VOLUME 4, ISSUE 5, MAY 2015
Role of Information Systems in KSA Small and Medium Enterprises (SMEs)
Aasim Zafar, Ahood I. Almaleh, Sabah Alshahri , Sahar S. Alqahtani, Nourah D. Alqahtani
A Cryptographically Secure Multi-stage Pseudo-random Number Generator
Adi A. Maaita, Hamza A. A. Al_Sewadi, Abdulameer K. Husain, Osama Al-Haj Hassan
Computers in Catering: Digital Dining
Madhvi Daniel, Vaibhav J. Yafat
A Survey on Blood Vessel Segmentation and Optic Disc Segmentation of Retinal Images
Mr. Sangmesh Biradar, Prof. A.S.Jadhav
by PriceMinus”>Comparative Study of DTN Routing Protocols
Biren Patel, Dr. Vijay Chavda
A Study of Different Types of Voltage & by PriceMinus”> Current Sense Amplifiers used in SRAM
Meenu Rani Garg, Anu Tonk
A Review towards Single Electron Transistor (SET)
Shilpa Goyal, Anu Tonk
A Printed Half Circular Stepped Triangular Monopole Antenna for UWB Systems
Navtej Singh, Sukhwinder Kumar
Cloud Based Authorization Model Using Two Layer Encryption of Data
V.Lavanya, S.Jayakumar
Emotion Recognition Using EEG Signals
Shrutika Lokannavar, Prashant Lahane, Apurva Gangurde, Pooja Chidre
Grid computing based RSA security in Telemedicine Centre using Computer Communication Network
S.Saravanan, V.Saranya, J.Suganthi, B.Abinaya, A. Anbarasi, D.Vinoth
A Detail Qualitative Survey on Attacks in Mobile Ad-hoc Networks (MANET)
Himanshi, Mintu Singh
Maintainability Measurement Model for Object-Oriented Design
Rajendra Kumar, Dr.Namrata Dhanda
A Review on Blind Channel Estimation in MIMO OFDM
Megha Kimothi, Vivek Kumar Gupta
Exemplar Based Super-Resolution Technique for Image Inpainting: A Review
Abhijit L. Rakshase, S. N. Gite
Linear and Non-Linear Decoding Techniques in Multi-User MIMO Systems: A Review
Er. Navjot Singh, Er. Vinod Kumar
A Diabetic Retinopathy Detection Using Fuzzy Local Information C-Mean and Kernel Metric with non-Euclidean distant metric
Archana Dubey, Prof. Hardik Mewada
A Secure Routing Protocol for Vehicular Ad Hoc Network: A Survey
Mukesh Tripathi, Sandeep Rai
Improving the performance of Google file system to support Big Data
Ms. Pooja Mittal, Munesh Kataria
Message Transmission for Cluster Based Wireless Sensor Networks Using Multi-Level Encryption
J.Lavanya, D.Venkatesh, A. Chandra Sekhar
Facial Expression Recognition Dealing With Different Expression Variations
Abhijeet S. Tayde, Prof. A. S. Deshpande
Precognition of Students Academic Failure Using Data Mining Techniques
Sadaf Fatima Salim Attar, Prof. Y. C. Kulkarni
Classification of Dermatology Diseases through Bayes net and Best First Search
MadhuraRambhajani, Wyomesh Deepanker, Neelam Pathak
A High Speed Binary Floating Point Multiplier using Dadda Algorithm
Prakhi Agrawal, Prof. Shravan Sable, Dr. Rita Jain
Smartphone Based Driver Aided System to Reduce Accidents Using OpenCV
Zope Chaitali K, Y.C. Kulkarni
Indoor localization and Navigation system using Smartphone
Shweta Shandilya, S.R.Idate
Passive Sensing for User’s Activity Inference by Context Aware Computing using Smartphone
Monika Sharma, S. R. Idate
Circular Patch Antenna with Defected Ground and Parasitic Layer for Wide Bandwidth
Veeresh G V, Rajendra R Patil
FPGA Based Multifunction Wireless Medical Surveillance System
Deepa D.Waingade, Meena S.Chavan
Future Aspects Based Survey of Electronic Flash Memory and Magnetic Memory
Sachin Tyagi, Anurag Chandna, Mamtesh, Manish Kumar
Intelligent Combat Robot
Hemanth B T, Kamalanathan B, Ganapati H L, Ananda H B, Mrs. Vaddi Naga Padma Prasuna
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Health Care Systems
Ankitha.N.Kulkarni, Ashwini.S, Vidhyashree.S, Chandrashekar.K.T
STEALTH- A Surveillance Robot
Nitish Saxena, Kamlesh Narsinghani, Nikhil Chalotra
System Identification and Creep Compensation of Nanopositioning System Using Proportional and Double Integral Action
Sheilza Jain, Sakshi Kalra, Jitendrakumar Goyal
Secured Color Image Compression and Efficient Reconstruction Using Arnold Transform with Chaos Encoding Technique
D. Venugopal, M.Gunasekaran, A.Sivanatharaja
Offline character recognition for printed text in Devanagari using Neural Network and Genetic Algorithm
Prof. Mukund R. Joshi, Miss. Vrushali V. Sabale
Smart Disease Surveillance Based on Internet of Things (IoT)
Ashly Mathew, Farha Amreen S.A, Pooja H.N, Aakriti Verma
Analysis of Research Data using MapReduce Word Count Algorithm
Manisha Sahane, Sanjay Sirsat, Razaullah Khan
Grade Processing System Using Visual Basic 6.0
Kansham Angphun Maring, Ningthoujam Sanjit, Kansham Modar Maring
Android Security: An Overview of Risks and Security Measures
A.J.Singh, Akshay Bhardwaj
Implementation of Image Processing on Raspberry Pi
K.S.Shilpashree, Lokesha.H, Hadimani Shivkumar
Data sharing with Security and Efficiency using Attribute Based System
K. Dhana Lakshmi, Hussain Syed, M.Bharat
Search Engines that are used for multiple purpose search
Abira Dasgupta
A Novel Self-Organizing Mechanism for Load Balancing & Handover in Network
Manjunath Hanchinal, Ziaur Rahman
Routing Protocol for Efficient and Secure Data Transmission in Cloud Environment
Lokesh. Patil, Suresh. Patel
A Review on Swarm Robots
Rachna Sandhu, O. P. Sharma, Dr. Vivek Sharma
Wireless Optical Communication System and its Vital Components
Mr. Puneet Sehgal, Ms. Himani Dua
Design of Configuration Scheme for Triple Play QOS in 10Gigabit Ethernet based Ship Data Network
Kavya.K, Suma
Secured Load Rebalancing In Cloud
Bhavya.G, Chaitra.B.N, Chaitra.G, Shruthi.C
Intrusion detection using classification via clustering
Divya D. Nimbalkar, Shubha Puthran
SLA-aware and Cost-aware Provisioning and Scheduling of Cloud Resources across Multiple Data centres
Ayesha S, Jayalakshmi D S
Optimization of bow-tie patch antenna using various soft computation techniques
Ayesha S, Jayalakshmi D S
A Quality Public Sensing Framework for Heterogeneous IoT
Ashwini M G, Prof. B Maheshwarappa
Image Authentication by Detecting Demosaicing
Mr. Vinayak K. Shingote, Prof. Ruhi Kabara
Visions for a Molecular Future
Ruhee, Oshin Sangha, Deep Kamal Kaur Randhawa
A Media Player which operates depending on Human Emotions
Harshala Chaudhari, Amrapali Waghmare, Reshma Ganjewar, Dr. Abhijit Banubakode
Segmentation of Images using Density-Based Algorithms
Atrayee Dhua, Debjani Nath Sarma, Sneha Singh, Bijoyeta Roy
Design of PID Controller via Novel Model Order Reduction Technique
M. Sudheer Kumar, S. Harish, A. Dhanamjay Apparao
MIMO Technology using V-BLAST Equalization Techniques – Literature Survey
Mohit Thakur, Raspinderjit Kaur Kahlon, Harjit singh
Electrical Characteristics of Carbon Nanotubes
Ruhee, Oshin Sangha, Dr. Deep Kamal Kaur Randhawa
An Efficient Lossless Image Compression Algorithm Using Lifting-DWT And Laplacian Pyramid
Pooja B.Desai, Shivaputra
Steadfast Energy Eifficient Clustering Protocol in Wireless Sensor Networks
SelvaKani P, Krishna Ganesh S.M
DWT Based Feature Extraction for Iris Recognition
Harsha R, Dr. K. Ramesha
Review on Secure Data Sharing for Frequently Changing Groups in Cloud
Pooja R.Bangad, Bapusaheb B.Bhusare
Impact of teaching Electronics practical by E-learning based approach on Students
Mr. Puneet Sehgal, Ms. Himani Dua
Design and Implementation of UART
Miss. Ruchika Longadge, Prof. Mithilesh Mahindra, Prof. Vidya Dahake
Stock Market Index Prediction by Hybrid Neuro-Genetic Data Mining Technique
Ganesh V. Kumbhar, Rajesh V. Argiddi
Performance Comparison of Face Recognition Algorithm Based on Accuracy Rate
Rashmi Ravat, Namrata Dhanda
Improving the Network Lifetime in Wireless Sensor Networks Using Fuzzy Based Centrality Algorithm
Shanthi.D.L, Archana.R, Harshitha.M, Niveditha.M.N
Understanding Active Shape Model
Arvind B, Kiran Noolvi, Nithin Kumar H M, Shreyas K Bhat, Prashanth A Athavale
Reliable and Enhanced Energy-Efficient Routing Protocol for Wireless Sensor Networks
G.Premalatha, T.K.P.Rajagopal
Different Technologies for Improving the Performance of Hadoop
Mr. Yogesh Gupta, Mr. Satish Patil, Mr. Omkar Ghumatkar
A Review on Multi-Biometric Cryptosystem for Information Security
Bharti Kashyap, K. J. Satao
Improved Security Using Captcha as Graphical Password
Rashmi B J, Prof. B Maheshwarappa
An Effectual Approach for Facial Expression Recognition Using Adaptive Neuro Fuzzy Classifier
Swati Mishra, Avinash Dhole
Cluster Head Selection using Honey Bee Optimization in Wireless Sensor Network
Kiranpreet Kaur, Harjit Singh
ATM PIN Transfer Using Visual Cryptography (Implementation)
Ms. Swati Shete, Prof. Y. C. Kulkarni
Effect of Sea Water Conductivity on GSM Signal Propagation in Riverine Area of Igbokoda, Ondo State, Nigeria
Olaoye V. Ilelaboye, Yekeen O. Olasoji
Malware detection using data mining techniques
Abhay pratap singh, Dr.S.S handa
Multi-agent model for scheduling of activities by applying shortest processing time (SPT) rule
R.Y.Youssef, M.I.Abdalla, M.H.Ghanim
Review on classification of different VANET Protocols based on routing information
Ghanishtha Narang, Yogesh Juneja
A Survey of Energy Optimization Techniques In Wireless Sensor Networks
Er. Parminder Kaur, Er. Vinod Kumar
Color Code Based Authentication And Encryption
Rajesh N, Sushmashree S, Varshini V, Bhavani N B, Pradeep D
Solar powered robotic vehicle
Snehal S. Warekar, Prof. B. T. Salokhe
Dynamic Approach for Real time and Non-Real time Packet Scheduling in WSNs
Pavithra J, Vishwanath V Koli, Varalakshmi B D
E-Health Care Solutions Using Anonymization
Chaitra.S, Narasimha Murthy M S
Multichannel Cooperative Sensing in Cognitive Radio: A literature Review
Hemlata Patil, Dr A.J.Patil, Dr S.G.Bhirud
Translating Indian Sign Language to text and voice messages using flex sensors
Sachin Bhat, Amruthesh M, Ashik, Chidanand Das, Sujith
Biometric System Based on Off-Line Signatures
Bhanu Priya Taneja, Navdeep Kaur
Design & Implementation of Efficient Periodicity Mining Technique for Time Series Data
Prof. Saneep Khanna, Mr. Swapnil Kasurkar
Modified Filter Bank for Digital Down Converter of Pulse Radar Receiver
Ganesh P. Sonar, Prof. R.A.Patil, Mr J.S. Pillai
Implementation of Artificial Neural Network Controlled Shunt Active Power Filter for Current Harmonics Compensation
B.Mangaiyarkarasi, Mr. P M Balasubramaniam
Detecting Spoofing Attack by Source using Path Information
Jyothi, Mr. Pavan Kumar V
Clustered Organization for Manets with an Approach to Prevent Black Hole Attack
Shilpa Gopinath, Arun KumarG
Fingerprint Verification Techniques over Cloud Services
Fazal Noor, Majed Alhaisoni
A Review on Handover Processes in IPv6 Mobility Management Protocols
Ritika, Dinesh Kumar Verma
Bend loss in large core multimode optical fiber beam delivery system
Prof.N.Sangeetha, Santhiya.J, Sofia.M
Serial Adder using Reversible Gates
N.Srinivasa Rao, P.Satyanarayana
SVPWM controller for three phase UPS system operating under highly non linear load
Prasanna Sagdeo, Vipinkumar Meshram
A Voltage mode biquad with lowpass, bandpass and notch outputs using Voltage Differencing Current Conveyor
Mayank Rawat, Dr. Malti Bansal
Cybercrimes, security and challenges
Tahir Hussain Bhat, Afaq Alam Khan
Ultra Wideband Monocycle pulse generation using SRD and Coupled line band pass filter with reduced ringing level
Amol M Sapkal, Dr.Nisha Sarwade, Bhaskar Shelkod
A Study on Security Attacks And Key solutions for MANETs by Onion Routing
PRIYANKA M S, Asst. Prof. SRIVINAY
Irrigation System Using a Wireless Sensor Network and GPRS
Suraj S.Avatade, Prof. S. P. Dhanure
Cost-Effective Privacy Preserving Of Intermediate Data Sets in Cloud by Privacy Leakage Upper Bound Constraint-Based Approach
Abhishek R. Ladole, Prof. Amit M. Sahu
NC-CLOUD: A NETWORK-CODING BASED DISRTIBUTED STORAGE SYSTEM IN A MULTI-CLOUD
Dr. Mohammed Abdul Waheed, Sushmita BN
Power Saving in Multimedia Streaming Services in Cloud Computing
Sanjay J.Misal, Dr.S. N. Mali
Modified Booth Recoder for Efficient Add-Multiply Operator
Aparna V. Kale, Prof. M. D. Patil
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud
Ranjana Nadagoudar, Radhika
Background Subtraction for Effective Object Detection and its Parametric Evaluation
Siddhartha A. Meshram, Mr. Vishal Raskar
A QOS Based Routing in Mobile Ad-Hoc Networks
Ronal Benitto Dhas .A, Ruby.D
A Survey of Black Hole Detection Techniques in WSNs
Sandeep Kumar, Dr.Suman Sangwan
Analysis of Threshold Voltage in Nano-Channel Length MOSFETs
Sachin Tyagi, Sunil Kumar, Kumar Abhishek
Study of factors effecting to getting internship to Second/Third year students: A data mining Approach
Ashish Pant, DevendraKushwaha, JitendraMaurya
An Approach for Restoring Occluded Images for Face-Recognition
Sandesh V Khamele, Shyamal G Mundada
A Proposed Approach to Classification and Novel Class Detection in Data Streams
Ms. Rimjhim Singh, Manoj. B. Chandak
A Sepic Converter with Linear Transformer and Ripple Free Output for Wide Range Input Applications
Kirthi.C.S, Karthik.Sitapati
SWARRECOG- THE EUPHONY AIDE
Shreyash Bardia, Krishnakumar Natthani, Sachin Rawool and Sakshi Kukreja
Genetic Algorithm based Optimal Allocation of Distributed Generators for Maximizing the Benefits
Madhuri Hombal, Rekha C M
Secure Interoperation Model for Different User Authentication System using Multi Level Security (MLS)
Muthukumaran T
Software Improvement Model for small scale IT Industry
T.B. Patil, S.D. Joshi
A Survey and Comparison of Various Cloud Simulators Available for Cloud Environment
Ramandeep Kaur, Navtej Singh Ghumman
Performance Analysis of 16 × 2.5Gb/s FSO System for the Most Critical Weather Conditions
Aneet Kaur, Anu Sheetal
Weapons and Explosives Information Tracking and Alerting System: A Real-Time Approach
Moses O. Onyesolu, Macdonald N. Onyeizu, Celestine. O. Uwa, Charles. O. Ugwunna
A Review on Optical Fiber Long Period Grating, its applications in Optical Communication System
Mr.Puneet Sehgal, Ms Himani Dua
An Efficient Brain Image Classification Using Probabilistic Neural Network and Tumor Detection Using Image Processing
Kshitija V. Shingare, N. D. Pergad
Channel Estimation Techniques in MIMO-OFDM Systems – Review Article
Raspinderjit Kaur Kahlon, Gurpreet Singh Walia, Anu Sheetal
Optimization of the Digital Radio Mondiale Receiver Software Implementation to Support Digital Radio Mondiale Plus on DSP
Bharatha H P, P Nagaraju
I2MMS: An Interactive Multi Modal Visual Search Technique
Yojana S. Pawale, P. R. Devale
A Survey on Context-Aware Middleware
Chitra G. Sahu, Dr. D. S. Adane
Fg Captcha Advanced
Rohith S Aggithaya, Samraddha, Rakshith M, Karthik Kumar M B
Performance Evaluation of Steganography and AES encryption based on different formats of the Image.
