VOLUME 4, ISSUE 3, MARCH 2015
Simulation and Performance Evaluation of CPU Scheduling Algorithms
Sultan Almakdi, Mohammed Aleisa, Mohammed Alshehri
Automatically Extract the Left Ventricular Myocardium by Using Active Contour Model
Jackulin DuraiRani.A, Sivaranjini.B, Rekha.A
Extracting Frequent Sequences from Web Log Data using Sequence Tree Algorithm
Priyanka Baraskar, Supriya Chavan, Dipshree Dhage, Samruddhi Giri, Jayashree Jha
Client Hacked Server: Application Scenario for Malicious Web Control
Ajit Prakash Alijad, Pritam Vishnu Aher, Sujata Ashok Chechare, Vishal Eknath Ghume
Weather Forecasting and Climate Changing Using Data Mining Application
Ankita Joshi, Bhagyashri Kamble, Vaibhavi Joshi, Komal Kajale, Nutan Dhange
Crime Investigation using Data Mining
S.R.Deshmukh, Arun S. Dalvi, Tushar J .Bhalerao , Ajinkya A. Dahale , Rahul S. Bharati,Chaitali R. Kadam
Emerging Trends in Changing HR Technology and its Landscape
Dr. N. Muthu, K.R. Kishore Kumar, S. MuthuKumar
Fault-Tolerance Support for Dynamic Optimal Proportional-Share in a Self-Organizing Cloud System
N.P. Ponnuviji
Real-time multitasking using ARM7 for elevator and camera with inbuilt embedded shell
K. Prasad Babu, Shaik Jhani Basha
An Automatic Labeling of the Clusters in Forensic Analysis for Improving Computer Inspection
Mrs.K.Shankari, Mrs.C.Rathika Prakash
Cyber Crime: Prevention & Detection
Ms M Lakshmi Prasanthi, Tata A S K Ishwarya
Modified Planar Inverted F Antenna for Wimax Application
S.Gopalakrishnan, R.Pradeep, P.Ramya
Security in Vehicular Ad-hoc Network Using Digital Envelop in Distributed Environment
Prakash Tripathi, Dr.Kanojia Sindhuben Babulal
A Review of Strategic Decision Making Tools: Towards an Efficient Enterprise Content Management System
Ajeet Ghodeswar, Sachin Sonawane, Sandeep Chavan
An Automated Agricultural Robot
Leenata Vedpathak, Pooja Salape, Snehal Naik
Analysis of DOA Estimation for Isotropic Antenna using Music and ESPIRIT Algorithm
Parmesh A, Marapareddy Sai Suchandan Reddy, R Mahesh, Sachin S K
Geographic Routing Oriented Sleep Scheduling in Duty-Cycled Mobile Sensor Networks
Sukanya N, Sudha R
Literature Survey on Data Security using Carp Two Step Authentication based on Human and Hard AI Problems
R.G.Vetrivel, J.Vasanth Kishore, B. Arun Kumar, S.Thivaharan
Mindwave-A New Way to Detect an Eye Blink
Sanket Ghorpade, GurjarPooja V., TripathiGauravV., Asst.Prof. S. R. Patil
Privacy Preserving Association Rule Mining in Retail Industries
Mr. Yewale Aniket J, Mr. Rajput Virendra D, Mr. Shirapure Sagar B, Mr. Patel Hardik K
A Hybrid DWT, PCA and SVD based Digital video watermarking Scheme-A Review
K.A. Rajurkar, Prof. S.K. Nanda
An Alternative For Database Queries:Auto Query Forms
Rohidas B. Sangore, Pratik P.Bhavsar, Manish S.Patil, Tushar M.Chaudhari
Improved Null Steering with Sidelobe Canceller for Linear Antenna Arrays
Sharlaine Nicole Monteiro, H.G.Virani
Road Quality and Ghats Complexity analysis using Android sensors
Prof. V. P. Tonde,Amol Jadhav, Shreyas Shinde, Ashish Dhoka, Sandeep Bablade
Seed Block Algorithm: Remote Smart Data-Backup Technique for Cloud Computing
Kailas Pophale, Priyanka Patil, Rahul Shelake, Swapnil Sapkal
Sub-band decomposition of EEG signals and Feature Extraction for Epilepsy Classification
Aarti Ashok Deshprabhu, Nayana Shenvi
Cloud Data Security Using Third Party Auditing and Encryption
Alpesh D.Patil, Abhijit T. Sapkale, Bhushan D.Shimpi , Archana K. Bhavsar
Analysis of Human Age Estimation Process
Husain Lakdawala , Rehan Mastan , Jibran Patel, Er. Nazneen Pendhari
Image Validation by Demosaicing
Pravin Dangale, Prashant Amage,Siddharth Ubale, Dnyaneshwar Jadhav,G.M.Gaikwad
Mongo DB GUI Operation Using Python
Sarkarsinha H. Rajput, Anand S. Jain, Priyanka B. Patil, Mahesh D. Patil
Equalization of OFDM by Iterative ICI reduction Methods
Chanderkanta, Dr. Sonika Singh
Fall Detection Methods for the Safe and independent living of Elderly People and Patients
Gagana P, Vani K S
Advance Computer Efficient Streaming and Sharing in the Clouds
Nitesh Chainani, Kishor Phapale, Roshan Pawar, Sagar Deshmukh, Prof. N.A. Dhawas
Performance Based Comparative Analysis of MOS Structures at 32nm and 20nm Node
Pallavi Choudhary,Tarun Kapoor
Congestion Control for Mobile Robots
Shashi Kant, Pushkar Shukla, Shehjar Safaya
Nonlinear Diffusion Filtering for Classifying Image
A.Shehanaz, A.Divya M.Tech
Securing Mobile Ad Hoc Networks with Intrusion Detection System: A Review
Dipamala Nemade, Ashish T. Bhole
Two Round Searchable Encrypted Data using Multi-Keywords for Cloud Computing
Mr. H.D.Gadade, Miss.Pranita U. Shinganwade, Miss. Punam S. Wanare,Miss. Vibha Badhe
Comparative Performance Analysis of MySQL and SQL Server Relational Database Management Systems in Windows Environment
Amlanjyoti Saikia, Sherin Joy, Dhondup Dolma, Roseline Mary. R
A Face Recognition Technique using Local Binary Pattern Method
Sarabjit Singh, Amritpal Kaur, Taqdir
Credit Card Fraud Detection using Hidden Markov Model
AashleshaBhingarde, AvnishBangar, Krutika Gupta, SnigdhaKarambe
Comparison of Various Cloud Simulation tools available in Cloud Computing
Utkal Sinha, Mayank Shekhar
Data Processing for Big Data Applications using Hadoop Framework
Navya Francis, Sheena Kurian K
Population Dynamics in Artificial Agent Societies: A Review
Harjot Kaur, Avneet Kaur
Android Application to get Answer through Voice
Mr. Prof. P. D. Hasalkar, Ms. Masaratjahan I. Kudle, Mr. Prasad N. Chaudhari, Mr. Deepak B. Mali, Ms. Mohammadi M. Kamplee
Memristor MOS Content Addressable Memory (MCAM) Design Using 22nm VLSI Technology
KomalJ.Anasane, Dr.UjwalaA.Kshirsagar
Application of Genetic Algorithm & Morphological Operations for Image Segmentation
Mansoor Farooq
Separable Data Hiding Using AES Algorithm
Sneha Rankhambe, Shital Sasane, Kirti Shelke
Design Analysis and Development of a Quad-Band Complementary Antenna Array for Wireless Application
Juin Acharjee, Mrinmoy Chakraborty
Different Communication Protocols for Wireless Sensor Networks: A Review
Meena Ahlawat , Ankita Mittal
To Support Search as You type by using MySQL in Databases
Gaikwad Namrata, Mahajan Chetan, Abhishek Ranjan, Manish Kumar, Prof. Manisha Galphade
Advertisement Mining using Hidden Markov Model
K. Sathiyamurthy, P.Dhivya , DJ.Panimalar
A Hybrid Piezoelectric-Solar Based Power Generation System
Ms. Bhusari Priya Govind, Ms. Chavan Deepika Limchan, Ms. Kadam Pratibha Dattatray, Mr.A.B.Vitekar
Effectual Approach for Facial Expression Recognition System
Shalini Mahto, Mrs. Yojana Yadav
Rectangular Shaped Microstrip Antenna for Triple-band Operation
PreetKanwal Kaur, Ramanjeet Singh
Analysis of ECG Signal Denoising Using Wavelet Transform
Roshini T V, Shoukath cherukat, Seena V
Techniques of Vibration Signature Analysis
Sumit Kumar Sar, Dr. Ramesh Kumar
Analysis and Comparison of Concurrency Control Techniques
Sonal kanungo, morena rustom. D
Low Power Double Gate Fin FET Based Sense Amplifier
Pallavi Priyadarshni, S.N.Singh
A Neural Network Approach for Real Time Emotion Recognition
Atul Chavhan, Sneha Chavan, Samiksha Dahe, Santosh Chibhade
Review of Different Queuing Disciplines in VOIP, Video Conferencing and File Transfer
Rajeev Sharma, Sukhjit Singh Sehra, Sumeet Kaur Sehra
Various Raster and Vector Image File Formats
Sakshica, Dr. Kusum Gupta
Survey on a Trust-Aware System for Personalized User Recommendations in Social Networks
Supriya S, Saravanan D
A Methodology for Development and Verification of Access Control System in Cloud Computing
Ankit Valdaya, Ratish Agarwal, Sachin Goyal
Simulation Analysis of 2-D Discrete Wavelet Transform by using Modified Radix-4 Booth Multiplier
Mr. Hemantkumar H. Nikhare, Prof. Ashish Singhadia
Interior Design in Augmented Reality Environment
Prof. B.Y.Jani, Pratiksha Dahale, Ankita Nagane, Bhavika Sathe, Nilam Wadghule
A Survey on QoS Behavior in MPLS Networks
Shruti Thukral, Banita Chadha
Novel Classification based approaches over Cancer Diseases
Mr. P. Thangaraju R. Mehala
Computer Based Optimum Load Shedding Controller Using Unconstrained Minimization Technique (Case Study)
E. A. Elsayed, PhD
A Literature Survey of Facial Recognition of Identical Twins
Nishu, Navdeep Kaur
Face Recognition Using PCA (Principal Component Analysis) and LDA (Linear Discriminant Analysis) Techniques
Amritpal Kaur, Sarabjit Singh, Taqdir
Impact of Hybrid Kernel for the Performance of the Operating System
Miss Hema K Reddy, Dr. M A Pund
Implementation of Merchant CRM system based on MVC architecture
Vignesh Ganesh, Nikita Singh, Thaksen J. Parvat
Real Time Unusual Event Detection in Video Sequences
Aneri Adhvaryu, Kalpesh Jadav
Assamese Speaker Recognition Using Artificial Neural Network
Bhargab Medhi, Prof. P.H.Talukdar
Prepaid Metering System
Ms.Neha Choudhary, Ms. Namrata Patil, Ms.Snehal Chaudhari, Mr.S.H.Rajput
Web Service Recommendation Using QOS Parameters and Users Location
Asst.Prof. N.K. Patil, Priyanka pawar, Shankar More, Bhausaheb Tupe
Effective Cryptposystem using MRGA with Steganography
Kunal Jain, Jitender Singh, Rushikesh Kapadnis, Bharti Dhote
An Efficient Fuzzy Association Rule Mining Technique
Gajendra Singh Rajput, Nayna Sharma, Shashank Swami
An Improved Hybrid Color Image Watermarking under Various Attacks
C. N. Sujatha, P. Satyanarayana
Neighbor Conduct Sensitive QoS Variance Aware Spectrum Sensing and Allocation
A.V.R. Mayuri, Dr. M.V Subramanyam
Face Recognition System: Alignment And Illumination Using Sparse Representation
Prof.A.S. Deshpande, Vinayak Karkud, Amol Kokare, Rohit Aurade
Lung Cancer Detection Using Artificial Neural Network & Fuzzy Clustering
Masaood A. Hussain, Tabassum M. Ansari, Prarthana S. Gawas, Nabanita Nath Chowdhury
A Simple Text Based Graphical Password Scheme to Overcome Shoulder Surfing Attacks
Monali Bendale, Neeta Singh, Sujata Baid , Aman Maurya
High Frequency Sound Based Device Communication
Sahil Lakhwani, Nishant Pardamwar, Nikhil Khewalkar
Merging of Test Cubes using Test Point Insertion for Low-Power Test Compaction
S.Sindhu, M.Sathiskumar
An Efficient NAND Gate Based Glitch-free All-Digital Duty-Cycle Corrector Architecture
S.Theivanayaki, M.Sathiskumar
Test Compaction of Logic Blocks by using Fault Identification Method
R.Vishnu Vardhan, M.Sathiskumar
Impact of Various Weather Conditions on Free Space Optics using 4X4 Transmitter/Receiver Combination Integrated with Different Ways of Amplification
Harneet Kaur, Himali Sarangal
Minimization of the Complexity of the digital Circuit using Genetic Algorithm
Amit Pandey, Sudha Nair
Sleep/Wake Scheduling for Target Coverage Problem in Wireless Sensor Networks
Manirajan.R, Sathishkumar.K.R
Simulation of 32 × 20 Gb/s WDM and DWDM System at Different Dispersion
Parveen Bagga, Himali Sarangal
Interactive Multimodal Visual Search Using Voice Command on Mobile Device
Mayur Kanawade , Unmesh Kadam, Priyanka Jadhav, Jai Chavan
A Survey on Secure Authorized Deduplication for Outsourced Data in Hybrid Cloud
Tamizh M, Elavarasi K
A 9 Slotsdual Band Microstrip Patchantenna for Wireless applications
G.Vijaya Kumari, P.Venkanna Chowdary, K.Madhulatha, M. Dinesh Kumar, K. Anand Sagar
Single-ElectronTransistor Logic for High Reliability of Moore’s Law and Low Power VLSI
P. Vidya Sekhar, M. Saran Chowdary, A.Vamsidhar, P.V.S.Sri Ram, N.Venkateswarulu
Analysis of DSR for Dynamic Topology Update Mechanism in LTRT based MANET’s
Nikhil Rathod, Sanghapal Salve, Vikas Suryawanshi, Yogesh Wagh
Measuring Code Quality
Ms. Dhanshree Kapse, Ms. Karishma Kabra, Ms. Madhavi Chopade, Mr. Kailas Palhal
Secure Database as a Service-a Review
Prof Swarnalata Bollavarapu, Kamal Mistry
Literature survey on ‘Performance Evaluation of TCP Reno, SACK, and FACK Over WIMAX Network
Kirti Sapra
Data Leakage Detection Using LSB
Sanchit S. Mhatre, Vaibhav V. Kakhandaki , Bhagyashri P. Yeola, Rakesh Badodekar
Security Mediator Using Blind Signatures and Key Rotation Algorithm
Sanket Chaudhari, Akanksha Singh, Sheetal Asopa
Task Scheduling in Federated Cloud by Multilevel Queue based on Genetic Algorithm
Dr.M.Srivenkatesh, K,Vanitha
Hand Geometric Recognition System based on Support Vector Machines (SVM)
GafarZenAlabdeenSalh, Abdelmajid Hassan Mansour, Malaz Fatah Elrahman Mohammed
A Hierarchal Tensor Based Approach with Boosted Regression Trees
Deeba M, J.Shyamala Devi
Online Social Networking Sites that are used for Specific Purpose
Dr. H Venkateswara Reddy, Tata A S K Ishwarya, Divya Bharathi Mulupuri
A Keyword Focused Web Crawler Using Domain Engineering and Ontology
Gunjan Agre, Snehlata Dongre
The comparison between OLSR and AODV routing protocols for Vehicular Adhoc Networks
V.Jigisha, Ch.Sudersan Raju, Dr.Ch.Balaswamy
A Robust Approach For Detection of the type of Fracture from X-Ray Images
Cephas Paul Edward V, Hilda Hepzibah S
Performance Analysis of Various Routing Protocols in Wireless Network
Aparna Joshi, Rahul Desai, Sachin Yadav, Avinash Thakur, Sunil Singh, Abhishek
Use of Cryptography and Secrete Sharing riven the Secrete into Multi-Cloud
Sanket Bora, Sandip Karale, Dheeraj Katariya, Ganesh Shejwal, P. P. Ahire
A LITREATURE SURVEY ON LOSSLESS IMAGE COMPRESSION
Malwinder Kaur, Navdeep Kaur
Identification of various writer’s handwritten Text using Scale Invariant Feature Transform
Harshal Kolhe, Prashant Jadhav, Mahadev Kolape, Kunal Shah
Secure Application Development in Academics
Ms. P.B.Alappanavar, Mr. Shashank A. Rangole
AN INNOVATIVE APPROACH TOWARDS VIRTUAL KEYBOARD
Renu, Shama Banoo, Sumbul
EX-OR LINK STATE OPERATION USING IN FISHEYE STATE ROUTING PROTOCOL FOR DESTINATION SEQUENCED IN MANET
S.Balaji, T.Dhanasundhari, R.Rajakumari, S.Ramina
Disaster Management Information System Framework using Feed Forward Back Propagation Neural Network
Gopal Datt , Ashutosh Kumar Bhatt , Sunil Kumar
A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service
Preeti, Kavita Khatkar
Three Layer Protection for Secure Data Transmission using Digital Audio as Carrier
Parul, Mr. Vikas Kamra
Logo Steganography Using Digital Watermarking
Kanchan, Krishan Kumar
Resolution Enrichment Techniques for Image incorporated with Text
Mohit, Mr. Krishan Kumar
Scalable and Secure Sharing of Personal Health Records in centralized Database Using Attribute-based encryption
Prof KanchanHadawale, NikamManoj B, KadamJayesh D, Salgar Vijay L, GhogareSagar R
Optimized Inter-Landmark Routing by Dtn-Flow Algorithm
Venothini.N, Padmapriya.V
Maintainability Estimation of Object Oriented Software: Design Phase Perspective
Nupur Soni, Dr. Mazhar Khaliq
Classified Data Organizing Maps: A Survey
Deepika Kourav, Asha Khilrani
An Effective Approach For Car Driving In Mountain Area Using Optimal Regulator
Nirmalya Chandra, Dhritimoy Roy , Avinash Kumar, Abhik Ghosh
Analysis of Virtualization Tools and Techniques
Mrs. Kavita S, Mrs. Dakshyani G, Mrs. Kiruthika
Audio watermarking: A Novel approach using hybridization of DWT+DCT
Mrunali J. Patel, Dhavalsinh V. Solanki, Dr. K. R. Borisagar
An Efficient Accident AvoidanceSystem Using Wireless Technology in Instrument Cluster
R.Deepa, Mr.A.Senthilkumar
Reliability Estimation of Object-Oriented Software: Design Phase Perspective
Anil Kumar, Namrata Dhanda
Paper on authentication of an system using hidden codes and random code generator
Ms. Dhanshri Agashe, Prof. A.R Raipurkar
Dynamic Nearest Neighbour Search With Keywords
MINOJINI N, GAYATHRI R KRISHNA, REKHA A, SOWMIYAA P
Analysis of Cry in New Born Infants
Dhanashri U.S. Talauliker , Nayana Shenvi
Association Policy for XML Query Answering By Mining Tree
Shambhu Kumar Singh, Sachinkumar S. Patil, Abhinay C. Deshmukh, Suraj C. Jadhav, Nilesh Rajput
Key Escrow Removal Using Random Oracle in CP-ABE for Security in Military Networks
Hiral Patel, M. A. Lokhandwala
Efficient Message Transfer Using Self Adaptive on Demand Geographic Reliable Routing Algorithm for Mobile AD Hoc Network
Devan.C, Raja.J
Brain Tumor Detection By Various Image Segmentation Techniques With Introducation To Non Negative Matrix Factorization
Sahil J Prajapati, Kalpesh R Jadhav
Fault Node Recovery Algorithm for a Wireless Sensor Network
Mulla Imroj A, Shaikh Tareque A, Diware Ajinkya G, Prof.Kadam Vikas
AN EFFECTIVE METHOD OF TIME REQUIRED TO COMPROMISE A COMPUTER SYSTEM
V.Srimathi, R.Vishali, S. Brintha Rajakumari
Data Mining Techniques For Diagnosis And Prognosis Of Cancer
Jaimini Majali, Rishikesh Niranjan, Vinamra Phatak, Omkar Tadakhe
Face and Foreground and Background Detection Estimation Using Adaptive Based Algorithm in Real Time Video’s
Annapurna, Uma Gayathri, Dr. Sivabalakrishnan
Fingerprint Based Attendance System
Karthik Krishnamurthi, S. Irudaya Mary, B. N. Sumalatha, Adler Pereira
Intelligent Drip Irrigation and Animals Entrance Avoiding System Using Wireless Sensor Network with Renewable Sources
M.Dananandhini, R.Murugasami
Traffic and Weather Monitoring System Using Wireless Sensor Networks
Dinesh Kulkarni, Sohail Shaikh, Amol Shirsath, Tejaswini Kadam
Deportation of Market Manipulation using ADS
Vaishali Ingale, Mohnish Chaudhary, Rashmi Sharma , Ravinder Kumar, Vaishnavi Pimpalnerkar
ATTACKS and THEIR EFFECT on SECURITY of DATA in CLOUD COMPUTING
Priyanka Jairath, Rajneesh Talwar
Abstract
Simulation and Performance Evaluation of CPU Scheduling Algorithms
Sultan Almakdi, Mohammed Aleisa, Mohammed Alshehri
DOI: 10.17148/IJARCCE.2015.4301
Abstract: An operating system provides numerous functions, such as I/O management, memory management, process management, and file management. Since the operating system is a set of the programs that interacts with computer hardware during executing time, process management is the most important function provided by an operating system. CPU scheduling is extremely necessary, as it makes a multi-tasking environment that keeps the CPU and I/O devices busy at all times which results in increased CPU utilization [1]. However, numerous scheduling algorithms have already been designed to regulate the access of threads and processes to the CPU, such as FCFS-SJF-SRT-RR. We simulated these scheduling algorithms and evaluated their performance (throughput, latency, utilization, turnaround time, and waiting time) in a multi-processor environment.
