VOLUME 4, ISSUE 7, JULY 2015
A New GFSK Demodulation Technique using EKF in Bluetooth Receivers
Mr. Alhaj-Saleh Abdallah, Dr. Ahmad Nsour, Prof. Mohamed Zohdy
RAFDS: Remote Abnormality and Fall Detection System for Assisting Older Persons
Yosra Ismail, Mariem Kallel, Loay Ismail
Single-Carrier Frequency-Domain Equalizer with Multi-Antenna Transmit Diversity
Sunil Shankar Mane, Dr. S. L. Lahudkar
Modelling of Metro Railway Signalling using Petri Net
Mandira Banik, Sudeep Ghosh
A Survey on EDFA Amplifier for DWDM System
Dinesh Birdi, Mandeep Singh
A Review on Image Steganography Techniques
Abhay Dakhole , Dr.Sanjay Badjate
Automatic Conversion of Image and Video from 2D to 3D with Steganographic Data Hiding in Converted 3D Image
Sariga N P, Sajitha A S
Implementation of On-Chip Network Protocol AMBA AHB
A V S R L Bharadwaj, L. Padma Sree
Broadcast Protocol for V2V and V2RSU in VANET
Shruti Balapgol, Prof. Dr. P. K. Deshmukh
Integrity Attestation on Service Components to Pinpointing the Attackers in Cloud Infrastructure
S. Zubair, B.Sowmya
Design of Low Noise Amplifier at 2.47 GHz
Gunjan Gotmare, Mr. Arpit Yadav, Dr. Sanjay Badjate
Smart Navigation System for Visually Impaired Person
Rupa N. Digole, Prof. S. M. Kulkarni
A Methodology for Efficient Gender Dependent Speaker Age and Emotion Identification System
Shivaji J Chaudhari, Ramesh M Kagalkar
BER Performance of BPSK, QPSK & 16 QAM with and without using OFDM over AWGN, Rayleigh and Rician Fading Channel
Mohd. Abuzer Khan, Sonu Pal, Ankita Jose
At Mega 328 Microcontroller Based Firing Angle Control of 3phase Thyristor Bridge Rectifier Circuit
Mohan R. Gangul, G.P. Jain
Design and Development of Non-Invasive Blood Glucose Measurement System using Near Infrared technique
K Sairam, Akesh Govada, Dr.CH Renumadhavi, Dr.B.S.Satyanarayana, Dr. K B Ramesh
Design and Development of programming framework utilizing Biomarkers for Characterization of Rheumatic Arthritis Disease
Priyanka Premnath, K.B.Ramesh, Vidya Niranjan, B.P.Mallikarjunaswamy, E.T.Puttaiah
Design and Implementation of Microcontroller Based Propeller Display
Bajpai K. S, Kadam S. D, Tondare S. M.
Comprehensive Regarding Hearing Impairment using Smart Android Phone
Miralkumar Surati, Mahesh T. Kolte
Fault Tolerance and Load Balancing algorithm in Cloud Computing: A survey
Sushil Kumar, Deepak Singh Rana, Sushil Chandra Dimri
Global Optimization using Distributed Optimization Clustering Technique (DOCT) in Wireless Sensor Network
Ravinder Sharma, Sumit Chaudhary
A Review on the Punjabi Text Classification using Natural Language Processing
Ubeeka Jain, Kavita Saini
Semantic Search’s Impacts on Searching & Ranking of WebPages
Dharminder Singh, Ashwani Sethi
Web Content Mining: – An Implementation on Social Websites
Pooja Rohilla, Ochin Sharma
PAPR Reduction using PTS Technique in OFDM – MIMO System
Celina Antony, Prof S.G. Hate
A Review on Text Chunker for Punjabi Language
Ubeeka Jain, Jasbir Kaur
Study and Analysis of 2×2 MIMO Systems for Different Modulation Techniques using MATLAB
Ramanagoud Biradar, Dr.G.Sadashivappa
Progressive Image Transmission Using OFDM System
Abhijit S. Andure, Prof. S. M. Shende, Prof. S. P. Kharde
Improvement of BER Performance in OFDM under various Channels with EH Code
K. Lavanya, M.V.S. Sairam
Enhanced Key Aggregation Technique for Secured Data Sharing in Cloud
Shweta. P. Tenginkai, Vani K. S
A Review on Copy Move Forgery Techniques
Hitesh Batra , Dr.Sanjay Badjate
User Search Goal Identification Using User Click Sequence Analysis
Miss. Radhika Rane, Mr. Sudip Tembhurne, Mr. Sanjeev Dwivedi
Dynamic Packet Length Optimization in Wireless Sensor Network
Mr. Sudip Tembhurne, Miss. Radhika Rane , Mr. Sachin Deshpande
RGB Based Secret Sharing Scheme in Color Visual Cryptography
M.Karolin, Dr.T.Meyyapan
A Novel Technical Approach for Implementing Static Hand Gesture Recognition
Ramesh M. Kagalkar, Dr.Nagaraj H.N, Dr. S.V Gumaste
Load Balancing in Cloud Computing Using Task Scheduling
Minakshi Berwal, Dr. Chander Kant
Weighted Space-Time Bit Trellis Coded Modulation for Quasi-Static Rayleigh Fading Channel
Naintara Ghorela, Mandeep Singh, Jaspreet Singh
Advanced MPSE Scheme for Searching Shared and Encrypted Data
Gokula Nath G, Syamamol T
Low Power Full Adder Circuit Implementation using Transmission Gate
Akansha Maheshwari, Surbhit Luthra
Improved Power Conservation through Eecsa Routing Protocol in Wireless Sensor Networks
Salma, R. Venkatachalam
Performance Evaluation of AODV and DSR Routing Protocols under Constrained Situation
Alka Adlakha, Vasudha Arora
Customization of Materials Management Module of SAP ERP for Power Industries of C.G., India
Deepak Kumar Vishwakarma , K. J. Satao
Modelling and Meeting Simulation Model by V & V Method
S.Ezhilmathi M.E, V.Shanmugapriya, S.Saroja, P.Renuga
Data Hiding With Multiple Network Protocol Usage
Mrs. Dhanashri D. Dhokate, Dr. Vijay R. Ghorpade
Secure Deduplication and Data Security with Efficient and Reliable Convergent Key Management
Nikhil O. Agrawal, Prof.S.S.Kulkarni
Review of Traffic Density Analysis Techniques
Ms. Avani.Joshi, Dr. Dhirendra Mishra
Smart Surveillance System using Thing Speak and Raspberry Pi
R.Chandana, Dr.S.A.K.Jilani, Mr.S.Javeed Hussain
Influence of Supplementary Information on the Semantic Structure of Documents
Karthik Krishnamurthi, Vijayapal Reddy Panuganti, Vishnu Vardhan Bulusu
Estimation of Interference in Wi-Fi Networks
Prajakta D. Patil, M. M. Wankhade
Graph Partitioning for Image Segmentation using Isoperimetric Approach
Utkarsha. D. Kale, Prof. M. N. Thakare, Prof.G.D.Korde
Design of Asynchronous Viterbi Decoder using Hybrid Register Exchange Method for Low Power Applications
Pooja M. Chandel, Prof.M. N. Thakre, Prof.G. D. Korde
An Enhanced Load Equilibrium Technique in Content Delivery Network
K.Supriya, S.Venu Gopal
Fault Detection and Isolation for ZVS Full Bridge Isolated Buck Converter Based on: Observer Design and Bayesian Network
Abbass H.Zein Eddine, Iyad Zaarour, Francois Guerin, Abbas Hijazi , Dimitri Lefebvre
Spatial Fuzzy Clustering With Level Set Method for MRI Image
Pranali A.Tembhekar, Prof. M. N. Thakare, Prof. S. A. Dhande
Hybrid Model for Classification and Detection of Neurological Disorders
Prof. Pravin Kshirsagar, Dr. Sudhir G. Akojwar
Review on Super Resolution using Registration, Interpolation and Restoration
Kritika, Vedant Rastogi
To Propose a Novel Technique to Overcome Fault Tolerance in DCS during Node Mobility
Prabhjot Kaur, Shashi Bhushan, Karan Mahajan
A Study on Market Basket Analysis using Data-set Condensing and Intersection Pruning
Mr.Murlidher Mourya, Mr. J. Phani Prasad
Anamobilitics- Analysis of Mobile Data to Understand User Sentiments
Upasna Suman, Raunak Kasera, Sneha Madgunda
Real Time System Scheduling Algorithms & Fault Tolerance
Charu Rani, Mrs. Manju Godara
A Roadmap to Design and Analysis of Wearable ECG Monitoring System
R. Geethika, Manjunath A E
A Survey on Wearable ECG Monitoring System using Wireless Transmission of Data
Meda Sai Kheerthana, Manjunath A.E
An Enhanced Technique to Predict the Accuracy of Soil Fertility in Agricultural Mining
Dr.S.Hari Ganesh, Mrs. Jayasudha
FPGA Implementation of Image Denoising using Adaptive Wavelet Thresholding
Ms. Chipy Ashok , Ms. Anu V.S
BCI and Audio Responce Approach for Improved Emotional State Classification
Priyanka A.Wandile, Dr.Narendra Bawane, Mr.Pratik Hajare
Performance and Comparative Study of Functionality Testing Tools: Win Runner and QTP in IT World
R. Beulah, Dr. M. Soranamageswari
Secure Color Image Transmission in a Downlink DAS Group Cell Scheme based MIMO OFDMA Wireless Communication System
Sohag Sarker, Shaikh Enayet Ullah
Implementing Adaboost and Enhanced Adaboost Algorithm in Web Mining
Er.Ramanpreet Kaur, Dr. Vinay Chopra
Design of Thruster Driver Module using Synchronous Design Technique in VHDL
Priyanka P Desai, Deepa Pramod, Dushyanth N D
Truthful Detection of Packet Dropping Attack in MANET
Noble George, Sujitha M
Mobility Assisted Wireless Energy Replenishment and Data Gathering in Wireless Rechargeable Sensor Networks
R.Kavitha, R.Karthika, K.Muthu Gowri
Power Optimization Using Proposed Dijkstra’s Algorithm in Wireless Sensor Networks
Pankaj Chauhan, Arvind Negi, Tarun Kumar
A Performance Analysis of Various Non Local Techniques to Denoise SAR Images
Mamatha K. R., Saurabh Shahi, Shilpi Poddar, Saranya P
Localization Range Improvement in Wireless Sensor Network using Genetic Algorithm
Anuj Kumar, Arvind Negi, Sumit Chaudhary, Anchit Bijalwan
Secrecy Rate Maximization under Improved Relay Selection with Different Coding Schemes for Cooperative Wireless Network
Akanksha Rai, Mrs. Rupali Phatak
Efficient Mobile SinkTrail Data Reporting Protocol for Wireless Sensor Networks
Sindhu.A.N, Divyashree.B.A
An Energy Efficient and QoS Aware Routing Protocol for Wireless Sensor Network
Kalyani Khanke, Mamta Sarde
Object Tracking in Simulink using Extended Kalman Filter
Nivedita, Pooja Chawla
Elementary Matrix Operation Based Satellite Image Encryption
M.Sithi Benazir, Dr.A.Padmapriya M.C.A., M.Phil., Ph.D
A New Multi-Panel Cartoon based CAPTCHA as Graphical Passwords
B.Santhosh Poornima, Dr.A.Padmapriya M.C.A., M.Phil, Ph.D
Implementation of Multi-Biometric Cryptosystem for Information Security using Elliptic Curve Cryptography
Bharti Kashyap, K. J. Satao
Banking Security System Using PSoC
Vaijanath R. Shintre, Mukesh D. Patil
Review Paper on Resource Utilization and Performance Optimization of CPU using Virtualization
Sohanpreet Singh, Monica Goyal
Text Mining Approach to Classify Technical Research Documents using Naïve Bayes
Mahesh Kini M, Saroja Devi H, Prashant G Desai, Niranjan Chiplunkar
A Survey of Wireless Sensor Network Security
Mr. Prasad Mahajan, Miss Priyanka Bhute
Design of Prototype model for Vehicle to Vehicle Secure Formatted Communication
Rakhee G Doijad, Prof.P.A Kamble
The Big Data Recovery System for Hadoop Cluster
V. S. Karwande, Dr. S. S. Lomte, R. A. Auti
A Survey – Comparative Study on Intrusion Detection System
Vinutha H.P, Dr.Poornima B
Study of Effect of Modified Feature Selection Method and Re-Occurrences of features on Performance of Multi-Label Associative Classifier
Prof. Mrs. P. A. Bailke, Ms. Shweta Kambare, Prof. Dr. S. T. Patil
A Survey on an Intelligent System for Unwanted Message Filtering from OSN User Wall
Miss. Radhika S. Fulzele, Prof. Vipul Dalal
QoS Proposes by EDCA using WLANs
S.Ezhilmathi M.E, N.Subasri, S.Suguna, P.Amsavalli
Selection of Optimum Features for Neural Network using Genetic Algorithm in Classification of Brain Computer Interface Data
Swati N.Moon, Narendra Bawane, Pratik Hazare
A Combinatorial Temporal Closed+ High Utility Itemset Mining Algorithm in Transactional Database
Santhosh.J, Sukanya
An Approach for Iris Template Protection using Behavioral Trait
Sheetal Chaudhary, Rajender Nath
A Review on Routing Protocols in VANET
S.Vinothini, Mr. J. John Raybin Jose
Verifying a Behaviour Based Anti-Phishing Approach using Model Checking
Abdullah M. Alnajim
Utility Pattern Mining: A Concise and Lossless Representation using Up Growth+
Anusmitha.A, Renjana Ramachandran
An Expert System for Diagnosis of Ear Problems in Children
Khdega A.Yosef Galala
Enhanced Cluster Based Energy Efficient Routing Protocol for Mobile Wireless Sensor Network
Eng. Sura F. Ismail
Modelling of Speech Signal Algorithm for Improving Intelligibility in Hearing Impairment
Kaustubh A. Mahakalkar, Mahesh T. Kolte
Rule-based Watermarking Model for Numeric and Non-numeric Datasets
Kanchan S. Rahinj
Hardware Simulation of Digital Watermarking for Video
Dheeraj Shinde, Ramesh Y. Mali
Basic Kannada Handwritten Character Recognition System using Shape Based and Transform Domain Features
Shashikala Parameshwarappa, B.V.Dhandra
Analyzing the Performance of an Equalized and Un-equalized OFDM-PON System over AWGN & Rayleigh Fading Channel by Using QPSK, BPSK, 16-QAM and 32-QAM Modulations
Er. Sachin Dogra, Natasha
An Efficient Method of Irrigation Using Sensors
R.Aarthi, Dr. A. Shaik Abdul Khadir
FriendProbe – A New Friend Recommender System for Social Networks
Shruthy Y, Sreenimol K. R
Web Optimization Using Web Mining Technique
Mahendra Pratap Singh Dohare, Dr. R S. Jadon
Power Reduction using Single Ended 8T SRAM Cell with NBTI Technique
K.S.Jeeva Bharrathi, M.Ravikumar
Robust Invisible Watermarking using Least Support Orthogonal Matching Pursuit (LS-OMP) Recovery Method
Israa Sh. Tawfic, Sema Koc Kayhan
Distributed Soft Deadline Scheduling with Data Redundancy Elimination to Guarantee QoS in Hybrid Wireless Network
Mrs. Asma Kouser, Mrs. Sreevidya R.C
Real Time Object Counting using Raspberry pi
J.Manasa, J.T.Pramod, Dr.S.A.K.Jilani, Mr.S.Javeed Hussain
Implementation of Cryptography Encryption Algorithm for Plane Text
BV Ramudu, Sanjeeva Polepaka
Detection of Financial Statement Fraud using Data Mining Technique and Performance Analysis
KK Tangod, GH Kulkarni
Landslide Vulnerability Assessment of Pauri Garhwal Region in Uttarakhand
Komal, Asha Thapliyal
Design of Chaos Based Turbo Systems in Fading Channel
Ramya B M, Dr. Sudha K L
Rule-Based Fuzzy Logic for Automatic Learning Process in an E-learning Environment
Ms. R.Priya, G. Keerthy
Extracting Knowledge from Social Media to Improve Health Informatics
Mr. V.R.Nagarajan, Monisha.P.M
Energy Management& Cost Optimization in IDC Using Load Balancing in Cloud
Mr. T.Sivakumar, D.Sathish
Evaluating the Effect of FIFO Queuing Scheme on Originating and Handoff Calls in Cellular Networks
Engr Sayawu Yakubu Diaba, Engr Nusenu Yaw Shaddrack, Theophilus Anafo, Maxwell Cobbah
Simulation & Setup of Smart Wireless Wi-Fi Router
Mehzabul Hoque Nahid
Detection of Brain Tumour with Filtering Techniques
Mrs. K. Padmavathi, Ms.C.Megala
Data Encryption Algorithm using Asymmetric Key Derived from Fingerprint Biometric Features
Prof. Dr. Tarik ZeyadIsmaeel, Ahmed Saad Names
BT-WAP: Wormhole Attack Prevention Model in MANET Based on Hop-Count
Badran Awad, Tawfiq Barhoom
A Novel Entropic Thresholding Technique for Diagnostic Analysis of Microcirculatory Images
Pallavi A. Chaudhari, Prof. Pragati Patil
Abstract
A New GFSK Demodulation Technique using EKF in Bluetooth Receivers
Mr. Alhaj-Saleh Abdallah, Dr. Ahmad Nsour, Prof. Mohamed Zohdy
DOI: 10.17148/IJARCCE.2015.4701
Abstract: Bluetooth is a wireless technology that is widely used in consumer electronics and deployed in many industries due to its ease of use and low cost. Gaussian frequency shift keying (GFSK) is the modulation scheme used in Bluetooth receivers to achieve a basic data rate of 1 Mbps. In this article, a new non- coherent demodulation technique based on the extended Kalman filter (EKF) is presented to detect a GFSK modulated signal in Bluetooth receivers for AWGN channels. The bit error rate (BER), and packet error rate (PER) were used as the performance metrics of the proposed receiver at both the physical and system levels. Simulation results show an improvement in the performance compared to other existing techniques presented in the literature.
Keywords: AWGN, Bluetooth, Extended Kalman Filter, Gaussian Frequency Shift Keying, Continues Phase Modulation.
Abstract
RAFDS: Remote Abnormality and Fall Detection System for Assisting Older Persons
Yosra Ismail, Mariem Kallel, Loay Ismail
DOI: 10.17148/IJARCCE.2015.4702
Abstract: One of the main problems facing the public health is the injury that happens due to older persons falling, as these injuries can be fatal for them. Fast and proper medical interventions are crucial to reduce the serious consequences on their health. In this paper, a system is designed to continuously monitor vital signs and motion of older persons, and automatically detects incidents of abnormal vital signs as well as the fall of unattended older persons, and, accordingly, sends an alarm message to the concerned caregivers, to provide the needed help in the shortest delay possible. The proposed system is composed of three major modules; firstly the sensing module (SM), which continuously measures the acceleration of the monitored person, as well as vital signs of the monitored persons, such as the temperature and the heart pulse rate. Secondly, the decision making module (DMM) which is a processing element that receives the sensing signals from the sensors used in SM, analyzes them, then makes a decision if an abnormality or a fall is detected or not. Finally, if the DMM detects a fall, it sends this decision signal to the alarm module (AM), which sends SMS messages to the concerned caregivers, whose cell phone numbers, are pre-configured in the AM.