Farhan R. Patel, Dr. A. N. Cheeran
Automotive Crash Insight using AMR Sensor System
Sreevishakh. K.P, Prof. S.P. Dhanure
Efficient Framework of e-Government for Mining Knowledge from Massive Grievance Redressal Data
Sangeetha G, Manjunatha Rao . L
Cloud Based Solutions to Safeguard Data Transfer
Uma I Guranagoudr, Kumar H R, VivekBongale
Network Reconfiguration For Loss Reduction Of A Radial Distribution System
Laxmi. M. Kottal, Radhika priyadarshini, Dr R Prakash
Evaluating TORA, GRP and OLSR under Voice-IP Telephony Traffic Using OPNET
Gurjeet Singh, Gurbhej Singh
Simulation and Performance Evaluation of Energy-Efficient Routing Protocol in self-organised MANET’s
P.P.Kotekar, Prof. D.G.Chougule
Achieving Security and Data Privacy for VANET using X.509 Certificates
Sowmyashree H, Sharmila K.P
Hybridized Approach for Lossless Image Compression
Malwinder Kaur, Navdeep Kaur
Design, development and Performance Analysis Of 8-point FFT chip using VHDL for OFDM Applications
Amit Saini, Sanjay Singh, Vijaya Bhandari
Engineering Admission Counseling
Akshay Mantri, Naina SRohra, Naman Verma, Nikita Gaikwad, Prof. Sachin Godse
Modelling of Fuzzy Based Handoff Decision Controller
Honey Soni, Vaishali Sood, Anu Sheetal
Study of Various Components for Detection of Various Parameters in Electrical Generator
Yeshudas Muttu
Technical View of the Super Resolution using Registration, Interpolation and Restoration
Kritika, Vedant Rastogi
High efficiency switched boost inverter within tegrated closed loop control for photovoltaic based applications
Sushma H R, Harsha Anantwar
Comparative Analysis of HTK and Sphinx in Vietnamese Speech Recognition
Hoa Minh Dinhz, Tan Duy Nguyen, Thanh Duc Pham
Twitter Event Summarization Using Phrase Reinforcement Algorithm and NLP Features
Mr. Ganesh Mane, Mrs. Anita Kulkarni
Survey on Optimal Schedulability Test for Hard Real Time Scheduling
Nitin C. Patil and Prof. S. P. Dhanure
Performance Evaluation of NTA Benin Analogue Transmitter in Edo State Nigeria
Anamonye U.G, Otasowie P.O
Abstract
Performance Analysis of Interference-Aware Routing Protocol for Mobile Ad hoc Networks
Phu Hung Le
DOI: 10.17148/IJARCCE.2015.4501
Abstract: In Mobile Ad hoc NETwork (MANET), interference is one of the important problems in research. Interference reduces significantly the network performance such as data loss, conflict, and retransmission and so on.In this paper, we analyze performance of our Interference-Aware Routing Protocol (IA-OLSR) by comparing to the famous protocol OLSR in terms packet delivery fraction, delay and routing overhead when RTS/CTS (Request to Send / Clear to Send) turns on or turns off. Simulation results show that the IA-OLSR� packet delivery fraction significantly outperforms that of the OLSR. Our results also show that IA-OLSR� delay and routing overhead are lower than the corresponding results from the OLSR.
Keywords: Mobile Ad Hoc Networks; Routing Protocol; OLSR; Interference.
Abstract
Role of Information Systems in KSA Small and Medium Enterprises (SMEs)
Aasim Zafar, Ahood I. Almaleh, Sabah Alshahri , Sahar S. Alqahtani, Nourah D. Alqahtani
DOI: 10.17148/IJARCCE.2015.4502
Abstract: Information has become a basic resource in economic systems, especially in enterprises. In order to maintain enterprises to continue and survive, it is necessary to collect and store everything that helps them serve their activity, and from here, enterprises need to work on collecting, processing, storing and transmitting such information through information systems. In light of globalization, the world has become deeply sophisticated and fast-paced economically speaking. As a result of the depth of this development and the rapid changes in the field of information technology, the world has entered the era of information society. In this era, KSA Small and Medium Enterprises have become a common factor in the growth of the KSA economy, especially when implementing and applying information system methods in enterprises. This paper aims to discuss the growth of KSA SMEs in recent years and explore the role of information systems in their prosperity.
Keywords: SMEs, KSA, Information Systems, KSA economy, SMEs.
Abstract
A Cryptographically Secure Multi-stage Pseudo-random Number Generator
Adi A. Maaita, Hamza A. A. Al_Sewadi, Abdulameer K. Husain, Osama Al-Haj Hassan
DOI: 10.17148/IJARCCE.2015.4503
Abstract: Random and Pseudo-random number generators are of great interest and are still sought for the benefit of stronger keys for cryptosystems. A new cryptographically secure algorithm for pseudo-random number generation is proposed. The proposed algorithm is characterized by a multi-stage modular design. It combines various processes such as bit swapping, modular operations and secret splitting techniques in order to achieve adequate confusion and diffusion. The obtained results through applying the National Institute of Technology randomness tests clearly show that the algorithm is capable of producing high quality cryptographically secure pseudo-random numbers.
Keywords: Computer security, Cryptosystems, Key distribution, Modular design, Pseudo-random numbers generators, Security agreement
Abstract
Computers in Catering: Digital Dining
Madhvi Daniel, Vaibhav J. Yafat
DOI: 10.17148/IJARCCE.2015.4504
Abstract: In earlier days, food ordering was a completely manual process where a waiter used to note down orders from the customers using pen and paper, take the orders to the kitchen, bring the food and make the bill. With the advancement in the computer and communication technology, various systems were launched in market for the purpose of automation of the food ordering system. Some of the existing systems are: Q-order, The PDA (Personal Digital Assistant) based system & AOS-RTF (Automated Food Ordering System with Real Time Customer Feedback) System. Android smart phones attract both the general and commercial (i.e. Business) users. Hence, considering the promising future of Android market, it is beneficial and worth to write applications for android that target masses of people. It will also provide quality of service to the customer. It is a revolutionary food ordering system for the restaurant sector, made by combining the Android and Wireless technology.
Keywords: Computers, catering, Food establishment, Q-order, PDA, AOS-RTF
Abstract
A Survey on Blood Vessel Segmentation and Optic Disc Segmentation of Retinal Images
Mr. Sangmesh Biradar, Prof. A.S.Jadhav
DOI: 10.17148/IJARCCE.2015.4505
Abstract: Segmentation is the process of partitioning an image into set of components. Segmentation of blood vessel and optic disc is necessary for early detection of affected area in the retina. The eye is very unique part in human body where the vascular conditions are directly observed in vivo. The different approaches have been developed for blood vessel and optic disc detection; few of the approaches are discussed in this paper. The blood vessel identification is performed on the basis of blood vessel characteristics such as blood vessel's orientation, cross-sectional area, surface shapes, and abnormal regions volumes. The quantitative analysis of retinal images is of increasing importance in the diagnosis of the blood vessel abnormalities. An automated method for identification of optic disc has two methodologies location methodology and boundary segmentationmethodology
Keywords: Blood vessel, optic disc, segmentation, identification, detection, orientation.
Abstract
by PriceMinus”>Comparative Study of DTN Routing Protocols
Biren Patel, Dr. Vijay Chavda
DOI: 10.17148/IJARCCE.2015.4506
Abstract: Delay-tolerant Networking (DTN) makes successful communication in sparse mobile ad-hoc networks and other challenged environments where there is no end to end path established unlike traditional networking. The performance and efficiency of routing protocols in DTN depends on various mobility models in which node travels and node characteristics. Through the evolution of various routing protocol in different scenario using simulation tool comparative study can be done. This paper focus on the existing routing protocols techniques and Comparative study of existing routing protocols of Delay-Tolerant Networks based upon the metrics like Delivery Ration and Overhead Ratio.
Keywords: Intermediant connectivity; Delay Tolerent Network; routing; DTN
Abstract
A Study of Different Types of Voltage & by PriceMinus”> Current Sense Amplifiers used in SRAM
Meenu Rani Garg, Anu Tonk
DOI: 10.17148/IJARCCE.2015.4507
Abstract: The paper aims to study different types of voltage and current sense amplifiers which are used to read SRAM memory data. Thereview discusses the working operation, advantages, and disadvantagesof various sense amplifiers. Method to decide feature size of different transistors in sense amplifiers has also been discussed. Thepaper focuses on various performance parameters which should be considered during designing of sense amplifiers.
Keywords: CMOS, SRAM,CTSA, Bit lines, Pre-charge circuit.
Abstract
A Review towards Single Electron Transistor (SET)
Shilpa Goyal, Anu Tonk
DOI: 10.17148/IJARCCE.2015.4508
Abstract: Single-electron transistor (SET) is a key element of current research area of nanotechnology. The aim of this paper is to discuss about the basic physics of nano electronic device �Single electron transistor [SET]� which is capable of controlling the transport of only one electron. The SET's physical size is quite small and its performance, such as ON-OFF current ratio, improves as its size is reduced. The SET is therefore thought to be a promising device for large-scale and low-power integrated circuits. In addition, its current characteristics are unique and much different from those of conventional transistors. The goal of this paper is to review in brief the basic physics of nano-electronic device single-electron Transistor [SET] as well as prospective applications.The most promising applications for SET's are charge-sensing applications.
Keywords: SET, structure of SET,Quantum Dot, coulomb blockade, coulomb staircase
Abstract
A Printed Half Circular Stepped Triangular Monopole Antenna for UWB Systems
Navtej Singh, Sukhwinder Kumar
DOI: 10.17148/IJARCCE.2015.4509
Abstract: This paper presents a study of a printed half circular with stepped triangular monopole antenna for UWB systems. Printed on a dielectric substrate and fed by a 50 ? microstrip line, the proposed antenna shows satisfactory radiation characteristics within the operating bandwidth of 9.7 GHz in the range of 2.8 GHz to 12.5 GHz for a return loss (S11) of less than -10 dB. Compared to the rectangular stepped configuration, the proposed antenna has larger bandwidth and better impedance matching. The designed antenna gives gain in the range of 2.8 dB to 5.3 dB over the bandwidth.
Keywords: Circular patch antenna, ultrawide band (UWB) antenna, microstrip feed line, partial ground plane.
Abstract
The Review of Virtualization in an Isolated Computer Environment
Sunanda
DOI: 10.17148/IJARCCE.2015.4510
Abstract: The concept of virtualization is expanding into various aspects especially in the field of IT. The networking is relying on the road map of virtualization. The movement of virtualization is originating in servers. The most profound impact on data-centre networks is based on virtualization of the servers. Virtualized servers will support the full array of business applications, multimedia applications, storage, and back-office services. This paper will discuss the role of virtualized architecture explaining the relevant security interior concepts to moderate the risks.
Keywords: Virtualization, VM (virtual Machines), Approaches, Security, Operating System (OS).
Abstract
Cloud Based Authorization Model Using Two Layer Encryption of Data
V.Lavanya, S.Jayakumar
DOI: 10.17148/IJARCCE.2015.4511
Abstract: Cloud computing provides a service based on internet for several shared resources and system software across various environment. The major advantages of storing applications and documents in public cloud are lower cost through use of shared computing resources and no upfront infrastructure costs. Security and privacy represent major concerns in the adoption of cloud technologies for data storage as the network are open to many other users. Thus encryption with a fine grained access control is inevitable to enforce security in clouds. Several techniques implementing attribute based encryption for fine grained access control have been proposed. Under such approaches, the encryption technique creates a little bit overhead to the data owner and also the key management overhead is a little bit high in terms of computational complexity. Our proposed approach addresses these requirements and reduces the lack in encryption technique, the overhead of the key management by using efficient algorithms and protocols in the cloud computing two layer encryption environment.
Keywords: Cloud computing, attribute-based encryption, decentralised dynamic broadcast encryption, access control, group key management, fine grained access
Abstract
Emotion Recognition Using EEG Signals
Shrutika Lokannavar, Prashant Lahane, Apurva Gangurde, Pooja Chidre
DOI: 10.17148/IJARCCE.2015.4512
Abstract: This paper introduces an emotion recognition system based on electroencephalogram (EEG) signals. EEG signals are classified into four emotional states happy, relax, sad and fear. We have used pre-processed dataset of EEG signals to build an emotion recognition system. To evaluate classification performance, Support Vector Machines is used and for feature extraction AR (Auto Regression) and FFT (Fast Fourier Transform) is used. This paper provides a methodology which is easy to understand and perceive emotion recognition process.
Keywords: EEG, FFT, AR, SVM
Abstract
Grid computing based RSA security in Telemedicine Centre using Computer Communication Network
S.Saravanan, V.Saranya, J.Suganthi, B.Abinaya, A. Anbarasi, D.Vinoth
DOI: 10.17148/IJARCCE.2015.4513
Abstract: HTTP is the communication protocol between the PCs and the canter of telemedicine server. Even if some form of encryption is used in transit, the medical data usually reside in an unencrypted format on the enrolled PC. This limits the nature of the problems that can be attempted over the public internet to those in which compromise of the data is not a pressing issue. Grid computing most simply stated is distributed computing taken to the emerging standardization for the flexible, secure coordinated resources sharing among dynamic collections of Telemedicine resources. Grid computing based RSA Security in Telemedicine canter is one of the most important issues facing encryption to need security the big data of patient details . In this paper explained the computing grid is Reliability and RSA Security in Grid computing support complexity management of Telemedicine center using computer communication network. The architecture of the RSA-Grid is presented and a prototype system has been built for further development of Grid-based telemedicine canter services for Emergency treatment with reliability and security assessment based on probabilistic techniques, which require high performance computing for big data of patient details.
Keywords: RSA Security, GridComputing, Computer Communication, Telemedicine
Abstract
A Detail Qualitative Survey on Attacks in Mobile Ad-hoc Networks (MANET)
Himanshi, Mintu Singh
DOI: 10.17148/IJARCCE.2015.4514
Abstract: Mobile ad hoc networks (MANET) has risen as a major next generation wireless networking technology. This network is a network of mobile nodes with dynamic structure. Here each node acts as a router for forwarding data to other nodes. Due its dynamic nature, security has become a primary concern to provide protected communication between different nodes in ad hoc networks. There are a number of challenges in security design as ad hoc network is a decentralized network. There are five layers in MANET and each of these layer is vulnerable to various attacks. In this paper we discuss about various attacks and their protection mechanisms.
Keywords: MANET
Abstract
Maintainability Measurement Model for Object-Oriented Design
Rajendra Kumar, Dr.Namrata Dhanda
DOI: 10.17148/IJARCCE.2015.4515
Abstract: Measuring maintainability near the beginning in the software development life cycle, particularly at design phase, may help the designers to integrate required improvement and corrections for improving maintainability of the developed software. This study developed a multivariate regression model �Maintainability Estimation Model for Object-Oriented design� at Design phase in software development process. Developed model measures the maintainability of object oriented design in respect of Extendibility and Flexibility. Though, in order to quantify object oriented design�s Extendibility and Flexibility the study required to develop two more models. These two models use design level object-oriented metrics, to quantify Extendibility and Flexibility of class diagram. Maintainability measurement in early stage of development cycle facilitates the designers to improve the maintainability of class diagram and consequently the maintainability of software. All the developed models have been empirically validated through proper statistical measures and contextual explanation has been drawn.
Keywords: Maintainability, Estimation, Metrics, Object Oriented Design.
Abstract
A Review on Blind Channel Estimation in MIMO OFDM
Megha Kimothi, Vivek Kumar Gupta
DOI: 10.17148/IJARCCE.2015.4516
Abstract: The main objective of this paper, is to review the work already done in the field of blind channel estimation in MIMO- OFDM system. From the higher order statistics to the second order statistics, from statistical model approach to deterministic approach, we outline basic ideas behind several new developments, identifiability conditions and the assumptions required by these approaches, and the algorithm specific characteristics and their performance. This review presents an introductory reference for this currently active research area.
Keywords: Blind channel identification, MIMO-OFDM, statistical approach and deterministic approach.