Keywords: OS, CPU scheduling, Multitasking, FCFS, RR, SRT, SJF.
Abstract
Automatically Extract the Left Ventricular Myocardium by Using Active Contour Model
Jackulin DuraiRani.A, Sivaranjini.B, Rekha.A
DOI: 10.17148/IJARCCE.2015.4302
Abstract: This paper completely describes the fully automatic segmentation system for left ventricular myocardium segmentation from CT images by using active contour model. The system follows a coarse-to-fine strategy by first restricting the left ventricle and then damaging the myocardial surfaces of the left ventricle for segmentation. Particularly, the blood surface of a CT image is removed and illustrated as a triangular surface. Then, the ventricle is localized as a salient element on these surface victimization geometric and anatomical characteristics. After that, the heart muscle surfaces square measure initialized from the localization result and evolved by applying forces from the image intensities with a constraint supported the initial heart muscle surface locations.
Keywords: Active contour, ASM, PCA, AAM, Myocardium.
Abstract
Extracting Frequent Sequences from Web Log Data using Sequence Tree Algorithm
Priyanka Baraskar, Supriya Chavan, Dipshree Dhage, Samruddhi Giri, Jayashree Jha
DOI: 10.17148/IJARCCE.2015.4303
Abstract: Sequential Pattern mining is the process of applying data mining techniques to large web data repositories.With the extensive use of Internet, discovery and analysis of useful information from the World Wide Web becomes a practical necessity. Data mining techniques are applied to a sequential database to discover the correlation relationships that exists among the ordered list of events. In this kind of mining, hidden data is extracted to get useful information which helps in knowing the browsing patterns of the users. Web usage mining is a data mining method that can be used in recommending the web usage patterns with the help of users� session and behaviour. The aim of discovering frequent sequential patterns in Web log data is to obtain information about the access behaviour of the users. It helps to understand the buying pattern of the existing customers. This paper focuses on the performance of the sequence tree algorithm which is better than the Generalized Sequential Pattern (GSP) algorithm. This paper emphasizes on the running time of sequence tree algorithm and its ability to discover more number of patterns than the standard GSP algorithm.
Keywords: Sequential Pattern Mining, Web usage mining, Generalized Sequential Pattern (GSP), Sequence tree algorithm.
Abstract
Client Hacked Server: Application Scenario for Malicious Web Control
Ajit Prakash Alijad, Pritam Vishnu Aher, Sujata Ashok Chechare, Vishal Eknath Ghume
DOI: 10.17148/IJARCCE.2015.4304
Abstract: Client-Server model is the backbone of today�s� internet communication. In which normal user can not have control over particular website or server. By using the same processing model one can have unauthorised access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerge to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, ip address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Where as virus helps to escape from server security by crashing the whole server
Keywords: �Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Abstract
Weather Forecasting and Climate Changing Using Data Mining Application
Ankita Joshi, Bhagyashri Kamble, Vaibhavi Joshi, Komal Kajale, Nutan Dhange
DOI: 10.17148/IJARCCE.2015.4305
Abstract: Weather forecasting is an important application in meteorology and has been one of the most scientifically and technologically challenging problems around the world. In this paper, we investigate the use of data mining techniques in forecasting maximum temperature, rainfall, evaporation and wind speed. Weather prediction approaches are challenged by complex weather phenomena with limited observations and past data. Weather phenomena have many parameters that are impossible to enumerate and measure. Increasing development on communication systems enabled weather forecast expert systems to integrate and share resources and thus hybrid system has emerged. Even though these improvements on weather forecast, these expert systems can�t be fully reliable since weather forecast is main problem.
Keywords: �Weather Prediction, Data Mining, Weather Conditions, Decision Trees
Abstract
Crime Investigation using Data Mining
S.R.Deshmukh, Arun S. Dalvi, Tushar J .Bhalerao , Ajinkya A. Dahale , Rahul S. Bharati,Chaitali R. Kadam
DOI: 10.17148/IJARCCE.2015.4306
Abstract: Crime rate is increasing very fast in India because of increase in poverty and unemployment. With the existing crime investigation techniques, officers have to spend a lot of time as well as man power to identify suspects and criminals. However crime investigation process needs to be faster and efficient. As large amount of information is collected during crime investigation, data mining is an approach which can be useful in this perspective. Data mining is a process that extracts useful information from large amount of crime data so that possible suspects of the crime can be identified efficiently. Numbers of data mining techniques are available. Use of particular data mining technique has greater influence on the results obtained. So the performance of three data mining techniques { J48, Nave Bayes and JRip will be compared against sample crime and criminal database and best performing algorithm will be used against sample crime and criminal database to identify possible suspects of the crime. Data mining is a process of extracting knowledge from huge amount of data stored in databases, data warehouses and data repositories. Clustering is the process of combining data objects into groups. The data objects within the group are very similar and very dissimilar as well when compared to objects of other groups.
Keywords: Criminal database, Crime investigation, Data Mining, J48, JRip, and Na�ve Bayes.
Abstract
Emerging Trends in Changing HR Technology and its Landscape
Dr. N. Muthu, K.R. Kishore Kumar, S. MuthuKumar
DOI: 10.17148/IJARCCE.2015.4307
Abstract: Technology is changing everything and impacting most every part of every business. Innovative human resource practices have reengineered the old process. Today human resource managers have innovated their way of hiring and recruiting employees. Innovative HR practices have overcome various human capital challenges viz. geographical limitations, mobilization etc. Human resources technology helps in all processes from recruit to retire functions and has drastically changed the way employees and managers get access to the human resource data. The past decade taught business firms everywhere a humbling lesson. Domestic companies learned that they can no longer ignore global markets and competitors. Successful firms in mature industries learned that they cannot overlook emerging markets, technologies, and management approaches. Companies of every sort learned that they cannot remain inwardly focused, ignoring the needs of customers and their environment. The key components to an effective human resource team consist of finding solutions that address their biggest challenges with respect to personnel and technology. Using the best in HR Technology to stay ahead of the curve just makes sense. This paper explores the available technology and its usefulness in executing the managerial functions and challenges faced by them. Indeed technology rules the world and HR people enjoy the fruits of benefits and one can not wish away the organizational which can accommodate with caution and human touch. No one can deny the fact that no doubt that technology has made it easier and faster to gather, collate, and deliver information and communicate with employees. More importantly, it has the potential to reduce the administrative burden on the HR department so it is better able to focus on more meaningful HR activities, such as providing managers with the expertise they need to make more effective HR related decisions. Mobile technology adds values to the HR and presents numerous web based� applications to HR people.
Keywords: HR technology, technology tools, competitive advantage, M commerce
Abstract
Fault-Tolerance Support for Dynamic Optimal Proportional-Share in a Self-Organizing Cloud System
N.P. Ponnuviji
DOI: 10.17148/IJARCCE.2015.4308
Abstract: The increasing popularity of Cloud Computing as an attractive alternative to classic information processing systems has increased the importance of its correct and continuous operation even in the presence of faulty components. But fault tolerance is still a crucial issue in SOC. By utilizing VM technology, the performance and fault isolation of cloud resources can be provisioned on demand in a fine grained, multiplexed manner. The design of the DOPS resource allocation method, utilizes the proportional share model. The key idea is to redistribute available resources among running tasks dynamically, where these tasks could use up the maximum capacity of each resource in node. To locate for qualified nodes in the SOC environment, a fully decentralized range query protocol called P-G CAN has been tailored for DOPS. Pointer Gossiping is responsible for making sure every node in the system eventually knows important information about every other node�s state including those that are unreachable. The sensitivity analysis conducted on the model, violates certain assumptions that creates more impact on the dynamic optimal resource allocation of multiple attributes due to faulty components. Hence an analysis will be made in a VM environment, aiming to find a node already present in the network and identify a zone that can be split. Thereby, updating the routing tables of nodes neighbouring the newly split zone. During this step, faulty nodes will be identified and re-routing will be done either by merging zones or managing with the neighbour node, all performed dynamically by the SOC system.
Keywords: Self �Organizing Cloud (SOC), Virtual Machine (VM), Dynamic Optimal Proportional Share (DOPS), Pointer-Gossiping Content Addressable Network (PG-CAN), Sun Grid Engine Cluster (SGE).
Abstract
Real-time multitasking using ARM7 for elevator and camera with inbuilt embedded shell
K. Prasad Babu, Shaik Jhani Basha
DOI: 10.17148/IJARCCE.2015.4309
Abstract: In this paper we are coming up with an embedded system with ARM7 processor controlling the operation of the elevator and camera. The microprocessor is programmed to run three tasks namely an elevator, a camera, and an embedded shell. The elevator and camera work together with the camera taking a snapshot of the occupants in the elevator every time the door opens. The tasks need precise timings which require employment of a real time operating system which provides determistic task switching�s and precise outputs. This paper employs RTX real-time operating system for the three tasks to run concurrently.�
The elevator is programmed in a way to accept simultaneous pressing of the entire floor buttons and is based on a UART system which makes display to be connected to it. The camera takes a photo as soon as the door is opened as it is given as a separate task there is no way the camera will fail to take a photo before the door is closed.
This paper also includes an embedded shell which can monitor and manipulate any memory location on the target board making it a powerful tool for debugging errors and can read and write data on to various memory locations in the processor. It can be used on any embedded system using an ARM7 processor giving it a wide range of applications.
Keywords: Multitasking, Embedded Shell, ARM7 processor, RTX.
Abstract
An Automatic Labeling of the Clusters in Forensic Analysis for Improving Computer Inspection
Mrs.K.Shankari, Mrs.C.Rathika Prakash
DOI: 10.17148/IJARCCE.2015.4310
Abstract: Computer Forensics analysis is defined as the discipline that combines elements of law and computer science which used to analysis the seized computers in Forensics department. Clustering algorithms are typically used for exploratory data analysis, where there is little or no prior knowledge about the data. This is exclusively in a number of applications of Computer Forensics, including the one addressed in our work. In exacting, algorithms for clustering documents can make possible the innovation and functional knowledge from the documents under analysis. To be had an approach that applies document clustering algorithms to forensic analysis of computers seized in police investigations. It can be� moving out with six familiar clustering algorithms (K-means,K-medoids, Single Link, Complete Link, Average Link, and CSPA) applied to five real-world datasets obtained from computers seized in real-world investigations. Automatically labeling document clusters with words which identify their topics is difficult to do well. In order to solve this problem we present two methods of labeling document clusters provoked by the model that words are generated by a hierarchy of mixture components of varying generality. The first method assumes existence of a document hierarchy (manually constructed or resulting from a hierarchical clustering algorithm) and uses a chi squared test of consequence to detect different word usage across categories in the hierarchy. The second method selects words which equally occur frequently in a cluster and effectively differentiate the given cluster from the other clusters.� We compare these methods on abstracts of documents selected from a subset of the hierarchy of the Cora search engine for computer science research papers. Labels produced by our methods showed superior results to the commonly employed methods.
Keywords: Data mining, Forensic Analysis, Clustering, Fuzzy c-means, EM Algorithm
Abstract
Cyber Crime: Prevention & Detection
Ms M Lakshmi Prasanthi, Tata A S K Ishwarya
DOI: 10.17148/IJARCCE.2015.4311
Abstract: Cybercrime is a complex and ever changing phenomenon. Cyber criminals are becoming more sophisticated and are targeting consumers as well as public and private organizations. Therefore, additional layers of defense are needed. Cyber crime has been increasing in complexity and financial costs since corporations started to utilize computers in the course of doing business. Some of the case studies of cyber crime include Parliament attack case. In this paper we have discussed about Cyber crime and cyber security and different cyber crimes that we come across and prevention techniques and detection techniques such as Tripwires, configuration checking tools, Honey Pots, anomaly detection system and operating system commands. In this we also discuss about regulation acts imposed against Cyber crime and also online safety tips.
Keywords: Cyber Crime, Cyber Security, Honey pots, Trip wires, Anomaly detection, Case Study, Regulation Acts, Online safety tips
Abstract
Modified Planar Inverted F Antenna for Wimax Application
S.Gopalakrishnan, R.Pradeep, P.Ramya
DOI: 10.17148/IJARCCE.2015.4312
Abstract- In this paper the PIFA antenna with strips extended from ground plane is proposed for the WIMAX application. The PIFA antenna works at the frequency of 3.5 GHz with the satisfying antenna parameters like directivity, gain and radiated power. The figure 8 type radiation pattern is obtained as the result. The project simulation is carried out in Agilent Technologies Advanced Design System (ADS).
Keywords- ADS, PIFA, FR4, SAR, WIMAX
Abstract
Security in Vehicular Ad-hoc Network Using Digital Envelop in Distributed Environment
Prakash Tripathi, Dr.Kanojia Sindhuben Babulal
DOI: 10.17148/IJARCCE.2015.4313
Abstract: Vehicle connectivity can be considered as an emerging technology that provides dissemination of warning messages and traffic information to vehicles running on the road. The deployment of vehicular ad-hoc network communication is strictly dependent on strictly on their security and privacy features. Recent advances in the hardware and software technology, tremendous improvements are made. Emerging Vehicular Ad-hoc Networks have the potential to improve the safety, traffic efficiency and as well as comfort to both drivers and passengers of highways. In the last three decades, various kinds of improvements are made in Wireless Ad-hoc Network and now a day�s one of the most attractive research topic is Vehicular Ad-hoc Network (VANET) and become the most relevant form of Mobile Ad-hoc Networks. In this paper we address the Security in Vehicular ad-hoc Network. We provide a detail threat analysis as well as devise the solution of these threats. We provide a set of security protocols to protect the privacy and analyze the robustness and efficiency. In this paper we propose security architecture for vehicle communication. The architecture contains symmetric and asymmetric cryptography mechanism in the vehicular distributed environment for dissemination of information securely and efficiently.
This paper contains Digital Envelop mechanism in a Distributed Environment for dissemination of message as well as Key Management that provide the privacy and security.
Keywords: �ECDSA, ECIES, G-Private Key, I-Public Key, TESLA
Abstract
A Review of Strategic Decision Making Tools: Towards an Efficient Enterprise Content Management System
Ajeet Ghodeswar, Sachin Sonawane, Sandeep Chavan
DOI: 10.17148/IJARCCE.2015.4314
Abstract: Driven by the need to control the content chaos that pervades local drives, file shares, email systems and document stores, organizations large and small are looking to impose order through Content Management. There are two types of content � structured and unstructured. Unstructured content includes: email, PowerPoint presentations, images, videos, audio recordings, documents, records and other files. ECM focuses on unstructured content to make it structured. Data mining is a tool used to extract important information from existing data and enable better decision-making throughout the banking and retail industries. They use data warehousing to combine various data from databases into an acceptable format so that the data can be mined. The data is then analysed and the information that is captured is used throughout the organization to support decision-making. Data Mining techniques can be very helpful to the banks for better targeting and acquiring new customers, fraud detection in real time, providing segment based products, analysis of the customers purchase patterns over time for better retention and relationship. Those banks that have realized the usefulness of data mining and are in the process of building a data mining environment for their decision-making process will obtain huge benefit and derive considerable competitive advantage in future.
Keywords: decision making, ECM, data miming, knowledge mining, OLAP.
Abstract
An Automated Agricultural Robot
Leenata Vedpathak, Pooja Salape, Snehal Naik
DOI: 10.17148/IJARCCE.2015.4315
Abstract: The main aim of this proposed system is to measure of the N(nitrogen), P(phosphorus) and K(potassium) contents of soil and according to result, we can add the necessary elements in the soil. The N, P and K amounts in the soil sample is determined by comparing the solution with colour chart. This will describe amount of N, P and K as- high, medium, low and none. The types of nutrients present in the soil - macronutrients (nutrients required in large quantities) and micronutrients (nutrients required in smaller quantities). Nitrogen, Phosphorus, Potassium are mainly required in large amount in soil. �NPK measurement, automatic seeding and fertilizer dispensing robot� system will check the amount of the three main fertilizers which are nitrogen, phosphorus and potassium in the soil and will dispense the required amount of nutrient. A NPK kit which is used for testing of the soil sample is in existence but the fertilizers dispensing is to be done manually. This problem will be rectified in this system. This proposed system will saves labour, time and obtain better results with using less amount of fertilizers. The same system can be used for seeding also.
Keywords: �NPK measurement, digging, automatic seeding, fertilizer dispensing.
Abstract
Analysis of DOA Estimation for Isotropic Antenna using Music and ESPIRIT Algorithm
Parmesh A, Marapareddy Sai Suchandan Reddy, R Mahesh, Sachin S K
DOI: 10.17148/IJARCCE.2015.4316
Abstract: The deployment of smart antennas provides greater capacity and performance benefits over standard antennas because they are used to customize antenna coverage patterns to match the traffic conditions in a wireless network. The two basic functions of any smart antenna are Direction of Arrival (DOA) Estimation and Adaptive Beam forming (ABF). Direction of Arrival algorithms work on the signals received at the antenna array elements and computes the angle of arrival of all incoming signals that include the desired user signal, interfering signals and multipath signals. Ultimately a beam is steered along the direction of the desired signal, while a null is generated along the direction of the interfering signal. The smart antenna sub system estimate the direction of arriving signals by employing DOA algorithms. The performance of smart antenna greatly depends on the effectiveness of DOA estimation algorithm. This paper analyzed the performance of MUSIC (Multiple Signal Classification) and ESPIRIT (Estimation of Signal Parameters via Rotational Invariance Technique)� �algorithms for DOA estimation. All the simulations are carried out using MATLAB.
Keywords: DOA, MATLAB, ESPRIT, ABF
Abstract
Geographic Routing Oriented Sleep Scheduling in Duty-Cycled Mobile Sensor Networks
Sukanya N, Sudha R
DOI: 10.17148/IJARCCE.2015.4317
Abstract: In this paper, we focus on sleep scheduling for geographic routing in duty-cycled WSNs with mobile sensors and propose two geographic-distance-based connected-k neighborhood (GCKN) sleep scheduling algorithms. The first one is the geographic-distance-based connected-k neighborhood for first path (GCKNF) sleep scheduling algorithm. The second one is the geographic-distance-based connected-k neighborhood for all paths (GCKNA) sleep scheduling algorithm. By theoretical analysis and simulations, we show that when there are mobile sensors, geographic routing can achieve much shorter average lengths for the first transmission path explored in WSNs employing GCKNF sleep scheduling and all transmission paths searched in WSNs employing GCKNA sleep scheduling compared with those in WSNs employing mobile sensors using Weighted Rendezvous Planning (WRP).
Keywords: Connected-k neighborhood (CKN), duty-cycle, geographic routing, mobility, wireless sensor networks (WSNs).
Abstract
Literature Survey on Data Security using Carp Two Step Authentication based on Human and Hard AI Problems
R.G.Vetrivel, J.Vasanth Kishore, B. Arun Kumar, S.Thivaharan
DOI: 10.17148/IJARCCE.2015.4318
Abstract: This paper introduces image based CAPTCHA to protect user data or unauthorized access of information. Here the password is created from images and text password. The Current system is based on only text password but it has some disadvantages like small password mostly used and easy to remember. This type of password is easy to guess through different attack i.e. dictionary attack and brute force attack. We are proposing a new system which uses multiple servers, enabling added level of security to the existing authentication, thereby providing access to the database. As this is a technique based on recognition of graphical background more security is achieved as well as easy to remember.
Keywords: �CAPTCHA, Password, dictionary attack, brute force attack, graphical password, multiple server.
Abstract
Mindwave-A New Way to Detect an Eye Blink
Sanket Ghorpade, GurjarPooja V., TripathiGauravV., Asst.Prof. S. R. Patil
DOI: 10.17148/IJARCCE.2015.4319
Abstract: This paper presents the review on eye blink detection methods used for the purpose of physically challenged or people suffering from ALS, epilepsy like disease. Brain Computer Interface (BCI) is a methodology which bridges a way for communication with the objects using brain thoughts. This paper will introduce to the other methods of eye blink detection and also to the NeuroskyMindwave which is a revolutionary product to detect Electroencephalogram signal (EEG) which also detects blink of an eye. It gives a glimpse upon the limitations of� previous approaches and advantages of proposed product. At the end it will also address the future work which we are doing using this hardware for people suffering from ALS and epilepsy.
Keywords: Neurosky, Mindwave, EEG, eye blinks.
Abstract
Privacy Preserving Association Rule Mining in Retail Industries
Mr. Yewale Aniket J, Mr. Rajput Virendra D, Mr. Shirapure Sagar B, Mr. Patel Hardik K
DOI: 10.17148/IJARCCE.2015.4320
Abstract: With data mining techniques one can easily disclose other's sensitive information or knowledge. So, preserving privacy for sensitive knowledge has become an important aspect. Privacy preserving data mining (PPDM) is a novel research direction to preserve privacy for sensitive knowledge from disclosure. DSRRC (Decrease Support of R.H.S. item of Rule Clusters) algorithm is used to preserve privacy for sensitive association rules in database. This algorithm clusters the sensitive association rules based on certain criteria by modifying fewer transactions and hides many rules at a time. Moreover it provides privacy for sensitive rules at certain level while ensuring data quality.
