle of Magnetic Resonance. Rezence purports itself to be the �next-generation� of wireless charging technology. Rezence systems are loosely-Coupled (LC) WPT systems. This enables Rezence systems to charge multiple devices of diverse sizes and power requirements. Owing to this, LC WPT systems are finding a way into the day-to-day mainstream application of charging portable consumer electronic devices. Thus, by means of this paper, I endeavour to illustrate the working of Rezence and its advantages over other WPT systems.
Keywords: Wireless charging, Rezence, A4WP, Wireless Power Transfer, Magnetic Resonance.
Abstract
ABRDBMS – A new Paradigm in Information Storage and Retrieval from RDBMS
Vishwas J Raval and Parth Shah
DOI: 10.17148/IJARCCE.2015.41246
Abstract: Database Systems have been ruling the Computer industry since its inception, especially Relational Database Management Systems. RDBMS� have dominated the database market all over the world. Object Oriented Database Management Systems have also been in existence since a decade or so but they have not been able to win the end-users confidence. Though RDBMS is most widely used database system across the globe but it has several limitations or issue like normalization, redundancy which have not been addressed completely. This research is one step in that direction and addresses the issues of RDBMS in order to reduce the redundancy up to major extent and eliminate the process of normalization in database designing.
Keywords: DBMS, RDBMS, Relations, Tables, Attributes, Primary Key, Foreign Key, normalization.
Abstract
k-ACO: Information Retrieval from Cloud using Optimum Data Migration based on K-Means & ACO
Vishwas Raval
DOI: 10.17148/IJARCCE.2015.41247
Abstract: Information retrieval is a tricky process, especially when the application contains large amount of data to be processed. This may require computing the indices of the records, processing of the records, placing the records at its proper place based on some hashing techniques and so on. Based on the type of processing required, the retrieval process can also be categorized into the data and compute intensive storage and/or retrieval. Data-intensive and compute intensive systems encompass terabytes to petabytes of data. They require massive storage and intensive computational power in order to execute complex queries and generate timely results. In addition to this, the pace at which the data is growing all over the world, adds fuel into the fire. Retrieving data from such a large volume is like finding a needle from a haystack. This becomes more difficult when the data is stored on clouds and when data is to be migrated from one place to another in order to fulfill a request or provide some service. Such migration requires optimum resource selection from the appropriate neighbor to provide the service to the end user. This paper proposes resource selection technique using K-means Clustering and Ant Colony Optimization for data intensive applications where data is to be migrated from one source to the other.
Keywords: Cloud Computing, VM Allocation, Virtual Machine, CloudSim, Clustering.
Abstract
Application of k-ACO for Compute Intensive Applications
Vishwas Raval
DOI: 10.17148/IJARCCE.2015.41248
Abstract: Compute intensive applications require lot of resources in the computation itself. In such situations, the information retrieval becomes trickier than the normal retrieval, especially when the application contains large amount of data to be processed. This may require computing the indices of the records, processing of the records, placing the records at its proper place based on some hashing techniques and so on. Based on the type of processing required, the retrieval process can also be categorized into the data and compute intensive storage and/or retrieval. Data-intensive and compute intensive systems encompass terabytes to petabytes of data. They require massive storage and intensive computational power in order to execute complex queries and generate timely results. In addition to this, the pace at which the data is growing all over the world, adds fuel into the fire. Retrieving data from such a large volume is like finding a needle from a haystack. This becomes more difficult when the data is stored on clouds and when data is to be migrated from one place to another in order to fulfill a request or provide some service. Such migration requires optimum resource selection from the appropriate neighbor to provide the service to the end user. This paper applies k-ACO for resource selection technique in compute intensive applications.
Keywords: Cloud Computing, VM Allocation, Virtual Machine, CloudSim, Clustering.
Abstract
Analysis of Removing Noise from Modeled ECG Signals by using Adaptive Noise Cancellation Model
Mounica Thodetil, Sree Lakshmi Gutta
DOI: 10.17148/IJARCCE.2015.41249
Abstract: In this paper an adaptive noise cancelation (ANC) model is presented to remove baseline wander (BW) noise from mathematically modeled ECG signals. The ANC model is designed to have a trade-off between the correlation properties of noise and reference signals. Matlab is used to simulate ECG signals artificially, to represent different sinus rhythms and leads of ECG waveform. Furthermore contamination of an important artifact (baseline wander) is simulated for normal ECG lead II, and then identified using LMS algorithm and its preconditioned versions: NLMS and TDLMS algorithms, to get denoised ECG signals. Experimental results are presented for a comparison of these adaptive algorithms, which shows preference of TDLMS algorithm and Fx LMS algorithm over the rest.
Keywords: Mathematical model, almost periodic, adaptive algorithm, adaptive noise canceler.
Abstract
Effective Evaluation of Transactional Data Items – A KDD Approach toward the customer rating
Mr. Pragnyaban Mishra, Mr. Sudhanshu Shekhar Bisoyi
DOI: 10.17148/IJARCCE.2015.41250
Abstract: In the Market Basket Analysis Frequent pattern mining plays the vital role in finding occurrence frequency of the items in a transactional dataset. By this frequent pattern mining analysis every retail company are aimed at maximizing the social relationship with the customer. If we use only frequent pattern mining then it generate a large amount of itemset which is very difficult to perform the in-memory analysis. So we have proposed a new approach of finding the item frequency by associating a weight or utility factor based upon the usage, demand etc. of the item. Finally the clustering techniques have been used to classify the customer from the final transactional dataset which will help to strengthen the social relationship between the retail organization and their customer.
Keywords: CRM, Min-Sup, Cluster of the customers, data mining.
Abstract
Mining Stream Data with Data Load Shedding Techniques using Self Adaptive Sliding Window Model
C.Nalini
DOI: 10.17148/IJARCCE.2015.41251
Abstract: Frequent patterns are patterns that appear frequently in a data set. Frequent pattern mining searches for recurring relationships in a given data set. It plays an important role in mining associations and correlation analysis among data, is an important data mining task. This work focuses on discovering frequent item sets in data-stream environments which may suffer from data overload. Stream data refer to data that flow into a system in vast volumes, change dynamically and contain multidimensional features. The traditional frequent pattern algorithms are not suitable to find frequent patterns from stream data. This paper proposed a frequent pattern mining algorithm integrate two data overload handling mechanisms. It extracts basic information from streaming data i.e. frequency of data items and keeps as base information. On user requirement the frequent pattern mining algorithm generates frequent item set from base information by using approximate inclusion-exclusion technique to calculate the approximate counts of frequent item sets. Self adaptive sliding window time model has been implemented to process the data stream. When data overload exists, the algorithm chooses data overload mechanism based on the nature of the data. The experimental results showed that the mining algorithm performed well in data overload state and generated frequent item set.
Keywords: Data mining, Stream data, Frequent patterns, Approximate inclusion-exclusion, Adaptive sliding window model, Data overload handling mechanisms.
Abstract
Development of an Intrusion Detection System based on Big Data for Detecting Unknown Attacks
Miss Gurpreet Kaur Jangla, Mrs Deepa.A.Amne
DOI: 10.17148/IJARCCE.2015.41252
Abstract: Today Cyber-attacks are increasing because the existing security technologies are not capable of detecting it.Previous cyber-attacks were having simple motive of hacking and damaging the system.But today the motive has changed from attacking the system or network to attacking the large scale systems such as organizations or national agencies.. In other words, existing security technologies to counter these attacks are based on pattern matching methods which are very limited. Because of this fact, in the presence of new and previously unknown attacks, detection rate becomes very low and false negative increases.For this reason,a new model has been proposed based on Big Data for detecting unknown attacks.Big Data can extract information from variety of sources to detect future attacks.We expect our model to be the basis of the future Advanced Persistent Threat (APT) detection and prevention system implementations.
Keywords: Intrusion detection, Data mining,Hadoop, Map Reduce,Targeted Attacks.
Abstract
Analysis on Image Color Model
Haneet Kour
DOI: 10.17148/IJARCCE.2015.41253
Abstract: Color models play an important role in real world applications such as computer graphics, image processing, television broadcasting, etc. Each color model has its own significance and applicable in different application domains. One of the interesting areas of digital image processing is to improve the image information for better processing image information for machine representation. Use of the color spectrum in image processing helps in objects recognition and extraction from the scene. In this paper, various (image) color models are studied to analyse their constituent components, application areas along with their merits and demerits.
Keywords: Color Model, Hue, Saturation, RGB, CMY, HIS.
Abstract
Owner Secured Data Storage on Cloud and Sharing with Key Aggregate Cryptosystem
Mr.Nilesh Deshmukh, Mr.Arivanantham Thangavelu , Mr.Vaibhav Muddebihalkar
DOI: 10.17148/IJARCCE.2015.41254
Abstract: Data sharing is an important functionality in cloud storage. This work, show how to efficiently, securely, and flexibly share data with others in cloud storage. It describes new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts is possible. More importantly one can aggregate any set of secret keys and make them as compact as a single key, but having the power of all the keys being aggregated. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage.
Keywords: Cloud storage, data sharing, encryption, key-aggregation.
Abstract
A Review Towards Digital Image Defogging Using Dark Channel Prior and Histogram Stretching Method
Miss. Radhika P. Yawale , Prof. A. S. Kapse
DOI: 10.17148/IJARCCE.2015.41255
Abstract: In recent world scenario digital image processing is the most widely used application. Digital image processing is the method to perform some operation on the image, in order to get an enhanced image and extract the useful information from that image. Mostly in winter season the visibility of outdoor images captured in inclement weather is often degraded due to the presence of fog. Because of this problem clear image is not obtained. In this paper, the proposed method uses the dark channel prior and histogram stretching methods for digital image defogging. Whereas dark channel prior is used to improve the quality of restoring images and histogram stretching method is used to improve the contrast of the image. Also analysis on various fog removal techniques has been done.
Keywords: Image processing, defogging, dark channel prior, histogram stretching method.
Abstract
A Survey on Design and Development of Wireless Local Area Network Security and Enhancement Using Wired Equivalent Privacy
Ms. Manju Gopinathan, Mr. M. Sengaliappan MCA, M.Phil, ME
DOI: 10.17148/IJARCCE.2015.41256
Abstract: Wireless LAN deployment improves users� mobility, but it also brings a range of security issues that affect emerging standards and related technologies. WLANs let users access a high-speed connection in areas where physically wired networks can�t penetrate or are not cost effective. Many companies use WLANs as add-ons to their main wired networks. The popularity of wireless networks is causing many engineers to analyze weaknesses and vulnerabilities in current wireless protocols. In the 802.11 standard an optional encryption protocol called Wired Equivalency Privacy (WEP) is used to make wireless traffic as secure as wired network traffic. WEP's duty is to encrypt packets and authenticate wireless LAN adapters. WEP is implemented at the data-link layer on all Wi-Fi compliant devices. RC4 is used as the encryption algorithm in WEP, which has been thoroughly analyzed and thought of as secure. In this paper, the various weakness of WEP taken for analyzing. To improve the security of keys used in WEP, 802.11i will most likely use a form of temporal key integrity protocol (TKIP) and CCMP. Although WLANs solve some problems that exist in traditional wired LANs, they also introduce new security issues. Here we identify current and future WLAN security concerns and possible countermeasures, including standards, technologies, management, policies, and service environments. The risks that WLAN services present can only be mitigated rather than completely eliminated.
Keywords: WLAN, LAN, WEP, TKIP, CCMP, OFDM, Wi-Fi, 802.11 Protocol.
Abstract
A Review on Various Underwater Image Denoising and Enhancement Techniques
Miss. Rutika S. Ingole, Prof. C. J. Shelke
DOI: 10.17148/IJARCCE.2015.41257
Abstract: Nowadays, it is difficult for the researchers to remove noise from the original signal as well as to enhance the quality of the image. There have been various algorithms but each approach has its assumption, advantage and limitations. However light scattering and color change problems still exist in the underwater image. Scattering problem is arising due to the large suspended particles, which causes the degradation of the image. Color change occurs because different wavelengths are attenuated to different degrees in water, causing ambient underwater environments to be dominated by a bluish tone. This paper proposes a novel method based on multiscale product thresholding and weber�s law in order to denoise and enhance the underwater image quality.
Keywords: Noise, Weber�s law, Multiscale product thresholding etc.
Abstract
A Survey on Data Mining with Big data – Applications, Techniques, Tools, Challenges and Visualization
S. Usharani, K. Kungumaraj
DOI: 10.17148/IJARCCE.2015.41258
Abstract: Data mining is analytic process designed to explore data in search of consistent patterns and then to validate the findings by applying the detected patterns to new subsets of data. It uses sophisticated algorithms for the process of sorting through large amounts of data sets and picking out relevant information. Data mining tools predict future and behaviors, allowing businesses to make proactive, knowledge-driven decisions. With the amount of data increasing each year, more data is gathered (called Big Data) and data mining is becoming an increasingly important tool to transform this data into information. Big Data is data whose scale, diversity, and complexity require new architecture, techniques, algorithms, and analytics to manage it and extract value and hidden knowledge from it. This survey includes the information about the Data mining with big data - technologies, tools, visualization, Challenging issues and its related work.
Keywords: Big Data, Decision trees, Genetic algorithm, nearest neighbor method, Visualization.
Abstract
An Overview of Classification Algorithm in Data mining
S. Venkata Krishna Kumar, P. Kiruthika
DOI: 10.17148/IJARCCE.2015.41259
Abstract: Data mining is the process of extracting hidden analytical information from large databases using multiple algorithms and techniques. Classification technique can be solving several problems in different fields like medicine, industry, business, and science. Basically it involves finding rules that categorize the data into disjoint groups. In this paper we present the basic classification techniques. Several major kinds of classification method including decision tree, CHID, ID3, C4.5 and C5.5algorithms. The goal of this paper is to provide a review of different classification techniques in data mining.