Abstract
Exemplar Based Super-Resolution Technique for Image Inpainting: A Review
Abhijit L. Rakshase, S. N. Gite
DOI: 10.17148/IJARCCE.2015.4517
Abstract: ImageInpainting is the process of reconstructing lost or deteriorated part of images based on thebackground information.This paper introduces a novel framework for exemplar-based inpainting. It consists in performing first the inpainting on a coarse version of the input image. A super-resolution algorithm is then used to recover details on the missing areas. The advantage of this approach is that it is easier to inpaint low-resolution pictures than high-resolution ones. The gain is both in terms of computational complexity and visual quality. However, to be less sensitive to the parameter setting of the inpainting method, the low-resolution input picture is inpainted several times with different configurations. Results are efficiently combined with loopy belief propagation and details are recovered by a single-image super-resolution algorithm. Experimental results in a context of image editing and texture synthesis demonstrate the effectiveness of the proposed method.
Keywords: Image inpainting, super resolution inpainting, Low-resolution, High Resolution, exemplar-based inpainting.
Abstract
Linear and Non-Linear Decoding Techniques in Multi-User MIMO Systems: A Review
Er. Navjot Singh, Er. Vinod Kumar
DOI: 10.17148/IJARCCE.2015.4518
Abstract: Multiple input multiple output (MIMO) supports greater data rate and higher reliability in wireless communication. MIMO technique uses the multiple antennas to achieve high transmission rate. The receiver end of the MIMO consists of linear and non-linear decoding techniques. In this paper we are discussing about the linear and non-linear decoding techniques used at the receiver. Zero forcing (ZF), Minimum mean Square error (MMSE), Maximum likelihood (ML), Sphere decoding (SD) are the methods used in wireless communication for reducing the complexity at the receiver.
Keywords: Multiple input multiple output, Zero forcing, Minimum mean square error, Maximum likelihood, Sphere decoding.
Abstract
Digital Vocalizer System for Speech and Hearing Impaired
Kiran R
DOI: 10.17148/IJARCCE.2015.4519
Abstract: Digital vocalizer is a social initiative project that aims to uplift people who are speech and hearing impaired, by facilitating them to have a better communication with the public. It is estimated that there are about 9.1 billion people in the world who are deaf and are have speech impairments. In their day to day life, they face a lot of problems whilst trying to communicate with society. Generally, the deaf and ones who have speech impairments use sign language for communication, but they find it difficult to communicate with others who do not understand sign language. Sign language relies on sign patterns, i.e. body language, orientation and movements of the arm and fingers etc. to convey information between people. This venture is conceptualized to address the need of developing an electronic device that can translate sign language into speech in order to facilitate easy communication between the dumb and deaf and the general public.
Keywords: Vocalizer, speech and hearing impaired, dumb and deaf.
Abstract
A Diabetic Retinopathy Detection Using Fuzzy Local Information C-Mean and Kernel Metric with non-Euclidean distant metric
Archana Dubey, Prof. Hardik Mewada
DOI: 10.17148/IJARCCE.2015.4520
Abstract: Image processing plays a main role in the detection of the any kind of disease into any part of the body in medical field. Nowadays, medical imaging for extracting the diseases directly into a computer is getting more wide. Likewise, in the proposed system the focus is on to the diabetic retinopathy disease which is caused into retina of eye and further leads into the poor vision/blindness. Here, the exudate eye disease is segmented from an image by using the segmentation method. For segmentation the most widely used fuzzy clustering method is proposed. Fuzzy local information c-mean algorithm is used with introducing a kernel metric. It is further modified by using non-Euclidean distance metric and the parameters are calculated for justifying the best detection result.
Keywords: Diabetic Retinopathy Retinal Image, Exudate Eye Disease, KWFLICM algorithm, non- Euclidean distance metric
Abstract
A Secure Routing Protocol for Vehicular Ad Hoc Network: A Survey
Mukesh Tripathi, Sandeep Rai
DOI: 10.17148/IJARCCE.2015.4521
Abstract: A vehicular Ad Hoc Network specially appointed system (VANET) utilizes as portable hubs in a MANET to make a versatile network. A VANET transforms each partaking nodes into a remote switch or hub, permitting nodes roughly 100 to 300 meters of one another to join and, thusly, make a system with a wide range. The requirement for vigorous VANET systems is firmly reliant on their security and protection characteristics, which will be examined in this paper. In this paper a different sorts of security issues furthermore difficulties of VANET been broke down and examined; we likewise examine a set of arrangements displayed to take care of these difficulties and issues. It turns into a key part of the adroit transport framework. A great deal of works has been carried out towards it yet security in VANET got less consideration. In this article, we have examined about the VANET and its specialized and security challenges.
Keywords: VANET, MANET, Security, ITS
Abstract
Improving the performance of Google file system to support Big Data
Ms. Pooja Mittal, Munesh Kataria
DOI: 10.17148/IJARCCE.2015.4522
Abstract: After doing research on Google File System, we find out some methods to improve the performance of Google file system. Google File System is a scalable distributed file system for large size distributed data-intensive applications. It provides high fault tolerance while running on inexpensive commodity hardware and it delivers high aggregate performance to a large number of clients. But there are some limitations in it such as it uses same chunk size to append and write data. Fixed chunk size decreases its performance for append data. So we will explain some methods to increase its performance by changing some attributes of typical Google File System. This paper is divided into five parts. First part presents the basic introduction of Google File System, second part provides the performance of GFS cluster for a 64 MB chunk size, third part shows the performance of real time GFS clusters, fourth part presents a method to increase the performance of GFS, and finally part fifth concludes the effect of variable size chunk on GFS.
Keywords: Availability, chunk, performance, reliability, scalability
Abstract
Message Transmission for Cluster Based Wireless Sensor Networks Using Multi-Level Encryption
J.Lavanya, D.Venkatesh, A. Chandra Sekhar
DOI: 10.17148/IJARCCE.2015.4523
Abstract: A safeguarded fact transmitting is usually a critical matter pertaining to wireless sensor networks (WSNs). Clustering is an effective in addition to realistic method to improve the program performance of WSNs. On this document, we all review a new protected facts transmitting pertaining to cluster-based WSNs (CWSNs), in which the groupings are produced dynamically in addition to frequently. This paper suggests a new secure and efficient data transmission (SET) protocol pertaining to CWSNs, known as SET-IBS, using the identity-based digital signature (IBS) plan. Further the actual recommended plan more than will come the actual a smaller amount auxiliary program trouble by utilizing the actual multi stage SET-IBS even though picking the actual back up way. This performance in the recommended program is actually in comparison with the prevailing methods.
Keywords: SET, CWSN, SET-IBS
Abstract
Facial Expression Recognition Dealing With Different Expression Variations
Abhijeet S. Tayde, Prof. A. S. Deshpande
DOI: 10.17148/IJARCCE.2015.4524
Abstract: Automatic facial expression analysis is one of the an interesting and challenging problem and also impacts important applications in many areas such as human�computer interaction and data-driven animation. An important step for successful facial expression recognition is to deriving an effective facial representation from original face images. For this, empirically evaluate facial representation majorly based on statistical local features, Local Binary Patterns for person-independent facial expression recognition. Several machine learning methods are systematically examined on several databases. Local Binary Pattern features are effective and much more efficient for facial expression recognition. And formulating Boosted-LBP further to extract the most discriminant LBP features and the best recognition performance is obtained by using Support Vector Machine classifiers with Boosted LBP features. An investigation on LBP features for low-resolution facial expression recognition which is a critical problem but seldom addressed in the existing work. According to observation of experiments that LBP features perform not only stably but also robustly over a useful range of low resolutions of face images and yield promising performance in compressed low-resolution video sequences captured in real-world environments. Facial expressions are one of the most critical sources of variation in face recognition, especially in the frequent case where only a single sample per person is available for enrollment. Some methods that improve the accuracy in the presence of such variations are still required for a reliable authentication system. Because of this, we address the problem with an analysis by- synthesis-based scheme in which a number of synthetic face images with different expressions are produced. For this an animatable 3D model is generated for each user based on 17 automatically located landmark points and the contribution of these additional images in terms of the recognition performance is evaluated with three different techniques such as principal component analysis(PCA), Linear Discriminant Analysis(LDA) and local binary patterns(LBP) on face recognition. Significant improvements are achieved in face recognition accuracies for each algorithm.
Keywords: LDA, LBP, PCA
Abstract
Precognition of Students Academic Failure Using Data Mining Techniques
Sadaf Fatima Salim Attar, Prof. Y. C. Kulkarni
DOI: 10.17148/IJARCCE.2015.4525
Abstract: This paper proposes to pre-recognize student�s academic failure. Real time data on school or graduating students from an institute is taken and various data mining techniques (classification algorithms), such as induction rules, decision trees and naive bayes are applied on it. The results of these algorithms are being compared and optimized for foretelling which students might fail in future. We first consider all the available attributes of students, then select few best attributes and finally, rebalance the data using classification algorithms. The use of data mining concept in the field of education is called as Educational Data Mining, EDM [2]. This paper focuses on designing various methods that will help the teachers and the principal (Administrator) of the school to figure out the weak students and improve their educational standards and environment in which they learn. I propose the use of data mining procedures, because the complexity of the problem is high, data to be handled is very large and often highly unbalanced. The final objective of this paper is to detect the failure of students as early as possible to prevent them from dropping out and improve their academic performance. The outcomes are compared and the best results are shown.
Keywords: Data Mining, Educational Data Mining, Decision Trees, Induction Rules, Rebalancing Data, Classification Algorithms
Abstract
Classification of Dermatology Diseases through Bayes net and Best First Search
MadhuraRambhajani, Wyomesh Deepanker, Neelam Pathak
DOI: 10.17148/IJARCCE.2015.4526
Abstract: In this world near about 1/7th of total world population suffer from some sort of skin disorder. The study of different types of skin disease or disorder is known as Dermatology. There are six different categories of skin diseases which shares somewhat same features. So for the classification of these diseases bayes net a Bayesian technique along with feature selection has been used in this study. Performance of all model are calculated using some measures like accuracy, sensitivity, and specificity. Model is tested from dermatology dataset downloaded from UCI repository site. After eliminating 20 features from dataset 99.31% of accuracy is achieved.
Keywords: Dermatology, Bayesian Technique, Feature selection, Best First Search.
Abstract
A High Speed Binary Floating Point Multiplier using Dadda Algorithm
Prakhi Agrawal, Prof. Shravan Sable, Dr. Rita Jain
DOI: 10.17148/IJARCCE.2015.4527
Abstract: In this paper area efficient Multiplier architecture is developed using Dadda Multiplier. The proposed Multiplier Algorithm takes reduced area than the previous one and the significant delay is also lower than the previous designs. The number of slices in the previous designs is 648 and in our proposed Dadda Multiplier architecture utilizes only 402 slices then area is reduced up to 30%. As shown in the design as well as the simulation results the proposed Multiplier architecture area as well as delay is better.
Keywords: Double Precision, Dadda Multiplier, Floating Point, Area Efficient.
Abstract
Smartphone Based Driver Aided System to Reduce Accidents Using OpenCV
Zope Chaitali K, Y.C. Kulkarni
DOI: 10.17148/IJARCCE.2015.4528
Abstract: Road traffic is increasing rapidly because of availability of various public and private means of transportation. Flow of traffic rarely stops at any hour of the day because of extensive work schedules and travelling needs. This ultimately leads to long driving hours by not only people who are driving continuously to face the adverse effect of fatigue i.e. drowsiness and sleep deprivation. Driver aided system uses android based smartphone which helps to detect driver under fatigue and system alerts driver under sleepy conditions. It is real time driver fatigue detection system which uses OpenCV (Open Source Computer Vision) for tracking driver�s facial expression for preventing accident. Proposed algorithm tracks eyes, mouth to detect doziness and yawning respectively. It also detects stress from driver�s facial expressions like forehead lines and give warning to passengers. It also provide stress recognition through driver�s speech like driver asking for help and takes respective action. Warning system uses different levels of warning includes messages, voice messages, beep, vibrations to alert driver. This system HaarCascade filter libraries for facial tracking and other face region tracking.
Keywords: Drowsiness, OpenCV, HaarCascade, facial tracking, smartphone.
Abstract
Indoor localization and Navigation system using Smartphone
Shweta Shandilya, S.R.Idate
DOI: 10.17148/IJARCCE.2015.4529
Abstract: Smartphones are available to almost everyone nowadays so when a user visits a new place they can easily use their phones to help user in navigation. Many technologies have been used over the years for the purpose of navigation like Bluetooth, GPS, WIF, RFIDs, and external sensors (like inertial sensor). But all these techniques are either not efficient or expensive. The best choice for the navigation purpose inside a building is a WIFI because other technologies have various limitations. So we use WIFI technology which is already inbuilt in user�s mobile phone. The proposed system uses WIFI to help user in navigation by providing localization functionality by using triangulation method. The system has two types of user�s administrator and the application user. The administrator is responsible for creating and maps of the site if they are not already available. The user utilizes these maps for the navigation through the site by entering a destination. The shortest path is calculated by the system and provided to the user. User can save their location, browse the offers and event calendar of the site. User can also track and communicate with other users of the application.
Keywords: Mobile sensors, Floor plan, Map matching and Triangulation
Abstract
Passive Sensing for User’s Activity Inference by Context Aware Computing using Smartphone
Monika Sharma, S. R. Idate
DOI: 10.17148/IJARCCE.2015.4530
Abstract: Today the concept of pervasive computing (ubiquitous computing) is growing rapidly in smartphones. It requires the device to be up and running all the time and constantly connected. In smartphones different sensors like proximity, microphone, magnetometer; GPS, WIFI, camera etc. are embedded in the device. These sensors are active all the time for the purpose of collecting all the user contextual data so it can be used further analysis. This system works on inferring the users microenvironment event change i.e. sensors analyse the input data and detect any events through the parameters.as these sensors have to run continuously it effects the battery consumption rate and all the sensors and processes affect the performance of the system as a whole.so the required measures to control these limitations like killing unnecessary processors. This system helps in increasing the efficiency of user by automatically deducing the events and taking actions for the same. So it�s a non-invasive process with minimal user interference. User is immediately alerted to any events that requires user�s attention. This system also has a security functionality to help protect user and the mobile unit as well.
Keywords: smartphone sensors, Context aware computing, ubiquitous computing, and inferring activities
Abstract
Circular Patch Antenna with Defected Ground and Parasitic Layer for Wide Bandwidth
Veeresh G V, Rajendra R Patil
DOI: 10.17148/IJARCCE.2015.4531
Abstract: This paper presents a modified circular Microstrip patch antenna fed by a coaxial probe. The proposed work makes use of parasitic layer and defected ground to improve the bandwidth of the antenna. IE3D version 12 is used to simulate the proposed work. Simulation result shows that the antenna resonates at 3.73 GHz and 5.07 GHz frequencies with improved bandwidth of 22.68 %. The antenna showed a huge increase in the bandwidth of 1.150 GHz for center frequency 5.07 GHz and 290 MHz bandwidth for center frequency 3.73 GHz.
Keywords: Microstrip patch antenna, Parasitic, Defected ground, Stacking
Abstract
Human Voice Controlled Home Appliances
Prateek Gupta
DOI: 10.17148/IJARCCE.2015.4532
Abstract: The key objective of our system design is to provide easy means for normal, handicapped and old age persons to control and operate home appliances. Since home automation is gaining popularity day by day in today�s world, we require a system which is affordable and simple to implement. Both these qualities are present in our project which has the capability to replace existing technologies. Practical voice recognition kit is utilized in order to store and recognize the user�s voice. Moreover, this project also helps in efficient use of the electricity which is an important constraint in day to day life
Keywords: Atmega16, Voice Recognition, CodeVision AVR, USBasp, AVRdude, HM2007
Abstract
FPGA Based Multifunction Wireless Medical Surveillance System
Deepa D.Waingade, Meena S.Chavan
DOI: 10.17148/IJARCCE.2015.4533
Abstract: The architecture introduced in this paper is based on wireless communication. Here we have used wireless communication protocol and Radio Frequency (RF) at the transmitter side. Where as arm processor and GSM module are at the receiver side. Field Programmable Gate Array (FPGA) chip is the main part of the system. This controls all the operation of our system. This system is called FPGA based wireless medical surveillance system. This is capable to do lot of function with help of field programmable gate array. With the help of Data Acquisition Module this system receives real time parameters such as Heart beat pulses, Pressure, Temperature etc. These real time parameter signals can be transmitted in the network. Through the wireless receiver these signal are received at the server i.e. community hospital. The doctor can see the real time parameter signals by Web or mobile.
