VOLUME 5, ISSUE 1, JANUARY 2016
Study of Authorized Data Deduplication Methodology to Achieve Security in Hybrid Cloud
Priyanka Bhopale, A.M. Kanthe
Refinement in Captcha as Graphical Password using Image Grid Techniques
Puja Mashalkar A, Mate Rutuja N, Pawar Vaishali B, Setia Pooja R, Minal Shahakar
CARP: CAPTCHA as A Graphical Password Based Authentication Scheme
Shraddha S. Banne, Prof. Kishor N. Shedge
A Comprehensive Study of Channel Equalization Techniques in MIMO-OFDM Systems
Lipsa Dash, Sree Ramani Potluri
A Literature review on Cyber Forensic and its Analysis tools
Mandeep Kaur, Navreet Kaur, Suman Khurana
A Comparative Analysis of Image Interpolation Algorithms
Mr. Pankaj S. Parsania, Dr. Paresh V. Virparia
A New Feature Selection Method for Oral Cancer Using Data Mining Techniques
Mrs. R. Vidhu, Mrs. S. Kiruthika
Prediction of Coastal Upwelling Using Remote Sensing
Ms. R. Priya, Ms. R .Ranjani, Ms. M. Thamizharasi
Row into Column Modify Stegano-algorithm
Rupali Jain, Jayshree Boaddh
Performance Analysis of AODV Routing Protocol in MANET
Utpal Barman, Neelpawan Kalita
Dehazing Algorithm Using Wavelength Compensation to Improve Visibility in Foggy Images
Sreedhar Rajput
Cloud Security Using Multilevel Encryption Algorithms
Miss Shakeeba S. Khan, Prof. Ms. R. R. Tuteja
Performance Review System – An ERP Application with Secure Data Storage and Cloud Backup
Aniket Olkar, Nachiket Deo, Vibhav Deo, Prashant Patil
Survey on Segmentation of Brain Tumor: A Review of Literature
Ashima Anand, Harpreet Kaur
An Improving Web Page Ranking based on Visit of Links with Time Factor and Cursor Movement Algorithm
Bharat Bhushan Agarwal, Dr. Mahmoodul. Hasan Khan
Requesting for Custom Denomination in Automatic Teller Machine Withdrawal
K. Navatha, Naga Durga Saile.K, E. Soumya
A Study of Handwritten Character Recognition Techniques
Ravleen Kaur Chadha, Neeraj Mehta
A Review of Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System
Mrs. Sunayana Sutar, Prof. Ashish Zanjade
Cloud Computing with Data Confidentiality Issues
Dr. S. S. Manikandasaran
Meter Reading Application for Android Based Handheld Device
Mayur Suryawanshi, Aditya Nikam, AjayKumar Gajengi, Dakshata Waje
Secure Virtualized Multi Tenancy Architecture in Cloud Computing using H-SVM
Sowmiya.N.D, Shanthi.S
A Novel Technique for Link Recovery in Energy Efficient DRINA Protocol for Wireless Sensor Network
Mankirat Kaur, Anjana Sharma, Bhupinder Kaur
Spectrally Efficient Frequency Division Multiplexing in LTE Downlink
Buthaina M. Omran, Hajer S. Mohammed Redha
A review on Intrusion Detection system in WSN
Manoj Kumar Gupta, Lokesh Singh
A Certificate Less Active Key Management in Dynamic Wireless Sensor Networks
Priyanga Ancy.G, Narmadha.C
A Review on Advanced Mechanism in Learning and Recognition of Ops from Weakly Labeled Street View Images
Vaishali A. Mahale, Prashant M. Yawalkar
Review on Memory Recall via Image Processing Intelligent Using Social Contacts Based on Eigen Value Implementation
Miss. Snehal S. Gulhane, Prof. A. S. Kapse
Distance based Energy Efficient Routing Protocol in Mobile Ad hoc Networks
Shashank S. Tolye, Manohar S. Chaudhari
An innovated method using Failure mode and effects analysis for improving quality of the software
Dr.V.Sangeetha., M.Sc., Mphil, P.Saravanan
A New Partitioning Algorithm to Enhance Performance of SOAP Message Security Processing
Nidhi Arora, Savita Kolhe, Sanjay Tanwani
Text Based Video Indexing and Retrieval Using DLER Technique
Sneha S. Kapse, Prof. Salim Chavan, Prof. Pravin Kshirsagar
Performance Analysis of Current Ratio under Different Dielectric Constant for Carbon Nanotube Field Effect Transistor
Md. Moshiur Rahman, Md. Motiur Rahman Sagar, Shafkat Tasnim, Mohammad Farhan, MD. Tahmidur Rahman
An Energy Monitored and Route Coded Based Wireless Sensor Network for Assurance of Quality of Service
Amruta Padhye, Shraddha Panbude
Advanced Cloud Security using RSA and variable length OTP with mixture of numeric, alphanumeric and special character
Rahul Karmakar, Samrat Banerjee, Anirban Ray
Optimizing Whole Test Suite Generation
Dr.V.Sangeetha, T.Ramasundaram
A Survey on Secure Data Discovery and Dissemination to Improve the Lifetime for Wireless Body Area Networks
A. Karthika Devi, Msc, Mr. M. Sengaliappan MCA., M. Phil., ME.,
ECG Signal Denoising With Non Local Means Filter
Navneet Kaur, Neetu
Enhanced Features of Neighbor Aware Multicast Routing Protocol
M. Selvi, R. Balakrishna
Study and Comparative Analysis of Basic Pessimistic and Optimistic Concurrency Control Methods for Database Management System
Jaypalsinh A. Gohil, Dr. Prashant M. Dolia
Sketch Based Image Retrieval System
Sarita Kharote, Dipali Patil, Kalyani Mahal., Jyoti Kangane, Prof. M.T. JAgtap
Lossless Data Compression Based General Tree Based Routing Protocol
Manpreet Kaur, Er. Varinderjit Kaur, Dr. Naveen Dhillon
New Image Encryption Algorithm Based on Diffie-Hellman and Singular Value Decomposition
Nidhal Khdhair El Abbadi, Samer Thaaban Abaas, Ali Abd Alaziz
Fuzzy Verdict Mechanism to Diagnosis the Yield of Rice
Dr. M. Kalpana, Dr. L. Karthiba
RFID Based School Children Monitoring System
Panaskar Prajakta R., Patel Karishma M., Mote Shital P., Kale Aniket V.
MIMO-OFDM Performance Analysis between Discrete Fourier and Discrete Wavelet Transform Techniques in LTE
M.Jayalakshmi
Efficient Performance of Hybrid Watermarking Scheme
Jaspreet Kaur, Er.Varinderjit Kaur, Dr.Naveen Dhillon
Review of Web Crawlers with Specification and Working
Yugandhara Patil, Sonal Patil
An Approach for using Token Memory in Parallel Processing
Buddh Bhagwan Sahu, Prof. Rajesh Tiwari
A Survey on Cyber Physical System Security with Deceptive Virtual Host for Industrial Control Networks
Ranjeetha Priya. K, Sowmika. S, Bharanidharan. A
GPS and Bluetooth Based Object Tracking System
Rupen Paul V, Adithi Reddy, Sujith PS, Aneesh M
Acceleration of Query Response in Distributed System using Materialized View Approach
Pooja G.Dhawane, Prof. Garima Singh Makhija
An Investigation of the Costs and Benefits of Thinning on the Straight Line Hough Transform
Gideon Damaryam, Emeka Ogbuju, Haruna Abdu
A Paramount Mining for Facebook Dataset using Hadoop
Vrushali R Choudhari, Suchita Walke
Big Data – A Pool of Opportunities and Negotiations: Forseen and Unforseen
Anand P. Lad, Samarth A. Shah
Sierpinski Carpet Based Mushroom Shape Fractal Microstrip Antenna
Priyanka Sharma, Sumit Kaushik, Vijaya Thakur
A Comparative Study of Data Mining Tools on Parkinson’s disease
Mr. Santosh Chauhan, Dr. Maitreyee Dutta, Dr. Arvind Tiwari
Wireless Control Crane
Rajashri Bharade, Pooja Sinha, Komal Labde, Prof..Praffula.Chaudhari
Efficiently Harvesting Deep Web Interface with Reranking and Clustering
Amruta Pandit, Prof. Manisha Naoghare
Implementation of Heterogeneous Face Recognition using SIFT and MLBP Algorithm
Farinaparveen Khan, R K Krishna
Data Storage and Access with Cloud Support
Prof. Ashwini S. Mane, Mangal V. Wagh, Aboli V. Tarte, Mayuri A. Fulzale, Priyanka S. Mehta
Design, Simulation & Optimization of 45nm NMOS Transistor
Ms.Nitin Sachdeva, Dr. Munish Vashishath
E-Voting System using Visual Cryptography & Homomorphic Encryption
Ruchita Tekade, Prof. Reena Kharat, Varsha Magade, Marjina Shaikh, Pallavi Mendhe
Multimodal Visual Search using CBIR system on Mobile Device
Prasad Kamthe, Aniruddha Bidnur, Rahul Patil, Sharad Pawar
CAM: A Combined Analytical Model for Efficient Malware Classification
Om Prakash Samantray, Satya Narayan Tripathy, Susant Kumar Das, Binayak Panda
Reducing the Third-Order Inter Modulation Distortion by Feed Forward Linearization of Power Amplifier
Amanpreet Kaur, Rajbir Kaur
‘Advanced Security Primitive Using Digital Images’
Abheesh Dokras, Chetan Dhapure, Akshay Dang, Jayesh Kawale
Secured and Efficient Cloud Storage Data Deduplication System
Sumedha A Telkar (S. A. Maindakar), Dr M Z Shaikh
Mobility Based Reconfigurable System under Disaster Management in WSN Using Shortest Path Algorithm
Isha Sharma, Shilpa Gambhir
Data Deduplication, Revision and Sharing in Hybrid Cloud Supporting Differential Authorized Privilege
Priyanka Bhopale, Dr. A.M. Kanthe
Placement Support System
Prof. Rupali Komatwar, Swapnil Kamble, Mihir Khedekar, Kishor Walzade
An Authenticate Cryptography based security model for handling multiple request from multiple devices for Mobile Cloud Computing
Debabrata Sarddar, Enakshmi Nandi
Building Detection in Satellite Image using Firefly Tuned Grab Cut Algorithm
Deep Shikha, Er. Kapil Sirohi
A Review on Query Processing and Optimization in SQL with different Indexing Techniques
Chiranjeev D. Garhwani, Shreya S. Kandekar, Payal S. Chirde
Poly Tree Construction Method to improve QoS in Wireless Sensor Networks
Nirupama. A, Sudarson Jena
A Review: New Histogram for Bilateral Filtering and Nearest Neighbor Searching
Sheetal Waghchaware, Prof. P. S. Deshpande
Augmented Panorama for Furniture Layout
Prof. P. S. Toke, Aditya Limaye, Susmit Mane, Vishal Metri, Aniket Paste
XML Based Distributed Web Mining
Prof. Mamta gehlot, Siddhesh Deorukhkar, Rishit Kotian, Ajay Kemble, Anuj Rana
Video Compression Exploiting Luminance Masking and DWT
Snehal Patil, Prof. (Dr) S.K. Jagtap
Distributed Intrusion Detection System using Bayesian learning and Apache Mahout
Ronak Agrawal, Ganesh Talekar, Akshaysingh Chandel, Shriganesh Munde, Deeplakshmi Zingade
Routing Problems and Solutions for Location-Based Routing in MANETs
Yashashree A. Jakhade, Nitin R. Gavai
Novel Approach for Developing Effective Service Level Agreements for Cloud Computing
Manas Kumar Yogi, G.Vijay Kumar, D.Uma
Identify Packet Droppers and Modifiers to Improve Security in Adhoc Network
P. Swetha, Dr. P. Premchand
A Cost Effective Flooding Algorithm for AODV Routing Protocol in Mobile Ad Hoc Networks
Mr. Vinayak Bashetti, Dr. Sayed Abdulhayan
Digital Mammography: A Review on Detection of Breast Cancer
Priyanka B Burshi, Digambar A Kulkarni
Canteen Coupon Management System with GPS as a Coupon Checker
Ms. Kirti Mhamunkar, Ms. Harshada Dhole, Ms. Ravina Taru, Ms. Tejali Kamble
Implementation of RGB to YCbCr Color Space Transformation for ARINC Transceiver
Hamsavahini R, Rashmi N
Automatic Chalk Board Cleaner and Energy Harvesting for Smart Class Rooms
Sharmila.C, Ramya.M, Sarnya.S
Feature Representation for Crowd Counting by Regression: A Review
Neeta Anil Nemade, Dr. Mrs. V. V. Gohokar
Suspicious Object Detection Using Back-Tracing Technique
Aniket Bhondave, Bhagyawant Biradar, Vishal Suryavanshi, Harshal Nakil
An Advanced Filtering Mechanism for Analysis and Detection of Malicious Web Pages
Mr. Pranav More, Prof. Amruta Amune
Selection Process for Area Identification of Articular Cartilage
Prof. Dr. S. L. Lahudkar, Chetana Kurve
Survey: Cloud Security with a Remote Smart Data Backup Technique
Akshay Gondke, Kaustubh Gage, Sneha Annappanavar
PDF Based Relay In Reactive Dual-Hop Wireless Networks
Thara Elizaba Thomas
Design of Energy Efficient SRAM Cell to Improve the Stability of Read Operation
S. Nijantha, Prof. K.A. Dattathreya
A New Approach for Dynamic Load Balancing using Simulation in Grid Computing
Mr. Kapil B. Morey, Prof. Sachin B. Jadhav
Bat Algorithm: An Overview and its Applications
S. Induja, Dr. V.P. Eswaramurthy
Design and implementation of a digital FIR notch filter for the ECG signals using FPGA
Dr. Kamal Aboutabikh, Dr. Ibrahim Haidar, Dr. Nader Aboukerdah
Road Quality & Ghat Complexity Analysis
Prof. P.S. Toke, Shweta Maheshwari, Aishwarya Asawale, Aishwarya Dhamale, Nigel Paul
Role of Computer Science development in India – A Review
Suruchi Sabherwal
Machine Monitoring on Cloud using Raspberry Pi and Internet of Things
Amit Rana, Dr. Smt. A.S. Bhalchandra
Review Paper on VLSI Architecture for Carry Select Adder
K. Pitambar Patra, Sambit Patnaik, Swapna Subudhiray, Janmejaya Samal
Simulation of Semi Markov Process to Detect Mimicking Attacks Based On User Behavior
M.Anitha, A.Kanchana, R.Padmapriya, N.Malathi
Advanced Computerized Scheme for Detection of Lung Nodules by Incorporating VDE Image
Bhagyashree Nemade, Prof. Dimple Chaudhari, Prof. C.B lahoti
A New Secure Forward Digital Signatures based on Forecasting and Statistical Entropy of Key Exposures
Dr. Faris M. Al-Athari, Dr. Abdulameer Khalaf Hussain, Dr. Adnan Al-Helali
Abstract
Study of Authorized Data Deduplication Methodology to Achieve Security in Hybrid Cloud
Priyanka Bhopale, A.M. Kanthe
DOI: 10.17148/IJARCCE.2016.5102
Abstract: Number of files created per day is increased due to rapid rise in number of users. In cloud computing environment most of the communication is done through the file processing, and hence it becomes very crucial and significant to provide efficient approach for data security. In this research we are concentrating on data deduplication to provide efficient security service in cloud computing. Data deduplication is nothing but data compression technique which is used to remove the duplicate copies of echoing data. This methodology is regularly used for dropping the storage space and save bandwidth under cloud. Also, along with deduplication for data protection and privacy the encryption methods are used. In this paper we are studying the authorized data deduplication to provide the data security by using differential privileges of users in the cloud architecture. Different new deduplication constructions offered for sustaining authorized duplicate check. This paper shows how the security is obtained in hybrid cloud during the process of data deduplication.
Keywords: Data Deduplication, Data Security, Privilege authorization, Hybrid Cloud.