Keywords: CHAID, CART, ID3, C4.5, C5.0, Hunt�s algorithm.
Abstract
Content Structure Extraction from Deep Web Pages using page segmentation
Mr.A.B.Majgave, Prof.(Dr.).S.K.Shirgave
DOI: 10.17148/IJARCCE.2015.41260
Abstract: The World Wide Web has several online databases and the number keeps growing every day. The data in the web pages is generally wrapped in the form of data records. Such web pages are generated dynamically. This paper focuses on extracting the data from the web pages. Till today, several techniques are proposed for retrieving information from web pages but all suffer the common problem. The problem is dependence on programming language used to design the web pages. So this paper focuses on utilizing the visual features of web page for extracting the data from the deep web pages. To make the system efficient, it can be combined with non-visual information like the symbols and tags. Approach of this paper is independent of any specific web programming language and hence it can be extended to various web pages which have different underlying architecture.
Keywords: Web mining, Web data extraction, visual features of deep Web pages, wrapper generation.
Abstract
Perception of relationship between Big Data and Internet of Things
Prof. Nasrulla Khan K, Prof. Anitha Kumari
DOI: 10.17148/IJARCCE.2015.41261
Abstract: The Internet of Things (IoT) and Big data are two of the most emerging technologies in recent years, and Gartner�s Hype Cycle of Emerging Technologies shows Internet of Things (IoT) are at its peak of Inflated Expectations. One of the trends that Gartner, Inc predicts in Big data is by 2020, with the presence of IoT, the connected devices, sensors, M2M communication will generate new types of real time information. A study is done to analyze one of the trends of big data, which is Internet of Things. In this paper we will examine some IOT use cases of interest, and will take a look at analytics of big data. In the remaining part, we categorize the paper into different sections, where section1 gives us the introduction of IOT, section2 introduction of Big Data, followed by section3 where we show the relationship, section4 we will discuss the trends and challenges which is followed by the conclusion.
Keywords: Big data, IOT, challenges, trends, sensors, wireless.
Abstract
User-Centered Design (UCD) Approach for Designing of Platform Independent Applications in Smartphone
Vijay R. Mendapara, Yogesh R. Ghodasara, Ghanshyam S. Poriya, Krunal C. Kamani
DOI: 10.17148/IJARCCE.2015.41262
Abstract: With the dramatic growth in the mobile market and has reach a range where some software development company cannot neglect the need to contribute in it any longer. Designing a native mobile application involves lots of resources and this, might affect some of the issues with applications development and deployment. At present, there are different mobile device manufacturers which have different devices and development tools. The main solution to solve this issue would be to design a cross-platform application which exist on all mobile operating systems (OS), as it operates in some browser and consequently, can reach the major possible number of end-users. User-centered design (UCD) is a framework of processes (not restricted to interfaces or technologies) in which the needs, wants, and limitations of end users of a product, service or process are given extensive attention at each stage of the design process. In this paper, we propose User-centered design (UCD) for platform independent applications development is smartphones with different operations system.
Keywords: Smartphone, Platform-Independent, Framework, Architecture, Cross Platform.
Abstract
A Comparative Analysis of Hierarchical and Partitioning Clustering Algorithms for Outlier Detection in Data Streams
Dr. T. Christopher, Mrs. T. Divya
DOI: 10.17148/IJARCCE.2015.41263
Abstract: Outlier Detection is a fundamental issue in Data Mining. Data stream clustering techniques are highly helpful to cluster the similar data items in data streams and also to detect the outliers, so they are called cluster based outlier detection. It has been used to detect and remove unwanted data objects from large dataset. The clustering techniques are highly helpful to detect the outliers called cluster based outlier detection. In this research work clustering algorithms namely K-Means with CURE, K-Means with BIRCH, CURE with CLARANS, CLARANS with BIRCH,CLARANS, E-CLARANS and analyzed for finding the best result of detecting outliers in data streams. Two performance factors such as clustering accuracy and outlier detection accuracy are used for observation using WEKA tool. Through examining the experimental results, it is observed that the E-CLARANS outperforms well then the K-Means with CURE, K-Means with BIRCH, CURE with CLARANS, CLARANS with BIRCH, CLARANS Algorithms. E-CLARANS clustering algorithm performance is more accurate results than the rest of the clustering algorithm.
Keywords: Data stream, Data stream Clustering, Outlier detection.
Abstract
Shortest Path Algorithm for Spatial Query Processing in Road Network
Rambha Agrahari, Rakesh Kumar Singh, Toshika Dutta
DOI: 10.17148/IJARCCE.2015.41264
Abstract: If any algorithm has n-shortest path then it has some problem like path similarity among the network expansion and determined path describing turn prohibition. GPS system is an application in the road network field. the meaning of path similarity that is alternative paths derived from k-shortest path algorithm which is connected to lots of links, hence heterogeneity cannot be represented .In road network computing optimal path routes is not easy it�s like a showpiece of real world application algorithm. For computing the optimal route in real road network we can use classic solution from the graph theory which is describe by Dijkstra�s algorithm. But for the large network this is not suitable algorithm. This works too slow for the large road network. This paper proposed link based shortest path algorithm which find out the different path for travelling for node to node network where turn prohibition exist. In this process there is no need of extra node and edge for expanding the network. Dijkstra�s algorithm tested with some example networks then will be expanded to dynamic case.
Keywords: n-shortest path, turn prohibition, wireless network, road network, Routing algorithm, kNN query.
Abstract
Solving the Problems in Sharing the Information in ERP Implementation Systems
Mrs. S. Mala, Dr. K. Alagarsamy
DOI: 10.17148/IJARCCE.2015.41265
Abstract: Enterprise Resource Planning Systems, usually referred as ERP, is one of the largest areas in Software Implementation. ERP Systems are systems, which are used to manage the information and functions in a company. It is also used to solve a lot of business problems and to transfer the knowledge in a particular business environment effectively into a database, where information can be connected together. ERP Systems are also used where information are need to be shared easily and securely. The best known ERP Systems are SAP, PeopleSoft, Oracle Applications and J.D. Edwards. As ERP Systems can help in business growth, companies tend the implement the same. As Implementation of these ERP Systems, would lead to modifications within an organization, there is a possibility of sharing redundant information. Due to unskilled employees, it becomes difficult to implement an ERP System, and it requires a complete knowledge transfer, which includes a step-by-step process for each flow of information. The difficulties in transferring this knowledge between employees, customers and within departments in an Organization can be solved using the Knowledge Management, which might support this ERP Systems. This paper discusses about the Knowledge Management process, which could help in solving the problems in sharing the information in ERP Implementation Systems.
Keywords: Enterprise resource planning (ERP), Knowledge Management (KM), Enterprise System (ES).
Abstract
Lossless Image Compression using Hybridization of Entropy Encoding and Data Folding
Malwinder Kaur, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.41266
Abstract: The compression models play an important role in saving the storage space on the local or online storage or for the smooth transfers over the give network architecture. The robust and lossless compression is always remained as the point of interest for the researchers. The higher compression ratios heavily impact the data quality, which has turned the research over compression in various regions of the world. There are several entropy encoding models, arithmetic encoding like encoding techniques, etc has already been used for the purpose of data compression. The wavelet models have also been proposed in various compression models under various research projects. In this paper, the author worked over the robust, stronger and lossless compression model for various model of data using the amalgamation of Huffman encoding, Run-length encoding, LZW encoding along with Discrete wavelet transform (DWT) based wavelet compression model in order to provide the highly robust and lossless compression. The discrete wavelet transform (DWT) has already been proved as the best image compression algorithm. The DWT technique decomposes the image matrix into various sub-matrices to create a compressed image. The new compression technique will be developed by combining the most effective and fast wavelets of DWT technique for image compression. The quality of the new image compression technique will be evaluated using the peak signal to noise ratio (PSNR), mean squared error (MSE), compression ratio (CR) and elapsed time (ET). Also, the new techniques would be compared with the existing image compression techniques on the basis of the latter mentioned parameters. The experimental results have proved the effectiveness of the proposed model in the terms of MSE, CR and ET.
Keywords: Huffman encoding, run-length encoding, LZW encoding, DWT.
Abstract
Energy Efficient DYMO Protocol for 802.15.4 over Flooding Attack
Garima Pahare, Surbhi Koushik
DOI: 10.17148/IJARCCE.2015.41267
Abstract: Mobile Ad-hoc Network (MANET) is a kind of wireless network having more than hundreds nodes interconnected in open nature field. A strong purpose may lead it as one of emerging and popular research field for researchers. Wireless sensor a network is widely used for real time submission at military combat zone, nuclear power plants etc. A mobile node consist small data storage capacity, low power battery, low bandwidth and low computational power. Due to open nature communication medium, it becomes more vulnerable to outside attacks. Security threats are classified in two category passive and active attacks. In passive attack attacker can listen the packets in the network while in the active attack attacker can also modify the packet contents. Subsequently, little attack may lie into both categories. Flooding attack is such kind of attack which aims to disrupt the network by draining resource capability. Here, Attacker communicates worthless messages formally known as false packet to increase network traffic and make target node busy in useless activity. The complete work observes that, Flooding attack does not require any study about network vulnerability. Furthermore, the major thread in way of development is challenges in sensor networks. Poor resources availability is the major weakness of sensor network. Attacker may use this weakness to disrupt the network. Subsequently, Power draining is the major thread; where attacker not only exhausts the network traffic but also degrades the life of node as well network. The objective of this study is to detect and prevent wireless sensor networks from unwanted power draining due to Flooding attack. Here, Targeted Flooding through high battery capacity node has been used to deploy Flooding attack in ad-hoc network. Subsequently, energy consumption and capacity observation technique has been used to detect malicious node(s). Furthermore, prevention method forcefully shutdown malicious nodes and transfer communication from another route to avoid power draining. Energy consumption before attack, during attack and after prevention along with throughput and packet delivery ratio is used to measure performance of proposed technique. NS-2 simulator has been used to simulate and evaluate the results of proposed solution.
Keywords: MANET, Flooding, DYMO, WSN.
Abstract
A Compendium for Prediction of Success of a Movie Based Upon Different Factors
Shraddha Mehta, Hitarthi Bhatt, Prof. Darshana Desai
DOI: 10.17148/IJARCCE.2015.41268
Abstract: The success of a movie is uncertain but it is no secret that it is dependent to a large extent upon the level of promotion and also upon the ratings received by the major movie critics. Time and money are valuable to the general audience and hence, they refer to the leading critics when making a decision about whether to watch a particular movie or not. Over 1000 movies on an average are produced per year. Therefore, in order to make the movie profitable, it becomes a matter of concern that the movie succeeds. Due to the low success rate, models and mechanisms to predict reliably the ranking and or box office collections of a movie can risk the business significantly. The current predictive models that are available are based on various factors for assessment of the movie. These include the typical factors such as cast, producer, director etc. or the social factors in form of response of the society on various online platforms. Various stakeholders such as actors, financiers, directors etc. can use these predictions to make more informed decisions.
Keywords: Movie success; Decision tree; Weka; Box office prediction; ID3 Algorithm.
Abstract
Raspberry Pi Home Automation Based on Internet of Things (IoT)
Upadhye Madhuri Ganesh, R. A. Khan
DOI: 10.17148/IJARCCE.2015.41269
Abstract: Automation or automatic control means the use of various control systems for operating equipment. Home automation is exciting field when it is blow up with new technologies like Internet of Things(IoT). It is automation of the home, housework or household activity. Proposed implementation of home automation include centralized control of lighting, heating, ventilation and it is fully control by using any smart phone through the particular android application. The main advantage of this is small device can be part of internet so it is easy to communicate, manage and control without human interferences. Also it provides high degree of security, safety, comfort and energy saving. With the arrival of Raspberry Pi which is small, inexpensive, portable credit-size single board computer with support for a large number of peripherals and network communication like Ethernet port, USB port, HDMI port, SD card slot. Raspberry pi set of technologies now exist that combine the power of PC, communication and multimedia technologies of web and portability of mobile device.
Keywords: Home automation, Internet of things, Raspberry Pi, Sensors.
Abstract
Real Time Hand Gesture Recognition Based Image Viewer
Sujit Wankhade
DOI: 10.17148/IJARCCE.2015.41270
Abstract: The study related to human machine interaction has been done intensively to improve the ways human communication with the machine. The means of communicating with computers at the moment are limited to keyboards, mice, light pen, trackball, keypads, etc. These devices have grown to be familiar but inherently limit the speed and naturalness with which we interact with the computer. This paper proposes to use image processing and gesture recognition to simulate an environment where performing technical activities will become more like �real-world�. The system proposes a real time human hand gesture recognition based system which interacts with the machine and processes the image. The classification of the gesture is based on the direction and gesture of the movement of the human hand. The motion of the hand will be captured and then the keyboard press actions are processed. Depending on this the image will move accordingly left, right, zoom in and zoom out.
Keywords: Human machine interaction; Gesture Based Interactive System; Image Viewer; Web camera; Multiple intelligences.
Abstract
A Survey – An Introduction of Zigbee
Toshika Dutta, B.P. Chaurasia, Rambha Agrahari
DOI: 10.17148/IJARCCE.2015.41271
Abstract: Technologists have never had difficulty getting up with possible applications for wireless sensors. In a home protection organization, for instance, wireless sensors would be more comfortable to establish than sensing elements that require wiring. The same is true in industrial surroundings, where cabling typically bills for 80% of the price of sensor facilities and then there are applications for sensors where cabling is not virtual or even potential. The trouble though is that most wireless sensors use excessively much power, which signifies that their batteries either have to be very big or get charged far too frequently. A low power wireless communication technology called ZigBee is revising the wireless sensor equation, however. ZigBee is being widely used for sensor communications and many other research fields. Why regard ZigBee? Because it is inexpensive and has safer compatibility when likened to other communication technologies.This paper gives the general survey of the ZigBee network technology, including its access methods, devices, topologies. The most significant section of this paper consists of the protocol architecture of ZigBee and several applications of ZigBee technology.