Keywords: GSM, Wireless, RF, FPGA
Abstract
Future Aspects Based Survey of Electronic Flash Memory and Magnetic Memory
Sachin Tyagi, Anurag Chandna, Mamtesh, Manish Kumar
DOI: 10.17148/IJARCCE.2015.4534
Abstract: The basic concept of using the square hysteresis loop of certain magnetic memory as storage devices was known from the earliest days of computer development. Magnetic hard drives were the world�s most common means of memory storage. In this mechanically based memory system, information was stored on magnetic platters and read with magnetic heads, which hover over the disks. Hard drives were very susceptible to breakage from shaking, bumps, and falls. Data access can be slow; the magnetic reader must scan the disk magnetic section by magnetic section, looking for often-dispersed data stored on the disk. Flash memory is an alternative storage source. It stores data in solid-state transistors without moving parts. This makes the memory hardy and much less in size inclined to damage than traditional forms of storage. It also uses less power and works faster than other forms of storage. When a computer utilizing Flash is turned on, all data used in the last session reappears quickly, and without danger of corruption, as it is stored to the non-volatile, incorruptible Flash RAM. This feature makes virtually instant startup time possible, which is the reason this device majorly use on future aspects. The future of Flash technology looks bright. Less than a year ago, it was impractical due to technological and economic restrictions. However, the price of Flash memory has dropped significantly and is now rather competitive with other forms of storage but the today�s price is not competitive. The purpose of this paper is to detail the current and future technology of Flash and discuss the uses, features, and flaws of the technology. The information within this paper has been culled from professional papers, magazines, and internet sources. It also contains personal knowledge of Flash technology.
Keywords: Control Gate, Flash Memory, Magnetic Memory, Floating Gate, MOSFET, RAM, ROM, Transistors
Abstract
Intelligent Combat Robot
Hemanth B T, Kamalanathan B, Ganapati H L, Ananda H B, Mrs. Vaddi Naga Padma Prasuna
DOI: 10.17148/IJARCCE.2015.4535
Abstract: This paper is to describe the development of robotic vehicle using RF technology for communicating between transmitter and receiver. This robot minimizes human causalities [1]. A wireless camera has been installed which can transmit real time video. This robot is very much useful for spying, war fields, Terror attacks, Natural disasters and mining areas. An 8051 series microcontroller is used for the control operation. At transmitting end using command buttons the movement of receiver is controlled either to move forward, backward, left, right or stop. This combat robot is installed with a laser gun where it can fire towards enemies remotely. A stepper motor has been installed for the rotation of camera in clockwise or counter clockwise direction. Camera mechanism is installed where it helps the person at watching station to monitor its direction of movement. Since manpower is always precious, these robots minimize the human risks and replace the humans at dangerous situation.
Keywords: Combat robot, Camera, Radio operated, Terror attacks.
Abstract
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Health Care Systems
Ankitha.N.Kulkarni, Ashwini.S, Vidhyashree.S, Chandrashekar.K.T
DOI: 10.17148/IJARCCE.2015.4536
Abstract: Data privacy issues are increasingly becoming important for many applications. Protective individual privacy is a crucial downside. However, sensitive data will still be ill-used by approved users to compromise the privacy of shoppers. Traditionally, research in the database community in the area of data security can be broadly classified into access control research and data privacy research. Access Control Mechanisms (ACM) is used to ensure that only authorized information is available to users. Privacy Protection Mechanism (PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. Recent research studied the problem of publishing data in databases without revealing the sensitive information, moving to the privacy preserving paradigms of k-anonymity and L-diversity. K-anonymity protects against the identity of an individual�s record. L-diversity, in addition to this, safeguards against the association of an individual with specific sensitive information. The aim of this paper is to provide better security and minimum level of precision to the obtained data, for that in this paper an accuracy constrained privacy preserving access control mechanism is implemented with additional constraint on each selection predicate called imprecision bounds. The accuracy constraints are satisfied for multiple roles. We propose heuristics for anonymization algorithms to show empirically that the proposed approach satisfies imprecision bounds for more permissions and has lower total imprecision than the current state of the art.
Keywords: K-Anonymity, L-Diversity, Suppression, Generalization, Privacy
Abstract
STEALTH- A Surveillance Robot
Nitish Saxena, Kamlesh Narsinghani, Nikhil Chalotra
DOI: 10.17148/IJARCCE.2015.4537
Abstract: The main objective of our project is to tackle in war situations and terrorist crises to save precious lives of our soldiers as well as civilians. Terrorists activities had gone to higher levels and security personnel are getting threat alerts almost everyday. This Robot is designed to scan the entire area for bombs, landmines used by terrorists so that they can be eradicated by the concerned authorities. The robot is wirelessly controlled through RF communication and a global positioning system to see the exact location of our robot by getting the coordinates through the GPS module. In our proposed system a wireless camera has been installed on it with which terrorist activities can be monitored from a far off place. Moreover this camera works independently so the robot can still be controlled even if our GPS system fails due to some hardware failure.
Keywords: Metal detection, night vision camera, GPS module, RF communication
Abstract
System Identification and Creep Compensation of Nanopositioning System Using Proportional and Double Integral Action
Sheilza Jain, Sakshi Kalra, Jitendrakumar Goyal
DOI: 10.17148/IJARCCE.2015.4538
Abstract: Nanotechnology is precision control and manipulation of devices and materials at nanoscale i.e. nanopositioning. Nanopositioners are precision mechatronics system designed to move objects over a small range with a resolution down to a fraction of an atomic diameter. In particular, desired specifications of nanopositioners are fast response with no or very little overshoot, large travel range with very high resolution, extremely high precision and high bandwidth. This paper presents the identification of nanopositioning device consisting of flexure stage for motion of sample and piezoelectric crystal as both sensor and actuator. Open loop behaviour of the nanopositioning device on the basis of time and frequency responses is plotted and analysed. To improve the system characteristics feedback controllers are implemented and simulated. In this paper, PI and PII controllers are designed and system performances are investigated for different values of feedback gain. Step response and frequency response under variety of conditions are obtained to verify the effectiveness of these feedback controllers. A positioning system utilizing piezoelectric actuators typically exhibits creep, hysteresis and lightly damped vibration modes which limits the usable bandwidth. In this paper, in order to control the creep nonlinearity, different controllers are implemented. Then a comparative study of traditional P and PI controller with PII controller on the basis of time and frequency response is given to show which controller is better. Simulation results for the performance analysis are carried out in MATLAB.
Keywords: Nanotechnology, nanopositioning, piezoelectric actuators, feedback controller, PI controller, PII controller, Nonlinearities, Creep.
Abstract
Secured Color Image Compression and Efficient Reconstruction Using Arnold Transform with Chaos Encoding Technique
D. Venugopal, M.Gunasekaran, A.Sivanatharaja
DOI: 10.17148/IJARCCE.2015.4539
Abstract: Secured image compression is the key issue in image transmission applications. This paper proposes the idea of combining both compression and security of an image. In the existing methods to encrypt images, the key size is too large since the whole matrix is considered as the key. To solve this problem, encryption through key controlled matrix is constructed using the logistic map in this proposed method. Then Arnold transform is used for image location scrambling. First the input image is decomposed into bands and compressed by level dependent hard threshold method and then combined with above encryption algorithms to get compressed-encrypted image. This algorithm produces a cipher for test images that have good diffusion and confusion properties. Simulation results of histogram analysis, key sensitivity analysis of adjacent pixels and PSNR shows the enhanced security and effectiveness of the proposed algorithm and reasonable increase in compression performance.
Keywords: Arnold transforms chaos system, encryption, and Image compression.
Abstract
Offline character recognition for printed text in Devanagari using Neural Network and Genetic Algorithm
Prof. Mukund R. Joshi, Miss. Vrushali V. Sabale
DOI: 10.17148/IJARCCE.2015.4540
Abstract: English character has been extensively studied in last half century and progressed to a level, sufficient to produce technology driven applications. But same is not the case for Indian languages which are complicated in terms of structure and computations. The problem arises in Devanagari character recognition provides less correctness and efficiency so we are using neural network and genetic algorithm to overcome that problem. Devanagari being the national language of India, spoken by more than 500 million people, should be given special attention so that document retrieval and analysis of rich ancient and modern Indian literature can be effectively done. Devnagari script include Marathi, Nepali , hindi and Sanskrit languages�. This report is intended to serve as a guide and update for the readers, working in the Devanagari Character Recognition area, it is now widely accepted that a single classification algorithm can�t yields better performance rate, so we are using here not only neural network but also genetic algorithm. Though, various techniques are well experimented by many researchers, an attempt is made to enhance the existing results by using features like glcm ,histogram, color domino.
Keywords: Character recognition, segmentation, feature extraction, genetic algorithm.
Abstract
Smart Disease Surveillance Based on Internet of Things (IoT)
Ashly Mathew, Farha Amreen S.A, Pooja H.N, Aakriti Verma
DOI: 10.17148/IJARCCE.2015.4541
Abstract: Surveillance is a regular collection, analysis, and interpretation of data on disease patterns of a geographic area which helps in indicating outbreaks of major health related symptoms. In developing countries like India, efficacy of a surveillance system is often hindered by the quality and availability of data. Internet of Things (IoT) concept enables the possibility of information discovery about a tagged object or a tagged person by browsing an internet addresses or database entry that corresponds to a particular active RFID with sensing capability. In the Internet of Things based "Smart Disease Surveillance" the smart device, which is none other than the main server located in every hospital which maintains patient records, will automatically process and send the required information to the backbone network. This backbone network will in turn process and give information to the health ministry so that the trends are understood quick, smart and easy. This will help the ministry to take necessary steps without much delay as all the information is given by the smart devices.
Keywords: Disease Surveillance, Internet of Things, Disease Surveillance in India, Health care India ideas.
Abstract
Analysis of Research Data using MapReduce Word Count Algorithm
Manisha Sahane, Sanjay Sirsat, Razaullah Khan
DOI: 10.17148/IJARCCE.2015.4542
Abstract: This paper presents how to develop software for grading system in Microsoft Visual Basic 6.0 programming language. The paper uses Microsoft Access as Back-End and Graphical User Interface (GUI) design in Visual Basic as Front-End. The Front-End serve as a platform to select the branch, year, semester and finally the grades obtained in each paper. The details of thus selected conditions viz., course code, course title, credits of each paper, and total credit are brought to the Front-End by connecting to a Microsoft Access database. Then the Grade Point Average (GPA) or Cumulative Grade Point Average (CGPA) is calculated accordingly.
Keywords: Visual Basic, Grade Processing System, GPA/CGPA, Front end, Back end, Graphical User Interface (GUI), Database, Debug.
Abstract
Grade Processing System Using Visual Basic 6.0
Kansham Angphun Maring, Ningthoujam Sanjit, Kansham Modar Maring
DOI: 10.17148/IJARCCE.2015.4543
Abstract: New technologies always create new areas of concern for information security teams. Usually early adoption of such products is slow and it allows some maturity to develop in the play store(previously Market), providing time for the development of effective security controls. Indeed often these new devices will be slowly introduced to the corporate/government environment as part of an internal strategy. The rapid growth of the Smartphone play store(previously Market) and the use of these devices for email, online banking, and accessing other forms of sensitive content has lead to the emergence of a new and ever-changing threat landscape. This combined with the fact that anyone can be user has led to smart phones appearing as part of the corporate/government estate before the appropriate controls are in place. Even without these technologies connecting to the corporate/government network, there are security implications brought about by their mere presence in an office environment. A malicious user or malware on the device can create a number of risks for an organisation, and so the fact that these devices are not necessarily connected does not translate to a lack of security risks. This paper will discuss why it is important to secure an Android device, what some of the potential vulnerabilities are, and security measures that can be introduced to provide a baseline of security on Google�s mobile OS.
Keywords: android, security, hacking, smart phones, risks, measures.
Abstract
Android Security: An Overview of Risks and Security Measures
A.J.Singh, Akshay Bhardwaj
DOI: 10.17148/IJARCCE.2015.4544
Abstract: New technologies always create new areas of concern for information security teams. Usually early adoption of such products is slow and it allows some maturity to develop in the play store(previously Market), providing time for the development of effective security controls. Indeed often these new devices will be slowly introduced to the corporate/government environment as part of an internal strategy. The rapid growth of the Smartphone play store(previously Market) and the use of these devices for email, online banking, and accessing other forms of sensitive content has lead to the emergence of a new and ever-changing threat landscape. This combined with the fact that anyone can be user has led to smart phones appearing as part of the corporate/government estate before the appropriate controls are in place. Even without these technologies connecting to the corporate/government network, there are security implications brought about by their mere presence in an office environment. A malicious user or malware on the device can create a number of risks for an organisation, and so the fact that these devices are not necessarily connected does not translate to a lack of security risks. This paper will discuss why it is important to secure an Android device, what some of the potential vulnerabilities are, and security measures that can be introduced to provide a baseline of security on Google�s mobile OS.
Keywords: android, security, hacking, smart phones, risks, measures.
Abstract
Implementation of Image Processing on Raspberry Pi
K.S.Shilpashree, Lokesha.H, Hadimani Shivkumar
DOI: 10.17148/IJARCCE.2015.4545
Abstract: Today image processing are used in various techniques, this paper presents the implementation of image processing operations on Raspberry Pi. The Raspberry Pi is a basic embedded system and being a low cost a single-board computer used to reduce the complexity of systems in real time applications. This platform is mainly based on python. Raspberry pi consist of Camera slot Interface (CSI) to interface the raspberry pi camera. Here, the Dark and Low contrast images captured by using the Raspberry Pi camera module are enhanced in order to identify the particular region of image. This concept is used in the real time application of MAV, The MAVs are basically used to capture images and videos through the Raspberry pi camera module. Because of its credit card sized (small) and less weight in the design. However, the image captured by MAVs will consist of unwanted things due to atmospheric conditions; hence it is necessary to remove noise present in the MAVs images.
Keywords: Image Capturing, Raspberry Pi, Camera Module, Python, Enhancement Algorithms.
Abstract
Data sharing with Security and Efficiency using Attribute Based System
K. Dhana Lakshmi, Hussain Syed, M.Bharat
DOI: 10.17148/IJARCCE.2015.4546
Abstract: Data sharing paradigm in distributed systems such as Social Networks and Cloud Computing, there is an increasing demand for distributed data security in the recent adoption and diffusion. The most challenging issue in data sharing is the enforcement of access policies. In this Cipher text Policy Attribute-Based Encryption (CP-ABE) is a promising cryptographic solution for this issue. This allows data owners to define their own access policies over user attribute and enforce the policies on data that is to be distributed. The major drawback with this is Key escrow problem. The key generation canter (KGC) will decrypt any message addressed to a specific user by generating their private keys. This is not a good scenario because the data owners want to be accessed to only specific users. We propose a CP-ABE scheme for data sharing, which allows the key escrow problem would be solved. The security and performance indicates that the proposed scheme is efficient and secure the data distributed.
Keywords: Data sharing, attribute-based encryption, key escrow, access policies.
Abstract
Search Engines that are used for multiple purpose search
Abira Dasgupta
DOI: 10.17148/IJARCCE.2015.4547
Abstract: This paper introduces the use and purpose of various search engines used for multiple purposes search. Search engines help us to search for data and information that are used for specific purposes. The most popularly used search engines used are Google, Yahoo! Search, Bing, Ask etc. Using one of these search engines we can search different types and categories of information. Features of search engines are super fast set-up, advanced site search, reports track visitors searches, automatic site map, automatic what�s new list, optimal web search, complete customization, scheduled re-indexing, content monitoring, no fixed page limit, ease of use indexing of password protected pages and much more. In this paper we are discussing different search engines used for specialty search, business search, legal search, news search, people search, real estate and property search, multimedia search, shopping search.
Keywords: My way, Work.com, Westlaw, Google News, Peek You, Right move, You tube, Shop zilla.
Abstract
A Novel Self-Organizing Mechanism for Load Balancing & Handover in Network
Manjunath Hanchinal, Ziaur Rahman
DOI: 10.17148/IJARCCE.2015.4548
Abstract: Fourth generation networks and beyond have recently emerged to satisfy the increasing demand for maximum data rates. Cost-effective methods have been designed in 3GPP LTE Advanced standard to significantly enhance coverage and capacity of the network. By introducing the small cells in the Heterogeneous Network Huge performance gains can be achieved by increasing the density of node [1]. Self-Organizing Network (SON) is a new approach where it aims in reducing the human effort. SON functions include some of the techniques such as self-configuration, optimization and self-healing. In this circumstance, I have focused on three Self Optimizing functions so called Admission Control (AC) and Handover (HO) and finally the Load Balancing (LB). The simulation results show the performance of this approach through evaluation of some parameters such as average throughput and cell load.
Keywords: SON, LTE-Advance, HetNet, self-configuration, AC, HO, LB, QoS.