Abstract
Refinement in Captcha as Graphical Password using Image Grid Techniques
Puja Mashalkar A, Mate Rutuja N, Pawar Vaishali B, Setia Pooja R, Minal Shahakar
DOI: 10.17148/IJARCCE.2016.5103
Abstract: Generally security problems deals with the hard AI problems related to security as emerging paradigm which has been unexplored. Captcha is a technology which presents security primitives for mathematical problems. Carp addresses the security problems which are based on the online attacks, attacks made as relay and surfing attacks. In CaRP password is only searched by best online guessing attacks which can be available in password sets. Captcha technology, which we can describe as Captcha which can be represented as graphical passwords. CaRP is defined as both Captcha and a password as a graphical scheme. CaRP also delivers the idea such as Pass Point, which often describes the weak passwords. CaRP is not a method but it offers reasonable security and usability thus appears to ?t well with some practical applications for improving the problems related to online security.
Keywords: Graphical Passwords, Hotspot, Captcha, Security Primitives.
Abstract
CARP: CAPTCHA as A Graphical Password Based Authentication Scheme
Shraddha S. Banne, Prof. Kishor N. Shedge
DOI: 10.17148/IJARCCE.2016.5104
Abstract: This research aims to study the existing password schemes and to design and develop a new improved graphical password scheme. CaRP is Captcha as a graphical password. With the hybrid use of CAPTCHA and graphical password it can addresses a number of security problems altogether. In information security, user authentication is a major problem in every system. And for authentication purpose every system depends on password whether it is textual password or graphical password. CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass. In this paper, we discuss the strengths and limitations of each method and present a combination of CaRP and graphical password scheme which is protected to the common attacks suffered by other authentication schemes.
Keywords: Graphical Password, CaRP, CAPTCHA, Authentication, Security.
Abstract
A Comprehensive Study of Channel Equalization Techniques in MIMO-OFDM Systems
Lipsa Dash, Sree Ramani Potluri
DOI: 10.17148/IJARCCE.2016.5105
Abstract: Today�s communication scenario demands high data rates and large system capacity where MIMO-OFDM proves to be an ultimate combination .The never ending thirst for such high performance wireless communication results in signal vulnerability to channel impairments. One of the primary causes resulting in signal degradation due to the multipath propagation is channel ISI (Inter symbol interference). The process of channel estimation and equalization together accomplishes the job of combating the effect of ISI. Initially CIR(Channel Impulse Response) is estimated based on a known sequence of bits(Pilot sequence) followed by equalization process which takes care of altering the channel response based on the estimated behavior thereby extracting the signal of interest. It is also possible to implement non pilot aided approaches like blind channel equalizer algorithms without possessing knowledge of the channel. This paper does a comprehensive survey of different types of equalizers thereby providing an in depth understanding of equalization.
Keywords: MIMO, OFDM, ISI, ICI, CSI, MMSE.
Abstract
A Literature review on Cyber Forensic and its Analysis tools
Mandeep Kaur, Navreet Kaur, Suman Khurana
DOI: 10.17148/IJARCCE.2016.5106
Abstract: With the advancement in cyber area, frequent use of internet and technologies leads to cyber attacks. Digital forensic is opted for acquiring electronic information and investigation of malicious evidence found in system or on network in such a manner that makes it admissible in court. It is also used to recover lost information in a system. The recovered information is used to prosecute a criminal. Number of crimes committed against an internet and malware attacks over the digital devices have increased. Memory analysis has become a critical capability in digital forensics because it provides insight into the system state that should not be represented by traditional media analysis. In this paper, we study the details of cyber forensics and also provide the vital information regarding distinctive tools operate in digital forensic process. It includes forensic analysis of encrypted drives, disk analysis, analysis toolkit, volatile memory analysis, captures and analyzes packets on network.
Keywords: Cyber Forensic, Volafox, Votality, Dff.
Abstract
A Comparative Analysis of Image Interpolation Algorithms
Mr. Pankaj S. Parsania, Dr. Paresh V. Virparia
DOI: 10.17148/IJARCCE.2016.5107
Abstract: Image interpolation is the most basic requirement for many image processing task such as computer graphics, gaming, medical image processing, virtualization, camera surveillance and quality control. Image interpolation is a technique used in resizing images. To resize an image, every pixel in the new image must be mapped back to a location in the old image in order to calculate a value of new pixel. There are many algorithms available for determining new value of the pixel, most of which involve some form of interpolation among the nearest pixels in the old image. In this paper, we used Nearest-neighbor, Bilinear, Bicubic, Bicubic B-spline, Catmull-Rom, Mitchell-Netravali and Lanzcos of order three algorithms for image interpolation. Each algorithms generates varies artifact such as aliasing, blurring and moir�. This paper presents, quality and computational time consideration of images while using these interpolation algorithms.
Keywords: Nearest-neighbor, Bilinear, Bicubic, Bicubic B-spline, Catmull-Rom, Mitchell-Netravali, Lanzcos.
Abstract
A New Feature Selection Method for Oral Cancer Using Data Mining Techniques
Mrs. R. Vidhu, Mrs. S. Kiruthika
DOI: 10.17148/IJARCCE.2016.5108
Abstract: The term cancer is used generically for more than 100 different diseases including malignant tumours of different sites (such as breast, cervix, prostate, stomach, colon/rectum, lung, mouth, leukaemia, sarcoma of bone, Hodgkin disease, and non-Hodgkin lymphoma). Common to all forms of the disease is the failure of the mechanisms that regulate normal cell growth, proliferation and cell death. Ultimately, there is progression of the resulting tumour from mild to severe abnormality, with invasion of neighbouring tissues and, eventually, spread to other areas of the body. The primary risk factor for developing oral cancer is tobacco use. Smoking cigarettes, cigars, and pipes all increase risk of oral cancer. Smokeless tobacco, often called "dip" or "chew," also heighten the risk. Alcohol consumption is another habit that is strongly associated with the development of oral cancer. This research uses data mining technology such as classification, clustering and prediction to identify potential oral cancer patients.Apriori algorithm is the originality algorithm of Boolean association rules of mining frequent item sets. The datamining methods and techniques will be explored to identify the suitable methods and techniques for efficient classificationof data.The data mining techniques are effectively used to extract meaningful relationships fromthese data. Genetic algorithms were applied to association and classification techniques.
Keywords: Cancer; Oral Cancer; Data Mining; Classification; Decision tree; Apriori algorithm; Association rule; Genetic algorithm.
Abstract
Credit Card Fraud Detection
Ishu Trivedi, Monika, Mrigya Mridushi
DOI: 10.17148/IJARCCE.2016.5109
Abstract: The usage of credit cards for online and regular purchases is exponentially increasing and so is the fraud related with it. A large number of fraud transactions are made every day. Various modern techniques like Data Mining, Genetic Programming, etc. are used in detecting fraudulent transactions. This paper uses genetic algorithm which comprises of techniques for finding optimal solution for the problem and implicitly generating the result of the fraudulent transaction. The main aim is to detect the fraudulent transaction and to develop a method of generating test data. This algorithm is a heuristic approach used to solve high complexity computational problems. It is an optimization technique and evolutionary search based on the genetic and natural selection. The implementation of an efficient fraud detection system is imperative for all credit card issuing companies and their clients to minimize their losses.
Keywords: Credit card, Electronic commerce, Fraud detection, Genetic algorithms.
Abstract
Prediction of Coastal Upwelling Using Remote Sensing
Ms. R. Priya, Ms. R .Ranjani, Ms. M. Thamizharasi
DOI: 10.17148/IJARCCE.2016.5110
Abstract: South Eastern Arabian Sea (SEAS) is a unique oceanic basin within the Arabian Sea where a suite of phenomenon takes place over a year ranging from coastal upwelling during summer monsoon season along the south west coast of India to monsoon onset vortex to the Arabian Sea miniwarm pool before the onset of summer monsoon and formation of algal blooms. Seven years (2007-2013) of satellite sea surface temperature (SST) data, chlorophyll data, and wind data were used to predict the coastal upwelling in the South East Arabian Sea. Upwelling areas are determined by lower SST and higher Chlorophyll concentrations. Upwelling indices such as Latitude Temperature Gradient (LTG), Chlorophyll Extension Index and Ekman indices was computed from SST, Chlorophyll and wind data respectively, and by using those indices variations of upwelling dynamics was studied and inter-annual variability was found out for predicting the coastal upwelling in the South East Arabian Sea.
Keywords: Upwelling, Sea Surface Temperature, Chlorophyll, Latitude temperature gradient.
Abstract
Row into Column Modify Stegano-algorithm
Rupali Jain, Jayshree Boaddh
DOI: 10.17148/IJARCCE.2016.5111
Abstract: Data security is maintained by assuming the consistency and accuracy of data over its entire life cycle. Security aspects come into play when it is necessary or desirable to protect the information transmission from an opponent who may present a threat to confidentiality, authenticity, data integrity and denial of service. Here, we are proposing a Row into column Modify stegno-algorithm. This is a image steganography technique in which we proposed a way to hide message behind the cover image with improved value of PSNR and good NCC value.
Keywords: Steganography algorithm, pseudo-random generator, LSB method, data hiding, image steganography.
Abstract
Content Based Video Retrieval
Wagh K. D. , Dr. M. U. Kharat
DOI: 10.17148/IJARCCE.2016.5112
Abstract: For fast learning and because of availability of fast techniques e-learning and e lecturing concept has more popular. On Internet lots of lectures are available for single concept there an efficient way to perform video retrieval is needed. Video retrieval is a young field which has its genealogy rooted in Artificial Intelligence, Digital Signal Processing, etc, this paper presents a text based video retrieval and video search system. Very first apply automatic video segmentation and key frame detection for video content navigation. Extract textual metadata by applying video OCR technique on key frames and ASR on lecture audio track. This summery will then be used for indexing of video. As there is strong needs for segmenting lecture video into topics for browsing.
Keywords: Content based video retrieval, Optical character recognition, Automatic speech recognition, Segmentation.
Abstract
Performance Analysis of AODV Routing Protocol in MANET
Utpal Barman, Neelpawan Kalita
DOI: 10.17148/IJARCCE.2016.5113
Abstract: Mobile Ad-hoc network system (MANET) is a self ruling arrangement of versatile hubs associated by remote connections. Every hub works as an end framework, as well as a switch to forward bundles. The hubs are allowed to move about and compose themselves into a system. These hubs change position much of the time. The primary classes of routing protocol are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing methodology is a prevalent directing classification for remote specially appointed routing. It is a moderately new routing logic that gives an adaptable answer for generally extensive system topologies [1]. The outline takes after the thought that every hub tries to lessen sending so as to steer overhead directing bundles at whatever point a correspondence is asked. In this paper an endeavour has been made to analyze the execution of two conspicuous on demand responsive routing protocol for MANETs: Ad hoc On Demand Distance Vector (AODV) conventions. AODV is responsive entryway disclosure calculations where a cell phone of MANET associates by passage just when it is required [1]. According to our discoveries the distinctions in the routing mechanics lead to noteworthy execution differentials for both of these conventions. The execution differentials are broke down utilizing changing re-enactment time. These reproductions are did utilizing the ns-2 system test system. The outcomes displayed in this work represent the significance in precisely assessing and executing routing protocol in a specially appointed environment.
Keywords: Ad-hoc On Demand Distance Vector (AODV), Mobile Ad-hoc Network (MANET), NS-2 Simulation Tool, Routing Protocol.
Abstract
Performance Analysis of DSDV
Utpal Barman, Diganto Sahu
DOI: 10.17148/IJARCCE.2016.5114
Abstract: In ad hoc network where nodes both act as router and host, some protocols are implemented like DSDV (Destination Sequence Distance Vector). It is an extension of bellman-ford routing algorithms, which helps in communication between nodes in ad hoc networks. But the challenge lies with reliable communication between nodes. In this paper the DSDV performance analysis is done which also nullifies the looping problem faced by its previous version, that is, distance vector routing algorithms.
Keywords: MANET, Routing, Nodes, DSDV, Links.
Abstract
Dehazing Algorithm Using Wavelength Compensation to Improve Visibility in Foggy Images
Sreedhar Rajput
DOI: 10.17148/IJARCCE.2016.5115
Abstract: Images of outdoor scenes caught in adverse climatic conditions. Confined light sources frequently come about because of actuation of road lights and vehicle headlights in these conditions. Conventional art restoration strategies can't work with hazy images that included confined light sources and process is very delay. Therefore, a new method proposed which enhances the road scenes hazy images using wavelength compensation and de hazing algorithm. This algorithm worked based on the dark channel prior and depth map estimation. In contrast based techniques better visual perception of hazy images is accomplished by restoring the local contrast of hazy images. Here, the clarity of hazy images is increase by physically based techniques.. Atmospheric light and transmission map components are utilized to recover the scene objects from the degradation.
Keywords: color shift, dark channel prior, localized light, haze removal.
Abstract
Cloud Security Using Multilevel Encryption Algorithms
Miss Shakeeba S. Khan, Prof. Ms. R. R. Tuteja
DOI: 10.17148/IJARCCE.2016.5116
Abstract: Cloud generally relates with a set of hardware, storage of network, services, interfaces which are needed to combine and deliver the service for computing. The role of cloud is to provide the service for delivery of software, and storage of data on internet based on user demand. Because of these services cloud computing has become an important platform for companies to build their infrastructures upon. With growing publicity of cloud computing, related vulnerabilities or threats are also increasing because cloud services are often delivered by third party. So, security of the information in the cloud is the major issue for a cloud user. In this research paper, the proposed work plan is to eliminate the concerns regarding data privacy using multilevel cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.
Keywords: Cloud Computing, Cryptographic Algorithm, Data Authentication, Data Integrity, Infrastructure, Internet, Security Issue.
Abstract
Performance Review System – An ERP Application with Secure Data Storage and Cloud Backup
Aniket Olkar, Nachiket Deo, Vibhav Deo, Prashant Patil
DOI: 10.17148/IJARCCE.2016.5117
Abstract: Traditionally we have seen that ERP systems are developed using Row-oriented database system. Our project tries to implement column-oriented approach in development of ERP systems. The system which we are trying to develop is Employee Performance Review System. Modern software applications (ERP application in this case) are highly data-centric. As data is highly sensitive security is primary concern, we are trying to increase randomness of the encryption algorithms so as to increase the level of the data security. Loss of important data can affect business process. Hence we provide the data backup using cloud so that in case of application failure the important data needed for business decision making is not lost.
Keywords: ERP, Column-Oriented Database, Vertical Partitioning, Symmetric Encryption, Cloud Backup.
Abstract
Survey on Segmentation of Brain Tumor: A Review of Literature
Ashima Anand, Harpreet Kaur
DOI: 10.17148/IJARCCE.2016.5118
Abstract: Segmentation of brain tumor is a vital step in the initial detection of tumor in the medical field. Although various methods have been presented for brain tumor segmentation, but enhancing tumor is a challenging task since tumor possess complex characteristics in appearance and boundaries. Brain tumor� segmentation must be done with precision in the clinical practises. The objective of this review paper presents a comprehensive overview for MRI brain tumor segmentation methods. In this paper, various techniques like region based, fuzzy clustering means (FCM), thresholding and artificial neural network (ANN) algorithms have been discussed. Comparative analysis among these various segmentation conventions has been evaluated. Finally, culmination and future aspects are addressed for brain tumor segmentation methods.
Keywords: Brain tumor, Image Segmentation, Threshold-based, Region-based, Artificial Neural Networks, FCM.
Abstract
An Improving Web Page Ranking based on Visit of Links with Time Factor and Cursor Movement Algorithm
Bharat Bhushan Agarwal, Dr. Mahmoodul. Hasan Khan
DOI: 10.17148/IJARCCE.2016.5119
Abstract: The web users face the problem in retrieving important and useful information from the large number of disordered and scattered information due to the rapid development of WWW. However, a current search engine does not fully satisfy the user�s need of high-quality relevant information search services. In this paper discussed various Page Rank algorithms to obtain actual page rank of a web page on the web.
Keywords: Page-Rank, Weighted-Page-Rank, Visits of Links, Reading Time, in links, out links.
Abstract
Requesting for Custom Denomination in Automatic Teller Machine Withdrawal
K. Navatha, Naga Durga Saile.K, E. Soumya
DOI: 10.17148/IJARCCE.2016.5120
Abstract: An easy cash drawing system, Automated Teller Machine (ATM) has become an integral part of our society. For withdrawal service, existing ATM machines asks only how much money do you want to withdraw after the user authentication. It does not ask what denominations the customer wants. So implementing custom denomination request in an ATM withdrawal is an added advantage to the customer. It avoids the overhead of a customer by giving custom denomination for small and large amount withdrawals.