Keywords: ZigBee, topology, Protocol stacks, Security.
Abstract
Performance Evaluation of Enhanced DSR Protocol under Influence of Black Attacks
Isha Sharma, Rajesh Kochher
DOI: 10.17148/IJARCCE.2015.41272
Abstract: Mobile Adhoc Network is a type of pre-existing network framework having collection of mobile nodes, each acting as host as well as router, equipped with wireless communication and networking capability to communicate with one another. MANET goal is to provide communication to the area where limited communication organization exists. For communication between various nodes routing protocols forms important component. DSR computes the routes when necessary and then maintains the same during the entire communication network. But it also suffers from various types of attacks such as Black Hole attack and Gray Hole attack. So this paper is effort to evaluate the performance of DSR and enhances its performance in MANET network by calculating matrices such as voice end-to-end delay, network load, throughput, number of hops per route, retransmission attempts, packet delivery ratio, using OPNET Modeler 14.5.
Keywords: MANET, DSR, Black Hole Attack.
Abstract
Multimedia based information retrieval approach for lecture video indexing based on video segmentation and Optical Character Recognition
Surabhi Pagar, Gorakshanath Gagare
DOI: 10.17148/IJARCCE.2015.41273
Abstract: Recently advanced development in multimedia technology allows the capturing and storing of video data with highly expensive computers. Further, the new opportunities offered by the information technology have made a vast collection of video data publicly available. But still, without proper search techniques these all data are hardly usable. Users are not well satisfied with the video retrieval systems which provide analogue VCR functionality. For example, a user analyses a football video will ask for specific events likewise goals. Content-based search and retrieval of video data becomes a challenging and important problem now a day. So, the needs for tools that can be used to manipulate the video content as in traditional databases manage numeric and text content is significant. Therefore, a more efficient way towards video retrieval in World Wide Web or within large lecture video archives is urgently required. This research presents an approach for automated video content retrieving over large lecture video archives. First of all, It apply automatic video segmentation and key-frame detection to offer a visual guideline for the video content navigation. Subsequently, It extract textual metadata by applying video Optical Character Recognition (OCR) technology algorithm on key-frames and Automatic Speech Recognition on lecture audio tracks content of the video. Proposed algorithm Multimedia question information retrieval is to provide a multimedia data such as image and video for extracted words in OCR method. The multimedia search diversification method helps to collect the appropriate answer based on words. It provides relevant information i.e. text, audio, video to the user for more effectiveness.
Keywords: Questing Answering, multimedia search, reranking, video segmentation, video browsing, video retrieval, video structure analysis, OCR, API.
Abstract
A Glance over the Working Methodology of VANET
Apurva Kukade, Prof. Tilotma Sharma
DOI: 10.17148/IJARCCE.2015.41274
Abstract: Mobile ad-hoc network is a part of ad-hoc network which can change locations and synchronize itself. Because of their mobile nature they use wireless connections to connect different networks; it would be a Wi-Fi connection or some other medium. With growing technologies VANET (Vehicular ad-hoc network)are special category of dynamic wireless network. VANET allows vehicles to communicate with the roadside equipments. It works under ITS (Intelligent transportation system). In VANET nodes communicate wirelessly with their different mobility nodes. Mobile communication, traffic monitoring safety and public utility management are the key components of VANET. In VANET there are two modes of vehicle communication which are names as Vehicle to vehicle (V2V) and Vehicle to infrastructure (V2I). Infrastructure absence is the main characteristics of VANET such as access point or base station, existing in the Wi-Fi, WI-Max, GSM or UMTS. Vehicular communication explains the numerous initiatives of the research which enhance the security, efficiency of transportation systems, supplying, and traffic in the road conditions such as emergency, construction sites and congestion. The attributes of VANET works with a solution which takes routing protocols of MANET. IVCN (Inter Vehicle Communication Network) is the new approach of ad-hoc network.
Keywords: VANET (Vehicular ad-hoc network), WI-FI, WI-Max, GSM, UMTS, Vehicle to vehicle (V2V).
Abstract
A Review on Extracting Top-k Lists from the web
Shreya U. Wadkar, Prof. N. G. Pardeshi
DOI: 10.17148/IJARCCE.2015.41275
Abstract: The web contains a huge amount of data and this data results into a large amount of information. The information on the web is in two forms i) Structured data and ii) Unstructured data. In this paper, we focus on structured data. List data is one of the most important source of structured data for information retrieval on the web. This paper deals with the �Top-k Lists�, web pages that describe a list of k instances of a particular topic or concept. Examples are, �the 5 top most cars in the world�, �the 10 richest businessman in the world� etc. Top-k lists are a richer, larger and of high quality source of information. Therefore, top-k lists are highly valuable. This paper reviews a various traditional methods for extracting the top-k lists. After studying these, we present an efficient method that obtains the target lists from web pages with high accuracy. Extraction of such lists can help enrich existing knowledge bases about general concepts and useful as a preprocessing step to produce facts for a fact answering engine.
Keywords: Web information extraction, Top-k lists, List extraction, Web mining.
Abstract
Detection and Prevention of Wormholl Attack Using AODV Protocol
Miss Asha Mansore, Miss Surbhi Koushik
DOI: 10.17148/IJARCCE.2015.41276
Abstract: Due to wireless communication in Mobile Ad hoc Network (MANET) it is vulnerable to different routing attacks. One of the severe network layer attacks is wormhole attack, which totally disrupts the channel without disturbing the traditional routing protocol. In this paper, we have discussed about wormhole attack, its behavior and technique of its deployment, detection and prevention available currently. At last we suggested a cluster-based energy-efficient method to detect and prevent malicious node in the cluster.
Keywords: MANET, AODV, WSN, Wormhole, Cluster-based.
Abstract
Moving Object Detection, a Succinct Review
Ruchira Susar, Mahendra Dongare
DOI: 10.17148/IJARCCE.2015.41277
Abstract: For many computer vision applications such as surveillance, vehicle navigation, even for autonomous robot navigation moving object detection is very important and challenging task. Detecting the objects in the video and tracking their motion to identify their characteristics has been emerging as a demanding research area in the domain of Image Processing and Computer Vision. Video surveillance in a dynamic environment, especially for humans and vehicles, is one of the current challenging research topics in computer vision. It is a very significant technology to fight against terrorism, crime, public safety. The work involves designing of the efficient video surveillance system in complex environments. In video surveillance, detection of moving objects from a video is important for object detection, target tracking, and behaviour understanding. Detection of moving objects in video streams is the very first and basic step for further processing.
Keywords: Video surveillance, moving object detection, background subtraction, optical flow.
Abstract
A Survey on Ranking Fraud Detection Using Opinion Mining for Mobile Apps
Tejaswini B. Gade, Prof. Nilesh G. Pardeshi
DOI: 10.17148/IJARCCE.2015.41278
Abstract: Now days, mobile App is a very popular and well known concept due to the rapid advancement in the mobile technology and mobile devices. Due to the large number of mobile Apps, ranking fraud is the key challenge in front of the mobile App market. Ranking fraud refers to fraudulent or vulnerable activities which have a purpose of bumping up the Apps in the popularity list. In fact, it becomes more and more frequent for App developers to use tricky means, like increasing their Apps� sales or posting fake App ratings, to commit ranking fraud. While the importance and necessity of preventing ranking fraud has been widely recognized. After understanding the details of ranking fraud and the need of ranking fraud detection, the paper proposes a ranking fraud detection system for mobile Apps. The proposed system mines the active periods such as leading sessions of mobile apps to accurately locate the ranking fraud. These leading sessions can be useful for detecting the local anomaly instead of global anomaly of App rankings. Besides this, by modeling Apps ranking, rating and review behaviours using statistical hypotheses tests, we investigate three types of evidences, they are ranking based evidences, rating based evidences and review based evidences. Furthermore, we propose an aggregation method based on optimization to integrate all the evidences for fraud detection. Finally, the proposed system will be evaluated with real-world App data which is to be collected from the App Store for a long time period.
Keywords: Mobile Apps, ranking fraud detection, evidence aggregation, historical ranking records, rating and review.
Abstract
Hiding of Data in Mosaic Images by Reversible Color Transformations
Ms. Priyanka Nehete, Prof. Pankaj Salunkhe
DOI: 10.17148/IJARCCE.2015.41279
Abstract: Images are transmitted through the internet for various purposes, such as confidential enterprise archives, document storage systems, medical imaging systems, and military applications. These images may contain secret or confidential information since it should be protected from leakage during transmissions. An approach for secure image transmission is needed, which is to transform a secret image into a meaningful Secret Fragment Mosaic Image with size almost same and looking similar to the preselected target image. The mosaic image is the outcome of arranging of the block fragments of a secret image in a way so as to disguise the other image called the target image. The mosaic image looks similar to a randomly selected target image. It is used for hiding of the secret image by color transforming their characteristics similar to the blocks of the target image. The appropriate information is embedded into the mosaic image for the recovery of the transmitted secret image.
Keywords: Color transformation, data hiding, mosaic image, covert communication.
Abstract
Fruit Identification and Classification Techniques A Review Using Neural Networks Approach
Ms. S.Mahalakshmi, Harini Srinivas, Meghana S, C Sai Ashwini
DOI: 10.17148/IJARCCE.2015.41280
Abstract: This paper gives an insight into the results of a survey based on fruit identification and classification. The survey depicts the credibility of choosing the appropriate classifier and the feature extraction methods for correct and exact recognition of the fruits. It also reports on the accuracy and performance of each method implemented in the papers taken into consideration. Morphological features, color features, intensity based features and other features are extracted from the fruit images and these are subject to various types of classifiers like Probabilistic Neural Network(PNN), Support Vector Machine(SVM), Back Propagation Network(BPN) and K-Nearest Neighbour(KNN) algorithm. The goal of this paper is an overview of the techniques implemented in fruit identification and classification.
Keywords: Fruits; feature; classifiers; SVM; ANN; KNN; PNN.
Abstract
Implementation of Affordable Éclat Public Transportation Systems
S. Seshagiri Rao, B. Nancharaiah
DOI: 10.17148/IJARCCE.2015.41281
Abstract: This paper proposes and provides a solution for upgrading �clat (advanced) public transportation System (EPTS) administrations establishment on GPS and GSM in Vijayawada city a bit of a condition of Andhra Pradesh. The framework stands of three modules: In-BUS Module, BASE Station Module and BUS Stop Module. Outfit with ARM and GSM&GPS modem, BUS Station Module sends the instatement data containing the transport number and tag number to In-BUS Module and BASE Station Module utilizing SMS. The ARM establishment In-BUS Module comprising chiefly of a GPS beneficiary and GSM modem then begins transmitting its area and number of travelers to BASE Station Module. BASE Station Module outfit with an ARM unit and GSM modems interfaced to PCs is intended to follow along record of each transport, forms client Solicitation around a careful transport area out of BUS Station and overhauls transports area on transport stops. Transport Stop Module is introduced at each transport stop and withstands of a GSM modem, memory unit and speck grid show all interfaced to a microcontroller. This module gets transports area data coming towards that prevent from BASE Station module and showcases the data on a dab (digital audio broadcasting) network show. A for every stop factual examination is completed taking into account the quantity of travelers and a good specify report forward with this test is sent to Andhra Pradesh Government Transportation Department to have a keep an eye on the fulfillment and administrations oblation by transporters to mundane individuals. The outcomes have demonstrated that the created framework is valuable for encouraging individuals utilizing open transportation administrations.
Keywords: Embedded ARM, GPS, GSM, RF-ID Module, Transportation System.
Abstract
Analysis of Data Virtualization
P. Srinivasulu, C. Yosepu, B. Subbarayudu, A. Kavitha
DOI: 10.17148/IJARCCE.2015.41282
Abstract: Virtualization provides several benefits �greater efficiency in CPU utilization, greener IT with less power consumption, better organization through essential environment control, more availability, reduced project timelines by eliminating hardware procurement, enhanced disaster improvement capability, more central control of the desktop, and improved outsourcing services. Many blogs and articles are devoted to data virtualization, at many events data virtualization has been discussed the issue is explained on numerous webinars and webcasts, it�s on the radar of nearly all analyst organizations, all types of organizations are using the technology nowadays, and the products have matured sufficiently to handle large and complex data environments. One can simply state that even though the term data virtualization is not as popular as the terms SQL, data warehouse or big data, data virtualization has been accepted by the market. More and more organizations are deploying the technology to simplify right to use to their labyrinth of data sources.
Keywords: Virtualization, data warehouse, big data, organization
Abstract
A Novel Study on Improved Re-Route Model to Reduce Traffic in MPLS Network
Mrinal Kishor, Deepak Dhadwal
DOI: 10.17148/IJARCCE.2015.41283
Abstract: In this work, it presents a review on Rerouting model in MPLS Network for reducing traffic. It is based on fault tolerant model concept in MPLS network. This describes the process of routing scheme and link resource distribution. QoS is the mechanism of the network to provide different service level to a different traffic type as business need.The main objective of this work is to improve QoS in network by reducing delay. It provides a distribution of traffic between source and destination so that delays between the paths are minimum between each other. It works on reliability by limited usage of bandwidth. The projected mechanism will be implemented with MATLAB.
Keywords: MPLS Network, Congestion Management, Re-Route Model, Quality of Service etc.