Keywords: Association Rules, Support, Confidence, DSRRC, Privacy preserving, Data Mining, Clustering, Sensitivity, Sanitized Database
Abstract
A Hybrid DWT, PCA and SVD based Digital video watermarking Scheme-A Review
K.A. Rajurkar, Prof. S.K. Nanda
DOI: 10.17148/IJARCCE.2015.4321
Abstract: Digital Watermarking is a technology used for the copyright protection of digital applications. Watermarking is a concept of embedding a special symbol, watermark, into an electronic document so that a given piece of copyright information is permanently tied to the data. It is an effective way to protect copyright of multimedia data even after its transmission. In recent years image watermarking techniques are grown-up. So�� digital video watermarking is the next challenging task and it is becoming a current academic research topic. Digital watermarking is a process of embedding watermark into digital document, where watermark can be some binary data, a small image or a seed value. It can also be any arbitrary or serial number, possession identifier, information about the inventor, date etc, that would be inserted into the original digital products. Digital watermarking refers to embedding watermarks in a multimedia documents and files in order to protect them from illegal copying and identifying manipulations. We proposed a technique is Hybrid DWT, PCA and SVD method for digital video watermarking. In two parts a proposed method of watermarking is divided:� watermark embedding and watermark extracting.
Keywords: DWT, hybrid, PCA, SVD, PSNR, watermark
Abstract
An Alternative For Database Queries:Auto Query Forms
Rohidas B. Sangore, Pratik P.Bhavsar, Manish S.Patil, Tushar M.Chaudhari
DOI: 10.17148/IJARCCE.2015.4322
Abstract: Modern databases contains very huge amount of data. Also the databases have exists various complex relationships among them. These databases contains over thousands of relations and their entities. Existing query forms are unable to generate queries dynamically as per the user requirements.
Alternative Query Form which takes input in the form of human understandable language and converts it into appropriate SQL query and the query will be fired on relational database to fetch the appropriate data. It is very easy and convenient to ask questions to database in natural language especially to the non-technical users who do not understand the database query language such as SQL.
Our system will provide easy access to complex databases using NLP which perform lexicon processing, query formulation, and dynamic generation of SQL queries which can be easily reused or modified.
Keywords: : Database, Natural Language Processing (NLP), Alternative Query Form(AQF), SQL, Query formulation, Ranking method,Data Source Name(DSN),Local Area Network(LAN) etc.
Abstract
Improved Null Steering with Sidelobe Canceller for Linear Antenna Arrays
Sharlaine Nicole Monteiro, H.G.Virani
DOI: 10.17148/IJARCCE.2015.4323
Abstract: Reduction of interference is one of the major tasks in a communication system. Jamming sources and clutter are the two major sources of interferences. The interferers are generally estimated by Direction of arrival (DOA) techniques and then they are suppressed by introducing nulls in those directions. Suppression of interference leads to higher Signal to Noise ratio and superior data rates. Clutter enters through the sidelobes. Therefore sidelobe reduction reduces the effect of clutter. Null Steering Algorithm generally estimate weights which are then multiplied with weights generated for sidelobe suppression. This paper focuses on introduction and steering of nulls in any desired direction and sidelobe suppression.
Keywords: Null Steering; Array Factor; Adaptive Beamforming; Antenna Array; Modified Bartlett- Hanning window.
Abstract
Road Quality and Ghats Complexity analysis using Android sensors
Prof. V. P. Tonde,Amol Jadhav, Shreyas Shinde, Ashish Dhoka, Sandeep Bablade
DOI: 10.17148/IJARCCE.2015.4324
Abstract: Importance of the road infrastructure for the society could be the same as importance of blood vessels for human`s. Road surface quality should be monitored and repaired on a regular basis. It is very difficult to design a optimal system which gathers the road condition data and processes it. Participatory sensing approach can be mostly used for such data collection.The paper is describes a mobile sensing system (android application) for road irregularity detection using Android OS based smart phone sensors. Selected data processing algorithms are discussed and their evaluation presented with true positive rate as high as 90% using real world data. The optimal parameters for the algorithms are determined as well as recommendations for their application.Continuously keeping track on road and traffic conditions in a city is a problem widely studied. Many methods have available �towards addressing this problem. But this methods proposed �require dedicated hardware such as GPS devices and accelerometers in vehicles or cameras on roadside and near traffic signals. All such proposed are unaffordable tothe common� man� regarding of monetary cost and human effort required. We extend a prior study to improve the algorithm based on using accelerometer, GPS and magnetometer sensor readings for trafficand road conditions detection. We are specifically made research �in identifying braking events - frequent braking indicates congested traffic conditions - and bumps on the roads to characterize the type of road.
Keywords: Mobile sensing; Android phones; Bumps; Accelerometers; GPS; Algorithms.
Abstract
Seed Block Algorithm: Remote Smart Data-Backup Technique for Cloud Computing
Kailas Pophale, Priyanka Patil, Rahul Shelake, Swapnil Sapkal
DOI: 10.17148/IJARCCE.2015.4325
Abstract: In earlier days,large amount of data� is generated in electronic format, �to maintain this data there is need of� data recovery services. To provide these services in this paper we introduce seed block algorithm which we used for remote smart data backup. There are two objective of this algorithm. The first one is gather information from any remote location and the second is recover the files which might be delete or that can be loss because of cloud destroy. This algorithm also reduce the time require for recovery process.
Keywords: Backup Privacy; Central Repository; Seed Block; Parity Cloud; Parity cloud service; AES encryption.
Abstract
Sub-band decomposition of EEG signals and Feature Extraction for Epilepsy Classification
Aarti Ashok Deshprabhu, Nayana Shenvi
DOI: 10.17148/IJARCCE.2015.4326
Abstract: Electroencephalogram (EEG) is the recording of brain electrical activity and it contains valuable information related to the different physiological states of the brain. Hence, EEG is considered an indispensable tool for diagnosing epilepsy in clinic applications. Epilepsy keeps its importance as a major brain disorder. In this paper, we aimed to classify the EEG signals and diagnose the epileptic seizures directly by using wavelet transform and an artificial neural network model. EEG signals are separated into their spectral components by using wavelet transform, by a method of sub-band decoding. These spectral components are applied to the inputs of the neural network which is then trained to give two outputs to classify whether the signal is epileptic or not. In this paper, the features extracted and the accuracy obtained from this feature set in classifying the data sample as epileptic or not is explained.
Keywords: Wavelet transform, Sub-band decomposition, �Feature Extraction, Back-propagation, Neural network, Accuracy.
Abstract
Cloud Data Security Using Third Party Auditing and Encryption
Alpesh D.Patil, Abhijit T. Sapkale, Bhushan D.Shimpi , Archana K. Bhavsar
DOI: 10.17148/IJARCCE.2015.4327
Abstract: Security for the data which is stored on the cloud by user is very important issue. User may expect some security for their data from the cloud service provider, there can be serious issues regarding data security between user and service provider. To solve this kind of issues, we can use third party as an auditor. Here we have analyzed different ways to ensure secure data storage in cloud. We are going to provide the security to the user�s data by using encryption technique. For this we are using the Advanced Encryption Standard algorithm for encryption and decryption. But when Cloud Service Provider has both encryption and decryption keys, there is threat to security and privacy of data. CSP may pass the user data without user�s knowledge. For auditing we are introducing Third Party Auditor. Here the data will be encrypted at user side and will be in encrypted form over network and to TPA. TPA will verify the data before storing it on the cloud. There are large numbers of users of cloud computing who are accessing and modifying the data and they need the reliable service provider who can provide complete security for their data. So the TPA will audit the data and check the data integrity of client�s data. No one else rather than user is able to view data. But if someone tries to access the data, and then there will be a file alert generated to the user. Hence user will have more elaborated view over his data privacy. In this paper we are providing solution for the user who needs security and privacy for their data.
Keywords: Third Party Auditor (TPA), Cloud Service Provider (CSP), Data Integrity, Encryption.
Abstract
Analysis of Human Age Estimation Process
Husain Lakdawala , Rehan Mastan , Jibran Patel, Er. Nazneen Pendhari
DOI: 10.17148/IJARCCE.2015.4328
Abstract: Estimating human age automatically via facial image analysis has lots of potential real-world applications, such as multimedia communication, market intelligence and visual surveillance, and human computer interaction. However, it is still a challenging problem to automatically and effectively estimate human ages. Numerous researchers have worked on this interesting area and proposed different age estimation approaches. In this paper, we present an analysis on various age estimation techniques that were proposed in earlier literature. Also we provide an overview of the age estimation process.
Keywords: Automatic Brightness, Human Age Estimation, Face Recognition
Abstract
Image Validation by Demosaicing
Pravin Dangale, Prashant Amage,Siddharth Ubale, Dnyaneshwar Jadhav,G.M.Gaikwad
DOI: 10.17148/IJARCCE.2015.4329
Abstract: With the growth of image processing technology, it is difficult to distinguish between photographic images (PIM) and photorealistic computer generated images PRCG. Watermarking was the previous technic for authentication purpose. The Demosaicing algorithm is used to detect the validity of digital images and image forgery detection.The main aim of this paper is to provide system which will help to detect the manipulation in the images.Due to technological changes, the computer generated images become more realistic. In order to distinguish between computer generated images and digital camera images we implement this approach.The whole system is controlled by administrator module.Most digital cameras employ an image sensor with a color filter array. The process of Demosaicing interposes the raw image for allocating color channels for each pixels. With proper analysis, traces of Demosaicing are revealed in the peak of an analysis signal. Theexistence of Demosaicing indicates the image is from a digital camera rather than generated by a computer.
Keyword: Demosaicing, Forgery, CFA (Color Filter Array), PIM (Photo Graphic image), PRCG (Photo Realistic Computer Generated image).
Abstract
Mongo DB GUI Operation Using Python
Sarkarsinha H. Rajput, Anand S. Jain, Priyanka B. Patil, Mahesh D. Patil
DOI: 10.17148/IJARCCE.2015.4330
Abstract: Mongo DB is a perfect NoSQL database. We can improve performance and index operations speed using this Mongo DB database. There are various features of Mongo DB like increased speed of database operations, various functions instead of complex SQL queries and a very huge performance improvement.
Python is web scripting language used for high usage websites for improving performance of the website and reducing the overhead on the web server. We will use this Python language in integration with Mongo DB for highest possible performance.
Keywords: MongoDB, Python, Add data, Delete Data, Update Data, View Data, NoSql.
Abstract
Equalization of OFDM by Iterative ICI reduction Methods
Chanderkanta, Dr. Sonika Singh
DOI: 10.17148/IJARCCE.2015.4331
Abstract: Orthogonal frequency division multiplexing (OFDM) is a method of encoding digital data on multiple carrier frequencies and developed as a popular scheme for 4G mobile communications. Inter-carrier interference (ICI) is a big challenge for OFDM systems while trying to utilize the full spectrum with zero cyclic prefix. It has been investigated that the ICI in OFDM is almost like the co-channel interference in CDMA and the techniques used there to reduce the interference can be used in OFDM also .The techniques are frequency domain equalizers like Operator perturbation Techniques (OPT) and Serial interference cancellation (SIC) and Parallel interference cancellation technique (PIC) along with Gauss Seidel iterative reduction technique. The aim of this paper is to study the OFDM systems suffering from ICI, due to large Doppler shift associated with high velocity of receiver. The main impact of ICI in an OFDM system is to destroy the orthogonality between subcarrier leads to the introduction of off-diagonal element in the channel matrix, making the traditionally considered diagonal channel matrix inaccurate and increasing the complexity of channel estimation and equalization .In this paper iterative cancellation methods have been studied and compared as they require the inversion of only a small portion of original full matrix and thus the complexity is reduced
Keywords: OFDM, ICI, Gauss-Seidel, OPT, PIC and SIC
Abstract
Fall Detection Methods for the Safe and independent living of Elderly People and Patients
Gagana P, Vani K S
DOI: 10.17148/IJARCCE.2015.4332
Abstract: �As we grow old, our desire for independence does not diminish; yet our health increasingly needs to be monitored. Injuries such as falling can be serious problem for the elderly. If a person falls and is not able to get assistance within an hour, casualties arising from the fall can result in fatalities as early as 6 months later. It would seem then that a choice between safety and independence must be made.� Fortunately, as health care technology advances, simple devices can be made to detect or even predict falls in the elderly, which could easily save lives without too much intrusion on their independence. Much research has been done on the topic of fall detection and fall prediction. Some have attempted to detect falls using a variety of sensors such as cameras, accelerometers, microphones, or a combination of the same. This paper is aimed at reporting which existing methods have been found effective and the combination of which will assist in the progression towards a safe, unobtrusive monitoring system for independent living. �
Keywords: Fall Detection, Kinect camera, Sensors, Elderly people.
Abstract
Advance Computer Efficient Streaming and Sharing in the Clouds
Nitesh Chainani, Kishor Phapale, Roshan Pawar, Sagar Deshmukh, Prof. N.A. Dhawas
DOI: 10.17148/IJARCCE.2015.4333
Abstract: Now days on video traffic over the computer networks have been sourcing,the wireless link capacity cannot keep up with the requirements of traffics.The difference between the traffic requirements and thelink capacity, along with time-changing link conditions, results in less service quality of video streaming over computer networks such as long buffering time and interruption. Usingthe cloud computing technology, we propose a new computer video streaming framework, dubbed ACES-Cloud, which divides in two types one for adaptive streaming and second is for sharing of videos.In traditional systems the performance of video was poor, toincreases the quality of video streaming the way of using ACES cloud. In this system of ACES cloud uses a technics as SVC for creating a private agent to fetching a videos from VSP and stored in the ACES cloud. Using this way the problem of traffic and so buffering problem to be solved.This paper includes the performing of various methods and structures which are used in cloud to provide effective solution for providing better service to the users.
Keywords: ACES cloud, SVC (Scalable Video Coding), SIN, ACS Algorithm.
Abstract
Performance Based Comparative Analysis of MOS Structures at 32nm and 20nm Node
Pallavi Choudhary,Tarun Kapoor
DOI: 10.17148/IJARCCE.2015.4334
Abstract: MOSFETs have always been the workhorse of semiconductor industry, with passing decades the sizes of MOSFETs have been continuously decreasing. This is guided by decrease in the gate length or channel length. However decrease in channel length of planar MOSFETs has reached its saturation level due to short channel effects and DIBL. In this paper we have tried to present an electrical comparison between 32nm node technology and 20nm node technology of planar MOS structures. The structures have been fabricated using SILVACO TCAD software and study of threshold voltages and corresponding oxide thickness has been made.
Keywords: 35 nmPMOS, 20 nm PMOS, Threshold Voltage, Oxide Thickness, SILVACO TCAD, Athena.
Abstract
Congestion Control for Mobile Robots
Shashi Kant, Pushkar Shukla, Shehjar Safaya
DOI: 10.17148/IJARCCE.2015.4335
Abstract: Small group of robots are being used at different places to gather information. The proclivity for the usage of a team of robots in order to gather information is likely to increase in the upcoming future. The efficient and lossless communication becomes vital for these robots. In our research paper we propose an algorithm that focuses on minimizing congestion and data losses amongst a team of robots. Our algorithm prevents congestion beforehand and can be divided into two part. A detailed description of these parts have been given in the paper. The algorithm was also tested on various grounds. These results have been discussed in the paper. The algorithm focuses on labelling each node depending on its congestion status and discovering an alternate path having a lower congestion status as soon as the path becomes liable to come in the congested zone.
Keywords: Traffic and Congestion free routing, Mobile ad-hoc network, Congestion control, Swarm robots, reliable communication.
Abstract
Nonlinear Diffusion Filtering for Classifying Image
A.Shehanaz, A.Divya M.Tech
DOI: 10.17148/IJARCCE.2015.4336
Abstract: Image processing is a signal processing for which input is an image output of an image� may be characteristics or parameter related to the image .Under this concept� the image classification which has both foreground and background feature of an image with edges, lines flow lines structures in foreground and inhibits smooth clutter in� background. In this paper the saliency driven nonlinear diffusion filtering algorithm is used and the image is classified using multiscale information fusion in original image, they are applied with diffusion process and finally mapped with saliency .Here the background image is considered as noise which improves image classification and finally they are removed using nonlinear diffusion filtering this process� makes the classification of images in an more accurate formation .At larger scales the background is filtered out and the foreground is preserved .Various experimental test has been conducted for image classification using multiscale space such as PASCAL2005 and oxford17 flower dataset with high classification rates
Keywords: PASCAL2005, multiscale space, nonlinear diffusion filtering
Abstract
Securing Mobile Ad Hoc Networks with Intrusion Detection System: A Review
Dipamala Nemade, Ashish T. Bhole
DOI: 10.17148/IJARCCE.2015.4337
Abstract: From past few years, wireless networks are mostly preferred because of its mobility and scalability characteristics. Mobile Ad hoc network (MANET) is one of such wireless communication mechanisms. A MANET is an infrastructure-less network consisting of self-configuring mobile nodes connected by wireless link. The nodes communicate with each other directly or indirectly with the help of neighbours to store and forward packets. The open medium and wide distribution of nodes makes MANET vulnerable to malicious attacks. To address the security, it is essential to develop an Intrusion Detection System (IDS) specially designed for MANET which can detect malicious attacks before they do any significant damage to the network. For this concern a secure intrusion detection system, EAACK is developed which solves the limitations of earlier systems. The proposed system evaluates EAACK with AODV routing protocol thereby providing better performance for large size MANET.
Keywords: Wireless network security, Mobile Ad Hoc Network (MANET), Intrusion Detection System (IDS), EAACK, AODV
Abstract
Two Round Searchable Encrypted Data using Multi-Keywords for Cloud Computing
Mr. H.D.Gadade, Miss.Pranita U. Shinganwade, Miss. Punam S. Wanare,Miss. Vibha Badhe
DOI: 10.17148/IJARCCE.2015.4338
Abstract: Cloud Computing represents vital role in Information Technology. Cloud Computing provides high security for managing & storing large scale data in internet-based Infrastructure. Cloud provides large storage space & make user friendly for fast accessing data. Searchable Symmetric Encryption (SSE) use to secure and retrieve data from the cloud and it also focus on addressing data privacy issues. We observe that server side ranking based on Order Preserving Encryption (OPE) certainly leaks data privacy.OPE use Boolean search technique. To remove the leakage of data, we propose Two Round Searchable Encryption (TRSE) scheme that supports top-k multi-keyword retrieval. In TRSE, we use Vector Space Model & Homomorphic Encryption. This proposed scheme guarantees high security and practical efficiency.
Keywords: Cloud, Data privacy, Homomorphic Encryption, Vector Space Model, SSE, OPE
Abstract
Comparative Performance Analysis of MySQL and SQL Server Relational Database Management Systems in Windows Environment
Amlanjyoti Saikia, Sherin Joy, Dhondup Dolma, Roseline Mary. R
DOI: 10.17148/IJARCCE.2015.4339
Abstract: The enormous amount of data flow has made� Relation Database Management System the most important and popular tools for persistence of data. While open-source RDBMS systems are not as widely used as proprietary systems like Oracle DB or SQL Server, but over the years, systems like MySQL have gained massive popularity. In a stereotypical view, SQL Server is considered to be an enterprise-level tool, MySQL has carved a niche as a backend for website development. This� paper is an attempt to set a benchmark in comparing �the performance of MySQL against SQL Server in Windows Environment. To test and evaluate the performance the Resort Management System named Repose is considered. The result shows �that SQL Server is still a significantly better performer when compared to MySQL.
Keywords: MySQL, SQL Server, Performance Analysis,Repose.
Abstract
A Face Recognition Technique using Local Binary Pattern Method
Sarabjit Singh, Amritpal Kaur, Taqdir
DOI: 10.17148/IJARCCE.2015.4340
Abstract: LBP is really a very powerful method to explain the texture and model of a digital image. Therefore it was ideal for feature extraction in face recognition systems. A face image is first split into small regions that LBP histograms are extracted and then concatenated in to a single feature vector. This vector forms an efficient representation of the face area and can be used to measure similarities between images. Automatic facial expression analysis is a fascinating and challenging problem, and impacts important applications in several areas such as human�computer interaction and data-driven animation. Deriving a facial representation from original face images is an essential step for successful facial expression recognition method. In this paper, we evaluate facial representation predicated on statistical local features, Local Binary Patterns, for facial expression recognition. Various machine learning methods are systematically examined on several databases. Broad experiments illustrate that LBP features are effective and efficient for facial expression recognition.
Keywords: Face recognition, LBP histogram, Local Binary Patterns, Feature Extraction, LBP code.
Abstract
Credit Card Fraud Detection using Hidden Markov Model
AashleshaBhingarde, AvnishBangar, Krutika Gupta, SnigdhaKarambe
DOI: 10.17148/IJARCCE.2015.4341
Abstract: The most accepted payment mode is credit card for both online and offline in today�s world, it provides cashless shopping at every shop in all countries. It will be the most convenient way to do online shopping, paying bills etc. Hence, risks of fraud transaction using credit card has also been increasing. In the existing credit card fraud detection business processing system, fraudulent transaction will be detected after transaction is done. It is difficult to find out fraudulent and regarding loses will be barred by issuing authorities. Hidden Markov Model is the statistical tools for engineer and scientists to solve various problems. In this paper, it is shown that credit card fraud can be detected using Hidden Markov Model during transactions. Hidden Markov Model helps to obtain a high fraud coverage combined with a low false alarm rate.
Keywords: Internet, online shopping, credit card, e-commerce security, fraud detection, Hidden Markov Model.
Abstract
Comparison of Various Cloud Simulation tools available in Cloud Computing
Utkal Sinha, Mayank Shekhar
DOI: 10.17148/IJARCCE.2015.4342
Abstract: Cloud computing is sharing of computer hardware and software resources over the internet so that anyone who is connected to the internet can access it as a service in a seamless way. As we are moving more and more towards the application of this newly emerging technology, it is essential to study, evaluate and analyse the performance, security and other related problems that might be encountered in cloud computing. Since, it is not a feasible way to directly analyse the behaviour of cloud on such problems using the real hardware and software resources due to its high costs, modelling and simulation has become a very powerful tool to cope with these issues. In this paper, we review, analyse and compare features of the existing cloud computing modelling and simulation tools.