Keywords: Automated Teller Machine, Cash Withdrawal, Custom Denomination, Customer.
Abstract
A Study of Handwritten Character Recognition Techniques
Ravleen Kaur Chadha, Neeraj Mehta
DOI: 10.17148/IJARCCE.2016.5121
Abstract: In this paper we give a survey of handwritten character recognition methods. These methods are based on neural network, self organizing map, statistical methods etc. We also give an overview of fundamentals of handwritten character recognition. We describe modern and popular approaches for handwritten character recognition. Their strengths and weaknesses are also compared.
Keywords: Character recognition, feature extraction, neural network, optical character recognition.
Abstract
A Review of Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System
Mrs. Sunayana Sutar, Prof. Ashish Zanjade
DOI: 10.17148/IJARCCE.2016.5122
Abstract: The reversible encrypted data concealment in encrypted images is used to hide encrypted data in encrypted images for secret communication which has very high security. The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in encrypted images. The image is then separated into number of blocks locally and lifting wavelet transform will be used to detect approximation and detailed coefficients. Then approximation part is encrypted using chaos encryption. After image encryption, the data hider will hide the secret data into the detailed coefficient which are reserved before encryption. The data hiding technique uses the adaptive LSB replacement algorithm for concealing the secret message bits into encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of errors.
Keywords: Reversible, Data Concealment, Image Encryption.
Abstract
Cloud Computing with Data Confidentiality Issues
Dr. S. S. Manikandasaran
DOI: 10.17148/IJARCCE.2016.5123
Abstract: Cloud computing is a key enabling technology for fast wide-area networks and it has more powerful server computers. Cloud operates on a high-performance virtualization. Cloud provides wide range of users like individuals, businesses and governments to provide virtual resources such as CPUs, memory, hard drives, bandwidth, platforms, and applications in an on-demand environment. Every day, the data is growing at a rapid rate in enterprises. To store data, a large number of processing units, hard drives, network infrastructure and other resources are required. Cloud satisfies this entire computational requirement to any enterprises by its infrastructure, but, at the same time, cloud is step-down by some of the security related issues. Maintaining confidentiality of data in the cloud is the most important security issue. This paper describes the cloud computing architecture, data management in cloud environment and data confidentiality issue in cloud. Cloud has many issues among that security is the top most issue. This paper opens the confidentiality problem in cloud data storage and also helps the researcher to kick start their research to address data confidentiality issues in the cloud environment.
Keywords: Cloud Computing; Data Confidentiality; Security Issues; Cloud Storage;
Abstract
Meter Reading Application for Android Based Handheld Device
Mayur Suryawanshi, Aditya Nikam, AjayKumar Gajengi, Dakshata Waje
DOI: 10.17148/IJARCCE.2016.5124
Abstract: Automatic meter reading is an Application designed for collecting consumption automatically, and status data from utility meters (electricity) and transferring data to a central database for billing. This is an application which will help you to monitor your consumption of e.g. electricity. You may have savings in your budget if you track your monthly consumption of energy. The Application is built essentially to track the energy usage and accessing the electricity data which can result in better management electricity. Enabling accurate data stored, analysed and provided to a customer on demand. This Application is used in utility meters for collecting the data which is needed for billing purposes.
Keywords: Android, OCR, Handheld device, Android based meter reader.
Abstract
Secure Virtualized Multi Tenancy Architecture in Cloud Computing using H-SVM
Sowmiya.N.D, Shanthi.S
DOI: 10.17148/IJARCCE.2016.5125
Abstract: Multilateral Security concept to multi-tenancy cloud platform. It is difficult to analyse policies defined by consumers in the same virtualization platform in order to guarantee configuration stability given that policies may have conflicts leading to unpredictable effects. sharing means that malicious activities carried out by one tenant may affect the reputation of another tenant .Multilateral security is just about allowing each of consumers to express their security requirements and actually use their chosen level of security. Multilateral Security Requirements Analysis (MSRA) consider the security and privacy interests or needs of all stakeholders related to the system.
Keywords: MSRA, H-SVM, SMM, TLB.
Abstract
A Novel Technique for Link Recovery in Energy Efficient DRINA Protocol for Wireless Sensor Network
Mankirat Kaur, Anjana Sharma, Bhupinder Kaur
DOI: 10.17148/IJARCCE.2016.5126
Abstract: The Wireless Sensor Network (WSN) is the type of Ad hoc network. WSN is the self configuring networks; any sensor node can join or leave the network when they want. In WSN the main issue is battery consumption so to conserve the network lifetime many protocols are designed. WSN�s are deployed in the far places like forests, deserts etc so it is very difficult to recharge or replace the battery of the sensor nodes. In these conditions, we focus to reduce the battery consumption of the sensor nodes. In this paper, we are proposing a new technique on enhancement of DRINA protocol, to reduce battery consumption and recover link failure. It will be based on the static clustering using relay nodes. Before data transmission sensor nodes form the cluster dynamically using the neural network and weights are adjust according to the situation and it also enhance the efficiency of the dynamic clustering. Experimental results show that new proposed technique is more efficient, reliable and provide more throughput as compare to the existing technique.
Keywords: Learning, Neural Networks Clusters, Boltzmann learning.
Abstract
Spectrally Efficient Frequency Division Multiplexing in LTE Downlink
Buthaina M. Omran, Hajer S. Mohammed Redha
DOI: 10.17148/IJARCCE.2016.5127
Abstract: Spectral efficiency is a key design issue for all wireless communication systems. Orthogonal frequency division multiplexing (OFDM) is a very well-known technique for efficient data transmission over many carriers overlapped in frequency. The 3GPP has chosen the OFDM as the radio access technology due to its simple implementation in receiver and spectral efficiency. To enhance system�s data rate a proposed system of using SEFDM instead of OFDM for LTE downlink air interface. SEFDM systems propose bandwidth savings when compared to OFDM systems by multiplexing multiple non orthogonal overlapping carriers. Two detection methods were used: Efficient Sphere Decoder (ESD) and ESD with Iterative Cancellation (IC). The efficacy of the proposed design is shown through detailed simulation of systems with different bandwidth compression values. The ESD-IC decoder proposed produces a very good result. The system is able to produce efficiency gains of up to 25% while maintain performance near to an OFDM. The performances of two systems (OFDM and SEFDM) were compared in terms of performance and throughput with fixing all the other parameters.
Keywords: LTE, OFDM, BCF, SEFDM, ESD, ESD_IC.
Abstract
A review on Intrusion Detection system in WSN
Manoj Kumar Gupta, Lokesh Singh
DOI: 10.17148/IJARCCE.2016.5128
Abstract: Intrusion detection is the one of the major problem in network security, as the use of computer system and network increases, securing data is one of the important in order to achieve secure data transmission without hacking. Various numbers of methods and intrusion detection systems have been proposed to detect intruder and anomaly detection, but most of the methods and system tries to detect the rates of the attackers and positive rates in different types of attacks. In this paper a study of various intrusion methods have been analysed and their comparison is also shown.
Keywords: IDS, Attacker, WSN, Security.
Abstract
A Certificate Less Active Key Management in Dynamic Wireless Sensor Networks
Priyanga Ancy.G, Narmadha.C
DOI: 10.17148/IJARCCE.2016.5129
Abstract: Wireless sensor networks (WSNs) to replied continuous accessibility of the wireless medium to communicate contributing the sensor nodes. Though, the open nature of this wireless medium leaves it exposed to multiple security threats or attacks. The encryption key protocols are required to securing data and communications. Symmetric key schemes are unworkable for mobile sensor nodes and therefore past methods have concentrated only on static WSNs. It is also not mountable and not strong compared to compromise nodes, and not capable to support node mobility. Hence symmetric key is apposite for dynamic WSNs. Extra in recent times; asymmetric key based methods must be present future for in dynamic WSNs. In this paper, a Certificate less Active Key Management (CL-AKM) protocol to supports key revocation in dynamic WSNs is proposed. The proposed scheme is secure communication in dynamic WSNs and categorised by node mobility. Key updated after a node movement of node leaves or node connections a cluster and key revocation for compromised nodes are supported by our proposed scheme and ensures go forward and backward key confidentiality. Our proposed scheme of security research is effective in a number of attacks. We implement and simulate the Certificate less Active Key Management (CL-AKM) protocol using NS2 simulator to assess its energy, delay and threshold.
Keywords: CL-AKM; Security; Key Management; AODV protocol; Node Mobility.
Abstract
A Review on Advanced Mechanism in Learning and Recognition of Ops from Weakly Labeled Street View Images
Vaishali A. Mahale, Prashant M. Yawalkar
DOI: 10.17148/IJARCCE.2016.5130
Abstract: Mobile phones are powerful image and video processing device containing the other various features like high-resolution cameras, display color, and hardware-accelerated graphics. The various applications give rise to a key technique of daily life visual object recognition. On premise sign is a popular form of commercial advertising, widely used in our daily life. The OPSs containing visual diversity associate with complex environmental conditions. Observing that, today�s in most of existing image data set OPSs characteristics are lacking. In this, first proposed an OPS-62 data set, in which totally 4649 OPS images of 62 different businesses are collected from Google�s Street View. For addressing the problem of real-world OPS learning and recognition, was developed a probabilistic framework based on the distributional clustering, in order to exploit the distributional information of each visual feature. Learning OPS images for more accurate recognitions and less false alarms. Main approach is simple, linear, and can be executed in a parallel fashion, making it practical and scalable for large scale multimedia applications.
Keywords: Index Terms-Real-world objects, street view scenes, learning and recognition, object image data set.
Abstract
Review on Memory Recall via Image Processing Intelligent Using Social Contacts Based on Eigen Value Implementation
Miss. Snehal S. Gulhane, Prof. A. S. Kapse
DOI: 10.17148/IJARCCE.2016.5131
Abstract: Human memory very often fails. People are frequently beset with questions like �Who is that person? I think I met him/her last year.� Available memory systems cannot well support the recall of names effectively. This paper explores the memory recall enhancement problem from the perspective of memory cue extraction and associative search, and proposes a generic method to extract memory cues from heterogeneous, multimodal, physical/virtual data sources. Specifically, we can use the contact name recall in the academic community as the target application to showcase our proposed methodology. We next develop an intelligent social contact manager that supports 1) auto collection of rich contact data from a combination of various pervasive sensors and Web data sources, and 2) associative search of contacts when human memory fails. The proposed system is validated with the help of testing the performance of contact data collection techniques. An user study on contact memory recall is conducted, through which several findings about contact memorizing and recall are presented. Various Classic cognitive psychology theories are used to interpret these findings [1].
Keywords: Contact recall, memory aid, pervasive computing, social contact management, Web intelligenc.
Abstract
Distance based Energy Efficient Routing Protocol in Mobile Ad hoc Networks
Shashank S. Tolye, Manohar S. Chaudhari
DOI: 10.17148/IJARCCE.2016.5132
No abstract available.
Abstract
An innovated method using Failure mode and effects analysis for improving quality of the software
Dr.V.Sangeetha., M.Sc., Mphil, P.Saravanan
DOI: 10.17148/IJARCCE.2016.5133
Abstract: Failure mode and effects analysis (FMEA) is a structured prospective risk assessment method that is widely used event logs. FMEA involves a multidisciplinary team mapping out a high-risk process of care, identifying the failures that can occur, and then characterizing each of these in terms of probability of occurrence, severity of effects and detect ability, to give a risk priority number used to identify failures most in need of attention. One might assume that such a widely used tool would have an established evidence base. This paper considers whether or not this is the case, examining the evidence for the reliability and validity of its outputs, the mathematical principles behind the calculation of a risk priority number, and variation in how it is used in practice. In this paper we described a model of FMEA and its failure and also explain various types of tools used in this method.
Keywords: Single failure points (SFPS), Failure mode and effects analysis (FMEA).
Abstract
A New Partitioning Algorithm to Enhance Performance of SOAP Message Security Processing
Nidhi Arora, Savita Kolhe, Sanjay Tanwani
DOI: 10.17148/IJARCCE.2016.5134
Abstract: Web Service Security (WS-Security) processing suffers from performance bottleneck. With large data centric web services and hardened schema it becomes even worst. A new partitioning algorithm with parallel stream based security processing model is developed for large Simple Object Access Protocol (SOAP) messages. The aim is to partition SOAP message and to distribute the processing load on multiple cores in order to enhance the performance of SOAP message security processing. There are several steps involved in this approach but SOAP message partitioning is mainly focused in this paper. Since the efficiency of SOAP security processing depends on both Extensible Markup Language (XML) data size and its structure, these factors are considered while developing partitioning algorithm. Each partitioned SOAP message data is uniformly distributed to parallel running instances of stream based security processor so that the load among cores can be balanced. It is observed from the results that the implementation of new partitioning algorithm with parallel stream based WS-Security processing model has significantly improved the performance of SOAP message security processing. The fundamental approach presented in this paper is useful for efficient security processing of large SOAP messages.
Keywords: Web Services, WS-Security, SOAP message processing, XML security, XML data partitioning.
Abstract
Call Admission Control Using Neural Network and SVM
Poonam Sanap
DOI: 10.17148/IJARCCE.2016.5135
Abstract: This research work introduces and conditionally look over a software based method for Call Admission Control using Neural Network and SVM. In this paper, Call Admission Control scheme using Neural Network and SVM is proposed for better QoS. THE rising demand for mobile communication services is increasing the importance of efficient use of the limited bandwidth and frequency spectrum. In recent years, considerable efforts have focused on the Channel Allocation and Call Admission Control (CAC) problems and many schemes that range from static to dynamic strategies have been proposed in the literature. Call Admission Control is a provisioning strategy used to limit the number of call connections into the networks in order to reduce the network congestion and provide the desired Quality of Service (QoS) to users in service. Traditional CAC schemes that mainly focus on the tradeoff between new call blocking probability and handoff call blocking probability cannot solve the problem of congestion in wireless networks. To overcome the problems arises due to traditional CAC schemes we propose a new CAC using hybrid technique i.e. SVM and Neural network.
Keywords: Call admission control, WCDMA, Offered traffic, Total carried traffic.
Abstract
Text Based Video Indexing and Retrieval Using DLER Technique
Sneha S. Kapse, Prof. Salim Chavan, Prof. Pravin Kshirsagar
DOI: 10.17148/IJARCCE.2016.5136
Abstract: This project extract the text in video that means it extract the text in image. Because video comprises of various images. In order to extract and search important information in huge video clip we are focussing on extracting text from video. Here first we convert the video into frame or images then we choose area of interest in which we extract the text called region of interest and then continue with algorithm for localization and recognition.
Keywords: Text Extracting, Text Recognition, Text Localization, Text Segmentation, Video text.
Abstract
Performance Analysis of Current Ratio under Different Dielectric Constant for Carbon Nanotube Field Effect Transistor
Md. Moshiur Rahman, Md. Motiur Rahman Sagar, Shafkat Tasnim, Mohammad Farhan, MD. Tahmidur Rahman
DOI: 10.17148/IJARCCE.2016.5137
Abstract: This paper represents carbon nanotube field effect transistors (CNTFETs) under ballistic condition with FETTOY Model based on the changes of gate oxide thickness and tube diameter, the performance has been observed as a function of dielectric constant of oxide material. Details observation of the combined ballistic effect on the basis of the performance of CNTFETs has been emphasized and the outcome of the device has been explored. Throughout the process, the effect of gate oxide material on the ON-state to OFF-state current ratio has been analyzed considering tube diameter and oxide thickness as constants and it is observed that after a certain value of the dielectric constant of oxide material the current ratio remains unchanged. Gate oxide thickness and tube diameter has also been varied to determine their effect on the ON-state to OFF-state current ratio which also indicates a range of diameter and oxide thickness to maintain unchanged current ratio.
Keywords: Current ratio, Gate oxide, Tube diameter, Dielectric constant, Gate control parameter.