Abstract
A Survey on Hybrid Algorithm for Image Deblurring Techniques
Chandra Prakash Prabhakar, Mrs. Kiran Dewangan
DOI: 10.17148/IJARCCE.2015.41284
Abstract: This paper concern on image deblurring has a major impact in Digital Image processing, but the main drawback in digital image is presence of noise and degradation during the camera shack, long exposure time, movement of object, and not focus the target. Image deblurring and restoration is very important and necessary in digital image process avoid the blur. Image deblurring is a technique which is used tomake picture sharp and useful by using mathematical model. Blur found in the digital image can be two types blind convolution and non-blindde convolution, that need the estimation of point spread function (PSF) to recover the blur.There have been many methods that were proposed in this paper we studied various image deblurring method and hybridization of the two methods for better resolution.
Keywords: image deblur, blur, PSF, degradation model, motion blur, blind deconvolution.
Abstract
A Review on Biomedical Image brightness preservation and segmentation technique using CLAHE and Wiener filtering
Miss. Priya S. Patil, Prof. P. P. Pawade
DOI: 10.17148/IJARCCE.2015.41285
Abstract: In biomedical image processing, low contrast image analysis is a challenging problem. Low contrast digital images reduce the ability of observer in analyzing the image. The most effective method used for contrast enhancement is Histogram Equalization (HE). Here propose a new method named �Biomedical Image brightness preservation and segmentation technique using CLAHE and Wiener filtering�. . Here use CLAHE and Wiener filtering based techniques to enhance contrast of biomedical images. The contrast of an image is enhanced by applying CLAHE on small data regions called tiles rather than the entire image. Wiener filtering reduces the content of noise in histogram equalized image.
Keywords: Biomedical Image Enhancement, CLAHE, Wiener filtering, Contrast Enhancement.
Abstract
Intrusion Detection, Prevention and Self-Healing using Mirroring on Server
Priya N Jethani, Prof. Ankush S Narkhede
DOI: 10.17148/IJARCCE.2015.41286
Abstract: Current systems are prone to attacks caused by intruders due to increased connectivity (especially on the Internet). So there is need to handle these attacks and provide efficient solution to these attacks. Our project provides us the technique to tackle the problem caused by intruder and helps in achieving the few basic objectives of intrusion detection systems i.e Confidentiality, Integrity, Availability, and Accountability. It uses RSA algorithm of cryptography to prevent the data or we can also use the symmetric and asymmetric cryptography techniques to provide more security on data and MD5 to detect intrusion If we have detect any intrusion in our system, we can recover our data through mirroring technique with the help data present on our backup server.
Keywords: RSA algorithm, Mirroring, Intrusion detection system, cryptography,MD5.
Abstract
A Review of Routing Protocols for Underwater Wireless Sensor Networks
Syed Abdul Basit, Manoj Kumar
DOI: 10.17148/IJARCCE.2015.41287
Abstract: Underwater sensor network consists of number of various sensors and autonomous underwater vehicles deployed underwater to coordinate, interact and share information among themselves to carry out sensing and monitoring functions. Underwater sensor networks have wide range of applications like pollution monitoring, disaster preventions, assisted navigation, under sea explorations, advance military capabilities, mine reconnaissance etc. underwater sensor networks pose great challenge to our existing technologies used in terrestrial sensor network, because underwater environment differs from terrestrial radio environment both in terms of energy costs and channel propagation phenomena. In underwater sensor network, acoustic wireless communication is used in place of radio frequency and optical signal. Some of the issues in which underwater sensor network differ from terrestrial are limited bandwidth, battery power, failure of sensor nodes due to fouling and corrosion. Thus, design of routing protocols for underwater sensor networks pose many challenges due to intrinsic properties of underwater environment.
Keywords: underwater sensor networks, routing, depth based protocols, energy efficiency, acoustic communication.
Abstract
A Survey & Study on Improvements in Efficiency and Effectiveness of Multipath Routing Protocols in Wireless Sensor Networks
Er. Manish Purohit, Er. Piyush Vyas, Er. Bablu Kumar Singh
DOI: 10.17148/IJARCCE.2015.41288
Abstract: In the recent decade, several technology trends have influenced the field of WSN in significant ways. The first trend is the more readily available technology of ubiquitous wireless sensor networks as well as wireless communication networks and progress in the development of low-power sensor nodes, efficient working sensor networks, mul-tithreading, communication between nodes, joint routing and scheduling, path availability, less energy consumption on nodes etc. WSNs have the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy saving of sensor nodes is a major design issue. To prolong the network�s lifetime, energy consumption should be reduced in the sensor nodes. The minimization of computing and storage platforms as well as the development of novel micro sensors and sensor materials with high reliability force encourages technology in research on WSN. All the trends have changed the type of dynamic environmental phenomena that can be detected, monitored and reacted to. Another important aspect is the real-time data delivery of novel platforms today. In this paper, we will survey the field of multipath routing in wireless sensor networks, and mainly focus on the technology of QoS of WSNs. Furthermore, our objective is to investigate how this technology can be embedded in the current scenario of intelligent sensor platforms in the WSNs and identify its place and purpose using various communication techniques.
Keywords: WSN, multithreading, communication between nodes, joint routing and scheduling, path availability, less energy consumption on node.
Abstract
A Review on Hide the data in Encrypted video using Private Key for secure Transmission
Abhijeet Kotwal, Prof.K.N.Shedge
DOI: 10.17148/IJARCCE.2015.41289
Abstract: Now Days all people have more concentration about security about data when sending data on the network. Hence new concept is invented, Data hiding in Encrypted video is invented. Data hiding in video preferred encryption algorithm using secrete key because it maintains the originality of the transmitted data at the at the receiver end after decryption. In this way data hide in encrypted video preserve the confidentiality of the content. The data hider may add the additional data in the encrypted video without knowing the original video content. In other hand decryption level the two schemes is available for getting the data first scheme is get the data then decrypt the video and second one is first decrypt the video then get the data.
Keywords: Data Encapsulation, Feature Extraction, Video Coding, Privacy protection, Data Mining.
Abstract
Importance of Professional& Social Networking for Entrepreneurs
Akash Bhojraj, Ritwik Kulkarni, Hrushikesh Korde, Bhushan Kudale
DOI: 10.17148/IJARCCE.2015.41290
Abstract: Studies have consistently found information technology (IT) enhances the business operation and performance, but the adoption of IT among micro- enterprises for business growth is still considerably poor. The factors that influence the micro-enterprises to actively embrace IT that include social networking sites and whether the adoption has led to stronger business performance have become the major attention of the social networking research. Hence, our product deals with investigating the factors that influence micro- enterprises to use social networking as a business platform and examining the relationship between social networking use and the micro-enterprises� business performance. The resultant draws a substantive attention to the understanding of utilizing social networking sites as readily available and low cost technology as a business tool, especially among micro- enterprises.
Keywords: Venture Capitalists, Pre-Launch Start-ups, Consultants, Angel Investors, Top Entrepreneurs.
Abstract
Eclat – Genetic Approach for Finding Association Rule
Santosh Kumar Satapathy, Santosh Kumar Moharana, Narendra Kumar routr, Avaya Kumar Ojha
DOI: 10.17148/IJARCCE.2015.41291
Abstract: Data mining is a process which finds useful patterns from large amount of data The process of extracting previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions - Simoudis 1996 This data mining definition has business flavor and for business environments. However, data mining is a process that can be applied to any type of data ranging from weather forecasting, electric load prediction, product design, etc. Data mining also can be defined as the computer-aid process that digs and analyzes enormous sets of data and then extracting the knowledge or information out of it. By its simplest definition, data mining automates the detections of relevant patterns in database. Data Mining is an analytic process designed to explore data (usually large amounts of data - typically business or market related) in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new subsets of data. The ultimate goal of data mining is prediction - and predictive data mining is the most common type of data mining and one that has the most direct business applications. The process of data mining consists of three stages: (1) the initial exploration, (2) model building or pattern identification with validation/verification, and (3) deployment (i.e., the application of the model to new data in order to generate predictions). In this paper, the main area of concentration was to optimize the rules that are generated by an Association Rule Mining algorithm (Eclat) by using a Genetic Algorithm. Here we generate more accurate and complete rules. The advantage of using genetic algorithm is to discover high level prediction rules.
Keywords: Eclat, Genetic Algorithm, Association Rule, Data Mining.
Abstract
Generate New Technology Centralized Mobile Gateway (CMG ) to Transmit Government Services in Public
Er. Niranjan Singh, Dr. Hemant Kumar Malviya
DOI: 10.17148/IJARCCE.2015.41292
Abstract: In INDIA mobile technologies service delivery ration become rapid with mobile subscriber which are expected present more than 50 crore. m-Governance is now growing, not only in developing countries but also in the developed countries also. Our Indian Government was decided to improved their technologies and delivering public services through mobile phone, thereby starting Mobile Governance (m-Governance) as a persuasive new benchmark within the culture of e-Governance. The achievement of the projected proposal on m-Governance will seriously depend upon the ability of the Government Departments to make available regularly compulsory public services to their beneficiary. To create infrastructure for Mobile Based Services on the basis of anywhere anytime, adopt appropriate standards, develop appropriate technology platforms, try minimised the cost of every services, and create awareness, primarily for people in rural areas. We generate a new technologies Centralized Mobile Gateway (CMG) for make powerful to availability of civic services through mobile device at extremely negligible costs for delivering public services through mobile device.
Keywords: Centralized Mobile Gateway, Mobile Governance, m-Governance, e-Governance, Mobile Based Services, public services, M-Governance Applications Store, value added services, Separate Mobile Application Ready Content.
Abstract
A Novel Study on an Optical Wireless Indoor System Based on Artificial Neural Network
Parveen Aggarwal, Praveen Bajaj
DOI: 10.17148/IJARCCE.2015.41293
Abstract: Communication is one of the important aspects of life. High-speed wireless optical communication links have become more popular for personal mobile applications. Compared to the radio frequency domain, optical wireless communication offers much higher speeds and bit rates per unit power consumption. This work investigates the use of artificial intelligence and wavelet analysis as the main elements of indoor optical wireless communication receiver. The work uses the MATLAB tool for providing effects of Inter-symbol Interference and light interference on this receiver. This work presented focus mainly on the use of software based technique like continuous wavelet domain as an alternative for handling difficulties associated with these systems. In this, different modulation techniques like OOK and PPM are presented. The performance of this system will be analyzed based on BER value.
Keywords: Optical-Wireless, Wireless Communication, OOK, PPM etc.
Abstract
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
D.H.Patil, Shrikant Raikode, Swapnil Katwe, Jitendra Pawar, Manoj Pawane
DOI: 10.17148/IJARCCE.2015.41294
Abstract: An effective and efficient way to provide computing resources and services to customers on demand, cloud computing has become more and more popular. From cloud service providers� perspective, profit is one of the most important considerations, and it is mainly determined by the configuration of a cloud service platform under given market demand. However, a single long-term renting scheme is usually adopted to configure a cloud platform, which cannot guarantee the service quality but leads to serious resource waste. In this paper, a double resource renting scheme is designed firstly in which short-term renting and long-term renting are combined aiming at the existing issues. This double renting scheme can effectively guarantee the quality of service of all requests and reduce the resource waste greatly. Secondly, a service system is considered as an M/M/m+D queuing model and the performance indicators that affect the profit of our double renting scheme are analyzed, e.g., the average charge, the ratio of requests that need temporary servers, and so forth. Thirdly, a profit maximization problem is formulated for the double renting scheme and the optimized configuration of a cloud platform is obtained by solving the profit maximization problem. Finally, a series of calculations are conducted to compare the profit of our proposed scheme with that of the single renting scheme. The results show that our scheme can not only guarantee the service quality of all requests, but also obtain more profit than the latter.
Keywords: Cloud computing, multi-server system, pricing model, profit, queuing model, server configuration service charge, service-level agreement, waiting time.
Abstract
Design and Implementation of Rank Based ACO approach for Multipath Routing Mechanism with Load Balancing in Ad hoc Network
Manjinder Kaur, Dr. Vinay Chopra
DOI: 10.17148/IJARCCE.2015.41295
Abstract: Ad-Hoc wireless networks are self-organizing multi-hop wireless networks. Ad-Hoc networks can quickly and inexpensively be set up as needed Therefore, they are highly applicable in many fields such as emergency deployments and community networking. Mobile ad hoc networks have some challenges like the design of an efficient routing protocol. The multipath routing protocol with load balancing provides a solution for the congestion network and increases its capacity. To consider that the use of multiple paths simultaneously for transmission data allows to improve the network performance, we propose a protocol LB-AOMDV (Load Balancing-AOMDV), a solution to achieve better load balancing mechanism. In this paper, we also apply the Ant Colony optimization technique to the routing problem, after that we apply a extension of ACO that is ranked based ACO approach. We refer to the new modified protocol as the LB-AOMDV Rank Based Ant Colony Optimization algorithm .The main goal in the design of the protocol was to reduce the routing overhead, response time, end-to-end delay and increase the performance.
Keywords: Ant Colony Optimization Algorithm; Ad-Hoc Networks; load balancing; AOMDV; LB-AOMDV; Rank Based-ACO-Approach.
Abstract
Performance Analysis of RCA – CSKA and CSA with Proposed Adder Cell
K. Samanna, M. Mahaboob Basha
DOI: 10.17148/IJARCCE.2015.41296
Abstract: In this work, 32-bit ripple carry adder, Carry Skip adder and Carry Save adder circuits have been proposed with ten transistor based one bit full adder. Lower area and high performance chips are the most important parameters in today`s VLSI designs. The minimum power consumption target and lower area can be meet by decreasing the hardware size and which is achieved by reducing the transistor count. Therefore the three designed circuits have been simulated by using Microwind 3.1 VLSI CAD tool. Various parameters such as area, power dissipation, propagation delay and PDP have been determined from layouts of feature size 90nm and 65nm technologies. The adder circuits have been analyzed using BSIM 4 parameter analyzer. Finally the simulation results were compared with conventional adders in terms of total power consumption, delay, area and power delay product.
