VOLUME 4, ISSUE 6, JUNE 2015
Non-Cooperative Cognitive Radio Optimization using Fuzzy Logic and Monte-Carlo Algorithms
M. M. Abdullahi , S.M. Sani , B.G. Bajoga , M.B. Mu’azu
Design of a Tri Band H-Shaped Microstrip Patch Antenna for L, C and X-Band Application
Sanjay Singh, Amit Saini, Kishor Chandra Arya, Rachna Arya
Script Identification from Multilingual Text Documents
A.H.Kulkarni, P.S.Upparamani, R J Kadkol, P.V. Tergundi
Optimum Placement of D-STATCOM using Firefly Algorithm for Enhancing Power Quality
Chaithra C, Padmaja K
NX Based Motion Analysis of Mass Elevating Mechanism
Kharat Pritam Ankush, Khairnar H. P
A Review on Mobile Cloud Computing: Issues, Challenges and Solutions
Mandeep Kaur Saggi, Amandeep Singh Bhatia
A Review: Image Edge Unmasking by Applying Renovated and Colony Optimization Technique
Nitin Tarar, Vikas Kamra
Development of Anti-Phishing Model for Classification of Phishing E-mail
Niharika Vaishnaw , S R Tandan
A Survey of Qubole Data Service on Big Data Analytics and Cloud Computing
SaravanaKumar P , Tamil Selvan T
Text Summarization using Neural Networks and Rhetorical Structure Theory
Mr. Sarda A.T., Mrs. Kulkarni A.R.
Enhanced LEACH Multipath Based Energy Efficient Routing for Wireless Sensor Network
Gaikwad Ranjitkumar Sharnappa, Satish Kannale, Vireshkumar Swamy
Denoising of an Image using the New Contourlet Transform
Sriparna Dey, Samrat Banerjee, Niladri Shekhar Mishra
Susceptibilities Detection Approach in Network Connected Servers using the Composite Fault Prototypical
Sivakumar Kalimuthu, Premylla Jeremiah, Kannan Ponkoodanlingam, Anatte Schaffer Anak Juslen
To enhance the Reliability and Security in Cloud environment using RSA algorithm and Image Sequencing Password
Bohar Singh, Poonam, Aruna Rani
A Concise Study on Text Mining for Business Intelligence
C.Kanakalakshmi, Dr.R.Manicka chezian
A Proposed Method in Image Steganography using Prime Sequence
Renu, Dr. Priti Sharma
Dual Tree Complex Wavelet Transform based Noise Reduction Technique
Mr. Parag S. Bhiwadare, Prof. Mithilesh Mahendra, Prof. Sagar Ghormade
An Efficient Method for Shadow Detection and Removal in Satellite Images by Segmentation
Prasad Kotur, Kiran B
Efficient Theme Discovery in Collection of Images
Ms. Aparna N. Gawande, Prof. D. L. Ghade
Providing security to Online Shopping using credit cards through Text Steganography Techniques
Sumathy Kingslin , Vidhya Saraswathi. V
Wireless Secured Real Time Supervision and Controlling for Industrial Utility
Mr. Mohammed Junaid , Prof. Shubhangi Borkar
Device-to-Device (D2D) Cellular Communication: Group Formation of Devices
Pankil P. Taranekar, Prof. V. V. Dixit
High Capacity Steganography Method Based upon RGBA Image
Nawar S. Alseelawi, Tarik Z. Ismaiel, Firas A. Sabir
Application of Extended Kalman filter and Modified Gain Extended Kalman Filter in Underwater Active Target Tracking
Ashok Kumar.N, Shaik Riyaz Ali, G.Purnima Swathi
Comparative Analysis of Video Watermarking Technique using 2-level DWT and 3-level DWT
Darshan M S, Sudha B S
Adaptive Dorsiflexion and Plantar flexion in Active Ankle Foot Orthosis
Sumitkumar V. Dhule, V. V. Shete, Sunil B. Somani
Automated Glaucoma Detection in Retina from Cup to Disk Ratio Using Morphology and Vessel Bend Techniques
Shradha, Sharangouda N
Using Map-Reduce performing Online Query Aggregation
M Sabir Chauhan, Rekha Jadhav
Design and Fabrication of E-SLOT Microstrip Patch Antenna for WLAN Application
Shailander Singh Khangarot, Gajendra sujediya, Tejpal Jhajharia, Abhishek Kumar
A Survey on Node Deployment for Sensing Mobile- Node in WSN
Dr.P.Ponmuthuramalingam, M.Preethi
Study of Traffic Generation Tools
Sudhakar Mishra, Shefali Sonavane, Anil Gupta
Automatic Retina Feature Analysis for Glaucoma Detection using Cup to Disk Ratio Based on Morphology and Hough Circle Based Techniques
Shruti P Y, Sharangouda.N
A Survey on VANET Security using ECC, RSA & MD5
Rukaiya Shaikh, Disha Deotale
Web Service Recommendation Based on Usage History
Nikita R. Gurjar, Dr. Sandeep V. Rode
Zero Knowledge Protocols for Attacks in Wireless Sensor Networks
Akash S, Deepak S Sakkari
Shape based data Hiding Steganography as well as Steganalysis for Secure Communication System
Khushboo Jain, Amrit Kaur
Progressive visual cryptography scheme without pixel expansion for color images
Fersna S. , Athira V.
Role of External Factors on Outcome of a One Day International Cricket (ODI) Match and Predictive Analysis
Mehvish Khan, Riddhi Shah
A reflection on the current status of Telecommunication in North Eastern Region with special reference to Assam
Kapou Malakar
Performance Evaluation of Ad-Hoc Protocols in MANET and VANET
K. Vijayalakshmi, Dr. R. Manicka Chezian
Child Tracking System on Mobile Terminal
Rohit N. Bhoi, Dr. V. V. Shete, S.B.Somani
Full Custom Physical Design of 4-Bit High Speed CSLA Using Grid Based Routing and Standard Cells
Somshekhar.R.Puranmath, Archana.S.Kori
Design and Implementation of Intelligent Vehicle System based on ARM Cortex
Anagha Vaidya, Mahesh T. Kolte
Analysis of Driver’s Skills from Passenger’s Comfort
Sarang P. Suryawanshi, Sunil. B. Somani, Virendra. V. Shete
Efficient quality analysis and enhancement of MRI image using Filters and Wavelets
G.Amar Tej, Prashanth.K.Shah
A Comparative Study and Review for Human Action Recognition
Brenda M, Arun P.S
RC4 and DES based Cloud Computing Data Security and Comparison
Sheetal Mahalle, Ranjeet Jaiswal
Development of Home Health Care Self Monitoring System
Darshana Varma, V. V. Shete, S. B. Somani
Android Based Smart Learning and Attendance Management System
Rakhi Joshi, V. V. Shete
Design and Stimulation of New Fractal Antenna with Improved Return Loss at Various Frequencies for Ultra Wide Band Applications
Deepti Singh, Sukhwinder Kumar
Design of Parallel CRC Generation for High Speed Application
Chaitali Tohgaonkar, Prof. Sanjay B. Tembhurne, Prof. Vipin S. Bhure
Bandwidth Enhancement of MHD Antenna for Wireless Applications
Faizan Hameed, Rajesh Parihar
Survey on PAPR Reduction Techniques in OFDM System
Shilpa Sharma, Pradeep Kumar Gaur
Aodv and Olsr Based Routing Algorithm for Highway and City Scenarios
ShubhrantJibhkate, Smith Khare, Ashwin Kamble, Amutha Jeyakumar
Energy and Traffic Aware Vertical Handoff in Heterogeneous Wireless Network
Ashwin Kamble, Smith Khare, Shubhrant Jibhkate, Amutha Jeyakumar
Insider Attack Detection System (IADS) in MANETs
Rangachary K, Dr.S.Naganjaneyulu
An Impulsive Wireless Adhoc Network for Secured Protocol
Chandra Mounika P, Subba Rao k
License File Generator Using MAC Address
Anirudha A. Kolpyakwar, Piyush M. Dhande, Pallavi A. Chaudhari
Behavioral Study of Different Adaptive Modulation Techniques in MIMO Transmission: A Review Paper
Ms. Madhuri Gehlot
Software Failure Analysis of Brake-By-Wire Automotive Safety Critical System using FMEA, FTA and MATLAB Techniques
Dr. M. Ben Swarup, B. Hari Prasad
Codebook Based Vector Quantization Technique for Song-to-Song Retrieval
Ms. Shabnam R. Makandar, Mrs. V. L. Kolhe
Performance Analysis of Different Spectrum Sensing Techniques in Cognitive Radio under Different Fading Channels
Sheen Mary Jacob, Nandan S.
Hybridization of Cuckoo Search & Artificial Bee Colony Optimization for Satellite Image Classification
Shelja Singla, Priyanka Jarial, Gaurav Mittal
A Novel Study on Optical Frequency Division Multiplexing System for Digital Broadcasting Standard
Sapna Sadyan, Er. Paras Chawla
Efficient Computation of Range Aggregate Against Uncertain Location-Based Queries
Ahmed-ullah-khan, Samra Noorin
Authentication Scheme to Protect Web Applications against SQL Injection Attack Using Hash Functions
Pooja Saini, Sarita
Code Selection with Application to Spread Spectrum Systems Based on Correlation Properties
Mintas Parveen C. M.
Algorithmic scheduling of Tasks and Work flow in Grid Computing System
R.Ananthi Lakshmi, S.Vidhya
LMS Algorithm and Distributed Arithmetic Based Adaptive Fir Filter with Low Area Complexity
Nilesh S. Satpute, Sanjay B. Tembhurne, Vipin S. Bhure
Channel Equalization and Estimation for SC FDE systems
Anupama P, Sakuntala S. Pillai
Audio Watermarking using Colour Image Based on EMD and DCT
Suhail Yoosuf, Ann Mary Alex
Performance Analysis of Linear and Nonlinear Precoding in MIMO Systems
Varna L. Babu , Luxy Mathews , Sakuntala S. Pillai
Efficient Cloud Computing with Secure Data Storage using AES
Mr. Santosh P. Jadhav, Prof. B. R. Nandwalkar
A Bluetooth Tele Health, Household Security and Industry Safety Realization by Android Smartphone
Piyush V. Savaliya, Sunil B. Somani, Virendra V. Shete
Harmonic Elimination in Cascade Multilevel Inverter with Non Equal dc Sources using Genetic Algorithm
Sudhakar V. Pawar, Mrs. Shimi S.L
A hybrid KPM Approach for Object Tracking using particle filter
Er. Navneet Pal Kaur, Dr. Shashi Bhushan, Er. Manish Mahajan
Comparative Analysis of Decision Tree Algorithms for the Student’s Placement Prediction
Er.Paramjit kaur, Er. Kanwalpreet Singh Attwal
User Access Control Technique through Smart Device Authentication using Bluetooth Communication with the Aid of Face Recognition
Samir Uprety, Padmini M
Comparison Study on Wavelet based Spectrum Sensing in Cognitive Radio
Ms. Saloni Pandya, Mrs. Rashmi Pant
Visual Interpretation of ASL Finger Spelling using Hough Transform and Support Vector Machine
S.Nagarajan, T.S.Subashini, M.Balasubramanian
Performance Analysis of Time in Line and Word Segmentation using Different Fonts
Shashi Kant, Mrs. Sini Shibu
FPGA Based Face Detection System using Xilinx System Generator
Yogesh V. Raut, Charudatta V. Kulkarni
Distributed Computing Based Methods for Anomaly Analysis in Large Datasets
Remya G, Anuraj Mohan
Contextual Query Expansion for Acquiring Web Documents
Bidisha Roy, Priyanka Upadhyay
Quantify Object Oriented Software Analyzability
Ms.Vinita Yadav, Dr.Namrata Dhanda
Security in Wireless Adhoc Networks based on Trust and Encryption
Sumimol L., Janisha A
A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms
L.Dhanabal, Dr. S.P. Shantharajah
Performance Evaluation of K-RLE Compression Technique for Text Data
P. Suneel Kumar, Patibandla.Swapna
A brief Survey on Security Issues in Cloud and its service models
G.Kalpana, P.V. Kumar, R.V.Krishnaiah
QOS Evaluation of Call Admission Control for a 4G Network
Vrushali N. Khairnar, Dilip S. Patil
Measurement of Interface Trapped Charge Densities(Dit) in 6H-SiC MOS Capacitors
Sachin Tyagi, Ajeet Kumar, Amit Kumar
A Crypto- Steganography System for Double Tier Security
Yogita, Harjinder Singh
Smart Transmitter for Cognitive Radio
Sushant Chavan, P.B. Borole, Ashish Sahare, Jayawant Jagtap
Red & Green Blood Vessel Extraction from the Retinal Images
Sandeep Singh, Dr. Dinesh Kumar
Automatic Detection of Sickle cell in Red Blood cell using Watershed Segmentation
Shashi Bala, Amit Doegar
Minkowski Fractal Geometry based T-shaped Fractal Patch Antenna for wireless applications
Sunil kumar, Sukhwinder Kumar
Evaluation of Wavelength Division Multiplexing System using Different Modulation Formats
Rupinder Kaur, Sanjeev Dewra
Reactive Navigation of Multiple Moving Agents in a Room Environment
Dr M Shivakumar, Mr. M.V.Sreenivas Rao, Stafford Michahail
Review on Cache-Coherent Algorithms with Multithreaded Computer Architectures
T.Karthik, M.Krishna Sudha
Hybrid Fusion Methods in Image Steganography for Secured Data Transmission
Usha B.A, Dr.N.K Srinath, Dr. Ravikumar C N, Puttaraju, Manu and Vijaykumar
High Capacity Data Embedding in Image Steganography using Hard Sudoku puzzle
Usha B A, Dr N K Srinath, Anvith E
Route Planning Algorithm for Localization in Wireless Sensor Network
Prof. Shubhangini Ugale, Ms. Poonam B. Kshirsagar, Mr.Ashwin W. Motikar
Reducing Internal Banking Fraud using Smart Cards and Biometrics as Access Control Tools
Daniel Ugoh, Macdonald N. Onyeizu, Charles Ugwunna, Celestine O. Uwa
Detection and Extraction of Text in Images using DWT
Tejashvini R. Hiremath, Shivanand M. Patil, Dr. V. S. Malemath
RFID Enabled Mobile Billing in Retail
Mrudula Chikhale, Dr. Srija Unnikrishnan, Prof. Monica Khanore
Codebook Generation using Hierarchical Radial Basis Function Neural Network with Wavelet Transform and Vector Quantization for Better Image Compression
Dr.G.Boopathi, Dr. Narayanan Sreekumar
Content Based Image Retrieval using SVM, NN and KNN Classification
Sandeep Singh, Er.Rachna Rajput
Intrusion Detection Systems: A survey and Analysis of Security Issues
Dr.V.Jaiganesh, Mr.M.M.Karthikeyan
The Concept of Programmable Logic Controllers and its role in Automation
Harpreet Singh Bedi, Shekhar Verma, Rk Sharma, Balpreet singh
Linear Data Model Based Study of Improved Round Robin CPU Scheduling Algorithm
Saurabh Jain, Diwakar Shukla, Ratnesh Jain
Abstract
Enchondroma tumor Detection
Abdulmuhssin Binhssan
DOI: 10.17148/IJARCCE.2015.4601
Abstract: Medical Image Processing is one of the most challenging topics in research areas. This paper proposes an approach to detect enchondroma tumor in MR images. Enchondroma is a solitary, benign, intramedullary cartilage tumor that is usually located in the short tubular bones of the hands and the feet, the distal femur, the proximal humerus, and other bones. A proposed approach integrates some pre-processing techniques such as the average filter and the bilateral filter in order to remove noise and to smooth images. This will increase the quality of the image so that they are suitable for segmentation as well as morphological operations that will be used to eliminate false segments. Used to our approach in this paper. We used Matlab software with Graphical User Interface to develop an application that will detect and segment enchondroma precisely from the sequence of MR images. This application will discard the images which do not have a tumor in the final result.
Keywords: Enchondroma, MRI images, Image Processing, Matlab and Segmentation.
Abstract
Non-Cooperative Cognitive Radio Optimization using Fuzzy Logic and Monte-Carlo Algorithms
M. M. Abdullahi , S.M. Sani , B.G. Bajoga , M.B. Mu’azu
DOI: 10.17148/IJARCCE.2015.4602
Abstract: Cognitive Radio threshold optimization has been an on-going research concern. With mature energy detector algorithms, the CR implemented in this work uses an energy detector as the primary sensing module for the primary user signal. In order to achieve this detection in an efficient way, various techniques have been proposed in literature for optimization and different levels of optimization have been achieved. For this work, threshold optimization has been approached using two techniques for optimization, with Monte-Carlo and ANFIS fuzzy algorithms as the techniques of choice. The inherent gains observed from the techniques used show relative suitability to the task of threshold optimization in a CR system that is software based and shielded from the outside environment. From this work, it was seen that with a seed threshold setting of 14dBm, the optimization techniques used gave close correspondence for Monte-Carlo and Fuzzy logic. Further studies will require the integration of suitable hardware into the system to gain better knowledge of the CR behaviour and the impact of deduced optimal working threshold.