Abstract
An Energy Monitored and Route Coded Based Wireless Sensor Network for Assurance of Quality of Service
Amruta Padhye, Shraddha Panbude
DOI: 10.17148/IJARCCE.2016.5138
Abstract: WSN (Wireless Sensor Network) is widely employed in various fields because of its terrific performance, such as in the public health service, agricultural technology and environment monitoring. Due to the complex requirement of environment monitoring and the restricted energy of each node, reducing power consumption and reliable transmission are vital issues in the research areas of wireless senor network. The field of wireless networking technology is emerges from the integration of personal and private computing, cellular technology, and the Internet. This is due increase interactions between communication and information data computing, which is changing information access from "anywhere, anytime" into� everyplace, all the time". With the accumulated demand and application of wireless sensor networks (WSNs) to military and civilian fields, data security in the network has become a critical issue. The serious resource constraints of sensor nodes and all so the broadcasting nature of the wireless links as well as difficulties in the deployment environments of wireless sensor networks cause challenges for the quality and security of data transmission for these wireless networks. In order to ensure data security and quality of service required by an application in energy efficient and power saving way, we are proposing a new mechanism for QoS routing with coding and selective encryption scheme for WSNs. Our approach provides secure and reliable data transmission and can also adapt to the varied resource constraints of WSNs. The original message is splits into packets and they are coded and selectively encrypted before being transmitted along completely different disjoint paths.
Keywords: Wireless Sensor Network (WSN), Quality of Service (QoS), Energy Efficient WSN, coding.
Abstract
Advanced Cloud Security using RSA and variable length OTP with mixture of numeric, alphanumeric and special character
Rahul Karmakar, Samrat Banerjee, Anirban Ray
DOI: 10.17148/IJARCCE.2016.5139
Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (such as networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. With the migration of the data and the applications into the cloud, new security issues appear, with the fact that services are accessible anywhere any time lead to several potential risks. The most serious concerns are the possibility of lack of confidentiality and data security issues among the cloud users remain the principal inhibitor in adopting Cloud Computing Service. In this paper we have proposed new authentication system for cloud platform based on Multi level authentication having variable length onetime password (OTP) with mixture of numeric, alphanumeric and special character(s) for enhanced security in cloud authentication.
Keywords: Cryptography, Cloud Computing, OTP, RSA, AES.
Abstract
Optimizing Whole Test Suite Generation
Dr.V.Sangeetha, T.Ramasundaram
DOI: 10.17148/IJARCCE.2016.5140
Abstract: Software testing is as old as the hills in the history of digital computers. The testing of software is an important means of assessing the software to determine its quality. Since testing typically consumes 40 - 50% of development efforts, and consumes more effort for systems that require higher levels of reliability, it is a significant part of the software engineering. Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. Testing is executing a system in order to identify any gaps, errors, or missing requirements in contrary to the actual requirements. A common scenario in software testing is therefore that test data is generated, and a tester manually adds test oracles. As this is a difficult task, it is important to produce small yet representative test sets, and this representativeness is typically measured using code coverage. There is, however, a fundamental problem with the common approach of targeting one coverage goal at a time: Coverage goals are not independent, not equally difficult, and sometimes infeasible � the result of test generation is therefore dependent on the order of coverage goals and how many of them are feasible. To overcome this problem, whole test suites are evolved with the aim of covering all coverage goals at the same time, while keeping the total size as small as possible. However, the new paradigm works well; the test suites were not optimal. So, we propose a new tool with a novel paradigm to give optimality. This tool will have several advantages, as for example its effectiveness is not affected by the number of infeasible targets in the code. We are also described about the implementation of the tool using Eclipse IDE, java, Java Swing.
Keywords: Software Engineering, Software Testing, Infeasible goal, Testing Techniques, Automated Testing Tools.
Abstract
A Survey on Secure Data Discovery and Dissemination to Improve the Lifetime for Wireless Body Area Networks
A. Karthika Devi, Msc, Mr. M. Sengaliappan MCA., M. Phil., ME.,
DOI: 10.17148/IJARCCE.2016.5141
Abstract: A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance. They are now used in many industrial and civilian application areas, including industrial process monitoring and control, machine health monitoring, environment and habitat monitoring, healthcare applications, home automation, and traffic control. In addition to one or more sensors, each node in a sensor network is typically equipped with a radio transceiver or other wireless communications device, a small microcontroller, and an energy source, usually a battery. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from hundreds of dollars to a few pennies, depending on the size of the sensor network and the complexity required of individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and bandwidth. A sensor network normally constitutes a wireless ad-hoc network, meaning that each sensor supports a multi-hop routing algorithm.
Keywords: Wireless Sensor Network (WSN), Multi-Hop Routing Algorithm, Sensor Node, Ad-Hoc Network.
Abstract
ECG Signal Denoising With Non Local Means Filter
Navneet Kaur, Neetu
DOI: 10.17148/IJARCCE.2016.5142
Abstract: Electrocardiogram (ECG) is an important biomedical signal for analysing electrical activity of the heart during its contraction and expansion. Analysis of ECG becomes difficult if noise is augmented with the signal during acquisition. During recent years, several denoising techniques were analysed within the field of signal processing. In this paper, non-local means (NLM) filtering technique is explored for denoising the ECG signal and results are developed using Matlab coding. Non local means (NLM) uses concept of self-similarity. Due to the nature of the algorithm, the most favourable case for the NLM is the periodic case, like signals, a straight edge, curved edge, texture images and a complete line of pixels with a similar configuration. The noisy ECG signals are synthesized by adding pulse signals and are then denoised at different levels by optimizing various NLM parameters. The experimental results showed that the proposed technique successfully denoised the noisy ECG signals by selecting appropriate input NLM parameters. Finally, the power signal to noise ratio (PSNR) and mean square error (MSE) were also evaluated.
Keywords: Non local means, ECG, denoising, filter, self-similarity, biomedical signals, peak signal to noise ratio, mean square error.
Abstract
Enhanced Features of Neighbor Aware Multicast Routing Protocol
M. Selvi, R. Balakrishna
DOI: 10.17148/IJARCCE.2016.5143
Abstract: Multicast routing protocol play an important role in adhoc wireless networks to provide this communication. It is always advantageous to use multicast rather than unicast especially in the adhocenvironment. In this paper, we propose an enhancement of Neighbor Aware Multicast Routing Protocol, which is tree based, hybrid multicast routing protocol for adhocnetworks. Tree based routingprotocol ensures the robustness. Robustness is one of the issues in designing a multicast routing protocol. The improvement can be helpful to increase the limits the population of forwarding nodes by using trusted dominant pruning method. For route creation the protocol uses neighboring information and trusted dominant pruning approach uses for route maintenance.
Keywords: Multicast,Adhoc network, trusted dominant pruning, robustness and routing.
Abstract
Study and Comparative Analysis of Basic Pessimistic and Optimistic Concurrency Control Methods for Database Management System
Jaypalsinh A. Gohil, Dr. Prashant M. Dolia
DOI: 10.17148/IJARCCE.2016.5144
Abstract: The concurrency in database system is a common phenomenon in multiuser environment where more than one transactions concurrently accessing the common data. Concurrency can lead to an adverse effect on database if it is not efficiently controlled. In the past many people have addressed the problem of concurrency and also suggested and proposed various concurrency control methods. The scope of this study involves study and comparative analysis of basic concurrency control methods that can be classified as either pessimistic or optimistic. Different protocols exhibit good performance on different situations, some methods prefers locking approach while others are based on time stamp. In this work we have studied basic concurrency control methods of both pessimistic and optimistic approaches, highlighting their pros and cons. At last study shows the comparative analysis of basic concurrency control methods.
Keywords: CC, PCC, OCC, 2PL, S2PL, TIMESTAMP, TO, BOCC.
Abstract
Sketch Based Image Retrieval System
Sarita Kharote, Dipali Patil, Kalyani Mahal., Jyoti Kangane, Prof. M.T. JAgtap
DOI: 10.17148/IJARCCE.2016.5145
Abstract: The systematic approach that bridges the appearance gap for Sketch Based Image Retrieval System. The existence of noisy edge on photo realistic images is factor in enlargement of appearance gap and significantly degrades performance. To bridge this gap the system is proposed that consisting the framework of line segment based descriptor named as Histogram of Line Relationship (HLR) and a noise reduction algorithm as Boundary selection Algorithm. HLR Sketches and extracted edges of photo realistic images as series of Piece wise line segment and capture�s the relationship between them. Based on the HLR the object boundary selection algorithm reduces the impact of noisy edges by selecting the shapes edges .A fast method is applied to efficiently and the solution for object boundary selection algorithm. Multiple hypotheses are generated for descriptors by hypothetical edge selection. The selection algorithm is formulated to and the best combination of hypotheses to maximize the retrieval score. To reduce the distraction of false matches in the scoring process, two constraints on spatial and coherent aspects are introduced. By comparing the proposed HLR with state-of-the art descriptor it show that HLR descriptor outperforms them Combined with the object boundary selection algorithm, the framework significantly improves SBIRs performance.
Keywords: Large Scale Sketch Retrieval, Line Segment Based Descriptor, Histogram of Line Relationship (HLR), Object Boundary Selection Algorithm, etc.
Abstract
Lossless Data Compression Based General Tree Based Routing Protocol
Manpreet Kaur, Er. Varinderjit Kaur, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2016.5146
Abstract: WSN is becoming key subject of research in computational basic principle because of its great deal of applications. General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) constructs the redirecting or routing tree via a method by which, for every single circular or round, Base Station (BS) chooses the root node in addition to shows the following substitute for every node. In order to prevail over the actual constraints with the sooner work a new increased method proposed in this research work. The proposed method has the capacity to prevail over the constraints of GSTEB routing protocol using the principle with reactivity, mobile sink and also the lossless data compression technique. The proposed method examined through for the 100 * 100 wireless indicator spot with single sink. The evaluation has clearly displayed some sort of suggest improvement in network lifetime can be 2.17 % along with 3.71 % regarding network stability.
Keywords: Wireless Sensor Network, LEACH, HEED, DWEHC, PANEL, GSTEB.
Abstract
New Image Encryption Algorithm Based on Diffie-Hellman and Singular Value Decomposition
Nidhal Khdhair El Abbadi, Samer Thaaban Abaas, Ali Abd Alaziz
DOI: 10.17148/IJARCCE.2016.5147
Abstract: With the fast progression of using images in many applications, it is important to protect the confidential image data from unauthorized access. In this paper we suggested a new way to encrypt image based on three main steps: the first one aims to scrambling the image values by using Fibonacci transform, while the second step focus on generating public and private key based on Diffie -Hellman Key Exchange, these keys used to encrypt the diagonal matrix which created by Singular Value Decomposition (SVD) in third step. Decryption is the inverse process of encryption. The results were promised and the decrypted image retrieved without loss any of its information. Encryption and decryption time was very trivial. The contribution of this paper is to encrypt image by using singular value decomposition with Diffie -Hellman Key Exchange. Paper novelty based on scrambling values based on Fibonacci transform and encryption image by using SVD.
Keywords: Encryption, Decryption, SVD, DH, Fibonacci.
Abstract
Fuzzy Verdict Mechanism to Diagnosis the Yield of Rice
Dr. M. Kalpana, Dr. L. Karthiba
DOI: 10.17148/IJARCCE.2016.5148
Abstract: This paper expresses the structure of fuzzy expert system by applying the algorithm Fuzzy Verdict Mechanism. The elements of Fuzzy expert system are fuzzification interface, Fuzzy Verdict Mechanism and defuzzification. The knowledge is constructed by using the fuzzification to convert crisp values into fuzzy values. By applying the fuzzy verdict mechanism, diagnosis the yield parameters of rice such as Number of tillers per Hill, Number of grains per panicle and 1000 grain weight, pest and disease incidence, becomes simple for scientist. Fuzzy verdict mechanism uses triangular membership function with mamdani�s inference. Defuzzification method is adopted to convert the fuzzy values into crisp values. The effectiveness of the proposed algorithm was implemented using MATLAB Fuzzy Logic tool box to construct fuzzy expert system for rice.
Keywords: Fuzzy Expert System, Fuzzification, Fuzzy Verdict Mechanism, Defuzzification, rice.
Abstract
RFID Based School Children Monitoring System
Panaskar Prajakta R., Patel Karishma M., Mote Shital P., Kale Aniket V.
DOI: 10.17148/IJARCCE.2016.5149
Abstract: Recently, all over the world, the number of crime over children is increasing day by day. Student tracking is important to enhance security for children .In present time parents are worried about their children due to mishaps and missing of children .In case of child mishap school authorities penalized heavily so. At present time there is increases a number of child kidnapping and road accident cases .so for reduces this problems monitoring is necessary. Monitoring school buses and students has become an important issue due to the decision of whether it would be quicker to wait for the arrival of school bus or to hire a rickshaw as the bus is late to reach school. This paper focuses on children monitoring system, when child enters/exits from the bus. For implementing children monitoring system we use two technologies RFID (Radio frequency identification) and GSM (Global system for mobile communication). RFID technology locates the child position GSM will pass information about child to his or her parents. Children who travel to and from school by themselves without monitor by their parents are exposed to danger. This paper focuses on implementing children tracking system for every child attending school. The system consists of main units a bus unit. The bus unit system is used to detect when a child enters/exits from the bus. Childs information at entry/exit level will be recorded automatically when they pass by the scanner. At the same time parents will automatically receive the SMS from the system that inform their children enter/exits from bus. Also information of students will be displayed on LCD display. This system will benefit to parents, school children�s and school administrator. This system will be also promising to enhance the safety of child during daily transportation.
Keywords: RFID, System integration, Transportation Safety, Monitoring, GSM.
Abstract
MIMO-OFDM Performance Analysis between Discrete Fourier and Discrete Wavelet Transform Techniques in LTE
M.Jayalakshmi
DOI: 10.17148/IJARCCE.2016.5150
Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is one of the main techniques employed in 4th Generation Long Term Evolution (LTE). In OFDM because of loss of orthogonality between the subcarriers there is intercarrier interference (ICI) and intersymbol interference (ISI) and to overcome this problem use of cyclic prefixing (CP) is required which uses 20% of available bandwidth. Wavelet based OFDM provides good orthogonality and with its use Bit Error Rate (BER) is improved. Wavelet based OFDM is used at the place of Discrete Fourier Transform (DFT) based OFDM in LTE. Compared the BER performance of wavelets and DFT based OFDM and implementation is done for SISO antenna configuration. It is proposed to use MIMO antenna configuration. Also along with BER, SER plots can be taken .BER performance of MIMO configuration can be obtained.
Keywords: MIMO, LTE, OFDM, BER.
Abstract
Efficient Performance of Hybrid Watermarking Scheme
Jaspreet Kaur, Er.Varinderjit Kaur, Dr.Naveen Dhillon
DOI: 10.17148/IJARCCE.2016.5151
Abstract: The digital technology enables unauthorized replica of digital images, the protection of the copyrights of digital image is a critical issue. Image watermarking schemes are used to protect the digital images. The Capacity implies total which are placed to guard image. More capacity implies one can cover wide range of information Also the watermark scrambling utilizing the Arnold transform is used to protect watermark further. Arnold transform has changed the watermark in this way that it becomes meaningless for the hackers or crackers. Different type of multiple attacks will also be considered to evaluate the effectiveness of the proposed technique. The proposed technique is designed in MATLAB tool with the help of image handling toolbox. The experiment has clearly shown that the proposed technique has better results over the available techniques.
Keywords: Watermarking Scheme, FFT, Arnold transform, SVD technique.
Abstract
Review of Web Crawlers with Specification and Working
Yugandhara Patil, Sonal Patil
DOI: 10.17148/IJARCCE.2016.5152
Abstract: Due to the size of the web and its dynamic nature, building an efficient search mechanism is incredibly necessary. A huge range of web content is regularly being added each day, and information is continually changing. Search engines are used to extract valuable info from the web. Web crawlers are the principal part of search engine. It's a computer program or software that browses the World Wide Web in an exceedingly methodical, automatic manner or in an orderly fashion. It is an important methodology for collecting information on, and keeping up-to-date with the quickly increasing web. This Paper shortly reviews the ideas of web crawler, its design and its varied types with specification and working.
Keywords: Web crawler, crawler frontier, web repository, distiller, focused crawling.