Keywords: CMOS; Conventional Full Adder; Low Power design; 32-bit RCA;32-bit CSKA; 32-bit CSA.
Abstract
Digital Watermarking with DWT & DCT using Bit Plane Encryption
Ragini Sharma, Er. Surbhi Gupta
DOI: 10.17148/IJARCCE.2015.41297
Abstract: Cloud computing is a recent technology trending that help companies in providing their services in a scalable manner. Hence, used this service capabilities required many procedures in order to get better performance. Cloud computing environments allow customers to dynamically scale their applications. The key problem is how to lease the right amount of resources, on a pay-as-you-go basis. The objective of this paper was to present a comprehensive study about the auto-scaling mechanisms available today. Auto-scaling techniques are diverse, and involve various components at the infrastructure, platform and software levels. Many techniques have been proposed for auto-scaling. We propose a classification of these techniques into five main categories: static threshold-based rules, control theory, reinforcement learning, queuing theory and time series analysis.
Keywords: Cloud Computing, Auto scaling, Auto scaling techniques.
Abstract
Survey on Different Auto Scaling Techniques in Cloud Computing Environment
Pranali Gajjar, Brona Shah
DOI: 10.17148/IJARCCE.2015.41298
Abstract: Cloud computing is a recent technology trending that help companies in providing their services in a scalable manner. Hence, used this service capabilities required many procedures in order to get better performance. Cloud computing environments allow customers to dynamically scale their applications. The key problem is how to lease the right amount of resources, on a pay-as-you-go basis. The objective of this paper was to present a comprehensive study about the auto-scaling mechanisms available today. Auto-scaling techniques are diverse, and involve various components at the infrastructure, platform and software levels. Many techniques have been proposed for auto-scaling. We propose a classification of these techniques into five main categories: static threshold-based rules, control theory, reinforcement learning, queuing theory and time series analysis.
Keywords: Cloud Computing, Auto scaling, Auto scaling techniques.
Abstract
Survey of IP Traceback Mechanisms to Overcome DoS Attacks
Sowmya Gibish, Uday Babu. P
DOI: 10.17148/IJARCCE.2015.41299
Abstract: Denial of service attacks are becoming increasingly predominant and serious anonymity that these particular attacks affords the hacker provides no means for a victim to trace the attack. It is essential to protect the resource of the victims and trace the Denial of Service (DoS) attack, but distinguishing of normal traffic and DoS attack traffic is quite challenging because the DoS generally hide their origins. The technique of IP traceback is required to overcome Denial-of-Service attacks. Especially when the attacker�s uses incorrect or spoofed source IP address tracing the origin of the Denial of Service is hardest in internet. There are numerous techniques and methodologies are used to trace the DoS attacks. This paper presents several of the mostly used traceback techniques to resolve the problem. The main aim of this paper is to state the various traceback techniques of the DoS attack.
Keywords: IP spoofing, DoS, packet marking, packet logging, IP Traceback methods.
Abstract
Indian Musical Instruments Recognition Using LPC and LPI
Satish R.Sankaye, U.S.Tandon, S.C. Mehrotra
DOI: 10.17148/IJARCCE.2015.412100
Abstract: Most Significant Music Industry is today widely supported by Research in the area of Musical information Processing. In the past decade the growth of Digital Music over internet and our day-to-day life has forced researcher to explorethe diverse area of Musical Instrument Identification, Retrieval, Classification and Recognition of large sets of music. In our paper we have explored the ignored area of Indian Musical Instrument Recognition (IMIR) and attempted to build the database for the same. An innovative technique to classify the IMIR using the Modified Linear Predictor Coefficient (LPC) features and Log-Power-Intensity (LPI) is discussed. The proposed method has been tested with experimental results and technique has an accuracy of 96.11% for instrument and 92.45 for individual sound.
Keywords: Indian Musical Instrument Recognition, Linear Predictor Coefficient, Log Power Intensity, Music Instrument Identification, Principle component Analysis, Best First Decision Tree Algorithm
Abstract
A Decisive Mining for Heterogeneous Data
Prakash R.Andhale, S.M.Rokade
DOI: 10.17148/IJARCCE.2015.412101
Abstract: Heterogeneous data is the term concern with the data from any number of sources largely known, unknown, unlimited, and in many varying format. The heterogeneous data are now rapidly expanding in all technical, biological, physical and medical science with the help of fast development of storage system, networking and the collection in capacity of data. The paper presents the characteristics of HACE theorem which provides the features of heterogeneous data and proposes a model processing on heterogeneous data from the view data mining. This information extraction model involves the information extraction, data analysis and provides the security and privacy mechanism to the data.
Keywords: Data Mining, Information Extraction, Big Data, Heterogeneous Data, HACE Theorem.
Abstract
Steps of Human Iris Detection for Biometric Application
Mr. Rahul A.Patil, Mr.A.H.Karode, Mr.S.R.Suralkar
DOI: 10.17148/IJARCCE.2015.412102
Abstract: Day by day connectivity of person continues to spread across the world , therefore old security methods are very poor ,difficult and time consuming for this purpose world preferred new fastest and advanced , biometric technology which is easily accessible than ever before,genrelly this technology used in various e-security like the PIN on our phone, password of ATM etc. biometric technologies uses fingerprint, palm and full-hand scanning system, voice recognition, facial recognition systems, iris recognition technology, etc. In this paper briefly mention steps of iris detection for biometric technology and parameter is extracted with the help of Gabor filter.
Keywords: iris recognition, face recognition, Gabor filters etc.
Abstract
Audio Watermarking By Using Reversible Contrast Mapping (RCM)
Pandit Madhurima Rajendra, Swati Patil
DOI: 10.17148/IJARCCE.2015.412103
Abstract: In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of unauthorized distribution, as well as unauthorized tampering of copyrighted audio data is an important technological and research issue. Audio watermarking has been proposed as a solution to tackle this issue. The main purpose of audio watermarking is to protect against possible threats to the audio data and in case of copyright violation or unauthorized tampering, authenticity of such data can be disputed by virtue of audio watermarking. For this I propose a Reversible Contrast Mapping (RCM) which is a simple integer transform that applies to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the least significant bits (LSBs) of the transformed pixels are lost. The data space occupied by the LSBs is suitable for data hiding.
Keywords: Reversible Contrast Mapping (RCM), least significant bits (LSBs), audio watermarking.
Abstract
A Novel Enhanced Technique for PAPR reduction Using Weighted OFDM signal
CH. Nagaraju, Dr. Anil Kumar Sharma, Dr. M.V. Subramanyam
DOI: 10.17148/IJARCCE.2015.412104
Abstract: Simultaneously multiple carriers are using a transmission technique known as orthogonal frequency-division multiplexing (OFDM) for modulation. The OFDM based systems has spectral efficiency high and for inter symbol interference it is robust against, frequency selective fading channels. The signal get distortion due to the transmission of signal have high peak to average ratio is the main disadvantage of the system. At the receiver, to overcome drawback by removing weight with no distortion PAPR reducing scheme which is depends on OFDM signal which has weight is proposed. By forcing a weight on each OFDM signal which is discrete through a signal of certain kind which is band limited. Before a high power amplifier ( HPA) consider an OFDM signal which is formed with data of discrete weights, at the end of receiver the original signal can be collected completely, Meanwhile the time duration required to transmit the OFDM signal have weights is same as the original OFDM signal's time duration .Now we propose the effectiveness of the scheme through the evaluation of computer simulation results. By proposing new approach for the bit error rate (BER) analysis as well as propose a novel technique to mitigate PAPR and thereby increasing the performance of the multiple-input and multiple-output OFDM (MIMO-OFDM) system. It is observed that BER performance of the MIMO OFDM signal have weight is improved compared to clipping and filtering method this can be specified from the numerical results. This method has less PAPR value than the clipping and filtering method. Here the proposed method is simpler than that of the C and F method.
Keywords: Bit error rate, Convolution, Orthogonal Frequency Division Multiplexing (OFDM), peak-to-average-power-ratio (PAPR), weighted data.
Abstract
Recovery and Security in Distributed System
Ms. Gurpreet Kaur Sodhi
DOI: 10.17148/IJARCCE.2015.412105
Abstract: Distributed systems have immense practical value in our computerized world and have many applications, including scientific, engineering, commercial and industrial. However, by their very nature of interconnectedness, distributed systems are subject to security issues and failures. These issues must be adequately addressed through effective techniques and methods to correct these problems.
Keywords: Distributed systems, Security, Failures, Recovery.
Abstract
Estimation of CVD with reference to the People of North East India using Predictive Data Mining
Dulal Ch. Das, Prof. P.H. Talukdar
DOI: 10.17148/IJARCCE.2015.412106
Abstract: Now-a-days, many diseases are reducing the life time of the human. One of the major diseases is cardiovascular disease (CVD). It has become very common perhaps due to increasing busy lifestyles. The issue of health care assumes prime importance for the society and is a significant indicator of social development. Health is therefore best understood as the indispensable basis for defining a person�s sense of well-being. Data mining is the computer based process of analyzing enormous sets of data and then extracting the meaning of the data. Data mining tools predict future trends, allowing business to make proactive, knowledge-driven decisions. The delivery of health care services thus assumes greater proportion, and in this context the role played by information and communication technology has certainly a greater contribution for its effective delivery mechanism. Data mining tools can answer business questions that traditionally taken much time consuming to resolve. The huge amounts of data generated for prediction of CVD are too complex and voluminous to be processed and analyzed by traditional methods. Data mining provides the methodology and technology to transform these mounds of data into useful information for decision making. By using data mining techniques it takes less time for the predict on of the disease with more accuracy. In this paper we carry different experiments in which one or more algorithms of data mining used for the prediction of CVD. Result from using neural networks is nearly 100%. So that the prediction by using data mining algorithm given efficient results. Applying data mining techniques to CVD treatment data can provide as reliable performance as that achieved in diagnosing CVD.
Keywords: Cardiovascular disease (CVD), Data mining, Genetic algorithm, EM based cluster, Classification, CVD.
Abstract
Role of Syllabification for Intonation Model of Assamese Language
Parismita Sarma, Shikhar Kr. Sarma
DOI: 10.17148/IJARCCE.2015.412108
Abstract: Analysis of speech is important for identification of emotional state of person which has different parameters like pitch, formant frequencies, MFCC etc. These parameters are used for extraction of features from speech. For unit selection based text-to-speech system, syllabification acts as a backbone. Based on different structures of different languages syllabification rules also vary. The main aim of this study is to examine and analyze the syllabification rules for Assamese language. Here we are designing the syllabic structure to form the corresponding syllables of Assamese words which later can be integrated into a text-to-speech system.
Keywords: MFCC, formant frequency, pitch.
Abstract
ASCII Based Text Encryption and Decryption With Check For Data Integrity
Aniket Olkar
DOI: 10.17148/IJARCCE.2015.412109
Abstract: Data security is of high concern when it comes to data-transfer over the network. With increased attacks on the ciphertexts, the need to improve the ciphers has increased. Not only the data but also the key used for the cryptographic process needs to be secured as all the operations needed to retransform the ciphertext back to original plaintext depend on that key. These needs have led to many new algorithms for encryption as well as for key transfer mechanisms. In this paper, a method is proposed for improving encryption using various mathematical and logical operations and providing a check for data integrity.
Keywords: Cryptography, Symmetric Encryption, Randomness, Secure Key Transfer, Data Integrity.
Abstract
A Review on: ECG Signal Analysis Using Artificial Neural Network
Sangeetha S
DOI: 10.17148/IJARCCE.2015.412110
Abstract: The most difficult task in cardiovascular disease diagnosis is doing precise electrocardiogram analyses (ECG). In order to classify and interpret ECG data automatically, numerous studies are being carried out. Wavelet Packet Decomposition (WPD) and Feature extraction are used to decompose the patient's raw ECG data. Artificial Neural Networks (ANNs) are used to refine the classification (ANN). A unique approach for the automatic analysis of ECG data has been developed that successfully distinguishes between abnormal and normal ECG signals. This bio-electrical signal is used to record the heart's electrical activity over time, and is known as an electrocardiogram (ECG). Detecting cardiac illness early and accurately is critical to a patient's recovery and treatment. Cardiac illnesses are detected using ECG signals, which are obtained mostly from PhysioDataNet and the MIT-BIH database. Wavelet toolbox is used for pre-processing the ECG signal and also for feature extraction from the ECG signal. The whole project may be done in MATLAB. The algorithm's efficiency is measured using the MIT�BIH Database. In this paper we are reviewing technique of ECG signal analysis and classification.
Keywords: ECG, ECG signal analysis, ECG Signal Classification, ANN
Abstract
A study of RCS reduction using the designing of Chaotic Structures
Er. Tejasvi Thanvi, Er. Piyush Vyas, Prof. K. K. Arora
DOI: 10.17148/IJARCCE.2015.412111
Abstract: The main aim of this paper is to Design such a target so that there is least detection of it by the Radar system. For this we need to implement the strategies so that the RCS (Radar Cross Section) of the target is reduced to its minimum amount, the two types of reduction process we will be using are Stealth Technology and Materials & Absorption (Use of Radar Absorbent Materials). RCS reduction is chiefly important in stealth technology for aircraft, missiles, ships, and other military vehicles. With smaller RCS, vehicles can better evade radar detection, whether it be from land-based installations, guided weapons or other vehicles. The distance at which a target can be detected for a given radar configuration varies with the fourth root of its RCS. Therefore, in order to cut the detection distance to one tenth, the RCS should be reduced by a factor of 10,000. Whilst this degree of improvement is challenging, it is often possible when influencing platforms during the concept/design stage and using experts and advanced computer code simulations to implement the control options.