Keywords: Cognitive radio, energy detector, threshold optimization, Monte-Carlo, fuzzy logic, ANFIS.
Abstract
Design of a Tri Band H-Shaped Microstrip Patch Antenna for L, C and X-Band Application
Sanjay Singh, Amit Saini, Kishor Chandra Arya, Rachna Arya
DOI: 10.17148/IJARCCE.2015.4603
Abstract: In this paper, a tri-band H-shaped rectangular microstrip patch antenna is presented for L, C and X-band applications. The proposed antenna has symmetrical properties and operating in a tri-band of frequency 2.4 GHz. In this paper H-shaped patch antenna is designed on a 1.56 mm thick Rogers TMM 4(tm) substrate with a relative permittivity of 4.5 and achieve a gain of 6.52dB. The simulation process has been done using HFSS v12.1 (High Frequency Structural Simulator). The key parameters like Return loss, VSWR, Gain are simulated, analyzed and optimized using HFSS v12.1.
Keywords: Tri band antenna, Microstrip antenna, Co-axial probe feed, S parameter, Return loss, VSWR, Gain, Ansoft HFSSv12.1.
Abstract
Fuzzy based selection of wavelets for Image Steganography
Manika Bhatt
DOI: 10.17148/IJARCCE.2015.4604
Abstract: In this paper, we have proposed a new image steganography scheme which is a Fuzzy based selection of wavelets. There are some attack forms to data and informations i.e. hacker, trojan horse attack, cracker and others. In consequence, today various efforts have been conducted to take care of data security and overcome attacks is previously already there is a way to take care of data security that is recognized by the name of cryptography. With cryptography for secret data it security is maintained nevertheless from cipher text that randomized will be easily detected and awake third party about secretness of files. For that deep steganography is applied which in Greek words means �message are hidden� (covered writing) in effort to take care of secretness of datas. Steganography is the way to hide the data. In the current paper we are going to present different aspects of steganography from different authors.
Keywords: Steganography, Cryptography, Encryption, Fuzzy, Matlab.
Abstract
Script Identification from Multilingual Text Documents
A.H.Kulkarni, P.S.Upparamani, R J Kadkol, P.V. Tergundi
DOI: 10.17148/IJARCCE.2015.4605
Abstract: In a multilingual country like India, a document may contain text words in more than one language. For a multilingual environment in order to reach a larger cross section of people, it is necessary that a document should be composed of text contents in different languages. But on the other hand, this causes practical difficulty in OCR such a document, because the language type of the text should be pre-determined, before employing a particular OCR. It is perhaps impossible to design a single recognizer which can identify a large number of scripts/languages. So, it is necessary to identify the language region of the document before feeding the document to the corresponding Optical Character Recognition (OCR) system. Identification aims to extract information presented in digital documents namely articles, newspapers, magazines and e-books. This has given rise to many language identification systems. The objective is to develop visual clues based procedure to identify different text portions of a document. In this work eight feature namely top max row, bottom max row, top horizontal lines, vertical lines, bottom components, tick components, top holes and bottom holes have been used to identify the script type.
Keywords: OCR, EDGE, PNN, KNN.
Abstract
Optimum Placement of D-STATCOM using Firefly Algorithm for Enhancing Power Quality
Chaithra C, Padmaja K
DOI: 10.17148/IJARCCE.2015.4606
Abstract: Using Firefly Algorithm (FA), to optimally place the Distribution Static Synchronous Compensator (DSTATCOM) in a distribution system for enhancing power quality. In this method, the average voltage total harmonic distortion (THDV), average voltage deviation and total investment cost are considered as the objective functions, where voltage and power limits for individual buses are consider as the optimization constraints. The performance of the proposed FA is investigated using the Matlab software on the radial IEEE 16bus test system. The simulation results verify the ability of FA in accurately determining the optimal location and size of the D-STATCOM in radial distribution systems.
Keywords: D-STATCOM, Optimal placement, firefly algorithm, Voltage sag.
Abstract
NX Based Motion Analysis of Mass Elevating Mechanism
Kharat Pritam Ankush, Khairnar H. P
DOI: 10.17148/IJARCCE.2015.4607
Abstract: Cloud computing provides many scalable services. Data of users are usually processed remotely in unknown machines which they do not own or operate. Lack of trust in clouds by potential customers is the key barrier to widespread usage of cloud computing. With the convenience brought by this new emerging technology, users� fear of losing control of their own data. To address this problem, cloud information accountability is proposed to keep track of the actual usage of the owners� data in the cloud. Data owners upload their data on authenticated cloud; authentication is done by generating certificates using SHA 256. For each access to that data by the registered users, the Java Archives will automatically generate a log record including information of the users. Log record includes the information about the users who are accessing the data enclosed in Java Archive, name of the file that is accessed by the users, its file id and duration of access. If any hacker tries to hack the data, hackers log will be generated and does not allow them to download the file. Hackers� details are sent to data owner from mobile cloud server for auditing purpose.
Keywords: SHA256, Auditing, Java archives.
Abstract
A Review on Mobile Cloud Computing: Issues, Challenges and Solutions
Mandeep Kaur Saggi, Amandeep Singh Bhatia
DOI: 10.17148/IJARCCE.2015.4608
Abstract: Mobile Cloud Computing (MCC) is a combination of mobile computing and cloud computing. It has become one of the Major Research issue in the industry. Although there are so, many research studies in mobile computing and cloud computing, convergence of these two areas grant further academic efforts towards flourishing MCC. With this aim, this paper presents a review on the background and principle of MCC, characteristics, recent research work, and future research trends. It then analyses the features and infrastructure of mobile cloud computing. The rest of the paper analyses the challenges of mobile cloud computing, summary of some research projects related to this area, and points out promising future research directions.
Keywords: Mobile Cloud Computing; Mobile Computing; Cloud Computing; Research Directions.
Abstract
A Review: Image Edge Unmasking by Applying Renovated and Colony Optimization Technique
Nitin Tarar, Vikas Kamra
DOI: 10.17148/IJARCCE.2015.4609
Abstract: Due to colossal financial losses in recent years, phishing has drawn attention of most of the individuals and organizations in the world of internet. Need for protection against phishing activities through fraudulent emails has increased remarkably. In this paper we propose a hybrid model to classify phishing emails using machine learning algorithms with the aspiration of developing an ensemble model for email classification with improved accuracy. We have used the content of emails and extracted 47 features from it. The processed emails are provided as input to various machine learning classifiers. Going through experiments, it is observed and inferred that Bayesian net classification model when ensemble with CART gives highest test accuracy of 99.32%.
Keywords: Phishing, Machine learning, Email classification, Hybrid model.
Abstract
Development of Anti-Phishing Model for Classification of Phishing E-mail
Niharika Vaishnaw , S R Tandan
DOI: 10.17148/IJARCCE.2015.4610
Abstract: Due to colossal financial losses in recent years, phishing has drawn attention of most of the individuals and organizations in the world of internet. Need for protection against phishing activities through fraudulent emails has increased remarkably. In this paper we propose a hybrid model to classify phishing emails using machine learning algorithms with the aspiration of developing an ensemble model for email classification with improved accuracy. We have used the content of emails and extracted 47 features from it. The processed emails are provided as input to various machine learning classifiers. Going through experiments, it is observed and inferred that Bayesian net classification model when ensemble with CART gives highest test accuracy of 99.32%.
Keywords: Phishing, Machine learning, Email classification, Hybrid model.
Abstract
A Survey of Qubole Data Service on Big Data Analytics and Cloud Computing
SaravanaKumar P , Tamil Selvan T
DOI: 10.17148/IJARCCE.2015.4611
Abstract: The rise of cloud computing and cloud data stores have been a precursor and facilitator to the emergence of big data. Cloud computing is the commodification of computing time and data storage by means of standardized technologies. Analytics over the huge volume of data is now possible with big data. Data keep on accumulated on every minute from multitude data sources such as social media, mobile devices, and sensors. In order to extract insights from diverse information feeds from multiple, often unrelated sources, data need to be correlated or harmonized to a common level of granularity. Loading Unstructured Data into Data warehouse getting complex. A strategy for fetching the unstructured data into Hadoop Distributed File System is discussed. Data cleansing and profiling of extracted data is important to overcome data quality concerns. Big data can be analysed with the software tools commonly used as part of advanced analytics disciplines such as predictive analytics, data mining, text analytics and statistical analysis.
Keywords: Qubole Data Service (QDS), Big Data Analytics, Cloud Computing, Business Intelligence, Hadoop.
Abstract
Text Summarization using Neural Networks and Rhetorical Structure Theory
Mr. Sarda A.T., Mrs. Kulkarni A.R.
DOI: 10.17148/IJARCCE.2015.4612
Abstract: A new technique for summarization is presented here for summarizing articles known as text summarization using neural network and rhetorical structure theory. A neural network is trained to learn the relevant characteristics of sentences by using back propagation technique to train the neural network which will be used in the summary of the article. After training neural network is then modified to feature fusion and pruning the relevant characteristics apparent in summary sentences. Finally, the modified neural network is used to summarize articles and combining it with the rhetorical structure theory to form final summary of an article.
Keywords: Neural networks, rhetorical structure theory, text summarization.
Abstract
Enhanced LEACH Multipath Based Energy Efficient Routing for Wireless Sensor Network
Gaikwad Ranjitkumar Sharnappa, Satish Kannale, Vireshkumar Swamy
DOI: 10.17148/IJARCCE.2015.4613
Abstract: Wireless sensor networks are widely used in many applications now days. WSN�s equipped with large number of wireless sensors programmed to sense physical parameters and transmit to remote location. Sensors composed of battery having limited power constraint. This lead many routing protocols designed for WSN to use energy efficiently. One of the most popularly used energy efficient clustering protocol is LEACH. In this work we propose multipath LEACH protocol based on LEACH. The main intention of this protocol is to offer energy efficient and robust communication. This is achieved by traffic multiplexing over multiple paths and introducing alternation of the cluster-heads for every given interval of time.
Keywords: Wireless sensor network, LEACH, energy efficient, Multipath.
Abstract
Denoising of an Image using the New Contourlet Transform
Sriparna Dey, Samrat Banerjee, Niladri Shekhar Mishra
DOI: 10.17148/IJARCCE.2015.4614
Abstract: The Contourlet Ttransform has an efficient filter bank construction and low redundancy which makes it an impressive computational tool for different applications in image processing. It provides a directional multiresolution image representation, which is capable of capturing and representing singularities along smooth object boundaries in natural images. But a major disadvantage of the original Contourlet Transform is that, its basis images are not localized in the frequency domain. Here, a new Contourlet Transform is proposed as a solution. In this multiscale pyramid (which is defined in the frequency domain) is used against Laplacian pyramid, which is used in Counterlet Transform. It is observed that the resulting basis images are sharply localized in the frequency domain and exhibit smoothness along their main ridges in the spatial domain. Using Image Denoising, it can be shown that the proposed New Contourlet Transform can significantly outperform the original Transform both in terms of PSNR (by several dB�s) and in visual quality.
Keywords: Contourlet Transform, Multiscale Pyramid, Directional Filter Banks, Image Denoising.
Abstract
Susceptibilities Detection Approach in Network Connected Servers using the Composite Fault Prototypical
Sivakumar Kalimuthu, Premylla Jeremiah, Kannan Ponkoodanlingam, Anatte Schaffer Anak Juslen
DOI: 10.17148/IJARCCE.2015.4615
Abstract: The enormous issue is the discovery of newer threats and different forms of attack, there by compromising the security of the system. In this paper, we first analysis the most relevant concepts underlying the view of network vulnerabilities and summarize the most known technique called Attack Injection Tool. We propose an approach to identification of potential vulnerabilities and evaluate software components security mechanisms using the composite fault prototypical. The approach and tool is based on the awareness that inserting potentially dangerous susceptibilities in a network server and web application by analysing the assessment of existing security mechanisms and tools in convention situations. This methodology is designed for the detection of vulnerability in the software components in a proposed approach design called the Susceptibilities Detection Approach (SDA) that behaves like hackers and security analyst for the discovery of susceptibility in the network connected servers. The analysis and design methodology thereby showed that this approach can be used to identify the vulnerability.
Keywords: Network Susceptibilities, Injection Attack, Communication Protocol Servers, Susceptibilities Detection Approach, Composite Fault Prototype.
Abstract
To enhance the Reliability and Security in Cloud environment using RSA algorithm and Image Sequencing Password
Bohar Singh, Poonam, Aruna Rani
DOI: 10.17148/IJARCCE.2015.4616
Abstract: Cloud computing is not something that suddenly appeared overnight. It may trace back to a time when computer systems remotely time-shared computing resources and applications. Cloud computing refers to the many different types of services and applications. These applications are delivered in the internet cloud. In the cloud computing the information is share between various users. Hence security and privacy are the two main challenges that are presents in the cloud computing. In our paper we are working on the security of cloud computing. To enhance the security of cloud computing, we are going to use RSA and image sequencing password.
Keywords: Security, RSA, Image Sequencing password, Attacks, Cloud Services.
Abstract
A Concise Study on Text Mining for Business Intelligence
C.Kanakalakshmi, Dr.R.Manicka chezian
DOI: 10.17148/IJARCCE.2015.4617
Abstract: Text Mining is the process of extracting interesting information or knowledge or patterns from the unstructured text that are from different sources. The amount of data stored has been enormously increasing day by day in many business organizations, so discovering patterns and trends out of massive data is a great challenge. Many organizations have large amounts of data in the form of unstructured text. For the purpose of knowledge discovery and information retrieval from such textual data text mining is used. Text mining is a kind of data mining technique responsible for retrieving valuable information from collection of text. The Business intelligence systems combine operational and historical data with analytical tools to present valuable and competitive information to business planners and decision makers. This large amount of information can lead to the development of new opportunities for the organization. The use of Text mining in extracting business intelligence is discussed in this paper.
Keywords: Text Mining, Business Intelligence, Data Warehouse, Document Warehouse, ETL.
Abstract
Gi-Fi:- Future Of Wireless Technology
Shikhar Bahl, Rishabh Rai
DOI: 10.17148/IJARCCE.2015.4618
Abstract: Gi-Fi is one of the most important wireless technology that enhances our personal environment, either work or private, by means of networking or a variety of personal and wearable devices within the space and with the outside world. In optical fibers, Gi-Fi played an important role for its high speed large files transfers within seconds. It is a scalable wireless platform for constructing alternative and complementary broadband networks and it operates at 60 GHz on the CMOS process. It will also allow the transfer of wireless audio and video files within a range of 10 meters. The installation of cables in optical fiber caused a greater difficulty and thus led to wireless access. Initially wireless technology includes infrared which was a very slow technology further inventions were done to make wireless technology a better for communication and the invention of Bluetooth, WI-MAX moved wireless communication to a new era.
Keywords: Gi-Fi wireless, Optical Fibers, CMOS Process.
Abstract
A Proposed Method in Image Steganography using Prime Sequence
Renu, Dr. Priti Sharma
DOI: 10.17148/IJARCCE.2015.4619
Abstract: Steganography is the art and science of communicating in such a way that the presence of a message cannot be detected. Itincludes the concealment of information within computer files. This paper considers an information theoretic model for steganography with a passive adversary being proposed. This paper considers an information theoretic model for steganography with a prime number insertion with being proposed. The adversary�s task of distinguishing between an innocent cover message C and modified message S containing hidden information is interpreted as a testing problem. Depending on this evenness, the character is encrypted differently. This paper describes how image degradation improve with this technique as well enhance security with proposed prime technique.
Keywords: Cryptography, Least Significant Bit (LSB), Prime Sequence Generator , Steganography.
Abstract
Dual Tree Complex Wavelet Transform based Noise Reduction Technique
Mr. Parag S. Bhiwadare, Prof. Mithilesh Mahendra, Prof. Sagar Ghormade
DOI: 10.17148/IJARCCE.2015.4620
Abstract: There has been a lot of research work concentrated towards noise reduction in image processing. However, with the wide spread of image usage, the development of new technique for noise reduction is become very important. This paper introduces the novel way to denoise the image, to reduce the noise which is introduced by a particular algorithm based on the random spray sampling technique used for image enhancement. Here a clearer version of an image is recovered from its noisy observation by use of Dual-tree complex wavelet transform (DTCWT). Unlike the discrete wavelet transform, DTCWT allows for distinction of data directionality in the transform space. In each level of the transform, the confirmed deviation of the non-enhanced image coefficient is computed across the DTCWT, then it is normalised which is used to shrink the coefficient of the enhanced image. The coefficients from the non-enhanced image and the shrunk coefficients are mixed and the enhanced image is computed via the inverse transform. An improvement in PSNR and SSIM are observed which clearly tells about the enhancement that can happen in the field of image processing by use of DTCWT.