Keywords: Cloud computing simulators, CloudSim, cloud computing simulators comparison,SPECI, GreenCloud, OCT, Open Cirrus, GroudSim, NetworkCloudSim, EMUSIM, DCSim, iCanCloud, CDOSim, TeachCloud, MDCSim, GDCSim.
Abstract
Data Processing for Big Data Applications using Hadoop Framework
Navya Francis, Sheena Kurian K
DOI: 10.17148/IJARCCE.2015.4343
Abstract: The big data is the concept of largespectrum of data, which is being created day by day. In recent years handling these datais the biggest challenge. Hadoop is an open source platform which is used effectively to handle the big data applications. The two core concepts of the hadoop are Mapreduce and Hadoop distributed file system (HDFS). HDFS is the storage mechanism and map reduce is the programming language. Results are produced faster than other traditional database operations. Pig and Hive are the two language which helps us to program the mapreduce framework within short period of time.
Keywords: MapReduce, Pig, Hive, Big data, Hadoop, HDFS.
Abstract
Population Dynamics in Artificial Agent Societies: A Review
Harjot Kaur, Avneet Kaur
DOI: 10.17148/IJARCCE.2015.4344
Abstract: This paper �Population Dynamics in Artificial Agent Society� broadly covers the change of population in human and agent societies. There are certain causes like Natality, Mortality, and Migration that are responsible for such a change. These causes are referred to as key elements of population dynamics. Moreover a Demographic view of population is provided. To simulate the human society agent-based modeling is implemented in object oriented programming language that society is called artificial agent society. Through this paper introduction of new agent ,death of agent in society and migration of agents are discussed. At last the metrics for measuring number of agents migrating to and from society, and metrics for measuring agent-based society are discussed.
Keywords: fertility, mortality, migration, metrics.
Abstract
Android Application to get Answer through Voice
Mr. Prof. P. D. Hasalkar, Ms. Masaratjahan I. Kudle, Mr. Prasad N. Chaudhari, Mr. Deepak B. Mali, Ms. Mohammadi M. Kamplee
DOI: 10.17148/IJARCCE.2015.4345
Abstract: The mobile phone users are increasing day by day and everyone wants to develop new things which are improved version of existing one. The user might want the faster technology which can give the answer by giving input in the form of voice and getting output in the form of voice. This project deals with the easy to use and time saving feature and providing the easy search facility. In this technology, there will be voice-to-text and text-to-voice interaction between the user and the server. Here first voice is converted into text and this text is searched in the database residing in application itself and extracts its answer, then this answer will be converted into voice. If answer is not found in database then it will sent over Google to extract its answer and gets converted into voice. Finally the client will be getting the answer in the form of a voice for the searched result.
�
Keywords: Speech-to-text conversion (STT), Text-to-speech conversion (TTS)
Abstract
Memristor MOS Content Addressable Memory (MCAM) Design Using 22nm VLSI Technology
KomalJ.Anasane, Dr.UjwalaA.Kshirsagar
DOI: 10.17148/IJARCCE.2015.4346
Abstract: Enough aptitude ability addressable memory (CAM) is a key element in wide variety of applications. A designing impoverish inskilfulness of such systems is the complexities of scaling MOS transistors. Converges of choice technologies, which are well-matched regarding CMOS processing may allow extension of Moore�s law for a precedent-setting years. This mix provides a newheadway predisposition for the stumbling-block and modeling of memristor based CAM (MCAM) using a combination of MOS devices to form a core of a memory or logic cell that forms the building block of the CAM manufacture. The non labiledescription and the nanoscale geometry rack up fro concord of the memristor increases the peignoir council with CMOS processing technology , provides for the new approaches towards power management through disabling CAM blocks without loss of stored data, reduces power indulgence, and has scope for speed improvement as the technology matures. The memristor behaves as a switch, greatly breath a air. Putting, whimper like the transistor, it is a unite decreed instead of three-terminal device and does not need power to retain either of its two states. A memristor unsteadiness its partizan between two values and this achieved via the movement of mobile ionic charge within an oxide layer. This applicability influences the architecture of CAM systems, there is no loss of stored data even if the power supply of CAM blocks are disabled.Sake, memristor-based CAM cells have the potential for major saving in power dissipation.
Keywords: Content addressable memory(CAM), memory resistor-based CAM (MCAM), SRAM, Microwind 3.1, Modelling.
Abstract
Application of Genetic Algorithm & Morphological Operations for Image Segmentation
Mansoor Farooq
DOI: 10.17148/IJARCCE.2015.4347
Abstract: Image segmentation is an important part of the digital image processing. It is a low level, but difficult task that segments the image into regions of similar attributes. Segmentation simply changes the illustration of the image by dividing the image into similar components something that is more significant and easier to study. Till now there is no fundamental theory or algorithm on the subject of image segmentation. Although, in this paper genetic algorithm and mathematical morphological operations are used for optimizing or detecting homogenous regions of an image. The operation is performed on 16 x 16 subimages and the resultant subimages are then combined and the segmented images is produced.
Keywords: �Genetic Algorithm, Image Segmentation,� Mathematical Morphology and Optimization
Abstract
Efficient Secure Authorized Deduplication in Hybrid Cloud using OAuth
Celina George
DOI: 10.17148/IJARCCE.2015.4348
Abstract: In Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. Clouds can be classified as public, private or hybrid. Cloud service providers offer both highly available storage and massively parallel computing resources at relatively low costs. As cloud computing becomes prevalent, an increasing amount of data is being stored in the cloud and shared by users with specified privileges, which define the access rights of the stored data. One critical challenge of cloud storage services is the management of the ever-increasing volume of data.Datadeduplication is a specialized data compression technique for eliminating duplicate copies of repeating data. This technique is used to improve storage utilization and can also be applied to network data transfers to reduce the number of bytes that must be sent and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique is used to encrypt the data before outsourcing. It encrypts/decrypts a data copy with a convergent key, which is obtained by computing the cryptographic hash value of the content of the data copy. Convergent encryption allows the cloud to perform deduplication on the ciphertexts and the proof of ownership prevents the unauthorized user to access the file. To enhance the system in security OAuth is used. OAuth (Open Authorization) is an open protocol for token-based authentication and authorization on the Internet used in hybrid cloud to enhance the security. OAuth enables the system to ensure that the user is an authenticated person or not. Only such authenticated user got the token for uploading and downloading in pubic cloud.
Keywords: �OAuth, S-SCP, convergent encryption
Abstract
Separable Data Hiding Using AES Algorithm
Sneha Rankhambe, Shital Sasane, Kirti Shelke
DOI: 10.17148/IJARCCE.2015.4349
Abstract: In this paper, the problem of transmitting redundant data over an insecure, bandwidth-constrained communications channel is discussed. A content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. Using data hiding key the receiver can extract additional data even the receiver has no information about the original image content. Using the decryption key the receiver can extract data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, the receiver can extract the additional data and the original image without any loss.
Keywords: Author Guide, Article, Camera-Ready Format, Paper Specifications, Paper Submission.
Abstract
Design Analysis and Development of a Quad-Band Complementary Antenna Array for Wireless Application
Juin Acharjee, Mrinmoy Chakraborty
DOI: 10.17148/IJARCCE.2015.4350
Abstract: In this paper a new complementary quad band omnidirectional planar microstrip antenna array has been proposed. This antenna consists of cascaded connection of three rectangular shaped patches on the upper side, two rectangular shaped patches on the ground side and one �I� shaped resonator at the ground to produce the effective structure of antenna array which can radiate omnidirectionally with high efficiency, moderate gain, low reflection and useful radiation pattern. This cascaded quad band antenna array operates at Bluetooth (2.35-2.53) GHz, WIMAX (3.25-3.50) GHz, HIPERLAN (4.06-4.30) GHz and WLAN (5.37-5.86) GHz with S11 <-10 dB and stable radiation pattern having gain 2.8dBi, 3.32dBi, 3.49dbi,and 6.4dBi respectively. The bandwidth of these bands for proposed antenna becomes 180 MHz, 250 MHz, 240 MHz and 490 MHz respectively.
Keywords: Antenna array, BLUETOOTH, WIMAX, HIPERLAN, WLAN
Abstract
Different Communication Protocols for Wireless Sensor Networks: A Review
Meena Ahlawat , Ankita Mittal
DOI: 10.17148/IJARCCE.2015.4351
Abstract: Recent development in the area of micro-sensor devices have accelerated the advances in the sensor networks field leading to many new protocols specifically designed for wireless sensors networks(WSNs).wireless sensors networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular users, depending on the applications. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routing from one node to other using different routing protocols. There .this paper gives brief idea about different protocols in wireless sensor networks (like LEACH, SEP, HRC etc.) also included comparison of these protocols.
Keywords: �WSN, protocols, routing, LEACH, SEP, HRC.
Abstract
To Support Search as You type by using MySQL in Databases
Gaikwad Namrata, Mahajan Chetan, Abhishek Ranjan, Manish Kumar, Prof. Manisha Galphade
DOI: 10.17148/IJARCCE.2015.4352
Abstract: As a user types in a keyword query character by character, the type ahead search or search as you type system computes answers on-the-fly. In this paper we are going to study the way of supporting type ahead search on data residing in databases. We are going to focus on the way to support this type of search using the language, MySQL In this paper we are going to study about the way to use the auxiliary indexes stored on tables so that the search performance can be increased, since we need to achieve an interactive speed which can be done by meeting the high performance requirements of the functionalities. In this paper we present solutions to both single keyword and multikeyword queries. We also allow mismatching between query keyword and answers by developing the novel techniques for fuzzy search by using MySQL. Supporting fuzzy search is important when users have limited knowledge about the exact representation of the entities they are looking for, such as people records in an online directory. Therefor it becomes easy for them to retrieve information with the help of this feature. We provide recent search, history, auto-completion also in this paper.
Keywords: Search As You Type, Type Ahead Search, databases, MySQL, fuzzy search.
Abstract
Advertisement Mining using Hidden Markov Model
K. Sathiyamurthy, P.Dhivya , DJ.Panimalar
DOI: 10.17148/IJARCCE.2015.4353
Abstract: Predicting the individual�s web-browsing behavior on the internet is more important for advertisement mining. This makes the advertisers or the publishers to successfully interact with users in providing relevant advertisement, many intelligent �interfaces requires a method for recognizing, analyzing and� predicting �user behavior actions. Initially we need to collect a log of datasets with user behavior attributes. �Hidden Markov Model is used to derive a pattern for predicting the behavior of the users on the web. Also, it helps in analyzing the performance of user behavior profile and estimating the advertising cost to perform Mapreduce jobs� based on� user's search query. With these collected information, optimized advertisement is deployed to the user using Bigquery mechanism.
Keywords: Hidden Markov Model, behavioral targeting, Mapreduce, Advertisement mining, Bigquery.
Abstract
Unstructured Data Analysis-A Survey
K.V.Kanimozhi, Dr.M.Venkatesan
DOI: 10.17148/IJARCCE.2015.4354
Abstract: Recent years have observed the ability to gather a massive amount of data in a large number of domains. As the data is collected in unprecedented rate, the analysis, rather than the storage of this data becomes a challenge. According to the IDC estimation 90% of data is unstructured data which is a fastest growing data whereas the remaining is the structured data, unstructured data refers to information that either does not have predefined data model or does not fit into relational database for information access. This unstructured data are being continuously comes from various sources like satellite images, sensor readings, email messages, social media, web logs, survey results, audio, videos etc. Due to the large volume of unstructured data there is a big challenge for all the industry currently to analyse and extract a meaningful value from it. Traditional methods are adequate for analysis of structured data but these methods are not appropriate for large volume of unstructured data in order to extract knowledge.
This paper presents the summary about unstructured data analysis for the beginners or the people from academia who is interested in analysis of unstructured data to extract the knowledge to improve the business processes and performance.
Keywords: Unstructured data, structured data, data mining
Abstract
A Hybrid Piezoelectric-Solar Based Power Generation System
Ms. Bhusari Priya Govind, Ms. Chavan Deepika Limchan, Ms. Kadam Pratibha Dattatray, Mr.A.B.Vitekar
DOI: 10.17148/IJARCCE.2015.4355
Abstract: This paper implements an efficient way to power generation system, using solar power. Solar energy system is used to collect maximum power from sun. this� proposal is to use the solar panels implemented in this project more efficiently and to carry out a realistic experimental approach to enhance the solar output power to a significant level� and piezoelectric energy harvesting circuit. In this paper, piezoelectric-based energy harvesting technology is applied to generate electricity from mechanical stress (vibrations). Using piezoelectric material to harvest vibration energy from humans walking, machinery vibrating, or cars moving on a roadway is an area of great interest, because this vibration energy is otherwise untapped. Since movement is everywhere, the ability to capture this energy cheaply would be a significant advancement toward greater efficiency and cleaner energy production. The goal of this experiment is to investigate whether piezoelectricity would be able to provide sufficient source of voltage to charge the parent battery in case of rainy or cloudy days. . This configuration allows the two sources to supply the load separately or simultaneously depending on the availability of the energy sources.� This paper implements an efficient way to electrify or generate electricity using solar power and piezoelectric energy harvesting circuit.
Keywords: Photovoltaic (PV), Piezoelectric Energy, Full Wave Bridge Rectifier.
Abstract
Effectual Approach for Facial Expression Recognition System
Shalini Mahto, Mrs. Yojana Yadav
DOI: 10.17148/IJARCCE.2015.4356
Abstract: Automatic facial expression is an interesting and challenging problem, and impacts important applications in many areas such as human�computer interaction and data-driven animation. Facial expression recognition is the process performed by computers which consist of detect the face in the image, and pre-process the face regions, extracting facial expression features from image by analysing the change in the appearance of facial features and then classifying this information into facial expression categories like fear, happy sad etc. In this research work, an Automatic Facial Expressions Recognition System is presented that recognizes five principal expressions that are Happy, Sad, Neutral, Anger and Disgust. The system uses an efficient approach for the recognition of those expressions on the basis of some extracted features. The whole system is implemented on the dataset of 150 images of frontal facial expressions of happy, sad, neutral, anger and disgust by using MATLAB. The images are collected from the Karolinska Directed Emotional Faces (KDEF) database. We empirically evaluate the facial representation based on local binary pattern (LBP) features. Then recognition performed by KNN classifier with LBP features. The result obtained after implementation is very good.
Keywords: �Face Detection, Viola Jones, Feature Extraction, LBP (Local Binary Pattern), KNN Classifier.
Abstract
Rectangular Shaped Microstrip Antenna for Triple-band Operation
PreetKanwal Kaur, Ramanjeet Singh
DOI: 10.17148/IJARCCE.2015.4357
Abstract: In this paper, a rectangular microstrip patch antenna for multiband operation is designed and simulated. The proposed geometry of antenna covers three frequency bands and can be used for different wireless applications. The designed antenna has simple shape of rectangular patch with a co-axial feed. The performance parameters for proposed rectangular multislot antenna such as return loss, gain, directivity, bandwidth, VSWR are studied. The proposed antenna shows maximum gain up to 6.69dBi, bandwidth above 108MHz, and maximum directivity of 10.53dBi. IE3D (Integral Equation in Three Dimensions) software has been used for design and simulation of proposed antennas.
Keywords: Microstrip, Patch, Triple-band, Slots, IE3D, Wireless Applications
Abstract
Analysis of ECG Signal Denoising Using Wavelet Transform
Roshini T V, Shoukath cherukat, Seena V
DOI: 10.17148/IJARCCE.2015.4358
Abstract: The electrocardiogram is a technique of recording bioelectric currents generated by the heart which is useful for diagnosing many cardiac diseases.� The feature extraction and denoising of ECG are highly useful in cardiology. ECG is a non-stationary signal and it is used for the primary diagnosis of cardiac abnormalities like arrhythmia, myocardial infarction and conduction defects. But the ECG� signal often contaminated by different� noises. The ECG signal must be denoised to remove all the noises such as Additive White Gaussian noises. This paper deals with the analysis �of ECG signal denoising using ��Wavelet Transform .� Different ECG� signals from MIT/BIH arrhythmia database are used with added AWG noise.� Soft thresholding technique is employed in the signal and the result were evaluated using matlab. The Biorthogonal wavelet transform is applied on the different signal� and the performance is� evaluated in terms of PRD(percent root difference), PRD improvement (PRD i), SNR(signal to noise ratio),SNR improvement �(SNRi)and compression ratio.
Keywords: � ECG signal denoising, thresholding, Discrete wavelet transform, PRD and SNR.
Abstract
Techniques of Vibration Signature Analysis
Sumit Kumar Sar, Dr. Ramesh Kumar
DOI: 10.17148/IJARCCE.2015.4359
Abstract: This paper presents recent developments of techniques, based on vibration signature analysis to detect the fault in a machine. This paper shows vibration signature analysis implemented to detect fault in various machineries such as gear, rolling element bearing, journal bearing, induction motor, centrifugal pump and beam. The authors do not intend to provide an exhaustive discussion about machine faults but only detailed overview of rotating parts vulnerable to fault. In addition, advantages of advanced vibration signature analysis techniques over traditional one have also been discussed.
Keywords: machine fault, condition monitoring, vibration signature, preventive maintenance.
Abstract
Analysis and Comparison of Concurrency Control Techniques
Sonal kanungo, morena rustom. D
DOI: 10.17148/IJARCCE.2015.4360
Abstract: In a shared database system when several transactions are executed simultaneously, the consistency of database should be maintained. The techniques to ensure this consistency are concurrency control techniques. All concurrency-control schemes are based on the serializability property. The serializability properties requires that the data is accessed in a mutually exclusive manner; that means, while one transaction is accessing a data item no other transaction can modify that data item. In this paper we had discussed various concurrency techniques, their advantages and disadvantages ��and making comparison of optimistic, pessimistic and multiversion techniques. We have simulated the current environment and have analysis the performance of each of these methods.
Keywords: Concurrency, Locking, Serializability
Abstract
Low Power Double Gate Fin FET Based Sense Amplifier
Pallavi Priyadarshni, S.N.Singh
DOI: 10.17148/IJARCCE.2015.4361
Abstract: In this paper, a low power independent-gate, process �variation� tolerant double gate (DG) Fin FET based sense amplifier design has been proposed. As like RHIGSA, new design exploits the DICE (dual interlock cell) latch and the back gate of a double-gate Fin FET (DG Fin FET) device for dynamic compensation against process variation. But, there is change in tail transistor gate connections.,Which is dynamically controlled by intermediate signal in circuit. This design improves the power dissipation and show excellent tolerance to process parameter variations like temperature,� Vdd, thickness of oxide compared to Radiation hardend IGSA (RHIGSA) circuit and independent gate sense amplifier (IGSA). Proposed technique consumes 29.108% less power compare to RHIGSA.
Keywords: Double Gate FIN FET, Sense Delay, Process Variation, Montecarlo Simulation
Abstract
A Neural Network Approach for Real Time Emotion Recognition
Atul Chavhan, Sneha Chavan, Samiksha Dahe, Santosh Chibhade
DOI: 10.17148/IJARCCE.2015.4362
Abstract: Effective Human Computer Intelligent Interaction (HCII) requires the information about the user�s identity, state and intent which can be extracted from images, so that computers can then react accordingly, e.g. systems behaving according to the emotional state of the person. The most expressive way humans display emotions is through facial expressions. In this paper we have presented the technique of recognizing emotion using facial expressions which is of prime focus in human interactions. By creating machines that can detect and understand emotion, we can enhance the human computer interaction. In this paper, we have discussed a framework for the classification of emotional states, based on images of the face and the implementation details of a real-time facial feature extraction and emotion recognition application. This application automatically detects faces from the captured images and codes them with respect to 7 dimensions in real time: Neutral, Anger, Disgust, Fear, Smile, Sadness, and Surprise. Most interestingly the outputs of the classifier change smoothly as a function of time, providing a possibly worth representation of code facial expression dynamics in a fully automatic and unnoticeable manner. The main objective of our work is the real-time implementation of a facial emotion recognition system.
Keywords: Real Time, Emotion Recognition, Human Computer Interaction (HCI), Feed-Forward Neural Network, Largest Connected Region (LCR), Cubic Bezier Curve.
Abstract
Review of Different Queuing Disciplines in VOIP, Video Conferencing and File Transfer
Rajeev Sharma, Sukhjit Singh Sehra, Sumeet Kaur Sehra
DOI: 10.17148/IJARCCE.2015.4363
Abstract: �Now a day Internet only put up best effort service. Traffic is transmitting as earliest as possible, but during transmission, there is no guarantee of timelines or real delivery of packets. With the swiftly transformation of the Internet into a commercial infrastructure, demands for a quality of service have developed in rapid rate. People of the present world are very much depending upon the various network services like VOIP, Video conferencing and File Transfer [6,7]. Various categories of Traffic Management systems are used in those services. Queuing is one of the very important mechanisms in traffic management system. Each router in the network must implement some queuing discipline that control how packets are buffered while waiting to be transmitted. The main aim of this paper is to highlight quality of service (QoS) analysis using different queuing disciplines.
Keywords: �FIFO queue, Priority queue, Weighted-fair queue, QoS, MWRR, DWRR, MDRR
Abstract
Various Raster and Vector Image File Formats
Sakshica, Dr. Kusum Gupta
DOI: 10.17148/IJARCCE.2015.4364
Abstract: Image File Format is one of the standardized ways of storing digital images, with a large number of image file formats available it would be very difficult and challenging for the user to select appropriate image format for storing the images. Choosing the proper image file format according to the demand of the project or according to a specific parameter is of vital importance. Therefore, in this paper we provide a brief review on most common and different image file formats in order to ease the user to choose appropriate file formats while working with files.