Abstract
An Approach for using Token Memory in Parallel Processing
Buddh Bhagwan Sahu, Prof. Rajesh Tiwari
DOI: 10.17148/IJARCCE.2016.5153
Abstract: A parallel computer (or multiple processor system) is a collection of communicating processing elements (processors) that cooperate to solve large computational problems fast by dividing such problems into parallel tasks, exploiting Thread-Level Parallelism (TLP).The major issues involved in parallel processing are the concurrency and communication characteristics of parallel algorithms for a given computational problem, The number of processing elements (PEs), computing power of each element and amount/organization of physical memory used, how the processing elements cooperate and communicate and how data is shared/transmitted between processors. The major approach of the work is to propose a token memory architecture to reduce the load on CPU parallel processing .During peak period the heavy tasks will be transferred to this token memory so as to reduce load on CPU.
Keywords: CPU (Central Processing Unit), Token memory, Parallel Processing, Token Memory.
Abstract
A Survey on Cyber Physical System Security with Deceptive Virtual Host for Industrial Control Networks
Ranjeetha Priya. K, Sowmika. S, Bharanidharan. A
DOI: 10.17148/IJARCCE.2016.5154
Abstract: Network security plays a major role in monitoring the intruders in the industrial network and smart grid infrastructure. Industrial network area is suffering seriously with security issues they faced day-to-day. Network administrators should continuously monitor the network traffic to detect intruders in the network. Due to lack of security in the network, network traffic and intruders is becoming a major challenge. This paper presents the effective techniques, tools and approaches such as ettercap, wireshark, SCADA and game theoretic approaches which monitors the intruders in the network and network traffic. Thus the security issues can be improved by below mentioned techniques.
Keywords: SCADA, WAP, DNP3, ICMP.
Abstract
MAC Spoofing Detection and Prevention
Ananth Hegde
DOI: 10.17148/IJARCCE.2016.5155
Abstract: As we all know, wireless networks are spread at each and every part of the world, starting from home to large organizations, governments, etc. The exponential growth in the deployment of wireless access networks (WLAN) makes them an attractive target for attackers. Wireless networks are vulnerable to identity spoofing attacks when a hacker/attacker can forge the MAC address of his wireless device to impersonate another device on the network. Unlike IEEE 802.11 data frames, management frames which carries MAC address are not encrypted, which makes source authentication difficult. Several techniques exists to detect MAC spoofing such as Sequence number analysis, Radio signal strength based detection, dynamically changing MAC etc. All of these techniques can wrongly classify malicious user to bean authenticated one. In this paper, we propose a reliable and robust algorithm based on smart antenna technology and shared key exchange techniques to detect and prevent MAC spoofing.
Keywords: Access Points, Dos, WLAN, CSI, MIMO.
Abstract
GPS and Bluetooth Based Object Tracking System
Rupen Paul V, Adithi Reddy, Sujith PS, Aneesh M
DOI: 10.17148/IJARCCE.2016.5156
Abstract: This paper presents an object tracking system to track the objects through GPS and Bluetooth technology. Objects are usually tracked by the implementation of signal strength based on GPS, GSM, RFID and Bluetooth. We make use of Global Positioning System (GPS) for tracking long range objects and Bluetooth technology for short range objects. The system allows a user to view the present position of the target object on Google Map through an android application. Hence each target object will have a tag that has both GPS and Bluetooth module. The experimental results suggest that many belongings lost through misplacement or robbery can be found within a short span of time by making use of the object tracking system.
Keywords: GPS, GPRS, RFID, Bluetooth.
Abstract
Acceleration of Query Response in Distributed System using Materialized View Approach
Pooja G.Dhawane, Prof. Garima Singh Makhija
DOI: 10.17148/IJARCCE.2016.5157
Abstract: Data warehousing is a collection of data from multiple, very large, distributed, heterogeneous databases and other information sources. This information is stored in autonomous and distributed systems .Quick response time and accuracy are the vital things for the database to be successful. In distributed databases query response time is the basic need. Performance of query can be improved by different approaches like hybrid integration system where most recent data is stored at mediator i.e. common access point to distributed system ,optimization of query, use of proper data structure, reduce complexity of query etc. leaving all alternatives, we are planning to use materialized view approach. Materialized view is used to store the result of queries. We are going to store the result of queries based on the frequency of queries fired by the user. The queries having high frequencies i.e, based on the user demandable queries materialized view is designed. This will save the time of revisiting the base table whenever any query is fired frequently and also saves the time of cost of operations like join, aggregations etc.
Keywords: Materialized view, Query Response, Access Frequency, data warehousing.
Abstract
An Investigation of the Costs and Benefits of Thinning on the Straight Line Hough Transform
Gideon Damaryam, Emeka Ogbuju, Haruna Abdu
DOI: 10.17148/IJARCCE.2016.5158
Abstract: This paper presents the outcome of an investigation of the costs and benefits of thinning as part of pre-processing for line detection including specification of end-points, from visual images of indoor rectilinear environments. This is done as part of a bigger process with the goal of detecting lines to enable a small mobile robot self-navigate within the environment based on navigationally important features such as doors and corridors reconstructed from the lines detected. The straight line Hough transform is used to determine parameters which specify gradients and positions of lines, and then the end-points of the lines are determined. To do this images can be pre-processed to the point of edge-detection which typically yields edge lines several pixels thick, or edge-detection followed by thinning yielding edge lines about a single pixel in thickness. Since the Hough transform operates on all pixels in an input image, more work is needed to process the �unthinned� image. However, thinning itself takes time. This paper looks into whether the taking the time to do thinning is justified in terms of overall time taken, and quality of resulting lines found, and concludes that for the purpose described, thinning does appear to improve the quality of line detection, while taking less total time to do it.
Keywords: edge-detection, Hough transform, line detection, processing time, thinning.
Abstract
A Paramount Mining for Facebook Dataset using Hadoop
Vrushali R Choudhari, Suchita Walke
DOI: 10.17148/IJARCCE.2016.5159
Abstract: This Big Data is new term define to store a huge data sets complex data. There are various techniques which are proposed for mining. The big data can be mined is really a researchers issue especially in domain of text mining. This paper presents an effective technique which include a preprocessing of huge dataset(i.e. text mining) for finding the shortest neighbor. the dataset used here is facebook .The proposed system provides a solution for storing huge data and retrieving which is adapted to all environment.
Keywords: component; Dataset, Preprocessing, Clustering, Big Data, K-Means.
Abstract
Big Data – A Pool of Opportunities and Negotiations: Forseen and Unforseen
Anand P. Lad, Samarth A. Shah
DOI: 10.17148/IJARCCE.2016.5160
Abstract: Big data is the term for any collection of large and complex data which becomes difficult to process using traditional data processing applications. The challenges include analysis, capture, curation, search, sharing, storage, transfer, visualization, and privacy violations. Recent times have witnessed the generation and storage of large amount of vital data by various industries which is rapidly increasing on the internet and thus the data scientists are facing a lot of challenges for maintaining a huge amount of data as the fast growing industries require the significant information for enhancing the business and for predictive analysis of the information. The question of the hour is, how to develop a high performance platform that efficiently analyzes big data and how to design an adroit algorithm for mining the useful things from big data. Facilitation of information flows and mechanisms of learning and coordination by heterogeneous individuals is the primary role of big data in cities [4]. However, processes of self-organization in cities, as well as of service improvement and expansion must rely on general principles that enforce necessary conditions for cities to operate and evolve. Such ideas are the core a developing scientific theory of cities, which is itself enabled by the growing availability of quantitative data on thousands of cities worldwide, across different geographies and levels of development. Performing computation and database operations for massive amounts of data, remotely from the data owner�s enterprise is the implication of Big Data. Since a key value proposition of big data is access to data from multiple and diverse domains, a very important role shall be played by Security and Privacy for the technology and implementations.
Keywords: Big data characteristics (Four Vs), big data analytics, big data application, Connectivity between Big data with IoT and cloud, big data limitations, Security and privacy preservations in big data.
Abstract
Sierpinski Carpet Based Mushroom Shape Fractal Microstrip Antenna
Priyanka Sharma, Sumit Kaushik, Vijaya Thakur
DOI: 10.17148/IJARCCE.2016.5161
Abstract: Microstrip antenna is the most basic types of antenna which is used now days. The reduced weight and flat profile of these antennas as compared to the parabolic reflector antennas make it attractive for a number of applications. These antennas are less bulky and are capable of resonating at different frequencies but have some disadvantages as low bandwidth and low gain. There are a number of techniques which may be used in order to improve these factors. Using fractal geometry or using DGS are some of these techniques. Design and simulation has been carried out using IE3D simulation software. Sierpinski fractal geometry has been used to form a mushroom shaped patch antenna.
Keywords: Fractal, mushroom shaped, patch antenna.
Abstract
A Comparative Study of Data Mining Tools on Parkinson’s disease
Mr. Santosh Chauhan, Dr. Maitreyee Dutta, Dr. Arvind Tiwari
DOI: 10.17148/IJARCCE.2016.5162
Abstract: The data mining techniques are a more popular in many field of medical, business, railway, science...etc; these are most commonly used for medical diagnosis and disease prediction. In this paper I am modifying the existing method of mining from the large dataset. By this method we will retrieve the similar objects each of which includes an image sequences having the similar properties or behaviours. The data mining is used for retrieving the relevant information in medical and health areas of the most important factors in medical societies. The current paper is to provide an analysis of data mining techniques to be used in Parkinson�s disease.
Keywords: Parkinson disease, data mining, MCC, ROC.
Abstract
Wireless Control Crane
Rajashri Bharade, Pooja Sinha, Komal Labde, Prof..Praffula.Chaudhari
DOI: 10.17148/IJARCCE.2016.5163
Abstract: Here we are introducing Wireless control crane which can be used in industry to lift heavy weights i.e upto 25 to 125 kg. In this we are controlling the crane by RF data transfer to wirelessly control a crane arm by using zigbee module. The Wireless control crane is a powerful gadget and we wanted to build a new hack with it. Our crane is composed of two servo motors, one of which is connected to a gripper. The servos motors are controlled by PWM signals sent by the pic16F628A , and these signals are generated from parsing the received data from a serial connection with a wirelessly connected through zigbee module.
Keywords: PIC16F628A, Zigbee module, relay board, limit switches.
Abstract
Efficiently Harvesting Deep Web Interface with Reranking and Clustering
Amruta Pandit, Prof. Manisha Naoghare
DOI: 10.17148/IJARCCE.2016.5164
Abstract: The rapid growth of the deep web poses unpredefine scaling challenges for general purpose crawler and search engines. There are increasing numbers of data sources now become available on the web, but often their contents are only accessible through query interface. Here proposed a framework to deal with this problem, for harvesting deep web interface. Here Parsing process takes place. To achieve more accurate result crawler calculate page rank and Binary vector of pages which is extracted from the crawler to achieve more accurate result for a focused crawler give most relevant links with an ranking. This experimental result on a set of representative domain show the agility and accuracy of this proposed crawler framework which efficiently retrieves web interface from large scale sites.
Keywords: Crawling, HTML parsing, Page ranking, Binary Vector, K-Mean clustering.
Abstract
Implementation of Heterogeneous Face Recognition using SIFT and MLBP Algorithm
Farinaparveen Khan, R K Krishna
DOI: 10.17148/IJARCCE.2016.5165
Abstract: Since few years Face Recognition has become quite popular because of its various applications in several domains. In automated face recognition a very difficult challenge is to compute the facial similarities between face images obtained in alternate modalities. To address this challenge Heterogeneous Face recognition (HFR) implementation is considered. This procedure helps to match the two face images which can vary from infrared image to a photograph like, driver�s license, passports, etc. or to a face image from different modalities like infrared images, aged images, etc. In this paper we will discuss how HFR can be implemented using SIFT and MLBP algorithm to extract various image features. The main objective is to extract the different invariance features from heterogeneous images that help to give a correct match between probe and gallery images.
Keywords: Face recognition, heterogeneous face recognition, gaussian, DOG, CSDN, SIFT, MLBP, LDA, KLDA.
Abstract
Data Storage and Access with Cloud Support
Prof. Ashwini S. Mane, Mangal V. Wagh, Aboli V. Tarte, Mayuri A. Fulzale, Priyanka S. Mehta
DOI: 10.17148/IJARCCE.2016.5166
Abstract: Home cloud network is a system that uses mobile devices to upload or download files and features automatically through internet from anywhere around the home, sometime a home cloud network is called a smart home. This network uses a merging of a mobile phone application and computer based program to provide the user interface to the consumer. The home cloud system differs from other system by allowing the user to operate the system from anywhere around the world through internet connection. In a Home Cloud network we developed Home cloud network that employs the integration of cloud network, touch screen mobile devices, wireless communication, power line communication to provide the user to upload and download within their home. This system uses a consolidation of a mobile phone application, raspberry-pi hardware and PC based program to provide a means of user interface to the consumer. This system is designed to be low cost and expandable. We propose a system in which we can share all images within that cloud network. Suppose user took a picture and store on cloud then other android user can see that images.
Keywords: Home cloud, cloud computing, raspberry-pi.
Abstract
Design, Simulation & Optimization of 45nm NMOS Transistor
Ms.Nitin Sachdeva, Dr. Munish Vashishath
DOI: 10.17148/IJARCCE.2016.5167
Abstract: This paper focuses on the result of process & device simulation using SILVACO TCAD tools to develop and optimize 45nm NMOS electrical characteristics using Gaussian doping profile. Fabrication process of transistor was performed in Athena while electrical characterisation of device was performed by ATLAS simulator. The analysis focussed on ID-VGS curve, IG-VDS curve, threshold voltage, ON and OFF currents, DIBL estimation, dependency of threshold voltage on various parameters like gate oxide thickness, VTH adjust implant doping concentration and Halo implant doping concentration . From the simulation result, optimum solution of threshold voltage of 0.095V has been achieved.
Keywords: MOSFET, Silvaco, threshold voltage, DIBL, Athena.
Abstract
E-Voting System using Visual Cryptography & Homomorphic Encryption
Ruchita Tekade, Prof. Reena Kharat, Varsha Magade, Marjina Shaikh, Pallavi Mendhe
DOI: 10.17148/IJARCCE.2016.5168
Abstract: Election is a process of establishing a democracy in the country. This process should be ensured to maintain the integrity and confidentiality of the vote casted and the authentication before citizens of particular country casts their votes [1]. It is very important to provide security to voting system. In this paper we provide security to voting system with secure user authentication[7] by providing biometric fingerprint to voter. In this system user has to enroll his/her finger print for voter ID card[1]. Finger print scanner will create image for that finger print. Share construction algorithm will be used to construct two shares of finger print image. One share[6] will be stored in database and another share will be stored in voter's ID card[1] (VIC). Here database & voter's ID card don't contain actual image of fingerprint. Unless and until both shares are available, original fingerprint image[6] cannot be reconstructed. Fresh and reconstructed fingerprint image are compared. If they match then voter is authentic as he/she claimed. As voter is authentic so he/she will cast the vote. After casting homomorphic encryption[2] is applied and results get counted. It makes election procedure to be secure against a variety of fraudulent behaviors.
Keywords: Authentication, Homomorphic encryption, Secret Sharing scheme, Visual Cryptography.
Abstract
Multimodal Visual Search using CBIR system on Mobile Device
Prasad Kamthe, Aniruddha Bidnur, Rahul Patil, Sharad Pawar
DOI: 10.17148/IJARCCE.2016.5169
Abstract: In this paper, it describe the content based image retrieval system based on three major types of visual information color, texture and shape, and their distances to the origin in a three dimensional space for the retrieval. It also describes a multimodal interactive image search system using mobile devices. This system useful for users who already have pictures in their minds but have no precise descriptions or names to address them. By describing it using speech and then refining the recognized query by interactively composing a visual query using exemplary images, the user can easily find the desired images through a few natural multimodal interactions with their mobile device.
Keywords: Multimodal visual search, interactive search, mobile device, Image Retrieval, Color Histogram.