Keywords: Noise reduction, image enhancement, shrinkage, random spray, Dual-tree complex wavelet transform
Abstract
An Enhancement on Request Rate-Time-Bandwidth for Limiting Replay Attack in MANET
Sreeja Nair M.P
DOI: 10.17148/IJARCCE.2015.4621
Abstract: A Mobile Adhoc Network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Though each node in MANET will act as host as well as router, the security is a major issue and the chances of having the vulnerabilities and attacks are also more. Different types of attacker attempts different approaches to decrease the network performance, throughput. In this paper,I propose an enhancement of Request-bandwidth-time based on selective verification for limiting the impact of a replay attack.
Keywords: MANET,Replay attack,bandwidth,DoS attack.
Abstract
An Efficient Method for Shadow Detection and Removal in Satellite Images by Segmentation
Prasad Kotur, Kiran B
DOI: 10.17148/IJARCCE.2015.4622
Abstract: Shadow features are taken into consideration during image segmentation, and then, according to the statistical features of the images, suspected shadows are extracted. Furthermore, some dark objects which could be mistaken for shadows are ruled out according to object properties and spatial relationship between objects. For shadow removal, inner�outer outline profile line (IOOPL) matching is used. First, the IOOPLs are obtained with respect to the boundary lines of shadows. Shadow removal is then performed according to the homogeneous sections attained through IOOPL similarity matching.
Keywords: Image Segmentation, IOOPL, Shadow Detection, Shadow Removal.
Abstract
Efficient Theme Discovery in Collection of Images
Ms. Aparna N. Gawande, Prof. D. L. Ghade
DOI: 10.17148/IJARCCE.2015.4623
Abstract: To acknowledge the existence frequently appearing object is called Theme discovery. Discovering common objects that appear frequently in a no. of images is challenging problem, due to 1. The appearance variations of the same common object and 2. The enormous computational cost involved in exploring the huge solution space, pruning procedure is image as a collection of visual primitives and propose a novel bottom up approach to gradually prune local primitives to recover the whole common object. A multilayer candidate pruning procedure is designed to accelerate the image data mining process. By searching the subimage of the highest commonness score in each image, we can locate and crop the theme object required.
Keywords: Image Data mining, Theme object Discovery.
Abstract
Providing security to Online Shopping using credit cards through Text Steganography Techniques
Sumathy Kingslin , Vidhya Saraswathi. V
DOI: 10.17148/IJARCCE.2015.4624
Abstract: Maintaining the security of the secret information has been a great challenge. Communication shared through Internet, draws the attention of third parties, hackers and crackers, which may cause attempts to break and expose the unusual messages. Steganography is a promising region which is used for secured data transmission over any public media. In this paper, a text steganography procedure has been planned with the help of techniques: English based text steganography and word mapping technique applied in the online shopping area using credit card transaction. This would help the user credentials and the transaction page in a safe and secure way for the users. Accuracy as a factor, also captured the encryption time measured before and after encrypting the information.
Keywords: Hackers, Crackers, Encryption, English based text steganography, Word mapping technique.
Abstract
Wireless Secured Real Time Supervision and Controlling for Industrial Utility
Mr. Mohammed Junaid , Prof. Shubhangi Borkar
DOI: 10.17148/IJARCCE.2015.4625
Abstract: : The fundamental principal behind this work is to obtain a system that is low cost and a budget wireless data acquisition and monitoring solution for small enterprises. The representation of the system is done using two individual modules, one representing the site called Remote Node and another is to monitor and control all the parameter associated with the remote node called as Access Monitor. The system is designed such that it is easy to implement for small industries as well as can be improved to be used for larger industries with increased input and output parameters. This paper is to represent an embedded communication system developed to be used in any kind of industry who cannot spend more on their monitoring & data logging assets. The system having a master and several slave modules is the idea behind this work with introduction to online data logging mechanism simultaneous to the wireless communication for monitoring. The master is having a LCD display to indicate all real time parameters received through the communicating nodes, and also having alarm system whenever the process value crosses the set point. In the slave node the transducers are connected to the wireless network via microcontroller, the microcontroller is interfaced with micro-SD card for onsite data logging and report generation purpose. Industrial parameters like Temperature, Pressure Level etc., are converted to electrical parameters like voltage and current. This electrical signal is processed at the node itself and an actual value is generated. This is then processed in the microcontroller and the same is stored in the node memory space with the real time stamp, simultaneously the data processed is communicated to the wireless network and displayed on the LCD display board that is the Access Monitor.
Keywords: Real time systems, wireless monitoring, time stamping, data acquisition, micro-SD card, ADC, LCD.
Abstract
Device-to-Device (D2D) Cellular Communication: Group Formation of Devices
Pankil P. Taranekar, Prof. V. V. Dixit
DOI: 10.17148/IJARCCE.2015.4626
Abstract: One of the most important factors of information technology and communication has been the security of the information. For security purpose the concept of Steganography is being used. Imperceptibility and hiding capacity are very important aspects for efficient secret communication. In this paper a new steganography approach proposed based on LSB technique by using ALPHA channel on JPG cover images and Bit-slicing decomposition on the secrete image. for this method first the secrete image decomposed to bit streams and the data encrypted using an encryption method. On the cover side, an alpha channel is attached to the cover image and the data embedded into LSBs of RGBA channels. The method was implemented and tested by using MATLAB� (R2011a).
Keywords: LSB, ALPHA channel, RGBA, Bit-slicing.
Abstract
High Capacity Steganography Method Based upon RGBA Image
Nawar S. Alseelawi, Tarik Z. Ismaiel, Firas A. Sabir
DOI: 10.17148/IJARCCE.2015.4627
Abstract: One of the most important factors of information technology and communication has been the security of the information. For security purpose the concept of Steganography is being used. Imperceptibility and hiding capacity are very important aspects for efficient secret communication. In this paper a new steganography approach proposed based on LSB technique by using ALPHA channel on JPG cover images and Bit-slicing decomposition on the secrete image. for this method first the secrete image decomposed to bit streams and the data encrypted using an encryption method. On the cover side, an alpha channel is attached to the cover image and the data embedded into LSBs of RGBA channels. The method was implemented and tested by using MATLAB� (R2011a).
Keywords: LSB, ALPHA channel, RGBA, Bit-slicing.
Abstract
Application of Extended Kalman filter and Modified Gain Extended Kalman Filter in Underwater Active Target Tracking
Ashok Kumar.N, Shaik Riyaz Ali, G.Purnima Swathi
DOI: 10.17148/IJARCCE.2015.4628
Abstract: For underwater measurements, the noise is very high, turning rate and speed of the platform is low when compared with the missiles in air. In the present paper, Adaptive filters, Extended Kalman filter (EKF) and Modified Gain Extended Kalman Filter (MGEKF), are applied to underwater active target tracking using angles only measurements. Monte-Carlo simulated results for several typical scenarios with Range, Speed and Coarse Errors in tracking using MATLAB software are presented. From the results it is concluded that this MGEKF algorithm is suitable for underwater active target tracking applications.
Keywords: EKF,MGEKF,turning rate.
Abstract
Comparative Analysis of Video Watermarking Technique using 2-level DWT and 3-level DWT
Darshan M S, Sudha B S
DOI: 10.17148/IJARCCE.2015.4629
Abstract: In this paper, 2-level DWT and 3-level DWT is presented and both are compared in frequency domain with quality metrics. In video watermarking, a source video is divided into number of frames and only one frame is considered. That frame is divided into 3-level DWT in these frames high bands of coefficients are selected to implant secret video/watermark logo into the frames which is applicable to all frames in a source video. This will give the assurance to invisibility for HVS. After embedding, watermarking detection is done with the same procedure. Finally comparative analysis is done with the experimental results.
Keywords: Video watermarking, 2-level DWT, 3-level DWT, source video, watermark logo, secret video, PSNR, MSE and SSIM.
Abstract
Adaptive Dorsiflexion and Plantar flexion in Active Ankle Foot Orthosis
Sumitkumar V. Dhule, V. V. Shete, Sunil B. Somani
DOI: 10.17148/IJARCCE.2015.4630
Abstract: Impairments of Ankle foot is caused by spinal cord injuries, multiple sclerosis, cerebral palsy, and polio. Foot slap and foot drag during swing movement of leg are the problem faced during gait. To support such ankle foot impairments orthotic devices are used to achieve the proper gait movements. Currently there are Ankle Foot Orthosis (AFO) which provide assistance for gait which are majorly of passive type. Active AFO is current trend of research. There are many Active AFOs which are recently developed which provide fix dorsiflexion and plantar flexion movement. This paper propose methodology to achieve adaptive dorsiflexion and planter flexion movement of impaired ankle foot depending upon the healthy ankle foot movements.
Keywords: Adaptive Dorsiflexion, Planter flexion, Active Ankle Foot Orthosis, untethered.
Abstract
Automated Glaucoma Detection in Retina from Cup to Disk Ratio Using Morphology and Vessel Bend Techniques
Shradha, Sharangouda N
DOI: 10.17148/IJARCCE.2015.4631
Abstract: Retinal image analysis is gaining popularity due to automated disease detection. More and more opthalmists are performing computer aided scanning of the eye. In such an environment, sophisticated feature extraction of retina can lead to better diagnosis of the eye diseases. Retinal image analysis is challenging because different parts of retina like cup, disk and vessels are independent entities and yet affects the detection of one another. Past works of retinal feature analysis is focused towards extraction of either disk area of the retina or the vessels. The study of retina abnormality and its detection is also studied under separate algorithm. Firstly, morphological technique is used to extract the disk ROI. We then locate the disk area by calculating the vessels and determining the bend. An iterative process is adopted for detecting the Cup area within the disk that follows the energy flow towards the bend. Green color channel analysis method is used for vessels extraction. We also compare canny edge based boundary tracing for Disk detection with that of Circularity based boundary tracing technique. Therefore in this paper we develop a framework for automated retinal feature analysis which can detect the retina features like cup, disk, vessels and finding of CDR ratio.
Keywords: Optic cup to disk ratio, Vessel bend extraction, canny edge, Circle based tracking.
Abstract
Using Map-Reduce performing Online Query Aggregation
M Sabir Chauhan, Rekha Jadhav
DOI: 10.17148/IJARCCE.2015.4632
Abstract: In online aggregation, a database system processes a user�s aggregation query in an online fashion. During the query processing, the system gives the user an estimate of the final query result, with the confidence bounds that become tighter over time.Map-Reduce programming approach have close relationship with cloud computing. Today, online aggregation is a very attractive technology. In this I have described how online aggregation can be built into a Map-Reduce system for large-scale data processing. In this I also describes the detail implementation of OLA models in Hayracks . In literature survey section we have briefly discussed various online aggregation methodology such as OATS,COLA , Parallel Online Aggregation with their advantages and limitations. Lastly, I have presented advantages and limitation of OLA. Online Aggregation is an attractive sampling-based technology to response aggregation queries by an estimate to the final result, with the confidence interval becoming tighter over time. It has been built into a Map-Reduce-based cloud system for big data analytics, which allows users to monitor the query progress, and save money by killing the computation early once sufficient accuracy has been obtained. However, there are several limitations that restrict the performance of online aggregation generated from the gap between the current mechanism of Map-Reduce paradigm and the requirements of online aggregation, such as: 1) The low sampling efficiency due to the lack of consideration of skewed data distribution for online aggregation in Map-Reduce. 2) The large redundant I/O cost of online aggregation caused by the independent job execution mechanism of Map-Reduce.
Keywords: Cloud, Hadoop ,Map-Reduce, Hayracks , Online Aggregation.
Abstract
Design and Fabrication of E-SLOT Microstrip Patch Antenna for WLAN Application
Shailander Singh Khangarot, Gajendra sujediya, Tejpal Jhajharia, Abhishek Kumar
DOI: 10.17148/IJARCCE.2015.4633
Abstract: This paper presents design of E slot microstrip patch Antenna for WLAN Application. The design requirements for the antennas include a VSWR
Keywords: WLAN, E-Slot, HFSS, VSWR, Return Loss, Radiation Pattern, IEEE.
Abstract
A Survey on Node Deployment for Sensing Mobile- Node in WSN
Dr.P.Ponmuthuramalingam, M.Preethi
DOI: 10.17148/IJARCCE.2015.4634
Abstract: Wireless Sensor Networks (WSN) is one of the upgrading technologies to afford a service to the network users. WSN is used to sensing the node to transfer the data among the network sensor nodes. While transferring the data in the sensor node they were faced many issues occurred due to the reasons of power failure, noise volatility, which harmfully influence the coverage of the WSNs. These problems were occurred due to the coverage problem among the nodes and also node deployment is also a major issue in WSN. To solve this problem many approaches where proposed like Dense sensor node deployment, Battery-powered sensor nodes, Self-configurable, Severe energy, computation, and storage constraints. They were provided some of the drawbacks to sensing the node in the network. In this survey we analyzed various authors� techniques and also we analyzed how to sense the node in the network.
Keywords: WSN, Mobile Sensing node, Node Deployment, Data transfer and Energy conservation.
Abstract
Study of Traffic Generation Tools
Sudhakar Mishra, Shefali Sonavane, Anil Gupta
DOI: 10.17148/IJARCCE.2015.4635
Abstract: To evaluate performance of different traffic generators, a comparison is required to find out most suitable traffic generator for particular application which could help researchers to evaluate a network in a better way. This paper presents a comprehensive survey of six most popular traffic generators. Traffic Generators are used to generate synthetic traffic to check network performance. Discussion on characteristics and capabilities of these tools help researchers to select particular tool for their application and also for developers to find new possibilities of development. Paper uses some prior experimental results to compare these tools on the basis of Throughput.
Keywords: Traffic Generation, Internet.
Abstract
Automatic Retina Feature Analysis for Glaucoma Detection using Cup to Disk Ratio Based on Morphology and Hough Circle Based Techniques
Shruti P Y, Sharangouda.N
DOI: 10.17148/IJARCCE.2015.4636
Abstract: Automated feature extraction like cup and disk of retina has great significance in automatic retina analysis and diagnosis. This leads computer aided diagnosis of the eye diseases, especially Glaucoma. The major challenge in Retina image analysis is to obtain the boundary and the area mask of cup and disk. Automated detection of cup and disk area demands sophisticated morphological and image processing applications to make the boundary more prominent and hence detectable with higher accuracy. This paper proposes a unique technique of Disk and Cup detection technique with the help of morphological and gray level processing of the image and improves the performance of disk detection using Hough circle method. This paper analyzes the performance of the techniques under the presence of noise and proposes a suitable adaptive median filtering method for suppressing the noise and detecting the accuracy of the image.
Keywords: Cup to Disk Ratio (CDR), Fundus, Glaucoma, Hough transform and Region of Interest (ROI).
Abstract
A Survey on VANET Security using ECC, RSA & MD5
Rukaiya Shaikh, Disha Deotale
DOI: 10.17148/IJARCCE.2015.4637
Abstract: Now a day, Vehicular Ad-hoc Networks (VANET) are becoming more popular as the accident statistics increase. VANET simply provides many safety applications to save people lives while driving on road, It also eliminate accidents and damage to the vehicles and people. VANET also save our time by providing information about busy traffic on ongoing road. But on the other hand we should also consider some of the security related issues such as privacy of drivers including location and identifier information should be preserved in the network. So for preventing many of attacks and also preserving privacy of drivers, many protocols need an infrastructure for key distribution, revocation and secure exchange of the messages containing private information. For providing secure communication here using various cryptography based methods. Some security mechanisms used for encrypting and authenticating V2V and V2I messages comes with overhead in terms of computation and communications between the vehicles. Therefore, in order to increase the feasibility and better performance of cryptographic based protocols, we should have to investigate operation of different cryptography based methods. Due to high mobility nodes in the network or high speed vehicles we need to select appropriate cryptographic method that should have a very little processing time, have a small key length, small of length of created message as much as possible and have an acceptable level of safety over the key lifetime. In this survey paper, system described various cryptographic algorithms such as RSA, Elliptic Curve Cryptography, and Message Digest 5(MD5) with their pros and cons. They provide better security and privacy if we use combination of this algorithm. In this survey work, briefly described the comparison between the RSA and ECC.
Keywords: Elliptic Curve Cryptosystem, Elliptic Curve Integrated Encryption Scheme, MD5, RSA.