Keywords: RCS, advanced computer code, roots, land based installations, weapon vehicles.
Abstract
A Review on Multi-attribute Watermarking Technique for Relational Data
Ms. Vrushali B. Patil, Prof. P. M. Yawalkar
DOI: 10.17148/IJARCCE.2015.412112
Abstract: The Relational Databases contain the valuable information of various organizations and institutes. In the world of Information Technology and Internet Based services the Copyright protection or Ownership rights protection of Relational Database is critical issue. When data is used in collaborative environments for information extraction; consequently, they are vulnerable to security threats concerning ownership rights and data tampering. Due to unauthorized access to the data may change the originality it result in significant losses of the organization. Watermarking is used to protect the ownership rights of shared Relational Data and also providing the solution for tackling and tampering of data. Watermarking is most often used for images, audio, video etc. However, by considering the use of Relational Database in shared environment and its security, When Ownership rights are preserved using watermarking, the underlying data also gets modified; as a result of which, the data originality gets compromised.
Keywords: Watermarking, Ownership right protection, Data Recovery.
Abstract
An Improved Wormhole Attack Detection and Prevention Method for Wireless Mesh Networks
Virendra Dani, Vijay Birchha
DOI: 10.17148/IJARCCE.2015.412113
Abstract: In the wireless mesh networks, the key role is played by the routers thus most of security threats are occurred to breach routing functionalities. Therefore, number of different kinds of attacks are deployed in networks easily i.e. Black-hole, Wormhole, Gray-hole and many others. Most of the attacks are deployed in order to degrade the performance of overall networks or bypass the network traffic. Therefore the presented work is aimed to explore the issues and challenges to design a secure network communication for wireless mesh network. One of them is wormhole attack i.e. severe kind of security threats in WMN. The proposed work is locates the wormhole link in network and tries to recover the network performance during the attack conditions. Thus, the scheme detects the malevolent nodes and prevents formation of wormholes. The Proposed mechanism based on two phase solution. In first phase the threshold value is computed using the different routing scenarios, the threshold value usage the network transmission delay in network and in second phase the threshold value is used to identify the malevolent link in the network. The implementation of the proposed concept is provided using the Ad-hoc on Demand Distance Vector routing protocol modification in network simulator 2 i.e. NS-2.
Keywords: WMN, AODV, Attacks, NS-2, Security, Routing.
Abstract
Survey on Recapture Detection Algorithms
Mr. Vinayak K. Shingote, Prof. Ashish Kumar
DOI: 10.17148/IJARCCE.2015.412114
Abstract: With the development of multimedia technology and digital devices, it is very easier to recapture image of high quality from LCD screens and the use of such recapture image in authentication can be harmful. An attacker may choose to recapture a forged image in order to hide imperfections and to increase its authenticity. To do forensic analysis of such images for evidence is very important. So detection of recapture images from set of images is very important in this case. In this paper we did survey of various recapture image detection algorithms with their pros and cons. Also we studied various features like aliasing, blurriness etc. of recaptured images, which can differentiate recapture image from original one.
Keywords: Multimedia Technology, LCD, Image Forensic, Recapture Detection, Aliasing, Blurriness.
Abstract
Calvarial Bone Segmentation from Medical Images by Image Processing Technique
K. Prahlad Rao
DOI: 10.17148/IJARCCE.2015.412115
Abstract: In a given image, it is possible to extract only the required data from the intact image. This is known as image segmentation and is considered as one of the important image processing technique. Several algorithms do the segmentation on images but Watershed method, which is based on natural phenomenon of water flow in lakes, is attracting large number of researchers due to its fast action, simple algorithm to implement in computer and versatile for twin images too. The morphological watershed image segmentation is implemented on MRI images to extract calvarial bone (skullcap) from the scans. It is useful for evaluation of calvarial lesions, calvarial bone grafts and calvarial bone fractured patients that could help in diagnosis and treatments. The results are demonstrated and the method is explained. Applicability of the method for the calvaria related abnormalities are discussed.
Keywords: Watershed image segmentation; calvarial bone; Brain; MR imaging; Matlab.
Abstract
Combining Apriori and FP Growth algorithms with Simulated Annealing for Optimized Association Rule Mining
Manoj Ganjir, Jharna Chopra
DOI: 10.17148/IJARCCE.2015.412116
Abstract: Association rule mining is the process of finding frequent patterns and associations between set of objects from information repositories. Finding optimized techniques for generating association rules from large repositories has become a major area of study. Apriori algorithm is a simple algorithm which is used for mining frequent item sets. The FP-growth algorithm on the other hand works as a solution to the problem for long frequent patterns to searching for shorter ones recursively. The output of FP-Growth is a FP Tree in the end. The current work focuses on using Simulated Annealing technique on both algorithms for optimized Association Rule Mining. The results have been also discussed in the end and analysis has also been generated.
Keywords: Apriori, FP-Growth, Simulated Annealing, Minimum Support, Minimum Confidence.
Abstract
Internet of things: A Survey on Architecture, Applications, Security, Enabling Technologies, Advantages & Disadvantages
Farheen Fatima, Batul Naeem Husain, Mohammed Azharuddin, Mohammed Abdul Mabood
DOI: 10.17148/IJARCCE.2015.412117
Abstract: Internet of Things (IoT) is the emerging trend in the field of Technology. This technology has the potential to revolutionize the way of living in future. It represents the first true evolution of internet. Internet of Things (IoT) aims to connect intelligent communicating �things�, which are assigned an IP address, to internet and makes one thing to communicate with other thereby providing remote sensing and control. IoT devices are ubiquitous, context-aware and enable ambient intelligence .It opens door to endless opportunities which might have great impact on our lives. This article reports on the current state of research on the Internet of Things by examining the architecture, applications, security, technologies, advantages and disadvantages of Internet of Things (IoT).
Keywords: Internet of Things, RFID, Microsoft Azure, Zigbee, Cloud computing.
Abstract
MX-TCP and HS-TCP as Possible Options to Overcome TCP Limitations in Multi-Hop Ad-Hoc Networks
Aniket Deshpande, Dr. Ashok Kaushal
DOI: 10.17148/IJARCCE.2015.412118
Abstract: The Transmission Control Protocol is the most widely-used protocol on the internet and the rapidly growing wireless networks. However, it raises a number of issues within an ad-hoc network. It has to deal with new tough challenges such as disconnection and route failures due to mobility congestion and channel loss. In order to adapt TCP to this demanding paradigm, some improvements have been made. These challenges led to the development of High Speed Transmission Control Protocol (HS-TCP) and the Maximum Transmission Control Protocol (MX-TCP).
Keywords: Ad-Hoc Networks, HS-TCP, MX-TCP, Multi-Hop Wireless Networks.
Abstract
Developing an Enhanced Fusion Model to Classify Biomedical data
Santosh Kumar Satapathy, Avaya Kumar Ojha, Elina Patnaik
DOI: 10.17148/IJARCCE.2015.412119
Abstract: Classification is the technique where we discover the hidden class level of the unknown data. Multiple classifier fusion system needed to fuse the answers of several classifiers to enhance the accuracy. Here the proposed model will use each classifier for every individual data. In this paper, we have used principal component analysis to deal with issues of high dimensionality in biomedical classification. We have implemented three types of classification technique on micro array data after reduction. Eighty percent of data has been taken for the training and twenty percent for the testing. We have also implemented and compared three classification methods on the data like Multi Layer Perceptron, FLANN and PSO- FLANN and from the analysis; it has been observed that MLP has given better result. In this paper, we have also proposed a model for classifier fusion where the model will choose the relevant classifiers according to the different region of data set.
Keywords: Principal Component Analysis; Classification; Classifier fusion.
Abstract
Survey on Sketch Based Image Retrieval
Dipika R. Birari, Prof. J.V. Shinde
DOI: 10.17148/IJARCCE.2015.412120
No abstract available.
Abstract
Review on Domain Specific Bug Triage with Software Data Reduction Techniques
Supriya B Boraste, P.B. Koli
DOI: 10.17148/IJARCCE.2015.412121
No abstract available.
Abstract
Survey on Tweet Summarization Approaches
Prashant S. Bagade, Prof. S. A. Shinde
DOI: 10.17148/IJARCCE.2015.412122
No abstract available.
Abstract
Li-Fi: Light Fidelity Technology-A Review
Er. Amritpal Singh
DOI: 10.17148/IJARCCE.2015.412123
No abstract available.
Abstract
Survey on Buddy Analytics Based on Social Media
Mangesh U. Sanap, Prof.V.S.Phad
DOI: 10.17148/IJARCCE.2015.412124
No abstract available.
Abstract
Workload Distribution Technique in Virtualized Data Center Using Consolidation and Migration
Tejashwini Y. Bhamare, Prof. B R. Nandwalkar
DOI: 10.17148/IJARCCE.2015.412125
No abstract available.
Abstract
One Drive Master
Khaleel Alkandari, Meshal Aldhamen
DOI: 10.17148/IJARCCE.2015.412126
No abstract available.
Abstract
Survey on Hybrid Multigroup Co-clustering Using Collaborative Filtering Model
Mr. Pramod Kale, Prof. M. R. Patil
DOI: 10.17148/IJARCCE.2015.412127
No abstract available.
Abstract
Channel Estimation and PAPR Computation for MIMO-OFDM Systems
Palla Parasuram Yadav, R.S.K. Vaibhav, Prof. R.V.S. Satyanarayana
DOI: 10.17148/IJARCCE.2015.412128
Abstract: In this paper, we are reducing the PAPR for the existing method which estimates the channel parameters like in-phase and quadrature-phase imbalances (IQI), carrier frequency offset (CFO) through channel response for multiple-input multiple output orthogonal frequency division multiplexing (MIMO-OFDM) systems. By utilizing a new concept called channel residual energy (CRE), without finding the channel response we can estimate both the IQI and CFO by minimizing the CRE. The proposed method single carrier-frequency division multiple access (SC-FDMA) reduces the PAPR approximately equal to one.
Keywords: IQI, CFO, MIMO-OFDM, CRE, channel response, PAPR, SC-FDMA.
Abstract
Surveying Wormhole Attack and Their Different Existing Detection Techniques
Niharika Shrivastava, Prof. Tilotma Sharma
DOI: 10.17148/IJARCCE.2015.412129
Abstract: In recent scenario, as the technology increasing communication and computing service are in demand, these services are operating under MANET. MANET is a self organizing wireless network which required more security than other networks. In wireless network the probability of attack is very high and in MANET security becomes one of the major issues of this type of network. Among several type of attack, wormhole attack is one of the most threatening and severe attack in routing. In wormhole attack it establish a tunnel shaped link between the network in which one malicious node will transfer packet from tunnel to another malicious node in a network and replays them locally .to prevent and detect this attack many researchers have proposed the solution and methods for attack. This paper will focus on the different aspects of the prevention and detection technique of wormhole attack.
Keywords: MANET, Wormhole Attack, Detection Technique.
Abstract
Design and Implementation of IRTIV: Intelligent Routing protocol using real time Traffic for Mobile Ad Hoc Networks
Mrs. Mala kalaiarasi, Mrs. S.seedhana devi
DOI: 10.17148/IJARCCE.2015.412130
Abstract: Wireless networking is an emerging technology that will allow users to access information and services regardless of their geographic position. In contrast to infrastructure based networks, in wireless ad hoc networks, all nodes are mobile and can be connected dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in discovery and maintenance of routes to other nodes in the network. This feature presents a great challenge to the design of a routing scheme since link bandwidth is very limited and the network topology changes as users roam. This thesis investigates the behavior of existing traditional routing algorithms and proposes and implements a new routing approach for ad hoc wireless networks: IRTIV: Intelligent Routing protocol using real time Traf?c Routing. IRTIV: Intelligent Routing protocol using real time Traf?c Routing is similar to Link State routing, but uses a IRTIV: Intelligent Routing protocol using real time Traf?c technique to reduce the consumption of bandwidth by control overhead.
Keywords: DSRC, IRTIV MAC, Routing, Security, RSU, Vehicular communications, WAVE.
Abstract
Fine Grained Model Based Relevance Feature Discovery for Text Mining
S. H. Jadhav, P. B. Koli
DOI: 10.17148/IJARCCE.2015.412131
Abstract: For describing user preferences because of large scale terms and data patterns, it is a big challenge to guarantee the quality of discovered relevance features in text documents. Term-based approaches, most existing popular text mining and classification methods have adopted. However, they have all suffered from the problems of polysemy and synonymy. Yet, how to effectively use large scale patterns remains a hard problem in text mining, over the years, there has been often held the hypothesis that pattern-based methods should perform better than term-based ones in describing user preferences; This paper presents an innovative model for relevance feature discovery, to make a breakthrough in this challenging issue. As higher level features and deploys them over low-level features (terms), it discovers both positive and negative patterns in text documents. On their specificity and their distributions in patterns, it also classifies terms into categories and updates term weights.
Keywords: Text mining; text feature extraction; text classification;
Abstract
Impact of Aerosols in the Atmosphere using Mie Scattering
G. Swetha, Dr. S. Varadarajan, Dr. Amit Parashuram Kesarkar
DOI: 10.17148/IJARCCE.2015.412132
Abstract: The microwave radiations are radiated by artificial satellites revolving around the earth in low earth orbit are attenuated by various gases , particles , clouds, temperature and rain pattern in the atmosphere etc. In this paper the attenuation of microwave radiations were observed through scattering and absorption by spherical particles using Mie-scattering theory. The optical characteristics of an ensemble of spherical particles were also determined by using Scattering and Absorption of Aerosol Particles.