Keywords: Graphics Interchange Format (GIF), Joint Photographic Expert Group(JPEG), Portable Network Graphics(PNG), Tagged Image File Format(TIFF), Encapsulated PostScript (ESP), Portable Document Format (PDF), Adobe Illustrator (AI), Drawing eXchange Format (DXF).
Abstract
Survey on a Trust-Aware System for Personalized User Recommendations in Social Networks
Supriya S, Saravanan D
DOI: 10.17148/IJARCCE.2015.4365
No abstract available.
Abstract
A Methodology for Development and Verification of Access Control System in Cloud Computing
Ankit Valdaya, Ratish Agarwal, Sachin Goyal
DOI: 10.17148/IJARCCE.2015.4366
Abstract: In Cloud Computing, the feature of multi-tenancy gives privacy, security and access control challenges, because of sharing of physical resources among un-trusted tenants so, a suitable encryption technique with key management should be applied before outsourcing the data. In this paper we develop the methodology of policy based file access using attribute based encryption with cipher text scheme to secure the storage and sharing the cloud data with the cloud user. In this we also discuss the policy of revocation for file assured deletion so that no one can recover the deleted file from cloud and also discuss the policy for access to data storing centre so that the right user will access the right file in cloud.
Keywords: access control in cloud computing, attribute based encryption, policy based access control, revocation of file assured deletion.
Abstract
Simulation Analysis of 2-D Discrete Wavelet Transform by using Modified Radix-4 Booth Multiplier
Mr. Hemantkumar H. Nikhare, Prof. Ashish Singhadia
DOI: 10.17148/IJARCCE.2015.4367
Abstract: A new architecture namely 2-D DWT, Multiplier-and accumulator (MAC) based Radix-4 Booth Multiplication Algorithm for high-speed arithmetic logics have been proposed and implemented on Xilinx. By combining multiplication with accumulation and devising a hybrid type adder the performance was improved. The modified booth encoder will reduce the number of partial products generated by a factor of 2. Fast multipliers are essential parts of digital signal processing systems. The speed of multiply operation is of great importance in digital signal processing as well as in the general purpose processors. The number to be added is the multiplicand, the number of times that it is added is the multiplier, and the result is the product. Each step of addition generates a partial product. the simulation is done on the Modelsim and finally output is analysed by using� Matlab.
Keywords: - VLSI, Carry Select Adder (CSA), Carry Look Ahead �Adder (CLA), ASM
Abstract
Interior Design in Augmented Reality Environment
Prof. B.Y.Jani, Pratiksha Dahale, Ankita Nagane, Bhavika Sathe, Nilam Wadghule
DOI: 10.17148/IJARCCE.2015.4368
Abstract: We presents an application of Augmented Reality technology for interior design. Along with the dramatic progress of digital technology, virtual information techniques are also required for architectural projects. Thus, the new technology of Augmented Reality offers many advantages for digital architectural design and construction fields. AR is also being considered as a new design approach for interior design. In an AR environment, the virtual furniture can be displayed and modified in real-time on the screen, allowing the user to have an interactive experience with the virtual furniture in a real-world environment. Here, AR environment is exploited as the new working environment for architects in architectural design works, and then they can do their work conveniently as such collaborative discussion through AR environment. Finally, this study proposes a new method for applying AR technology to interior design work, where a user can view virtual furniture and communicate with 3D virtual furniture data using a dynamic and flexible user interface. Plus, all the properties of the virtual furniture can be adjusted using occlusion- based interaction method for a Tangible Augmented Reality.
Keywords: Augmented Reality, Tangible AR, CAAD, ARToolkit, Interior design.
Abstract
A Survey on QoS Behavior in MPLS Networks
Shruti Thukral, Banita Chadha
DOI: 10.17148/IJARCCE.2015.4369
Abstract: Quality of Service (QoS) in Real Time Applications such as video, voice, online gaming is becoming the major concern. In Today�s Scenario Voice over Internet Protocol (VoIP) is an emerging service because of the benefits of this service. The most advantageous benefit which attracts many people using this service is the low cost. QoS is an important factor for the voice traffic. Internet Protocol (IP) network implements QoS in two ways i.e. Integrated Services (IntServ) and Differentiated Services (DiffServ) but still VoIP suffers from delay, voice echo, packets loss or� Intermittent silent pauses. Multi Protocol Label Switching (MPLS) is a framework specified by IETF when used with IP increases its QoS. MPLS is used as an extension to IP. In this paper we define the MPLS QoS management and how it supports the IP QoS architecture.
Keywords: Internet Protocol (IP), Multi Protocol Label Switching (MPLS), Quality of Service (QoS), IntServ, DiffServ, Traffic Engineering (TE)
Abstract
Novel Classification based approaches over Cancer Diseases
Mr. P. Thangaraju R. Mehala
DOI: 10.17148/IJARCCE.2015.4370
Abstract: �One of the crucial applications of data mining is medical data mining (MDM) that diagnoses almost all medical syndromes. MDM incorporates with early predictions, existence and depth of any disease. In fact, MDM supplements the partial assistance of physicians.� Though there were many works carried out in MDM, liver cancer is still considered to be a life threatening and has lowest survivability. Predicting the existence of liver cancer at the early stage is highly challengeable for the doctors. The goal of this review is to study the related works on cancer especially liver cancer, an experiment was carried out with the help of dataset to check out the performance of seven classification algorithms with the respect to time and accuracy. This paper also discussed some research key factors that could help the research fraternity to be focused on.
Keywords: Data Mining, Cancer, Liver Cancer, Classification.
Abstract
Computer Based Optimum Load Shedding Controller Using Unconstrained Minimization Technique (Case Study)
E. A. Elsayed, PhD
DOI: 10.17148/IJARCCE.2015.4371
Abstract: In this paper, the�� computerized controller for studying load shedding has been designed and implemented. This controller is designed based on the problem of minimizing load shedding during emergency conditions. The studied problem is formulated as��� a��� nonlinear��� static optimization problem subject to operational and equipment constraints. Suitable adjustments of control of generation rescheduling and control of phase shifting transformers before load shedding is determined and recommended.
SUMT, solution algorithm adopting sequential unconstrained minimization technique is given. Results of application of the proposed��� technique�� to�� a� 5 and �20-node network are presented.� An overload relief policy is proposed to minimize load shedding.the proposed computerized technique have been presented in this paper.Applications to be IEEE � 5 and 20 bus system are presented to validate the applicability of the proposed technique to any system of any size.
Keywords: SUMT, Load Shedding, Power System, Minimization Technique, Sequential Unconstrained, computerized technique
Abstract
A Literature Survey of Facial Recognition of Identical Twins
Nishu, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.4372
Abstract: Biometric identification system must be able to distinguish between individuals even in situation where the biometric signature may be similar, such as in the identical twins. Main focus is on twin based image retrieval which retrieves all image from database by matching some of the basic features of identical twins like nose, lips, eyes, forehead and face features.� With the advancement of computer technology Image Retrieval based on Identical twin face recognition is a challenging task because of the high degree of similarity in their overall facial appearance. Commercial face recognition systems exhibit poor performance in differentiating between identical twins under practical conditions as they cannot be discriminated based on DNA.
Keywords: Face recognition, Facial marks, Identical twins, Image retrieval
Abstract
Face Recognition Using PCA (Principal Component Analysis) and LDA (Linear Discriminant Analysis) Techniques
Amritpal Kaur, Sarabjit Singh, Taqdir
DOI: 10.17148/IJARCCE.2015.4373
Abstract: image processing field is becoming more popular for the security purpose in now days. It has many sub fields and face recognition is one from them. Many techniques have been developed for the face recognition but in our work we just discussed two prevalent techniques PCA (Principal component analysis) and LDA (Linear Discriminant Analysis) and others in brief. These techniques mostly used in face recognition. PCA based on the eigenfaces or we can say reduce dimension by using covariance matrix and LDA based on linear Discriminant or scatter matrix. In our work we also compared the PCA and LDA.
Keywords: Face recognition, PCA, LDA, eigenvectors, eigenface.
Abstract
Impact of Hybrid Kernel for the Performance of the Operating System
Miss Hema K Reddy, Dr. M A Pund
DOI: 10.17148/IJARCCE.2015.4374
Abstract: �Embedded system application is a hot topic in today�s date & Linux gradually becomes the most important operating system for embedded applications. Embedded real-time system must be able to response and deal with system events within the pre-defined time limitation. In real-time multi-tasking system, a lot of events and multiple concurrent tasks are running at the same time. Therefore, to meet the system response time requirement, we must ensure that each mission can be achieved within the required time frame.
Current Operating Systems includes a graphical user interface that is widely used. Due to the absence of Real-Time ability, current Operating Systems has not been suitable for all industrial applications. On the other hand normal operating system has the advantage of having both widespread applications and broad user acceptance. Moreover lot many low priced user programs are available. This is an attempt to create a way to make operating system useful for industrial real-time applications eliminating its disadvantages without giving up its advantages of popular user applications.
Keywords: Operating System Kernel, Hybrid Kernel, Performance arguments.
Abstract
Implementation of Merchant CRM system based on MVC architecture
Vignesh Ganesh, Nikita Singh, Thaksen J. Parvat
DOI: 10.17148/IJARCCE.2015.4375
Abstract: CRM (Customer Relationship Management) is a business process in which client relationships, customer loyalty and brand value are built through marketing strategies and activities. A payment gateway is a server that is dedicated to linking websites and banks so that online credit card transactions can be completed in real-time. This paper attempts to introduce that:- There are hundreds of different CRM systems existing in the market but based on MVC pattern, the CRM system model can increase performance, provide high reliability, increase in speed and save time. Implementation of CRM designed solely for the merchant so as to ease his transactions which will be based on the MVC architecture will be highly productive.
Keywords: Merchant, CRM, MVC, Customer, Payment
Abstract
Real Time Unusual Event Detection in Video Sequences
Aneri Adhvaryu, Kalpesh Jadav
DOI: 10.17148/IJARCCE.2015.4376
Abstract: Detection of human activities accurately in the video surveillance system is very difficult task. For diverse application areas, while detecting human activities, basically three aspects are taking in concern for human activity recognition system: segmenting object of interest, feature extraction & representation and human activity detection & classification. In this paper we have proposed a basic framework for detection suspicious human behaviour as well as tracking of detected human who is doing some unusual activity. The purpose of these methods could lead to better understanding to the suspicious activity of single person as well as multiple persons. The improved design of built environment will provide better surveillance. Such system can be implemented at the public places such as shopping malls, airports, and railway-station or any private premises where security is the prime most concern.
Keywords: Video surveillance, Human activity detection & classification, Unusual event, Skeletonization, Thinning.
Abstract
Assamese Speaker Recognition Using Artificial Neural Network
Bhargab Medhi, Prof. P.H.Talukdar
DOI: 10.17148/IJARCCE.2015.4377
Abstract: This paper proposes an approach to recognise Assamese speaking person using Artificial Neural Network Model. Speaker recognition is the process of Identification of the person who is speaking depending on the characteristics of his/her voices. The features Linear Predictive Coding (LPC), Mel-Frequency Cepstral Coefficient (MFCC) are used to create the feature vector of the Assamese speech samples (words). Our database consists of ten speakers with equal number of male and female speakers where each word is uttered by twenty times by each speaker. The system contains the training phase, testing phase and recognition phase.
Keywords: Speaker Recognition, LPC, MFCC, Neural Network
Abstract
Prepaid Metering System
Ms.Neha Choudhary, Ms. Namrata Patil, Ms.Snehal Chaudhari, Mr.S.H.Rajput
DOI: 10.17148/IJARCCE.2015.4378
Abstract: In our India, there is lot of use of electricity in many different sectors and areas. This paper is based on prepaid system not postpaid as like existing system. First consumer pays for electricity and then use power for domestic and commercial purpose. Today�s Energy Meter system is a complex and something headache process due to calculating and distributing bills. In Existing System, Meter readers have to go every home to home and take reading and paying bills is a post-paid system. To minimize complexity in calculating and distributing bills and misuse of electricity are the main purpose of this project .It is indirectly affect to avoid illegal activities like power theft.In our proposed system, there is use of GSM technology.With the help of GSM technology, consumer get warning alarm and messages on mobile about minimum amount and for next recharge. LCD shows total balance, remaining balance and used power.
Keywords: Energy Meter, Liquid Crystal Display (LCD), GSM.
Abstract
Web Service Recommendation Using QOS Parameters and Users Location
Asst.Prof. N.K. Patil, Priyanka pawar, Shankar More, Bhausaheb Tupe
DOI: 10.17148/IJARCCE.2015.4379
Abstract: A Web service is a method of communication between two electronic devices over a network. Web services have been widely employed for building service-oriented applications. Recommendation techniques are very important in the fields of E-commerce and other Web-based services. One of the main difficulties is dynamically providing high-quality recommendation on sparse data. In this paper, a novel collaborative filtering-based Web service recommendation algorithm is proposed, in which information contained in both ratings and profile contents are utilized by exploring latent relations between ratings, a set of dynamic features are designed to describe user preferences in multiple phases, and finally a recommendation is made by adaptively weighting the features.
Keywords: Web service, Recommendation, Quality of service (QoS), Location, Clustering, Collaborative filtering.
Abstract
Effective Cryptposystem using MRGA with Steganography
Kunal Jain, Jitender Singh, Rushikesh Kapadnis, Bharti Dhote
DOI: 10.17148/IJARCCE.2015.4380
Abstract: Management and efficiency of cryptography is not only based on the layer of cryptosystem but also on the generation of keys and exchange of this key�s. One of the mostly used algorithm in today�s cryptosystem is RSA for public key cryptography. But the problem with such cryptosystem is the part of key generation and key exchange. We know that ones the secure key is loss or regenerated this cryptosystem fails. To overcome this problem we want to suggest a different kind of cryptosystem, A Cryptosystem without any key. In this paper we suggest the combination of Magic Rectangle Generation Algorithm (MRGA) with Stenography is being proposed in this work. It is helpful to reduce the time and space to generate and store the different secure keys. This Magic rectangles are formed evenly on the basic of their seed number, row number, column number, start number, row sum and column sum. The generated encrypted text is very difficult to trace as value for row and column sum is very difficult to be traced. And with addition of Stenography it is very difficult to access by any middle man. The proposed work introduces another way of designing security without the use of key and overcoming the weakness of public key cryptosystems such as RSA, ElGAMAL etc. Encrypted file generated by this method will be completely different form the original plain text file and can be transfer securely over the internet.
Keywords: �MRGA, Golden Rectangle, Steganography, LSB method, chipher text
Abstract
An Efficient Fuzzy Association Rule Mining Technique
Gajendra Singh Rajput, Nayna Sharma, Shashank Swami
DOI: 10.17148/IJARCCE.2015.4381
Abstract: Association rules mining in large databases is a core topic of data mining. Discovering these associations is beneficial to the correct and appropriate decision made by decision makers. Discovering frequent item sets is the key process in association rule mining. One of the challenges in developing association rules mining algorithms is the extremely large number of rules generated which makes the algorithms inefficient and makes it difficult for the end users to comprehend the generated rules. In this paper we proposed efficient fuzzy association rule mining technique to find all co-occurrence relationships among data items. The proposed method which allows considerably reduced the search space with discover the frequent item set and finding fuzzy sets for quantitative attributes in a database and finally employs techniques for mining of Fuzzy Associate Rules Mining (FARM).
Keywords: Data Mining, Association Rule Mining, FP Mining, FARM.
Abstract
An Improved Hybrid Color Image Watermarking under Various Attacks
C. N. Sujatha, P. Satyanarayana
DOI: 10.17148/IJARCCE.2015.4382
Abstract:
Abstract: This paper propose an improved hybrid color image watermarking algorithm using SVD, DCT and DWT. In this algorithm, SV�s of transformed coefficients of RGB planes of host image using DCT and DWT are modified with that of color logo image at chosen scaling factors. Simulation results illustrate the good imperceptibility and robustness. The present algorithm bears desirable robustness on various attacks including Gaussian noise, salt & pepper noise, compression, median filtering, average filtering, sharpening, rotation, histogram equalization, left and right cropping, top and bottom cropping and motion blurring attacks. Thus this algorithm is used for application of watermarking in image authentication and copyright protection. The performance analysis of this watermarking algorithm is measured by using MSE, PSNR and CF at various scaling factors.
Keywords: Watermark, DWT, DCT, SVD, PSNR, CF, Attacks.
Abstract
Neighbor Conduct Sensitive QoS Variance Aware Spectrum Sensing and Allocation
A.V.R. Mayuri, Dr. M.V Subramanyam
DOI: 10.17148/IJARCCE.2015.4383
Abstract: QoS (Quality of Service) aware spectrum sensing and channel allocation in cognitive radio wireless mesh networks is a continuous practice due to the divergent scope of communication in wireless mesh networks. Henceforth the current research is moving in a direction to find effective solutions towards QoS aware spectrum sensing and channel allocation. But all of these solutions are specific to one or two QoS factors. According to the real-time practices the QoS assessment by one or two factors is impractical. Moreover majority of current approaches are delivering the computational complexity as O(n2), which due to the magnification of number evolution against the increment in number of channel availability in cognitive radio wireless mesh networks. In this context here we devised a Neighbor Conduct Sensitive QoS variance assessment strategy for cooperative spectrum sensing and channel allocation strategy, which enables to assess the QoS state of a spectrum under possible malicious cooperation that is based on multiple number of QoS factors and also should stabilize the computational complexity to O(n*log(n)). The experiment results are indicating the significance of the proposed model towards scalable and robust QoS variance aware spectrum sensing and channel allocation strategy for cognitive radio wireless mesh networks.
Keywords:
Keywords: Cognitive Radio Networks, Channel Assignment, Dynamic Spectrum Access, Wireless Mesh Networks, dynamic frequency selection, selective cooperative sensing, node conduct sensitivity
Abstract
Application of Classification Technique in Data Mining for Agricultural Land
M.C.S. Geetha
DOI: 10.17148/IJARCCE.2015.4384
Abstract: Data mining is the process of finding new patterns. Classification is the method of generalizing known structure to pertain to new data. Classification using a decision tree is achieved by routing from the root node until arriving at a leaf node. To model classification process, decision tree is used. Also there are many classification algorithms available in literature but decision trees is the most commonly used because of its ease of implementation and easier to understand compared to other classification algorithms. This paper begins with the basic concepts of Classification and the method of the decision tree. Then, this paper analyses the data of arable land area, rural labor and the gross output value of agriculture about 10 cities of India based on the decision tree, and implement clustering analysis method to discrete data during the process of data mining compared to the traditional classification methods. Finally, carry out generalization conceptual process from the results of the classification [1].
Keywords: classification concepts, Decision Tree, clustering, agriculture, production data set.
Abstract
Face Recognition System: Alignment And Illumination Using Sparse Representation
Prof.A.S. Deshpande, Vinayak Karkud, Amol Kokare, Rohit Aurade
DOI: 10.17148/IJARCCE.2015.4385
Abstract: face recognition algorithms work on public data sets, but it degrade sharply when they are used in a real recognition system. This is due to the difficulty of illumination, image misalignment in the test image. We consider a fact where the input images are well controlled and test images are only low controlled. We propose a proper simple face recognition system that runs against a high degree of robustness and illumination variation, image misalignment. The system uses tools from sparse representation to align a test face image to a set of database images. We determine how to capture a set of database images with some illumination variation that they span test images taken under illumination. In order to find how our algorithms work under practical testing conditions, we have evaluate a complete face recognition system. Our system can efficiently and effectively recognize faces under different conditions.
Keywords: NN, NS, LDA, SVM
Abstract
Lung Cancer Detection Using Artificial Neural Network & Fuzzy Clustering
Masaood A. Hussain, Tabassum M. Ansari, Prarthana S. Gawas, Nabanita Nath Chowdhury
DOI: 10.17148/IJARCCE.2015.4386
Abstract: To evaluate the performance of Computer Aided Diagnosis (CAD) for Lung Cancer using artificial neural intelligence on CT scan images. Lung Cancer can be summarized by evaluating region of interest using maximum entropy and supervised learning. Lung cancer seems to be the common cause of death among people throughout the world. Early detection of lung cancer seems to be the only factor which can increase the chance of survival among people.
Keywords: ANN, CAD, GLCM, NSCLC, SCLC, SE
Abstract
A Simple Text Based Graphical Password Scheme to Overcome Shoulder Surfing Attacks
Monali Bendale, Neeta Singh, Sujata Baid , Aman Maurya
DOI: 10.17148/IJARCCE.2015.4387
Abstract: As conventional password schemes are harmful to shoulder surfing, most of the shoulder surfing resistant graphical password schemes have been proposed. But most of the users are more familiar with textual passwords rather than graphical passwords, however text-based graphical password schemes have been proposed. In existence there are no text-based shoulder surfing resistant graphical password schemes which are both secure and efficient enough. So, in this paper, we propose an enhanced text-based shoulder surfing resistant graphical password scheme by using pointers. The user can easily and efficiently login system in the proposed scheme. Later, we analyze the security and usability of the proposed scheme, and shows the resistance of the introduced scheme to accidental login and shoulder surfing.
Keywords: Shoulder Surfing Attacks, accidental login, usability, resistance, pointers.
Abstract
High Frequency Sound Based Device Communication
Sahil Lakhwani, Nishant Pardamwar, Nikhil Khewalkar
DOI: 10.17148/IJARCCE.2015.4388
Abstract: In the chronicle of wireless communication of devices, there have been various attempts at providing a seamless short distance communication technology. All of those technologies are hardware specific. Adding them to consumer devices influences various factors like cost and software compatibility. This paper shows use of ultrasonic sound as data carrier over short range between two modern devices, capable of generating and detecting ultrasound only through their standard speakers and microphones. The results show that such communication is possible over a distance of few metres in a frequency range of 20KHz to 21KHz.