Keywords: Fall detection, heart pulse rate, body temperature, abnormality detection, remote detection.
Abstract
Single-Carrier Frequency-Domain Equalizer with Multi-Antenna Transmit Diversity
Sunil Shankar Mane, Dr. S. L. Lahudkar
DOI: 10.17148/IJARCCE.2015.4703
Abstract: : Single-carrier (SC) block transmission with cyclic prefix (CP) is a method with several advantages that has been incorporated into standards. This paper has analyzed the performance of multi-antenna SC-FDE under Alamouti signaling and cyclic-delay diversity (CDD). Our analysis shows that the characteristic of diversity it is depends on data block length and data transmission rate as well as on the channel memory and antenna configuration. At higher rates their diversity diminishes and full diversity is available to both CDD and Alamouti signalling below a certain rate threshold. From our investigation we say that at high rates Alamouti signalling provides twice the diversity of SISO SC-FDE, while the diversity of the SISO SC-FDE under the CDD diversity degenerates.
Keywords: Cyclic Prefixes, Cyclic Delay Diversity, Alamouti Signalling, Single-Carrier.
Abstract
Modelling of Metro Railway Signalling using Petri Net
Mandira Banik, Sudeep Ghosh
DOI: 10.17148/IJARCCE.2015.4704
Abstract: This paper deals with the use of Petri nets in modelling metro railway network and designing appropriate control logic for it to avoid collision. Here, the whole metro network is presented as a combination of the elementary models � blocks and signals within the track. We here model automatic train protection (ATP) and overlap to ensure safeness of the railway network. In this research work, we have actually introduced constraints at the signals in the metro track. These constraints ensure safe working of metro network.
Keywords: Petri nets, safeness constraints, ATP, asynchronous systems.
Abstract
A Survey on EDFA Amplifier for DWDM System
Dinesh Birdi, Mandeep Singh
DOI: 10.17148/IJARCCE.2015.4705
Abstract: The goal of this review paper is to get the analysis of an erbium doped fiber amplifier (EDFA) for dense wavelength division multiplexing (DWDM) system. They analyzed that the output peak power is increased many times and optimized by using EDFA. The performance of single & hybrid optical amplifiers using the output power, BER, eye height and Q factor. The system is simulated using Optisystem software to achieve gain flatness, BER (Bit error rate), and noise figure of EDFA through optimized fiber analyzed separately. The simulation results showing length and pump power. The system is simulated using Optisystem software to achieve gain flatness, noise figure of EDFA. An efficient flat gain characteristic is demonstrated using a two stage DRA-EDFA configuration. The performance of the DWDM system using both hybrid fiber amplifier configurations has been quality factor (Q), eye diagrams, signal strengths and BER at various receivers for BER of 10-9 at 1479 nm to 1555 nm bandwidth. The performance of a 64 channel DWDM system for different modulation formats, channel spacing, line widths of optical sources and different fiber lengths has been observed. They analyzed the EDFA adaptive gain control effect over a cascade amplifier in a DWDM system & the performance of optical cross connect in DWDM system under the influence of intra-band crosstalk.
Keywords: Erbium Doped Fiber Amplifier (EDFA), Erbium Doped Fiber (EDF), Dense Wavelength Division Multiplexing (DWDM), Doped Fiber Amplifiers (DFAs), Gain Flatness (GF), Noise Figure (NF), Adaptive Gain Control (AdGC), Multi Core-EDFA (MC-EDFA).
Abstract
A Review on Image Steganography Techniques
Abhay Dakhole , Dr.Sanjay Badjate
DOI: 10.17148/IJARCCE.2015.4706
Abstract: Image steganography is applicable in defence, police department, detective investigation department and medical field. In this paper we give a review on various techniques in image steganography. Nowadays internet technologies need a very strong level of security during data transmission. We can achieve it by steganography. Integer wavelet transform, list significant bit are some techniques used in image steganography. The results of such reviews of various methodologies are to get an efficient analogy to create a much better techniques for image steganography.
Keywords: Steganography, Cryptography. DWT, IWT.
Abstract
Automatic Conversion of Image and Video from 2D to 3D with Steganographic Data Hiding in Converted 3D Image
Sariga N P, Sajitha A S
DOI: 10.17148/IJARCCE.2015.4707
Abstract: We are going to implement steganographic data hiding process in the converted 3D image. Even if a large growth has happened during last some years in this area of image conversion, the 3D content's availability is still remain less by that of the 2D counterpart. We consider the problem of estimating detailed 3D structure from a single still image of an unstructured environment. Here the introducing idea is to create 3D models which are accurate quantitatively and also visually pleasing. To address the existing limitation, many image conversion methods have been proposed. The conversion by global nearest neighbor method is one of the effective way for 2D to 3D conversion. Here this method is used for the conversion process. The results demonstrate that repositories of 3D content can be used for effective 2D to 3D image conversion. We can also hide the data in 3D image by using steganographic data hiding process. So as to gain more security and efficiency than usual 2D image data hiding, Steganography is one of the efficient methods for securely hiding the data . It is a type of secret communication and security system used in hiding secret data inside digital mediums. An extension to video can be implemented by temporal continuity of computed depth maps.
Keywords: 3D Image, Image Conversion, Stereoscopic Images, Nearest Neighbor Classification Method, Cross Bilateral Filtering, Steganography.
Abstract
Implementation of On-Chip Network Protocol AMBA AHB
A V S R L Bharadwaj, L. Padma Sree
DOI: 10.17148/IJARCCE.2015.4708
Abstract: In this paper, the efficient bus architecture AMBA AHB is defined to support most advanced bus functionalities was designed and the hardware modelling for that architecture was done using VERILOG (IEEE STD 2001) and simulated in Modelsim. The scheme involves read and write transactions, lock transactions, pipelined transactions of the standard. AMBA (Advanced Microcontroller Bus Architecture) was introduced by ARM in 1996 as registered trademark and is an open-standard communication protocol, as more IP cores are integrated into an SOC design, the communication flow between IP cores has increased drastically and the efficiency of the on-chip bus has become a dominant factor for the performance of a system. The AHB design implementation is done with one master and four slaves, according to decoding scheme master can access the bus slaves based on generated address range. One entity acts as the master of the AHB instance, and the other IP�s acts as the slaves of AHB instance and only the master can present commands and is the controlling entity. The slave responds to commands presented to it, either by accepting data from the master, or by presenting data to the master. Upgradeability and Customization benefits of programmable logic can be obtained by FPGA implementation.
Keywords: AMBA-AHB, Master and Slave protocols, System-on-chip (soc), FPGA, Intellectual property.
Abstract
Broadcast Protocol for V2V and V2RSU in VANET
Shruti Balapgol, Prof. Dr. P. K. Deshmukh
DOI: 10.17148/IJARCCE.2015.4709
Abstract: This system combines algorithmssuitable for locations with and without road side units. It is the integration of the vehicle to vehicle(V2V) and vehicle to road side unit(V2R) communication. The V2V algorithm uses the signal messages to acquire the information of the neighbors, broadcast the messages and acquire acknowledgements. Connected dominating set (CDS) is calculated and CDS nodes use a shorter waiting period before possible retransmission. At time-out vehicle retransmits if there is at least one neighbor in need of the message. The road side units (RSU) have a high range of communication. Thus V2R algorithm disseminates data faster. RSU is also used to reduce the redundant retransmissions. The integration of V2V and V2R communication is beneficial due to the fact that V2R provides better service sparse networks and long distance communication, whereas V2V enables direct communication for small to medium distances/areas and at locations where roadside access points are not available.
Keywords: Broadcasting, CDS, data dissemination, NES, RSU, vehicular ad-hoc networks.
Abstract
Integrity Attestation on Service Components to Pinpointing the Attackers in Cloud Infrastructure
S. Zubair, B.Sowmya
DOI: 10.17148/IJARCCE.2015.4710
Abstract: Software-as-a-service (SaaS) offers the consumer to utilize the provider�s applications working on a cloud infrastructure. All the applications are easily reached from different client devices from a client interface like a web browser. With the Software-as-a-service model, the consumer has slight or no authority how input information is computed, but must be capable to contain confidence in the cloud provider�s liability and fulfilment or can organize which input he/she provides to a Software-as-a-service. Firstly user can avoid providing sensible data to the SaaS. Secondly user might be capable to safeguard the sensible data before providing it as input to Software-as-a-service. In the existing system the attackers can escape the detection if they attack only a few service functions. So, in order to overcome this limitation the proposed system will limit the attack scope using integrity attestation on the service components by doing this it will be difficult to attack the popular service functions. By doing this the attackers can be easily pinpointed. Using integrity attestation on service components will improve privacy and the computation time will be reduced to greater extent. The proposed system will also provide result auto correction to automatically correct compromised results to improve the result quality.
Keywords: SaaS, PaaS, IaaS, VMs, ASP.
Abstract
Design of Low Noise Amplifier at 2.47 GHz
Gunjan Gotmare, Mr. Arpit Yadav, Dr. Sanjay Badjate
DOI: 10.17148/IJARCCE.2015.4711
Abstract: In this paper we design Noise Amplifier (LNA) at 2.47 GHz frequency for WLAN application. LNA is used to amplify very weak signal i.e it increases the strength of signal before it can be send to other parts of the receiver. A good LNA has large gain and low noise figure (NF) and low power consumption. LNA is the second element in the receiver section after antenna. In this paper we have tried to design LNA Using 90 nm technology so our length is 90 nm and width is varied to obtain desired value of current. In IC designing current value depends on length and width ratio. For simulation purpose �ADVANCED DESIGN SYSTEM� tool was used. ADS is easy to understand and user friendly tool. For proposed LNA supply voltage is 1.2 V. The LNA provides a good gain of 14.0 dB, a noise figure of 0.5 dB, reverse isolation (S12) of -3 dB, and input return loss (S11) of -10 dB.
Keywords: ADS, Gain, LNA, Noise figure, reverse isolation, input return loss.
Abstract
Smart Navigation System for Visually Impaired Person
Rupa N. Digole, Prof. S. M. Kulkarni
DOI: 10.17148/IJARCCE.2015.4712
Abstract: In market there is many navigation systems like guide dog, assistive systems which are used for visually impaired person (VIP). Smart navigation system is a different than above mentioned systems because it gives combined service foe VIP. This system provides indoor navigation by using Radio Frequency Identifier (RFID), outdoor navigation by using Global Position System (GPS) as well as obstacle detection by using ultrasonic sensor. User will give the starting and ending location then this system will give voice instruction to reach at destination by detecting obstacle also. This system can specially use in big campus like industries, big institutes where it will act as guiding map.
Keywords: Smart navigation system, Global position System (GPS), Radio Frequency Identifier (RFID), and obstacle detection.
Abstract
A Methodology for Efficient Gender Dependent Speaker Age and Emotion Identification System
Shivaji J Chaudhari, Ramesh M Kagalkar
DOI: 10.17148/IJARCCE.2015.4713
Abstract: In this paper human unique voice characteristics used to increase the human to computer interaction (HCI) and automation in the machine uses. This system is a combination of training phase and testing phase, training phase includes the training of the system and testing phase work on the to identify the new or existed speaker information based on training. Noise elimination algorithm applied on the new audio file to eliminate the noise from voice signal and help to extract the features easily. The Mel Frequency Cepstral Coefficient (MFCC) features extraction technique used to extract unique features from voice, on the extracted feature Gaussian Mixture Model (GMM) and Dimension reduction technique applied to increase the efficiency of performance, A GMM is a parametric probability density function. GMM parameters are estimated from training data using the iterative Expectation-Maximization (EM) algorithm or Maximum a Posteriori (MAP) estimation from a well-trained prior model. GMM creates the super vectors as features for a Support Vector Machine (SVM) model for classification of a speaker voice according classified age group like child, young, adult, senior, age group classification help identify the age group and precise age of speaker, reduce the complexity of pattern matching using the SVM classification. Proposed techniques increase the performance and accuracy of system.
Keywords: Mel Frequency Cepstral Coefficient (MFCC), Gaussian Mixture Model (GMM), support vector machine (SVM), Expectation-Maximization (EM), Maximum a Posteriori (MAP), Hidden Markov Models (HMMs), Suprasegmental Hidden Markov Models (SPHMMs).
Abstract
BER Performance of BPSK, QPSK & 16 QAM with and without using OFDM over AWGN, Rayleigh and Rician Fading Channel
Mohd. Abuzer Khan, Sonu Pal, Ankita Jose
DOI: 10.17148/IJARCCE.2015.4714
Abstract: Wireless communications is the fastest growing segment of the communication industry. The most widely used wireless communication is mobile communication. But, there are many technical challenges that must be overcome. A signal transmitted on a wireless channel is subject to Fading, Shadowing, Interference, Propagation path loss etc. There is always a greater demand for capacity with the high quality service. In this situation, orthogonal frequency division multiplexing (OFDM) is well defined technique, which is a suitable option for high band width data transmission, by converting the wideband signal into narrow band signals for transmission. The transmission of these individual narrow band signals are executed with orthogonal carrier. In this paper, the performance of transmission mode are evaluated by Bit Error Rate versus the Signal to Noise Ratio under frequently used three channel modes, Additive White Gaussian Noise, Rayleigh Fading and Rician Fading channel. In order to investigate, first we derive the mathematical modelling for bit error rate and signal to noise ratio of OFDM over AWGN, Rayleigh and Rician fading channels then, OFDM is design and implemented. Here we have assumed AWGN channel, Rician and Rayleigh fading channel as noise channel and also built BPSK, QPSK and QAM modulation technique. OFDM transmitters and receivers are implemented here using Inverse Fast Fourier Transform (IFFT) and Fast Fourier Transform (FFT) of size 64 with 52 sub carriers to convert the spectra to time domain & vice versa. The signal frequency is 8MHz and sub-carrier frequency is 0.125MHz. The performance has been concluded based on BER vs. SNR output for BPSK, QPSK and QAM using AWGN, Rayleigh & Rician channel is that BPSK is better than QPSK and QAM in all channel because over AWGN channel at SNR=4dB, BER=0.01 and same BER is achieved by QPSK at SNR=8 and give better performance over AWGN as compare to Rayleigh and Rician channel. And Rician channel is better than Rayleigh channel, BER in Rician is 1/4th of Rayleigh for BPSK, � for QPSK, 5/4 for 16-QAM.
Keywords: OFDM, AWGN, Rayleigh, Rician, BER, SNR, IFFT, BPSK, QPSK and QAM.
Abstract
At Mega 328 Microcontroller Based Firing Angle Control of 3phase Thyristor Bridge Rectifier Circuit
Mohan R. Gangul, G.P. Jain
DOI: 10.17148/IJARCCE.2015.4715
Abstract: Controlled power is a fundamental prerequisite of various sectors. A scheme of microcontroller based firing angle control, using AT Mega 328 MCU & associated hardware circuitry is designed. Basic idea is to achieve reliable, consistent control that will result in improved performance of converter. Set-up consists of ATmega-328 controller, LCD display for displaying firing angle, transistorized conditioning circuit, main rectifier module and input from user in the form of analog voltage for firing angle control. Integration of these modules will result in full controlled converter with superior performance over other ordinary control techniques. Design, development, testing, and installation of a firing controller for a tri phase thyristor rectifier. AT Mega 328 microcontroller is used as the firing controller. This IC chip provides logical input and output, analog-to-digital conversion, timer for the delay counting, and various interrupt vectors for timing. The software algorithm consists of the detection of the zero crossing of the synchronization voltage to start the timing of a period. A special test is programmed to control the value of the firing angle. The design develops triggering circuit of 3-phase, 6-pulse, ac to dc controlled converter using AT Mega 328 microcontroller. The microcontroller will generate six equidistant, synchronized triggering pulses for the converter which finds application in power systems (high voltage DC transmission) and industrial drive systems. The controller is required to sense the input voltage and generate the required six trigger pulses irrespective of the variation of the mains frequency and to control the delay angle of these signals equally to control the DC output voltage.
Keywords: Microcontroller, AC/DC converter, Synchronization technique, gate triggering technique, DC motor.
Abstract
Design and Development of Non-Invasive Blood Glucose Measurement System using Near Infrared technique
K Sairam, Akesh Govada, Dr.CH Renumadhavi, Dr.B.S.Satyanarayana, Dr. K B Ramesh
DOI: 10.17148/IJARCCE.2015.4716
Abstract: Diabetes has advanced as one of the foremost medicinal services pandemics of the present day period. At first blood glucose is measured with substance responses, later glucometer is created which can quantify the blood glucose immediately by taking a little drop of blood on the lancet and set on the glucose test strip. Non-obtrusive blood glucose estimation framework is utilized to quantify the blood glucose without taking the blood test. Non- obtrusive routines offer the principle favorable position of help from agony and uneasiness because of regular finger Pricks required for the intrusive examination. Therefore Near infrared beam's (NIR) spectroscopy is utilized which demonstrates that it can be conceivable to quantify glucose focus in blood non-intrusively. This glucose detecting gadget could change diabetes treatment by prompting enhanced agreeability with suggested glucose levels, accordingly diminishing long haul complexities and expense of diabetes. The framework setup is planned by utilizing multisim programming. According to the particulars accessible in the nearby market, a NIR drove working at 2500nm wavelength is decided for transmission of NIR beams and a photograph locator is decided for the gathering with the fingertip as the body site. Simple to advanced change (ADC) is performed to the got signal. PIC 16F877A microcontroller is decided to dissect the glucose values from the separate advanced values and showed in the 16x2 fluid gem show (LCD). The venture work has talked about the noteworthiness of non-obtrusive blood glucose estimation framework. This gadget gives a solid, immediate, financially savvy and agreeable estimation framework for the location of blood glucose fixation without pricking blood.
Keywords: Diabetes, spectroscopy, glucose, non-invasive, Near Infrared light, Voltage Regulator.
Abstract
Design and Development of programming framework utilizing Biomarkers for Characterization of Rheumatic Arthritis Disease
Priyanka Premnath, K.B.Ramesh, Vidya Niranjan, B.P.Mallikarjunaswamy, E.T.Puttaiah
DOI: 10.17148/IJARCCE.2015.4717
Abstract: Rheumatic joint inflammation (RA) is an interminable systemic immune system illness embodying irritation and lasting harm of the joints. Early treatment in RA is essential as it can avert illness movement and irreversible harm of the joints. Successful analysis and treatment of the illness is a test because of its heterogeneity. The momentum demonstrative tests are not adequately precise to describe the malady at ahead of schedule stages. Accordingly, RA is commonly analyzed just once harm to the joints has as of now started, a period at which the window for ideal treatment may have been missed. Thus, there is an in number interest for novel serological biomarkers to enhance the early determination and successful stratification of this rich illness, so that the patient is given focused on and convenient treatment. Biomarkers can redo the administration of RA by empowering the early determination, appraisal and expectation of malady seriousness, choice of treatment, and observing of reaction to treatment. Hence a software system is developed to detect Rheumatic arthritis disease at early stages using biomarkers.