Keywords: Mie scattering, optical characteristics, Aerosol Particles, Scattering and Absorption.
Abstract
Improved ALPR system based on Smart License Plate Character Detection Algorithm
Rohollah Mazrae Khoshki, Subramanian Ganesan
DOI: 10.17148/IJARCCE.2015.412133
Abstract: This paper presents improved Automated License Plate Recognition (ALPR) system based on Smart License Plate Character Detection algorithm, this system is capable of distinguishing license plates under various conditions, such as distance from the camera, rotation angle between camera and vehicle and poor illumination condition (different weather condition, different lighting condition and physical tilted or damage of license plate). In our method, improved ALPR system has three main steps: 1) Image Enhancement, 2) Character Segmentation (Smart License Plate Character Detection), 3) Character Recognition. While in regular ALPR system there are four main steps: 1) Image Enhancement, 2) License Plate Location Extraction 3) Character Segmentation, 4) Character Recognition. In image enhancement introduce Multi-Scale Adaptive NICK thresholding method [1] to achieve all objects as character candidates in the binary image; otherwise we might lose license plate characters in an input image due to complex backgrounds. Single Pass Connected Component Labelling (CCL), put the label on detected objects then new design algorithm called �Smart License Plate Character Detection� finds the license plate characters regardless of location, shape and background colour of license plate. So we eliminate the license plate location extraction as complex and time consuming individual stage [16]. All the steps simulated in Matlab 2014A software and results show the accuracy and reliability of this proposed method.
Keywords: ALPR system, Connected Components Labelling (CCL), Character Segmentation, Character Recognition, Multi-Scale Adaptive NICK thresholding Method, Smart License Plate Character Detection.
Abstract
Performance Measurement of Refinding Queries in Context
Sayyad F S, Prof. P.P. Kalyankar
DOI: 10.17148/IJARCCE.2015.412134
Abstract: In this paper we are measuring the performance of refinding queries that contains the information retrieval for Personal Information Management System. When user needs the already searched web pages repeatedly then this search engine provides the user interface for saving the title and the web page URL for reference .In this keyword and related web pages are stored we can refind needed. Also search engine contains the association and clustering of context instances.
Keywords: context instances, Personal Information Management, refinding queries, SVM.
Abstract
Personal Cloudlets: Implementing a User-Centric Datastore with Privacy Aware Access Control for Cloud-based Data Platforms
Nauman Birwadkar, Mrs. Monali P. Deshmukh, Apoorva Arbooj, Suraj Todkari, Priya Agarwal
DOI: 10.17148/IJARCCE.2015.412135
Abstract: This paper presents OPENi�s Personal Cloudlets framework as a novel approach to enhancing users control and privacy over their data on a data driven, cloud-based platform. We introduce the EU FP7 funded project OPENi, the OPENiconcept, and the research objectives that influenced the design and implementation of OPENi�s Personal Cloudlet Framework. We outline OPENi�s architecture and describe how through the use of REST based endpoints, object-based access control, OPENiTypes, and stateless JSON Web Token (JWT) it allows users share, reuse, and control access to their data across many mobile applications while maintaining cloud scalability. Furthermore we describe how a number of the Personal Cloudlet Framework�s features enhance a users privacy and control, including: the User Dashboard, the Privacy Preserving Data Aggregator, and the fine grained access control mechanism.
Keywords: Personal Cloudlet, OPENi, Cloud Security, User Centric.
Abstract
Survey on Crowd Escape
Aniket Patil, Prof. S.A. Shinde
DOI: 10.17148/IJARCCE.2015.412136
Abstract: In computer vision and cognitive science field an automated scene analysis has been a topic of great attention. The techniques used for behavior analysis in computer vision, are mostly targeting individuals behavior. In recent times, crowd phenomena gained the popularity in the real world, thus crowded scene analysis has attracted much attention. Most of the people get panic when unexpected events occur in public as well as private places. The modeling and analysis of the crowd surveillance videos is an issue that exists due to the unconstrained behaviors observed. In the last few years, research on crowded scene analysis is going on, covering various aspects such as crowd motion pattern learning, crowd behavior and activity analysis, and anomaly detection in crowds. In various papers the problem of crowded scene analysis is addressed. To automatically identify crowd behaviors in surveillance videos, many computer vision methods have been applied to crowd behavior analysis.
Keywords: Crowded scene analysis, Video Surveillance, Crowd Behavior, Crowd Motion, escape and non-escape activity.
Abstract
Design of Linear Feedback Shift Register using Reversible Logic
Sree Ramani Potluri, Lipsa Dash
DOI: 10.17148/IJARCCE.2015.412137
Abstract: Reversible logic is playing an important role in research areas and has found its applications in low power CMOS VLSI, Nanotechnology and Quantum computation. Recently, several researchers have focused their efforts on the design and synthesis of efficient reversible logic circuits. LFSR�s are attractive structures in the area of digital system testing and fault tolerant computing. In this work, we present designs of reversible LFSR using D flip flops with asynchronous set/reset. The comparison of proposed design is done in terms of the quantum cost, delay and garbage out puts. The important reversible gates used for Reversible logic design are Feynman gate, Fredkin gate, Toffoli gate, SAM gate etc.
Keywords: Low-power VLSI, Low-power CMOS design, reversible logic, LFSR.
Abstract
Co-tier and Cross- tier Interference Mitigation in LTE based Femtocell Network using CASFR Scheme
Reshma Khandare
DOI: 10.17148/IJARCCE.2015.412138
Abstract: One of the effective techniques of improving the coverage and enhancing the capacity and data rate in cellular wireless networks is to reduce the cell size and transmission distances. Long Term Evolution (LTE) has developed small cellular base stations called femtocells that can dramatically improve voice and data coverage for the indoor subscribers. Therefore, the concept of deploying femtocells over macro cell has recently attracted growing interests in academia, industry, and standardization forums. Various technical challenges towards mass deployment of femtocells have been addressed in recent literature. However, the inter- and intra tier interferences in such systems can significantly reduce the capacity and cause an unacceptably high level of outage. In this paper we propose a scheme which mitigates co-tier as well as cross tier interference using cluster aware soft frequency reuse scheme. That assigns distinct set of Physical Resource Blocks (PRB)s to each interfering femtocells. The scheme first uses periodic messages from the femto-user (FUE) to identify the interfering femtocells. It then divides each femtocell area into cell-center and cell-edge. Finally, it uses the CASFR algorithm to assign un interfering sets of PRBs to the cell-center and cell-edge users of all the interfering femtocells Same process is followed by macrocells. The proposed interference mitigation scheme for femtocell networks offers significant performance improvement over the existing methods by substantially reducing the co-tier and cross-tier inferences in the system.
Keywords: Physical Resource Blocks (PRB), Femto-user (FUE), Inter-cell interference (ICI), PRB Swapping and Exchange (PSE).
Abstract
Design of A Novel Low Power Dynamic Comparator Using 90nm CMOS Technology
Binu C. Pillai, Binoshi Samuvel
DOI: 10.17148/IJARCCE.2015.412139
Abstract: This paper describes design of a low power dynamic comparator which can be used in the implementation of high speed ADC. It uses a dual input single output differential amplifier as a latch stage instead of a back to back inverter. This design efficiently removes the noise at the input. Compare to existing comparators this proposed model has higher speed, lower power dissipation and higher immunity to noise. The schematic simulation has been done in Cadence� Virtuoso Analog Design Environment using GPDK 90nm technology. The layout has been done in Cadence� Virtuoso Layout XL Design Environment.
Keywords: CMOS, Comparator, Cadence, Latch.
Abstract
A Review on High Speed CMOS Counter Using Altera MAX300A
Bindu Sebastian, Dr. Vineeth Valsan, Paulin John
DOI: 10.17148/IJARCCE.2015.412140
Abstract: Counters are widely used as essential building blocks for a variety of circuit operation. This paper present a high-speed wide-range parallel counter that achieves high operating frequencies through a state look-ahead methodology .It is a synchronous counter in which all modules are triggered at the same clock edge. The state look-ahead path prepares the counting path�s next counter state prior to the clock edge such that the clock edge triggers all modules simultaneously, thus propagation delay is avoided. The advantages for this counter is using only three module types it can be expanded to N-bit counter. Secondly there is no fan-in or fan-out increase. And the propagation delay can be minimized thus operating frequency can be improved.
Keywords: Counting path, state look � ahead logic, operating frequency, chip area.
Abstract
A Wireless Approach towards Medical Surveillance System
Deepa D. Waingade, Meena S. Chavan
DOI: 10.17148/IJARCCE.2015.412141
Abstract: Here this system comes with new point of view towards surveillance system, which is multifunctional wireless medical surveillance system using very useful device FPGA. This system mainly based on radio frequency, GSM, wireless communication protocol and FPGA. This system accepts real time parameters like temperature, Pressure, heart beat pulses. It can be transmitted through base station to community hospital or expert system. Doctor can also touch up with help of web or PDA. At every moment it is not possible for patient to go to the hospital and take a service. Here we are introducing a system that helps in taking care of patient by them as well as doctor. Here not only patient can measure parameters related to body but also they can see it with help of internet. At the same interval hospital and doctor can also touch up with patients� health updates and they can give related instruction after they come to dignose. The system which we have made helps patients to take care of them. Here in this project we are using sensor that is heart beat sensor to sense heart beat pulses. Output of the sensor is given to ADC from where we get digital output for our FPGA. Here FPGA is heart of this system which takes data, analyze it, process it, calculate result and also display the same. It can take corrective action in case of output when it is above and below threshold. FPGA output is connected to wireless transmitter which is RF module transmitter with encoder. In our receiver section we have used wireless receiver whose output is connected to ARM and from there it is given to GSM modem from where message is send to doctor. When doctor is out door then with the help of GSM modem he or she can get message on the mobile. In our model we have used one heart beat sensor whose output is given to transmitter section and at the other end at the receiver we get messages on the mobile related to our heart bit sensor�s output.
Keywords: GSM, Wireless, RF, FPGA.
Abstract
A survey of Web Service Recommendation Techniques based on QoS values
Ashwini Puri, Mansi Bhonsle
DOI: 10.17148/IJARCCE.2015.412142
Abstract: Web service recommendation has become a hot yet fundamental research topic in service computing. The most popular technique is the Collaborative Filtering (CF) based on a QoS values. With increasing presence and adoption of Web services on the World Wide Web, Quality-of-Service (QoS) is becoming important for describing nonfunctional characteristics of Web services. Several approaches to web service selection and recommendation via collaborative filtering have been studied, so here we are going to do survey of these techniques with pros and cons of techniques. Also based on these reviews we are going to propose a new technique to predict web service selection based on known and unknown QoS values which we explain in our future work.
Keywords: Web Service, Service Computing, Collaborative filtering, QoS values.
Abstract
EEG signals and wireless transfer of EEG Signals
Md Belal Bin Heyat, Shaguftah, Yassir. M. Hasan, Mohd Maroof Siddiqui
DOI: 10.17148/IJARCCE.2015.412143
Abstract: The full form of the EEG signal is Electroencephalogram. EEG signal is discovered by 1300 years. Electroencephalogram is fully computerized arrangement. EEG appliances are made in many outfits, electrodes & memory. Its work as combination of neuroimaging structures i.e. FMRI. Bio potential generates neural activity of brain is known as Electroencephalogram. The many EEG wave are used in the system like alpha wave, beta wave, gamma wave, theta wave and delta wave. All waves are work as different-different amplitude, frequency & location. The time frequency analysis of the EEG signal is done by no of condition like time domain, single event, long time period etc. EEG signal are used in no of diseases like epileptic seizures, brain death etc. Wireless system are used in the electroencephalogram transmitted data through radio signal no wire are used. It�s done by fourth order Butterworth filter. Converting ADC to DAC using Atmel Atmega 1281 microcontroller. XStream-PKG-U USB used in wireless transmission of the EEG signal, X-CTU software is used in interfacing of the wireless system.
Keywords: EEG signal, Electroencephalogram, ADC, DAC, Atmel Atmega 1281 microcontroller, X-CTU.
Abstract
An Overview of Sleep and Stages of Sleep
Yassir. M. Hasan, Md Belal Bin Heyat, Mohd Maroof Siddiqui, Shafan Azad, and Faijan Akhtar
DOI: 10.17148/IJARCCE.2015.412144
Abstract: Sleep is a naturally life style of the zoological species like human, animals, birds, mammals, Reptiles etc. The some species sleep time eye is open & mostly eye is closed. Different-different species sleeping time is dissimilar. The human sleep timing is dissimilar to born to older adults. Sleep is not functioning properly i.e. many disease is generated i.e. Blood pressure & other sleep disorder. Sleep is measured in different-different signal i.e. EEG, EOG, EMG signal. The stages of sleep are measuring a wave, O wave, delta wave. Stages of sleep are basically in two part Non REM and REM stages.
Keywords: Sleep, Stages of Sleep, Non-REM stage, REM stage.
Abstract
A Review on Printed Monopole Antenna for UWB Applications
Kaushik Mandal
DOI: 10.17148/IJARCCE.2015.412145
Abstract: This paper presents a review work on printed monopole antenna. Different shapes of patch and ground plane to achieve ultra wide band (UWB), have been surveyed and summarized in this paper. Step rectangular, circular, octagon, U-shaped and step circular patches are used to achieve maximum impedance bandwidth ratio of around 15:1. On other side notched, saw tooth and rounded ground plane provides a maximum impedance bandwidth ratio of around 5.5:1. Trapeziform ground plane with a discone antenna provides maximum impedance bandwidth ratio of 23:1.