Abstract
Green Network Design in Downlink MU-MIMO System Using Convex Optimization Technique
Chithra B Das
DOI: 10.17148/IJARCCE.2016.5170
Abstract: Wireless technology has become the primary enabler of mobility and ubiquitous network access over the past decade. Multiuser- MIMO (MU-MIMO) has emerged as one of the prime technologies for achieving spectral efficiency (SE) in 4G LTE- A system. In addition to spectral-efficiency improvement, energy efficiency (EE) is becoming increasingly important for wireless communications because of the slow progress of battery technology and the growing requirements of anytime and anywhere multimedia applications. But this two design criteria (SE and EE) conflict with each other and a careful study of their trade-off is necessary for green network planning in future wireless communication systems. By considering the SE requirement, as a constrained optimization problem where constraints redefined to maximize EE using convex optimization technique and it is done for a 2�2 antenna configuration. It is proposed to use 4�4 MIMO antenna configuration and also an optimal beam forming design for both 2�2and 4�4 configuration is considered.
Keywords: MU-MIMO, LTE-A, Beam forming, Green Network, Energy Efficiency.
Abstract
CAM: A Combined Analytical Model for Efficient Malware Classification
Om Prakash Samantray, Satya Narayan Tripathy, Susant Kumar Das, Binayak Panda
DOI: 10.17148/IJARCCE.2016.5171
Abstract: With the substantial use of internet Technology, the frequency of malware is increasing swiftly despite careful use of anti-malware software. Detecting malware is still is a challenge because invaders use new techniques to escape from the detection methods. The signature based detection which is used in most of the anti-malware software is proved to be unproductive due to the exponential increase in the number and types of malware. The static analysis methods can be used to analyse the binary file and generate the signature as an output. Dynamic analysis executes the file and then considers the behaviour and actions to identify whether the executable is a malware or benign. Considering the positive aspects of both these methods, an integrated analysis can be formulated to analyse and classify an unknown executable file. This proposed method uses machine learning in which known malwares and benign programs are used as training dataset. The binary code as well as dynamic behaviour can be analysed to generate a feature vector. A Combined Analytical Model is proposed by integrating advantages of both static and dynamic analysis. The proposed model improves efficiency and accuracy of malware classification. Experiments done on static, dynamic and the proposed integrated analysis technique to prove that the proposed method has a better accuracy than the individual analysis techniques.
Keywords: Malware Detection, Dynamic analysis, Static analysis, Printable string information (PSI), Support Vector Machine (SVM).
Abstract
Viability of Search Engine Optimization (SEO) Techniques
Harsha Sharma
DOI: 10.17148/IJARCCE.2016.5172
Abstract: Search Engine Optimization (SEO) Techniques often come under the scrutiny regarding their viability and ethical acceptance in the web community. Ever since internet marketing and web analytics became key components of marketing budget of a business, obtaining higher ranking in the Search Engine Result Pages (SERPs) has become highly competitive and consequently outsourced to professional firms. SEO is an evolving methodology which adapts itself to the latest algorithm used by the search engines. In this paper, we discuss the ever-changing SEO guidelines with reference to Google search engine. Current viability of old-school SEO techniques � keywords, backlinks and meta descriptions is examined with reference to regular search algorithm updates by Google. Black hat techniques targeting old-school SEO are also described.
Keywords: Keyword, backlinks, meta, google updates, black hat techniques.
Abstract
Reducing the Third-Order Inter Modulation Distortion by Feed Forward Linearization of Power Amplifier
Amanpreet Kaur, Rajbir Kaur
DOI: 10.17148/IJARCCE.2016.5173
Abstract: Power amplifier determines the performance of a wireless communication system but it tends to be highly non-linear and results in intermodulation distortion at its output, thereby degrading the signal quality and causing adjacent channel interference. In this paper, feedforward linearization technique is used to reduce power amplifier non-linearity. The simulations are carried out using two-tone harmonic balance input at the frequencies of 2120 MHz and 2130 MHz. It is seen that this technique reduces the third-order intermodulation distortion levels to -68 dBm and the distance between fundamental component and third-order distortion component is 106 dBm.
Keywords: Feedforward, Intermodulation distortion (IMD), Linearization, Power Amplifier (PA).
Abstract
‘Advanced Security Primitive Using Digital Images’
Abheesh Dokras, Chetan Dhapure, Akshay Dang, Jayesh Kawale
DOI: 10.17148/IJARCCE.2016.5174
Abstract: There are several texts based and graphical password techniques based which are being used for user authentication. In current scenario many of the applications being developed for user authentication are text based password. Text passwords are comparably not secured as the graphical passwords because text passwords easily suffer from man attacks like shoulder suffering, dictionary attacks and many more. They can be easily breached with number of different techniques. The textual passwords will be either alphabetic, numeric or alphanumeric type (i.e. combination of alphabets as well as numbers and special characters). The research shows that text passwords are complex and hard to remember and hence humans select a short password which is simple in some manner to memorize and recall. As a result the security is not so accurate in the present scenario. In our system we are proposing the enhanced security by Captcha technology in which the images are fixed and the texts called Captcha are changed every time and hence it is more secure than traditional technique. By using graphical password system and Captcha technology a new security primitive will be introduced. In this system the watermarking method will be used in database to hide the actual images by simple codes. Working of the system will be done through, user need to register first and then selects number of images as a password after that while login user needs to enter the random code generated by the previously selected images as password an access his account by this system. In a case, if user forgets the password then user will be able to recover the account by a secure provision. And hence the security will increase automatically than traditional password entering techniques because user need to enter different set of codes every time while login. It means there is no need to remember the complex and difficult textual passwords. Instead of that user need to just identify the image and enter the codes below that image. By this technique we will try to upgrade to the existing security for better and secure password based systems.
Keywords: Authentication, Captcha, Digital Images, Graphical password, Watermarking.
Abstract
Secured and Efficient Cloud Storage Data Deduplication System
Sumedha A Telkar (S. A. Maindakar), Dr M Z Shaikh
DOI: 10.17148/IJARCCE.2016.5175
Abstract: During the last decade, cloud computing technology becomes an attractive trend of leveraging cloud based services for large scale content storage, processing and distribution. Thus, data deduplication becomes more and more a necessity for cloud service provider. Also security and privacy are top concern for the public cloud. Aiming to address the above storage and security challenges, this paper makes the attempt to formalize the notion of secured and efficient cloud storage system. We developed a prototype consist of client side deduplication for the security, storing and sharing outsourced data using the hybrid cloud. As a proof of our framework, we implement prototype and demonstrate that the incurred overhead is very limited in realistic environment.
Keywords: Deduplication, convergent encryption, differential privileges, hybrid cloud.
Abstract
Mobility Based Reconfigurable System under Disaster Management in WSN Using Shortest Path Algorithm
Isha Sharma, Shilpa Gambhir
DOI: 10.17148/IJARCCE.2016.5176
Abstract: Localization is one of the most important applications for wireless sensor networks since the locations of the sensor nodes are critical to both network operations and most application level tasks. WSNs consist of tiny sensor nodes that can be easily embedded in the environment, establish a wireless ad-hoc network, and compose a distributed system to collaboratively sense physical phenomena and process sensed data, or to react to the environment based on the sensed data. To address these requirements, we need to study the fundamental issue of reprogramming and software reconfiguration in WSNs. In this work, it proposes mobility based dynamic reconfiguration system in WSN. By providing access for the user to construct different virtual fields, proposed protocol will accomplish the goal of meeting the need of different applications and different network conditions. In this work, it will take scenario for environmental monitoring and data collection. The proposed mechanism will be implemented with MATLAB.
Keywords: WSN System, Dynamic Reconfiguration System, Localization, Mobility Management etc.
Abstract
Data Deduplication, Revision and Sharing in Hybrid Cloud Supporting Differential Authorized Privilege
Priyanka Bhopale, Dr. A.M. Kanthe
DOI: 10.17148/IJARCCE.2016.5177
Abstract: Cloud storage units are becoming more and more popular these days and hence they require the mechanism to down their utilization cost and provide more efficiency and security to client�s data. Deduplication is the technology which stores only a single copy of echoing data and so it reduces the required storage space. In order to provide confidentiality to the client�s data and at the same time acquiring data deduplication, so we provide a technique called as convergent encryption. In this data is encrypted before outsourcing. To provide better data security this first talks the problem of authorized data deduplication, in this we further enhance this with sharing the files among the users on the basis of privileges. Secondly, this gives right to the user to revise the content of its data and share it with other users with keeping the integrity of data intact. Also we have presented several security schemes with data deduplication construction in a hybrid cloud model. The proposed method shows that the users are able to share the data and revise the data, in cloud and with efficiency and security. Our performance measures show that the proposed system gives more security in terms of insider and outsider attacks.
Keywords: authorized data deduplication, encryption, data revision, hybrid cloud, user privileges.
Abstract
Placement Support System
Prof. Rupali Komatwar, Swapnil Kamble, Mihir Khedekar, Kishor Walzade
DOI: 10.17148/IJARCCE.2016.5178
No abstract available.
Abstract
An Authenticate Cryptography based security model for handling multiple request from multiple devices for Mobile Cloud Computing
Debabrata Sarddar, Enakshmi Nandi
DOI: 10.17148/IJARCCE.2016.5179
Abstract: Mobile Cloud Computing (MCC) has revolutionized the way in which mobile endorsers across the globe leverage services on the go. MCC integrates cloud computing into the mobile environment and get over the obstacles related to performance (e.g. battery life, storage, and bandwidth), environment (e.g. heterogeneity, scalability, availability) and security (e.g. reliability and privacy).It is an answer to intensive processing and storage demand of real-time and high end applications. The capabilities of mobile devices have been amending very quickly in terms of computing power, storage, feature support, and developed applications. Even these mobile applications are still intrinsically limited by a relative lack of bandwidth, computing power, and energy compared to their connected counterparts. In this paper we systematically explore the privacy and security issues and launch a cryptography based model for handling multiple request from multiple devices for Mobile Cloud Computing. Our approach helps to authenticate communication between customers and service providers using encryption, decryption and message digests.
Keywords: Cloud Computing, Mobile Cloud Computing (MCC), Authentication Server (SS), Authentication, Encryption, Decryption, Message Digest.
Abstract
Building Detection in Satellite Image using Firefly Tuned Grab Cut Algorithm
Deep Shikha, Er. Kapil Sirohi
DOI: 10.17148/IJARCCE.2016.5180
Abstract: A robust building detection methodology is proposed in this paper unlike classical classification methods, where self supervision data can be automatically extracted from the image by using shadow and its direction as an invariant for building object. In this methodology; first the vegetation regions are detected from a given satellite image and local directional fuzzy landscapes representing the existence of building are generated from the shadow regions using the direction of illumination obtained from image metadata. For each landscape, foreground (building) and background pixels are automatically determined and a bi partitioning is obtained using a graph-based algorithm, Grabcut, which is further modified by an iterative bio inspired optimization: Firfly Algorithm. This work towards the optimization k-means clustering used in grab cut method.
Keywords: Geographical Information System (GIS), Normalised Infra red (NIR) band, firefly algorithm.
Abstract
A Review on Query Processing and Optimization in SQL with different Indexing Techniques
Chiranjeev D. Garhwani, Shreya S. Kandekar, Payal S. Chirde
DOI: 10.17148/IJARCCE.2016.5181
Abstract: In data warehousing and OLAP applications, large data are processed. To perform scalar-level predicates in SQL with large amount of data become highly inadequate which requires supporting set-level comparison semantics that means to compare a tuples of group with a number of values. We present here a comprehensive review of the state-of-the-art processing a tuples of group with multiple values and to optimize the queries. Currently available queries are complex, complex to write as well as challenging for database engine to optimize, which results in costly evaluation. Many of the available query processing algorithms does not take the advantage of the small-result-set property, which incurs intensive disk accesses as well as needed computations, which results in long processing time especially when data size is too large. Optimized query processing approach achieved by various studied algorithms shows very good performance to processing set predicates.
Keywords: Data Warehousing, Bitmap index,OLAP,Query processing and optimization,Word-Aligned Hybrid(WAH),VLC, Huffman Coding.
Abstract
Poly Tree Construction Method to improve QoS in Wireless Sensor Networks
Nirupama. A, Sudarson Jena
DOI: 10.17148/IJARCCE.2016.5182
Abstract: The recent developments in Wireless Sensor Networks (WSN) suffer from efficient and secure transmission of packets. The common attacks in WSN are dropping/modification of data packets. Security to the data can be improved by disconnecting the droppers/modifiers form the network. This paper proposes a method to identify the nodes which are droppers and to disconnect them from the network. Simulation results are presented.
Keywords: WSM, Packet Droppers, Modifiers, Multihop, Misbehaving Nodes.
Abstract
A Review: Face Liveness Detection
Dhananjay Garud, Dr. S.S. Agrawal
DOI: 10.17148/IJARCCE.2016.5183
Abstract: In order to develop security systems for identity authentication, face recognition (FR) technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoo?ng faces. To defend from these attacks and to enhance the reliability of FR systems, many anti-spoo?ng approaches have been recently developed. A secure system needs Liveness Detection in order to guard against such spoofing. In this paper various face liveness detection methods are discussed which are used to avoid these attacks. This helps to create a robust and accurate system to avoid spoofing attacks. The main aim of this work is to give a simple for future generation for more secured liveness detection approach.
Keywords: Biometric technology, Face Recognition, Face Liveness Detection, Spoofing Attack.
Abstract
A Review: New Histogram for Bilateral Filtering and Nearest Neighbor Searching
Sheetal Waghchaware, Prof. P. S. Deshpande
DOI: 10.17148/IJARCCE.2016.5184
Abstract: Noise not only degrades quality of image but also results in loss of important information in images. There are different types of noise are available such as Gaussian, impulse, mixed noise etc. Filtering plays vital role in image processing and computer vision to remove noise. In this work, we have reviewed and analyzed different nearest neighbor field (NNF) methods using bilateral filtering to preserve edges. Computing NNF is nothing but, for each patch in one image, find out the most similar patch in other image. Bilateral filtering overcomes limitation of using box spatial filter kernel by using locality sensitive histogram (LSH). The computational complexity of bilateral filter is linear in number of pixels. Also new bilateral weighted histogram (BWH) is proposed for edge preserving patch-match. In this paper, we have studied and reviewed different patch-matching methods.
Keywords: locality sensitive histogram, bilateral weighted histogram, bilateral filter, nearest neighbor field.
Abstract
Augmented Panorama for Furniture Layout
Prof. P. S. Toke, Aditya Limaye, Susmit Mane, Vishal Metri, Aniket Paste
DOI: 10.17148/IJARCCE.2016.5185
Abstract: In our day today life we have to arrange our work as well as the equipment or tools which are needed for certain operation. Similarly we have to clean our rooms make them tidy and neatly arranged so as to give a furnished, attractive look to our rooms and houses. We arrange our furniture in such a fashion that the room looks attractive as well as we get an ample amount of space for comfortable movement of the family members and the guests. Here we are going to propose an approach which will enhance augmented view of our rooms, we will superimpose the 3-D objects or the furniture images in our room virtually. This will give us a fair idea of how the room will look like when the furniture is placed in reality.
Keywords: Procedural Modeling, Object Layout, Data-Driven Modeling, Augmented Reality, Interaction Techniques, Tangible User Interfaces, Multimodal Input.
Abstract
An Intelligent Controller Applied To Renewable Energy System
Eisa Alsakkaf
DOI: 10.17148/IJARCCE.2016.5186
Abstract: In this paper, an intelligent controller applied to renewable energy system has been discussed. The attractiveness of the photovoltaic generators (PV arrays), as a renewable power source is that they produce a clean energy without running costs. This fact in addition to the continuous reduction in the PV arrays initial cost and the increase in their efficiency imply the promising future of the PV generation systems. The PI-controller gains are accurately identified and hence it proved its ability in driving the PV module to its maximum power point in terms of majority of the performance measures. This leads to a significant increase in the delivered power, especially when the direct coupling operating point is far from the maximum power one.
Keywords: Renewable, An intelligent, Photovoltaic, Energy.