Abstract
Routing Protocol for Efficient and Secure Data Transmission in Cloud Environment
Lokesh. Patil, Suresh. Patel
DOI: 10.17148/IJARCCE.2015.4549
Abstract: Olden days mobile phones are evolved into modern powerful Smartphone�s to support many applications and these Smartphone�s are coming with built in smarter features to support multiple tasks. The mobile battery limitation is major problem in Smartphone�s and this problem is overcome by offloading mobile computing and storing data in cloud to preserve the battery. The security is in cloud environment is challenging against the adversaries to secure critical data. The protocols for communication in cloud environment are major issue. There is need off standard communication protocol for secure transmission of data. In this paper we delve into numerous routing protocols to solve this problem. Preserving the user�s critical data is important aspect of modern trending cloud storage challenge. The present exploration concentrates on implementing GPSR protocol.
Keywords: MANET, clone, GPSR, mobile cloud environment, routing zone.
Abstract
A Review on Swarm Robots
Rachna Sandhu, O. P. Sharma, Dr. Vivek Sharma
DOI: 10.17148/IJARCCE.2015.4550
Abstract: Swarm robotics is a relatively new field that focuses on controlling large-scale homogeneous multi-robot systems. Swarm robotics is a novel approach to the coordination of large numbers of relatively simple robots which takes its inspiration from social insects. This approach emerged on the field of artificial swarm intelligence, as well as the biological studies of insects, ants and other fields in nature, where swarm behavior occurs. This paper proposes a definition to this newly emerging approach by 1) describing the desirable properties of swarm robotic systems, as observed in the system-level functioning of social insects, 2) proposing a definition for the term swarm robotics, and putting forward a set of criteria that can be used to distinguish swarm robotics research from other multi-robot studies, 3) providing a review of some studies which can act as sources of inspiration, and a list of promising application domains for the utilization of swarm robotic systems.
Keywords: Swarm Robotics, Swarm Intelligence, Autonomous Robots.
Abstract
Wireless Optical Communication System and its Vital Components
Mr. Puneet Sehgal, Ms. Himani Dua
DOI: 10.17148/IJARCCE.2015.4551
Abstract: The primary aim of this paper is to highlight the importance of vital components used in the emerging field of wireless Optical Communication System. As the optical fibre is the choice of today�s era for long distance transmission of signals as it gives a maximum transmission bit rate plus being a reliable source of transmission of signals without compromising much over long distance transmission losses to the surrounding medium. For the proper understanding of optical fibre communication systems it is indispensible to have a fair knowledge of these components and to know the basic principles on which this most emerging system of communication works.
Keywords: Wireless optical communication, transmission, bit rate, losses, components
Abstract
Design of Configuration Scheme for Triple Play QOS in 10Gigabit Ethernet based Ship Data Network
Kavya.K, Suma
DOI: 10.17148/IJARCCE.2015.4552
Abstract: Modern Naval ships are being fitted with the latest state-of-the-art equipment and systems, resulting in an increase in the complexity and speed of command and control operations. This has created a requirement of diverse information to be exchanged in a limited amount of time between personnel and units. The Ship Data Network (SDN) based on 10 Gigabit Ethernet technologies has been envisaged to provide a broadband infrastructure on naval ships for convergence of voice, data and video applications.Ship Data Network is to fulfill stringent Network performance parameters such as sub-second failover, latency should not exceed 30ms, 30ms and 10ms for voice, video and mission critical data respectively. Data loss (Bit Error rate) should not exceed 1 in 10E9, Triple play QOS and to perform multicasting of data and video as unicastig takes a lot of Bandwidth of Network.
Keywords: QOS, SDN, LANS.
Abstract
Secured Load Rebalancing In Cloud
Bhavya.G, Chaitra.B.N, Chaitra.G, Shruthi.C
DOI: 10.17148/IJARCCE.2015.4553
Abstract: Distributed file systems are key building blocks for cloud computing applications based on the Map Reduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage functions. Files can also be dynamically created, deleted, and appended. This results in load imbalance in a distributed file system; that is, the file chunks are not distributed as uniformly as possible among the nodes. Emerging distributed file systems in production systems strongly depend on a central node for chunk reallocation. This dependence is clearly inadequate in a large-scale, failure-prone environment because the central load balancer is put under considerable workload that is linearly scaled with the system size, and may thus become the performance bottleneck and the single point of failure. In this proposal, a fully distributed load rebalancing algorithm is presented to cope with the load imbalance problem. Additionally, we aim to reduce network traffic or movement cost caused by rebalancing the loads of nodes as much as possible to maximize the network bandwidth available to normal applications. Moreover, as failure is the norm, nodes are newly added to sustain the overall system performance resulting in the heterogeneity of nodes. Exploiting capable nodes to improve the system performance is thus demanded. In the proposed system we also provide security for the data stored on cloud through encryption and decryption concepts.
Keywords: computing, distributed file systems, map reduce, Load imbalance
Abstract
Intrusion detection using classification via clustering
Divya D. Nimbalkar, Shubha Puthran
DOI: 10.17148/IJARCCE.2015.4554
Abstract: In today�s world there is widespread use of internet. It hence becomes a necessity for securing this access to the data that is stored on theworld wide web . Intrusion detection system is one such mechanism for detecting the intrusive patterns from the traffic patterns on the network . Datamining and statistical data analysis are some ways to detect these attacks. In this paper, we have presented a novel technique of intrusion detection where is classification is done on the results one gets after clustering the data set KDD '99 . The results obtained here are better than directly performing classification or clustering.
Keywords: Intrusion detection , data mining , statistical analysis , KDD '99
Abstract
SLA-aware and Cost-aware Provisioning and Scheduling of Cloud Resources across Multiple Data centres
Ayesha S, Jayalakshmi D S
DOI: 10.17148/IJARCCE.2015.4555
Abstract: The tremendous growth in data has immensely impacted organizations. Their infrastructure and traditional data management systems are unable to handle Big Data. They have to either invest heavily on their infrastructure or move their Big Data analytics to Cloud where they can benefit from both on-demand scalability and contemporary data management techniques. However, to make Cloud hosted Big Data analytics available to wider range of enterprises, we have to carefully capture their preferences in terms of budget and service level objectives. Therefore, in this study we propose SLA driven resource provisioning and scheduling in multiple data centre environment. The user requests in terms of SLA (deadline and budget) are captured at an entry point from where user request user information is sent to cloud provider. The cloud provider receives SLA constraints and user�s job details, checks all the data centres for availability of resources and decide the data centre at which the user application can be deployed without violating the SLA and budget constraints. Further, a pruned tree based scheduling algorithm is used to provision cloud resources and schedule the tasks
Keywords: Big data, Cloud Computing, Service level Agreement, multiple data centres, deadline, budget, scheduling, pruned tree
Abstract
Optimization of bow-tie patch antenna using various soft computation techniques
Ayesha S, Jayalakshmi D S
DOI: 10.17148/IJARCCE.2015.4556
Abstract: : In this project we have proposed a technique to design and optimize a bow-tie patch antenna with the help of various soft computation techniques such as Adaptive Neuro Fuzzy Inference System (ANFIS), Genetic Algorithm (GA) and a hybrid technique consisting of both ANFIS and GA. The codes for the different soft computation techniquesare developed using the MATLAB software. All results of the antenna are tested on software platform. The software used is IE3D (Integral Equation in Three Dimension) software of Mentor Graphics. The aim of this work is to study and observe resonant frequency, directivity, gain and efficiency obtained by designing the bow-tie patch antenna with the help of the different optimization techniques and to determine which technique gives the most effective antenna. Optimum solutions of various antenna parameters such as length and width are obtained using the soft computation techniques and these are utilized to design the bow-tie antenna using the IE3D software. The design involves a bow-tie antenna being developed on a patch. The patch can take many configurations, the most popular being rectangular and circular configurations. Other configurations are much more complex in design and require heavy numerical computations. In this project a rectangular patch is used. Bow-tie antennas are miniaturized antennas i.e. they are physically small in size, low weight, low cost and they are highly reliable. Also, such a software controlled antenna presents an interesting option for next generation communication.
Keywords: ANFIS, genetic algorithm, resonant frequency; directivity; gain; efficiency; optimum solution, miniaturized antenna.
Abstract
A Quality Public Sensing Framework for Heterogeneous IoT
Ashwini M G, Prof. B Maheshwarappa
DOI: 10.17148/IJARCCE.2015.4557
Abstract: The application areas of wireless sensor networks (WSN) have attracted more number of researchers to add more functionality to these networks with the inclusion of internet access to the devices in a network. These devices create a network by utilization of internet to form Internet of Things (IoT).As the sensors and actuators are collecting various types of data in WSN, the need for storing and manipulating the heterogeneous sensor data is essential.The objective of the current work is to analyze the heterogeneous IoT data obtained from WSN by optimizing the routing path using greedy perimeter stateless routing (GPSR) protocol.Public sensing framework is deployed on large-scale network with low-cost by the utilization of currently available sensors where data already being shared among users.
Keywords: WSN, IoT architecture, public sensing, GPSR, cloud computing
Abstract
Image Authentication by Detecting Demosaicing
Mr. Vinayak K. Shingote, Prof. Ruhi Kabara
DOI: 10.17148/IJARCCE.2015.4558
Abstract: In this digital world we come across many image processing software that produce doctored Images with high sophistication, which are manipulated in such a way that the tampering is not easily visible to naked eye. The authenticity of a digital image has become a challenging task due to the various tools present in the photo editing software packages. There are number of ways of tampering an Image, such as splicing two different images together, removal of objects from the image, addition of objects in the image, change of appearance of objects in the image or resizing the image. This Image authentication technique detects traces of demosaicing in the complete absence of any form of digital watermark or signature and is therefore referred as passive. So there is a need for developing techniques to distinguish the photographic image from the Photorealistic Computer Generated Image, the genuine ones from the doctored ones. Estimation of demosaicing parameters is not necessary ;rather ,detection of the demosaicing is important.
Keywords: photorealistic computer generated images (PRCG), photographic images (PIM), Demosaicing, Color Filter Array (CFA).
Abstract
Visions for a Molecular Future
Ruhee, Oshin Sangha, Deep Kamal Kaur Randhawa
DOI: 10.17148/IJARCCE.2015.4559
Abstract: Zest to sustain Moore�s Law paved way for CMOS technology that has evolved from microelectronics to nanoelectronics. Further miniaturization is being limited in silicon based CMOS. Hence, alternative materials are being studied for use in electronic devices. Molecules are a very promising candidate. Molecular Electronics promise not only miniaturization but also property self assembly. Molecular electronics is visualized as the future of electronics. Apart from being the solution to the miniaturization problem, it also promises the possibility to assemble a large number of nanoscale objects to form new devices. Here, we discuss the basics of molecular electronics, its components and some of its applications.
Keywords: Molecular Electronics; Molecular Wires; Diodes; Transistors; Switches
Abstract
A Media Player which operates depending on Human Emotions
Harshala Chaudhari, Amrapali Waghmare, Reshma Ganjewar, Dr. Abhijit Banubakode
DOI: 10.17148/IJARCCE.2015.4560
Abstract: The world of science cannot be measured in terms of development and progress. It shows how far human mind can work and think. It has now reached to the technology known as �Blue Eyes Technology� that can sense and control human emotions and feelings through gadgets. The eyes, fingers, speech are the elements which help to sense the emotion level of human body. This paper implements a new technique known as Emotion Sensory World of Blue Eyes Technology which identifies human emotions (sad, happy or thinking) using image processing techniques by extracting eye portion from the captured image which is then compared with stored images of database. After identifying mood the songs will be played to make human emotion level normal. So, the media player is based on blue eyes technology[1]. Emotion detection has several applications in areas such as artificial intelligence, image processing, intelligent Human-Computer interfaces. This paper reviews the literature on different aspects like different theories of emotions, methods of detecting emotions like face detection, eye detection, lip detection. This paper reviews comparative techniques for recognizing emotions through images.
Keywords: emotions, images, image processing, sense, emotion, emotion detection, facial expression, face detection, lip detection, eye detection.
Abstract
Segmentation of Images using Density-Based Algorithms
Atrayee Dhua, Debjani Nath Sarma, Sneha Singh, Bijoyeta Roy
DOI: 10.17148/IJARCCE.2015.4561
Abstract: : Image segmentation of noisy image has nowadays gained popularity in the field of computer vision. This paper presents comparison between two density based clustering algorithms DBSCAN and Mean Shift. Considering an image as a dataset of pixels we firstly remove salt and pepper noise from an image using median filtering technique followed by applying DBSCAN algorithm to cluster it. Next, the implementation of Mean Shift algorithm is seen followed by the comparison of both the outputs. Density based clustering algorithms are used to find spatial connectivity and colour similarity of the pixels, which is used to discover clusters of arbitrary shape leading to the partitioning of pixels and further isolating the noise points. Experimental results using proposed method demonstrate encouraging performance.
Keywords: Image segmentation, Cluster, DBSCAN, Median Filter, Salt and Pepper noise.
Abstract
Design of PID Controller via Novel Model Order Reduction Technique
M. Sudheer Kumar, S. Harish, A. Dhanamjay Apparao
DOI: 10.17148/IJARCCE.2015.4562
Abstract: This paper presents a mixed method for finding stable reduced order models using error minimization technique and modified pole clustering technique for single input-single output (SISO) large scale systems. The denominator polynomial of the reduced order model is determined by forming the clusters of the poles of original system and the cluster centers are identified by using inverse distance measure criterion and the numerator polynomial is obtained by the error minimization technique. This reduced system with PID is stable even when the original high order system is unstable.
Keywords: Modified pole clustering, Order reduction, Error minimization technique, Stability, Transfer function
Abstract
MIMO Technology using V-BLAST Equalization Techniques – Literature Survey
Mohit Thakur, Raspinderjit Kaur Kahlon, Harjit singh
DOI: 10.17148/IJARCCE.2015.4563
Abstract: Multiple Input Multiple Output (MIMO) technology is one of the most promising wireless technologies that can increase link reliability, data transmission rate and improves the coverage of system. It increases efficiency for said total transmission power. By using multiple antennas both at transmitter and receiver sides, MIMO technology allow a novel dimension �the spatial dimension� that can reduce the limitations of wireless channels. Inter symbol interference is one the major issues with MIMO technique. There are many schemes that can be applied to MIMO systems to reduce such effects and are known as Equalization techniques. In this paper we focus on the broad spectrum MIMO systems, the Vertical Bell Labs Space-Time design and different types of equalizer like ZF, MMSE, ZF-SIC, MMSE-SIC and ML.
Keywords: MIMO, V-BLAST, ZF, MMSE, ML
Abstract
Electrical Characteristics of Carbon Nanotubes
Ruhee, Oshin Sangha, Dr. Deep Kamal Kaur Randhawa
DOI: 10.17148/IJARCCE.2015.4564
Abstract: Carbon Nanotubes are the new wonder materials which have opened up new pathways in the field of electronics. CNTs due to their Chirality, they can act as metallic as well as semiconducting materials. In this review an attempt to study the electrical characteristics of Single Walled Carbon Nanotube has been made. A CNT molecule inserted between two gold electrodes and the variations in the electrical characteristics are observed by using Quantum wise Virtual Nanolab Software.
Keywords: Tunnelling; Transmission Coefficient; Transmission Spectrum; K-Point Sampling.
Abstract
An Efficient Lossless Image Compression Algorithm Using Lifting-DWT And Laplacian Pyramid
Pooja B.Desai, Shivaputra
DOI: 10.17148/IJARCCE.2015.4565
Abstract: The need for image compression has been increasing everyday as it can save the space needed to store and transmit the images in real time like medical applications. There are numerous techniques that have evolved till now but the one that combines simplicity, lesser loss and low memory requirements could bear higher potential. In this paper a lossless method of image compression using lifting-DWT and Laplacian pyramid is proposed. The image of size 342x390 is pre-processed and applied to lifting-DWT to generate level-1 LL band features. The Laplacian pyramid is used to generate LL band features to Laplacian level-1 features. The process is repeated for level-2 features.
Keywords: Lossless Compression; Pre-processing; Lifting DWT; Laplacian Pyramid; PSNR.
Abstract
Steadfast Energy Eifficient Clustering Protocol in Wireless Sensor Networks
SelvaKani P, Krishna Ganesh S.M
DOI: 10.17148/IJARCCE.2015.4566
Abstract: Wireless sensor networks sense data and implements wide range of practical applications development. Although WSNs have the capability to be applied to some applications but there is some limitations associated with it in some environments. Energy efficiency is the primary factor in WSN and energy level maintenance is the important problem in distributed sensor networks. Cluster based communications protocols implements the energy efficiency mechanisms in WSN. Cluster head (CH) selection is the important factor of those protocols. Existing protocols (SEECH) select CH and relays separately based on nodes eligibilities. But the energy problem retains in these protocols when aggregate data is transmitted from CH to sink. The CRDD protocol is used and implements a new concept which creates a region and connects the Base Station (BS) to the canter point of the region. This will reduces the unnecessary packet flow from CH to sink and increase the energy level through reliability. Experimental results produce the effective solution and achieve a good performance.