Keywords: Wireless device communication; short range technologies; ultrasound; Goertzel
Abstract
Merging of Test Cubes using Test Point Insertion for Low-Power Test Compaction
S.Sindhu, M.Sathiskumar
DOI: 10.17148/IJARCCE.2015.4389
Abstract: �Low-power test generation procedure targets the switching activity during the fast functional clock cycles of broadside tests. The procedure is based on Test Cubes merging using Test Point Insertion that it extracts from functional broadside tests. Test cube merging supports test compaction and test point insertion improves fault coverage.� The use of functional broadside tests provides a target for the switching activity of low-power tests,� not exceeding the switching activity that is possible during functional operation. The use of test cubes that are extracted from functional broadside tests is a unique feature. It ensures that the low-power tests would create functional operation conditions in sub circuits that are defined by the test cubes and test point insertion reduces the complexity involved in detecting additional faults. Experimental results show that the procedure detects all or almost all the transition faults that are detectable by arbitrary (functional and non-functional) broadside tests in benchmark circuits. The simulation results are obtained using MODELSIM 6.3f and the power is analysed using XILINX 8.1 software.
Keywords: �Functional broadside tests, low-power test generation, test cubes, test point insertion, transition faults
Abstract
An Efficient NAND Gate Based Glitch-free All-Digital Duty-Cycle Corrector Architecture
S.Theivanayaki, M.Sathiskumar
DOI: 10.17148/IJARCCE.2015.4390
Abstract: Duty-cycle correctors are widely used in high-speed devices and system-on-a-chip applications. Because both the positive and negative edges of the clock are utilized for sampling the input data, these systems require an exact 50% duty cycle of the input clock. However, as the clock signal is distributed over the entire chip with clock buffers, the duty cycle of the clock is often far from 50%. Because of the unbalanced rise and fall times, as a result of variations in process, voltage, and temperature. To resolve this problem and to correct the duty-cycle error many approaches are presented. In this work, wide-range NAND gate based glitch-free all-digital duty-cycle corrector is presented. The proposed NAND gate based glitch-free ADDCC not only achieves the desired output/input phase alignment, but also maintains the output duty cycle at 50% with a short locking time. In addition, the proposed method can mitigate the delay mismatch problem and produce minimum delay without any glitch. The circuit complexity also is reduced in the proposed NAND gate based ADDCC. The simulation is carried out in 0.65 nanometer CMOS process. An experimental result shows that the power consumed, delay and area is reduced in the proposed architecture. Simulation results are obtained using MODELSIM 6.3f.� The power, area and delay are obtained using the XILINX ISE 8.1 software.
Keywords: All-Digital Duty-cycle corrector (ADDCC), half-cycle delay line, High resolution, Phase alignment.
Abstract
Test Compaction of Logic Blocks by using Fault Identification Method
R.Vishnu Vardhan, M.Sathiskumar
DOI: 10.17148/IJARCCE.2015.4391
Abstract: An arbitrary design implemented into a field-programmable gate array (FPGA). FPGA contains many logical blocks. Fault equivalence and fault dominance method are used to detect the fault with minimum time period. An approach provides transparent scan to share tests among different logic blocks whose primary inputs and outputs are included in scan chains even if the blocks have different numbers of state variables. The transparent-scan sequences based on tests for one logic block could detect faults in other logic blocks, with different numbers of state variable.� It uses n number of test configuration instead of 2n number of test configuration by test code algorithm. Transparent scan enhances the ability to produce a compact test set for a group of logic blocks. The procedure obtains a set of transparent-scan sequences for a group of logic blocks from compacted test sets for the logic blocks in the group. From this set, it chooses a subset that finds all the target faults, which are propagated by the complete set by using Modelsim and area is obtained by using the XILINX ISE 8.1 software.
Keywords: Full-scan circuits, test compaction, test generation, transparent scan, Field-programmable gate array (FPGA) testing.
Abstract
Impact of Various Weather Conditions on Free Space Optics using 4X4 Transmitter/Receiver Combination Integrated with Different Ways of Amplification
Harneet Kaur, Himali Sarangal
DOI: 10.17148/IJARCCE.2015.4392
Abstract: Due to consistently growing demand for high data rate and high speed wireless access, free space optics has emerged as a next generation high speed wireless communication technology.FSO system using multiple transceivers� has several advantages such large link distance and better bit error performance. In this paper, FSO system using spatial diversity technique and three ways of optical amplifications are proposed. Performance Analysis of different amplification systems for various weather conditions is carried out. Parameters such as received power, BER and maximum achievable range are analysed. Multiple transmitter/receiver combination integrated with various amplification types enhances the performance of FSO system.
Keywords: Free Space Optics (FSO) link, Multiple TX/RX FSO, Bit error rate (BER), Preamplifier, Optical amplification
Abstract
Minimization of the Complexity of the digital Circuit using Genetic Algorithm
Amit Pandey, Sudha Nair
DOI: 10.17148/IJARCCE.2015.4393
Abstract: Digital Equipments are the necessity in the current scenario. Rapid growth of digital world has taken the researchers interest in order to improve the performance of circuit. The Optimization of the digital circuit is done on the basis of Genetic Algorithm (GA) for achieving maximum output of the digital circuit in terms of speed. This algorithm can dynamically perform various tests on the desired hardware testability. The comparative analysis is done on the speed of the digital circuit using the genetic algorithm and sequential search algorithm & was found that GA is more efficient & faster in propagation delay.
Keywords: Combinational Circuit, Sequential Circuit, Genetic Approach
Abstract
Sleep/Wake Scheduling for Target Coverage Problem in Wireless Sensor Networks
Manirajan.R, Sathishkumar.K.R
DOI: 10.17148/IJARCCE.2015.4394
Abstract: Network lifetime plays an integral role in setting up an efficient wireless sensor network. The objective is in twofold. The first one is to deploy sensor nodes at optimal locations such that the theoretically computed network lifetime is maximum. The second is to schedule these sensor nodes such that the network attains the maximum lifetime. Thus, the overall objective is to identify optimal deployment locations of the given sensor nodes with a pre-specified sensing range, and to schedule them such that the network lifetime is maximum with the required coverage level. Since the upper bound of the network lifetime for a given network can be computed mathematically, use this knowledge to compute locations of deployment such that the network lifetime is maximum. Further, the nodes are scheduled to achieve this upper bound. In this proposed system uses Sleep-wake scheduling is an effective mechanism to prolong the lifetime of energy-constrained wireless sensor networks. However, sleep�wake scheduling could result in substantial delays because a transmitting node needs to wait for its next-hop relay node to wake up. An interesting line of work attempts to reduce these delays by developing �anycast�-based packet forwarding schemes, where each node opportunistically forwards a packet to the first neighboring node that wakes up among multiple candidate nodes. It develops an anycast packet-forwarding scheme to reduce the event-reporting delay and to prolong the lifetime of wireless sensor networks employing asynchronous sleep�wake scheduling. Specifically, studies two optimization problems. First, when the wake-up rates of the sensor nodes are given, develop an efficient and distributed algorithm to minimize the expected event-reporting delay from all sensor nodes to the sink. Second, using a specific definition of the network lifetime, studies the lifetime-maximization problem to optimally control the sleep�wake scheduling policy and the any cast policy in order to maximize the network lifetime subject to an upper limit on the expected end-to-end delay.
Keywords: Sleep/Wake scheduling, Energy Consumption, Improve the network life time, Minimizing Delay, Wireless sensor Network
Abstract
Simulation of 32 × 20 Gb/s WDM and DWDM System at Different Dispersion
Parveen Bagga, Himali Sarangal
DOI: 10.17148/IJARCCE.2015.4395
Abstract: In this paper, the 32 channel WDM system at 20 Gb/s has been investigated for the different channel spacing. The performance has been analyzed on the basis of dispersion. The comparison of BER, Q-factor and eye opening for WDM and DWDM systems at different dispersion is done. It is observed that at different dispersion 2-10 ps/nm/km the 32 � 20 Gb/s WDM system provides better results than the 32 � 20 Gb/s DWDM (dense wavelength division multiplexing) system in the presence of nonlinearities. The analysis is done using OptiSystem 7.0 simulator.
Keywords: WDM, DWDM, BER, EDFA, Q Factor, Eye height, OptiSystem 7.0
Abstract
Interactive Multimodal Visual Search Using Voice Command on Mobile Device
Mayur Kanawade , Unmesh Kadam, Priyanka Jadhav, Jai Chavan
DOI: 10.17148/IJARCCE.2015.4396
Abstract: Mobile phones have involved into powerful image and video processing devices equipped with built-in cameras, color displays, and hardware-accelerated graphics. These more features allow users to give multimodal queries for searching information on the go from the world wide web. In this paper, we propose a multimodal image search system that fully utilized multimodal and multi-touch functionalities of smart phones. The system allows searching images on the web by using an existing image query or a speech query with the help of existing image search engine. If the user doesn�t have an existing image query or captured photo, they can input a speech query that clearly represents a picture description in the user�s mind. The proposed system enhances the mobile search experience and increases relevance of search results. It involves a natural interactive process through which user has to express their search content very well.
Keywords: multimodal search, visual search, mobile phone, interactive search, information retrieval
Abstract
A Survey on Secure Authorized Deduplication for Outsourced Data in Hybrid Cloud
Tamizh M, Elavarasi K
DOI: 10.17148/IJARCCE.2015.4397
Abstract: Cloud Service Providers offer highly available storage and colossally computing resources at comparatively squat fee. The storage space provided may contain more number of repeated data. Inorder to reduce the storage space and eliminate the duplicates of data, Data Deduplication technique is being used. It is one of the method that eradicates duplicate copies of repeating data to reduce the storage space and save bandwidth. Inorder to protect the confidentiality of the data, Convergent Encryption Technique has been used. It outsource the data only after it is being encrypted using the convergent key. To protect the Data Security, Differential Authorized duplicate check is being used. The deduplication is done only by the authorized user. In traditional deduplication schemes, the disparity rights of users are further considered in duplicate check besides the data itself. The new deduplication constructions supports authorized duplicate check in a hybrid cloud architecture. The proposed system includes the VAST storage system that is used for storing the valuable and secret data. It thwarts the unauthorized user to steal the information from small pieces of the data. The hacker cannot attain the entire information from small part of information, since the data is stored in the form of manageable pieces of data.
Keywords: Convergent encryption technique, Authorized duplicate check, Private Cloud, Public Cloud, Deduplication, Privileges.
Abstract
A 9 Slotsdual Band Microstrip Patchantenna for Wireless applications
G.Vijaya Kumari, P.Venkanna Chowdary, K.Madhulatha, M. Dinesh Kumar, K. Anand Sagar
DOI: 10.17148/IJARCCE.2015.4398
Abstract: A 9 Slotsdual band microstrippatch antenna is presented in this paper .The antenna resonates at 5.27 GHz and 7.61 GHz frequencies. The antenna is fed with coaxial feed giving bandwidths of 11.87%& 11.22%and VSWR of the both bands is less than 1.09.Theproposed antenna can be used for WLAN (Wireless Local Area Networks) applications.
Keywords: Impedancebandwidth, Microstrip patchantenna, Return loss,VSWR
Abstract
Single-ElectronTransistor Logic for High Reliability of Moore’s Law and Low Power VLSI
P. Vidya Sekhar, M. Saran Chowdary, A.Vamsidhar, P.V.S.Sri Ram, N.Venkateswarulu
DOI: 10.17148/IJARCCE.2015.4399
Abstract: The observation made in 1965 by Gordon Moore, co-founder of Intel, that the number of transistors that are embedded per square inch on integrated circuits had doubled every 18 months since the integrated circuit was invented. But as per latest trends in VLSI the channel width cannot be less than equal to 18nm, so Moore�s law came to deadline in recent years. This can be avoided by using SET whose channel width ~1nm. Recent research in SET gives new ideas which are going to revolutionise the random access memory and digital data storage technologies too. Single-electron transistor (SET) is a key element of current research area of nanotechnology which can offer low power consumption and high operating speed. The single electron transistor is a new type of switching device that uses controlled electron tunnelling to amplify current.
Keywords: VLSI, SET, Moore's Law, Island, Tunnelling effect.
Abstract
Analysis of DSR for Dynamic Topology Update Mechanism in LTRT based MANET’s
Nikhil Rathod, Sanghapal Salve, Vikas Suryawanshi, Yogesh Wagh
DOI: 10.17148/IJARCCE.2015.43100
Abstract: A Wireless ad-hoc network is an autonomous, self-organize distributed, peer to peer network of fix, nomadic or mobile user that communicates over bandwidth constrained wireless links. Energy Consumption and Network Connectivity are two of the most important issue that yet to be resolve in MANET�s. Broadcasting, in context of ad-hoc networks is a costly operation and thus topology control has been proposed to achieve efficient broadcasting with low interference and energy consumption. By using topology control each node optimizes its transmission power, by maintaining network connectivity by localize manner. In this paper, we propose Local Tree-Based Reliable Topology (LTRT), which is mathematically proven to guarantee k-edge connectivity while preserving the feature of Local Minimum Spanning Tree (LMST).while applying topology control technology into Manet, it is important to address the issue of performance degradation due to node mobility. In the network each node contain the topology information to maintain the connectivity with neighbors for that it needs to be frequently and appropriately update its information according to its moving speed. In our mechanism, each node determines exact value of topology control update interval according to topology information of its neighbors. By simulation results using network simulator (NS2) we achieve better dynamic topology update mechanism.
Keywords: Ad-Hoc Networks, Energy efficiency and Reliability, K-edge connectivity, LTRT,Network connectivity, PAN�s, Topology control
Abstract
Measuring Code Quality
Ms. Dhanshree Kapse, Ms. Karishma Kabra, Ms. Madhavi Chopade, Mr. Kailas Palhal
DOI: 10.17148/IJARCCE.2015.43101
Abstract: Every software Industry requires the quality of code. Formal specifications can help with program testing, optimization, reface, documentation, and, great significance debugging and restore however, they are difficult to do manually, and automatic mining techniques suffer from 90�99% false positive rates. To address those problems this project proposes to temporal-property miner by incorporating code quality metrics. This measure code quality by extracting additional information from the software engineering process, and using this information from code that is more equal to be correct as well as code that is less equal to be correct. When used as a preliminary processing step for an existing specification miner, project technique identifies which input is most correct program, the same number of specifications using only 45% of their original input. As a novel inference technique, this approach has few false positives in practice (63% when balancing precision and recall, 3% when focused on precision), even though finding useful specifications (e.g. find many bugs) on over 1.5 million lines of code.
Keywords: Quality, Errorless, Reliably
Abstract
Secure Database as a Service-a Review
Prof Swarnalata Bollavarapu, Kamal Mistry
DOI: 10.17148/IJARCCE.2015.43102
Abstract: Cloud computing is one of the emerging field in the IT industry and is widely adopted across the globe due to the easy accessibility and availability of the data from any location in the world over the internet. The era of cloud computing has reduced the overhead of hardware resources and maintenance due to this many industries have started using the different services provided by the cloud example Software as a service or platform as a service. In the recent years Database as a service has become boon in cloud computing era, it will reduce the overhead of installing and maintaining database on the client side, like any other services database as a service is also being provided on the pay per usage policy. In recent years many cloud service providers had started providing database as a service, among them few are: Amazon, Microsoft, Google etc. are good service provider.This paper discusses about the Database as a service and the security challenges faced by the database service provider. CRYPTDB and Monomi system is discussed to overcome the security challenges in database as a service.
Keywords: Cloud computing, CryptDB, Database as a service, database security, Challenges
Abstract
Literature survey on ‘Performance Evaluation of TCP Reno, SACK, and FACK Over WIMAX Network
Kirti Sapra
DOI: 10.17148/IJARCCE.2015.43103
Abstract: This paper mainly aims in the improvement of the congestion control mechanism over mobile WiMAX .Here, TCP sender side mechanisms are used to handle higher load, random loss of packets and retransmission timeouts in high delay networks in such a way as to keep the maximum size of congestion window, while keeping the control over congestion and retransmissions at a minimal level. The TCP proposed mechanisms are assessed against TCP Reno, TCP SACK and TCP FACK to see how they fair against congestion and higher offered load. Ns2 simulator has been selected as the simulation tool because of the ease of use of the graphical interface provided, extensive support of TCP and the free license availability
Keywords: WiMax, TCP Reno, TCP SACK, TCP FACK, NS2 Simulator
Abstract
Data Leakage Detection Using LSB
Sanchit S. Mhatre, Vaibhav V. Kakhandaki , Bhagyashri P. Yeola, Rakesh Badodekar
DOI: 10.17148/IJARCCE.2015.43104
Abstract: An administrator distributes sensitive data to some trusted agents (third parties) and if one or more of them will leak that sensitive data and found in an unauthorized place (e.g. on the web or somebody�s laptop),then we can catch & prosecute them as per Law. The question may arise in mind, how to deal with such problem? There is a unique key embedded in each copy of the data by distributor before distributing that data to agents and this key remains within data. In some cases, we can also inject �realistic but fake� data records to further improve our chances of detecting leakage and identifying the guilty party. We are using List Significant bit (LSB) [1] steganography concept here to embed the key in the data. So when the distributor finds his secret data at unauthorized place, he will simply take that data and check for the unique key. If the key in that data matches with the key present in his database then the system will display the name of that guilty agent and then he can mark it as invalid user [2].
Keywords: Steganography, LSB [Least Significant Bit], FPS, Watermarks, Message key, Serialized
Abstract
Security Mediator Using Blind Signatures and Key Rotation Algorithm
Sanket Chaudhari, Akanksha Singh, Sheetal Asopa
DOI: 10.17148/IJARCCE.2015.43105
Abstract: One of the most important issues in Network is security. When data is distributed across networks or information is transferred via public networks, it is more prone to be attack by mischievous elements. In traditional security model, all the data stored in server and the users who use that data belong to the same security level. The security service provided by the storage provider is not enough. Since the data is stored anywhere across the network, the data owner has less control over the data stored in servers. Due to the issues in security, both owners and users are advised to verify the integrity of data with Provable Data Possession (PDP) before further usage of data. However earlier methods either unnecessarily expose the identity of a data owner to untrusted servers or introduce overhead on verification metadata for preserving anonymity. The proposed system is to build a security service through a trusted third Party .The system introduces a security mediator (SEM) which does not store any data at its end. The system is also able to generate verification metadata onoutsourced data for owners
Keywords: Blind Signature, Decryption, Encryption, Key Rotation algorithm, Metadata, Provable data possession, Security, Security Mediator, Server
Abstract
Task Scheduling in Federated Cloud by Multilevel Queue based on Genetic Algorithm
Dr.M.Srivenkatesh, K,Vanitha
DOI: 10.17148/IJARCCE.2015.43106
Abstract: Federated Cloud computing is one of the upcoming latest new computing paradigm where applications and data services are provided by multiple cloud providers over the Internet. Today�s some of the business organizations use federated cloud environment. The Task management is the important role in federated cloud computing systems. Task scheduling problems are which relate to the efficiency of the whole federated cloud computing facilities. The main focus is to study various problems, issues and types of scheduling in cloud computing. We propose Multi level Queue Task Scheduling Algorithm includes proposed Priority Based Round-Robin Task scheduling algorithm and task scheduling based on genetic algorithm for federated cloud computing environment.
Keywords: Cloud computing, dynamic scheduling, Genetic Algorithm, optimization
Abstract
Hand Geometric Recognition System based on Support Vector Machines (SVM)
GafarZenAlabdeenSalh, Abdelmajid Hassan Mansour, Malaz Fatah Elrahman Mohammed
DOI: 10.17148/IJARCCE.2015.43107
Abstract: The use of biometric technologies for identity verification is growing rapidly, and the hand geometry is most widely used for person identification in the recent years, they gaining high acceptance in the security applications. This research aims to build a recognition system using Hand Geometric System based on Support Vector Machines (SVM), so as to overcome the problems of the possibility of fraud and forgery in the traditional identification methods.
Keywords: support vector machine, Biometric authentication, False Rejection Rate, False Acceptance Rate, security, pattern recognition, image processing, hand geometry
Abstract
Model-Based Verification of Software Interface
Dinh Thang Pham
DOI: 10.17148/IJARCCE.2015.43108
Abstract: In Software Engineering, There is much technique to testing. They are Unit testing, Design testing, Code testing �It depends on Development model of a project, the testing maybe before or after. In Viet Nam, the testing for program verification is almost by manually. This thing conducts many shortcoming or overload with big project. Although, there is many try to improve. Such as: present the requirement by XML or looking for many different approaches. But there is no an approach to test become engineering by automatically. From that requirement, it needs a program verification of software interface. There is a tool for testing on the computer by automatically. With this thing, they can save much money, time, and effort. Project is created with two concrete works. One of many importance things is choose a tool that is powerful enough to solve the counter examples. In this project, I choose the Altarica language as that tool. And so, it must be created the input data from XML that Altarica can readable. This operation must be implemented by a parser. To this time, there are two functions Deadlock and Live that are implemented by successfully. And they are used for test run. In the future, there is more function that will develop for maximum support to design.