Abstract
XML Based Distributed Web Mining
Prof. Mamta gehlot, Siddhesh Deorukhkar, Rishit Kotian, Ajay Kemble, Anuj Rana
DOI: 10.17148/IJARCCE.2016.5187
Abstract: With the rapid growth of the Web data, for the phenomenon of data explosion but poor knowledge, as the data mining based on database table has been unable to meet the needs of Web application, a distributed Web mining is becoming a research hot spot presently. Firstly, based on the research of web mining, XML is used to transform semi-structured data to well-structured data, and a distributed web mining model based on XML is deeply discussed. Then, a mobile agent technology is introduced into the design of Web mining system, and a distributed Web mining structure based on data mining agent is built. Finally, an architecture design of network teaching platform based on XML and agents is realized, which can provide intelligent aids for personalized learning, thus greatly improve the teaching efficiency of network teaching platform. Web data mining is a new important research field in data mining. In this paper, the conception and characteristic of data mining based on Web are introduced the process and the general methods of data mining based on Web are expatiated. At present many websites are built with HTML, which is difficult to achieve real effective and accurate web mining. The appearance of XML has brought convenience for it. Based on the research of web mining and a model of web mining system which has basic data mining function and faces multi-data on the Web is built. With the development of information technologies, web data mining has been put forward and in wide research. It is defined as the discovery, extraction and analysis of useful and potential information from the World Wide Web. But much of inhomogeneous and anomalistic and dynamic updated semi-structured data in web pages makes web data mining difficult. To solve this problem, on the basis of analyzing the characteristics of XML, the paper presents a web data mining model on XML, introduces the method to implement the model with XML.
Keywords: XML Database, ASP.net, SQL server.
Abstract
Secure Communication – Using Interleaved Subcarrier Selection Technique
Steffi Jose
DOI: 10.17148/IJARCCE.2016.5188
Abstract: In this paper, a sorted subcarrier interleaving technique is used for preventing eavesdropping in OFDM system. In each OFDM signal, subcarriers are interleaved according to the sorted order of channel impulse response. Random noise can be added before interleaves to get two tire secrecy rate. The frequently updated subcarrier interleaving pattern can only be shared between legitimate nodes based on channel reciprocity. Without a proper de-interleaving pattern, mismatched information recovery occurs at the eavesdropper, thus preventing eavesdropping. . A subcarrier selection algorithm is investigated to realize a trade-off between the eavesdropping resilience and transmission reliability.
Keywords: Security, wireless communications, orthogonal frequency division multiplexing (OFDM), eavesdropping, subcarrier interleaving.
Abstract
Video Compression Exploiting Luminance Masking and DWT
Snehal Patil, Prof. (Dr) S.K. Jagtap
DOI: 10.17148/IJARCCE.2016.5189
Abstract: Digital video compression techniques have contributed a vital role in the world of telecommunication and multimedia sector where bandwidth is still a valued product to be considered. A big amount of multimedia data to maintain in limited storage space, it needed to be compressed, but during the compression any data loss should not be occurred. Hence, video compression techniques focused on prime importance for reducing the volume of information required for picture sequences/streaming pictures without losing much of its quality. Thus, in order to provide an efficient compression method for multimedia data, Luminance Masking technique was proposed. The proposed method has been integrated into the HEVC reference model for the HEVC Range Extensions and its performance was evaluated by measuring the bitrate reduction against the HEVC Range Extensions. Also, comparison of wavelet compression method with this technique on various parameters has been opted for analysis towards getting improvements and other advancements. Here, Discrete Wavelet Transform (DWT) embedded to achieve the compression for image and then it extended further to series of images which is nothing but a video.
Keywords: HDR, HEVC, wavelet compression technique, DWT.
Abstract
Distributed Intrusion Detection System using Bayesian learning and Apache Mahout
Ronak Agrawal, Ganesh Talekar, Akshaysingh Chandel, Shriganesh Munde, Deeplakshmi Zingade
DOI: 10.17148/IJARCCE.2016.5190
Abstract: If the distributed intrusion detection system do not exist then detecting the intrusions in the networks would have become tedious task and the risk would have been increased. In market there are plenty of different intrusion detection systems available but no one of the distributed type. Many of them make use of pattern matching and different complex algorithms but this makes the system slow. So for proper Distributed intrusion detection system using Bayesian learning in Apache mahout using concepts like K-means clustering, Neuro-Fuzzy, Artificial neural network, Bayesian Learning, Apache Mahout to overcome the flaws like lagging in the detection of the intrusions, fail to detect the intrusion, harm to the system or system failure.
Keywords: K-means, Artificial Neural Network, Neuro-Fuzzy, Bayesian Network, Apache Mahout.
Abstract
Routing Problems and Solutions for Location-Based Routing in MANETs
Yashashree A. Jakhade, Nitin R. Gavai
DOI: 10.17148/IJARCCE.2016.5191
Abstract: In MANET, to form a multi-hop network, autonomous nodes act as a traffic originators and forwarders. In this, out-of-range nodes are reached by routing process. Due to constraints on battery power and bandwidth consumption, routing is considered to be a challenging task. To avoid complex route discovery and maintenance, stateless location-based routing schemes have been proposed, in which nodes makes routing decision solely on knowledge about its own, neighbour(s) and destination�s location. Such prerequisite in natural routing scheme suffers from local maxima or loop problems. We mitigate these problems by proposing randomized routing algorithms in this paper. It outperforms others in terms of packet delivery ratio and throughput.
Keywords: MANET, PGR, GeRaF, hidden node, topology.
Abstract
Image Segmentation and Binarization Technique for Manuscript
Mayur Sonar
DOI: 10.17148/IJARCCE.2016.5192
Abstract: To do segmentation from badly degraded document images is very tough and challenging tasks. It is due to the high inter/intravariation between the document background and the foreground text of different document images. we propose document image binarization technique that focuses on these issues by using adaptive image contrast. It Combine local image contrast and the local image gradient for construct adaptive contrast map that is tolerant to text and background variation caused by different types of document degradations. In the proposed technique, we first constructed adaptive contrast map for an input degraded document image. And then image segmentation algorithm is used to identify the text stroke edge pixels. The document text is further segmented by a local threshold that is estimated based on the intensities of detected text stroke edge pixels within a local window. The proposed method is simple, robust and involves minimum parameter tuning. This system was tested on three public datasets that were used in the recent. Those datasets are Document Image Binarization Contest (DIBCO) 2009 & 2011 and Handwritten Document Image Binarization Contest (H-DIBCO) 2010 and thus come up with an accuracies of 93.5%, 87.8% and 92.03%, respectively that are significantly higher than or close to that of the best-performing methods reported in the three contests.
Keywords: Adaptive Image Contrast, Document Analysis, Document Image Processing, Degraded Document Image Binarization, Pixel Classification.
Abstract
Novel Approach for Developing Effective Service Level Agreements for Cloud Computing
Manas Kumar Yogi, G.Vijay Kumar, D.Uma
DOI: 10.17148/IJARCCE.2016.5193
Abstract: In current technological era, business organizations are deploying services on cloud and for impartial business objectives a concrete set of service level agreements are to be put into practice. This paper provides a novel methodology to develop effective service level agreements and we evolve towards a robust framework while mitigating inherent difficulties faced by involved stakeholders. An efficient penalty management system approach is also advocated .This approach assumes few considerations and in future this assumptions will play a vital role in construction of a adaptive service level agreement so that no conflicts of interest occur while performing business transactions. The approach presented in this paper is generic and can be applied to any business domain.
Keywords: Service, Performance, Penalty, Monitoring, Reporting.
Abstract
Identify Packet Droppers and Modifiers to Improve Security in Adhoc Network
P. Swetha, Dr. P. Premchand
DOI: 10.17148/IJARCCE.2016.5194
No abstract available.
Abstract
A Cost Effective Flooding Algorithm for AODV Routing Protocol in Mobile Ad Hoc Networks
Mr. Vinayak Bashetti, Dr. Sayed Abdulhayan
DOI: 10.17148/IJARCCE.2016.5195
Abstract: MANET is consisting of wireless mobile nodes without having any central administration or infrastructure less topology. The Flooding algorithm is simple but it is not efficient and which results in redundant message transmission. The simple flooding algorithm causes high packet collisions and network conjunctions that may degrade the network performance. Flooding must be handled efficiently in order to improve protocol performance. By using the position of node the protocol can reduce the number of retransmissions, which can help to enhance the protocol performance. Here, the enhanced Flooding Algorithm is used that uses the node position to send the packets. This method is applied On Demand Distance Vector (AODV) protocol which reduces the number of Route Request (RREQ) messages. The RREQ message transmission has been improved by using N hop knowledge and concept of distance based method. The simulator output shows that our algorithm reduces the packet overhead and which improves network throughput.
Keywords: distance based scheme, RREQ message, N hop knowledge, enhanced Flooding.
Abstract
Digital Mammography: A Review on Detection of Breast Cancer
Priyanka B Burshi, Digambar A Kulkarni
DOI: 10.17148/IJARCCE.2016.5196
Abstract: This paper is a survey of Digital image processing techniques that play a vital role in assisting the biopsies. The mammogram images are stored digitally and several image enhancement techniques are applied to get enhanced images. These enhanced images are segmented to obtain the ROI from which the features are extracted. On the extracted features the acceptance/rejection criteria are applied to determine whether the tumor is benign or malignant. The results of all the techniques mentioned here are studied and analyzed.
Keywords: Breast cancer, Digital mammography, Image pre-processing, Image segmentation, Feature Extraction, Classification.
Abstract
Canteen Coupon Management System with GPS as a Coupon Checker
Ms. Kirti Mhamunkar, Ms. Harshada Dhole, Ms. Ravina Taru, Ms. Tejali Kamble
DOI: 10.17148/IJARCCE.2016.5197
Abstract: Current wireless communications enable people to easily exchange information directly, while web services provide loosely coupled and platform-independent ways of linking applications across the Internet or Intranet. This paper represents an integration of wireless communication technologies and web services technologies to realize a food ordering system.With the help of both desktop PCs and mobile devices such as PDAs, it implements wired and wireless data access to the servers and food ordering functions over a wired/wireless integrated local area network in this system.To ensure the security of the system, the secure web service architecture and some security strategies to ensure mobile communication security are discussed.Web services-based wireless applications on mobile devices provide a means of simplicity, improving efficiency and accuracy for restaurants by saving time, reducing human errors and efforts etc.
Keywords: Canteen Coupon Management System, GPS, Coupon Checker, wireless communications, PDA.
Abstract
Implementation of RGB to YCbCr Color Space Transformation for ARINC Transceiver
Hamsavahini R, Rashmi N
DOI: 10.17148/IJARCCE.2016.5198
Abstract: This paper presents an accurate model for inter color space conversion (RGB to YCbCr), for transmission through HDMI specification, for ARINC 818 transceiver, which is based on the simplified shift and sub sampling recovery. Real-time video processing heavily relies on the color space conversion. Due to the real-time requirement, the traditional conversion methods often suffer from the moderate conversion speed, inaccuracy and low video quality.[5]
Keywords: HDMI, ARINC, video conversion, RGB, YCbCr.
Abstract
Automatic Chalk Board Cleaner and Energy Harvesting for Smart Class Rooms
Sharmila.C, Ramya.M, Sarnya.S
DOI: 10.17148/IJARCCE.2016.5199
Abstract: Now-a-days many schools and colleges have different methods of cleaning writing boards, but these methods are injured to many staff and students like skin allergy ,skin cancer, dust allergy etc.,. The design and usage of a remote control to motorized the white board cleaner. These researches consist of four modules the remote control and transmitter module, the receiver module, pulse generator/ control module and the cleaner module. The operation of the system is centred on PICDEM MC LV microcontroller. This microcontroller helps the cleaner to clean the board within the range of 20 meter when the remote is pressed. The remote control unit is used to control the speed and direction of the cleaner. The system is more efficient and flexible. . By using PIC microcontroller electric lighting is controlled and energy can be consumed. By introducing new lighting technologies, decrease the amount of electricity consumed and energy costs in the class rooms. When somebody enters into the room the light in the room will be switched ON. The light will be only switched OFF until all the Persons in the room go out. The microcontroller does the above job. The microcontroller senses the IR rays falling on the receivers to detect the obstacles.
Keywords: Microcontroller, LDR Sensor, PIR Sensor, D.C. Motor, Dimmer.
Abstract
Feature Representation for Crowd Counting by Regression: A Review
Neeta Anil Nemade, Dr. Mrs. V. V. Gohokar
DOI: 10.17148/IJARCCE.2016.51100
Abstract: Crowd density estimation is crucial for intelligent video surveillance to help in control and management of crowds for safety. Crowd density analysis is related to the crowd feature extraction. This paper presents a review on feature representation for crowd counting by regression to construct intermediate input to a regression model. The comparison between feature extraction techniques with experimental results shows that statistical methods are easy to apply and the extracted features are stable to the circumstance change. With the great accuracy the method is efficient for the crowd density estimation.
Keywords: Performance Evaluation of Tracking and Surveillance (PETS) Dataset, blob count, Fractal dimension, Gray level Co-occurrence Matrix (GLCM).
Abstract
Suspicious Object Detection Using Back-Tracing Technique
Aniket Bhondave, Bhagyawant Biradar, Vishal Suryavanshi, Harshal Nakil
DOI: 10.17148/IJARCCE.2016.51101
Abstract: This paper presents an technique that is enhanced for the basic CCTV cameras which can automatically detect the abandoned luggage through the pre used CCTV camera, for detection we are using background subtraction technique and foreground object extraction .where all the image extracted from the CCTV surveillance is classified as 2 bit code and identify static foreground region, and identifying the abandoned object. This technique is basically introduced for making the public places safe and secure where abandoned object may have weapons bombs and many other harmful equipments.
Keywords: CCTV, object detection, alarm, abandoned object.
Abstract
Enhanced Relay Selection Strategy and Adaptive Filter Use in Cooperative Networks
Asna Nazar
DOI: 10.17148/IJARCCE.2016.51102
Abstract: Cooperative transmission in a decode-and-forward (DF) two-hop network where multiple cooperative nodes coexist with a potential eavesdropper can be secured with enhanced relay selection strategy and interference can be reduced by the use of an adaptive filter at the receiver. Under the practical assumption that only the channel distribution information (CDI) of the eavesdropper is known, also we propose an Arti?cial jamming and beamforming, where a �best� cooperative node is chosen among a collection of N possible cooperative nodes based on the transmission rate and SNR to forward the con?dential signal and the others send jamming signals to confuse the eavesdroppers. Since the optimization problems are non-convex, we use a sequential parametric convex approximation (SPCA) algorithm to locate the Karush Kuhn-Tucker (KKT) solutions; we generalize the analysis with multiple eavesdroppers, and find the asymptotic analytical results of the achievable ESR. Simulation results con?rm our analytical results. We also obtain the simulation of capacity and BER with respect to SNR to show the effectiveness of the system.
Keywords: Adaptive filters, beam forming, decode and forward, ergodic secrecy rate, extreme order statistics, outdated CSIs, Sequential parametric convex approximation.
Abstract
An Advanced Filtering Mechanism for Analysis and Detection of Malicious Web Pages
Mr. Pranav More, Prof. Amruta Amune
DOI: 10.17148/IJARCCE.2016.51103
Abstract: Internet services are more necessary part of our daily life. We rely growingly on the ease and flexibility of Internet connected devices to shop, communicate and in general perform tasks that would require our physical presence. While very valuable, Internet transactions can represent user sensitive information. Banking sector�s and personal medical records, system authorization passwords and personal communication records can easily become known to an enemy who can easily compromise any of the devices include in online transactions. Regrettably, In this transaction the user�s personal computer seems to be the weakest link. At the same time attacker also use new attacks for identification of user�s sensitive information with vulnerabilities that use a small part of code in web pages. Overcome these problems use a novel approach for a filtering technique to finding malicious web pages very effectively and efficiently using supervised machine learning. Also detailed study some other techniques researcher research to analysis and detection of malicious web pages.
Keywords: Malicious web page analysis & classification, download exploits, pronging, web page filtering.
Abstract
Selection Process for Area Identification of Articular Cartilage
Prof. Dr. S. L. Lahudkar, Chetana Kurve
DOI: 10.17148/IJARCCE.2016.51104
Abstract: In biomedical science so many process have come to cure the malfunction of human body in any manner without any suppression. This enhancement of medical therapy gives the new ray to every issues related to medical such as dialysis, any transplantation in body, asthama, blood issues, etc. In this fastest and growing age of life a new and common disease has come named as osteoarthritis which means a disease which is caused due to lack of fluid in the joints of bones. For this there are a lot of programmed therapy and a lot of medicines are available, but to cure it for long there are some parameters introduced named as processing, segmentation, ray images, etc. All this are needful because we need a good and effective output in short time. So, here in this area the procedure of selection for process for this joint can be done on the basis of that we will conclude which one is effective and best.