Abstract
Web Service Recommendation Based on Usage History
Nikita R. Gurjar, Dr. Sandeep V. Rode
DOI: 10.17148/IJARCCE.2015.4638
Abstract: With the rapid development of technologies based on Web service, large quantities of Web services are available on the Internet. Web service recommendation aims at helping users in designing and developing service-oriented software systems. How to recommend web services with better QoS value receives a lot of attention. The modern information systems on the Internet are services integrated software components for the support of interoperable machine to machine interaction over a network. Web services have been widely employed for building service-oriented applications in both industry and academia in recent years. The number of publicly available Web services is steadily increasing on the Internet. However, this proliferation makes it hard for a user to select a proper Web service among a large amount of service candidates. An inappropriate service selection may cause many problems (e.g. ill-suited performance) to the resulting applications. In this system, we propose a location-aware Web service recommender system which helps users to select services with optimal Quality-of-Service (QoS) performance. Our recommender system employs the location information and QoS values to cluster users and services, and makes personalized service recommendation for users based on the clustering results.
Keywords: Web service, service recommendation, quality of service (QoS), service selection.
Abstract
Zero Knowledge Protocols for Attacks in Wireless Sensor Networks
Akash S, Deepak S Sakkari
DOI: 10.17148/IJARCCE.2015.4639
Abstract: Wireless Sensor Networks (WSN), an emerging promising technology; it is used widely in diversified real-time applications. WSN offers outstanding occasions to scrutinize different types of environments. Examples for different types of environments are Traffic inspection and traffic supervision, buildings, environment monitoring, smart homes and many more scenarios. Nowadays, the network security i.e., wireless sensor network security has became a most important disquiet for WSN designers as no any manual controlling of nodes and extensive security applications. In this project, an attempt has made to illustrate some of the active attacks that usually occur in networks in the data transmission process. Zero Knowledge Protocol, the key generation algorithm is utilized to address clone attack by integrating unique finger-print to each individual node. The finger-print is created using adjacent nearest neighbour node information and the node itself. Man in middle attack and reply attack can also be avoided with this protocol i.e., ZKP.
Keywords: Wireless Sensor Network, Zero Knowledge Protocol, Cluster Head, Base Station, MITM.
Abstract
Shape based data Hiding Steganography as well as Steganalysis for Secure Communication System
Khushboo Jain, Amrit Kaur
DOI: 10.17148/IJARCCE.2015.4640
Abstract: With the increase in rate of unauthorized access and attacks security of confidential data is important. In this paper shape based data hiding algorithm is proposed for steganography as well as Steganalysis is done. In this algorithm, shape is taken to hide the data in an image. The secret information can be hidden only in the pixels which are available in the shape, instead of hiding secret information in whole image. After that at Receiver the data is extracted from shape. In this paper, Mean Square Error and Peak Signal Noise Ratio are calculated for different shapes.
Keywords: MSE,PSNR, LSB.
Abstract
Progressive visual cryptography scheme without pixel expansion for color images
Fersna S. , Athira V.
DOI: 10.17148/IJARCCE.2015.4641
Abstract: This paper proposes a new progressive visual cryptography (PVC) scheme for color images without any pixel expansion based on the halftoning technique. PVC is a special encryption technique which can be utilized to recover the secret image gradually by superimposing more and more shares. If we only have a few pieces of shares, we could get an outline of the secret image; by increasing the number of shares being stacked, the details of the hidden information can be revealed progressively. Firstly, a chromatic image is decomposed into three monochromatic images in tones of red, blue and green. These three images are transformed into binary images by halftone technique. The secret image shares from binary images are obtained by the unexpanded VC algorithm. To prevent attack from hackers, the secret image shares are watermarked with different cover images and are transmitted. At the receiving side the cover images are extracted from the shares and stacked one by one which reveals the secret image progressively. This scheme provides a more efficient way to hide color images in different meaningful shares without any pixel expansion, providing high security and recovered images with high contrast.
Keywords: Visual Cryptography (VC), halftoning, color image, PVC, watermarking, shares, Visual Secret Sharing (VSS).
Abstract
Role of External Factors on Outcome of a One Day International Cricket (ODI) Match and Predictive Analysis
Mehvish Khan, Riddhi Shah
DOI: 10.17148/IJARCCE.2015.4642
Abstract: The outcome of a One Day International (ODI) cricket match depends on various factors. This research aims to identify the factors which play a key role in predicting the outcome of an ODI cricket match and also determine the accuracy of the prediction made using the technique of data mining. In this analysis, statistical significance for various variables which could explain the outcome of an ODI cricket match are explored. Home field advantage, winning the toss, game plan (batting first or fielding first), match type (day or day & night), competing team, venue familiarity and season in which the match is played will be key features studied for the research . For purposes of model-building, three algorithms are adopted: Logistic Regression, Support Vector Machine and Na�ve Bayes. Logistic regression is applied to data already obtained from previously played matches to identify which features individually or in combination with other features play a role in the prediction. SVM and Na�ve Bayes Classifier are used for model training and predictive analysis. Graphical representation and confusion matrices are used to represent the various sets of models and comparative analysis is done on them. A bidding scenario is also considered to explain the decisions that can be taken after the model has been built. Effect of this decision on the cost and payoff of the model is also studied.
Keywords: Analytics, Cricket, Sports Prediction, Logistic Regression, Na�ve Bayes, Support Vector Machine
Abstract
Analyzing Gender Divide in Mobile Phone Adoption
Kapou Malakar
DOI: 10.17148/IJARCCE.2015.4643
Abstract: The paper uses ethnographic practices to apprehend the complexity of gender divide in the adoption of mobile phone and services in Sonitpur District and in Guwahati, Assam. The paper examines the barriers to effective use of mobile phone by women. The findings suggest that women�s experience in technology domestication within and outside household can challenge the negative societal attitudes towards women as a passive users of technology. Mobile phone can be a substitute to larger digital divide and an instrument for women�s empowerment to increase women�s autonomy in family and community.
Keywords: Women Empowerment, Gender-based Challenges, Mobile phone, Social Support Network, ICT, Housewives, Rural Households, Informal Sector
Abstract
A reflection on the current status of Telecommunication in North Eastern Region with special reference to Assam
Kapou Malakar
DOI: 10.17148/IJARCCE.2015.4644
Abstract: The paper discusses the challenges in rolling out telecom services in states of North East Region of India and current status of Telecommunication in Assam including the wireless tele density of the state. Interview with the representative of the Government officials of Department of Telecommunication support to examine the present and future schemes of rolling out telecom services in North East Region. The paper also examines the project initiative of USOF, broadband for all in North East Region. The telecom operators in India have made heavy investment on 3G spectrums. To ensure equitable distribution of basic amenities and services across geographical distance through the support of MVAS, adequate network coverage across the country, incessant connection between District Head Quarter and Gaon Panchayats and penetration of mobile phones in non-urban areas is a critical requirement.
Keywords: North East Region, Telecommunication, Challenges to Telecommunication, Wireless, Tele-density in Assam, Telecommunication and Development.
Abstract
Performance Evaluation of Ad-Hoc Protocols in MANET and VANET
K. Vijayalakshmi, Dr. R. Manicka Chezian
DOI: 10.17148/IJARCCE.2015.4645
Abstract: A mobile ad hoc network is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. They use wireless connections to connect to various networks.One new type of ad-hoc network in Vehicular Ad-Hoc Network in which vehicles constitute the mobile nodes in the network. The ad-hoc protocols in Mobile Ad-Hoc network is already is introduced earlier. But the pattern of working in VANET and MANET is quite different in nature even for multimedia data performance is quite different than ordinary data over scenario the simulator to simulate the given network. This paper provides insight into ad hoc routing protocols (DSDV, AOMDV) and their metrics (Throughput, end to end delay, Packet loss) using NS2. The performance differentials are analyzed using varying metrices. These simulations are carried out using the ns-2 network simulator.This paper presents comparison based on simulation of routing protocol of MANET and VANET.
Keywords: VANET, MANET, Ad-hoc network, Routing protocol, simulator.
Abstract
Child Tracking System on Mobile Terminal
Rohit N. Bhoi, Dr. V. V. Shete, S.B.Somani
DOI: 10.17148/IJARCCE.2015.4646
Abstract: Now a day both parent are working outside for their respective job, so because of this no one is with their child who can keep observation like whether child is coming safely from school or not, whether child is happy at school atmosphere or not etc. So point arises how parent can keep these observation while seating in their respective office. The answer is child tracking system on mobile terminal. The proposed system includes a child module which have GPS, GSM, and ARM7 and voice playback circuit and parent module which includes mobile phone (which supports internet connectivity) for getting the information about the missed child on periodical basis. Addition to the proposed system is that parents don�t have to continuously monitor the location of child, if child is going outside of define area then alert message will be given to parents. Also if child is crying then also alert message will be send to parents. Child module have one panic switch, with the help of which child can alert parents.
Keywords: Child Tracking System, Global Positioning System (GPS), Global System for mobile communication (GSM), ARM7
Abstract
Full Custom Physical Design of 4-Bit High Speed CSLA Using Grid Based Routing and Standard Cells
Somshekhar.R.Puranmath, Archana.S.Kori
DOI: 10.17148/IJARCCE.2015.4647
Abstract: High speed addition and multiplication has always been a major requirement of high processing unit. The speed of addition and multiplication operations depends on speed of adders used in the design. Ripple carry adders (RCA) has better area utilization but has more delay, whereas the Carry Select Adder(CSLA) use two RCAs and increases the speed. The regular Carry Select Adder consists of dual ripple carry adders and multiplexers. The carry out calculated from the last stage i.e. least significant bit stage is used to select the actual calculated values of the output carry and sum of the next bit stages. The main disadvantage of regular CSLA is the large area due to multiple pairs of RCA and more power consumption. The modified CSLA using Common Boolean Logic (CBL) structure replaces the multiple use of RCA by using one inverter (INV) and OR gate. By using multiplexers, we can select the correct output result according to the logic state of carry-in signal from the previous bit stage. This structure consumes less area, delay and power. In this paper we have implemented two architectures of CSLA and simulated in cadence Spectre and compared the parameters like delay, area and power. The layout of CSLA using CBL logic is implemented using Cadence Layout editor-virtuoso with Standard cell library and grid routing techniques.
Keywords: Carry select adder, standard cell library, grid based routing.
Abstract
Design and Implementation of Intelligent Vehicle System based on ARM Cortex
Anagha Vaidya, Mahesh T. Kolte
DOI: 10.17148/IJARCCE.2015.4648
Abstract: This paper gives the design and implementation of the intelligent vehicle system using ARM cortex M4 as core controller for the purpose of safe and comfortable driving. Since ARM cortex M4 comes with many different features such as high efficiency, low cost and low power consumption. The system uses the speech recognition principle to improve the interaction between the human and machine. The system gives experimental results for five voice commands that are forward, backward, left, right and stop. The highly accurate ultrasonic sensor is used to detect the objects around the car. The system uses the CNG sensor which is highly sensitive to natural gas to detect the leakage of CNG from CNG kit, which is mostly used in vehicle nowadays.
Keywords: Intelligent vehicle, ARM cortex, speech recognition principle, CNG sensor, ultrasonic sensor.
Abstract
Analysis of Driver’s Skills from Passenger’s Comfort
Sarang P. Suryawanshi, Sunil. B. Somani, Virendra. V. Shete
DOI: 10.17148/IJARCCE.2015.4649
Abstract: This paper presents the factors of the dynamic motion which affect the comfort of the passengers. The extreme tilts by the driver and vibrations of the vehicle due to defects on pavement shows the way driver drives. These factors indirectly reflect the behaviour of the driver and driving skills. These eventually affect the comfort of the passengers inside the vehicle. The system develops a vehicle embedded data acquisition system. The data is collected on-board and stored into the external memory for further reference. The tilt of the vehicle is measured using the 3-axis accelerometer. The vibration is detected using the vibration sensor. The global positioning system (GPS) allows detection of the exact location where the reckless driving is done, defects on the pavements. Thus the system is to capture the data coming from these sensors during the journey. Over the complete journey the captured data in the memory reports the location of reckless driving along the journey.
Keywords: Driver�s skills, passengers comfort, tilt, defects on pavement, 3-axis accelerometer, vibration sensor, global positioning system, external memory.
Abstract
Efficient quality analysis and enhancement of MRI image using Filters and Wavelets
G.Amar Tej, Prashanth.K.Shah
DOI: 10.17148/IJARCCE.2015.4650
Abstract: Pre-processing techniques in image processing are efficiently used to improve the quality of the image before using into any real time application. These pre-processing techniques uses neighborhood pixels in the input image to get new brightness values of the desired output image .These pre-processing techniques hire filtration and resolution enhancement in to it .noise and resolution are the main quality parameters in medical images. The main objective is to improve the image quality by denoising and by resolution enhancement. Noise is the main factor that degrade most of the medical imaging techniques .So to preserve the edges and contour information of the medical images, an improved image enhancement technique and the efficient denoising is required. In this we concentrate on the average filtering, median filtering, wiener filtering and wavelet denoising for image denoising and an interpolation based Discrete and stationary Wavelet Transform technique for resolution enhancement. These technique performance is evaluated using Peak Signal to Noise Ratio (PSNR). From the results, it reveals that the efficient denoising and resolution enhancement technique is essential for image pre-processing.
Keywords: Pre-processing , Filtering, Denoising, PSNR, Noise, Resolution enhancement.
Abstract
A Survey on Sentiment Analysis in NLP
Divya Bohra, Sanjay Deshmukh
DOI: 10.17148/IJARCCE.2015.4651
Abstract: The ever growing usage of Web articles have resulted in change of web from read only to read write. This has led to the evolution of Sentiment Analysis, which is nothing but analysing the emotions of the given text. Sentiment analysis is a branch of Natural Language Processing (NLP). Sentiment analysis is done on the content such as online news, reviews, blogs, and tweets for social events, political movements, company strategies, marketing campaigns, product preference etc. This paper, will give the overall view of sentiment analysis. It also discusses about Common Knowledge Base and Common Sense Knowledge Base. Hour Glass Model is also discussed in the paper which is effectively being used for sentiment analysis. Finally, various approaches for sentiment analysis have been discussed and compared based on their advantages and disadvantages. It has been found that concept based approach is best suited for sentiment analysis, as it is applicable to multi-word expression.
Keywords: Natural Language Processing; Sentiment analysis; Hour Glass Model; Opinion Mining; Knowledge Base; Concept based approach.
Abstract
A Comparative Study and Review for Human Action Recognition
Brenda M, Arun P.S
DOI: 10.17148/IJARCCE.2015.4652
Abstract: This paper presents a study and review of state-of-the-art research papers on human action recognition. One of the challenging issue is the process of recognizing and understanding of human actions from videos owing to large variations in human appearance, pose changes, scale changes etc. The most important approach for human action recognition is to extract features from videos as representations.It is a main area of computer vision approach.The main applications include surveillance systems, patient monitoring systems, and a number of systems that involve interactions between persons and electronic devices such as human-computer interfaces. Almost all applications require an automatic recognition of high level activities. A brief overview of various state-of-the-art research papers on human action recognition is discussed here.Action Recognition based on Sparse Representation is one of the latest method for a higher recognition accuracy and improving the performance.For this any Datasets can be used Weizmann Human Action Dataset, UCF Sports dataset, Ballet Dataset.
Keywords: Background subtraction, segmentation, K-SVD Random Projection, Gaussian Smoothing.
Abstract
RC4 and DES based Cloud Computing Data Security and Comparison
Sheetal Mahalle, Ranjeet Jaiswal
DOI: 10.17148/IJARCCE.2015.4653
Abstract: Cloud computing is wider used now a days because of on demand use, flexibility, virtualization, easy portability etc. features. The features are useful in all areas and widely used by different customers like Social websites, E-Commerce, Education and heavy data warehouse system. As huge data can be shared and distributed with the requested resources very vastly so the need of security arises in the cloud computing workflow. So for securing the cloud data as a trusted party developed a secure framework with the help of RC4 and DES capability. User control is the primary security concern provided in our paper. Distributed virtualizations on demand advantage are also included with the attack detection mechanism, so the method will provide better security in self-loop user also.
Keywords: Cloud Computing, Virtualization, Security, RC4, DES.
Abstract
Development of Home Health Care Self Monitoring System
Darshana Varma, V. V. Shete, S. B. Somani
DOI: 10.17148/IJARCCE.2015.4654
Abstract: With rapid aging and economic growth, people became more interested in their long-term health, fitness and wellness. Statistics says that every human is losing his/her life across the globe every minute. In India, everyday many lives of human are affected by heart attacks and more significantly, because the patients did not take timely and proper service. Care of critically ill patients, requires immediate & correct decisions so that life-protecting & lifesaving therapy can be properly applied. Analysis of health parameters of patients after post hospitalization is very difficult. It is necessary to monitor patient�s health after he is discharged from the hospital. In this project, we implemented a real time self home healthcare analyzing system which can monitor heart rate, blood oxygen saturation and temperature. For this purpose we have used heart rate sensor, oxygen saturation sensor, body temperature sensor. The obtained bio-signal from the each sensory unit is transmitted using a Bluetooth wireless communication in real time at home to the personal computer as well as on the smart phone. We have also used accelerometer in order to alert other family members whether the patient is on his bed or fallen down from the bed. Buzzer is used to alert the other members to indicate any abnormal condition.