Keywords: Antibodies, synovitis, biomarkers, cytokines, genes, proteins.
Abstract
Design and Implementation of Microcontroller Based Propeller Display
Bajpai K. S, Kadam S. D, Tondare S. M.
DOI: 10.17148/IJARCCE.2015.4718
Abstract: Here we have presented a project on display numerous information using a special purpose LED display i.e. propeller display. This entire project is based on the mechanism of persistence of vision (illusion effect of human eye i.e. if anything appears in the same spot constantly, the human eye will perceive all of the display is at once and viewer can read the data associated with it. In the construction, we have used a 40 pin microcontroller with a display of 16 bright LEDs to display the message as VIT STC ETC.ENGG. All the synchronizing part is implemented using software(C language and Keil Compiler).
Keywords: Propeller display, LED, Microcontroller, POV.
Abstract
Comprehensive Regarding Hearing Impairment using Smart Android Phone
Miralkumar Surati, Mahesh T. Kolte
DOI: 10.17148/IJARCCE.2015.4719
Abstract: This paper shows that the android phone can be used as the new educational tool for learning and also be used by hearing aid person. Android application has been developed using Android Studio where the user would get information regarding the hearing impairment, there are some feature of the application like generating spectrogram, spectrum analyser and time domain also additional feature like text to speech conversion and speech to text conversion for the hearing impaired person.
Keywords: Spectrogram, spectrum analyser, time domain, Android.
Abstract
Fault Tolerance and Load Balancing algorithm in Cloud Computing: A survey
Sushil Kumar, Deepak Singh Rana, Sushil Chandra Dimri
DOI: 10.17148/IJARCCE.2015.4720
Abstract: Cloud computing is developing as a new standard for deploying, organizing, and accessing large scale distributed computing applications over the network. In cloud computing, fault tolerance is a major problem and one of the metric which consider being most important since the resource failure affects job execution, throughput, response time and performance of system and network. Fault tolerance in load balancing is one of the main challenges in cloud computing, which is required to distribute the workload equally across all the nodes, detect the fault and remove fault from the network and share workload to all the nodes to increase the performance of cloud network. The load is an amount of work that a computation system performs, which can be classified as network load, storage capacity, memory capacity and CPU load. This paper describes a survey on fault tolerance, fault tolerance techniques, load balancing algorithm and load balancing schemes including fault tolerance in a cloud environment.
Keywords: Cloud computing, Load Balancing, Fault Tolerance, Load balancing, Static load balancing, Dynamic load balancing algorithm.
Abstract
Global Optimization using Distributed Optimization Clustering Technique (DOCT) in Wireless Sensor Network
Ravinder Sharma, Sumit Chaudhary
DOI: 10.17148/IJARCCE.2015.4721
Abstract: This paper presents a new clustering protocol for designing energy-efficient hierarchical wireless sensor networks (WSNs) by optimizing the distributed sensor network to satisfy the scalability and prolong the network lifetime in large-scale applications. The proposed approach is a distributed optimization clustering technique called DOCT, which is based on individual maximum weight and parameterized calculation. In the DOCT protocol, the size of clusters is based on the distance of nodes from the data link such as base station (BS) and the local node density. The cluster heads are elected based on the average mean distance from neighbors, remaining energy and the times of being elected as cluster head. The performance of the DOCT protocol is compared with some well-known clustering protocols in literature such as the LEACH, HEED, WCA, GCMRA and TCAC protocols. The results confirm that the ideas decrease the construction time and the energy consumption of clustering progress in sensor networks and consequently improve the lifetime of networks with limited resources and battery powered nodes in harsh and inaccessible environments.
Keywords: Optimization clustering Technique, Wireless Sensor Network, Global Optimization.
Abstract
A Review on the Punjabi Text Classification using Natural Language Processing
Ubeeka Jain, Kavita Saini
DOI: 10.17148/IJARCCE.2015.4722
Abstract: Now-a-days, text classification is very necessary for an every field to organise the text documents. Till now there is no classifier available for classification of Punjabi documents. There are two new algorithms, one is ontology based and second is hybrid approach are proposed for Punjabi text classification. Here we have some Punjabi news article examples which we have to classify with the help of algorithms. Punjabi is a Indo Aryan language spoken in west Punjab (Pakistan) and East Punjab (India). So a little work has done in Punjabi text classification. The problem tackled by many Indian languages that is no capitalization, lack of standardization, spelling and scarcity of tools. Punjabi language has more inflectional forms than English language.
Keywords: Punjabi text classification, news articles, ontology based and hybrid approach.
Abstract
Semantic Search’s Impacts on Searching & Ranking of WebPages
Dharminder Singh, Ashwani Sethi
DOI: 10.17148/IJARCCE.2015.4723
Abstract: Searching for information on the Internet is much easier with the help of Search Engine, but relevant search is another complex task. Traditional search compare the user query keywords with web pages. Without meaning of query search will continue and produces non-relevant results. User will search again with different keywords for relevant results. Semantic Search improves all the shortcoming of traditional search and provides a meaning to query and can handle a large query from users. This paper presents architecture of Semantic Search, how it impacts on web page searching and ranking as compare to traditional search.
Keywords: SERP, Knowledgebase, Term, WWW, URL.
Abstract
Web Content Mining: – An Implementation on Social Websites
Pooja Rohilla, Ochin Sharma
DOI: 10.17148/IJARCCE.2015.4724
Abstract: Web Content Mining is a component of Data Mining. Whenever we talk about data, we conclude that there is a vast range of data on World Wide Web. And to manage this vast range of data, we often need many tools that can retrieve the data as per our criteria. There are various tools available on the internet which mines the data according to their types like whether they are in a structured format or semi structured or unstructured data. In this paper, I would like to discuss my project work which has an ability to mine the data from web efficiently. In this paper, the previous Web Content Mining Techniques will also be discussed and the tree structure of a webpage document will also be discussed.
Keywords: Social Web Mining, Web Content Mining, Web Mining, and Application of Web content Mining.
Abstract
PAPR Reduction using PTS Technique in OFDM – MIMO System
Celina Antony, Prof S.G. Hate
DOI: 10.17148/IJARCCE.2015.4725
Abstract: In the advancement of technology multicarrier transmission is of great importance. Orthogonal Frequency Division Multiplexing (OFDM) is a promising multicarrier technology for wireless communications. It facilitates high data rate for communication. The biggest drawback which OFDM encounters is high PAPR. The high PAPR results some interference to the system. This paper analyses the PAPR reduction technique called Partial Time Sequence (PTS) with different sub block and concludes that PTS technique is the most promising technique for PAPR reduction in OFDM system. OFDM � MIMO system with reduced PAPR is the best method for multicarrier transmission with higher data rate.
Keywords: OFDM, MIMO, PAPR, PTS.
Abstract
A Review on Text Chunker for Punjabi Language
Ubeeka Jain, Jasbir Kaur
DOI: 10.17148/IJARCCE.2015.4726
Abstract: Parsing is the process of assigning a parse tree to the sentence. There are many problems related to the process of full parsing. Shallow parsing or chunking is the alternative for full parsing. In chunking the phrases of the sentences are chunked together. Chunking is more efficient and robust as it takes less time and always gives a solution. It is often deterministic as it gives only one solution to a problem. Chunkers are used in a large no. of NLP applications. Such as information extraction, named entity recognition, spell checkers, search etc . Chunkers are relatively difficult to build for Indian languages as there arise many problems during the system development. Chunkers identify the noun or verb chunks. Chunks are the non overlapping regions. In this work text chunker of Punjabi language is built and the greedy based algorithm is used for the machine learning and training of data set.
Keywords: Natural language Processing (NLP), Part of Speech Tagger(POS), Punjabi chunker.
Abstract
Study and Analysis of 2×2 MIMO Systems for Different Modulation Techniques using MATLAB
Ramanagoud Biradar, Dr.G.Sadashivappa
DOI: 10.17148/IJARCCE.2015.4727
Abstract: The performance of 2x2 Multiple Input multiple Output (MIMO) antenna systems is proposed to analyze by determining the transmit diversity using Alamouti Space Time Coding (STBC) techniques. For the BPSK and QPSK modulation technique transmission characteristics are determine. Adaptive White Gaussian Noise (AWGN) is proposed to presuming flat fading Rayleigh channel. On receiver side, linear equalization techniques such as Zero Forcing (ZF) and Maximum Likelihood Detector (MLD) are proposed to computing BER. The STBC codes for digital transmission shows significant improvement in BER performance with higher levels of digital modulation. MATLAB tool is used for simulation and its performance.
Keywords: Multiple Input Multiple Output (MIMO), Space Time Block Code (STBC), Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK),Zero Forcing (ZF),Maximum Likelihood Detector (MLD).
Abstract
Progressive Image Transmission Using OFDM System
Abhijit S. Andure, Prof. S. M. Shende, Prof. S. P. Kharde
DOI: 10.17148/IJARCCE.2015.4728
Abstract: This paper describes a new method for progressive image transmission using Orthogonal Frequency Division Multiplexing (OFDM). Low Density Parity Check Coding (LDPC) is used to improve the BER of the system. Trigonometric transforms are used for reducing the Peak-to-Average Power Ratio (PAPR) of OFDM signal. The Set Partitioning In Hierarchical Trees (SPIHT) algorithm is used for source coding of the images. In this method, the transmit data sequence of the OFDM signal is grouped into in-phase and in-quadrature components after Inverse Fast Fourier Transform (IFFT), then each component is transformed using Discrete Cosine Transform (DCT) or Discrete Sine Transform (DST).
Keywords: OFDM, PAPR, SPIHT, LDPC.
Abstract
Improvement of BER Performance in OFDM under various Channels with EH Code
K. Lavanya, M.V.S. Sairam
DOI: 10.17148/IJARCCE.2015.4729
Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is a very efficient high speed data transmission technique in wireless communication technology. In this paper, we present Bit Error Rate (BER) performance of OFDM system using BPSK and DPSK modulation schemes, operating under various channel conditions. To imitate the practical applications in the real world Rayleigh channel, Rician channels are also considered in addition to the AWGN channel. The simulation is done to investigate the performance of the coded OFDM system over the uncoded OFDM system. It is seen that coding improves BER performance of OFDM system and hence in this work, Extended Hamming Code (EH Code) is used as Single Error Correcting Code (SEC).
Keywords: OFDM, BER, EH Code, SEC, AWGN, Rayleigh and Rician channels.
Abstract
Enhanced Key Aggregation Technique for Secured Data Sharing in Cloud
Shweta. P. Tenginkai, Vani K. S
DOI: 10.17148/IJARCCE.2015.4730
Abstract: Data sharing is a crucial functionality in cloud storage. With the current wireless technology and the usage of different smart devices, the sharing of data has become very easy with the help of Internet. Data sharing has become an important aspect to be considered in cloud. The cloud users want their files, folders, pictures and other confidential things to be available for their utilization. It is essential to safely, productively, and adaptably impart information to others in distributed storage. A special type of public-key encryption which is called enhanced Key-Aggregation Cryptosystem is designed to outline an effective scheme that helps in flexible delegation by a constant-size decryption key. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the decryption power of all the keys being aggregated. In modern cryptography, a fundamental problem is leveraging the secrecy of a small piece of knowledge into the ability to perform cryptographic functions multiple times. Here the efforts are taken for making the powerful decryption key, which permits decryption of different ciphertexts without expanding the aggregate key size. This scheme also holds well in the standard model and can be applicable anytime in cloud storage.
Keywords: Cloud storage, data sharing, ciphertexts, powerful aggregate key.
Abstract
A Review on Copy Move Forgery Techniques
Hitesh Batra , Dr.Sanjay Badjate
DOI: 10.17148/IJARCCE.2015.4731
Abstract: With the presence of image editing software and digital cameras, techniques for digital image tampering are becoming more and more sophisticated and widespread. How to prove the integrity and authenticity of digital images becomes a more and more urgent problem at present, especially in some critical applications, such as court evidence, news broadcast photos, medical images, defence photos, sports pictures etc., in which preserving the exact fidelity of the original image is a legal, moral or technical requirement. Copy-move forgery is one of the widely used tampering techniques where one part of an image is copied to some other part of image in with a view to cover a potentially important feature. In this paper an overview of passive image authentication is presented and the different copy move forgery detection techniques are reviewed.
Keywords: Copy move forgery, Dwt, Dywt, Zernike moment.
Abstract
User Search Goal Identification Using User Click Sequence Analysis
Miss. Radhika Rane, Mr. Sudip Tembhurne, Mr. Sanjeev Dwivedi
DOI: 10.17148/IJARCCE.2015.4732
Abstract: Data Mining refers to extracting or mining knowledge from large amounts of data. It is also called as knowledge mining from data. Web mining is the application of data mining to extract knowledge from web data including web documents, hyperlinks between documents usage log of websites .Search engine is one of the most important applications in today�s internet. For an ambiguous query, different users may have different search targets, so the search engine doesn�t satisfy user information needs properly on the diverse aspects upon submission of same query. The computation and analysis of user search goals can be very useful in improving search engine relevance and user experience. Search history records have been clustered to discover different user search goals for a query. User click sequences are constructed from user click-through logs and can efficiently reflect the information needs of users. Virtual-documents are generated through user click sequences for clustering using clustering algorithm. We propose Cosine Similarity Algorithm to evaluate the performance of user search target computing based on restructuring web search results. Thus, we can determine the number of user search target for a query.
Keywords: Data mining, user search goals, clustering, cosine similarity algorithm.
Abstract
Dynamic Packet Length Optimization in Wireless Sensor Network
Mr. Sudip Tembhurne, Miss. Radhika Rane , Mr. Sachin Deshpande
DOI: 10.17148/IJARCCE.2015.4733
Abstract: In wireless sensor networks, dynamic packet length control is more efficient in terms of channel utilization and energy efficiency. In previous packet length optimizations for sensor network often employ a fixed optimal packet length scheme, while dynamic packet length provide accurate radio link estimation and increase system throughput. The adaptation of dynamic packet length is 802.11 wireless system. The packet delivery ratio keeps high i.e. 95% above and link estimated error within 10% for 95% link. The experiments provide optimization of dynamic packet length achieves best performances related to the previous experiments.
Keywords: Link estimation, packet length optimization, wireless sensor networks, DPLC.
Abstract
RGB Based Secret Sharing Scheme in Color Visual Cryptography
M.Karolin, Dr.T.Meyyapan
DOI: 10.17148/IJARCCE.2015.4734
Abstract: Information hiding in the communication spectrum became a critical task. The Visual Cryptography is a type of cryptography that allows the image to be divided into multiple numbers of shares called transparent shares and then transmission of images. The intruder hence cannot understand the distorted image and thus the data communication becomes secured. In existing methods works for color images with 8 colors and even few of them without halftone techniques. In this paper, the authors propose a method for images with 256 colors which are converted to 16 standard RGB colors format. It generates shares without compromising the resolution. The Floyd � Steinberg dithering algorithm is used to manipulate the 256 color code image to reduce it to 16 standard colors code image. The proposed method employs (2, 2) XOR-Based visual cryptography method is also used to generate shares. Decryption procedure enables secret image sharing and stacking. Although, the proposed method converts the 256 color image to 16 color code format for the share creation, the intensity of the original image is maintained. The resulting scheme gives the perfect security of the shares that are well encrypted and the visual quality of the stacked image is very good. The experimental results of the proposed method are compared with that of 8 color RGB share generation techniques.
Keywords: Visual cryptography, XOR, 16 standard color code image, Floyd � Steinberg dithering.
Abstract
A Novel Technical Approach for Implementing Static Hand Gesture Recognition
Ramesh M. Kagalkar, Dr.Nagaraj H.N, Dr. S.V Gumaste
DOI: 10.17148/IJARCCE.2015.4735
Abstract: This survey presents a summary of the difficult field of static hand gesture recognition, that primarily consists of the popularity of well-defined signs supported a posture of the hand. Since human beings tend to differ in terms of size and shape the foremost difficult drawback consists of the segmentation and also the correct classification of the information�s gathered from the input image, captured byone or additional cameras. The aim of this paper is to indicate that techniques have with success been tested and employed in order to unravel the issues mentioned higher than yielding a strong and reliable static hand gesture recognition system.
Keywords: KSL, Image Capturing, ZM, PZM, HMM.
Abstract
Neuro-Fuzzy Based Region Rainfall Forecasting
Rupa, Er. Shilpa Jain
DOI: 10.17148/IJARCCE.2015.4736
Abstract: Monsoon forecasting is the most considerable factor which determines the prosperity and refrain of the agronomics. In the cultivated land India, the heightening of vegetation and the stagnation of seasonal crops and water curtailment are the most viewed topics which have to be look after in a serious way. Rainfall is one of the most entangled processes to be look after for the runoff for foretelling also we have to be vigilant in the usage of water. Water should be used with alert minds so that is no wasted. Also proper management of water is needed. Rainfall prediction acts as a blessing as it gives information about the occurrence of rain and by that knowledge we can predict about the seasonal products. There is needed to be predicting the rainfall. For this we use the Adaptive Neuro-fuzzy inference system approach developed by the integration of fuzzy logic and Artificial Neural Network. After collecting the facts and figures of low rainfall region the proposed technique would be applied and the results are calculated. The outcomes are then compared with the previous data. We get more accurate and precise results for rainfall prediction of low rainfall region.
Keywords: Neuro Fuzzy, Inference Rules, Neural Network, Fuzzy logic, Estimation.
Abstract
Load Balancing in Cloud Computing Using Task Scheduling
Minakshi Berwal, Dr. Chander Kant
DOI: 10.17148/IJARCCE.2015.4737
Abstract: Cloud computing enables a large range of users to access scattered, scalable, virtualized hardware and/or software infrastructure over the Internet. Load balancing is a methodology to allocate workload across many computers, or other resources over the network links to achieve optimal resource utilization, make the most of throughput, minimum response time, and avoid overload. This paper presents a load balancing Task Scheduling algorithms or technique in cloud computing. This scheduling algorithm measures both resource cost and estimate performance, it also improves the calculation/communication ratio by grouping the user tasks according to a particular cloud resource�s processing capability and sends the grouped jobs to the resource.
Keywords: CLOUD Computing, Cloud SIM, Load Balancing.
Abstract
Weighted Space-Time Bit Trellis Coded Modulation for Quasi-Static Rayleigh Fading Channel
Naintara Ghorela, Mandeep Singh, Jaspreet Singh
DOI: 10.17148/IJARCCE.2015.4738
Abstract: The data rate of wireless communication system can be increased by MIMO system. The BICM and Space time trellis codes are transmission schemes but their decoding complexity grows exponentially as the number of antenna increases.We used the space-time bit trellis codes instead which are a concatenation of a bit convolutional code, modulator and spatial multiplexing without interleaving. In this paper we present the concept of weighted space-time bit trellis codes. These codes are a combination of space-time bit trellis codes and ideal beamforming. It has been shown that if perfect channel state information is available at the transmitter, the performance of a space-time bit trellis coded system can be further improved by weighting the transmitted signals. In this paper, we evaluate the performance of space-time bit trellis codes combined with ideal beamforming over slow fading channels. Simulation results show that the proposed scheme considerably outperforms the conventional space-time bit trellis codes without weighting. We show simulation results for 4-QAM up to 4x4 transmit/receive antennas with a data rate of 2 bits per channel use.