Keywords: knee joint, segmentation process, MR images.
Abstract
Survey: Cloud Security with a Remote Smart Data Backup Technique
Akshay Gondke, Kaustubh Gage, Sneha Annappanavar
DOI: 10.17148/IJARCCE.2016.51105
Abstract: In cloud computing a large amount of data is generated, to maintain the efficiency of the outsourced data there is a need for data backup services. A major security challenge is to protect this data. Hence we have introduced a Smart Data Backup algorithm called as �Seed Block Algorithm� (SBA) which we are using as a smart remote data backup storage. The two main objectives of this algorithm are as follows. The first is to gather information from a remote storage location and the second is recovery of the files if the file gets deleted or if the cloud gets destroyed due to any circumstances. This algorithm takes care of the time associated problems and performs recovery of data in minimum time.
Keywords: Cloud Computing, Seed Block, Advanced Encryption Standard (AES), Cloud Security, Backup Algorithm, Central Repository, Remote Repository, Cloud Environment (ULTEO).
Abstract
PDF Based Relay In Reactive Dual-Hop Wireless Networks
Thara Elizaba Thomas
DOI: 10.17148/IJARCCE.2016.51106
Abstract: Relay transmission plays an important role in future cellular communication system as well as wireless ad hoc and sensor networks ,this is because of its several benefits, such as it increase the system capacity, it extend the radio range and to reduce network infrastructure. In this paper we propose a PDF based relay selection method for dual hop networks. Here the relay selection on the basis of PDF, check each signal and select the best one so it increases the system capacity, reduce interferences and increase diversity. Interferences can be avoided with the help of adaptive filters .Here use only the reactive approach that means, concentrate only the relay to destination section, so it reduces the complexity of the system, and it also decreases the error rate.
Keywords: Average Fairness, Cooperative Diversity, Cumulative Distribution Function (CDF), Outage Probability, Relay Selection.
Abstract
Design of Energy Efficient SRAM Cell to Improve the Stability of Read Operation
S. Nijantha, Prof. K.A. Dattathreya
DOI: 10.17148/IJARCCE.2016.51107
Abstract: Static Random Access Memory (SRAM) is a type of Memory which is faster and more suitable than other memories such as Dynamic Random Access Memory (DRAM) or Flash Memories. The main advantage of the SRAM is need not to be refreshed. SRAM is mainly used for Cache memory in many applications such as Microprocessors, Engineering Workstations, Mainframe Computers etc�for High Speed and Low Power Consumption. The Energy Efficiency and Speed of SRAM are the most Crucial issue for minimizing the power during read and write operations. The Aim of this Paper is to provide a Energy Efficient Low Power SRAM Cell and here Technique called �Self controllable voltage level circuits� are used and various Approaches are discussed to Achieve the Better Performance. Simulation result of 9T SRAM cell with reduced power is implemented using TANNER EDA tool.
Keywords: Static Random Access Memory (SRAM), Self Controllable Voltage Level Circuit (SVL), Energy Efficiency, Leakage, Low Power.
Abstract
Cryptographic Fuzzy Vault with Image Processing
Prof. Joshi Ram B
DOI: 10.17148/IJARCCE.2016.51108
Abstract: The term information security is related with the protection of information as well as the systems from unauthorized access and further misuse by disclosure, disruption, modification, inspection, recording or destruction. Information security means protecting sensitive information which is a growing concern for the body whose business mostly depends on information technology and protecting such critical data in various sectors, including the business, healthcare and defense sectors, has become the first priority of information management. The growing use of networking such as extranets and cross-organizational collaboration tools, including customers, suppliers, and business partners�increasingly need access to the required applications and data, Reviews can be collected through social media technologies. Extended networks can help organizations reduce the operational expenses through greater process efficiencies; it also promote cross-organizational innovation; and reduce the need to build costly and time-consuming point-to-point connections. In spite of tremendous benefits to this expansion of the corporate network, the need for strong security has never been more apparent. Any compromise or failing to protect this asset results in huge loss in terms of trust of customers and investors which in fact results to financial disaster. The information systems consist of three major areas communication channel, user interface and information storage; the protection of these three areas means adoption of the information security. Issues such as dynamic sensitive information ownership, group authentication and authorization and privacy protection also create challenges for the protection of information systems Biometrics has made a significant impact in forensics like identification of criminals or authentication of authorized users. In this system the main emphasis is on a pattern recognition that recognizes a person by determining the authenticity of a specific physiological constraint such as face and/or behavioral characteristic possessed by that person like audio or frequency of key stroke entered. Face recognition is highly preferable and acceptable biometrics used by humans in their visual interaction. Cryptography in conjunction with biometrics is the main objective which leads to high level of security for authentication and key retrieval and will model the secure information exchange. The challenges in face recognition system such as aging, facial expressions, variations in the imaging environment, illumination and pose of the face.
Keywords: Information security, multi factor authentication, biometric method, binary mapping, fuzzy vault, polynomial construct.
Abstract
A New Approach for Dynamic Load Balancing using Simulation in Grid Computing
Mr. Kapil B. Morey, Prof. Sachin B. Jadhav
DOI: 10.17148/IJARCCE.2016.51109
Abstract: Grid computing technology can be seen as a positive alternative for implementing high-performance distributed computing. The goal of Grid computing is to create the illusion of virtual computer out of a large collection of connected heterogeneous nodes sharing various resources. The Grid system needs competent load balancing algorithms for the distribution of tasks in order to increase performance and efficiency. The process of identifying requirements, matching resources to applications, allocating those resources, and scheduling and monitoring grid resources over time in order to run grid applications efficiently is known as Grid Resource Management. The first phase of resource management is resource discovery. The next step is Scheduling and monitoring. Scheduling process directs the job to appropriate resource and monitoring process monitors the resources. The resources which are heavily loaded act as server of task and the resources which are lightly loaded act as receiver of task. Task will be migrated from heavily loaded node to lightly loaded node. The main aim of load balancing is to provide a distributed, low cost scheme that balances the load across all the processors. In this paper a dynamic load balancing algorithm is proposed in a simulated grid environment which fulfils the objective to achieve high performance computing by optimal usage of geographically distributed and heterogeneous resources in the grid environment.
Keywords: Grid, Resources, Simulation, Scheduling.
Abstract
Wavelet and Fourier Features Based Emotion Recognition of Speech Signals
Nisha Beegum S
DOI: 10.17148/IJARCCE.2016.51110
Abstract: The studies have been performed on harmony features for speech emotion recognition. The first- and second-order differences of harmony features play an important role in speech emotionrecognition. Propose a new Fourier parameter model using theperceptual content of voice quality and the first- and second-order differences forspeaker-independent speech emotion recognition. Experimental results show thatthe proposed Fourier parameter (FP) features are effective in identifying variousemotional states in speech signals. They improve the recognition rates over themethods using Mel frequency cepstral coefficient (MFCC) features by 16.2, 6.8and 16.6 points on the German database (EMODB), Chinese language database(CASIA) and Chinese elderly emotion database (EESDB). In particular, whencombining FP with MFCC, the recognition rates can be further improved on theaforementioned databases by 17.5, 10 and 10.5 points respectively. Neural network classifier can be used to improve the classification of different emotions.
Keywords: MFCC, CASIA, EMODB, FP model, Speech emotion recognition.
Abstract
Bat Algorithm: An Overview and its Applications
S. Induja, Dr. V.P. Eswaramurthy
DOI: 10.17148/IJARCCE.2016.51111
No abstract available.
Abstract
Design and implementation of a digital FIR notch filter for the ECG signals using FPGA
Dr. Kamal Aboutabikh, Dr. Ibrahim Haidar, Dr. Nader Aboukerdah
DOI: 10.17148/IJARCCE.2016.51112
Abstract: This paper introduce a practical elimination of PLI (power line interference) with the frequency of 50 Hz and its 2nd, 3rd and 4th harmonics using digital FIR notch filter designed by FPGA chips Which is situated on development and education board DE2-70. To realize the filtering operation a digital multiband stop filter has been designed for frequencies 50Hz, 100Hz, 150Hz,and 200Hz with high order 1500 and processing word of 10bits and frequency 1000Hz to gain attenuation of 60dB for PLI signal components. Using FPGA to design digital FIR notch filter enable as of realization parallel processing to achieve digital convolution algorithm in the real time, where 1500 operation of adding, shifting, multiplying and dividing can be done in 0.5 ms (sampling period) for digital samples of 10 bits length, this equivalent 3 million operation per second where the general processor cannot do that.
Keywords: FPGA, DDFS, ECG, notch filer.
Abstract
Road Quality & Ghat Complexity Analysis
Prof. P.S. Toke, Shweta Maheshwari, Aishwarya Asawale, Aishwarya Dhamale, Nigel Paul
DOI: 10.17148/IJARCCE.2016.51113
Abstract: Almost every today�s smartphone is integrated with many useful sensors. The sensors are originally designed to make the smartphones user interface and applications more convenient and appealing. These sensors are potentially useful for many other applications in different fields. Improving the condition of road has become a necessity now days. Android Smartphone�s are user-friendly way to solve the problem. Latest smart phone consist of useful sensors like accelerometer, Magnetometer and GPS (Global Positioning System). Any user can make use of these sensors to find bad road condition which are encountered every day while driving. The paper is describing a mobile sensing system for road irregularity detection using Android OS based smart-phones. This information can be helpful to user at the time if there are multiple routes for destination and he can choose one of the finest and shortest route.
Keywords: Road Maintenance, Smartphone Sensors, Road Surface, Roughness.
Abstract
Role of Computer Science development in India – A Review
Suruchi Sabherwal
DOI: 10.17148/IJARCCE.2016.51114
Abstract: This paper outlines the nature of computer science research in India. It has been divided into five sections. Section one mainly focuses on the type of institutions in which computer science research is conducted, followed by a glimpse of the students and faculty at the educational institutions. Support available for conducting research in the form of equipment, infrastructure, and publications, is given in section 2 .Section 3 covers the major Industrial labs which have attracted global attention, the funding agencies, lacunas which computer science research suffers from and the reasons for that is also discussed in this section. Section 4 presents type of Computer science research in India, Infrastructure available .Section 5 gives an overview of ICTs and their role in development, particularly in the context of millennium development goals (MDGs). Details select ICTs innovations of India in achieving MDGs. Further, it lists out India�s position in relation to MDGs by highlighting India�s target, current status and steps taken to achieve them .section 6 includes the contribution of software to India�s economic development paying particular attention to the role of the software in the absorption of labour and the development of human capital in the Indian economy.
Keywords: MDG-millenium development goals,ICT,ERNET,NICNET,NMEICT,TRDDC,SPIC, ERNET, TIFR, NAL, BARC.
Abstract
Machine Monitoring on Cloud using Raspberry Pi and Internet of Things
Amit Rana, Dr. Smt. A.S. Bhalchandra
DOI: 10.17148/IJARCCE.2016.51115
Abstract: This paper demonstrates a novel approach in industrial machine monitoring on cloud server using Internet of Things implemented on Raspberry Pi. The raspberry pi is a small credit card sized computer which can directly send data to the cloud server. Any kind of CNC or industrial machine can be connected to Raspberry pi giving logical inputs and can be monitored on the internet based server so that the real time production data, the work currently going on, the employee who is working on a particular machine, the rate of production, causes of delays and downtimes everything can be monitored by the supervisory or authorities sitting at a remote location almost anywhere in the world. Moreover the system is very simple which can be operated by unskilled workman working on the floor.
Keywords: Raspberry Pi, Machine monitoring, IOT.
Abstract
Review Paper on VLSI Architecture for Carry Select Adder
K. Pitambar Patra, Sambit Patnaik, Swapna Subudhiray, Janmejaya Samal
DOI: 10.17148/IJARCCE.2016.51116
Abstract: A multiplier is one of the key hardware blocks in most digital and high performance systems such as FIR filters, digital signal processors and microprocessors etc. With advances in technology, many researchers have tried and are trying to design multipliers which offer either of the following- high speed, low power consumption, regularity of layout and hence less area or even combination of them in multiplier. However area and speed are two conflicting constraints. So improving speed results always in larger areas. So here we try to find out the best trade off solution among the both of them. While comparing the adders we found out that Ripple Carry Adder had a smaller area while having lesser speed, in contrast to which Carry Select Adders are high speed but possess a larger area. And a Carry Look Ahead Adder is in between the spectrum having a proper tradeoff between time and area complexities.
Keywords: Ripple Carry Adder, Carry Select Adder (CSLA), Booth Encoder (BEC).
Abstract
Simulation of Semi Markov Process to Detect Mimicking Attacks Based On User Behavior
M.Anitha, A.Kanchana, R.Padmapriya, N.Malathi
DOI: 10.17148/IJARCCE.2016.51117
Abstract: Botnets have turn out to be a most important engines for malicious activities in cyberspace these days. Botnets are the major drivers of cyber attacks, such as distributed denial of service (DDoS), flash crowds, email spamming and information phishing. Both flash crowds and DDoS attacks have extremely related properties in terms of internet traffic. Flash crowds are legal flows whereas DDoS attacks are illegal flows. To maintain their botnets, botnet owners are mimicking valid cyber behavior. This poses a critical confront in anomaly detection. In this work, study of mimicking attacks and detections from both sides, as attackers and defenders is made. First of all, a semi-Markov model for browsing behavior is recognized. Based on this model, a botmasters can create flash crowd effectively in terms of statistics, with a adequate number of active bots(not less than the number of active valid users). But it is hard for botnet owners to gratify the situation to carry out a mimicking attack most of the time. With this new finding, we conclude that mimicking attacks can be discriminated from real flash crowds using second order statistical metrics. When the adequate number condition does not hold for botmasters we detect the mimicking attacks. Detection is proclaimed to the user. Furthermore, the findings can be widely functional to related situations in further research fields.
Keywords: detection; flash crowd attack; mimicking; second order metrics;
Abstract
Advanced Computerized Scheme for Detection of Lung Nodules by Incorporating VDE Image
Bhagyashree Nemade, Prof. Dimple Chaudhari, Prof. C.B lahoti
DOI: 10.17148/IJARCCE.2016.51118
Abstract: The detection of the lung nodules can be found out by introducing Computer Aided Diagnosis (CAD) scheme. Most of lung nodules that are missed by radiologists as well as computer-aided detection (CADe) schemes overlap with ribs or clavicles in (CXRs). Computed tomography is used to detect the lung nodules but it�s costlier. The proposed method uses the X-Rays, are preferred due to cost effective, low radiation dose and effective diagnostic tool. Computerized Detection Scheme system detected nodule candidates on VDE images by use of lung segmentation and morphological filtering techniques. Segmentation of lung regions based on our M-ASM and nodules at the lung borders by using coarse to fine segmentation techniques and watershed segmentation algorithm. The classification and feature analysis of the nodule candidates into nodules or non nodules by use of non linear Support Vector Machine (SVM) with Gaussian kernel classifier. By implementing this work, experimental results show that the different rib contrast parameter, smoothness and entropy are compared with conventional method.
Keywords: Chest radiography (CXR), computer-aided diagnosis (CAD), lung nodule detection, virtual dual energy (VDE).
Abstract
A New Secure Forward Digital Signatures based on Forecasting and Statistical Entropy of Key Exposures
Dr. Faris M. Al-Athari, Dr. Abdulameer Khalaf Hussain, Dr. Adnan Al-Helali
DOI: 10.17148/IJARCCE.2016.51119
Abstract: A new method of forward digital signatures is proposed in this paper. All of the previous forward digital signatures depend on changing the private key periodically but they keep the public key. The proposed system will change both private keys and public keys that can be generated only by authorized users to enhance the authenticity of users. Another important proposal is that the expiration of that public key depends on the length of the document so the sender must compute the expired time of his/her document depending on its length. This method also can be used to change the private key depending on the expired date of the document but the public key is still fixed. In order to make this digital signature more efficient, the system must change the private keys in terms of their critical times that indicate the period of exposure of the keys by different attacks types. So the ability to change these keys do not depend on fixed periods as in most forward digital signatures but also depend on these critical times and the entropy of the information of the keys.
Keywords: Forward Digital Signature, Entropy, K-nearest Algorithm, Agreement.