Keywords: Printed monopole antenna, Ultra wide band, impedance bandwidth ratio.
Abstract
Wideband Slot Loaded Compact Monopole Antenna
S. Das, S. Sinha, S. Kundu, S. Sen, S. Pal, Sk. S. Badsha, and K. Mandal
DOI: 10.17148/IJARCCE.2015.412146
Abstract: A wideband slot loaded compact monopole antenna is proposed. Five slots with different shape are embedded on the modified radiating patch. The proposed antenna provides a wide usable fractional bandwidth of 122% (5.3� 21.8 GHz). The designed antenna is extremely compact with overall size of 13.5 mm X 9 mm X 1.6 mm with a 50? feed line. Measured and simulated reflection coefficients vs. frequency plots are provided.
Keywords: Monopole antenna, wireless personal area network, ultra-wideband, rectangular patch.
Abstract
Mobile Ad-Hoc Networks: AODV Routing Protocol Perspective
Ayaz Ahmad, Mahfuzul Huda, Mohd Atif Kaleem, Rajendra Kr Maurya
DOI: 10.17148/IJARCCE.2015.412147
Abstract: In current years, an enormous research has been observed going on in the research field of Mobile Ad-Hoc Network (MANET). Despite of restricted assets in Mobile Ad Hoc Networks, to structure a proficient and consistent routing protocol is still a tough task. A more intelligent routing approach is required to proficiently use the restricted assets. Moreover the routing algorithms designed for conventional wired networks such as distance vector or link-state, does not level well in without wired situation. Routing approach in Mobile Ad Hoc Networks is a difficult work and has received a great amount of attention from area researchers and quality controller now a day. In this research paper tries to provide a general idea of the existing Mobile Ad Hoc Networks routing protocols their functionality and characteristics. Further, the protocols comparison is given depend upon the MANET routing information and methodologies on the basis of their routing decisions. This research will help the researchers and industry personnel to obtain an overview of the existing routing protocols and propose which one routing protocols could perform improved results with respect to unstable network situation.
Keywords: Mobile ad hoc Networks, AODV, routing protocols, MANET, Protocol comparison.
Abstract
Cooperative Black Hole Attack Detection: A Survey
Alphonsa George, Dhanya Narayan, Cincy Mary Sebastian
DOI: 10.17148/IJARCCE.2015.412148
Abstract: Mobile ad hoc networks (MANETs) are composed of a set of stations or nodes that communicating through wireless channels, without any fixed backbone support in which different nodes are allowed to join and leave the network at any point of time. MANETs are generally more vulnerable to information and physical security threats than wired networks, so security is a vital requirement in MANETs to provide secured communication between mobile nodes. Most of the routing protocols rely on the cooperation among the nodes for secure transmission due to lack of centralized administration. There is no general algorithm for security of principle routing protocols like AODV against various attacks. One of the most common attacks against routing in MANETs is the Black Hole attack. A black hole is a malicious node that uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this paper, we survey some attacks of MANET and compare the existing solutions to combat the single or cooperative black hole attack.
Keywords: MANET, Black Hole Attack, Wormhole Attack, Rushing Attack.
Abstract
Ultrasound Image Enhancement Using Laplacian Kernel Set
Mohit Samnotra, Akshay Girdhar
DOI: 10.17148/IJARCCE.2015.412149
Abstract: Biomedical imaging methods are very vital for health care services. The random noise in the biomedical images may cause critical damage to the patient. The aim of this thesis was to investigate the advanced restoration and enhancement filters, identify their merits and demerits and propose new filters to overcome the drawbacks of the existing filters. For this purpose kernel set based filters were applied to normal ultrasound image. The performance parameters such as signal to noise ratio (SNR), peak signal to noise ratio (PSNR), root mean square error (RMSE), mean absolute error (MAE), and Pearson correlation coefficient (PCC) have been estimated and compared.
Keywords: Ultrasound, Kernel set, Laplacian, SNR, PSNR.
Abstract
Comparative Performance Analysis of PostgreSQL High Availability Database Clusters through Containment
Le Quan Ha, Jeff Xie, Darrell Millington and Amgad Waniss
DOI: 10.17148/IJARCCE.2015.412150
Abstract: The enormous amount of data flow has made Relation Database Management System the most important and popular tools for persistence of data. While open-source RDBMS systems are not as widely used as proprietary systems like Oracle databases, but over the years, systems like PostgreSQL have gained massive popularity. High-availability database clusters (also known as HA clusters or failover clusters) are groups of computers that support server applications that can be reliably utilized with a minimum of down-time. This article is an attempt to set a benchmark of PostgreSQL high-availability databases in comparing the performance of same-containment keepalived-repmgr clusters against cross-containment HAProxy-PgBouncer clusters. The result shows that our cross-containment HAProxy-PgBouncer is still a significantly better performer with load balancing, healthcheck and its throughputs are improved from 0.346% to 9.454% in compared to keepalived-repmgr. Also we would like to present I/O activities and CPU usage percentages between the two kinds of PostgreSQL HA clusters.
Keywords: Altus cloud, cross containment, failover, HAProxy, healthcheck, high availability, keepalived, load balancing, PgBouncer, PostgreSQL, repmgr, repmgrd.
Abstract
Android Based Smart Water Pump Controller With Water Level Detection Technique
Souvik Paul, Mousumi Das, Anik Sau, Soumyadeep Patra
DOI: 10.17148/IJARCCE.2015.412151
Abstract: This study presents a technology of controlling water pumps using smart phones. A basic model of an android based application is proposed by which water pumps can be turned ON and OFF with the help of wireless radio transmitters and Wi-Fi router. The android app can run in Android OS version up to 6.0.1, i.e. Android Marshmallow. The paper briefly shows the connections between the required equipments. A future prospect to integrate the app with support for controlling other electrical appliances is also reflected. The implementation of this proposal can be helpful to prevent wastage of water as well as wastage of electricity.
Keywords: Android operation system, Wi-Fi network, router, transceiver, methodology, application interface.
Abstract
An approach of hiding digital images combining the cryptographic and steganographic techniques
Maneesha Kumari, Anand Joshi
DOI: 10.17148/IJARCCE.2015.412152
No abstract available.
Abstract
Shape Base Image Retrieval
Ritika
DOI: 10.17148/IJARCCE.2015.412153
Abstract: Content based image retrieval (CBIR), a technique which uses visual contents to search images from the large scale image databases, is an active area of research for the past decade. It is increasingly evident that an image retrieval system has to be domain specific. In this paper, various edge detection method are discussed.Edges are detected in areas of the image where the intensity level fluctuates sharply, the more rapid the intensity change the stronger the edge[1]. A good edge detection stage makes the formation of extended boundaries and object recognition easier; errors due to a poor edge detector soon become magnified as more processing is performed, so care must be taken in choosing the right edge detector (or operator) for the job.In this paper, an efficient and robust shape-based image retrieval system is proposed. We use the Prompt edge detection method to detect edge points, which is compared with the Sobel edge detection method.
Keywords: Canny, Laplacian, Prewitt, Robert, Sobel.
Abstract
Two stage classifierfor Arabic Handwritten Character Recognition
Omer Balola Ali, Adnan Shaout, Mohammed Elhafiz
DOI: 10.17148/IJARCCE.2015.412154
Abstract: In this paper we will present a two phase method for isolated Arabic handwritten character recognition system. The new method combines two levels based on two classifiers, a public and a private according to the similar features among characters.In the first level, we built a public classifier to deal with all character groups, each group contains characters with overlapped feature. The public classifier classifies the charactersin the SUST-ARG dataset (Sudan University for Sciences and Technology Arabic Recognition Group) to specified groups. In the second level, we created a private classifier for each group to recognize and classify the characters within a group.The system was applied to 34 Arabic characters and achieved 78.79% recognition rate for the tested dataset within the first level of the grouping model andachieved 93% recognition rate for the tested dataset using the two level models.
Keywords: Isolated Handwritten Arabic character recognition, Back Propagation, feature extraction, classifiers combination, Artificial Neural Network.
Abstract
Centralized Approach to mutual Exclusion in Distributed Systems
Ashish Chauhan, B.K. Yadav, Kanupriya
DOI: 10.17148/IJARCCE.2015.412155
Abstract: Distributed System is a system in which hardware or software components are located at network, computer communicate and coordinate their action only by passing messages. Mutual exclusion is a mechanism in which concurrent access to shared resources by several user requests is serialized to secure the integrity of the shared resources. As the number of message exchanged is very crucial parameter for analysing the performance of any mutual exclusion algorithm the proposed algorithm reduces the number of messages exchanged less than 2*(N-1),where N is the number of sites in the system. The number of messages required to allow any site to enter critical section is reduced by using the centralized body. The centralized body has the centralised control over the entire system. Execution of sites in critical section will depend upon the value of their increasing order of their timestamp. All the sites directly communicate with the centralized and the entire algorithm executed as per directions of centralised body.
Keywords: Distributed System, Critical Section, Token, Non-Token, Mutual Exclusion.
Abstract
Confabulation – Inspired Association Rule Mining for Rare and Frequent Itemsets
K. Jayakumar, Mrs.N. Tamilselvi
DOI: 10.17148/IJARCCE.2015.412156
Abstract: Data mining techniques are methods for obtaining useful knowledge from these large databases. One of the main tasks of data mining is association rule mining (ARM), which is used to find interesting rules from large amounts of data. A new confabulation-inspired association rule mining (CARM) algorithm is proposed using an interestingness measure inspired by cogency. Cogency is only computed based on pairwise item conditional probability, so the proposed algorithm mines association rules by only one pass through the file. The proposed algorithm is also more efficient for dealing with infrequent items due to its cogency-inspired approach. The problem of associative classification is used here for evaluating the proposed algorithm. This paper evaluates CARM over data sets. Experiments show that the proposed algorithm is consistently faster due to its one time file access and consumes less memory space than the Conditional Frequent Patterns growth algorithm. In addition, statistical analysis reveals the superiority of the approach for classifying minority classes in unbalanced data sets using dynamic transaction datasets.
Keywords: Data mining, Association rule mining, confabulation, cogency, frequent patterns item.
Abstract
Ambient Assisted Living using Sensor and Mobile Technologies for Elderly People
Md. Badruduja Bhuiya
DOI: 10.17148/IJARCCE.2015.412157
Abstract: The emergence of ambient-assisted living (AAL) tools is a blessing for the human society, nowadays, with the innovative smart sensors and mobile technologies. These ICT-based products, services and systems are increasing the quality of life, autonomy, participation in social life, skills and employability of older adults, and reducing the costs of health and social care. Moreover, monitoring the daily routines and activities of elderly people and thus help them to avoid being unwell subside the load on the patient monitoring. In this paper we propose and design a system which includes smart sensors and mobile technologies to monitor daily routines of elderly people and to report the career any atypical event. Our designed AAL Communication system not only provides efficient monitoring services but also opens new commercial opportunities through the use of information and communication technology. In addition, the proposed system is robust, economical, and secured.
Keywords: AAL, APK, WLAN, Android SQLite.
Abstract
Intrusion Detection System for Android Smartphone in Cloud Environment
Anirudha A. Kolpyakwar, Prof. Pragati Patil
DOI: 10.17148/IJARCCE.2015.412158
Abstract: Cloud computing is primarily being use for eliminating the need of local information resources. The ability of cloud offers vast variety of services on web. As Smartphone usage has been continuously increasing in recent years, but due to its complexity and functionality, they are also susceptible to the attacks such as virus, Trojans and worms. The smart phones have inadequate storage, processing and computational power to execute highly complex algorithms for intrusion detection and implementing signature based attack detection. In this paper, different system architecture for a cloud based intrusion detection. This architectures offers security against any misbehavior in network. This analysis on the emulated device includes running multiple detection engines in parallel, memory scanners and system call inconsistency detection that generate responses in event of attack.
Keywords: Android Smartphone, Cloud Computing, Intrusion Detection.
Abstract
Comparison between Local Binary Pattern and Ch109ain Code Techniques for Image Retrieval using Sketches
P. Chandana, P. Srinivas Rao, Y. Srinivas
DOI: 10.17148/IJARCCE.2015.412159
Abstract: The paper compares two Sketch Based Image Retrieval schemes used for the image retrievals. The various schemes for image retrieval are Local Binary Patterns (LBP), and Chain Code. In Local Binary Patterns (LBP), it describes the neighborhood of a pixel by its binary derivatives. To form a short code to describe the pixel neighborhood the binary derivatives are used. For pattern recognition the patterns are often used. In Chain Code Technique, it recognizes the shape of the object using contours as a feature to recognize the shape of an object. Contours play an important role in image processing and computer vision to detect various objects in image or sketch which is easy to implement.
Keywords: LBP, Chain Code, binary representation, countour.
Abstract
Automated Question Paper Generator System
Mojitha Mohandas, Aishwarya Chavan, Rasika Manjarekar, Divya Karekar
DOI: 10.17148/IJARCCE.2015.412160
Abstract: This is a challenging era due to the growth in the field of computer science and demand we are facing today. Hence examinations play a vital role in testing student�s performance. And that is why it is important to have a smart development question model for growth of students as well as to test their learning skills thereby keeping a check on student performance. Generating an effective question paper is a task of great importance for any educational institute. The traditional method, where lecturers manually prepare question paper, it is very tedious and challenging. Hence, with the help of this technical paper we present the solution in form of Automated Question Paper Generator System (AQPGS) which makes use of Fuzzy algorithm. It is made to allow universities to generate question papers with random but even questions to cover most chapters of subject with difficulty level within seconds and mail them to colleges instantly.
Keywords: Fuzzy logic, question paper generator, classical method, ASP.NET, SQL, Examination.