Keywords: Post Hospitalization, Heart Rate, Oxygen Saturation, Body Temperature, Bluetooth wireless communication.
Abstract
Android Based Smart Learning and Attendance Management System
Rakhi Joshi, V. V. Shete
DOI: 10.17148/IJARCCE.2015.4655
Abstract: An Education system in India has become so advanced in last decade due to the development of the technology. Smart class, video conferencing are some of the examples of modern trends in educational system. These applications help the institute to move forward quickly, fulfil their vision and accomplish their goals, E-way. The core idea of research project is to implement Android based application for attendance management system for advancement of institution and educational system. The proposed project will be implemented in applications such as online study material, notices, academic calendar and online reminders of examination, online attendance record, performance record, and parent intimation system using Android applications. This system helps teacher to take attendance through smartphone and keep record of students for their progressive assessment. This system gives a prior intimation to student as soon as their attendance goes below the specified attendance threshold in the form of an SMS.
Keywords: Android, Attendance management, E-learning, GPRS, smart phone, etc.
Abstract
Design and Stimulation of New Fractal Antenna with Improved Return Loss at Various Frequencies for Ultra Wide Band Applications
Deepti Singh, Sukhwinder Kumar
DOI: 10.17148/IJARCCE.2015.4656
Abstract: In this paper the design of micro strip feed ultra wideband fractal antenna under different resonance frequency. A single feed compact fractal antenna for multi band is demonstrated in this paper. Five iteration is introduced over the patch for reducing the resonant frequency. Four resonant frequencies at 1.95 GHz, 3.6 GHz, 4.8 GHz, and 6.4 GHz respectively are obtained for the proposed antenna. The experimental results of fractal antenna shows ultra wideband characteristics from frequency range of 1.8GHz to 6.5 GHz.CST software is used to design and stimulate the proposed antenna and extensive analysis of return loss is done for the same.The simple design of proposed antenna makes it suitable for application in UWB,C band and satellite communication.
Keywords: Fractal, ultra wideband (UWB) antenna, Partial ground plane, Micro strip feed-line.
Abstract
Design of Parallel CRC Generation for High Speed Application
Chaitali Tohgaonkar, Prof. Sanjay B. Tembhurne, Prof. Vipin S. Bhure
DOI: 10.17148/IJARCCE.2015.4657
Abstract: A Cyclic Redundancy Check (CRC) is the remainder or residue of binary division of a potentially long message, by a CRC polynomial. This technique is ubiquitously employed in communication and storage applications due to its effectiveness at detecting errors and malicious tampering. The hardware implementation of a bit-wise CRC is a simple linear feedback shift register. This means that �n� clock cycles will be required to calculate the CRC values for an n-bit data stream. This project primarily focuses on error detection in the Ethernet applications. This paper presents implementation of parallel Cyclic Redundancy Check (CRC) based upon DSP algorithms of pipelining, retiming and unfolding. The architectures are first pipelined to reduce the iteration bond by using novel look-ahead techniques and then unfolded and retimed to design high speed parallel circuits. The methodology to be employed with VHDL, Xilinx ISE for simulation and test-bench verification.
Keywords: Cyclic Redundancy Check (CRC), Parallel Pipelining, LFSR, VHDL code.
Abstract
Bandwidth Enhancement of MHD Antenna for Wireless Applications
Faizan Hameed, Rajesh Parihar
DOI: 10.17148/IJARCCE.2015.4658
Abstract: In this Paper Dielectric Resonator Antennas (DRAs) have received lots of attention in the last two decades due to several attractive characteristics such as high radiation efficiency, light weight, and low profile. There is also increasing challenges for the design of high bandwidth and multi-bands antennas which can be achieved using MHD Antennas for high speed and reconfigurable applications in wireless communication. In this work the objective is to design and develop a cylindrical MHD antenna with circular patch and two annular rings. Magneto-hydrodynamics (MHD) Antenna is a Fluid based Antenna in which the fluid resonator provides excellent coupling of RF energy into fluid. Fluid resonator volume, chemical properties, electric field and magnetic fields are the factors of resonant frequency, gain and return loss. The proposed antenna shall be tuned in the wide band of frequency range between 7.9 � 27 GHz.
Keywords: MHD, DRAs, isolation, coupling etc.
Abstract
Survey on PAPR Reduction Techniques in OFDM System
Shilpa Sharma, Pradeep Kumar Gaur
DOI: 10.17148/IJARCCE.2015.4659
Abstract: Orthogonal frequency division multiplexing (OFDM) is perhaps the most spectrally efficient, robust transmission technique discovered so far for communication systems, and it also mitigates the problem of multipath environment. Due to its advantages in multipath fading channel e.g. robust against ISI, ICI and some other advantages like best QoS for multiple users, efficient usage of bandwidth it is suggested to be the modulation technique for next generation 4G networks e.g. LTE. But along with all its advantages there are some disadvantages also e.g. High PAPR (Peak to Average Power Ratio) at the transmitter end and BER (Bit Error Rate) at the receiving end. OFDM is used in the downlink of 4G networks. To reduce the problems of OFDM some techniques e.g. SLM, PTS, Clipping, Coding, & Pre-coding etc are suggested but none of them is reduce the PAPR and BER to an acceptable value. This Paper will discuss some techniques of PAPR & BER reduction, and their advantages and disadvantages in detail.
Keywords: PAPR, BER,OFDM, PAPR reduction techniques.
Abstract
Aodv and Olsr Based Routing Algorithm for Highway and City Scenarios
ShubhrantJibhkate, Smith Khare, Ashwin Kamble, Amutha Jeyakumar
DOI: 10.17148/IJARCCE.2015.4660
Abstract: The paper proposes routing algorithm for VANET (Vehicular Ad- Hoc Network) based on Ad-hoc on Demand Distance Vector (AODV) and Optimize Link State Routing Algorithm (OLSR) protocol. The algorithm implemented enables the way for optimization of the routing parameters. The algorithm takes into account the merits and demerits of both the protocols in the city and highway scenarios to implement an effective routing algorithm. The algorithm aims at improving the performance parameter of the routing such as end to end delay, throughput and packets delivery ratio for city and highway scenarios are calculated.
Keywords: VANET, AODV, OLSR, Routing Protocol.
Abstract
Energy and Traffic Aware Vertical Handoff in Heterogeneous Wireless Network
Ashwin Kamble, Smith Khare, Shubhrant Jibhkate, Amutha Jeyakumar
DOI: 10.17148/IJARCCE.2015.4661
Abstract: The next generation mobile networks have the development trend of integration of cellular networks and Wireless Local Area Networks (WLAN).Considering the heterogeneous environment, Universal Mobile Telecommunication System (UMTS) of cellular technology and WLAN (over IEEE 802.11) are the most promising networks. Integration of these two networks facilitate user for the seamless communication. Handoff decision making is the main challenging issue in the integration of UMTS and WLAN networks.Efficient vertical handoff algorithms are required to maintain the acceptable level of quality and seamless connectivity in heterogeneous wireless environment. Various metrics have been considered such as bandwidth, energy, traffic, distance, monetary cost to make handoff decision.A novelhandoff decision making algorithm using fuzzy rule for meeting the requirements of heterogeneous networks is proposed in this paper.WLAN and UMTS are considered as two integrated network entities.Handoff decision metrics for the proposed algorithm are energy, traffic and cost. The algorithm allows the mobile terminal to have the seamless connection with most energy efficient and cost effective network weighted with the handoff metrics such as energy, traffic and cost.
Keywords: WLAN, UMTS, Heterogeneous Wireless Networks, Vertical Handoff.
Abstract
Insider Attack Detection System (IADS) in MANETs
Rangachary K, Dr.S.Naganjaneyulu
DOI: 10.17148/IJARCCE.2015.4662
Abstract: The migrating towards wireless network from wired network has become latest popular global trend in past few decades. The versatile properties of wireless networks created it possible in countless applications. Involving all of the contemporary wireless networks, Mobile Adhoc NETwork (MANET) provides essential and unique applications. Because of its awesome abilities like mobility, scalability and self configuration, the MANET has been wide spread in many applications like military, rescue operations, some tactical conditions and the like. The intrinsic nature of Adhoc networks makes them vulnerable to various passive and active attacks and thus it is vital to build an efficient intrusion detection mechanism to protect MANET from attacks. Prevention methods for attacks alone are not sufficient to make them secure. So, Intruders have to be detected at the early stages of data transmission. To acquire security we are proposing A Novel Intrusion detection system (NIDS) named Enhanced Adaptive ACKnowledgement (EAACK) is introduced for Insider Attackers (IA) in MANETs by using normal end to end ACK scheme, Secure ACK (S-ACK) and Misbehavior report Authentication (MRA) scheme. The proposed system eliminates the existing system weaknesses like Receiver Collision, Limited Transmission power and false misbehavior report. EAACK yields better results compared to all modern techniques for misbehavior detection by reducing the routing overhead and by increasing the network performance. The three parts of EAACK (ACK, SACK and MRA) are acknowledgement based detection systems. To detect the misbehaviors in the network, the three schemes rely on ack packets. All ack packets are authentic and untainted. Otherwise the attackers forge the ack packets. So, we include Digital Signature in EAACK to ensure the integrity of Intrusion Detection system.
Keywords: MANET, Insider attack, Digital Signature Algorithm (DSA), MRA.
Abstract
An Impulsive Wireless Adhoc Network for Secured Protocol
Chandra Mounika P, Subba Rao k
DOI: 10.17148/IJARCCE.2015.4663
Abstract: Mobile Adhoc network is a group of wireless nodes that form a network without any kind of infrastructure support. Security in wireless adhoc networks is hard to transmit the data. By using an impulsive wireless adhoc network we can easily provide security for the data transmission. An impulsive adhoc network uses hybrid even symmetric or asymmetric keys. It establishes trust between users in order to exchange the secret keys to encrypt the data. Depending on first visual contact the trust will be based among users. Our proposal is a complete protocol towards oneself safe convention that can make the users to share information in secured manner. This protocol contains all functions required to operate without any external support. It has been verified and implemented in order to check the performance and procedure of protocol in adhoc networks.
Keywords: Impulsive, data transmission, security, hybrid scheme, session keys.
Abstract
License File Generator Using MAC Address
Anirudha A. Kolpyakwar, Piyush M. Dhande, Pallavi A. Chaudhari
DOI: 10.17148/IJARCCE.2015.4664
Abstract: Whenever any customer purchase any software application (product) from vendor then customer needs serial key or product to start application, this serial key is provided by the vendor of software application but sometimes some users cracks this serial key and uses the features of software application without any permission of vendor that is against the policy of software company. But some users are having different techniques, they purchase single license from the vendor and uses the application in multiple machines or network that is also against the policy of Software Company. In this paper we proposed License file generator using MAC address of the system that will provide security against piracy of the software application.
Keywords: MAC address
Abstract
Behavioral Study of Different Adaptive Modulation Techniques in MIMO Transmission: A Review Paper
Ms. Madhuri Gehlot
DOI: 10.17148/IJARCCE.2015.4665
Abstract: Adaptive modulation (AM) technique may make more promote in the execution of wireless communication systems through adaptively conformity transmitter parameters to fading channels; therefore, it has been taken as one of the key physical techniques. Error performance and throughput in MIMO wireless systems can be improved through the use of Adaptive Modulation. Adaptive modulation selection plays an important role in wireless communication since the wireless channel conditions vary progressively. This paper offers a general overview of the adaptive modulation scheme in wireless multiple-input multiple-output (MIMO) systems.
Keywords: Adaptive modulation, multiple input multiple-output (MIMO), Orthogonal frequency division multiplexing (OFDM), Bit error rate (BER).
Abstract
Software Failure Analysis of Brake-By-Wire Automotive Safety Critical System using FMEA, FTA and MATLAB Techniques
Dr. M. Ben Swarup, B. Hari Prasad
DOI: 10.17148/IJARCCE.2015.4666
Abstract: Safety critical systems are those systems whose failure could result in loss of life, significant properity damage, or damage to the environment. In cars we have common Braking System. The braking system like mechanical and hydraulic braking systems. The replacement of traditional mechanical and hydraulic control systems with electronic control devices or electronic components. The electronic braking system is known has Brake-By-Wire system. Brake-by-wire (BBW) technology in automotive industry is the ability to control brakes through electrical means. The increasing usage of brake-by-wire system in the automotive industry has provided manufacturers with the opportunity to improve both vehicle and manufacturing efficiency. In developing safety Brake-By-System for the automotive industry, potential hazard analysis techniques have to be applied to identify potential failure modes. The commonly used safety analysis techniques are FMEA (Failure Mode Effect Analysis) and FTA (Fault Tree Analysis). The basic design constraint for this application is we are considering the speed of the vehicle, frontal distance of the car and Brake pressure as an input to the application. Considering all these inputs we are calculating the Minimum Brake pressure car. The pressure value convert to electrical signal by VCU, It can transfer to Brake Control Unit(BCU). The Brake Control Unit perform to applied particular pressure to each Wheel that time the vehicle can stop. If the pressure value crosses the Within range value then the System is give a alert message. The purpose of this paper is to discuss Failure Modes and Effects Analysis (FMEA) and Fault Tree Analysis (FTA) based safety-critical approach towards to development of Brake-By-Wire system from a safety perspective. At the same time the safety critical Brake-By-Wire system is simulated in MATLAB to provide safety to the system with Transmission Controller.
Keywords: Safety critical system, safety analysis, failure analysis,, FMEA, FTA
Abstract
Codebook Based Vector Quantization Technique for Song-to-Song Retrieval
Ms. Shabnam R. Makandar, Mrs. V. L. Kolhe
DOI: 10.17148/IJARCCE.2015.4667
Abstract: Digital music is widely used now-a-days. The systems are required for user to find the music the need. The attention has been an increasing on learning feature representations from audio data used in various MIR problems. The key element for relevant retrieval is the audio content representation. Good representation should be short, terse, efficient, and easy and fast to compute. The Bag-of-Frames (BoF) approach is evaluated. In this approach, low-level MFCC and PLP features are explored from the audio signal of songs. The encoding stage is added with pre-computed codebook and pooling stage gives compact representation for the feature vector. A Vector Quantization (VQ) encoding method using Online Dictionary Learning (ODL) algorithm performs well in query-by-example task of MIR to decrease the runtime of relevant retrieval. Experimental result shows that PLP performs better than MFCC.
Keywords: Audio content representation; music information retrieval; MFCC; PLP; sparse coding; bag-of-frames; vector quantization.
Abstract
Survey on Sybil Attacks and its Defensive Measures
Neha Gahlot
DOI: 10.17148/IJARCCE.2015.4668
Abstract: Wireless sensor network are used in many fields now days like military application and ecolological area like flood detection and various other fields like health related. So the security of wsn is important issue. There are some constraints in wsn such as low battery and less memory which can lead to severe attacks in wsn. There are many attacks in wsn one of them is sybill attack. Sybill attack is an attack in which nodes illegally take multiple identities. In this paper we will discuss the taxonomy, classification of sybill attack and there defence mechanism.
Keywords: Sybil Attack, defence, Sensor Networks, Security, peer to peer system.
Abstract
A Review:Comparative Study of Routing Protocols for Adhoc Networks
Charanjeet Singh
DOI: 10.17148/IJARCCE.2015.4669
Abstract: A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure. Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at uncertain times. There are several familiar routing protocols like AODV, DSR, DSDV etc. which have been proposed for providing communication among all the nodes in the wireless network. In this paper, we have presented a review of these routing protocols and analyze them through various protocol properties. Also a comparison between routing protocols like AODV, DSR and DSDV is presented.
Keywords: MANET; AODV;DSDV; DSR.
Abstract
Performance Analysis of Different Spectrum Sensing Techniques in Cognitive Radio under Different Fading Channels
Sheen Mary Jacob, Nandan S.
DOI: 10.17148/IJARCCE.2015.4670
Abstract: Radio frequency spectrum is a very valuable resource in wireless communication. Its usage is increasing day by day at a tremendous rate. Since the available spectrum is limited, there is a need to find a way, to efficiently utilize this scarce spectrum. Cognitive radio is a huge step towards this. Cognitive radio helps the secondary users to use the unused licensed spectrum and drop out it when primary users are active. Spectrum sensing is a major function of cognitive radio. Commonly used spectrum sensing techniques are energy based spectrum sensing, matched filter spectrum sensing and cyclo stationary based spectrum sensing. In this paper, Energy detection, Cyclostationary detection and Adaptive double Threshold Energy Detection (ED_ADT) schemes were compared under different channels like AWGN, Rayleigh, and Rician. Results show that ED_ADT is optimal for signal detection having low SNR.
Keywords: Adaptive Double Threshold Energy Detector, Cognitive Radio, Cyclostationary Detector, Energy Detector, Probability of Detection.