Keywords: SEECH, CH, CRDD, BS.
Abstract
DWT Based Feature Extraction for Iris Recognition
Harsha R, Dr. K. Ramesha
DOI: 10.17148/IJARCCE.2015.4567
Abstract: This paper attempts to describe a unique approach to create an iris recognition system in which a mechanism that uses canny edge detection scheme and a circular Hough transform to determine the iris boundaries in the eye image which are used. Later two level discrete wavelet transform is applied to extract the patterns in a person�s iris in the form of a feature vector. Matching is done using pair wise distance, which computes the Euclidean distance between two pairs of iris in data matrix. To conclude, our method has achieved a better total successive rate (TSR) and we have reduced equal error rate (EER),false accept rate (FAR) and false reject rate (FRR).
Keywords: Canny Edge, Euclidean Distance, TSR, EER, FAR, FRR
Abstract
Review on Secure Data Sharing for Frequently Changing Groups in Cloud
Pooja R.Bangad, Bapusaheb B.Bhusare
DOI: 10.17148/IJARCCE.2015.4568
Abstract: Cloud computingrelies on sharing of resources to achieve coherence and economies of scale. Cloud resources are shared & owned by multiple users. Security of shared data in multi owner manner is an important and critical aspect due to frequent change of membership. To provide anonymous sharing of data between cloud users group signature & broadcast encryption techniques are used. To provide secure access to accounts one time password technique is used. Security of shared data in multi owner manner is increased by providing authentication at multiple levels. To handle the failure of group admin due to large user requests, it supports to increasing the number of backup group admin, which also improves reliability & scalability.
Keywords: Cloud computing, dynamic groups, reliability, scalability
Abstract
Impact of teaching Electronics practical by E-learning based approach on Students
Mr. Puneet Sehgal, Ms. Himani Dua
DOI: 10.17148/IJARCCE.2015.4569
Abstract: It�s a known fact that teaching is a two way process i.e. the exchange of knowledge between a teacher and a student. In this changing world, technology is expanding at a very fast rate. From the world of landline phones we have shifted to android mobile phones. The world has seen advancement in technology by hundred folds in past 10 years. From just blackboard study, things have shifted to the online world, known as e-learning. This paper highlights the impact of teaching Electronics practical by E-learning based approach on undergraduate students. A batch of 50 students was selected. Videos and Animations were shown to the students based on various practicals which they perform in their laboratory. After that, students were asked to perform the same practicals in the laboratory and were asked to fill a feedback form, which had questions enquiring about their experience in performing experiments based on the approach of e-learning techniques. The results (feedback from students) obtained were analysed keeping in mind the various e-resources shown to them.
Keywords: Teaching, Knowledge, Technology, E-learning, Experiment, Impact, Student
Abstract
Design and Implementation of UART
Miss. Ruchika Longadge, Prof. Mithilesh Mahindra, Prof. Vidya Dahake
DOI: 10.17148/IJARCCE.2015.4570
Abstract: The proposed paper illustrate of UART using technique for implementation of UART using FIFO with the help of VHDL description language. The UART is protocol which is transmitted the information or data in serial form i.e. in serial communication mode. A special computer chip known as a universal asynchronous receiver transmitter acts as the interface between the parallel transmission of the computer bus and the serial transmission of the serial port.
Keywords: UART, RS-232, FIFO, VHDL IMPLEMENTATION ISE SIMULATOR 13.1.
Abstract
Stock Market Index Prediction by Hybrid Neuro-Genetic Data Mining Technique
Ganesh V. Kumbhar, Rajesh V. Argiddi
DOI: 10.17148/IJARCCE.2015.4571
Abstract: Stock Exchange Share Price is very hard to predict because of fluctuating nature of stock. Stock price prediction is one of the emerging fields of research and many methods like technical analysis, statistical analysis, time series analysis etc are used for this purpose. The aim of this study is to develop a system that can predict future stock prices based on samples of historical prices. This study will use the Artificial Neural Network for learning the historical data of Stock Market & make predictions for next few days. Genetic algorithm is used to optimize the weights of Neural Network so that it can learn better. We are using the stock historical data of 10 years from 2004 to 2014. This data is used to build the system & we use the system for predicting the stock behaviour for next few days. The result showed that the proposed model gives better results than simple Neural Network model.
Keywords: Data Mining, Genetic Algorithm, Neural Network, Stock Price.
Abstract
Performance Comparison of Face Recognition Algorithm Based on Accuracy Rate
Rashmi Ravat, Namrata Dhanda
DOI: 10.17148/IJARCCE.2015.4572
Abstract: This paper presents an overview of different face recognition techniques, study and analysis of the face recognition rate, failure rate, training time and recognition time of various face recognition algorithms like PCA, LDA, SVM, ICA and SVD. We analyzed from the results that the performance of SVD in terms of accuracy was better when no. of images increased on ORL database whereasthe performance of PCA was the lowest. Also SVD took more recognition time than other algorithms. Training time of SVM is lowest and PCA, LDA and ICA consume marginal time.
Keywords: Face Recognition, PCA, LDA, ICA, SVM&SVD, ORL Database.
Abstract
Improving the Network Lifetime in Wireless Sensor Networks Using Fuzzy Based Centrality Algorithm
Shanthi.D.L, Archana.R, Harshitha.M, Niveditha.M.N
DOI: 10.17148/IJARCCE.2015.4573
Abstract: Wireless Sensor Networks (WSNs) is partitioned into clusters to save energy, advance network scalability and resourceful routing. Residual energy, cluster node distance that is related to a node with respect of its structural position in the network is used for electing cluster heads. However for choosing cluster head the optimal numbers of nodes that may belong to a cluster are not taken into consideration. The latest centrality metric "Cluster Optimal Degree Centrality"(CODC) proposed in our paper addresses residual energy of individual nodes, distance between the potential cluster head and particular member nodes to ensure better cluster head selection and cluster quality. Finally based upon the distinct centrality metric, the Fuzzy Inference System based cluster head selection method has been proposed, which takes input as Expected Residual Energy and CODC. Though the clustering can improve QoS in wireless sensor networks, the proposed method can effectively prolong the network lifetime, since lifetime is directly related with the energy of the nodes optimizing this energy consumption is very important. The simulation results show that the proposed method performs better than LEACH resulting in high throughput and QoS.
Keywords: Cluster head selection; cluster optimal degree centrality; energy efficiency; fuzzy inference.
Abstract
Understanding Active Shape Model
Arvind B, Kiran Noolvi, Nithin Kumar H M, Shreyas K Bhat, Prashanth A Athavale
DOI: 10.17148/IJARCCE.2015.4574
Abstract: Active shape models (ASMs) are statistical models of the shape of objects which iteratively deform to fit to an example- of the object in a new image, developed by Tim Cootes and Chris-Taylor in 1995. The technique determines the statistics of the points over a collection of example shapes. The mean positions of the points give an average shape and a number of modes of variation are determined describing the main ways in which the example shapes tend to deform from the average. In this way allowed variation in shape can be included in the model. The method produces a compact flexible �Point Distribution Model� with a small number of linearly independent parameter, which can be used during image search.
Keywords: statistical model, Point distribution model, Image segmentation, Image Processing.
Abstract
Reliable and Enhanced Energy-Efficient Routing Protocol for Wireless Sensor Networks
G.Premalatha, T.K.P.Rajagopal
DOI: 10.17148/IJARCCE.2015.4575
Abstract: Providing reliable and efficient communication under fading channels is one of the major technical challenges in wireless sensor networks (WSNs), especially in industrial wireless sensor networks (IWSNs) with dynamic and harsh environments.The objective of this paper is to increase the resilience to link dynamics for WSNs/IWSNs. The design which introduced here, which inherits the advantages of opportunistic routing also, achieves shorter end-to-end delivery delay, higher energy efficiency, and reliability. Enhanced R3E is designed such that it will be set of reasons given in support of an idea for the existing reactive routing protocols to combat the channel variation by utilizing the local path diversity in the link layer. As a new addition to the cooperative forwarding design space in WSNs/IWSNs, our major contributions are route discovery and cooperative forwarding scheme. A biased back off scheme has introduced during the route-discovery phase to find a robust guide path, which can provide more cooperative forwarding opportunities. Along with this guided path, data packets are greedily progressed toward the destination through nodes� cooperation without utilizing the location information. Thus Enhanced R3E remarkably increases the packet delivery ratio, while maintaining high energy efficiency and low delivery latency. In this paper, we compare the R3E protocol with the existing protocol through NS2 simulation.
Keywords: Industrial wireless sensor networks (IWSNs), opportunistic routing, reliable forwarding, unreliable wireless links.
Abstract
Different Technologies for Improving the Performance of Hadoop
Mr. Yogesh Gupta, Mr. Satish Patil, Mr. Omkar Ghumatkar
DOI: 10.17148/IJARCCE.2015.4576
Abstract: Hadoop is a popular open-source implementation of the MapReduce programming model for Cloud Computing. However, it faces a number of issue to achieve the best performance from the underlying system. It include a serialization barrier that delays the reduce phase, repetitive merges and disk access, and lack of capability to leverage latest high-speed interconnects. We express some technologies which are helpful for improve the performance of Hadoop. The technologies are Hadoop-A, iShuffle, TCP/IP implementation of Hadoop-A, Hadoop OFE, Hadoop online are used for regret the performance of Hadoop.
Keywords: Hadoop, MapReduce, JobTracker, TaskTracker, MapTask, RDMA, InfiniBand, MOFSupplier, NetMerger, iShuffle, OFE.
Abstract
A Review on Multi-Biometric Cryptosystem for Information Security
Bharti Kashyap, K. J. Satao
DOI: 10.17148/IJARCCE.2015.4577
Abstract: Multi-biometric system provides very important and secured methodology for enhancing the security level of information technology. The uniqueness of biometrics for any specific human being makes the identification system more secure.The traditional cryptosystem suffers from several problems such as key management, key privacy. Combining cryptography with biometrics removes such kind of problems and used for key generation. Here key may be generated by using two or more biometric factors.
Keywords: Biometrics; Encryption; Decryption; Cryptosystem; Multibiometrics
Abstract
Improved Security Using Captcha as Graphical Password
Rashmi B J, Prof. B Maheshwarappa
DOI: 10.17148/IJARCCE.2015.4578
Abstract: Consumers tend to choose unforgettable passwords that are easy for aggressors to guess, but strong system allotted passwords are hard for users to recall. Many protection primitives are based on difficult mathematical complications. Utilizing strong AI problems for security is issuing as a stimulating new prototype. A novel protection primitive is introduced based on strong AI problems, namely, a new family of graphical password schemes built up on top of Captcha technology, which is known as Captcha as Graphical Password (CaRP). CaRP deals a number of security troubles altogether, such as online approximating attacks, relay attacks, and, if merged with dual- position technologies, shoulder- browsing attempts. Notably, aCaRP password can be detected alternatively by automatic online estimating attacks still if the password is in the research set. CaRP also offers a new approach to cover the well- experienced image hotspot trouble in popular graphical password organizations, such as Pass Points, which often extends to weak password selections. CaRP is not a panacea, but it extends sensible protection and usability and comes out to fit well with some practical lotions for bettering online security.
Keywords: Graphical password, CaRP, Captcha, dictionary attack, password guessing attack, protection primitive.
Abstract
An Effectual Approach for Facial Expression Recognition Using Adaptive Neuro Fuzzy Classifier
Swati Mishra, Avinash Dhole
DOI: 10.17148/IJARCCE.2015.4579
Abstract: Human facial Expression recognition by computer with high recognition rate is still a challenging and interesting task. A lot of emotional information is conveyed by facial expression alone rather than voice tone and spoken words. Facial expression recognition system plays an important role in many areas such as human-computer intelligent interaction system. In this paper, an Automatic Facial Expressions Recognition System is proposed that would recognize five principal expressions, which are Happy, Sad, Neutral, Angry and Disgusted. The proposed system uses an efficient approach for the recognition of those expressions on the basis of some extracted features. For the detection of the frontal face proposed method uses well known Viola Jones face detection technique. Once face detection is performed, feature of interested region that is eyes and mouth are extracted. In feature extraction, local binary pattern (LBP) is proposed as a feature. After the extraction of the LBP feature for the classification or recognition, the proposed method includes adaptive Neuro Fuzzy Classifier (ANFIS) to efficiently cluster the obtained LBP features. The whole system will implemented on the dataset of 150 images of frontal facial expressions of Happy, Sad, Neutral, Angry and Disgusted from Karolinska Directed Emotional Faces (KDEF) Database by using MATLAB 2013(b) and expected to improve expression recognition efficiency.
Keywords: Facial Expression Recognition, Facial Expressions, Feature Extraction, LBP, ANFIS
Abstract
Cluster Head Selection using Honey Bee Optimization in Wireless Sensor Network
Kiranpreet Kaur, Harjit Singh
DOI: 10.17148/IJARCCE.2015.4580
Abstract: Wireless Sensor Network(WSN) are very popular as they are low cost solutions to many real-world challenges with limited computational power, battery life and memory resources. Past few years have witnessed increased in the potential use of wireless sensor network (WSN) such as military surveillance, tracking and monitoring, disaster management and combat field reconnaissance. Sensor nodes involved in these applications are remotely deployed in large numbers. These autonomous nodes are used to monitor an environment. Many issues in WSN are formulated as multidimensional optimization problem and solved through bio-inspired techniques. The main problem in WSN is the lifetime of network. To support scalability, nodes are often grouped in clusters having a leader, often referred as cluster head (CH). A CH is responsible for not only sending data to base station but also assist the general nodes to send sensed data to target nodes. The energy consumption of CH is greater than general nodes. Therefore CH selection will affect the lifetime of WSN. In this paper, an approach is introduced for the selection of cluster head by using swarm intelligence. This proposed approach is based on energy distributed clustering (EDC) algorithm. Honey bee optimization with some parameters are employed over EDC algorithm for effective cluster head selection. This approach helps in reducing the energy consumption. This proposed technique works in three stages: Cluster nodes sends data to CH, CH sends data directly to Leader and leader sends data to BS. Simulations results demonstrate that EDC-HBO algorithm improves the life time of network
Keywords: Wireless Sensor Network, Cluster Head, HBO, Energy Distributed Clustering, Fitness Value.
Abstract
ATM PIN Transfer Using Visual Cryptography (Implementation)
Ms. Swati Shete, Prof. Y. C. Kulkarni
DOI: 10.17148/IJARCCE.2015.4581
Abstract: The Visual Cryptography is simple technique to encrypt the confidential data in such way that decryption process can be done by human eye. The purpose of this paper is to study (2, 2) VC Scheme with an implementation and experimental results.
Keywords: Cryptography, Encrypt, Decryption, VC Scheme.
Abstract
Effect of Sea Water Conductivity on GSM Signal Propagation in Riverine Area of Igbokoda, Ondo State, Nigeria
Olaoye V. Ilelaboye, Yekeen O. Olasoji
DOI: 10.17148/IJARCCE.2015.4582
Abstract: The next-generation wireless networks such as the fourth generation (5G) cellular systems are targeted at supporting various applications such as voice, data, and multimedia over packet-switched networks. In these networks, person-to-person communication can be enhanced with high quality images and video, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. But the channel remains a challenge most especially the riverine areas. Recently, radio frequency (RF) propagation in the riverine areas has been the interest of much theoretical and experimental research. This research work is concerned with the statistical studies of GSM (Global System for Mobile communication) radio wave propagation over the sea path of Igbokoda, Ondo State, Nigeria, at the limits of line-of-sight range in order to determine or establish a relationship that exist between sea conductivity and signal propagation. At every point of observation where signal measurements were taken using Test Mobile system (TEMs) pocket, corresponding water samples were also taken using sample container for conductivity test at the laboratory. The only possible explanation for these large propagation distances is that the conductivity of seawater changes at small field strengths due to hydrogen bonding in water. Consequently, this research work has evaluated and presented a relationship that exist between sea conductivity and GSM signal propagation as -0.98 correlation coefficient which implies inverse relationship (i.e. sea conductivity attenuates signal) the higher the sea conductivity, the lower the signal strength
Keywords: GSM, Signal propagation, Sea water, Conductivity
Abstract
Malware detection using data mining techniques
Abhay pratap singh, Dr.S.S handa
DOI: 10.17148/IJARCCE.2015.4583
Abstract: Nowadays, malicious software attacks and threats against data and information security has become a complex process. The variety and number of these attacks and threats has resulted in providing various type of defending ways against them, but unfortunately current detection technologies are ineffective to cope with new techniques of malware designers which use them to escape from anti-malwares. In current research, we present a combination of static and dynamic methods to accelerate and improve malware detection process and to enable malware detection systems to detect malware with high precision, in less time and help network security experts to react well since time detection of security threats has a high importance in dealing with attacks.