Keywords: Weighted space time bit trellis codes, channel state information, beamforming, Rayleigh fading channel, MIMO.
Abstract
Advanced MPSE Scheme for Searching Shared and Encrypted Data
Gokula Nath G, Syamamol T
DOI: 10.17148/IJARCCE.2015.4739
Abstract: Encryption is a well established technology for protecting sensitive data. Multi Party Searchable Encryption is a scheme in which multiple users store and shared their data with each other. The scheme consists of two entities: A server and a set of users. Achieving multi-keyword searching is challenging in the scheme and also it is challenge to have a secure searchable encryption due to the key sharing between set of users. The proposed scheme, advanced Multi Party Searchable Encryption allows a key server to solve the key sharing problem. The new scheme allows multi-keyword searching with homomorphic encryption and also enables searching keyword in the form of checksum. Moreover, the evaluations show the speed of proposed scheme compared with the old MPSE scheme with respect to searching and encryption/decryption.
Keywords: Multi Party Searchable Encryption (MPSE), Homomorphic Encryption, checksum, MD5, DES, RSA.
Abstract
Security Issues and Challenges in Wireless Sensor Networks (An Overview)
Suhail Ahmad Shah
DOI: 10.17148/IJARCCE.2015.4740
Abstract: Wireless Sensor Network (WSN) is a group of smart sensors, each capable of sensing, processing and communicating, but when deployed in numbers, form a network which collectively monitor the state of the physical world. Its applications and potential benefits are tremendous and seem only limited by imagination. As any technology at its infancy stage, there are plenty of challenges and obstacles lying ahead .The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed mechanisms for wireless sensor networks.
Keywords: WSN, Applications, Security, Attack , Holistic , Challenges.
Abstract
Low Power Full Adder Circuit Implementation using Transmission Gate
Akansha Maheshwari, Surbhit Luthra
DOI: 10.17148/IJARCCE.2015.4741
Abstract: In this paper, the power consumption of a conventional full adder circuit is reduced by using transmission gate at the place of pass transistor logic (NMOS or PMOS). This circuit is designed using 100nm technology parameters.
Keywords: power; full adder circuit; transmission gate; pass transistor; NMOS; PMOS.
Abstract
Improved Power Conservation through Eecsa Routing Protocol in Wireless Sensor Networks
Salma, R. Venkatachalam
DOI: 10.17148/IJARCCE.2015.4742
Abstract: In wireless sensor network have secure routing protocols, such as the security-aware ad hoc routing, can be used to defend against black hole and wormhole attacks. Also use the cluster method. A cluster based routing algorithm to extend the lifetime of the networks and to maintain a balanced energy consumption of nodes. To obtain it, we add a small slot in a round frame, which is enables to exchange the remaining energy messages between the base station (BS), cluster heads, and nodes. If an end-to-end path with the required security attributes can be found, the destination will generate a packet with the specific security metric. Clustering of nodes is one of the most effective approaches for conserving energy in wireless sensor networks (WSNs). The multi-event sources in the design of clustering protocols. Energy efficient cluster algorithm is proposed that aims to conserve the energy of sensor nodes in the presence of network. It is achieved by considering two design factors; (1) electing an appropriate high energy node to function as cluster-head, (2) limiting the number of sub-clusters in the network. Performance evaluation results show that EECSA improves the stability and energy conservation of the wireless sensor networks. In our proposed system take two types of considerations based on sleep state and active state. The nodes that are not involved in the transmission are made to be in sleep state and are awakened whenever necessary. The estimation of the highest energy level and least hop count is also considered. Results have take some parameters like throughput, Packet end-to-end delay, network load are to be taken.
Keywords: WSN, BS, EECSA, Data Clustering.
Abstract
Performance Evaluation of AODV and DSR Routing Protocols under Constrained Situation
Alka Adlakha, Vasudha Arora
DOI: 10.17148/IJARCCE.2015.4743
Abstract: A mobile ad hoc network is multi-hop wireless network with dynamically and frequently changing topology. The power, energy and bandwidth constraints of these self organized systems have made routing a challenging problem. No of routing protocols has been developed to find routes with minimum control overhead and network resources. Ex-tensions are done on conventional protocols to improve the throughput. The simulation has shown that there is certainly a need for a special protocol in constrained situation. This paper gives the overview on comparison of AODV and DSR on demand routing protocols in constrained situation and shows that AODV out performs DSR in constrained situation.
Keywords: DSR, AODV, CAODV, CDSR, GLOMOSIM Simulator.
Abstract
Customization of Materials Management Module of SAP ERP for Power Industries of C.G., India
Deepak Kumar Vishwakarma , K. J. Satao
DOI: 10.17148/IJARCCE.2015.4744
Abstract: Enterprise Resource Planning (ERP) systems, also called Enterprise Systems (ES) are among the most important business information technologies that emerged during the last decade. While no two industries ERP systems are the same, the basic concept of ERP systems is focused on standardization and synchronization of information, and as a result, improved efficiency and output. To implement an integrated system of materials management, there must be a central database wherein anyone in the company can find out all information about any material passing through the plant. ERP streamlines all the business functionalities and gives desired result in one click. Customization and configuration are parts of ERP implementation process. ERPs are always configured, and usually customized, when implemented. An ERP system can help to improve the communication within an organization. SAP is a state-of�the-art software for ERP implementation and customization. SAP is user friendly i.e. information will be obtained as and when required. We have adopted a case study approach for this paper. For this we have taken case study of Chhattisgarh State Government owned power company named as Chhattisgarh State Electricity Board(CSEB). In this paper, we have concentrated mainly on selected functionalities of Material Management module that are necessary for power industries of Chhattisgarh state for customization of SAP ERP software.
Keywords: Enterprise Resource Planning, System Application and Products, Materials Management Module, Customization, SAP R/3.
Abstract
Modelling and Meeting Simulation Model by V & V Method
S.Ezhilmathi M.E, V.Shanmugapriya, S.Saroja, P.Renuga
DOI: 10.17148/IJARCCE.2015.4745
Abstract: The advancements in the information and communication (ICT) technologies have made it possible to test and verify any sort of system before deploying it into the real time environment. The verification and validation (V&V) tools and techniques have also helped in minimizing the risk of the project failure or application. In the recent year, it has been observed that the artificial intelligence and multi agent models have being gaining importance due to the high requirements for the automation of systems or environments. In this research paper, we have presented a system design approach for the verification and validation (V&V) of agent based model and software application. The proposed solution of the E-VOMAS approach is based on the system layered architecture. The E-VOMAS approach can be utilized for the verification and validation (V&V) of the agent based model and software engineering applications. The simulation has been tested using the agent based models. The multi agent meeting scheduling model has been utilized for the simulation and testing of the E-VOMAS Approach. To demonstrate the effectiveness of Multi agent meeting scheduling system and E-VOMAS approach, we will show its broad applicability in a wide variety of simulation models ranging from social sciences to computer networks in spatial and non-spatial conceptual models.
Keywords: Verification and validation (V&V), E-VOMAS, Agent-based Model, Information and communication (ICT), software engineering.
Abstract
Data Hiding With Multiple Network Protocol Usage
Mrs. Dhanashri D. Dhokate, Dr. Vijay R. Ghorpade
DOI: 10.17148/IJARCCE.2015.4746
Abstract: The work relates the area of Steganography, network protocols and security for data hiding in communication networks. Hiding information in network traffic may lead to leakage of confidential information. Steganography is defined as the art and science of hiding information, which is a process that involves hiding a message in an appropriate carrier for example an image file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. Implementation of new Steganography, the PadSteg (Padding Steganography) system is implemented. It is the first information hiding solution which represents inter-protocol Steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Ether leak vulnerability (improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs (Local Area Networks). Proposed work is to confirm that PadSteg is feasible in today�s network and it provides more security within secret group.
Keywords: Steganography, ARP, improper padding, Ether leak vulnerability.
Abstract
Secure Deduplication and Data Security with Efficient and Reliable Convergent Key Management
Nikhil O. Agrawal, Prof.S.S.Kulkarni
DOI: 10.17148/IJARCCE.2015.4747
Abstract: Secure deduplication is a technique for eliminating duplicate copies of storage data, and provides security to them. To reduce storage space and upload bandwidth in cloud storage deduplication has been a well-known technique. For that purpose convergent encryption has been extensively adopt for secure deduplication, critical issue of making convergent encryption practical is to efficiently and reliably manage a huge number of convergent keys. The basic idea in this paper is that we can eliminate duplicate copies of storage data and limit the damage of stolen data if we decrease the value of that stolen information to the attacker. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. We first introduce a baseline approach in which each user holds an independent master key for encrypting the convergent keys and outsourcing them. However, such a baseline key management scheme generates an enormous number of keys with the increasing number of users and requires users to dedicatedly protect the master keys. To this end, we propose Dekey, User Behavior Pro?ling and Decoys technology. Dekey new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers for insider attacker. As a proof of concept, we implement Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited overhead in realistic environments. User profiling and decoys, then, serve two purposes. First one is validating whether data access is authorized when abnormal information access is detected, and second one is that confusing the attacker with bogus information. We posit that the combination of these security features will provide unprecedented levels of security for the deduplication in insider and outsider attacker.
Keywords: Secure deduplication, Dekey, User Behavior Profiling, Decoy Technology.
Abstract
Review of Traffic Density Analysis Techniques
Ms. Avani.Joshi, Dr. Dhirendra Mishra
DOI: 10.17148/IJARCCE.2015.4748
Abstract: Congestion in traffic is a serious problem nowadays. From city roads to highways, a lot of traffic problems occur everywhere in today�s world. Bad traffic management leads to wastage of lot of man hours. These frequent traffic problems like traffic jams have lead to the rise of the need for an efficient traffic management method. Current traffic control techniques involving magnetic loop detectors buried inside the road, infra-red and radar sensors [2] on the side provide limited traffic information and require separate systems for traffic counting and for traffic surveillance. In contrast, video based systems offer many advantages compared t existing technologies [1][2][3]. There can be many reasons for bursty traffic like insufficient capacity, unrestrained demands, large red light delays etc. This paper summarizes a review on various methods for developing an intelligent traffic detection algorithm based on different research papers referred. It also shows a review on different methods under image processing for developing an intelligent traffic system. Various methods on this topic have been explored on this topic like, intelligent traffic controller using real time image processing[1]-[13], using DSP and NIOS II [20], using embedded system[16] [19]and using wireless sensor network [14][15]. Various authors use different techniques like detecting the subsequent numbers of vehicles detected from the video captured using the cameras installed at the lanes or using live feed from cameras at traffic junction for real time traffic density calculation using image and video processing or making use of wireless sensors to sense presence of traffic on roads. Comparison and survey of all these methods is shown in this paper which concluded that use of image processing makes analysis of traffic comparatively efficient. Reasons proving the same are discussed in paper below.
Keywords: Traffic density analysis, image and video processing, reduced traffic congestion, traffic management, digital image processing.
Abstract
Smart Surveillance System using Thing Speak and Raspberry Pi
R.Chandana, Dr.S.A.K.Jilani, Mr.S.Javeed Hussain
DOI: 10.17148/IJARCCE.2015.4749
Abstract: This paper proposes the Smart Surveillance System using Thing speak and Raspberry pi. This design is a small portable monitoring system for home and office security. The model uses hardware mechanism such as Raspberry pi (model B), Gyro sensor and Raspberry pi camera. This system will monitor when motion detected, the Raspberry Pi will control the Raspberry Pi camera to take a picture and sent out an alert email with the image to the user by using Wi-Fi adaptor according to the program written in python environment. And at the same time the sensor real time data is visualized in the form of charts in Thing speak. The proposed system will works in standalone mode without the requirement of PC once programmed.
Keywords: Raspberry pi, Gyro sensor, Raspberry pi camera, python, monitoring system, Thing speak.
Abstract
Influence of Supplementary Information on the Semantic Structure of Documents
Karthik Krishnamurthi, Vijayapal Reddy Panuganti, Vishnu Vardhan Bulusu
DOI: 10.17148/IJARCCE.2015.4750
Abstract: Latent Semantic Analysis (LSA) is a mathematical model that is used to capture the semantic structure of documents based on word correlations in them. In-spite of being completely independent of any external sources of semantics, LSA captures the semantic structure quite well. However, previous work in the literature show that including any supplementary information in LSA influences the model's ability to capture the semantic structure of documents. The work presented in this paper is to investigate how supplementary information influences the semantic structure of documents.
Keywords: Dimensionality Reduction, LSA, Semantic Structure, Supplementary Information, SVD.
Abstract
Estimation of Interference in Wi-Fi Networks
Prajakta D. Patil, M. M. Wankhade
DOI: 10.17148/IJARCCE.2015.4751
Abstract: The rapid proliferation of wireless devices has led to an increased usage of Wi-Fi. But at the same time, the issue of interference in highly loaded scenarios cannot be neglected. Interference is a major cause of degradation of capacity and thus performance in 802.11 wireless networks. The knowledge, of which links in the network interfere with one another, and to what extent, is important to improve, or even to estimate the performance of these networks. This paper presents a technique to estimate the interference in Wi-Fi networks with the help of hidden Markov model. Wireless traffic traces are captured through sniffer and analysed using a machine learning approach to conclude about the carrier-sense relationship between network nodes. To add to it, an estimation of deferral probabilities helps to understand the interference relationships. The effectiveness of the technique is evaluated using ns2 simulation which shows that this method expresses interference relations with the help of metrics such as probability of deferral, packet delivery ratio etc. in a better manner.
Keywords: 802.11 protocol, interference, hidden Markov model, carrier sense.
Abstract
Graph Partitioning for Image Segmentation using Isoperimetric Approach
Utkarsha. D. Kale, Prof. M. N. Thakare, Prof.G.D.Korde
DOI: 10.17148/IJARCCE.2015.4752
Abstract: Image segmentation play a crucial role in effective understanding of digital images. Past few decades saw hundred of research contribution in this field. Image segmentation is an important technology for image processing which aims at partitioning the image into different homogeneous regions or clusters. Graph cut is fast method performing a binary segmentation. Graph cuts proved to be a useful multidimensional optimization tool which can enforce piecewise smoothness while preserving relevant sharp discontinuities. This paper is mainly intended as an application of isoperimetric algorithm of graph theory for image segmentation and analysis of different parameters used in the algorithm like generating weights, regulates the execution, Connectivity Parameter, cutoff, number of recursions. The First which present a segmentation algorithm within a frame work which is independent of the feature used and enhance the correctness and stability with respect to parameter of different images. In this paper image segmentation using graph cut method which finds parameter psnr, RI, gce, voi.
Keywords: Graph cut method, isoperimetric approach, psnr, RI, gce, voi.
Abstract
Design of Asynchronous Viterbi Decoder using Hybrid Register Exchange Method for Low Power Applications
Pooja M. Chandel, Prof.M. N. Thakre, Prof.G. D. Korde
DOI: 10.17148/IJARCCE.2015.4753
Abstract: This paper describes the design of an asynchronous Viterbi decoder having a convolutional encoder with constraint length K=3 and a code rate �. Viterbi decoders are used to decode convolutional codes. Using Viterbi algorithm Viterbi decoder decodes a bit stream that has been encoded using convolutional encoder. The soft decision output is used for convolutional encoder. In this paper we have used Hybrid Register Exchange Method (HREM) which is the combination of Trace Back Method (TBM) and Register Exchange Method (REM) for decoding the bit stream. HREM is having an advantage over TBM and REM that it reduces the switching activity due to which power can be reduced. The choice of asynchronous design was predicted due to its power advantage. Asynchronous designs are inherently data driven and are active only when doing useful work, enabling considerable savings in power and better reliability. The main aim of proposed method is to reduce power consumption.
Keywords: Convolutional encoder, Viterbi Algorithm, Viterbi decoder, asynchronous Viterbi decoder, power consumption, hybrid register exchange method, soft output decision.
Abstract
An Enhanced Load Equilibrium Technique in Content Delivery Network
K.Supriya, S.Venu Gopal
DOI: 10.17148/IJARCCE.2015.4754
Abstract: Content Delivery Network is a distribution system of servers on the Internet that accelerates practical solution of Web applications like audio, video and other Internet-based content to users throughout the globe. The aim of CDN is to deliver content from website to people more quickly and efficiently, based on their geographic location from the nearest edge server. In this paper we are going to study on different policies which give challenging issues for executing an effective new distributed algorithm for load balancing in content delivery network. Beginning from such categorization of fluid flow model which describes about network of servers queue stability. And finally conceive a new theorem which is reformulated in time-discrete form. And Specify in real time sequence, lastly, the complete method is validate by simulation process.
Keywords: Reformulation, response time, continuous fluid model, control law balancing.
Abstract
Fault Detection and Isolation for ZVS Full Bridge Isolated Buck Converter Based on: Observer Design and Bayesian Network
Abbass H.Zein Eddine, Iyad Zaarour, Francois Guerin, Abbas Hijazi , Dimitri Lefebvre
DOI: 10.17148/IJARCCE.2015.4755
Abstract: Fault Detection and Isolation (FDI) is an important aspect in designing any electrical power system, particularly those with high power due to the high cost of failure. This paper presents an approach to detect and isolate open circuit faults in Zero Voltage Switching (ZVS) full bridge isolated Buck converters, used in Systems of Multiple Sources of Energy (SMSEs). The estimation of the state variables obtained with an observer are compared to measured state variables in order to generate residuals. The generated residuals are able to detect the faults but unable to isolated them. Consequently, a Bayesian Belief Network (BBN) learned from those residuals is designed in order to isolate the occurring fault. The proposed technique is able to detect the studied faults regardless of disturbance, and isolate the fault type with 99.7 % accuracy.
Keywords: Fault detection and isolation, DC/DC converter, Observer, Bayesian Belief Network.
Abstract
Spatial Fuzzy Clustering With Level Set Method for MRI Image
Pranali A.Tembhekar, Prof. M. N. Thakare, Prof. S. A. Dhande
DOI: 10.17148/IJARCCE.2015.4756
Abstract: Medical Image processing is one of the most challenging topics in research field. Magnetic Resonance Image (MRI) plays a major role in Medical diagnostics. This Paper Present the image segmentation, tumor detection, area calculation and stage of tumor. Fuzzy c means clustering is used for bias estimation and correction. SFCM (spatial fuzzy clustering) is proposed for image segmentation. Spatial fuzzy level set is proposed to clustering and tumor detection. The segmentation of brain MRI, tumor is detected and it�s identified exact location of tumor. After level set operations, tumors appear as pure white color on pure black backgrounds. The area of tumor calculates the white pixels in binary image.
Keywords: MRI, Bias estimation, SFCM, level set method, Brain tumour.
Abstract
Hybrid Model for Classification and Detection of Neurological Disorders
Prof. Pravin Kshirsagar, Dr. Sudhir G. Akojwar
DOI: 10.17148/IJARCCE.2015.4757
Abstract: The hybrid model designed in this paper is used to detect the neurological disorders like focal epilepsy brain death and various other EEG signals. In order to detect such signals the hybrid model consists of three major modules. The modules designed are for feature extraction of the signals, training and testing of the signals using ANN and the fuzzy logic model. Burg algorithm is used for feature extraction, BPNN is used for training and testing of the signals and sugeno fuzzy model is used for giving more pr�cised results.