Keywords: sModel-Based Verification, Model Checking, Altarica for Model Checking, Testing, Formal Design
Abstract
A Hierarchal Tensor Based Approach with Boosted Regression Trees
Deeba M, J.Shyamala Devi
DOI: 10.17148/IJARCCE.2015.43109
Abstract: Within the split-and-merge paradigm for the compressed, continuously updating and data querying of multidimensional spatial data, the original multidimensional spatial tensor data are divided into small blocks according to their spatial data references. Each block is represented in regression tree structure and at each level, all leaf nodes of regression tree are boosted then compressed hierarchically. Then the blocked hierarchical tensor representation combined into a single hierarchical tree as the representation of original data. With a buffered regression tree data structure and boosting, the corresponding optimized operation algorithms, the original multidimensional spatial field data can be continuously compressed, appended, and queried. The new approach with above used regression trees instead of buffered trees and using boosting algorithms to improve the fit ratio, so that the quality of the original data with much low storage costs and faster computational performance.
Keywords: Geo Spatial Data, Tensors, Regression Trees, Gradient Boosting
Abstract
Online Social Networking Sites that are used for Specific Purpose
Dr. H Venkateswara Reddy, Tata A S K Ishwarya, Divya Bharathi Mulupuri
DOI: 10.17148/IJARCCE.2015.43110
Abstract: Social networking sites are generally used for the communication purpose. In these Social networking sites we can send text messages chatting and share our common interests. The most popularly used social networking sites like facebook, twitter and orkut. In these networking sites we can add different categories of people like friends, relatives, colleagues, School friends and many others. If a person wants to join a networking sites that only contains his/her friend circle and similarly relatives and colleagues and is there any other specific website that only serves for specific purpose. In this paper we are discussing different social networking sites that are used for specific purpose in different parts of world like MyHeritage , Classmates.com, StudiVZ, Flixster, Meetup
Keywords: Facebook, orkut, twitter, MyHeritage, Classmates.com, Studivz, Flixter, Meetup.
Abstract
A Keyword Focused Web Crawler Using Domain Engineering and Ontology
Gunjan Agre, Snehlata Dongre
DOI: 10.17148/IJARCCE.2015.43111
Abstract: As the number of users on internet grows the number of accessible web page also grows which causes more troublesome for users to find relevant or specific data according to their needs. Web crawler is that the method utilized by search engines to collect pages from the net. The necessity of an online crawler that downloads most relevant web content from such an oversized internet remains a serious challenge within the field of Information Retrieval Systems. Most internet crawlers use keyword base approach for retrieving the knowledge from Web. However they retrieve several irrelevant web contents as well. With the utilization of linguistics additional relevant pages can be downloaded. Linguistics will be provided by ontology. This paper proposed algorithm on ontology based internet crawler specified such that only relevant sites can be retrieved and estimate best path for crawling which uses for improving the crawling performance.
Keywords: Web Crawler, Focused web crawler, Importance-metrics, Ontology, domain knowledge.
Abstract
The comparison between OLSR and AODV routing protocols for Vehicular Adhoc Networks
V.Jigisha, Ch.Sudersan Raju, Dr.Ch.Balaswamy
DOI: 10.17148/IJARCCE.2015.43112
Abstract: VANETS (Vehicular Ad hoc networks) is gaining a great attention in the field of research which integrates ad- hoc networks and cellular technology for better inter vehicular communications. In vehicular Ad Hoc networks, routing is somewhat typical than in any other wired networks. This is due to severe changes in topology calls for customized routing protocols. The main aim of this paper is to discuss these two such protocols OLSR and ADOV routing protocols. ADOV is on-demand routing algorithm which determines a route to the destination only when desired node wants to send a packet to the destination where packet holds and maintains a table containing information about the destination packet. OLSR is a proactive routing protocol mainly developed for MANETS. This paper extends the use of OLSR for VANETS. Thus comparison of these two protocol results helps selection of particular routing protocol for Vehicular Ad Hoc networks.
Keywords: OLSR, ADOV, Vehicular Ad Hoc networks (VANETS).
Abstract
Ethical Network Monitoring Using Wireshark and Colasoft Capsa as Sniffing Tools
Nedhal A. Ben-Eid
DOI: 10.17148/IJARCCE.2015.43113
Abstract: With the development and popularization of network, the management and monitoring of network traffic is important to keep the network smooth and efficient. It is increasingly critical that an organization secure the system to avoid external hacking and employee abuse of computers in the workplace. This paper study the problem of employee abuse of computers in the workplace and discuss ethical and legal dimensions of the decision facing employers and network administrators regarding whether it is appropriate to monitor the employee's workstation in the organizations. Packet Sniffer is a tool used by network administrators to capture all the packets on the network and monitor the bottlenecks, alarm the irregular behavior, capture passwords and VoIP from any workstation in that network to keep network secured. We give a brief introduction of what is a packet sniffer, its structure, uses and types. Two of the most popular packet sniffing software are discussed and examined; Wireshark and Colasoft Capsa. They are compared according to their features, characteristic behavior, qualitative and quantitative parameters.
Keywords: Packet capture, Traffic analyzer, Network monitoring, Network Sniffing, Network analyzer, Packet sniffer, Wireshark, Colasoft Capsa.
Abstract
A Robust Approach For Detection of the type of Fracture from X-Ray Images
Cephas Paul Edward V, Hilda Hepzibah S
DOI: 10.17148/IJARCCE.2015.43114
Abstract: A bone is broken or a fracture in bone happens when an external force applied upon the bone is more than what the bone can tolerate or bear. As a result, the shape and strength of the bone is disturbed which causes excruciating pain on the bone and ends up in the loss of functioning of the bone. In some instances there will be bleeding around the injured site. The modern developments in medical imaging contributes a lot in examining the fractures in different kinds and classes of bones found in the body of the patient without much difficulty. Segmentation of an image involves a process called edge detection. The purpose of segmentation is to modify the representation of an image into fragments that is bits and pieces that are more important, useful and easier to analyse. To identify the edges, this function scans for regions in the image where the change of intensity occurs rapidly. Edge detection returns a binary image containing ones where edges are found and zeros in all other places. Different edge detection methods exist like Sobel operator, Prewitt operator, Laplacian of a Gaussian and Canny. These techniques can be applied on X-Ray medical images. Quality metrics like mean and standard deviation are applied to analyze, compare and evaluate the results. The process of detecting the type of fracture has to be done with a great precision. To improve these quality metrics,a novel edge detection algorithm is proposed and the accuracy is measured for this cause.
Keywords: Fracture detection, Bone segmentation, Edge detection, Fracture classification.
Abstract
Performance Analysis of Various Routing Protocols in Wireless Network
Aparna Joshi, Rahul Desai, Sachin Yadav, Avinash Thakur, Sunil Singh, Abhishek
DOI: 10.17148/IJARCCE.2015.43115
Abstract: Mobile ad hoc network (MANET) is a continuously self configuring, infrastructure-less network of mobile devices connected without wires. Ad hoc is Latin and means �for this purpose�. Routing protocols like Destination-Sequenced Distance-Vector (DSDV), Ad hoc On-Demand Distance Vector Routing (AODV), and Dynamic Source Routing (DSR) and Ad hoc on Demand Multipath Distance Vector (AOMDV) have been implemented. In this paper, performance of two prominent on-demand reactive routing protocols for mobile ad hoc networks: DSR and AODV, along with the proactive DSDV protocol have been analyzed. The On-demand protocols, AODV and DSR perform better than the table-driven DSDV protocol. Although DSR and AODV share similar on-demand behaviour, the differences in the protocol mechanics can lead to significant performance differentials like Packet Delivery Ratio (PDR), throughput, control overhead, delay. The various performance differentials have been analyzed by varying network traffic, mobility, and network size.
Keywords: Source Routing, DSDV, DSR, AODV, PDR
Abstract
Use of Cryptography and Secrete Sharing riven the Secrete into Multi-Cloud
Sanket Bora, Sandip Karale, Dheeraj Katariya, Ganesh Shejwal, P. P. Ahire
DOI: 10.17148/IJARCCE.2015.43116
Abstract: Cloud computing is one of the rising topic in the field of information technology. Now a day many organizations use this technology. There are many benefits of Cloud computing in terms of low cost and accessibility of Data. It is the smart technology and very popular, among all other computing paradigm. Security of cloud computing is a major factor in the cloud computing environment. Users store sensitive information with cloud storage providers but these providers may be untrusted. Due to risks of service availability failure and the possibility of malicious insiders in the single cloud Single Cloud is less popular. Security is one of the major factor that affect the growth as well as the development of cloud computing. This paper aims at the service availability of cloud. In this paper we give the solution for the cloud availability.
Keywords: Cloud computing, single cloud, multi-clouds, cloud storage, DepSky system, Shamir Secrete sharing algorithm, Data transfer security.
Abstract
A LITREATURE SURVEY ON LOSSLESS IMAGE COMPRESSION
Malwinder Kaur, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.43117
Abstract: Cloud computing is one of the rising topic in the field of information technology. Now a day many organizations use this technology. There are many benefits of Cloud computing in terms of low cost and accessibility of Data. It is the smart technology and very popular, among all other computing paradigm. Security of cloud computing is a major factor in the cloud computing environment. Users store sensitive information with cloud storage providers but these providers may be untrusted. Due to risks of service availability failure and the possibility of malicious insiders in the single cloud Single Cloud is less popular. Security is one of the major factor that affect the growth as well as the development of cloud computing. This paper aims at the service availability of cloud. In this paper we give the solution for the cloud availability.
Keywords: Cloud computing, single cloud, multi-clouds, cloud storage, DepSky system, Shamir Secrete sharing algorithm, Data transfer security.
Abstract
Identification of various writer’s handwritten Text using Scale Invariant Feature Transform
Harshal Kolhe, Prashant Jadhav, Mahadev Kolape, Kunal Shah
DOI: 10.17148/IJARCCE.2015.43118
Abstract: Now a day�s OCR helps us to recognize text from images but it is not operated with handwritten characters. So we proposed new methodology to recognize handwritten characters. In existing system LoG filter is used to segment the writer�s handwriting image into word regions the SIFT descriptors (SDs) of WRs and the corresponding scales and orientations (SOs) are extracted which is part of SIFT have been utilized to recognize the features.
Keywords: Offline text independent writer identification, SIFT, word segmentation, SIFT descriptor signature, scale and orientation histogram.
Abstract
Secure Application Development in Academics
Ms. P.B.Alappanavar, Mr. Shashank A. Rangole
DOI: 10.17148/IJARCCE.2015.43119
Abstract: The skill gap between industry and academia is giving sleepless nights to IT Industry CEO�s. Industry almost gives paid vacations to new trainee in the form of training during the initial months. This training goes on for a period of 3-4 and sometimes almost 6 months. This training is done as the industry believes that the under graduate education provided does not cover the required aspects for the trainee to work on live projects from day one. Hence in a certain way they do agree that there is a gap between the academia and industry. Today�s need is that this gap has to be bridged as much as possible and in as many ways possible. There are several issues that need to be considered if we are to bridge this gap. One such concern is the security aspect. Security is not a major concern for students when they develop software projects minor ones like data base projects in third year and one major one in the final year. Security is not given priority at all, although it does give sleepless nights to the concerned industry. It has been proven that Organizations with world class Software Development Life Cycle (SDLC) practices that include security will experience an 80 percent decrease in critical vulnerabilities [1]. Hence it is necessary that students while developing software projects must consider security. This paper discusses ways in which students when developing minor or major projects can include security aspects, which would in turn train them to think of security as the developers concern and not just the security specialist concern. The paper also lists the benefits such considerations will have in future.
Keywords: Security, MS-SDL, OWASP, Checklists
Abstract
AN INNOVATIVE APPROACH TOWARDS VIRTUAL KEYBOARD
Renu, Shama Banoo, Sumbul
DOI: 10.17148/IJARCCE.2015.43120
Abstract: Input to small devices is becoming an increasingly crucial factor in development for the ever-more powerful embedded market. There fore this paper presents an innovative approach towards virtual keyboard for consumers of mobile, laptops, personal computer, tablet or any industrial machine. A virtual keyboard can be defined as a touch typing device that does not have a physical manifestation of the sensing areas. This paper uses an inexpensive technique to transform an ordinary piece of paper into a touch screen using an ordinary camera. Here we are using different image processing algorithms to accurately recognize finger touch such as segmentation, thres holding etc. The keyboard layout is reconfigurable, hence allowing user to change the layout based on application, for example user can select different language for editor or select a specialized layout for gaming application.
Keywords: virtual keyboard, reconfigurable, image processing
Abstract
EX-OR LINK STATE OPERATION USING IN FISHEYE STATE ROUTING PROTOCOL FOR DESTINATION SEQUENCED IN MANET
S.Balaji, T.Dhanasundhari, R.Rajakumari, S.Ramina
DOI: 10.17148/IJARCCE.2015.43121
Abstract: In MANETs, opportunistic data forwarding has drawn abundant attention within the analysis community of multi hop wireless networking, with most analysis conducted for stationary wireless networks. One amongst the explanations why opportunistic data forwarding has not been wide used in mobile ad hoc networks. It�s the need of high capable fisheye state routing scheme with efficient source routing capability. In this paper, we propose a fisheye state routing (FSR)[7] protocol to get efficient data we include extremely opportunistic routing (EXOR )[1] and link state protocol (LS)[2] which compared with proactive source routing (PSR) protocol. We tests using simulation in ns-2(Network Simulator-2) under different network parameters. We get good result in a fisheye state routing (FSR) protocol.
Keywords: Routing protocols, FSR, PSR, EX-OR, MANET, OLSR, DSR, BFS.
Abstract
Disaster Management Information System Framework using Feed Forward Back Propagation Neural Network
Gopal Datt , Ashutosh Kumar Bhatt , Sunil Kumar
DOI: 10.17148/IJARCCE.2015.43122
Abstract: It is impossible to prevent natural disasters but the applications of recent technologies can be implemented for reducing their effects by developing disaster early warning strategies, preparing and implementing developmental plans to provide resilience to such disasters, and helping in rehabilitation and post disaster reduction. In all cases the circulation of precise, current and reliable information plays a significant role. An integrated approach using scientific and technological advances should be adopted to mitigate and to manage natural hazards using the proper information system for disaster management should be present to tackle the disaster and to manage it. The proposed study is about Uttarakhand (India) which is devastated by natural disaster (cloudburst and flash flood, 15 � 16 June 2013) before a couple of months and it also can be implemented in another provincial. The proposed study aims preparing an efficient disaster management information system for risk prevention and reduction in time to reach in emergency situations using web based interface and feed forward back propagation neural network.
Keywords: FFBPANN, DMIS, ICT, Cloudburst, NDMA.
Abstract
Tampering Detection in Digital Videos
Yeswanth.P, Pothumani.S
DOI: 10.17148/IJARCCE.2015.43123
Abstract: We presents a way to notice video meddling and distinguish it from common video process operations, like recompression, noise, and brightness increase, employing a sensible watermarking theme for time period authentication of digital video. In our technique, the watermark signals represent the macro blocks and frame�s indices and ar embedded into the nonzero measure distinct trigonometric function rework price of blocks, sanctioning our technique to notice abstraction, temporal, and spatiotemporal meddling. Our technique will be simply organized to regulate transparency, robustness, and capability of the system in keeping with the particular application at hand. Additionally our technique takes advantage of content-based cryptography and will increase the safety of the system.
Keywords: Tamper detection, Compression, Watermarking, Embedding, BER, PSNR
Abstract
A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service
Preeti, Kavita Khatkar
DOI: 10.17148/IJARCCE.2015.43124
Abstract: The paper is about the study of the Cloud computing concepts which contains the different services such as the IaaS, PasS, SaaS and DaaS. There are so many other services offered by the cloud. But in cloud, the security of data is the main aim due to centralized information that is shared among the users and the examples of cloud provider are Google, Amazon, Salesforce.som and Microsoft etc. The data can be hamper include data leakage, insecure interface, sharing of resources, data availability and inside attacks. These services offered by internet and are on demand as the user required and these services are pay per use of it. The user can access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. This paper aims to be study the security algorithm about RSA algorithm.
Keywords: Cloud Computing, RSA, IaaS, PasS, Saas, Webos.
Abstract
Three Layer Protection for Secure Data Transmission using Digital Audio as Carrier
Parul, Mr. Vikas Kamra
DOI: 10.17148/IJARCCE.2015.43125
Abstract: Today In Business Domain, the information is substantial part of enterprise. The data and information present need to be confidential and secure. Secrecy is an essential aspect. So, that no obtruder being able to disturb the information. From the security perspective, the information should not be readable by intruder. The cryptography technique can convert the plain text to encrypted text. The target of steganography is to hide a confidential message within a cover-media in such a way that others cannot discern the presence of the hidden message In this paper, Data will be hidden using Three layers in Audio. Goal of this work is to increase level of security so that data can be gaurded.
Keywords: WAV (Waveform audio file format), HASH, Hidden message
Abstract
Logo Steganography Using Digital Watermarking
Kanchan, Krishan Kumar
DOI: 10.17148/IJARCCE.2015.43126
Abstract: Logo watermarking is attaining wide popularity in today�s time. Watermarking has wide range of applications such as content identification and management, content protection, forensics and piracy deterrence, document and image security and many more. This paper presents a tamper-resistant algorithm for watermarking images. With appropriate alterations to the embedding and extraction methods, we can encapsulate logo watermark in the image by the use of watermark embedder. In this paper, we systematically review proposed attacks on watermarks. We use enlightened watermark detector which can extract the watermark even in the presence of geometric attacks.
Keywords: Logos, Image files, Watermark, Pixel
Abstract
Resolution Enrichment Techniques for Image incorporated with Text
Mohit, Mr. Krishan Kumar
DOI: 10.17148/IJARCCE.2015.43127
Abstract: Resolution is designated as significant holding for images. Resolution is an underlined expression of any image. Gratifying quality images are required almost in every field. For this we propose new modified algorithm having the extention in scaling and the algorithm is applied on image mingled with text for producing the pleasing quality of image.
Keywords: Interpolating filters, Artifacts, Magnified, Image Resolution Enrichment
Abstract
Scalable and Secure Sharing of Personal Health Records in centralized Database Using Attribute-based encryption
Prof KanchanHadawale, NikamManoj B, KadamJayesh D, Salgar Vijay L, GhogareSagar R
DOI: 10.17148/IJARCCE.2015.43128
Abstract: Personal health record (PHR) is used to maintain patient�s personal and diagnosis information, and is stored at a thirdparty i.e., cloud providers. The main concern is about diagnosis information. Due to Personal health record (PHR) patient manage and create his its own health record and the patient�s could actually control the sharing maintain with high security and high privacy. Personal health record (PHR) protect and secure the patient�s personal health information (PHI) from unauthorized users. The patient�s have control over access to their own PHR. To achieve high security of personal health records, we use the attribute based encryption technique to encrypt the all patient�s data before outsourcing or before access from unauthorized user. We prestige attribute-based encryption (ABE) practices to attain scalable and fine grained data access control for personal health records to encrypt each patient�s PHR file. Data owner update the personal health data into third party cloud data centers. Multiple data owners can access the same type of patient�s data from cloud. The Personal health record (PHR) is a high degree of patient�s privacy is guaranteed.
Keywords: Personal health records (PHR), Personal health information (PHI), Attribute-based encryption (ABE), data privacy, fine-grained access control.
Abstract
Optimized Inter-Landmark Routing by Dtn-Flow Algorithm
Venothini.N, Padmapriya.V
DOI: 10.17148/IJARCCE.2015.43129
Abstract: This Paper focus on the well-organized routing of data in the middle of dissimilar areas in delay tolerant networks (DTN).In the current algorithm selects widely held places that nodes visit repeatedly as landmarks and splits the complete DTN area into subareas signified by landmarks. The number of node transfers between two landmarks is computed to represent the forwarding capability between them, relyupon which routing tables are created on each and every landmark to route the packet routing. However, there is more number of landmarks for a single path, throughput depends upon the traffic, the only static path is available, and no mobility nodes can be used. To overcome this problem, we suggest an Ad-hoc On Demand Distance Vector (AODV) routing technique in DTN flow algorithm to enhance node to node communication and for effective throughput is proposed. This technique can be used on all mobility nodes and efficient throughput can be obtained by the utilization of all nodes. The number of landmarks and the total cost is limited. Overall performance will be multiplied by increasing the N range of dynamic methods.
Keywords: Delay Tolerant Networks, inter-landmark, Ad-hoc on demand vector routing
Abstract
Maintainability Estimation of Object Oriented Software: Design Phase Perspective
Nupur Soni, Dr. Mazhar Khaliq
DOI: 10.17148/IJARCCE.2015.43130
Abstract: Maintainability is an essential software quality factor that is useless if it is not available at an initial stage in the software development life cycle. It becomes more important in the case of object oriented design. Estimating maintainability of object oriented design near the beginning in the development cycle, mainly at design phase; significantly reduce the development cost and rework, and as well as assists the software designers and developers for delivering high quality maintainable software within time and budget. This paper illustrates the need and significance of maintainability at design phase and build up a multivariate linear Maintainability Estimation Model for Object-Oriented Design. Developed model estimates the maintainability of class diagrams in respect of their Extendibility, Reusability. Lastly the developed models have been validated using experimental tryout.
Keywords: Maintainability, Estimation, Software Metrics, Object Oriented Design.
Abstract
Classified Data Organizing Maps: A Survey
Deepika Kourav, Asha Khilrani
DOI: 10.17148/IJARCCE.2015.43131
Abstract: Self-Organizing Map (SOM) is in the greater concern in these days due to the hierarchy creating in document organization. It will be better for those problems where we needed clustering and visualization. Our direction of this paper is to find better clustering and classification techniques which will be profound in document organization. So in this paper we discuss on the deficiencies find in the traditional techniques and about the possible solutions which can be better in document organization.