Keywords: Malware, Malware Detection, Escape Techniques, Data Mining
Abstract
Multi-agent model for scheduling of activities by applying shortest processing time (SPT) rule
R.Y.Youssef, M.I.Abdalla, M.H.Ghanim
DOI: 10.17148/IJARCCE.2015.4584
Abstract: Online scheduling is usually referred to as a closed loop that includes a feedback after scheduling execution. The whole system depends on data collection fed to the receivers of the reactive layer from sensors and various input devices. The practical success of the scheduling system in reacting to practical applications depends entirely on having the data ready for execution for the algorithm on time. This Paper introduce a methodology for enhancing the rate of data collection from the input devices, which acts as a front end to the reactive scheduling system and will have a direct impact on scheduling horizon, frequency, time limit selection and reasoning reuse. We've got the solution for driving the multi-purpose machines and the way of control and enhance scheduling performance within the context of a dynamic production scheduling problem by using our Multi-Agent (MA) program model for the reactive scheduling methods. We've got the solution for driving the multi-purpose machines and get the way of controlling and enhancing the scheduling performance within the context of a dynamic production scheduling problem by using our Multi-Agent (MA) program model for the reactive scheduling methods, Multi-Agent (MA) using the Short Processing Time (SPT) that the rule of shorting time of the jobs in its queue. In this Paper, we compare between two methods (Multi-agent vs. fuzzy) to minimize the total processing time and improve the performance of the production lines. The results indicate that the Multi-agent approach has a better performance compared to the Fuzzy methodology.
Keywords: scheduling;Multi-Agent;Short Processing Time (SPT);fuzzy
Abstract
Review on classification of different VANET Protocols based on routing information
Ghanishtha Narang, Yogesh Juneja
DOI: 10.17148/IJARCCE.2015.4585
Abstract: Vehicular Ad-hoc Networks (VANETs) are the special class of Mobile Ad-hoc Networks (MANETs) with high mobility and frequent changes of topology. It is a type of highly dynamic wireless network that can be formed without the need for any pre-existing infrastructure which aims to improve the transportation system by integrating sensors, wireless networks, GPS, 2G and 3G technologies with the Ad-hoc networks. Due to higher mobility of nodes (vehicles), routing becomes the most challenging task in VANETs. A variety of research has been done on routing and several protocols have been proposed with their implementation. As VANET (Vehicular Ad-hoc Network) research field is growing very fast. It has to serve a wide range of applications under different scenarios (City, Highway). It has various challenges to adopt the protocols that can serve in different topology and scenario. The main objective of Vehicular Ad-hoc Networks is to build a robust network between mobile vehicles so that vehicles can talk to each other for the safety of human beings. This paper deals with the study of classification of different Ad Hoc routing protocols and their different routing techniques.
Keywords: VANET (Vehicular Ad-hoc Network), MANET (Mobile Ad-hoc Network), routing protocols, AODV, AOMDV.
Abstract
A Survey of Energy Optimization Techniques In Wireless Sensor Networks
Er. Parminder Kaur, Er. Vinod Kumar
DOI: 10.17148/IJARCCE.2015.4586
Abstract: Wireless Sensor Network (Wans) have become predominant in both industrial applications as well as personal use. With the advent of Internet of Things (IoT) there has been a re-emphasis on research, development and application of WSNs. WSN nodes are characterized by low processing power, limited lifetime, and lack of mobility. So the major challenge is to design a high quality WSN irrespective of these constraints. In this paper we have presented an in depth analysis of one of these constraints i.e., limited power availability in WSNs. We have presented a review of major techniques to conserve power in WSNs. Especial focus is given on AI based power optimization techniques including clustering, fuzzy logic, nueral network based techniques etc.
Keywords: WSN, sensors, wireless sensor networks, energy efficiency, power optimization.
Abstract
Color Code Based Authentication And Encryption
Rajesh N, Sushmashree S, Varshini V, Bhavani N B, Pradeep D
DOI: 10.17148/IJARCCE.2015.4588
Abstract: In today's high technology environment, organizations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. The threats to information systems from criminals and terrorists are increasing. Today�s information system the security is largely supported by password for authentication process .The most of password contains alphanumeric and special characters it is highly vulnerable. To overcome the drawbacks of traditional method we propose new authentication method to abolish well known Security threats like brute force, dictionary attacks phishing attacks and spyware attacks. Encryption is a process of changing the data into unreadable format, much of the data flows through information system is highly sensitive need to be protected, and the disadvantage of widely used public key encryption is time consuming.Public-key encryption may be vulnerable to impersonation, even if the intruder not able to get private key. A massive attack on a highly secured network will allow an intruder to imitate or mimic the adversary chooses to by using a public-key from the compromised security network to the key of the adversary's choice in the name of another user. To overcome the drawbacks of traditional encryption we introduce RGB color code oriented encryption method. The data consists of characters, symbols and digits. The data are converted in ASCII value, then these ASCII value are grouped into four digits and then the each part is assigned typical html RGB color codes, then these codes are converted into binary values and the binary values are compressed using simple XOR operations. Finally the data transmitted to receiver.
Keywords: Include at least 4 keywords or phrases.
Abstract
Solar powered robotic vehicle
Snehal S. Warekar, Prof. B. T. Salokhe
DOI: 10.17148/IJARCCE.2015.4589
Abstract: The robots are used more commonly in all the fields. In this paper the focus is on the design of a charging system for batteries with the help of tracked solar panels. And we will apply it to a robotic vehicle. The use of a solar tracking system for increasing the robot�s power. The design of power system performance is with a pack of two batteries. The aim is complete the process of charging a battery independently while the other battery provides energy consumed by the robotic vehicle.
Keywords: robotic vehicle, solar panel, battery, photovoltaic (PV).
Abstract
Dynamic Approach for Real time and Non-Real time Packet Scheduling in WSNs
Pavithra J, Vishwanath V Koli, Varalakshmi B D
DOI: 10.17148/IJARCCE.2015.4590
Abstract: Wireless sensor networks (WSNs) have a large kind of military and civil applications. Packet Scheduling is one in all the foremost essential functions of the nodes within the Wireless Sensor Networks. The sensor nodes are high-powered by batteries with restricted energy. Aggressive or enterprising environments wherever the sensor nodes are deployed or the sheared variety of the sensors prevents replacement or recharge of the batteries. So in WSNs, planning of various kinds of packets is of important energy consumptions and end-to-end task transmission delays. Most of the existing packet-scheduling mechanisms of WSN use First Come First Serve (FCFS), non-preemptive priority and preemptive priority scheduling algorithms. These algorithms deserve a high process overhead and long end-to-end task transmission delay because of improper allocation of data packets to queues in multilevel queue scheduling algorithms. Moreover, these algorithms are not dynamic to the dynamic requirements of WSN applications since their planning policies are preset. During this paper, we tend to propose a Dynamic multilevel Priority (DMP) packet scheduling scheme. Within the proposed scheme, each node, except those at the last level of the virtual hierarchy within the zone- primarily based topology of WSN, has 3 levels of priority queues. real time packets are placed into the very high priority queue and may preempt data packets in alternative queues. Non-real-time packets are placed into 2 alternative queues supported a precise threshold of their calculable time interval. Leaf nodes have 2 queues for real time and non-real-time data packets since they are doing not receive task from alternative nodes and so, reduces end-to-end delay.
Keywords: Wireless Sensor networks, Priority scheduling, FCFS (FIFO), non-preemptive priority and preemptive priority, Real time and non-real time data etc.
Abstract
E-Health Care Solutions Using Anonymization
Chaitra.S, Narasimha Murthy M S
DOI: 10.17148/IJARCCE.2015.4591
Abstract: Cloud computing is a type of computing, instead of having local servers or personal devices to handle applications it trusts on sharing computing resources. Cloud services can help the healthcare industry to access and manage health records effectively in order to provide better patient care. A properly implemented cloud storage system allows hospitals to process tasks effectively and quickly, without causing a drop in performance. This paper mainly focuses on security concerned privacy data enhancement in the cloud environment.. One of the privacy preserving techniques called Anonymization is used, which removes identifying attributes from the database and making the data identification difficult to anybody except the data owners. In this project L-Diversity Technique is used for the Anonymization of the Patient data. the system proposes to integrate key management from pseudorandom number generator for unlink ability, a secure indexing method for privacy preserving keyword search which hides both search and access patterns based on redundancy.
Keywords: Anonymization, Cloud Computing, Data Storage Protection, Privacy Preserving, Security, Shared Data,Data Identification,L-Diversity Technique.
Abstract
Multichannel Cooperative Sensing in Cognitive Radio: A literature Review
Hemlata Patil, Dr A.J.Patil, Dr S.G.Bhirud
DOI: 10.17148/IJARCCE.2015.4592
Abstract: In recent years wireless communication industry has grown enormously. Every individual is behind in getting a share of spectrum. Day by day wireless electronic gadgets are demanding more spectrum for their applications and so the scarcity roused. To address such type of situation where a spectrum can be offered spatially and temporally cognitive radio comes up as an effective solution. This can be accomplished without disturbing the operation of primary users. However in practical situations performance is degraded by multipath fading and shadowing. To overcome with these issues cooperative sensing is used. For a practical scenario of cognitive radio where secondary users deals with multiple channel instead of single channel the study of dealing with a multiple channel becomes necessary and hence this survey has been done. The open research challenges related to multichannel cooperative sensing are also discussed in this paper
Keywords: Cognitive Radio, Spectrum sensing, Multichannel Cognitive Radio, Cooperative sensing
Abstract
Translating Indian Sign Language to text and voice messages using flex sensors
Sachin Bhat, Amruthesh M, Ashik, Chidanand Das, Sujith
DOI: 10.17148/IJARCCE.2015.4593
Abstract: Communication plays an important role for human beings. Communication is treated as a life skill. Keeping these important words in mind we present our paper to mainly focused on aiding the speech impaired and paralysed patients. Our work helps in improving the communication with the deaf and dumb using flex sensor technology. A brief description about various gestures and the implementation part is discussed in this paper. A device is developed that can translate different signs including Indian sign language to text as well as voice format. Flex sensors are placed on hand gloves for the use of above said people. Flex sensor�s resistance changes according to the flexion experienced. Sensors in the glove pick up gestures and transmit that to text data with the help of Analog to Digital convertor and microcontrollers. This converted text data will be sent wirelessly via Bluetooth to a cell phone which runs Text to Speech software and incoming message will be converted to voice. Here device recognises Indian sign language alphabets, numbers and symbols based on sensor movement.
Keywords: Flex sensor, ADC, AT89S52 microcontroller, LCD, Bluetooth module
Abstract
Biometric System Based on Off-Line Signatures
Bhanu Priya Taneja, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.4594
Abstract: Biometrics not only authenticates an individual�s identity but is also a process that applies security measures to various systems such as bank check verification, authentication of legal documents etc. Handwriting is one of the unique and widely acceptable modes of authorizing an individual. This paper discusses all the steps to be carried out in achieving the desired objective i.e to determine whether the signature is original or forged. This paper also explains the procedure required for alignment and binarization of signatures. The entire process is covered in four stages: Image acquisition, Pre-processing, Feature extraction and Verification. Out of the four, this paper lays stress on first two stages. The work has been tagged appropriate after undergoing various stages of testing.
Keywords: Average error rate (AER), Feature Extraction, Image acquisition, Off-line signature verification, Support vector machine (SVMs)
Abstract
Design & Implementation of Efficient Periodicity Mining Technique for Time Series Data
Prof. Saneep Khanna, Mr. Swapnil Kasurkar
DOI: 10.17148/IJARCCE.2015.4595
Abstract: In almost every scientific field, measurements are performed over time. These observations lead to a collection of organized data called time series. The purpose of time-series data mining is to try to extract all meaningful knowledge from the shape of data. Even if humans have a natural capacity to perform these tasks, it remains a complex problem for computers. The first paper was based on study of various periodicity detection techniques and extracts their advantages and disadvantages. In this paper we intend to provide the result of new efficient technique for periodicity detection. This paper includes finding of three type of periodic pattern symbol periodicity, sequence periodicity or partial periodic pattern and segment or full-cycle periodic. The degrees of perfection calculated by confidence, and are mostly characterized by the presence of noise in the data. In this paper, we address the problem of detecting the periodicity rate of a time series database. Three types of periodicities are defined, and a scalable, computationally efficient algorithm is proposed for each type. The algorithms perform in O(nlogn) time for a time series of length n. Moreover, the proposed algorithms are extended in order to discover the periodic patterns of unknown periods at the same time without affecting the time complexity. Experimental results show that the proposed algorithms are highly accurate with respect to the discovered periodicity rates and periodic patterns. Real-data experiments demonstrate the practicality of the discovered periodic patterns.
Keywords: Time series, Data Mining, confidence, efficient algorithm, Periodicity detection.
Abstract
Modified Filter Bank for Digital Down Converter of Pulse Radar Receiver
Ganesh P. Sonar, Prof. R.A.Patil, Mr J.S. Pillai
DOI: 10.17148/IJARCCE.2015.4596
No abstract available.
Abstract
Implementation of Artificial Neural Network Controlled Shunt Active Power Filter for Current Harmonics Compensation
B.Mangaiyarkarasi, Mr. P M Balasubramaniam
DOI: 10.17148/IJARCCE.2015.4597
Abstract: A pure sinusoidal voltage is a conceptual quantity produced by an ideal AC generator. The nonlinear loads cause the current to vary disproportionately and the current taken by them has a non-sinusoidal waveform. The aim of this project is to present harmonic cancellation using shunt APF with an application of neural network (NN). Shunt active power filter (SAPF) is commonly used as an effective method in compensating harmonic components in non-linear loads. This active filter concept uses power electronic equipment to produce the current components that cancel the harmonic current components from the nonlinear loads. For the extraction of sequence currents and to improve the performance, the back propagation algorithm is used. This is a multi-layer feed-forward neural network. The back propagation method is for obtaining the source currents at the fundamental frequency. The Active Power Filter reference compensation currents are then determined by subtracting the fundamental components from the load currents. Thus proposed is an algorithm for maintaining ideal phase source currents when the source voltages are amplitude-imbalanced. Hence this method can be used when the loads may be balanced/unbalanced, linear/non-linear and any distortion the source current must be sinusoidal.
Keywords: sinusoidal supply, neural network, back propagation, compensation, Point of common coupling, load
Abstract
Detecting Spoofing Attack by Source using Path Information
Jyothi, Mr. Pavan Kumar V
DOI: 10.17148/IJARCCE.2015.4598
Abstract: S. Savage et al. presented the approach that require both the victim and Network Admin[10]. As the packet arrive at the Router the packet is marked probablistically with partial path information. �Post-Morton� is performed by the attackers has the coressponding attack has been completed.
Keywords: IP Spoofing, Intruder, IP traceback, Path table, RBI
Abstract
Clustered Organization for Manets with an Approach to Prevent Black Hole Attack
Shilpa Gopinath, Arun KumarG
DOI: 10.17148/IJARCCE.2015.45100
Abstract: Mobile Ad-hoc Networks are cooperative networks that don�t have a centrally managed fixed infrastructure. As the mobile nodes in these networks have sufficient freedom to move in and out of the network at any time randomly, securitizing of the routing appears to be a challenging task, thereby leaving MANETs open to serious attacks and this raises questions on reliability of these networks. All these characteristics and challenges of MANETs grab the attention of many researchers and engineers. This paper sheds some light on a cluster oriented concept to enhance efficiency of the network and an approach for Black Hole attack detection and prevention.
Keywords: MANETs, Black Hole, routing security, simulation, performance analysis
Abstract
Fingerprint Verification Techniques over Cloud Services
Fazal Noor, Majed Alhaisoni
DOI: 10.17148/IJARCCE.2015.45101
Abstract: Mobile Ad-hoc Networks are cooperative networks that don�t have a centrally managed fixed infrastructure. As the mobile nodes in these networks have sufficient freedom to move in and out of the network at any time randomly, securitizing of the routing appears to be a challenging task, thereby leaving MANETs open to serious attacks and this raises questions on reliability of these networks. All these characteristics and challenges of MANETs grab the attention of many researchers and engineers. This paper sheds some light on a cluster oriented concept to enhance efficiency of the network and an approach for Black Hole attack detection and prevention.