Abstract
Hybridization of Cuckoo Search & Artificial Bee Colony Optimization for Satellite Image Classification
Shelja Singla, Priyanka Jarial, Gaurav Mittal
DOI: 10.17148/IJARCCE.2015.4671
Abstract: In last few decades, Image classification has become one of the extensively used research area due to its wide range of applications like ground water exploration, environmental disaster assessment, terrain feature extraction, urban planning, & land use monitoring etc. There exist various traditional, nature inspired and other classification approaches that are being used for the satellite image classification. But the results obtained from the existing algorithms are nor much efficient to use for any real life application. In this paper, we are applying the swarm intelligence based hybrid approach to classify the land cover features. The algorithms considered for the hybridization are Cuckoo Search (CS) and Artificial Bee Colony Optimization (ABC). As individual algorithm are not much efficient for classification, so hybrid concept is considered to make the classification more efficient and accurate. The output results obtained from the hybrid concept are compared with the individual CS & ABC algorithms. Also some other algorithms like Particle Swarm Optimization (PSO), Biogeography Based Optimization (BBO), hybrid ACO/BBO, hybrid CS/PSO, hybrid CS/ACO and hybrid ABC/BBO are considered for the comparison purpose.
Keywords: Swarm Intelligence, Cuckoo Search (CS), Artificial Bee Colony Optimization (ABC), Remote Sensing, Image Classification.
Abstract
A Novel Study on Optical Frequency Division Multiplexing System for Digital Broadcasting Standard
Sapna Sadyan, Er. Paras Chawla
DOI: 10.17148/IJARCCE.2015.4672
Abstract: With the advancement in age and its growing demands, there has been rapid growth in the field of communications. Communication is one of the important aspects of life. For better transmission, even single-carrier waves are being replaced by multi-carriers. Multi-carrier systems like CDMA and OFDM are now a day�s being implemented commonly. So, the main objective of this paper is to design and implement an OFDM System for digital broadcasting standard. In the OFDM system, orthogonally placed sub-carriers are used to carry the data from the transmitter end to the receiver end. In this paper we are focussing on learning the basics of an OFDM System. The purpose of this paper is to provide a simulation of the process involved in the generation and reception of an OFDM signal in a physical channel and to provide a description of each of the steps involved. For this purpose, we shall use one of the proposed OFDM signals of the Digital Broadcasting (DVB) standard for the European digital television service.
Keywords: System, Wireless Communication, QAM modulation, Demodulation etc.
Abstract
Efficient Computation of Range Aggregate Against Uncertain Location-Based Queries
Ahmed-ullah-khan, Samra Noorin
DOI: 10.17148/IJARCCE.2015.4673
Abstract: Location based services have become increasingly important for many real time applications. In such applications queries are executed in a multi-dimensional space. In this paper we propose an algorithm to compute range aggregates such as count, average and sum that facilitate answering uncertain location based queries. We also developed a prototype application to test the efficiency of the proposed technique. The empirical results revealed that the application works with efficient computation of range aggregates and can be used in real world applications where location based services are required.
Keywords: Location based services, range aggregates, uncertain location based queries, index.
Abstract
Authentication Scheme to Protect Web Applications against SQL Injection Attack Using Hash Functions
Pooja Saini, Sarita
DOI: 10.17148/IJARCCE.2015.4674
Abstract: Online business expects web applications to be secure, efficient and reliableto the users against SQL Injection Attacks. The SQL Injection Attack exploits a security vulnerability occurring in the backend database layer of a web application which is the results of poor input validation in code and website administration. This allows attackers to obtain unauthorized access to the user sensitive information or change the intended web application through SQL queries. In the past, researchers have developed several methods/techniques to overcome the SQL injection problems. However, these approaches either have limitations or fail to cover full scope of the problem. In this paper, a hash function based authentication scheme including data validation is proposed to protect web applications against the SQL Injection attacks. A review of the different types of SQL injection attacks and cases of how attacks of that type could be performed is presented. The proposed techniqueis found to be quite useful and secure for protecting web applications against SQL Injection attacks.
Keywords: SQL Injection attack, Hash function algorithm, Database Security, validation.
Abstract
Code Selection with Application to Spread Spectrum Systems Based on Correlation Properties
Mintas Parveen C. M.
DOI: 10.17148/IJARCCE.2015.4675
Abstract: Code Division Multiple Access (CDMA) have a key role in vast number of research activities. CDMA is a spread spectrum technology for the transmission of radio signals in telecommunication system. In CDMA multiple users can transmit the data simultaneously in a channel using same frequency. Each user is assigned with a unique code for transmission. The performance of any CDMA system can be determined by the choice of the spreading codes which are used as a signature code for the users in such a system. The choice of spreading code sequence is vital for resistance against interference with other areas and against interference with multiple users. Sequences of code that desires to be as different but at the same time can be easily reproduced at the reception signal can be recovered. This multiple access technique requires neither the frequency management nor the time management. This paper deals with the comparison of different spreading codes based on the autocorrelation and crosscorrelation properties. These spreading codes provide security for the data transmission.
Keywords: Spread spectrum, Spreading codes, Autocorrelation, Crosscorrelation, Code Division Multiple Access, Optical Code Division Multiple Access, Pseudo Noise code.
Abstract
Algorithmic scheduling of Tasks and Work flow in Grid Computing System
R.Ananthi Lakshmi, S.Vidhya
DOI: 10.17148/IJARCCE.2015.4676
Abstract: Grid Computing enables large-scale resource sharing by integrating the distributed resources. Scheduling of application tasks to the resources is the central to the grid computing system.We proposed the schedule work flow tasks to the dynamic grid computing resources based on rescheduling methods.Nowadays,scheduling tasks on grid resources all are fully belongs to a class of NP-hard problems. The dependent tasks is fully meet the performance requirements on Quality Of Service (QOS).The Work Flow Scheduling (WFS) algorithm of grid application is consist of workflow tasks.
Keywords: Work Flow, Tasks, Scheduling, Resources, QOS.
Abstract
LMS Algorithm and Distributed Arithmetic Based Adaptive Fir Filter with Low Area Complexity
Nilesh S. Satpute, Sanjay B. Tembhurne, Vipin S. Bhure
DOI: 10.17148/IJARCCE.2015.4677
Abstract: In this manuscript, an adaptive FIR filter for high throughput, area and power efficient design will be introducing using distributed arithmetic (DA). DA is a bit serial computational action and uses equivalent concurrent realization of filtering weight update proposal for improving the throughput rate. As well as for high throughput rate and low area consumption the DA uses set of smaller dynamic parallel look up tables (LUTs). To reduced area requirement, sampling period and critical path, the conditional carry save accumulation of shift accumulator using full adder string circuitry will used in placed of conventional adder based shift accumulation. The Least mean square (LMS) algorithm is introduced to update weight and decline the mean square root error between desired and expected output. For the attenuation in power consumption of proposed design, the system has the two separate clocks; slower for all computations except carry save accumulation. The carry save accumulation required separate fastest clock. The designed Adaptive FIR Filter system will include relatively less number of look up tabels, employed half adders in replace of some full adders to reduce required area of filterand less number of multiplexer and thus required power consumption will be less.
Keywords: Adaptive filter, Distributed arithmetic (DA), least mean square (LMS) algorithm, LUTs, Inner Product unit.
Abstract
Channel Equalization and Estimation for SC FDE systems
Anupama P, Sakuntala S. Pillai
DOI: 10.17148/IJARCCE.2015.4678
Abstract: Single Carrier Frequency-Domain Equalization is one of the emerging technologies in broadband wireless systems. It requires reliable channel estimates to maintain an acceptable bit error rate performance. A two-dimensional MMSE channel estimation (2D-MMSE) algorithm along with blind channel equalization based on improved channel estimation is proposed in this paper. This method can ensure improved spectral efficiency, robustness and spectrally-efficient transmission in Single Carrier Frequency Domain Equalization systems over time- varying channels. The Unique Word (UW) is used as the cyclic prefix and this UW is not needed to delete in receiver section, which reduces the overhead of the system. The 2D-MMSE estimation is simplified as an MMSE interpolation in the frequency domain cascaded by an MMSE filter in the time domain. The noise variance is estimated by UW. Finally, the results show that the proposed algorithm has better performance than previous algorithms and is simple also.
Keywords: MMSE; LS estimation; two-dimensional channel estimation; UW; Single Carrier Frequency Domain Equalization (SC-FDE) system;
Abstract
Audio Watermarking using Colour Image Based on EMD and DCT
Suhail Yoosuf, Ann Mary Alex
DOI: 10.17148/IJARCCE.2015.4679
Abstract: Watermarking is the process of embedding information into a signal (e.g. audio, video or pictures) in a way that is difficult to remove. If the signal is copied, then the information is also carried in the copy. An audio watermark is a unique electronic identifier embedded in an audio signal, typically used to identify ownership of copyright. Audio watermarking is done using Empirical Mode Decomposition (EMD) where the audio signal is divided into segments and then decomposed into different IMFs (Intrinsic Mode Functions).The watermark is then applied to the last IMF as binary bits using QIM (Quantization Index Modulation). The watermarked colour image is obtained using DCT (Discrete Cosine Transform) compression method and converted to binary bits. In the watermark extraction phase the watermark is obtained as binary bits and converted back into image using IDCT (Inverse Discrete Cosine Transform) technique. The watermark is embedded into the IMF preserving audio perceptual quality of the host signal. By varying watermarking intensity the robustness of the hidden watermark for additive noise and MP3 compression is enhanced and the payload of the watermarked audio signal is increased.
Keywords: Empirical mode decomposition, intrinsic mode function, audio watermarking, image compression, discrete cosine transform.
Abstract
Advanced OFDM System
Abhijit S. Andure, Prof. S. M. Shende
DOI: 10.17148/IJARCCE.2015.4680
Abstract: Digital multimedia applications create an ever increasing demand for broadband communication systems. The technical requirements for related products are very high, but it is desired that the solutions must be cheap to implement, feasible or lead to sub optimal results. Orthogonal Frequency Division Multiplexing (OFDM) is a method that allows transmitting high data rates over extremely hostile channels at a comparatively low complexity than the traditional single carrier techniques.
Keywords: OFDM, PAPR, Commpanding, Windowing.
Abstract
Performance Analysis of Linear and Nonlinear Precoding in MIMO Systems
Varna L. Babu , Luxy Mathews , Sakuntala S. Pillai
DOI: 10.17148/IJARCCE.2015.4681
Abstract: A MIMO system which is used to achieve high data rate and capacity in transmission medium is one of the significant emerging technologies today. The interferences occurring between the different antenna elements in MIMO OFDM can be mitigated to improve the performance of the system. The precoding technique, where the data is coded and transmitted to reduce the bit error rate can be used for this. There are linear precoding and nonlinear precoding methods are there.Linear precoding schemes have low complexity and can achieve a reasonable capacity. The nonlinear precoding can access more capacity with much receiver complexity. In this paper, the BER performance of different precoding schemes like Channel Inversion, Block Diagonalization, DPC and TH precoding are analysed to get a better performance for the MIMO systems. Simulation results shows that the nonlinear precoding technique Dirty Paper Coding (DPC) achieves better performance than all other precoding methods.
Keywords: BER, DPC, MIMO, OFDM, Precoding.
Abstract
Efficient Cloud Computing with Secure Data Storage using AES
Mr. Santosh P. Jadhav, Prof. B. R. Nandwalkar
DOI: 10.17148/IJARCCE.2015.4682
Abstract: Most of the security schemes in cloud environment had not addressed the privacy preserving between third party auditor and the data in the cloud. Encryption techniques used previously are RSA based, which have different loopholes which can be overcome by using the most prominent encryption techniques which uses advanced encryption standards (AES) encryption algorithm. AES is most frequently used encryption algorithm today this algorithm is based on several substitutions, permutations and linear transformations, each executed on data blocks of 16 byte. As of today, no practicable attack against AES exists. Therefore, AES remains the preferred encryption standard for governments, banks and high security systems around the world. For efficient auditing the formation of batch of task and are executed in batch wise fashion also increase efficiency of TPA, the batch auditing protocol. In cloud the in the cloud is not only accessed by the user but also update data frequently. hence, providing data dynamics in cloud computing is also of prominent importance.
Keywords: RSA, AES, TPA.
Abstract
A Bluetooth Tele Health, Household Security and Industry Safety Realization by Android Smartphone
Piyush V. Savaliya, Sunil B. Somani, Virendra V. Shete
DOI: 10.17148/IJARCCE.2015.4683
Abstract: Wireless communication is often require in fields such as tele health, household security and industrial safety etc. Android operating system based smart phones are increasingly used nowadays because of its simplicity and is open source to create application. FPGA based embedded systems have faster processing capability, low power usage and is reconfigurable as per requirement. The FPGA based system can monitor surrounding by using different sensors. The Bluetooth communication system has the low-power requirement making it suitable for wireless carrier. This paper presents the real time wireless communication using Bluetooth between these type of embedded system and android smart phones. This system is very useful for reporting and vigilance with added advantages like user-friendly interface and is comfortable to end user.
Keywords: Wireless, Field-programmable gate array (FPGA), Android, Bluetooth.
Abstract
Harmonic Elimination in Cascade Multilevel Inverter with Non Equal dc Sources using Genetic Algorithm
Sudhakar V. Pawar, Mrs. Shimi S.L
DOI: 10.17148/IJARCCE.2015.4684
Abstract: The elimination of harmonics in a cascaded multilevel inverter by considering the un-equality of separated dc sources by using Genetic and Differential Evolutionary Algorithm and compared. Solving a nonlinear transcendental equation set describing the harmonic-elimination problem with non-equal dc sources reaches the limitation of contemporary computer algebra software tools using the resultant method. The proposed approach in this paper can be applied to solve the problem in a simpler manner, even when the number of switching angles is increased and the determination of these angles using the resultant theory approach is not possible. Theoretical results are verified by simulations results for an 11-level H-bridge inverter. Results show that the proposed method does effectively eliminate a great number of specific harmonics, and the output voltage is resulted in low total harmonic distortion.
Keywords: Genetic Algorithm (GA), multilevel inverter, selective harmonic elimination, unequal dc sources.
Abstract
A hybrid KPM Approach for Object Tracking using particle filter
Er. Navneet Pal Kaur, Dr. Shashi Bhushan, Er. Manish Mahajan
DOI: 10.17148/IJARCCE.2015.4685
Abstract: Visual object tracking is the active area of research in the computer vision. Various techniques have being developed for the object tracking .Particle filter deals with the tracking of the objects having non linear motion .Particle filter has been used in for various fields and application efficiently. Proposed Technique is based on combination of kalman filter, mean shift and particle filter. mean shift is basically for linear motion of the object and usually point based, kalman filter is also for linear object tracking but particle filter deals with the non linear motion of object.
Keywords: Particle filter, importance density, tracking, sequential importance sampling.
Abstract
Comparative Analysis of Decision Tree Algorithms for the Student’s Placement Prediction
Er.Paramjit kaur, Er. Kanwalpreet Singh Attwal
DOI: 10.17148/IJARCCE.2015.4686
Abstract: This proposes paper apply decision tree algorithms to predict the result of student campus placement. In this paper we also perform the comparative analysis of three decision tree algorithms (Id3,J48and random tree).In our study important classification model is generated to decide which the students might placed or non placed during campus placement process. The experiment is conducted using WEKA open source data mining tool on the real data set collected from final year students of computer engineering department of Punjabi University ,Patiala.
Keywords: Decision tree,Id3,J48,Random tree, WEKA,KDD
Abstract
User Access Control Technique through Smart Device Authentication using Bluetooth Communication with the Aid of Face Recognition
Samir Uprety, Padmini M
DOI: 10.17148/IJARCCE.2015.4687
Abstract: The new experience of this work is to provide a simple and low cost solution for users' access in a secured protected place. Large scale adoption of smart devices like smart mobile phones for personal usage has opened up an opportunity to identify people via their smart device identities. This paper aims to (accomplish or gain with effort) very simple way of doing things of users' access control through device (verifying someone's identity) using a microcontroller board such as nuvoTon W78E052D 8-Bit Microcontroller that interacts with the smart device using Bluetooth technology (HC-05 Bluetooth Module) which is almost available in every smart device. Further, the proposed (verifying someone's identity) and (machines/methods/ways) are (intelligent/obvious) and require minimum effort. As a way(s) of doing things of secured communication is used in the mobile apps. The putting into use procedure is discussed through the AdaBoost algorithm for face recognition system using mat lab and java. Some possible application areas are discussed in which the proposed way(s) of doing things may be applied to enable appropriate services.
Keywords: Bluetooth Technology, Face Recognization System, Client-Socket Communication,Android Mobile Device.