Keywords: SOM, Clustering, Classification, Visualization
Abstract
An Effective Approach For Car Driving In Mountain Area Using Optimal Regulator
Nirmalya Chandra, Dhritimoy Roy , Avinash Kumar, Abhik Ghosh
DOI: 10.17148/IJARCCE.2015.43132
Abstract: Self-Organizing Map (SOM) is in the greater concern in these days due to the hierarchy creating in document organization. It will be better for those problems where we needed clustering and visualization. Our direction of this paper is to find better clustering and classification techniques which will be profound in document organization. So in this paper we discuss on the deficiencies find in the traditional techniques and about the possible solutions which can be better in document organization.
Keywords: SOM, Clustering, Classification, Visualization
Abstract
Security in Cloud using Implicit Security Model and OTP
Akanksha Rana
DOI: 10.17148/IJARCCE.2015.43133
Abstract: Cloud computing is considered to be one of the burning topic nowadays. Some of its excellent features attracts the confidence of the users but at the same time some of its uncertainties results in lack of faith of user. This survey paper gives a brief review of implicit security techniques, used in cloud computing. Traditionally explicit techniques are used in cloud computing but storing the data implicitly may provide more secure and balanced storage of data.
Keywords: Cloud Computing, Explicit Security, Implicit Security, OTP
Abstract
Analysis of Virtualization Tools and Techniques
Mrs. Kavita S, Mrs. Dakshyani G, Mrs. Kiruthika
DOI: 10.17148/IJARCCE.2015.43134
Abstract: Cloud computing is considered to be one of the burning topic nowadays. Some of its excellent features attracts the confidence of the users but at the same time some of its uncertainties results in lack of faith of user. This survey paper gives a brief review of implicit security techniques, used in cloud computing. Traditionally explicit techniques are used in cloud computing but storing the data implicitly may provide more secure and balanced storage of data.
Keywords: Cloud Computing, Explicit Security, Implicit Security, OTP
Abstract
Audio watermarking: A Novel approach using hybridization of DWT+DCT
Mrunali J. Patel, Dhavalsinh V. Solanki, Dr. K. R. Borisagar
DOI: 10.17148/IJARCCE.2015.43135
Abstract: First of all, we are in the era of digital multimedia. Because Images, Videos & Audios are the global information sources now. Intellectual property protection & copyright protection in digital multimedia is the core driving force behind this research area. Also watermark can be some verification or hidden messages. Exceptionally successful watermarking innovations have been executed for images and videos. Though, very few algorithms have been proposed for audio behind audio watermarking. This is because of the way that, the human audio framework is a great deal more unpredictable and touchy than visual framework. In this paper we have designed novel and efficient approach based on hybridization of two existing techniques DCT & DWT. Critical performance evaluation with different attacks & different types of audios has been done to demonstrate superiority & robustness of the technique. Also we have compared it with traditional techniques DCT and DWT.
Keywords: DCT, DWT, Robustness, Watermarking
Abstract
An Efficient Accident AvoidanceSystem Using Wireless Technology in Instrument Cluster
R.Deepa, Mr.A.Senthilkumar
DOI: 10.17148/IJARCCE.2015.43136
Abstract: First of all, we are in the era of digital multimedia. Because Images, Videos & Audios are the global information sources now. Intellectual property protection & copyright protection in digital multimedia is the core driving force behind this research area. Also watermark can be some verification or hidden messages. Exceptionally successful watermarking innovations have been executed for images and videos. Though, very few algorithms have been proposed for audio behind audio watermarking. This is because of the way that, the human audio framework is a great deal more unpredictable and touchy than visual framework. In this paper we have designed novel and efficient approach based on hybridization of two existing techniques DCT & DWT. Critical performance evaluation with different attacks & different types of audios has been done to demonstrate superiority & robustness of the technique. Also we have compared it with traditional techniques DCT and DWT.
Keywords: DCT, DWT, Robustness, Watermarking
Abstract
Reliability Estimation of Object-Oriented Software: Design Phase Perspective
Anil Kumar, Namrata Dhanda
DOI: 10.17148/IJARCCE.2015.43137
Abstract: Wireless technology has completely transformed the way we livein today�s world almost every automobile vehicle operates hard functions in a wire connection. Replacing a wired connection with wireless connection could prove to be productive in economic senses as it will have an effect on the weight, cost and performance. In this project I propose a wireless network to which will control accelerating, braking, control steering and other functions in the vehicle. The Display unit is in front of the driver, Functionality interface on the dashboard at first included the steering wheel and the instrument cluster. The instrument cluster contains gauges speedometer, tachometer, odometer, fuel gauge, and other telltale. The main objective of the proposed system to design a wireless instrument cluster to operate the vehicle in safe speed at critical zones using ultrasonic sensor and 1EEE 802.15.4 standard. Wireless communication between the vehicle body control unit and instrument cluster unit for indicate the vehicle functionality of the vehicle, sensor unit used for safe distance measurement For Simulation purpose the Vehicle unit consider as ARM controller unit and the instrument cluster hardware is designed with ARM controller for interfacing and design a functional process of the vehicle, this propose system provide efficient vehicle speed control.
Keywords: ARM-LPC2148, LCD Display, LED�S, Meters, buzzer, IEE 802.15.4 Standard .Ultrasonic sensor.
Abstract
Paper on authentication of an system using hidden codes and random code generator
Ms. Dhanshri Agashe, Prof. A.R Raipurkar
DOI: 10.17148/IJARCCE.2015.43138
Abstract: This paper presents an evaluation of image based authentication using hidden codes and random code generated in graphical password scheme. Now a days authentication is a very critical problem in security system. Unauthorized user or hacker can easily stole the information contains in a system by using proxy password or by capturing the gallery where different passwords get generated in it. This has been solved by the fact the humans have a natural inclination to remember images more easily than text. As images are better to remember. Here we have proposed a graphical password authentication where it will consists of number of images and each image is hidden by a specified character which cannot view to user and this will set it as his password for login page. A new algorithm that using watermarking for the images which will be watermarked and Image based authentication using hidden codes and random code generator technique as the solution to solving image gallery attacks and using the random character set generation for each image for resistance to shoulder surfing attack to provide better system secure.
Keywords: Graphical Password, Watermarked Algorithm, Authentication Security, Shoulder surfing ,image gallery attack
Abstract
Dynamic Nearest Neighbour Search With Keywords
MINOJINI N, GAYATHRI R KRISHNA, REKHA A, SOWMIYAA P
DOI: 10.17148/IJARCCE.2015.43139
Abstract: Many search engines are accustomed search anything from anywhere; this method is employed to quick nearest neighbour search using keyword. Existing works primarily target finding top-k Nearest Neighbour s, wherever every node must match the full querying keywords .It doesn't consider the density of information objects within the spatial area. Additionally these strategies are low economical for progressive question. however in supposed system, as an example once there's look for nearest restaurant, rather than considering all the restaurants, a nearest neighbour question would raise the eating house that's, closest among those whose menus contain spicy, liquor all at a similar time, resolution to such queries relies on the IR2-tree, however IR2-tree having some drawbacks. Potency of IR2-tree badly is impacted because of some drawbacks in it. The answer for overcoming this problem ought to be searched. The spatial inverted index is that the technique which can be the answer for this problem.
Keywords: Nearest Neighbour Search, IR2-tree, Range search, Spatial inverted index.
Abstract
Analysis of Cry in New Born Infants
Dhanashri U.S. Talauliker , Nayana Shenvi
DOI: 10.17148/IJARCCE.2015.43140
Abstract: The acoustic analysis of infant cry is used to deduce information on the state of health of new-born babies as well as of children a few weeks old. Crying is the first tool of communication for an infant. These cries seem to be uniform, but there are a lot of differences between two infant�s cries. Infant cry characteristics reflect the development and possibly the integrity of the central nervous system. The preterm infants and infants with neurological conditions have different cry characteristics like fundamental frequency, when compared to healthy full term infant. There are differences between full term and preterm infant in their neuro-physiological maturity and its impact on their speech development. Cry characteristics of New born infant, changes with increase in age. Acoustics analysis of infant cry signals can thus give an aid to clinical diagnosis and prevention of distress since it is easy to perform, cheap and completely non-invasive. Hence, this paper aims at pre-processing to eliminate silenced region of cry signal and estimating the fundamental frequency (pitch) using time domain and frequency domain analysis. Such parameters are of interest in exploring brain function at early stages of child development, for the timely diagnosis of neonatal disease and malformation.
Keywords: Fundamental frequency, Formants, Cry characteristics, Cry signal
Abstract
Association Policy for XML Query Answering By Mining Tree
Shambhu Kumar Singh, Sachinkumar S. Patil, Abhinay C. Deshmukh, Suraj C. Jadhav, Nilesh Rajput
DOI: 10.17148/IJARCCE.2015.43141
Abstract: As we consider any database, then to retrieve the information in the files is an important issue. Mostly the files are arranged in proper manner by using the trees and No SQL database. This approach of TBAS (Tree Based Association Rules) plays an important role for reducing the retrieval time of query. So that, if the user wants to retrieve the information about any particular subject then it can be provided by the relational database in very less time because the information is stored in XML files i.e. the information is stored by using tags. In this way the retrieval time is reduces. This Intentional Knowledge of mined information is beneficial, and this is an unique way to manipulate both the structure and the content of the XML document and, exact answers to the user queries whenever it required.
Keywords: TBAS (Tree Based Association Rules), Intentional Knowledge, XML (Extensible Markup Language).
Abstract
Key Escrow Removal Using Random Oracle in CP-ABE for Security in Military Networks
Hiral Patel, M. A. Lokhandwala
DOI: 10.17148/IJARCCE.2015.43142
Abstract: In this paper, Confidential Data Security Methodology has been modified by using random key authority generation replacing two-party computation protocol to remove the disadvantage KEY ESCROW, with recent adoption and spreading of data sharing. One or more trusted parties supply information to decrypt ciphertext. Trusted parties are known as central authorities provide information in form of data recovery keys. Key escrow refers to the safeguarding of those data recovery keys. In this paper random key distribution in CP-ABE is explained and simulated to secure the confidential data. The definitive approach CP-ABE provides the addition of access policies and its updates. It has been demonstrated how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
Keywords: Access Control, Attribute Based Encryption (ABE), Disruption-Tolerant Networks (DTN), multiauthority, secure data retrieval.
Abstract
Efficient Message Transfer Using Self Adaptive on Demand Geographic Reliable Routing Algorithm for Mobile AD Hoc Network
Devan.C, Raja.J
DOI: 10.17148/IJARCCE.2015.43143
Abstract: It has been a big challenge to develop a routing protocol that can meet different application needs and optimize routing paths according to the topology changes in mobile ad hoc networks. Basing their forwarding decisions only on local topology, geographic routing protocols have drawn a lot of attentions in recent years. However, there is a lack of holistic design for geographic routing to be more efficient and robust in a dynamic environment. Inaccurate local and destination position information can lead to inefficient geographic forwarding and even routing failure. The use of proactive fixed-interval beaconing to distribute local positions introduces high overhead when there is no traffic and cannot capture the topology changes under high mobility. It is also difficult to preset protocol parameters correctly to fit in different environments. In this work, we propose two self-adaptive on-demand geographic routing schemes which build efficient paths based on the need of user applications and adapt to various scenarios to provide efficient and reliable routing. To alleviate the impact due to inaccurate local topology knowledge, the topology information is updated at a node in a timely manner according to network dynamics and traffic demand. On-demand routing mechanism in both protocols reduces control overhead compared to the proactive schemes which are normally adopted in current geographic routing protocols. Additionally, our route optimization scheme adapts the routing path according to both topology changes and actual data traffic requirements. Furthermore, adaptive parameter setting scheme is introduced to allow each node to determine and adjust the protocol parameter values independently according to different network environments, data traffic conditions, and node�s own conditions. Our simulation studies demonstrate that the proposed routing protocols are more robust and outperform the existing geographic routing protocol and conventional on-demand routing protocols under various conditions including different mobilities, node densities, traffic loads, and destination position inaccuracies. Specifically, the proposed protocols could reduce the packet delivery latency up to 80 percent as compared to GPSR at high mobility. Both routing protocols could achieve about 98 percent delivery ratios, avoid incurring unnecessary control overhead, have very low forwarding overhead and transmission delay in all test scenarios.
Keywords: MANET, LAR, DREAM,SOGR-GR
Abstract
Brain Tumor Detection By Various Image Segmentation Techniques With Introducation To Non Negative Matrix Factorization
Sahil J Prajapati, Kalpesh R Jadhav
DOI: 10.17148/IJARCCE.2015.43144
No abstract available.
Abstract
Fault Node Recovery Algorithm for a Wireless Sensor Network
Mulla Imroj A, Shaikh Tareque A, Diware Ajinkya G, Prof.Kadam Vikas
DOI: 10.17148/IJARCCE.2015.43145
Abstract: This project proposes a Distributed Dynamic Diffusion Based Algorithm [DDBA] to enhance the life time of a wireless sensor network [WSN] when some of the sensor nodes stop their working. This proposed algorithm is based on concurrent working of genetic algorithm [GA] and grade diffusion [GD] algorithm. This algorithm will increase the number of active nodes by reducing the rate of data loss and rate of energy consumption. The grade diffusion algorithm will generate the neighbor nodes, grade values, routing table and payload value for each sensor node. The genetic algorithm will search for the non-functioning sensor nodes and it will replace the non-functioning sensor nodes by selected functional nodes in the network. The algorithm is based on the battery levels, location and load on the node, and its goal is to divide the power consumption within the network so that the majority of the nodes consume their power supply at relatively the same rate regardless of their exact location. This leads to maximization in terms of system maintenance, such as replacement of the batteries all at once than doing it one by one, and maximizing the overall system performance by allowing the network to function at 100% capacity throughout most of its lifetime instead of having a steadily decreasing node population. The system distributes the lifetime and load on the network better than the previous approach.
Keywords: Genetic Algorithm, Grade Diffusion (GD) Algorithm, Wireless Sensor Networks (WSN).
Abstract
AN EFFECTIVE METHOD OF TIME REQUIRED TO COMPROMISE A COMPUTER SYSTEM
V.Srimathi, R.Vishali, S. Brintha Rajakumari
DOI: 10.17148/IJARCCE.2015.43146
Abstract: A cyber intrusion is a frequent assumption in the domain of cyber security and it follows the properties of a Poisson process. By the Poisson distribution the intrusion is well modeled and this process requires a high rate of time. This was also used with Pareto distribution of intrusion so that the rate of time required is slightly decreases with a better performance. Now we are used the chaos algorithm to determine the Time Taken to Compromise (TTC) by using this algorithm the time used for the performing a task in highly decreases. It shows the assumption of the Poisson process model might be suboptimal. The algorithm suggests that time to compromise decreases along the number of instruction of a system regarding this property. This paper clearly explains about the TTC by chaos algorithm.
Keywords: Invasive Software, Network Management, Risk Management.
Abstract
Data Mining Techniques For Diagnosis And Prognosis Of Cancer
Jaimini Majali, Rishikesh Niranjan, Vinamra Phatak, Omkar Tadakhe
DOI: 10.17148/IJARCCE.2015.43147
Abstract: In this paper we are using data mining techniques for diagnosis and prognosis of cancer. Cancer is the most important cause of death for both men and women. The early detection of cancer can be helpful in curing the disease completely. So the requirement of techniques for the detection of cancer in early stage is increasing. Breast cancer is one of the leading cancers for women in developed countries including India. It is the second most common cause of cancer death in women. The high incidence of breast cancer in women has increased significantly in the last years. The malignant tumor develops when cells in the breast tissue divide and grow without the normal controls on cell death and cell division. Hence, cancer on breast tissue is called breast cancer. Worldwide, it is the most common form of cancer in females that is affecting approximately 10% of all women at some stage of their life. With early diagnosis, 97% of women survive for 5 years or more years. In this paper we present a system for diagnosis and prognosis of cancer using Classification and Association approach in Data Mining. We are using FP algorithm in Association Rule Mining (ARM) to conclude the patterns frequently found in benign and malignant patients. We are also using Decision Tree algorithm under classification to predict the possibility of cancer in context to age.
Keywords: Classification, Association, Frequent Pattern growth, Decision tree, Breast cancer, benign, malignant.
Abstract
Face and Foreground and Background Detection Estimation Using Adaptive Based Algorithm in Real Time Video’s
Annapurna, Uma Gayathri, Dr. Sivabalakrishnan
DOI: 10.17148/IJARCCE.2015.43148
Abstract: This paper presents near to estimate the background and foreground detection. In moving objects victimization mobile camera�s to notice the human behavior or notice the external body part. In real time mobile camera�s it's tough to implement. It�s each applicable to static and dynamic background image frames of real time video victimization mobile camera. It�s supported video closed-circuit television, a true time mobile camera is employed in dynamic and wider manager vary. The advantage is while not previous data of camera motion it estimate the background and notice the foreground, hue channel information and finding occlusion within the video. Rather than victimization balloting primarily {based} rule accommodative based rule is employed. It brings home the bacon the information measure utilization and potency.
Keywords: Background estimation, foreground detection, hue, occlusion, real time video using mobile camera
Abstract
Fingerprint Based Attendance System
Karthik Krishnamurthi, S. Irudaya Mary, B. N. Sumalatha, Adler Pereira
DOI: 10.17148/IJARCCE.2015.43149
Abstract: The term 'biometrics' refers to a measurable characteristic that is unique to an individual such as fingerprints, facial structure, the iris or a person's voice. This paper presents a fingerprint based biometric system that records the attendance of a person by using a hand held fingerprint sensor. The experimental results suggest that many fraudulent issues can be overcome using the fingerprint based attendance system and improves the reliability of the attendance records.
Keywords: Biometric, Fingerprint, Attendance, Optical sensor, Arduino.
Abstract
Intelligent Drip Irrigation and Animals Entrance Avoiding System Using Wireless Sensor Network with Renewable Sources
M.Dananandhini, R.Murugasami
DOI: 10.17148/IJARCCE.2015.43150
Abstract: Agriculture uses 85% of available freshwater resources worldwide, and this percentage will continue to be dominant in water consumption because of population growth and increased food demand.. There are many systems to attain water savings in various crops, from basic ones to more technologically advanced ones. In existing system, plant water status was monitored and irrigation scheduled based on canopy temperature distribution of the plant, which was acquired with thermal imaging. In addition, other systems have been developed to schedule irrigation of crops and optimize water use by means of a crop water stress index they main problem in this due to fuzzy logic optimization mathematical calculation is to become difficult and it is not having animal entry avoidance.To overcome the mentioned problems, system is atomized using soil moisture, temperature ,humidity and animal entrance to the farm can be predicted to through PIR and sound sensor they sensors parameters send through WSN and monitoring system is provided on the internet web page. Notification also given to the mobile phone. This system is fully efficient automation for irrigation through photovoltaic cells. The simulation of this project will be carried out by using MPLAB IDE and PROTEUS. To verify the functionality and monitor the soil, temperature humidity and PIR sensor levels PROTEUS tool is used. The system design is implemented in Embedded C language.
Keywords: PIR, MPLAB IDE, PROTEUS.
Abstract
Traffic and Weather Monitoring System Using Wireless Sensor Networks
Dinesh Kulkarni, Sohail Shaikh, Amol Shirsath, Tejaswini Kadam
DOI: 10.17148/IJARCCE.2015.43151
Abstract: Extreme increment of Vehicular traffic around the world, especially in urban areas has led to many disastrous situations, managing such a massive amount of traffic is becoming difficult. To overcome this difficulty new traffic and weather forecast sensing devices based on wireless sensing technologies are to be designed. This technology can monitor traffic and weather parameters such as traffic flow, accidents, rainfall and humidity, smoke on road systems in real-time. User can access this data provided by the data collector devices using a android application.
Keywords: Traffic monitoring, WSN, Weather monitoring.
Abstract
Deportation of Market Manipulation using ADS
Vaishali Ingale, Mohnish Chaudhary, Rashmi Sharma , Ravinder Kumar, Vaishnavi Pimpalnerkar
DOI: 10.17148/IJARCCE.2015.43152
Abstract: Market manipulation remains the biggest concern of clients in today�s securities market, despite fast and strict responses from regulators and exchanges to market participants that pursue such practices. The existing methods in the industry for detecting fraudulent activities in securities market rely heavily on a set of rules based on expert knowledge. In this paper we use authenticated data structure(ADS) to ensure integrity of data. By use of authenticated data structures, we can prevent this market manipulation done on the cloud in the form of stock bashing, pump and dump and runs etc. Solution to prevent clients buyers from this fraud or false information is that the server need to give a digest , proof of the information along with query answer to the client. And the client on the other hand can verify the information to be legitimate or not by the help of query, digest, proof, public key.
Keywords: Market manipulation, ADS, Cloud, Client.
Abstract
ATTACKS and THEIR EFFECT on SECURITY of DATA in CLOUD COMPUTING
Priyanka Jairath, Rajneesh Talwar
DOI: 10.17148/IJARCCE.2015.43153
Abstract: Cloud computing has become widespread in recent years because of the value and speed. However Security challenges are still among the most important obstacles as attacks are a part of each net user�s life. This paper explores the identification of Dos and DDos attacks by victimisation CUSUM algorithmic rule. DoS attacks are a category of attacks initiated by individual or cluster of people exploiting aspects of the web Protocol to deny alternative users from legitimate access to systems and knowledge. DDoS on the opposite hand may be a combination of DoS attacks staged or disbursed collectively from varied hosts to penalise the target host from any serving its perform DDoS is term coined once the supply of the attack isn't returning from one supply, however multiple sources. Consistent with the applied approach, Black and White List is formed to spot the attacker and legitimate users supported their weights. To validate our methodology, after we notice the attacker or legitimate users, then we have a tendency to apply CUSUM algorithmic rule to spot the sort of attack that's DOS & DDOS attack and empirical results show the sort of attack.
Keywords: Cloud Computing, Attacks, Detection, Dos, DDos, CUSUM Algorithm