Keywords: EEG signals, Burg algorithm, BPNN, Sugeno fuzzy model.
Abstract
Review on Super Resolution using Registration, Interpolation and Restoration
Kritika, Vedant Rastogi
DOI: 10.17148/IJARCCE.2015.4758
Abstract: In the paper the most efficient and basic model to implement super resolution is shown. The basic model is a three step process of image registration, interpolation and noise filtering. All the process is explained and simulation result is presented to prove the theory.
Keywords: Low Resolution, High resolution, Super resolution, Registration, Interpolation, Restoration.
Abstract
To Propose a Novel Technique to Overcome Fault Tolerance in DCS during Node Mobility
Prabhjot Kaur, Shashi Bhushan, Karan Mahajan
DOI: 10.17148/IJARCCE.2015.4759
Abstract: Distributed systems play an important role on achieving good performance and high system utilization. The goal of a job scheduling system is to efficiently manage the distributed computing power of workstations, servers, and supercomputers in order to maximize job throughput and system utilization. There are many issues of distributed computing system which are discussed in this paper in brief. The main aim of the paper is to focus on fault tolerance and recover fault with less processing time. The proposed algorithm is assign tasks to other nodes only when master node moves from its original position using weights.
Keywords: Computing, master node time, e-cost, profit.
Abstract
A Study on Market Basket Analysis using Data-set Condensing and Intersection Pruning
Mr.Murlidher Mourya, Mr. J. Phani Prasad
DOI: 10.17148/IJARCCE.2015.4760
Abstract: Mining of frequent item sets is one of the most fundamental problems in data mining applications. A typical example is Market Basket analysis. In this method or approach it examines the buying habits of the customers by identifying the frequent items purchased by the customers in their baskets. This helps to increase in the sales of a particular product. This paper mainly focuses on the study of the existing data mining algorithm for Market Basket data. DCIP algorithm uses data-set condensing and intersection pruning to find the maximal frequent item set. The condensing process is performed by deleting items in infrequent 1-itemset and merging duplicate transactions repeatedly; the pruning process is performed by generating intersections of transactions and deleting unneeded subsets recursively. This algorithm differs from all classical maximal frequent item set discovering algorithms; experiments show that this algorithm is valid with moderate efficiency; it is also easy to code for use in KDD applications.
Keywords: Association Rule Mining, Market Basket Analysis, Mining frequent item sets, intersection pruning, and data-set condensing.
Abstract
Anamobilitics- Analysis of Mobile Data to Understand User Sentiments
Upasna Suman, Raunak Kasera, Sneha Madgunda
DOI: 10.17148/IJARCCE.2015.4761
Abstract: In this paper, we describe the importance and method of analysing mobile data from enterprise point of view. We use the term �Anamobilitics� for our research, which means Analysis of mobile data. Today, most businesses are moving towards using mobile platforms for various tasks. The success of a mobile application relies largely on getting the user feedback and taking corrective steps to improve an application in accordance with this feedback. It is found that users usually do not provide any manual feedback even if they don�t like something about the application, rather they move on and use other applications available in the market. By analyzing the usage pattern, the developer of the application can capture the sentiments of the user and improve his application. In this paper we will explain the procedure to capture user feedback and the parameters that can be analyzed to get the user sentiments successfully.
Keywords: Anamobilitics, mobile data analysis, user sentiment analysis, mobile usage.
Abstract
Real Time System Scheduling Algorithms & Fault Tolerance
Charu Rani, Mrs. Manju Godara
DOI: 10.17148/IJARCCE.2015.4762
Abstract: The main objective of this paper is to implement the real time scheduling algorithms and to minimize the average waiting time so that given set of tasks may be completed in a minimal time with an efficient output. We will also discuss the advantages and disadvantages of the same. Task within the real time system are designed to accomplish certain service(s) upon execution, and thus, each task has a particular significance to overall functionality of the system. Scheduling algorithms in non real time system not considering any type of dead line but in real time system deadline is main criteria for scheduling the task.
Keywords: CPU Scheduling, FCFS, Non Preemptive, Preemptive, Round Robin, Round Robin with SRTF, SJF.
Abstract
A Roadmap to Design and Analysis of Wearable ECG Monitoring System
R. Geethika, Manjunath A E
DOI: 10.17148/IJARCCE.2015.4763
Abstract: ECG (Electrocardiogram) recognition and monitor are the only way to trace and determine heart Diseases. ECG monitors with features such as portable, wireless, user friendly, low-cost and convenient at home, are necessary . This paper�s aim is to investigate wireless Body area network co- operation for human movement tracking and ECG measurements, which are believed to provide patients with easy healthcare for continuous health-monitoring. In addition, taking periodic medical readings at home or in the office will aid physicians to periodically supervise the patient�s medical status without having to see the patient. The collected measurement data will be processed using specially designed software, which will help sending a medical record of the patient to an electronic device in the acquisition of the physician. Palm, mobile phone and PC could be acting as display and relay terminals, through which ECG signals would be transmitted to data center which is in the hospital through network.
Keywords: Wearable ECG, Signal Averaging, Baseline Drift, Matched Filtering.
Abstract
A Survey on Wearable ECG Monitoring System using Wireless Transmission of Data
Meda Sai Kheerthana, Manjunath A.E
DOI: 10.17148/IJARCCE.2015.4764
Abstract: Wearable electrocardiograph (ECG) monitoring systems today use electrodes that require skin preparation in advance, and require pastes or gels to make electrical contact to the skin [2]. To avoid these pastes or gels we use sensors. The developed acquisition system is used for remote monitoring of patients� heart rate. This system allows the physician able to understand patient's scenario on the monitor by wireless module. Here low cost, low power consumption and flexible network topology Zig Bee wireless module is used to sense the remote patient data. All sensor data are transferred within a group of Zig Bee wireless module [2].
Keywords: Wearable ECG, Zig Bee, Photodiode, Heart rate, Wireless transmission.
Abstract
Broadcasting in ZigBee Network
Suman Lata
DOI: 10.17148/IJARCCE.2015.4765
Abstract: This paper studies broadcast in ZigBee Network efficiently and simple way. In ZigBee Network, ZigBee Alliance specifies ZigBee specification and used with IEEE 802.15.4 Standard. ZigBee specification is used for network and application layers and IEEE 802.15.4 Standard is used for physical layer and MAC (Medium Access Control) layer.Since in general ad hoc networks,find minimum number ofthe rebroadcast nodes is NP-hard, which employs current broadcast protocols either employ extra knowledge such as information of 2-hop neighbor or position. However, the ZigBee network is mainly characterized as low cost, low data rate and low power consumption. ZigBee network cannot give information of 2-hop neighbor or position, but it needs an efficient broadcast algorithmto reduce the rebroadcast nodes with limited storage space and computation complexity. In this paper, Self-Pruning and Forward Node Selection algorithm is studied and usedfor exploiting the space of hierarchical address in ZigBee networks. Inthese algorithms, only information of 1-hop neighbor is required and without exchanges any messages between neighboring nodes, 2-hopneighbors�s partial list is derived. The ZigBee Forward Node Selection algorithm is also studied in this paper. This algorithm is used for finding the minimum rebroadcast nodes with memory space and polynomial computation time.
Keywords: WPAN (Wireless Personal Area Network), PHY (Physical Layer), MAC (Medium Access Control), FFD (Full Function Devices), RFD (Reduced Function Devices), CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance).
Abstract
An Enhanced Technique to Predict the Accuracy of Soil Fertility in Agricultural Mining
Dr.S.Hari Ganesh, Mrs. Jayasudha
DOI: 10.17148/IJARCCE.2015.4766
Abstract: The techniques of data mining are extremely popular in the area of agriculture. Today, data processing is employed in a very large areas and plenty of ready-to-wear data processing system product and domain specific data processing application software�s are obtainable, however data processing in agricultural soil knowledge sets may be a comparatively a young analysis field. In this paper we offer internet base answer for the soil testing laboratories yet as free messages for the farmer that contains data like soil testing code, chemical that is important for the crop and additionally the knowledgeable recommendation. Additionally farmers specify there next crop whereas they furnish their sample to scantiest therefore in keeping with next crop the chemical can recommend. The result's supported the classification of contains that should be gif tin soil and in keeping with result report are generated.
Keywords: Data Mining, Soil Testing, classification.
Abstract
FPGA Implementation of Image Denoising using Adaptive Wavelet Thresholding
Ms. Chipy Ashok , Ms. Anu V.S
DOI: 10.17148/IJARCCE.2015.4767
Abstract: Visual information transmitted in the form of digital images is becoming a major method of communication in the modern age. But the main drawback in digital images is the inheritance of noise while their acquisition or transmission. Several noise removal algorithms have been proposed till date. One of the most powerful and perspective approaches in this area is image denoising using discrete wavelet transform (DWT). As the number of levels increased, Peak Signal to Noise Ratio (PSNR) of the image gets decreased, whereas and Mean Square Error (MSE) gets increased. The NeighShrink, BayesShrink, and VisuShrink are important methods to remove the noise from a corrupted image. These methods, however cannot recover the original image significantly since the threshold value does not minimize the noisy wavelet coefficients across scales and thus they do not give good quality of image. The adaptive denoising provides an adaptive way of setting up minimum threshold by shrinking the wavelet coefficients. This method retains the original image information efficiently by removing noise and it has the image quality parameters such as peak-to-signal noise ratio (PSNR). This thesis proposes a hardware implementation of adaptive thresholding algorithm using FPGA, which can reduce processing time considerably. The decomposition algorithm of discrete wavelet transform s designed and planned to simulate with the Hardware Description Language VHDL.
Keywords: Image denoising, discrete wavelet transform, adaptive thresholding, FPGA.
Abstract
BCI and Audio Responce Approach for Improved Emotional State Classification
Priyanka A.Wandile, Dr.Narendra Bawane, Mr.Pratik Hajare
DOI: 10.17148/IJARCCE.2015.4768
Abstract: This paper reports on the human emotion recon- ignition using different set of electroencephalogram (EEG) channels using discrete wavelet transform. Emotion recognition could be done from the text, speech, and facial. In the past few days, many studies have been done on emotion recognition. Anderson utilized facial expressions to recognize emotion. However, these signals shared the same disadvantage. They are not reliable or perfection is not there to detect emotion, especially when people want to conceal their feelings. In this paper, The EEG-based emotion recognition algorithm based on spectral features and neural network classifiers is proposed. In this algorithm, spectral, spatial and temporal features are selected from the emotion-related EEG signals by applying wavelet transform. We concentrate on recognition of �inner� emotions from electroencephalogram (EEG) signals as humans could control their facial expressions or vocal intonation. We observe the different brain position as Left Hemisphere and Right Hemisphere to recognize the significance according to different moods. The powers of alpha are more alert during National, Happy, Romantic mood as compared to Sad mood. We have used wavelet function for deriving a set of conventional and modified energy based features from the EEG signals for classifying emotions.
Keywords: EEG, Human Emotion, Discrete Wavelet Transform, Speech.
Abstract
Performance and Comparative Study of Functionality Testing Tools: Win Runner and QTP in IT World
R. Beulah, Dr. M. Soranamageswari
DOI: 10.17148/IJARCCE.2015.4769
Abstract: Software testing is the process of identifying defects in any software projects. It presents a means to decrease errors, cut maintenance and overall software expenses. Main goal of software testing is to meet the customer requirements and deliver the quality of software projects. It divides two ways are manual testing and automation testing. The main purpose of this paper is to conduct a study and comparison of automation tools (Win Runner and QTP) in IT world. There is wide variety of software testing tools in the software market. Major software testing tools are Functional Testing, Test management, performance testing, and web testing and so on.
Keywords: Test management, Manual Testing, Automation Testing, Functional Testing, Performance Testing, Web Testing.
Abstract
Secure Color Image Transmission in a Downlink DAS Group Cell Scheme based MIMO OFDMA Wireless Communication System
Sohag Sarker, Shaikh Enayet Ullah
DOI: 10.17148/IJARCCE.2015.4770
Abstract: In this paper, we have made a comprehensive BER simulation study to evaluate the performance of Downlink DAS Group Cell scheme based MIMO OFDMA Wireless Communication System on secure color image transmission. The 4-by-4 multi antenna supported simulated system incorporates various signal detection techniques such as Minimum mean square error (MMSE) , Zero-Forcing (ZF), Zero-Forcing successive interference cancellation(ZF-SIC) Minimum mean square error successive interference cancellation(MMSE-SIC) and digital modulation schemes( QPSK, QAM and 16PSK and 16QAM) and Turbo channel coding for forward error correction. From MATLAB based study, it has been explored that the applicability of MMSE signal detection technique with QAM digital modulation in the presently considered Turbo encoded simulated system is very much effective and robust in retrieving transmitted color image.
Keywords: MIMO, OFDMA, BER, DAS, Group Cell, MMSE, MMSE-SIC, ZF, and ZF-SIC.
Abstract
Implementing Adaboost and Enhanced Adaboost Algorithm in Web Mining
Er.Ramanpreet Kaur, Dr. Vinay Chopra
DOI: 10.17148/IJARCCE.2015.4771
Abstract: The recent explosive growth of the measure of content on the Internet has made it progressively troublesome for clients to discover and use information and content providers find it difficult to classify and catalog documents. It gets highly tedious for users to browse with traditional web search engines as they often return hundreds or a great many results for a search. On-line libraries, web search engines, and other large document repositories (e.g. customer support databases, product specification databases, press release archives, news story archives, etc.) are growing so quickly that it is troublesome and exorbitant to classify each record physically. Keeping in mind the end goal to manage these issues, analysts look toward automated methods of working with web documents so they can be all the more effectively browsed, sorted out, and indexed with negligible human intervention. This paper throws light on the web mining concept and its techniques, explains the data mining process in addition to introducing the classification Adaboost Algorithm. The paper takes a step ahead in this direction and proposes an enhanced Adaboost Algorithm. Both the algorithms have been simulated and their results have been compared in terms of accuracy rate. The results show that Enhanced version shows better performance and accuracy than the AdaBoost Algorithm.
Keywords: Web data mining, information retrieval, Web usage mining, Pre-processing, Pattern Analysis, Content Mining; Structure Mining, Classification.
Abstract
Design of Thruster Driver Module using Synchronous Design Technique in VHDL
Priyanka P Desai, Deepa Pramod, Dushyanth N D
DOI: 10.17148/IJARCCE.2015.4772
Abstract: A thruster is a propulsive device or an actuator used in the spacecraft. The primary function of the thrusters is to control the attitude and orbit of the satellite. This paper presents the design of thruster driver module using synchronous design technique in VHDL. A 1 MHz common clock is used to synchronize the design interfaces of the thruster driver module. By implementing this new synchronous design technique, all the signals are synchronized and sampled at a well-defined clock interval. The simulation results show, the synchronous design technique implemented is more reliable, efficient and can be best used for testing when compared to the existing asynchronous method. The synthesis results show the number of core cells is being reduced, thus minimizing the area when compared to the existing asynchronous design.
Keywords: Thruster Driver Module, Synchronous Design, Common Clock, Interface Designs, Trigger Pulses.
Abstract
Truthful Detection of Packet Dropping Attack in MANET
Noble George, Sujitha M
DOI: 10.17148/IJARCCE.2015.4773
Abstract: Mobility and portable nature of Mobile Ad hoc Networks (MANET) has increased its popularity by two fold. MANETs have become a commonly used network for various applications. But this advantage suffers with serious security concerns, mainly a wireless transmission medium perspective where such networks may be subject to packet dropping. Mobility and portable nature of Mobile Ad hoc Network may also lead to link failure. During packet forward, valuable packets may be dropped by malicious nodes present in the network. Link error and malicious packet dropping are the two sources for packet losses in MANET. A node can act maliciously and could harm the packet sending process. Ad hoc on demand distance vector (AODV) is a popular routing protocol but is exposed to well-known packet dropping attack. Proposed system introduces a new protocol named secured Ad hoc on demand distance vector (SAODV), which can truthfully detect packet dropping attack in MANET. SAODV can detect malicious nodes by identifying dropping of routing and data packet. Packet dropping due to both link error and presence of malicious nodes can detect by SAODV. It also provides importance to preserve privacy of data.
Keywords: MANETs, malicious nodes, link error, packet dropping.
Abstract
Mobility Assisted Wireless Energy Replenishment and Data Gathering in Wireless Rechargeable Sensor Networks
R.Kavitha, R.Karthika, K.Muthu Gowri
DOI: 10.17148/IJARCCE.2015.4774
Abstract: Wireless Sensor Networks (WSNs) are mainly powered by batteries. Due to limited energy storage capacity of a sensor battery, WSNs can usually remain operational only for a limited amount of time. To overcome this drawback joint mobile energy replenishment and data gathering is introduced. In the existing joint mobile energy replenishment and data gathering (JMRDG) static sink is used, SenCar after the completing the charging and data gathering of whole network it will to moved to forward the data to the static sink this will introduces delay in sink receiving the data. To overcome this drawback, we proposed a methodology against static sink. In the proposed method, sensor network is divided in to four sub areas. Each sub area has a SenCar to recharge each sensor node and also collect the data from that. At first SenCar identifies which node is in the urgent energy supplement then it will moved to charge that node at the same time it will collects the data from that particular node and moved to next node which needs the energy replenishment in the network so on. Finally all the nodes in the network are charged by SenCar means mobile sink collects the data from SenCars in each sub area. When we use mobile sink to gather the data from the SenCars data gathering delay is reduced. And also simulation result shows that energy dissipation, data loss and latency is less due to this proposed scheme.
Keywords: WSN, Mobile Sink, SenCar, Mobile Relays, Data Gathering, JMERDG and Delay.
Abstract
Power Optimization Using Proposed Dijkstra’s Algorithm in Wireless Sensor Networks
Pankaj Chauhan, Arvind Negi, Tarun Kumar
DOI: 10.17148/IJARCCE.2015.4775
Abstract: WSN refers to a group of spatially spread and dedicated sensors for watching and recording the physical conditions of the surroundings and organizing the collected information at a central location. Wireless device Networks (WSNs) give a brand new paradigm for sensing and scattering info from varied environments, with the potential to serve several and numerous applications. Current WSNs usually communicate directly with a centralized controller or satellite. On the opposite hand, a sensible WSN consists of various sensors spread across a geographical area; every sensor has wireless communication capability and su?cient intelligence for signal process and networking of the information. The structure of WSNs area unit tightly application-dependent and lots of services are smitten by application linguistics (e.g. application-speci?c processing combined with information routing). Thus, there's no single typical WSN application, and dependency on applications is over in ancient distributed applications. Therefore, besides the well explored power management techniques on the transceiver activity and wireless transmission, there's a necessity to instigate additionally the ability management on the sensing unit that reduces the power consumption of the power-hungry sensors. In this paper, we provide a proposed method for power optimization in WSN. In the proposed method, we are using Dijkstra�s algorithm to reduce the power consumption and finding the shortest power consumed path between Source to Destination using minimum number no nodes.
Keywords: WSN, power optimization, power hungry sensors, distributed sensing, power optimization methods.