Abstract
Comparison Study on Wavelet based Spectrum Sensing in Cognitive Radio
Ms. Saloni Pandya, Mrs. Rashmi Pant
DOI: 10.17148/IJARCCE.2015.4688
Abstract: The growing demand of wireless applications has put a lot of constraints on the usage of available radio spectrum which is limited and precious resource. However, a fixed spectrum assignment has lead to under utilisation of spectrum as a great portion of licensed spectrum is not effectively utilised. Cognitive radio is a promising technology which provides a novel way to improve utilisation efficiency of available electromagnetic spectrum. Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones. This optimizes the use of available radio-frequency (RF) spectrum while minimizing interference to other users. Spectrum sensing helps to detect the spectrum holes (underutilized bands of the spectrum) providing high spectral resolution capability. In this paper a comparative study is being taken in account for all kind of Spectrum Sensing in Cognitive Radio techniques introduced till now, specifically based on wavelet transform.
Keywords: Cognitive radio, spectrum sensing, energy detection, wavelet transform, Edge Detection.
Abstract
Visual Interpretation of ASL Finger Spelling using Hough Transform and Support Vector Machine
S.Nagarajan, T.S.Subashini, M.Balasubramanian
DOI: 10.17148/IJARCCE.2015.4689
Abstract: This paper proposes a vision based automated system for interpretation of American Sign Language (ASL) finger spelling using image processing. A graphical user interface is developed for the hard of hearing community to interact with normal hearing persons through hand gestures in a natural way thereby eliminating the need for an interpreter. This system does not require the user to wear any data gloves or special hardware for recognition of gestures and it provides human-machine interaction only through bare hand. In this research, Hough Transform is employed for feature extraction and gesture modeling and classification is performed through Support Vector Machine (SVM). The finger spelling of alphabets is carried out to form different isolated words. The proposed system is tested on the benchmark Triesch ASL dataset for recognition of individual alphabets and the test results show that this system achieves the overall recognition accuracy of 93.88%.
Keywords: Computer Vision, Hough Transform, Machine Intelligence, Pattern Recognition, Sign Language Recognition, Support Vector Machine.
Abstract
Performance Analysis of Time in Line and Word Segmentation using Different Fonts
Shashi Kant, Mrs. Sini Shibu
DOI: 10.17148/IJARCCE.2015.4690
Abstract: Segmentation is a widely used process in current-day image processing. Various segmentation processes exist to segment lines and words. Header lines are detected and converted as straight lines. Text line segmentation is avn important step because inaccurately segmented text lines will cause errors in the recognition stage. Text characteristics can vary in font, size, and orientation. This paper introduces a comparative analysis of time of the segmentation process that is carried out on various style text to find the time taken in the segmentation process. The text is segmented into lines, lines into words. Here we make a comparative study of time consumed during line and word segmentation using different style fonts and find the time in which fonts type, both segmentation take minimum amount of CPU time. Here we proposed a method that supports all segmentation process(line and word segmentation) to retrieve text, make boundary boxes to the fully lines, words and perform segmentation. It consists of recording the start time of the process as well as end time of the process and find the time difference. This process is applied to different fonts of text to make a comparative analysis.
Keywords: Image processing, Printed/Handwritten document analysis, Text font time analysis, segmentation, line segmentation and word segmentation.
Abstract
FPGA Based Face Detection System using Xilinx System Generator
Yogesh V. Raut, Charudatta V. Kulkarni
DOI: 10.17148/IJARCCE.2015.4691
Abstract: In the field of face recognition and establishment of face database, face detection is a crucial step. Image Features are the basis for most of the real time image processing applications. Skin color is one of the prime features of image. A variety of skin color tones along with other constraints on image capturing within a given background make face detection a challenging task of image processing for surveillance and security applications. Processing color information is faster than processing other facial features. In this paper skin color detection YCbCr model is implemented on FPGA using Xilinx System Generator based on Hardware/Software Co-simulation. Xilinx System Generator is a DSP design tool from Xilinx that enables the use of the Math Works model-based Simulink design environment for FPGA design.
Keywords: Image Processing, FPGA, Xilinx System Generator.
Abstract
Distributed Computing Based Methods for Anomaly Analysis in Large Datasets
Remya G, Anuraj Mohan
DOI: 10.17148/IJARCCE.2015.4692
Abstract: Anomaly detection is considered as one among the important domain in data mining. Both supervised and unsupervised learning methods are used in anomaly detection task. In this paper emphasis is given to distance based prediction of anomalies. We studied the traditional methods which involves index-based, nested-loop and cell-based approaches towards anomaly detection. As the size of the datasets become very large the task of detecting anomalies becomes computationally complex. Having the push towards big data mining, it will become more necessary to adopt existing anomaly detection algorithms to various distributed computing platforms. Our paper is based on a survey on the different strategies that can be adopted for anomaly analysis using distributed computing techniques. First we studied the concept of anomaly detection solving set, a subset of the input data set representing a model that can be used to predict anomalies. The solving set is defined using necessary number of points that helps in the detection of the top anomalies by taking into consideration only a subset of all the pair wise distances from the data set. Then we analysed the possibility of using Map Reduce framework for performing anomaly analysis. A MapReduce based solving set algorithm for anomaly detection using Hadoop framework is also proposed.
Keywords: Anomaly, Distributed Computing, Map Reduce, Hadoop.
Abstract
Contextual Query Expansion for Acquiring Web Documents
Bidisha Roy, Priyanka Upadhyay
DOI: 10.17148/IJARCCE.2015.4693
Abstract: Query expansion is an information retrieval technique in which new query terms are added to the original query terms to improve search performance. Contextual query expansion is major issue in today�s era. In this paper, contextualization is achieved by performing document extraction and terms extraction activities to the particular domain information source. User query is expanded using document extraction and terms extraction activities. Document extraction is achieved by BM25 retrieval function. It ranks set of documents based on query terms appearing in each documents .Now second function is terms extraction process, in this, terms in the top returned documents are weighted using sub linear terms frequency scaling formula which is used to weight the terms in the expanded query derived from original query which will cope with the term mismatch problem in specific domain. Hence, this paper presents a proposal to make web searches adaptive to the context of the user�s query, thus improving query results. The proposed approach makes the context acquisition faster, In addition the results of the query engine with and without the contextual information showed improvements in the precision and search length of the web results.
Keywords: BM25 ranking model, Context, Information retrieval, Internet, Query Expansion, Sub linear term frequency scaling function.
Abstract
Quantify Object Oriented Software Analyzability
Ms.Vinita Yadav, Dr.Namrata Dhanda
DOI: 10.17148/IJARCCE.2015.4694
Abstract: Analyzability is one of the most important quality criteria for software development process. The majority of the software industries overdo 50 to 60 percent of resources for maintaining and correcting, the existing software. Nearly all of companies use over 60 % costs on testing and maintenance of the software to manage the quality. IEEE glossary of Software Engineering defines analyzability is �the ease with which a software system or component can be modified to correct faults, improve performance or other attributes, or adapt to a change environment�. Software maintenance process required for additional effort, than any other software engineering development process. The analyzability criteria of software system are not feasible directly, although with the support of their internal uniqueness measurements. Early estimation of analyzability mainly at design phase helps to make use of its measurements more proficiently to enhance the quality of software product. The design stage estimation of analyzability is more practicable for software creation team and maintenance inexpensively. This paper proposes an analyzability measurement model. The proposed model for computing software analyzability point outs the possible influence of design properties and also talk about the impact of software analyzability computation with design stage complexity.
Keywords: Analyzability, Flexibility, Effectiveness, Analyzability Model.
Abstract
Security in Wireless Adhoc Networks based on Trust and Encryption
Sumimol L., Janisha A
DOI: 10.17148/IJARCCE.2015.4695
Abstract: Ad hoc network is a group of wireless mobile computers for temporary communication. Here autonomous and self-interested nodes in the network and the broadcast nature of radio transmission make the network highly vulnerable to serious security attacks. In a multi-hop wireless ad hoc network, packet losses are attributed to harsh channel conditions and intentional packet discard by malicious nodes. Packet losses may due to link errors or the combined effect of link errors and malicious drop. It becomes more difficult to detect internal attacks, whereby a malicious node that is part of the route exploits communication information to selectively drop a small number of packets which may critically affect network performance. Secure and efficient communication is one of the most important aspects in ad-hoc wireless networks, so it needs to a develop protocol strategy which take less computational power, better performance and efficiently utilizes the bandwidth. Here I reviewed various security aspects in adhoc networks, and proposed the countermeasures to prevent them. Performance comparison between two network scenarios has also been studied, a standard network scenario and packet dropping attack scenario.
Keywords: Security, AODV, Trust, Encryption, Integrity.
Abstract
A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms
L.Dhanabal, Dr. S.P. Shantharajah
DOI: 10.17148/IJARCCE.2015.4696
Abstract: Intelligent intrusion detection systems can only be built if there is availability of an effective data set. A data set with a sizable amount of quality data which mimics the real time can only help to train and test an intrusion detection system. The NSL-KDD data set is a refined version of its predecessor KDD�99 data set. In this paper the NSL-KDD data set is analysed and used to study the effectiveness of the various classification algorithms in detecting the anomalies in the network traffic patterns. We have also analysed the relationship of the protocols available in the commonly used network protocol stack with the attacks used by intruders to generate anomalous network traffic. The analysis is done using classification algorithms available in the data mining tool WEKA. The study has exposed many facts about the bonding between the protocols and network attacks.
Keywords: Intrusion Detection System, NSL-KDD dataset, Anomaly, Protocol.
Abstract
Performance Evaluation of K-RLE Compression Technique for Text Data
P. Suneel Kumar, Patibandla.Swapna
DOI: 10.17148/IJARCCE.2015.4697
Abstract: The continuous growth of mobile, desktop and wired and wireless digital communication technologies has made the extensive use of the images unavoidable. The basic characteristics of image like transmission rate, bandwidth, redundancy, bulk capacity and co-relation among pixels makes basic compression algorithms mandatory. The research exploration in the field of image compression is huge. In this research paper we investigate the performance evolution of basic compression algorithms on image data. We are adopting RLE (Lossless) compression and its modified version of algorithm, named K-RLE (Lossy). The basic and proposed system architecture, design, complexity, and performance could be analyzed and compare using MATLAB Language, which is the quick tool to estimate performance of the system.
Keywords: KRLE, image compression, lossy, MATLAB.
Abstract
A brief Survey on Security Issues in Cloud and its service models
G.Kalpana, P.V. Kumar, R.V.Krishnaiah
DOI: 10.17148/IJARCCE.2015.4698
Abstract: With the progress of cloud computing there is significant transformation in IT organisations. The immense thrust for cloud computing by numerous large companies has been at the forefront of the cloud computing movement. It will be easily reached worldwide via internet, an advantage for large, intermediate and small enterprises. Storage of data in cloud is fast moving and moreover the security breach is a worry and we can expect to see many maturities in the coming years. The diverse concerns that arise have to be magnified with respect to safety and confidentiality of the data in cloud. There are many pros in using the cloud besides many cons, which should be taken into observation from which most of them being specific in cloud. This paper presents a glimpse of survey on cloud computing along with its safety.
Keywords: Cloud computing, confidentiality, Data storage, issue, analysis.
Abstract
QOS Evaluation of Call Admission Control for a 4G Network
Vrushali N. Khairnar, Dilip S. Patil
DOI: 10.17148/IJARCCE.2015.4699
Abstract: In the last years, the cellular communications system has evolved greatly, mainly moved by the increase of applications and user requirements. The growth of demand in this area is attributed to facilities and usability of services through cellular networks. Future wireless scenarios will be characterized by the coexistence of a variety of heterogeneous wireless access technologies. There will be complex protocol stacks, supporting a number of applications and services with different Quality of Service (QoS) demands and, in addition, requiring multi-mode terminal capabilities to access such networks. Call admission control (CAC) is a radio resource management technique aimed at providing fair quality of service (QoS) to mobile users in cellular networks. These techniques allow the operator to manage its networks resources, which provide better service to its users. This paper presents new algorithm for joint radio resource management using the UMTS and WLAN architecture, where these networks are connected to each other. This algorithm based on its decisions criteria related to mobility of user reducing the handoffs.
Keywords: 3rd Generation Partnership Project (3GPP), Call Admission Control (CAC), Joint Radio Resource Management (JRRM), Quality of Service (QoS), User Mobility, UMTS, WLAN.
Abstract
Measurement of Interface Trapped Charge Densities(Dit) in 6H-SiC MOS Capacitors
Sachin Tyagi, Ajeet Kumar, Amit Kumar
DOI: 10.17148/IJARCCE.2015.46100
Abstract: At High oxidation temperature of SiC shows a tendency of carbide formation at the interface which results in poor MOSFET transfer characteristics. Thus we developed oxidation processes in order to get low interface charge densities. N-type 6H-SiC MOS capacitors were fabricated by different oxidation processes: dry, wet, and dry-reoxidation. Gate oxidation and Ar anneal temperature was 1150 ?. Ar annealing was performed after gate oxidation for 30 minutes. Dry-reoxidation condition was 950 ?, H2O ambient for 2 hours. Gate oxide thickness of dry, wet and dry-reoxidation samples were 38.0 nm, 38.7 nm, 38.5 nm, respectively. Mo was adopted for gate electrode. To investigate quality of these gate oxide films, high frequency C-V measurement, gate oxide leakage current, and interface trapped charge densities ( Dit ) were measured. The interface trapped charge densities ( Dit ) measured by conductance method was about 4 1010 [cm-1eV-1] for dry and wet oxidation, the lowest ever reported, and 1 1011 [cm-1eV-1] for dry-reoxidation
Keywords: SiC, MOS capacitor, oxidation, high-freqency C-V, Dit , conductance method, gate oxide leakage current densities.
Abstract
A Crypto- Steganography System for Double Tier Security
Yogita, Harjinder Singh
DOI: 10.17148/IJARCCE.2015.46101
Abstract: The two important aspects of security that deal with transmitting information through some medium like internet are cryptography and Steganography. Cryptography deals with hiding the contents of a message and Steganography deals with hiding the presence of a message. In this paper, image is encrypted by ElGamal Algorithm and then encrypted image hide in other image for double tier security. For hiding the encrypted Image Modified LSB technique is used. The Modified LSB technique has more capacity as compared to LSB technique. Also in this paper MSE and PSNR of proposed Algorithm are compared with existing algorithm.
Keywords: ElGamal, Modified Least Significant bit (MLSB), Peak signal to Noise Ratio (PSNR), Mean Square Error (MSE), Encryption, Steganography.
Abstract
Smart Transmitter for Cognitive Radio
Sushant Chavan, P.B. Borole, Ashish Sahare, Jayawant Jagtap
DOI: 10.17148/IJARCCE.2015.46102
Abstract: The wireless data consumption is increasing rapidly due to increase in number of mobile devices which are connected through air. So there is huge demand for spectrum. Large chunk of spectrum is licensed which are expensive. Unlicensed users are prohibited access to licensed spectrum. To efficiently use the available spectrum and solve the spectrum shortage problem there is need of cognitive radio. Software defined radio is a building block of cognitive radio which is reconfigured according to the available spectrum. This project aims at building a reconfigurable smart transmitter which can change modulation scheme on the fly depending upon the bandwidth, power and probability of error requirements. The different modulation schemes and the decision making logic is simulated in MATLAB and then implemented on FPGA platform.
Keywords: Radio, Software Defined Radio, Partial reconfiguration (PR), Power Consumption.
Abstract
A study on increasing the performance of Heterogeneous clusters
Bibi Ameena
DOI: 10.17148/IJARCCE.2015.46103
Abstract: Map Reduce implementation have mainly designed for homogeneous clouds, the data centres have been driven towards heterogeneous clouds due to the evolving application of hybrid clouds, geo distributed clouds and networking and storage devices. Since Map Reduce implementations are designed for heterogeneous cloud their performance is low in homogeneous clusters. In this paper we mainly present an extended study on three kinds of factors -System configuration, task scheduling for the process of resource utilization. Here we come under conclusion with 3 key findings. The performance of Map Reduce job will affect the performance map and reduce tasks when running on the different nodes. The job performance and resource utilization efficiency can be improved by scheduling the map and reduce tasks dynamically according to the capacity of nodes and prior knowledge about workload. When the shuffle data is large in size it can the random scheduling of reduce task will degrade the performance of homogeneous cluster even though it performs well in heterogeneous clusters.
Keywords: Hadoop, Map Reduce, Heterogeneous clusters, Cloud.
Abstract
Red & Green Blood Vessel Extraction from the Retinal Images
Sandeep Singh, Dr. Dinesh Kumar
DOI: 10.17148/IJARCCE.2015.46104
Abstract: Detecting abnormalities such as venous looping or beading sis critical for early treatment as they are in most cases indication of potentially sight-threatening retinopathy. In order to utilize these useful characteristics of retinal blood vessels, it is very important to obtain their locations and shapes accurately. Blood vessels appeared as networks of either deep red or orange-red filaments that originated within the optic disc and were of progressively diminishing width. The major problem of Patients suffering from the disease over a long period of time is more likely to develop eye problems known as diabetic retinopathy. The detection of blood vessels is a major problem in the automatic processing of retinal images. The problem is to identify the segmentation of green veins and red veins in retina. The red and green component is extracted from the retinal images with help of KCN clustering. The accuracy detected in the green component is 96.5 % and the red component extraction is the 99.9% extractions of the retinal images.