Abstract
A Performance Analysis of Various Non Local Techniques to Denoise SAR Images
Mamatha K. R., Saurabh Shahi, Shilpi Poddar, Saranya P
DOI: 10.17148/IJARCCE.2015.4776
Abstract: To study surface targets, advances involving acquisition of synthetic aperture radar (SAR) images is important. This system is independent of sunlight and climate factors, but the images are contaminated with a multiplicative noise called speckle. It is due to the signal interference with the elements on the surface, and it gives a granulated aspect to the image that complicates its analysis and interpretation. Recently, non-local approaches have proved very powerful for image de noising. Unlike local filters, the nonlocal (NL) means decreases the noise while preserving resolution. De speckling techniques based on the nonlocal approach provide an excellent performance, but also exhibit a remarkable complexity, unsuitable for time-critical applications. This paper discusses the various techniques used to de speckle SAR images using non local
Keywords: Synthetic Aperture Radar (SAR), non local (NL) means, de speckling, Block matching 3D.
Abstract
Localization Range Improvement in Wireless Sensor Network using Genetic Algorithm
Anuj Kumar, Arvind Negi, Sumit Chaudhary, Anchit Bijalwan
DOI: 10.17148/IJARCCE.2015.4777
Abstract: Wireless sensor network is numerous exercises utilized as a part of our society, so they have turn into the epic technology. Numerous utilization of wireless sensor network is requires the area of a sensor system. Node localization is usually utilized in wireless network. It is used to enhance routing what's more, upgrade security. Localization algorithms can be distributed as rang-free or rang-based. Rang-based algorithms use area measurements. Range-based algorithms use location metrics such as ToA, TDoA, RSS, and AoA to estimate the distance between two nodes. In this paper, Authors proposed a new range-based algorithm which is based on the Genetic Algorithm. A Genetic Algorithm for wireless sensor network limitation is proposed to tackle the issue that the situating precision is low with least grapple hubs or nodes. Thus in this paper authors are displaying a Genetic Algorithm for advancement approach which tries to locate the ideal area by fulfilling both the criteria or techniques (TOA, AOA) with minimal error.
Keywords: WSN, AOA, TOA, TDOA, RSSI.
Abstract
Secrecy Rate Maximization under Improved Relay Selection with Different Coding Schemes for Cooperative Wireless Network
Akanksha Rai, Mrs. Rupali Phatak
DOI: 10.17148/IJARCCE.2015.4778
No abstract available.
Abstract
Warehouse Automation Using Drones
Deepak
DOI: 10.17148/IJARCCE.2015.4779
Abstract: Indoor Warehouse automation is one area which is being talked about among the top e-commerce giants mainly in order to meet the on-time delivery requirement. Amazon�s KIVA [1] robot may sound promising at first but it fails, primarily due to its limitation of being restricted to ground motion. The system presented in this paper is targeted to solve this problem by using drones to do the task. The motivation behind this is to increase the reach of the inventory and also automate the process of inventory in a more dynamic way.
Keywords: SLAM (Simultaneous Localization and Mapping), PTAM (parallel tracking and monitoring), Autonomous Navigation, Object tracking and Object Detection.
Abstract
Efficient Mobile SinkTrail Data Reporting Protocol for Wireless Sensor Networks
Sindhu.A.N, Divyashree.B.A
DOI: 10.17148/IJARCCE.2015.4780
Abstract: In wireless sensor networks, data gathering using mobile sink, has drawn significant amount of interests in recent years. To achieve this, some of the approaches focus on scheduling the mobile sink�s moving path in advance or focus on gathering little amount of data in the network. In certain cases when the mobile sink moving trajectory cannot be planned in advance, in order to avoid the traffic in updating sink locations, an energy efficient data reporting protocol is designed. This protocol is called as SinkTrail and is mainly used for collecting the data using multiple mobile sinks. SinkTrail protocol constructs a logical coordinate system without using GPS devices. SinkTrail-S protocol is designed which is an improved version of SinkTrail protocol, reduces the energy consumption and eliminates the unnecessary control messages in the network. Mobile sinks are positioned at certain node locations so that the route length in transmitting the data packets would be reduced and reduces the total energy consumption.
Keywords: Wireless sensor networks, mobile sinks, logical coordinate system, data reporting.
Abstract
An Energy Efficient and QoS Aware Routing Protocol for Wireless Sensor Network
Kalyani Khanke, Mamta Sarde
DOI: 10.17148/IJARCCE.2015.4781
Abstract: A wireless sensor network (WSN) is a collection of nodes organized into a cooperative network, which are small energy constrained devices The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In WSN, sensors near the static sink have to relay the data of the nodes away from the sink and as a result they drain their energy very quickly. It result in network partitioning and can significantly limit the network lifetime, problem is termed as hotspot problem. So designing efficient routing for reducing energy consumption is the important factor. Recently, mobile sink approach has been used to address the hotspot problem but it increase end to end delay which is not acceptable for delay sensitive application. In this paper, to solve the above problem the consumption of energy during the transmission of data from sensor nodes to the sink has been calculated. Routing protocols in WSNs along with the most energy efficient protocol named LEACH ( low energy adaptive clustering hierarchy) and AODV protocol is used. the proposed protocol incurs less end to end delay and is energy efficient. Intensive Simulations are carried out to evaluate the performance of the proposed strategy.
Keywords: Wireless sensor network, clustering, energy efficiency, data gathering, mobile sink, static sink, LEACH, Shortest path routing.
Abstract
Research Paper on Fuzzy Based Selection of Wavelets for Image Steganography
Manika Bhatt
DOI: 10.17148/IJARCCE.2015.4782
Abstract: Steganography refers to the practice of hiding secret messages in communications over a public channel so that an eavesdropper (who listens to all communications) cannot even tell that a secret messages are being sent. We give a precise model of a communication channel and a rigorous definition of steganographic security and prove that relative to a channel oraclesecure steganography exists if and only if one way exist function. We are given tightly matching upper and lower bounds on the maximum rate of any secure stego system. We introduce the concept of steganographic key exchange and public-key steganographyand show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We extend the concept of steganography as covert communication to include the more general concept of covert computation.
Keywords: Discrete Cosine Transformation, Graphics Interchange Format, Joint Photographic Experts Group.
Abstract
Object Tracking in Simulink using Extended Kalman Filter
Nivedita, Pooja Chawla
DOI: 10.17148/IJARCCE.2015.4783
Abstract: Moving object tracking has been widely used in various areas such as intelligent transportation system, video surveillance applications and airport security system and so on.In this paper, we are explaining an example of how to implement an Extended Kalman filter in Simulink. The problem of tracking flying objects is implemented using Extended Kalman Filter. Simulink is an environment for simulation and model-based design for dynamic and embedded systems. Extended Kalman Filter is the nonlinear version of Kalman Filter.
Keywords: Kalman filter, LQE, EKF, Simulink.
Abstract
Elementary Matrix Operation Based Satellite Image Encryption
M.Sithi Benazir, Dr.A.Padmapriya M.C.A., M.Phil., Ph.D
DOI: 10.17148/IJARCCE.2015.4784
Abstract: Images are one of the prominent techniques to transfer the data between the sender and the receiver. Most of the information is transmitted in electronic form which needs more security. Cryptography is the art and science of transmitting the data to the receiver in unclear meaningless format. In order to ensure the information security, image encryption technology has aroused much interest in both research and application fields. Cryptography is the discipline of codes to encrypt data into an unreadable format that only the targeted recipient can decrypt and read. Encryption is a common technique to protect image security privacy. Matrix operations are widely used in many cryptography algorithms to solve the difficulty in means of speed and time. This paper embrace a new encryption method for satellite based images which are combined of versatile composition. The encryption for the satellite images in this paper consists of the division of image into matrix and then, the elementary row and column operations are considered. The results show enhanced performance in a variety of parameters. The grouping of basic matrix form and elementary row operations yields good results and better image encryption methods compared to existing works.
Keywords: Satellite image, Image Encryption, Matrix form, Elementary Row Operations, Elementary Column Operation.
Abstract
A New Multi-Panel Cartoon based CAPTCHA as Graphical Passwords
B.Santhosh Poornima, Dr.A.Padmapriya M.C.A., M.Phil, Ph.D
DOI: 10.17148/IJARCCE.2015.4785
Abstract: Completely Automated Public Turning Test to tell Computers and Humans Apart (CAPTCHA) is essentially used to prevent some kind of malicious programs from accessing the web resource automatically. In modern era web services is an essential business tool in e-commerce. The emergence of intelligent, complicated attacks similar to DoS (Denial of Service) attack formulates web services still vulnerable. To moderate this attack, CAPTCHA is used as one of the most standard security technology. It is from uncomplicated ones, like typing the imprecise text also with differentiate an object in an image. In web security there is various kind of Captcha has been used to the purpose of security, such as text based Captcha, image supported Captcha, and audio oriented Captcha and video related captcha. This proposed paper indicates a novel online security scheme which is constructed with panel cartoons. Captcha is done with the turing test. Captcha as graphical passwords (CaRP) are incorporated and it generates a new family of cartoon based graphical password which is based on Jigsaw puzzle. The method proposed in this paper allows accessing the web services faster as well as in secured manner. The experimental results shows, the performance analysis in terms of security considerations by the combination of Captcha and graphical password scheme compared to existing methods.
Keywords: Satellite image, Image Encryption, Matrix form, Elementary Row Operations, Elementary Column Operation.
Abstract
Implementation of Multi-Biometric Cryptosystem for Information Security using Elliptic Curve Cryptography
Bharti Kashyap, K. J. Satao
DOI: 10.17148/IJARCCE.2015.4786
Abstract: In current times, generation of cryptographic key from biometrics is more popular due to its enhanced security level. In this paper a method is proposed to generate unique keys for encryption and decryption of secret messages from biometric images. The keys are directly derived from the images and the captured images are not stored anywhere. Fusion of two or more biometric images increases security more as compared to single biometric feature. In this system, Elliptic Curve Cryptography algorithm is used as the cryptosystem and integrated with multi-biometric system for providing authentication in a secured way. Implementation of proposed system involves fusion of multi-biometric images, generation of Elliptic curve cryptographic parameters from that fused Image and generation of curve from generated parameters.
Keywords: Cryptographic key, Biometric, Elliptic Curve Cryptography, Multi-biometric, Elliptic curve parameters.
Abstract
Banking Security System Using PSoC
Vaijanath R. Shintre, Mukesh D. Patil
DOI: 10.17148/IJARCCE.2015.4787
Abstract: Automation is the need of Twenty first century. New technology innovations give the better solutions to our everyday life. Banking system is one of the important social systems. So it needs more advanced security system. Programmable System on Chip is one of the advanced technological innovations. This technology is used here for implementation. Two phase detection algorithm is developed for implementation. Motion detection sensor will detect an unwanted motion in bank locker room. IR proximity sensor will detect further motion and differ it to the human motion or robotic motion. This will come in second phase detection. PSoC chip will detect this input signals and according to that it will send message via GSM module to the respective person. Other system activations also will take place such as door locking system, poisonous gas release mechanism etc. We can implement such kind of output via relay module. This system is tested with output as buzzer and GSM message and found working properly.
Keywords: PSoC, IR Proximity, GSM, Two phase detection.
Abstract
Review Paper on Resource Utilization and Performance Optimization of CPU using Virtualization
Sohanpreet Singh, Monica Goyal
DOI: 10.17148/IJARCCE.2015.4788
Abstract: System resources utilization is depending on the workload of the application and pattern of some workloads may be suited for hosting on virtual platform. In this study, we are comparing how different workloads perform on CPU and resources utilization using some virtualization application with different operating system. Performance testing plays an important role in CPU resources utilization. These works gives revelation to the users for proper consumption of resources and minimize the power cost using virtualization and help to maintaining the performance of the System by utilizing the maximum resources.
Keywords: Virtual box, PXE, USB, Operating System, Virtualization.
Abstract
Text Mining Approach to Classify Technical Research Documents using Naïve Bayes
Mahesh Kini M, Saroja Devi H, Prashant G Desai, Niranjan Chiplunkar
DOI: 10.17148/IJARCCE.2015.4789
Abstract: World Wide Web is the store house of abundant information available in various electronic forms. Since past few years, the increase in the performance of computers in handling large quantity of text data has led researchers to focus on reliable and optimal retrieval of visible and implied information that exist in the huge resources. In text mining, one of the challenging and growing importance�s is given to the task of document classification or text characterization. In this process, reliable text extraction, robust methodologies and efficient algorithms such as Naive Bayes and other made the task of document classification to perform consistently well. Classifying text documents using Bayesian classifiers are among the most successful known algorithms for machine learning. This paper describes implementations of Na�ve Bayesian (NB) approach for the automatic classification of Documents restricted to Technical Research documents based on their text contents and its results analysis. We also discuss a comparative analysis of Weighted Bayesian classifier approach with the Naive Bayes classifier.
Keywords: Classification; Naive Bayes; Weighted Bayesian.
Abstract
A Survey of Wireless Sensor Network Security
Mr. Prasad Mahajan, Miss Priyanka Bhute
DOI: 10.17148/IJARCCE.2015.4790
Abstract: The appearance of sensor network as one of the presiding technology in the coming decades has given numerous unique challenges to researchers. These sensor networks consist of large set of homogenous nodes which have limited computed resources. A lot of real world applications on sensor network have been proposed in research literatures. When sensor networks deploy in a unintended or hostile environment, security issues becomes a central concern, as they are prone to different types of malicious attacks. In this paper we present the survey of security issues, attacks with countermeasures in wireless sensor network (WSN). Conclusion and future scope of the work has also been outlined.
Keywords: Wireless Sensor Networks, Security, Threats, Attacks.
Abstract
Design of Prototype model for Vehicle to Vehicle Secure Formatted Communication
Rakhee G Doijad, Prof.P.A Kamble
DOI: 10.17148/IJARCCE.2015.4791
Abstract: Vehicular Ad-Hoc Network or VANET is a form of mobile ad hoc network, to provide communications among neighboring vehicles and between vehicles and nearest fixed equipment, usually described as roadside equipment. Vehicular ad hoc networks (VANETs) are being developed to offer on-demand wireless communication infrastructure among vehicles and authorities. Vehicles will be consists of sensors and communication devices which will allow to cooperate with each other. Such an infrastructure is expected to deliver multiple road safety and driving assistance applications. VANET is gaining much attention in recent times because of its many important applications in transport, to improve road safety, reduce traffic congestion; to enable efficient traffic management etc.According to requirement vehicle can transmit or exchange information. Vehicles can interchange different type of information as per requests on demand for specified application. It is essential to have some standard protocols for communications between vehicles to vehicles. Hence we are proposing system which will determine the implementation of Vehicle to Vehicle communication along with considered modes of communication like control, informational and alert messages. Expected outcome of the proposed system will be to develop a prototype vehicle models which will communicate with each other using wireless technology and react upon with defined action on specific type of message from sender vehicle.
Keywords: Vehicular ad hoc networks (VANETs), control and warning messages, and prototype vehicle models.
Abstract
The Big Data Recovery System for Hadoop Cluster
V. S. Karwande, Dr. S. S. Lomte, R. A. Auti
DOI: 10.17148/IJARCCE.2015.4792
Abstract: Due to brisk growth of Data Storage in Many internet Service Companies, there is always issue of regarding unstructured data storage which is generated in Terabytes [TB] and Peta bytes [PB]. Hadoop is always deal with the large amount of data Volume. Therefore increase reliability and availability should be maintained. To gain the high availability characteristic of the Hadoop and to improve failure Recovery as early as possible or failure should be avoided. The failure of the HDFS, Name node and Master Node affects the performance of the Hadoop cluster. To overcome this problem, we proposed a system which will select new recovery namenode with less amount of time which will replicate data from namenode. In this paper, we analyze behaviour of the namenode with respect to its failure and recovery from failure.
Keywords: Cloud Computing, Fault Tolerance, Hadoop, HDFS, Recovery.
Abstract
An Overview of Cloud Computing
Amritpal Singh
DOI: 10.17148/IJARCCE.2015.4793
Abstract: Cloud computing approach has revolutionized the way we access different computing resources over the Internet Cloud computing model has different characteristic features like broad network access, on demand service, resource pooling etc. Utilizing cloud computing paradigm cost of owning and managing computer hardware and resources is reduced cloud computing encompasses different service models like Iaas, PaaS, SaaS and it can be deployed using private, public and hybrid cloud approach. In this paper we will provide an overview of cloud computing technique, its benefits, challenges and future scope.
Keywords: Cloud computing, SaaS, PaaS, IaaS, service models.
Abstract
A Survey – Comparative Study on Intrusion Detection System
Vinutha H.P, Dr.Poornima B
DOI: 10.17148/IJARCCE.2015.4794
Abstract: This paper presents a survey on intrusion detection system. As the tremendous growth and usage of internet is increased the number of intruders and hackers have increased. Therefore the security on the network becomes the major issue. To overcome this many intrusion detection approaches are used. Intrusion detection gives the confidentiality, integrity and security of a resource. Data mining is the one of technology applied to intrusion detection to detect the network attacks, to reduce the complexities and to get normal behavioral pattern.
Keywords: Intrusion Detection System, Data set, Data Mining Algorithms, Classification.
Abstract
Study of Effect of Modified Feature Selection Method and Re-Occurrences of features on Performance of Multi-Label Associative Classifier
Prof. Mrs. P. A. Bailke, Ms. Shweta Kambare, Prof. Dr. S. T. Patil
DOI: 10.17148/IJARCCE.2015.4795
Abstract: In this paper, the effect of modified feature selection method and re-occurrences of features on performance of multi-label associative classifier is studied. In the proposed approach, important words (keywords) from each document in the training dataset are selected by using two methods. One is to select words having mutual Information (MI) value greater than given threshold as keywords and second is to select a limited number of words from a document having maximum values of MI as keywords. The method to select keywords is decided by comparing the maximum MI value of word from a document with limit value. If the maximum MI value is greater than limit value then first method is used for keyword selection, otherwise second method is used for keyword selection. This method ensures that keywords are selected from each and every document and unnecessary keywords are avoided. Association rules are generated by using the extracted keywords. Re-occurrences of features i.e. keywords are considered while calculation of supports of rules. In the proposed approach, multiple minimum support threshold method is used for rule pruning to handle the rare class problem. The classifier assigns multiple labels for a single document. If no label is found for a document from the generated rules, then the class label with highest support in the dataset is assigned to the document. The classifier built by using the proposed approach provides good accuracy as compared to traditional associative classifiers.
Keywords: Multi-label associative classifier, text classification, multiple minimum support thresholds, mutual information, association rules.
Abstract
A Survey on an Intelligent System for Unwanted Message Filtering from OSN User Wall
Miss. Radhika S. Fulzele, Prof. Vipul Dalal
DOI: 10.17148/IJARCCE.2015.4796
Abstract: OSN often encounters the issue of users� control over their private messages. OSN does not completely support this requirement. This dissertation deals with the same issue, where a system is proposed, in which users directly can control the posted messages on their wall. For achieving this, a rule based system is designed which allows a user to manage their filtering criteria. Also the use of machine learning based soft classifier helps in automatically labeling the messages that supports content based filtering.
Keywords: On-line Social Networks, Machine learning, Information Filtering, Short Text Classification.