Keywords: Veins, retina, abnormalities, Blood vessels etc.
Abstract
Automatic Detection of Sickle cell in Red Blood cell using Watershed Segmentation
Shashi Bala, Amit Doegar
DOI: 10.17148/IJARCCE.2015.46105
Abstract: Red Blood Corpuscles are the major cellular component of human blood which is responsible for gaseous exchange between living cell and external environment. In normal physiological condition, an RBC is circular in front view and biconcave in side view. In this paper image processing techniques applied on RBC cell to count the normal and abnormal cells using Watershed Segmentation. Then form factor calculated for each cell to differentiate between normal and abnormal cell. Also Contour plot of RBC cell drawn to highly visualize the RBC cell, Sickle cell, and Target Cell. Simulation of this technique is done on MATLAB 2013a.
Keywords: Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Red Blood Corpuscles (RBC), Sickle Cell Anemia (SCA), edge detection, Root Mean Square Error (RMSE).
Abstract
Minkowski Fractal Geometry based T-shaped Fractal Patch Antenna for wireless applications
Sunil kumar, Sukhwinder Kumar
DOI: 10.17148/IJARCCE.2015.46106
Abstract: One of important concept to design antenna is that antenna have small size. For mobile applications, one may want that antenna must have small size and must be capable to resonate at multiple frequency bands. There are number of techniques that can be useful for designing of antenna which include making use of fractal geometry, use of slot and DGS.. In this paper, T-shaped Patch antenna has been designed and fractal geometry has been applied to it in order to obtain self-similar characteristics. square. Patch length has been taken as square of length 36mm. Dimension of ground has been taken as been taken as 50 mm. The substrate used in this paper is FR-4. Parametric analysis has been applied in terms of changing microstrip line, feed point, thickness and geometry. Antenna resonates at three bands with return loss of 3.9 GHz, 4.5 GHz and 6.1 GHz. This antenna had return loss of -14.34 dB, -14.40 dB and -25.85 dB with bandwidth of 100 MHz, 110 MHz and 200 MHz at resonant frequencies. Further this antenna has good gain of 3.5dBi, 3.6 dBi and 6.1 dBi at corresponding frequencies. This antenna can b useful for Wi-Max and WLAN applications.
Keywords: Wireless applications, WLAN, Fractal Microstrip Patch Antenna
Abstract
Evaluation of Wavelength Division Multiplexing System using Different Modulation Formats
Rupinder Kaur, Sanjeev Dewra
DOI: 10.17148/IJARCCE.2015.46107
Abstract: In this paper, we have demonstrated the eight channel WDM system using NRZ, RZ and duobinary modulation formats. The WDM system has been analyzed by varying the input power from 0 to 20dBm for different modulation formats in order to find the modulation format for a high data rate optical transmission system. Furthermore, it is found that duobinary modulation is much better than Return-to-Zero and NRZ and the system gives better performance at 40Gbps.
Keywords: Duobinary, Non-return-to-zero, Return-to-zero, Wavelength-division-multiplexing, Quality Factor.
Abstract
Reactive Navigation of Multiple Moving Agents in a Room Environment
Dr M Shivakumar, Mr. M.V.Sreenivas Rao, Stafford Michahail
DOI: 10.17148/IJARCCE.2015.46108
Abstract: Navigation of mobile robots in unknown environments is one of the most research areas. Mobile robot can be used in many applications such as indoor and outdoor security patrols, material transport.The Collision avoidance implementation will take advantage of embedded system implementations based on the Renesas microcontroller, RL78/G13, with interactivity to an wireless communication technology called ZigBee technology which will be responsible for assisting the robots in avoiding objects in its path of motion. The proposed project takes advantage of the emerging Radio Frequency Identification (RFID) technology to guide the robot to navigate in its working space. The main advantage of this project is, since Zigbee is bi-directional wireless communication technology provides data integrity check and authentication. Transmitting and receiving information has lower power consumption.
Keywords: Renesas microcontroller, IR and PIR sensors.
Abstract
Kalman Filter
Nivedita
DOI: 10.17148/IJARCCE.2015.46109
Abstract: The Kalman filter is a Recursive algorithm and recursive means doesn�t need to store all previous measurements and reprocess all data each time step.The Kalman filter is the best possible (optimal) estimator for a large class of problems and a very effective and useful estimator for an even larger class. With a few conceptual tools, the Kalman filter is actually very easy to use.
Keywords: Kalman filter, Measurement, Prediction.
Abstract
Review on Cache-Coherent Algorithms with Multithreaded Computer Architectures
T.Karthik, M.Krishna Sudha
DOI: 10.17148/IJARCCE.2015.46110
Abstract: Cache-coherent multithreaded computer architectures has been envisioned as the next generation architecture of IT Enterprise. In contract to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality services. To ensure the correctness of users� data in the cloud, we propose effective and flexible distributed schemes with two salient features, opposing to its predecessors. By utilizing the homomorphism token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attacks, and even server cache-coherent attacks.
Keywords: Cache, Multithreading, Homomorphism, Resilient, Simulation.
Abstract
Hybrid Fusion Methods in Image Steganography for Secured Data Transmission
Usha B.A, Dr.N.K Srinath, Dr. Ravikumar C N, Puttaraju, Manu and Vijaykumar
DOI: 10.17148/IJARCCE.2015.46111
Abstract: In the present digital scenario, safe and protected communication is the most important requirement. Steganography is the process of implanting secret information into a multimedia carrier it may be text, image, video or audio etc., by hiding information in the image such a way that no one apart from the intended recipient knows of the occurrence of the message. Image fusion is the operation of mixing relevant information from two or more pictures into a single image. In this paper, the Steganography and the image fusion processes are distinct. By the combination of both processes, the security will be more and it tends to new emerging technology. By applying hybrid fusion where the images are fused twice using an effective fusion method that provides enhanced resultant image. The project Hybrid fusion method in image Steganography finds an application in a very wide range of areas involving image processing.
Keywords: Image steganography, DWT, PCA, Image fusion, Hybrid Fusion.
Abstract
High Capacity Data Embedding in Image Steganography using Hard Sudoku puzzle
Usha B A, Dr N K Srinath, Anvith E
DOI: 10.17148/IJARCCE.2015.46112
Abstract: The practice of concealing a file, message, image, audio or any other media in another file, image, audio or video in such a way that only the sender and receiver know about the message being transmitted is called steganography. In this paper, first an enhancement is proposed to the work of Sanmitra Ijeri et al. wherein a hard sudoku is used instead of a soft sudoku. The embedding and extraction algorithms are generalized to work with any NxN sudoku where N is a perfect square. A comparison is then made between the hard and soft sudoku techniques. A study is also performed to compare parameters such as PSNR and payload capacity for different sudoku sizes.
Keywords: Image steganography, Cover Image, Stego Image, Hard Sudoku, Reference Matrix, Pixel, PSNR
Abstract
Route Planning Algorithm for Localization in Wireless Sensor Network
Prof. Shubhangini Ugale, Ms. Poonam B. Kshirsagar, Mr.Ashwin W. Motikar
DOI: 10.17148/IJARCCE.2015.46113
Abstract: Node deployment is an important issue in wireless sensor networks (WSNs). Sensor nodes should be efficiently deployed in a predetermined region in a low-cost and high coverage-quality manner. Localization methods based on mobile anchor nodes have been proposed for assisting the mobile nodes to determine their locations; none of these methods attempt to optimize the trajectory of the mobile anchor node. Route planning scheme, ensures that all of the mobile node can determine their locations. One of the main active attacks is Black hole attack, it is a denial of service attack and it drops entire incoming packets between one source to destination. The attempt is to focus on analysing and strengthening the security of routing protocol Ad-hoc On Demand Distance Vector (AODV) for MANET.
Keywords: Path planning Algorithm , Black hole, AODV.
Abstract
Reducing Internal Banking Fraud using Smart Cards and Biometrics as Access Control Tools
Daniel Ugoh, Macdonald N. Onyeizu, Charles Ugwunna, Celestine O. Uwa
DOI: 10.17148/IJARCCE.2015.46114
Abstract: Internal crimes in banking industry are issues that face customers, bank employers and employees. A lot of internal criminal activities have been recorded in banking industry. Securing banking software from unauthorized access, unauthorized modification, unauthorized fund transfer and withdrawal has been a challenge. The researchers in this work responded to this challenge by developing a two-tier authentification system that is to be attached to the main banking software. This system uses magnetic featured staff identity card for identification and fingerprint biometric for authentication. The techniques of the Object Oriented Analysis and Design Methodology (OOADM) and the prototyping methodology were adopted for the systematic study and design of the system. The system was designed and implemented in Microsoft Visual C# development environment. The system was featured to interface with magnetic card and fingerprint readers. The result is a two-tier authentifiation system that would act as access control tool for the main banking software. An employee requesting for access into the banking software is expected to pass magnetic featured staff identity card check and fingerprint matching check. This will go a long way in reducing internal banking fraud.
Keywords: Authentification, Banking, Biometrics, Fraud, Internal, Template.
Abstract
Detection and Extraction of Text in Images using DWT
Tejashvini R. Hiremath, Shivanand M. Patil, Dr. V. S. Malemath
DOI: 10.17148/IJARCCE.2015.46115
Abstract: Extraction of text from the images is one of the important and challenging tasks. These images can be captured from digital capturing devices, since most of the people use digital cameras and other devices wherein text information is important among all the contents from the images. This has many applications such as reading license plate, helping blind persons, tourists etc. In this paper, an approach to detect and locate the texts in images is presented. Text detection and extraction is hard due to the intricate background, different alignment of text size, orientation in images. Texture-based method and the features of wavelet are used to design the proposed work. In the pre-processing step, the image is converted and divided into 50�50 blocks and then extract texture features. Next the classifier classifies the blocks into text and non-text and finally, merging to have text regions. The proposed method accomplishes a detection rate of 99% on a variety of images.
Keywords: Text Detection, Text Extraction, Texture-based, Wavelet Features
Abstract
RFID Enabled Mobile Billing in Retail
Mrudula Chikhale, Dr. Srija Unnikrishnan, Prof. Monica Khanore
DOI: 10.17148/IJARCCE.2015.46116
Abstract: Electronics commerce is mostly welcome, with the increasing use of mobile devices and electronic payments. Shopping nowadays usually involves waiting in line to get your products scanned for checkout which can result in a great deal of wasted time for customers. RFID holds great promise in the retail world, for both customers and stores in inventory control, due to it�s relentlessly advantages over the conventional approach. This technology offers the customers a choice to pay the bill amount either by using mobile phone, through SMS, or at the billing counter. The proposed system for payment using mobile contains 3 main components: User Interface & Display component, Server Communication component and Billing & Inventory Management component. As the product with the RFID tag is put in the trolley, the cost of the product gets added to the billing amount. Thus, the bill is generated at the trolley itself and displayed on the alphanumeric 16 x 2 LCD display, saving the time required for scanning at the counters. The billing amount will be transferred to billing server by wireless Zigbee transmitter. The Zigbee receiver is connected to the Server using USB. At the server, GSM modem is used to communicate with the customer�s mobile phone. Thus, this paper deals with developing a Smart Shopping Trolley, a system that makes the payment faster by avoiding the need to go to the billing counters for payment, allowing faster check-out.
Keywords: Radio Frequency Identification (RFID) Reader & tags, Wireless Zigbee Module, Microcontroller, Server database, Mobile, GSM Modem, LCD
Abstract
Codebook Generation using Hierarchical Radial Basis Function Neural Network with Wavelet Transform and Vector Quantization for Better Image Compression
Dr.G.Boopathi, Dr. Narayanan Sreekumar
DOI: 10.17148/IJARCCE.2015.46117
Abstract: Image compression is the technique of reducing the size of the image file without degrading the quality of the image. The compression in file size permits more images to be stored in theavailable amount of memory space. It also decreases the time needed for images to be uploaded over the Internet or downloaded from it. There are many techniques available in the lossyimage compression, in which wavelet transform based image compression is the best technique. Vector Quantization (VQ) is the most powerful toolfor image compression. One of the major steps in the Vector Quantization is the generation of the code book.In this proposed approach, a popular neural network technique called Hierarchical Radial Basis FunctionNeural Network(HRBFNN) approach is used to generate the code book. A combined approach of image compression based on vector quantization and wavelet transform is proposed using HRBFNN. This approach will be very helpful for medical imaging, criminal investigation where high precision reconstructed image is required. The experimental result shows that the proposed technique provides better PSNR value and also reduces the Mean Square Error value than the modified SOM and RBF.
Keywords: Image Compression, Neural Networks, Vector Quantization (VQ), Wavelet Transform, Radial Basis Function (RBF), Hierarchical Radial Basis Function Neural Network (HRBFNN)
Abstract
Content Based Image Retrieval using SVM, NN and KNN Classification
Sandeep Singh, Er.Rachna Rajput
DOI: 10.17148/IJARCCE.2015.46118
Abstract: The CBIR tends to index and retrieve images based on their visual content. CBIR avoid many evils connected with conservative ways of retrieve images by keywords. Thus, a rising interest in the area of CBIR has been known in current years. The arrangement of a CBIR system mainly depends on the particular image illustration and similarity matching function working. The CBIR tends to index and retrieve images based on their visual content. CBIR avoids many problems associated with traditional ways of retrieving images by keywords. Thus, a growing interest in the area of CBIR has been established in recent years. The performance of a CBIR system mainly depends on the particular image representation and similarity matching function employed. So a new CBIR system is proposed which will provide accurate results as compare to previous developed systems. Soft system will be used in this system. Based Image recovery system which evaluates the similarity of each image in its data accumulate to a query image in terms of various visual features and return the image with desired range of similarity. To develop and put into practice an efficient feature extraction NN and SVM to extract features according to data set using Auto calculate the feature weight by neural network. The precision and recall graph in gui according to the retrieved contents of the images from the datasets. To Apply back propagation or feed forward algorithm for neural network classification. To calculate cross relationship and apply weakening model for feature matching.
Keywords: CBIR, KNN, ABIR, precision, Recall etc.
Abstract
Intrusion Detection Systems: A survey and Analysis of Security Issues
Dr.V.Jaiganesh, Mr.M.M.Karthikeyan
DOI: 10.17148/IJARCCE.2015.46119
Abstract: INTRUSION DETECTION SYSTEM [IDS] are the process of identifying and responding to malicious activity targeted to computing and network resources. Intrusions are the activities that violate the security policy of system. The process used to identify intrusions. Today network securities are used in various applications like protect vital information while still allowing access to those who need Trade secrets, Medical records etc. In this paper going to see about different types of attacks, mechanisms to prevent the attacks and simulations.
Keywords: Intrusion Detection System, Methods of IDS, Protocols, Attacks.
Abstract
The Concept of Programmable Logic Controllers and its role in Automation
Harpreet Singh Bedi, Shekhar Verma, Rk Sharma, Balpreet singh
DOI: 10.17148/IJARCCE.2015.46120
Abstract: In this paper, we discuss about Plc i.e. programmable logic Controllers. This paper explores the roles of PLC in automation engineering which is a cross sectional discipline that requires proportional knowledge in hardware and software development and their applications.Earlier in Industry, We used certain control devices which were controlled and wired directly with the system that leads to certain irregularity in the functioning of the whole system. To overcome the in-functionality of the system which was caused by large number of wires, we came cross towards Programmable logic controllers (PLC). The main reason in order to remove irregularity of relays and wiring issue, we prefer PLC to control and monitor the operation of devices in the industry.
Keywords: PLC, automatic control, Ladder Logic, Automation
Abstract
Linear Data Model Based Study of Improved Round Robin CPU Scheduling Algorithm
Saurabh Jain, Diwakar Shukla, Ratnesh Jain
DOI: 10.17148/IJARCCE.2015.46121
Abstract: One of the main functions of operating system is process management. CPU scheduling plays an important role in getting good performance from the computer system. The main aim of the CPU scheduling algorithms is to minimize waiting time, turnaround time, response time and context switching and maximizing CPU utilization. Round Robin CPU scheduling is a choice for the time sharing systems, where the performance of the system depends on the choice of the optimal time quantum. This paper presents a study of improved Round Robin CPU scheduling algorithm which is a combo of the features of Shortest Job First and Round Robin scheduling with varying time quantum. The data model approach has been adapted in analysis with simulation. It is proven that linear increment of the burst time of processes also creates corresponding linear increment in efficiency parameters. The origin shift of the burst time is also directly proportional to the efficiency parameters.
Keywords: CPU Scheduling, Round Robin (RR) Scheduling, Improved Round Robin Scheduling, Shortest Job First (SJF) Scheduling, Burst Time (BT), Waiting Time (WT), Turnaround Time (TT).