Abstract
QoS Proposes by EDCA using WLANs
S.Ezhilmathi M.E, N.Subasri, S.Suguna, P.Amsavalli
DOI: 10.17148/IJARCCE.2015.4797
Abstract: Wi-Fi or wireless local area networks (WLANs) are among the most popular wireless internet access technologies used. The major challenge faced by WLANs is the provision of Quality of Service (QoS) for real-time applications at high congestion periods. IEEE 802.11e draft presents the only comprehensive QoS infrastructure for WLANs which proposes Enhanced Distributed Channel Access (EDCA) that propounds the prioritization of medium access for different traffic classes. EDCA while making perceptible improvements for real-time applications are neglects non-real-time applications by allocating their share of the bandwidth to the former in an inefficient manner. In our study, we have found that there are considerable design improvements possible for IEEE 802.11e-based QoS propositions.This paper proposes a novel medium access and transmission mechanism for IEEE 802.11 WLANs that is specifically designed to ensure QoS for triple play services. Based on our study regarding the trafficcharacteristics of triple play services, we propose a mechanism that adaptively uses the medium access and transmission parameters according to the traffic characteristics of the applications, for better utilization of the available bandwidth. Then the mechanism also proffers higher medium access priority to the access point as compared to the stations in order cope with the issue uplink/downlink traffic asymmetry. Simulation-based analysis of the proposed mechanism to the compares its performance with EDCA. The proposed mechanism offers promising results in terms of packet loss, packet delay and throughput, and thus ensures QoS for voice, video and data transfer applications.
Keywords: Quality of service (QoS); IEEE 802.11e; Triple play services; Medium access control (MAC); Medium access priority; Traffic asymmetry.
Abstract
Selection of Optimum Features for Neural Network using Genetic Algorithm in Classification of Brain Computer Interface Data
Swati N.Moon, Narendra Bawane, Pratik Hazare
DOI: 10.17148/IJARCCE.2015.4798
Abstract: This paper aims to classify three mental task which includes left hand movement imagination, right hand movement imagination and word generation. The classification of three or more tasks is a crucial process. It depends upon how the features are extracted and classified. Various methods are available for extracting features from raw electroencephalographic(EEG) data, but the utilization of irrelevant or superfluous features affects the performance of the classifier. Thus extracting and selecting features is a very crucial step for proper classification. This study demonstrates GA as a feature selection method. Here EEG data from BCI III dataset V is used in which features are extracted by using PSD. Then features are selected by using Genetic Algorithm and finally they are fed to the classifier for classification. For classification Neural Network (NN) is used.
Keywords: EEG, Genetic Algorithm ,Mental task, Neural Network, PSD.
Abstract
A Combinatorial Temporal Closed+ High Utility Itemset Mining Algorithm in Transactional Database
Santhosh.J, Sukanya
DOI: 10.17148/IJARCCE.2015.4799
Abstract: High utility item set mining from a transactional database helps to discover the items with high utility based on profit, cost and quantity. Although several significant algorithms have been proposed in recent years, they experienced the problem of producing a large number of candidate itemsets for high utility itemsets. Such a huge number of candidate item sets degrades and reduces the mining performance in terms of storage space requirement and execution time. The situation may become worse when the database contains lots of datasets, long transactions or long high utility itemsets. The proposal introduces three algorithms which are temporal High utility pattern growth (THUP-Growth), temporal closed frequent pattern growth (TCFP-Growth) and temporal UP-Growth+, for mining closed high utility itemsets with a set of effective strategies for pruning candidate item sets rapidly. The information of high utility itemsets is maintained in a tree-based data structure named closed+ utility pattern tree (TCUP-Tree) such that candidate itemsets can be generated efficiently with only two scans of database, then that will be segmented into multiple clusters for fast computation. The proposed algorithms reduce the number of candidates and database scans effectively. This also outperforms best than the existing algorithms and significantly reduces the runtime and memory and storage overhead, especially when databases contain lots of high and long transactions.
Keywords: Frequent itemset, high utility itemset, closed and frequent itemset, FP growth, utility mining, data mining.
Abstract
An Approach for Iris Template Protection using Behavioral Trait
Sheetal Chaudhary, Rajender Nath
DOI: 10.17148/IJARCCE.2015.47100
Abstract: Biometric recognition refers to recognizing a person based on one or more of his/her physical (fingerprint, face, iris, hand geometry etc.) or behavioral (signature, voice, keystroke dynamics etc.) traits. Biometric traits are intrinsically associated with persons and cannot be forgotten or shared with others. Physical traits are stable, unique and do not change significantly in time as compared to behavioral traits. However, one of the most significant vulnerabilities of biometrics is that once a biometric template is compromised, it cannot be canceled and reissued. An attacker could then gain access to all the applications using that same biometric trait. In this paper, a new approach is proposed for protection of iris template using behavioral trait. Behavioral trait is only used to generate user specific key. It presents an effective combination of biometrics data with user specific biometric key for human recognition to generate cancelable and non-invertible biometric templates. Neither the key nor the image can be recovered from the resulting template. The gain obtained from the proposed approach is two-fold: cancelability and non-invertibility. Experimental evaluations are performed on a public dataset demonstrating the accuracy of proposed approach.
Keywords: Iris biometric, voice biometric, biometric template, security, user specific key, cancelability.
Abstract
A Review on Routing Protocols in VANET
S.Vinothini, Mr. J. John Raybin Jose
DOI: 10.17148/IJARCCE.2015.47101
Abstract: Vehicular Ad hoc Networks (VANETs) provide a promising approach for an Intelligent Information Transportation System. Several Routing protocols are used in VANETs for Communication in Vehicles to Vehicles (V2V) and Vehicles to Infrastructure (V2I) networks. These routing protocols for VANETs are classified as unicast, broadcast, and multicast. Based on this strategy VANET routing protocols are comparing using following parameters namely route discovery, forwarding strategy, no of transmission, etc.
Keywords: VANET, Routing protocols, topology based, position based, multicast based, broadcast based.
Abstract
Verifying a Behaviour Based Anti-Phishing Approach using Model Checking
Abdullah M. Alnajim
DOI: 10.17148/IJARCCE.2015.47102
Abstract: Phishing is a form of electronic identity theft in which social engineering and website spoofing techniques are employed to trick a user into revealing confidential information. In this research, a previously proposed behaviour based anti-phishing approach model is verified using model checking. SPIN model checker is used to check the absence of deadlocks as well as reachable states. SPIN illustrates that there is no error since it does not report �invalid end state� as there is no deadlock in the model. There is also no error and unexecuted codes since as all processes have �zero� unreached states and the trail number equals to �zero�. Formal verification using SPIN is applied to help checking whether the model is feasible and applicable. This helps deploying the approach model in the real world in order to enhance phishing countermeasures within LANs.
Blacklists, Formal Methods, Model Checking, SPIN, LAN, Network Proxy, Network Security, Phishing, countermeasures.
Keywords:
Abstract
Utility Pattern Mining: A Concise and Lossless Representation using Up Growth+
Anusmitha.A, Renjana Ramachandran
DOI: 10.17148/IJARCCE.2015.47103
No abstract available.
Abstract
An Expert System for Diagnosis of Ear Problems in Children
Khdega A.Yosef Galala
DOI: 10.17148/IJARCCE.2015.47104
Abstract: The study aims to apply one of the artificial intelligence technical called expert systems to develop a medical expert system for the diagnosis of ear problems in children. The expert system described in this paper is able to detect and gives a diagnosis of eleven types of ear problems as well as proper advice for treatment of ear problems in children. The knowledge of the proposed system is collected from two different sources. The first primary source is the medical knowledge of expert doctors. The second source is from specialized databases, books and electronic medical websites. Visual Basic. Net language is used as a tool for designing the proposed system. The proposed system has been tested and evaluated successfully and positive feedback was achieved. In conclusion, it hopes that, it could have contributed to the construction of a medical expert system that meets the demands of all the beneficiaries.
Expert systems; ear problems; medical diagnosis; knowledge based system.
Keywords:
Abstract
Enhanced Cluster Based Energy Efficient Routing Protocol for Mobile Wireless Sensor Network
Eng. Sura F. Ismail
DOI: 10.17148/IJARCCE.2015.47105
Abstract: Mobile Wireless Sensor Networks have gained great attention in recent years due to their ability to offer effective and economical solutions in a variety of fields. Energy saving is the critical issue while designing the mobile wireless sensor networks. In order to enhance the network lifetime there are many routing protocols have been developed. One of these is clustering based in which network is partitioned into small clusters and each cluster is examined and controlled by a single node called Cluster Head (CH). An efficient method for clustering and appropriate cluster head election can drastically reduce the energy consumption and enhance the lifetime of the network. In this paper, a modified fuzzy C-means clustering method for uniformly cluster the sensor nodes and reduce the transmission distance, and a dual stage fuzzy logic approach for cluster head election is proposed. The proposed protocol selects the nodes with the highest residual energy, lowest mobility, highest node concentration and least distance from the center of the cluster as CH. The simulation results showed the proposed protocol improvement over the previous works in this field, LEACH-M and LEACH-ME in terms of number of alive nodes; the first node dies in LEACH-M and LEACH-ME at round 12 and 16 while the first node dies in proposed proactive and reactive protocol at round 30 and 61, number of times cluster head failed in transmission, average energy consumption, packet delivery ratio and the total number of packets transmitted. Finally, the proposed protocol is evaluated and compared with LEACH-M and LEACH-ME in MATLAB.
Keywords: Mobile Wireless Sensor Network, Fuzzy logic, Modified Fuzzy C-means, Energy-efficient, Network lifetime.
Abstract
Real Time Task Scheduling
Pallavi D. Deore, Prof. H. B. Mali
DOI: 10.17148/IJARCCE.2015.47106
Abstract: Online task scheduling in arm core is a challenging problem due to precedence constraints and no pre-emptive task execution in the synergistic processor core. This learning first proposes an online heterogeneous dual-core scheduling structure for dynamic workloads with real-time constraints. This structure is also suitable for low priority inversion and high system operation. We then spread this structure to various multicore systems by interfacing multiple co-processors to the main processor and scheduling the tasks of co-processors by using a single chip which acts as a controller to control the tasks of co-processors based on the data sent by remote pc using HTTP and FTP Protocols.
Keywords: Real time task Scheduling, ARM11, HTTP, and FTP.
Abstract
Modelling of Speech Signal Algorithm for Improving Intelligibility in Hearing Impairment
Kaustubh A. Mahakalkar, Mahesh T. Kolte
DOI: 10.17148/IJARCCE.2015.47107
Abstract: As hearing aids partially overcome auditory deficits and normally employed for the hearing impaired people to compensate loss in hearing.This paper mainly focus to design a simulink based model which have a digital filter bank which can separate the input speech signal into different bands and automatically gain is adjust for individual band. The design model consists of analog to digital (A/D) converter, digital filter bank, gain control block, compressor and digital to analog (D/A) converter. The A/D converter converts the analog speech signal into a digital speech signal. Further the input speech signals gets process by digital filter bank and its gain is adjusted. As we know that for a person with hearing impairment the range of threshold levels between weakest sound that can be heard and the most intense sound that can be tolerated is less than normal listener. So, to compensate this factor, hearing aids amplify weak sounds more than they amplify intense sound. The D/A will convert the output processed signal into analog speech output signal. The speaker converts the analog speech signal into an acoustical output signal that is directed into ear canal of the hearing instrument user.
Keywords: Hearing aids, digital filter bank, gain control, compression.
Abstract
Delay Tolerant Network – A Survey
P.k Gantayat, S.S.P Jena
DOI: 10.17148/IJARCCE.2015.47108
Abstract: In recent years Delay Tolerant Networking (DTN) has emerged as a new area of research with many promising application. Delay tolerant networks are characterized by frequent network partitioning, intermittent network connectivity, long and variable delays, and high error rates. Such performance challenging conditions can be found in many different environments such as vehicular networks (VANET), in-the-field military or disaster-relief networks, satellite and deep-space interplanetary networks, terrestrial networks serving remote or rural areas. Interesting real-life experiments comprise bus-based DTN networks, sensor networks for wildlife tracking, internet access to remote villages in underdeveloped countries. In this paper an attempt has been made to survey on DTN having some basic features with new architecture which support a securable routing mechanism for an effective data packets forwarding. This paper also discussed about different types of protocols of delay tolerant network to support for the establishment of end-to-end connection effectively where mobile Adhoc networks fails.
Keywords: DTN, Store-carry-forward, Forwarding, Flooding, Routing Protocol.
Abstract
Nymble Credential System (Blacklisting Misbehaving Users in Anonymizing Networks)
Shani J S
DOI: 10.17148/IJARCCE.2015.47109
Abstract: Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client�s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP address is not practical if the user routes through an anonymizing network. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike. To address this problem, a solution is to be implemented is called Nymble Credential System, a system in which servers can blacklist misbehaving users, thereby blocking users without compromising their anonymity. This system is agnostic to different servers� definitions of misbehaviour- servers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained.
Keywords: Privacy, Anonymity, blacklisting, misbehaving, linkability window.
Abstract
Semantic Web: A Boon for E-learning
Gurpreet Kaur, Deepa Chaudhary
DOI: 10.17148/IJARCCE.2015.47110
Abstract: The semantic web has led to a marvellous development of the current web. This paper presents a review of literature related to semantic web and e-learning. We discuss the current state of semantic web and e-learning to draw the attention of the related researchers to the problems in e-learning. We present a critical evaluation of semantic web in the domain of e-learning and to suggest that semantic web is boon for e-learning.
Keywords: e- learning, knowledge, learner, ontology, semantic web.
Abstract
Rule-based Watermarking Model for Numeric and Non-numeric Datasets
Kanchan S. Rahinj
DOI: 10.17148/IJARCCE.2015.47111
Abstract: The large datasets are being mined to take out hidden information and patterns that assist decision makers in making effective, well-organized and well-timed decisions in an ever increasing competitive world. This kind of knowledge-driven data mining activity is impossible without sharing the datasets between the owners of datasets and data mining experts or corporations. As a result, protecting ownership by embedding a watermark on the datasets is becoming applicable. The main challenge in watermarking to be mined datasets is, How to conserve knowledge in features or attributes? The owner needs to manually define Usability constraints for every type of dataset to protect the contained knowledge. The main contribution is a novel formal model that facilitates a data owner to describe usability constraints to preserve the knowledge contained in the dataset in an automated manner. The formal model aims at preserving �classification potential� of each one characteristic and other most main characteristics of datasets that participates in an important role during the mining process of data; as an end result, learning statistics and decision-making rules also remain unbroken. I will implementing a model and integrating it with a new watermark embedding algorithm to demonstrate that the inserted watermark not only conserve the information contained in the dataset, but also significantly increases watermark security as compared with existing systems.
Keywords: knowledge-preserving and ownership preserving data mining, Data usability, watermarking datasets, right protection.
Abstract
Hardware Simulation of Digital Watermarking for Video
Dheeraj Shinde, Ramesh Y. Mali
DOI: 10.17148/IJARCCE.2015.47112
Abstract: Different digital watermarking (WM) techniques for still images have been studied in the last many years. Recently, a lot of new WM schemes have been suggested for other types of digital multimedia data, such as text, audio and video. The technology which is implemented in our work for the invisible video watermark will work according to the video frame using the Least Significant Bit (LSB) algorithm. This technique has been realized using VHDL. The system simulated on the ModelSim. The simulation results have been demonstrated. Watermark is successfully extracted at the output of extraction model.
Keywords: Digital video, WM, LSB, VHDL, ModelSim.
Abstract
Basic Kannada Handwritten Character Recognition System using Shape Based and Transform Domain Features
Shashikala Parameshwarappa, B.V.Dhandra
DOI: 10.17148/IJARCCE.2015.47113
Abstract: This paper presents the recognition of basic Kannada handwritten Characters based on shape features such as normalized chain code and transform domain based features as wavelet filters. In Kannada character set some characters are similar in shape; Images are made noise free by median filter and images are normalized into 64x64 dimensions. A normalized chain code and two-dimensional discrete wavelet transforms are proposed to extract as a feature vector of size 22 from the normalized binary images of size 64x64. Experiments are performed on handwritten Kannada characters consisting of 9600 images with 200 samples for each character per class. The total number of classes is 48. The SVM classifier with 2 fold cross validation is applied for classification of handwritten basic Kannada characters .These features are fed to the SVM classifier for classification of character images. To test the performance of the proposed algorithm two fold cross validation is used. The average recognition accuracy of 90.09% is obtained for Kannada vowels and consonants respectively. The experiment has given encouraging results with less number of feature set. The proposed algorithm is independent of thinning.
Keywords: Basic Kannada character Recognition; Normalized chain code, wavelet transform features; SVM classifier.
Abstract
Analyzing the Performance of an Equalized and Un-equalized OFDM-PON System over AWGN & Rayleigh Fading Channel by Using QPSK, BPSK, 16-QAM and 32-QAM Modulations
Er. Sachin Dogra, Natasha
DOI: 10.17148/IJARCCE.2015.47114
Abstract: In this paper the performance analysis of OFDM architecture with and without equalization is performed by using three efficient coherent modulation techniques which are BPSK, QPSK and M-QAM modulation. Whole analysis is implemented over PON-OFDM model with Rayleigh fading channel having AWGN noise. Then the performance comparison is done with three modulations with and without equalization. Here the OFDM architecture is used to reduce noise (can be inter-symbol interference) which is the most important loss or attenuation in optical signals, thus reshaping and equalization (filtering) is performed. The simulation over BPSK, 16-QAM, 32-QAM and QPSK signals is implemented over Rayleigh and AWGN channel thus the effect of channel signal fading due to noise is observed in addition with equalization to obtain an accurate value of Bit Error Rate BER. Thus the explanatory results of BER determine the efficiency of BPSK, QPSK and M-QAM technique with respect to OFDM.
Keywords: BPSK, QPSK, M-QAM, BER, SNR, OFDM, AWGN, PON, CP, ZP, CO, ONU, OLT, ISI etc.
Abstract
An Efficient Method of Irrigation Using Sensors
R.Aarthi, Dr. A. Shaik Abdul Khadir
DOI: 10.17148/IJARCCE.2015.47115
Abstract: The current agricultural practices need to intensify the rate of food crop production for the rate of population growth with available resources. This paper focuses on measuring the water content in soil and crop growth monitoring using Raspberry Pi. The water level required for agriculture purpose is analyzed using soil moisture sensor. Optical devices like camera capture the field and automatic edge detection will be performed and viewed on the remote server. Moisture level and crop growth level can be viewed on the web browser. The water level will be measured and if it is found less than the actual requirement, it will be corrected manually. In edge detection process, if any disturbance is found, the manual inspection will be carried out to remove the disturbance.
Keywords: Infra Red Sensor, Peripheral Interface Controller, Pest, Raspberry Pi, Soil Moisture Sensor, Webcam, Wireless router.
Abstract
FriendProbe – A New Friend Recommender System for Social Networks
Shruthy Y, Sreenimol K. R
DOI: 10.17148/IJARCCE.2015.47116
Abstract: Social networks provide an important source of information regarding users and their interactions which is very valuable for the recommender systems. In web-based social networks social trust relationships between users indicate the similarity of their needs and opinions. In this paper, we presented a social network based recommender system named "Friendprobe" an app that utilizes the information of the user and makes recommendations by considering users major interest and calculating the similarities between each user, thus recommending friends. A probabilistic model is being developed to make this personalized recommendation from the basic information collected from the user. We also help the users in a way by searching and recommending friends who do not belong to the same category of the major interest as the user.
Keywords: Social networks, Recommender system, user interest.
Abstract
Steganography: Cause and Effect
Harmanpreet Kaur
DOI: 10.17148/IJARCCE.2015.47117
Abstract: With the development of computer and internet in different areas of life and work, the security has a vital role in networking. Information security is transfer the information through the different network media, so the different methods like steganography, cryptography, coding etc.are used. Steganography is the method to hide the message and has two types of material message is the secret data which should be hidden and carrier has material which has the message. This paper studies the various types & methods of steganography such as image, audio/video and text/document and to conceal the methods.
Keywords: Steganography, Spatial domain technique, Transformation domain, LSB, ISB.
Abstract
Web Optimization Using Web Mining Technique
Mahendra Pratap Singh Dohare, Dr. R S. Jadon
DOI: 10.17148/IJARCCE.2015.47118
Abstract: A Web Optimization maintains and catalogs the content of Web pages in order to make them easier to find. The importance of WPO is only rising, as well as it grows, the need for tools that can assist developers in making the right also decisions grows. Hence that is the goal of this thesis: to build a tool that can be used for the continuous profiling of a web site's performance. Usually Search Engines search through Web pages for specified keywords. In response they return a list containing those documents containing the specified keywords. This list is sorted by a relevance criterion which tries to put at the very first positions the documents that best match the inquiry of user. In meticulous, since the size of the Web is quickly rising, the central issues observe elevated presentation algorithms for information management. Furthermore, nowadays Web Optimizations receive more searches per day over a collection of several billion web pages indexed. These particular, can easily explain why in such environments the efficiency, as the effectiveness, of Search and Index algorithms have issues became. Intended for this manner in this paper we are going toward proposing novel techniques aimed at enhancing the performance of a Web Optimization from different angles.
Keywords: Web Mining, Web Optimization, k-means Algorithm.
Abstract
Power Reduction using Single Ended 8T SRAM Cell with NBTI Technique
K.S.Jeeva Bharrathi, M.Ravikumar
DOI: 10.17148/IJARCCE.2015.47119
Abstract: Static random-access memory (SRAM) is a type of semiconductor memory that uses bistable latching circuitry to store each bit. The term static differentiates it from dynamic RAM (DRAM) which must be periodically refreshed. SRAM exhibits data remanence but it is still volatile in the conventional sense that data are eventually lost when the memory is not powered. In this paper, a new 8T SRAM cell, which employs a single bitline scheme to perform the write and read operations, is proposed. This scheme enhances the write ability and read stability by cutting off the feedback loop of the inverter pair, thereby eliminating the read and write constraints on the transistor dimensions. SRAM based structures within the processor are especially liable to NBTI as one of the PMOS devices in the memory cell always has an input �0�. So in order to reduce the power consumption, an inverter is connected to the other end of NMOS device, such that the inverter replaces the ground. Now the size may be somewhat increased but the power leakage is controlled by the use of the inverter.
Keywords: SRAM, NMOS, PMOS, NBTI.
Abstract
Robust Invisible Watermarking using Least Support Orthogonal Matching Pursuit (LS-OMP) Recovery Method
Israa Sh. Tawfic, Sema Koc Kayhan
DOI: 10.17148/IJARCCE.2015.47120
Abstract: In this paper a watermark embedding and recovery technique is proposed based on the compressed sensing theorem. Both host image and watermark are sparse, each in frequency domain using DWT. In recovery, new method called Least Support Matching Pursuit (LS-OMP) is used to recover the watermark and the host image in clean conditions.LS-OMP algorithm adaptively chooses optimum L (Least Part of support), at each iteration. This new algorithm has some important characteristics: it has a low computational complexity comparing with ordinary OMP method, the reconstruction accuracy is show better results than the other method. Second, we give the procedure for the invisible image watermarking in the presence of compressive sampling. The image reconstruction based on a set of watermarked measurements is performed using LS-OMP. While the LS-OMP offers a comparably theoretical guarantee as best optimization�based approach, simulation results show that it outperforms many algorithms especially for compressible signals.
Keywords: Compressed sensing, lest Support Orthogonal Matching Pursuit, Orthogonal matching pursuit, restricted isometry property, Watermark.
Abstract
Distributed Soft Deadline Scheduling with Data Redundancy Elimination to Guarantee QoS in Hybrid Wireless Network
Mrs. Asma Kouser, Mrs. Sreevidya R.C
DOI: 10.17148/IJARCCE.2015.47121
Abstract: Wireless communication has gained popularity in recent year; vital exploration has been dedicated to sustaining an authentic time transmission with stringent nature of quality of accommodation requisites for wireless or remote applications. Simultaneously, a wireless or remote network of hybrid that incorporates a remote or wireless mobile Adhoc system and an infrastructure system has ended up being a superior option for the development of next generation wireless network. In hybrid network the present work are to reserve the assets for QoS path which acquires the invalid reservation and race condition quandaries. And additionally, it doesn�t assure the QoS. The QoS oriented distributed routing protocol (QOD) is tended to alter the QoS in hybrid wireless networks and to lesson transmission delay. Furthermore, wireless network transmission throughput is increased. QoS gives high performance regarding overhead, transmission delay, mobile resilience and scalability.
Keywords: Mobile Adhoc Network, Hybrid Wireless Network; QOD Protocol; Quality of Service.
Abstract
Real Time Object Counting using Raspberry pi
J.Manasa, J.T.Pramod, Dr.S.A.K.Jilani, Mr.S.Javeed Hussain
DOI: 10.17148/IJARCCE.2015.47122
Abstract: This paper proposes the design and implementation of object counting algorithm based on image processing by using Raspberry pi on real time basis. Features of an image containing objects to be detected are extracted uses a method called BLOB (Binary Large Object) analysis. This method is used so as to identify the objects/regions called BLOBs using pixel connectivity and further more parameters like area, centroid, and number of BLOBs available in the test image. Preprocessing of the input test image is done prior to the BLOB analysis like thresholding to get a binary image. The number of objects identified is displayed or read out using a speaker interfaced to the hardware. The hardware Raspberry Pi, running with UBUNTU operating system flashed into a memory card, works as a standalone device with the Raspberry Pi camera being used as an image acquisition device to constantly capture image frames of objects of interest.
Keywords: BLOB analysis, object counting, Raspberry Pi.
Abstract
Implementation of Cryptography Encryption Algorithm for Plane Text
BV Ramudu, Sanjeeva Polepaka
DOI: 10.17148/IJARCCE.2015.47123
Abstract: In this paper an efficient security architecture design and implementation of all candidates of AES encryption standards AES-128, AES-192 and AES-256 on the same hardware is proposed. AES algorithm proposed by NIST has been widely accepted as best cryptosystem for wireless communication security. The hardware implementation is useful in wireless security like military and mobile phones. This contribution investigates implementation of AES Encryption with regards to FPGA and VHDL.Optimized and synthesized VHDL code for AES-128, AES-192 and AES-256 for encryption of 128- bit data is implemented. Xilinx ISE 9.2i software is used for simulation. Each algorithm is tested with sample vectors provided by NIST output results are perfect with minimal delay. The proposed design consumes less power and area which is suitable battery driven mobile phones. Throughput reaches the value of 666.67 Mbps for encryption of 128- bit data with AES-128 key.
Keywords: Cryptography, Cipher, Reconfiguration, Encryption, Decryption.
Abstract
Detection of Financial Statement Fraud using Data Mining Technique and Performance Analysis
KK Tangod, GH Kulkarni
DOI: 10.17148/IJARCCE.2015.47124
Abstract: Financial statement fraud is a deliberate misstatement of material facts by the management in the books of accounts of a company with the aim of deceiving investors and creditors. This illegitimate task performed by management has a severe impact on the economy throughout the world because it significantly dampens the confidence of investors. Financial statements are a company's basic documents to reflect its financial status. A careful reading of the financial statements can indicate whether the company is running smoothly or is in crisis. If the company is in crisis, financial statements can indicate if the most critical thing faced by the company is cash or profit or something else. Financial statements are records of financial flows of a business. Generally, they include balance sheets, income statements, cash flow statements, statements of retained earnings, and some other statements. In a nutshell, the financial statements are the �mirrors of a company�s financial status. This paper presents implementation of two data mining techniques namely K-Means Clustering Algorithm and Multi-Level Feed Forward Network (MLFF). Performance of both the techniques is analysed and results are presented comprehensively.
Keywords: K-Means clustering, Multi-Level Feed Forward Network, Probabilistic Neural Network, Data pre-processing.
Abstract
Landslide Vulnerability Assessment of Pauri Garhwal Region in Uttarakhand
Komal, Asha Thapliyal
DOI: 10.17148/IJARCCE.2015.47125
Abstract: This study is carried out to generate the detail temporal landslide inventory and vulnerability assessment of the possible landslide hazardous regions over the Pouri Garhwal of Uttarakhand. In relation to hazards and disas-ters, vulnerability is a concept that links the relationship that people have with their environment to social forces and institutions and the cultural values that sustain and contest them. The high resolution Quick Bird image is used for landslide mapping in large scale. In addition to that the IRS P6 LISS-IV images are used for improvement of spectral characteristic of the PAN image. This vulnerability is estimated on the parameters which are majorly susceptible to landslides i.e., moderate soil erosion, moderate & deep soil depth, loamy soil texture, excessively drained soil and high slope. This is observed that total 84 watersheds are highly vulnerable for landslide and some are partial areas of Tal nadi, Sukhrao, Paschmi Nayar and Purvi Nayar region of study area.
Keywords: Pauri Garhwal Region, Landslide Vulnerability, Quick Bird Image.
Abstract
Design of Chaos Based Turbo Systems in Fading Channel
Ramya B M, Dr. Sudha K L
DOI: 10.17148/IJARCCE.2015.47126
Abstract: The increasing growth for widespread wireless communication system demands stronger coding scheme to reduce the signal deterioration during its transmission, generally without facilitating to the expensive hardware materials. Turbo code is a forward error correcting code. It mainly consists of RSC encoder, an interleaver in the encoder part and SISO module used in decoder part. The code performance is mainly based on design of an interleaver. The encoder uses multi tent map and inverse multi tent map structure for generating chaotic like samples. The chaotic sequence corresponds to the dynamics of tent map and they are used in engineering applications. For chaos based Turbo decoding, maximum a posteriori algorithm also known as BCJR algorithm, which is based on trellis coded estimation algorithm. It uses SISO module, is a soft decision decoder it performs the decoding operation in an iterative scheme.
Keywords: Turbo code, Interleaver, Chaos, Tent map, Soft decision .
Abstract
Rule-Based Fuzzy Logic for Automatic Learning Process in an E-learning Environment
Ms. R.Priya, G. Keerthy
DOI: 10.17148/IJARCCE.2015.47127
Abstract: With an upgrading technology of web-based education E-Learning performs a best effect for the student based on the programming language. However, student modeling in many cases deals with uncertainty and it is a difficult process. It cannot be exactly said that a learner knows or does not know a domain concept. On the other hand, domain concepts which were previously known by the learner may be completely or partially forgotten. Thus, at present they may be partly known or completely unknown. The teaching process itself changes the status of knowledge of a user. The representation of the learner�s knowledge is a moving target and a learning control system is a nonlinear system. For this problem this paper presents the Rule-Based Fuzzy Logic for automatically learning Process for the Student to provide an Adaptive Instruction through E-learning. This introduces a FuzKPBE (a rule based fuzzy Knowledge definer with Personalized Brilliancy Evaluation), which predicts the relevant course and concepts based on individual skill set on every concept.
Keywords: Soft Computing, Fuzzy Logic, fuzzy sets, E-Learning, personalization, programming.
Abstract
Extracting Knowledge from Social Media to Improve Health Informatics
Mr. V.R.Nagarajan, Monisha.P.M
DOI: 10.17148/IJARCCE.2015.47128
Abstract: Social media provide an intelligence information extraction for the area of Health Informatics, including Bioinformatics, Image Informatics, Clinical Informatics, Public Health Informatics, etc. To improve the health care outcomes with reduced cost we propose the framework which concentrates on positive and negative symptoms of the disease and also the side effects of the treatment. For this health care we take most prevalent cancers: lung cancer. Our proposed approach we employ investigatory analysis using the SSOMs to check the correlations between user posts and positive or negative judgment on drug. Then we use the hierarchical clustering, it measures the starting with an empty network of n vertices and no edges, one add edges between pairs of vertices in order of decreasing similarity, starting with the pair with strongest similarity.
Keywords: Social media, Health Informatics, lung cancer, SOM and hierarchical clustering.
Abstract
Energy Management& Cost Optimization in IDC Using Load Balancing in Cloud
Mr. T.Sivakumar, D.Sathish
DOI: 10.17148/IJARCCE.2015.47129
Abstract: Cloud computing is one of the emerging field which provide a data on web for accessing the data through web and it is supported by the Internet data center (IDC). A cloud resource encloses effective resources for the user requests. For the users request of data in web, Load balancing and energy consumption is the biggest issue in cloud IDC. It contains the thousands of server to share the data in cloud. In IDC Payment of a data center for energy and cooling may be larger than the overall investment in the computing system. Users of cloud consumed the more energy in both academic and industry. Therefore, minimize energy consumption with balancing the workload of resources is a main credit. For this here proposed the EMCO-IDC (Energy Management& Cost Optimization �IDC) to overcome the issues.
Keywords: Cloud Computing, Sharing Data, Energy Management, Load Balancing and IDC.
Abstract
Evaluating the Effect of FIFO Queuing Scheme on Originating and Handoff Calls in Cellular Networks
Engr Sayawu Yakubu Diaba, Engr Nusenu Yaw Shaddrack, Theophilus Anafo, Maxwell Cobbah
DOI: 10.17148/IJARCCE.2015.47130
Abstract: In cellular mobile communication networks, call blocking of originating calls and forced termination of handoff requests, are the main performance metrics in view of traffic considerations and they determine the Quality of Service (QoS). Assuming that call arrival processes both new and handoff are Poisson. Call service time distributions and cell residence times are typically allowed to follow arbitrary distributions due to the well-known insensitivity property of loss queuing systems. This paper aims to compare in terms of probability of blocking, which queuing system is more suitable at Mobile Switching Centre (MSC) by analysing queuing of originating calls and queuing of handoff calls using MATLAB. In this paper we provide numerical solutions for new and handoff calls blocking probabilities with arbitrary handoff inter arrival time distribution. The results can be seen as a generalization of the work by W.C.Y. Lee. This work can be used for more accurate shaping of cellular systems with realistic traffic.
Keywords: Quality of service, Originating calls, Handoff calls, Queuing, Call blocking probability, Mobile Switching Centre.
Abstract
Simulation & Setup of Smart Wireless Wi-Fi Router
Mehzabul Hoque Nahid
DOI: 10.17148/IJARCCE.2015.47131
Abstract: The shortest & easy communication is essential in network system, and router is widely used to do so. If we need heavy Internet user with multiple wireless devices competing for Wi-Fi coverage at the same time, then need a Wireless Linksys router. Wireless router is up to 4x faster than normal router and is the most powerful networking technology at this stage. A wireless router is a device that performs the functions of a router and also includes the functions of a wireless access point. It is used to provide access to the Internet or a private computer network. It can function in a wired LAN (local area network), in a wireless-only LAN (WLAN), or in a mixed wired/wireless network, depending on the manufacturer and model. The main objective of this research paper is to introducing smart wireless router with setup and simulation.
Keywords: LAN, DSL router, ISP, Packet Tracer, IEEE 802.11.
Abstract
Detection of Brain Tumour with Filtering Techniques
Mrs. K. Padmavathi, Ms.C.Megala
DOI: 10.17148/IJARCCE.2015.47132
Abstract: All information is conveyed through images. Images play a vital role in every field that makes the problem easier to understand. Image processing techniques are most widely used in medical imaging to identify the affected area through x-ray, MRI, CT scan. Medical image processing is used to detect and identify the inner most portions of the human body. Due to several abnormalities in human body such as visualization, heart diseases, cancer, brain tumor, blood clotting which can be identified through image processing techniques. Using spatial filtering algorithm, we can filter the brain tumor of an image. The algorithm is been used on different images of the brain detected with tumor and filter the desired output.
Keywords: Pre-processing, MRI, spatial filtering, segmentation, tumour detection.
Abstract
Data Encryption Algorithm using Asymmetric Key Derived from Fingerprint Biometric Features
Prof. Dr. Tarik ZeyadIsmaeel, Ahmed Saad Names
DOI: 10.17148/IJARCCE.2015.47133
No abstract available.
Abstract
BT-WAP: Wormhole Attack Prevention Model in MANET Based on Hop-Count
Badran Awad, Tawfiq Barhoom
DOI: 10.17148/IJARCCE.2015.47134
Abstract: MANET has more security issues compared to wired networks. Among all of security threads wormhole attack is considered to be a very serious security thread over MANET. In wormhole attack, two selfish nodes which is geographically very far away to each other, form a tunnel between each other to hide their actual location and try to believe that they are true neighbors and therefore make conversation through the wormhole tunnel. Consequently, the two selfish nodes will completely disrupt the communication channel. In this paper, a new model is developed for detection and prevention of wormholes based hop-count metric which we call it BT-WAP. BT-WAP effectively and efficiently isolates both wormhole node and colluding node. Our model allows the evaluation of node behavior on a pre-packet basis and without the need for more energy consumption or computation-expensive techniques. We show via simulation that BT-WAP successfully avoids misbehaving nodes. It is found that the BT-WAP model achieves an acceptable detection rate about 99.7% and a detection accuracy rate 98.4%. which makes BT-WAP an attractive choice for MANET environments.
Keywords: MANET, wormhole attack, network security, hop-count, range-free, localization.
Abstract
A Novel Entropic Thresholding Technique for Diagnostic Analysis of Microcirculatory Images
Pallavi A. Chaudhari, Prof. Pragati Patil
DOI: 10.17148/IJARCCE.2015.47135
Abstract: Understanding the functionality of microcirculation is a key factor in the analysis of blood circulatory system. The blood flow distribution changes, based on the physiological effects of disorders. This study presents a method for analysis of microcirculation images captured from lingual surface of 10 animal subjects. The technique applies advanced image processing methods to stabilize images, segment micro vessels (capillaries and small blood vessels), and estimate the average Functional Capillary Density on 20 consecutive frames for each subject. The algorithm consists of four main parts: preprocessing, image stabilization, entropic-based adaptive local thresholding segmentation and post-processing. The key objective is to quantitatively examine the changes that occur in microcirculation over treatment periods for diseases as well as for the resuscitation process. The designed system will help physicians and medical researchers in diagnostic and therapeutic decision making to determine the sufficiency of resuscitation process and the effect of drug consumption in patients. In particular, the system focuses on minimizing user interaction while improving the accuracy of the analysis. Visual evaluation of the results by medical experts indicates that the technique is capable of identifying 95% of active capillaries and blood vessels in images.
Keywords: Diagnostic Analysis, Microcirculatory Images, Blood Vessels, Entropic Thresholding.