Keywords: MANETs, Black Hole, routing security, simulation, performance analysis
Abstract
A Review on Handover Processes in IPv6 Mobility Management Protocols
Ritika, Dinesh Kumar Verma
DOI: 10.17148/IJARCCE.2015.45102
Abstract: In this paper, fingerprint verification using Distributed Phase Correlation and Normalized Cross Correlation based algorithms are presented. Such algorithms are proposed to be used by Cloud-Computing-Services with Quality of Service (QoS) and Quality of Protection (QoP). Since transfer of raw images are communication intensive, a proposed method is to use 128-bit Encryption for security and privacy of individuals fingerprints and a FBI approved Wavelet Scalar Quantization (WSQ) compression method at the source before transmitting to the destination nodes. Fingerprint scanners from various manufactures have different specifications in image capture size, etc. Standards need to be set on the specifications for image size, storage, transmission, interoperability of various verification algorithms, and protection. Results have shown Phase Correlation method is robust in cases of fingerprints have a shift and/or rotation relative to each other.
Keywords: Cloud Services; Distributed Phase Correlation; Quality of Protection (QoP); Quality of Service (QoS).
Abstract
Bend loss in large core multimode optical fiber beam delivery system
Prof.N.Sangeetha, Santhiya.J, Sofia.M
DOI: 10.17148/IJARCCE.2015.45103
Abstract: We are going to analyze the effect of bend loss in large core multimode optical fiber beam delivery system by varying the core diameter of the fiber, its bend radius and the wavelength of the laser used. By analyzing the bend loss after varying the various parameters for different fibers, the fiber which contributes minimal bend loss is taken for the beam delivery system application.
Keywords: Beam Delivery system, Bend radius, Bend loss, Multimode Optical Fiber.
Abstract
Simulation Environment for VANET
Shifali, Yogesh Juneja
DOI: 10.17148/IJARCCE.2015.45104
Abstract: Vehicular Ad hoc Networks (VANETs) are classified as an application of Mobile Ad-hoc Networks (MANETs) that has the potential in improving road safety and providing Intelligent Transportation System (ITS). But VANET simulation is different from MANETs (mobile ad hoc networks) simulation because in VANETs vehicular environment imposes new issues and requirements, such as constrained road topology, multi-path fading and roadside obstacles, traffic flow models, trip models, varying vehicular speed and mobility, traffic lights, traffic congestion and driver�s behavior. There are different type of simulators that we have used. These simulators are traffic simulators network simulators and combination of both VANET simulator. In this paper, we have studied different type of simulators and their software characteristics, graphical user interface, accuracy of simulation, input requirement output visualization
Keywords: VANET, MANET,V2V, V2I, ITS,RSU.
Abstract
Serial Adder using Reversible Gates
N.Srinivasa Rao, P.Satyanarayana
DOI: 10.17148/IJARCCE.2015.45105
Abstract: Reversible logic gates produce zero power dissipation under ideal conditions. Hence these are preferred for low-power design applications such as Quantum computing and Nanotechnology.Adders, Subtractors and Multipliers are basic building blocks of Digital Circuits. This paper proposes design of serial adder using reversible gates. The important reversible gates used for serial adder are Peres gate, Fredkin gate and Feynman gate. The quantum cost of a reversible logic circuit can be minimized by reducing the number of reversible logic gates.
Keywords: Reversible logic circuits,Quantum computing, Nanotechnology
Abstract
SVPWM controller for three phase UPS system operating under highly non linear load
Prasanna Sagdeo, Vipinkumar Meshram
DOI: 10.17148/IJARCCE.2015.45106
Abstract: The distortion obtained in the Uninterruptible Power Supply (UPS) output due to increasing use of rectifiers in critical loads an effective strategy is needed to control the output of UPS system. Sinusoidal pulse width modulation (SPWM) and space vector pulse width modulation (SVPWM) are the most popular PWM techniques for three phase UPS system. As compared to SPWM, SVPWM is much effective in reducing harmonics and distortions caused by highly non linear loads. In this paper space vector based control strategy is presented for three phase UPS system that are operating under highly nonlinear loads. The proposed controller generates gating signals and guarantees high quality output at the load. SIMULINK is used to design and analyse the controller for three phase ups system
Keywords: UPS, non linear load, Space Vector PWM
Abstract
A Voltage mode biquad with lowpass, bandpass and notch outputs using Voltage Differencing Current Conveyor
Mayank Rawat, Dr. Malti Bansal
DOI: 10.17148/IJARCCE.2015.45107
Abstract: The present work deals with voltage differencing current conveyor and its application in analog circuit design. There have been several major developments in the area of analog circuits which have taken place during the past four decades. There is a bulk of material available about the various active blocks developed past Current Conveyors.Among various modern active building blocks, Voltage Differencing Current Conveyor(VDCC), is emerging as quite flexible and versatile building block for analog circuitdesign. In this paper an attempt has been made to highlight the realization of the VDCC active block using MOSFETs and a VDCC based biquad filterusing three active blocks has also been realized. This VDCC based voltage mode biquad filter gives low-pass, band-pass and notch outputs. The workability of the circuit is supported by PSPICE simulations using TSMC 0.18�m parameters.
Keywords: voltage differencing current conveyor, biquad filter, low-pass, band-pass, notch
Abstract
Cybercrimes, security and challenges
Tahir Hussain Bhat, Afaq Alam Khan
DOI: 10.17148/IJARCCE.2015.45108
Abstract: Cybercrime is a range of illegal digital activities to target an individual or an organization in order to cause harm. The term cybercrime applies to a wide range of attack methods. It can range from mere web site defacements to grave activities such as service disruptions that impact business revenues. The cyber-security assures protection of assets which include data, computers and computer networks. The high level of insecurity on the internet is becoming so much troublesome and transaction on the web has become a thing of doubt. Cyber-security is a necessary consideration for individuals, business, government, military, defence and educational institutions. In this paper, an attempt has been made to provide an overview of cybercrime as a whole and identify different types of crimes. Also we try to find out the casus of these crimes. This paper will focus on exploring who actually is involved in these crimes, how to eradicate cyber crimes and what are the various challenges dealing with cyber crimes. We will also come up with different viewpoints and recommendations in securing the cyber space. With increasing use of information technology (IT) enabled services such as e-governance, online business and electronic transactions protection of personal and sensitive data have assumed paramount importance. The economic growth of any nation and its security whether internal or external and competiveness depends on how well is its cyberspace secured and protected.
Keywords: Cyber-security; Cyber-crime; Threats; Attacks; Hacking.
Abstract
Ultra Wideband Monocycle pulse generation using SRD and Coupled line band pass filter with reduced ringing level
Amol M Sapkal, Dr.Nisha Sarwade, Bhaskar Shelkod
DOI: 10.17148/IJARCCE.2015.45109
Abstract: This paper presents simple ultra wideband monocycle pulse generator by SRD and coupled line band pass filter element values for 0.5dB equal ripple. Proposed design deals with generating Gaussian pulse from square waveform as a input then using high order coupled line band pass filter we get ultra wideband monocycle pulse of 6 mv (p-p) of amplitude and pulse width of 500psec We eliminates use of lumped elements (Inductor, capacitor) and external bias circuit for generation of Gaussian pulse, due to which ringing level is reduced. Simulation is carried out using Advanced design systems (ADS).
Keywords: UWB, SRD, Coupled line band pass Filter, ADS.
Abstract
A Study on Security Attacks And Key solutions for MANETs by Onion Routing
PRIYANKA M S, Asst. Prof. SRIVINAY
DOI: 10.17148/IJARCCE.2015.45110
Abstract: Wireless sensor network is a network which is having sensors used for communication. It plays a vital role in today�s world. The major parts of WSN are Mobile Adhoc Network (MANETs). MANET is having mobile platforms and is freely moving. In MANET the connectivity nodes changes frequently. The MANET network thus needs to be authenticated, where authentication is a form of authorization which gives access to system based on identity.
Keywords: Mobile Adhoc Network (MANETs), On-demand routing protocols, security Mechanisms, Anonymous protocol for MANETs, security attacks.
Abstract
Irrigation System Using a Wireless Sensor Network and GPRS
Suraj S.Avatade, Prof. S. P. Dhanure
DOI: 10.17148/IJARCCE.2015.45111
Abstract: This project probes into the design of the automated irrigation system based on ARM microcontroller. This Embedded project is to design and develop a low cost feature which is based on embedded platform for water irrigation system. Optimum use of water is main objective of this irrigation system to reduce water consumption. This project uses temperature and soil moisture sensors to detect the water quantity present in agriculture and water level sensor for detect water level in tank. Aim of this embedded project is to monitor status of the sensors on remote PC through a web page. Here temperature and soil moisture sensors and water level can be monitored on web page through micro controller. The web-server is connected to the internet. By typing the IP-address on the web browser, the owner gets a web page on screen. This page contains all the information about the status of the sensors and ON/OFF status of the motor.
Keywords: Automation, Internet, Irrigation system, Wireless Sensor Network (WSN).
Abstract
Cost-Effective Privacy Preserving Of Intermediate Data Sets in Cloud by Privacy Leakage Upper Bound Constraint-Based Approach
Abhishek R. Ladole, Prof. Amit M. Sahu
DOI: 10.17148/IJARCCE.2015.45112
Abstract: Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data intensive applications without infrastructure investment. Besides the processing of such applications, a large volume of intermediate datasets will be generated, and frequently stored to save the cost of re-computing them. Though, preserving the privacy of intermediate datasets becomes a challenging problem because adversaries may recover privacy-sensitive information by analysing multiple intermediate datasets. Encrypting all datasets in cloud is widely approved in existing approaches to tackle this challenge. But we dispute that encrypting all intermediate datasets are neither competent nor cost-effective because it is very time overwhelming and costly for data-intensive applications to en/decrypt datasets frequently while performing any operation on them. This paper, proposes a novel upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results exhibit that the privacy-preserving cost of intermediate datasets can be significantly reduced with our approach over existing ones where all datasets are encrypted.
Keywords: Cloud computing, data storage privacy, privacy preserving, intermediate data set, privacy upper bound
Abstract
NC-CLOUD: A NETWORK-CODING BASED DISRTIBUTED STORAGE SYSTEM IN A MULTI-CLOUD
Dr. Mohammed Abdul Waheed, Sushmita BN
DOI: 10.17148/IJARCCE.2015.45113
Abstract: NC-Cloud is a proof of concept prototype of a network coding based storage system that aims at providing fault tolerance and reducing data repair cost when storing storage using multiple cloud storage. To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data with the help of the other surviving clouds to preserve data redundancy. We design a proxy based storage system for fault tolerant multiple cloud storage called NC-Cloud, which achieves reduction in repair traffic for a permanent multi-cloud failure. NC-Cloud is built on top of a network-coding-based storage scheme called regenerating codes. Specifically we propose an implementable design for the functional minimum-storage regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure codes (e.g., RAID-6), but use less repair traffic. We validate that FMSR codes provide significant monetary cost savings in repair over RAID-6 codes, having comparable response time performance in normal cloud storage operations such as upload/download.
Keywords: Regenerating codes, Network coding, fault tolerance, Recovery, Implementation
Abstract
Power Saving in Multimedia Streaming Services in Cloud Computing
Sanjay J.Misal, Dr.S. N. Mali
DOI: 10.17148/IJARCCE.2015.45114
Abstract: In multimedia device power saving control mechanism improves lifetime of device. There are various techniques to reduce power consumption in multimedia devices . Such Systems mainly designed by using ARM controller which supports different features and algorithms for the development of streaming multimedia systems. To enhance the efficiency in developing embedded systems and to reduce burning kernel time, ARM controller is mounted by network file system(NFS) sharing multimedia file. DVFS gives good power control mechanism use different frequencies at different device state. ARM controller is powerful processor and it can be mounted on Linux, android operating systems which gives highly effective and low power system.
Keywords: Multimedia, DVFS, Cloud services.
Abstract
Modified Booth Recoder for Efficient Add-Multiply Operator
Aparna V. Kale, Prof. M. D. Patil
DOI: 10.17148/IJARCCE.2015.45115
Abstract: Modified Booth algorithm has made multiplication easier. It consists of recoding table which has been used to minimize the partial products of multiplier. An adder and the multiplier operator of the unit is combine to form a single add-multiply unit. The fusion of the two operators resulting in Fused Add-Multiply(FAM) operator. In this paper different structured recoding techniques are used to implement the Modified Booth encoder incorporating in FAM. Along with the implementation of recoding techniques, comparison has been done with the existing and the designed Modified Booth recoder.
Keywords: Modified Booth Algorithm, adders, multipliers, add-multiply operation, arithmetic circuits, Xilinx.
Abstract
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud
Ranjana Nadagoudar, Radhika
DOI: 10.17148/IJARCCE.2015.45116
Abstract: A large number of cloud forces require users to carve up private data like electronic health records for data analysis or mining, bringing privacy concerns. Anonymizing data sets via generalization to satisfy certain privacy requirements such as k-anonymity is a widely used category of privacy preserving techniques. At present, the scale of data in many cloud applications increases massively in accordance with the Big Data trend, thereby making it a challenge for commonly used software tools to confine, manage, and process such large-scale data within a adequate elapsed time. As a result, it is a challenge for existing anonymization approaches to accomplish privacy preservation on privacy-sensitive large-scale data sets due to their insufficiency of scalability. In this paper, we propose a scalable two phase top-down specialization (TDS) to anonymize large-scale data sets using the MapReduce framework on cloud. In both phases of our approach, we deliberately design a group of inventive MapReduce jobs to concretely accomplish the specialization computation in a highly scalable way. Experimental assessment results demonstrate that with our approach, the scalability and efficiency of TDS can be significantly enhanced over existing approaches.
Keywords: Data anonymization, top-down specialization, MapReduce, cloud, privacy preservation
Abstract
Background Subtraction for Effective Object Detection and its Parametric Evaluation
Siddhartha A. Meshram, Mr. Vishal Raskar
DOI: 10.17148/IJARCCE.2015.45117
Abstract: Background subtraction is a powerful mechanism for detecting change in a sequence of images that finds many applications. The background subtraction methods apply probabilistic models to background intensities evolving in time nonparametric and mixture-of Gaussians. The main difficulty in designing a robust background subtraction algorithm is the selection of a detection threshold. In this we adapt threshold to varying video statistics by means of two statistical models. In addition to a nonparametric background model we introduce a foreground model based on small spatial neighborhood to improve discrimination sensitivity we also apply a Markov model to change labels to improve spatial coherence of the detections, the proposed methodology is applicable to other background models as well. The strength of the scheme lies in its simplicity and the fact that it defines an intensity range for each pixel location in the background to accommodate illumination variation as well as motion in the background. The efficacy of the scheme is shown through comparative analysis with competitive methods. Both visual as well as quantitative measures show an improved performance and the scheme has a strong potential for applications in real time surveillance
Keywords: Background subtraction, tracking, object detection, surveillance.
Abstract
A QOS Based Routing in Mobile Ad-Hoc Networks
Ronal Benitto Dhas .A, Ruby.D
DOI: 10.17148/IJARCCE.2015.45118
Abstract: With the increasing usage of mobile devices, Mobile ad-hoc network (MANET) has been proven to be an essential part of wireless communication and there are many opportunities for using MANET in real time application. Quality of service is an indispensable for implementing this real time application. Since MANET is infrastructure less network and nodes are moving dynamically, ensuring of QoS parameter like delay, throughput, etc are challenging. In this paper, QoS based routing protocol is proposed with the aim of increasing QoS support in MANET communication. It incorporates following: 1) a Game theory based neighbour selection algorithm to meet the transmission requirement. 2) A packet scheduling algorithm to reduce the transmission delay. 3) A segment resizing algorithm that adjusts the segment size based on the node�s mobility. Analytical results show that the protocol provides good performance in terms of delay and throughput.
Keywords: Mobile adhoc networks, Routing algorithms, Quality of service, Game theory
Abstract
A Survey of Black Hole Detection Techniques in WSNs
Sandeep Kumar, Dr.Suman Sangwan
DOI: 10.17148/IJARCCE.2015.45119
Abstract: Wireless Sensor Networks (WSN) is a trending technology now-a-days and has a wide range of applications such as battlefield surveillance, traffic surveillance, forest fire detection, flood detection etc. But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. Black hole attack is one of severe security threat that affects the network from its normal functioning by maliciously advertising itself having shortest route to the destination and then drops all receiving packets. There are lots of mechanisms have been proposed to defend network from black hole attack, but none of the solution looks most promising to defend against black hole attack. So in this paper, we have surveyed and compared the existing solutions to black hole attacks on AODV protocol. Tabular representation of comparison depicts clear picture of these solutions.
Keywords: AODV, Black hole attack, IDS, Routing
Abstract
Analysis of Threshold Voltage in Nano-Channel Length MOSFETs
Sachin Tyagi, Sunil Kumar, Kumar Abhishek
DOI: 10.17148/IJARCCE.2015.45120
Abstract: This paper presents the simulation results of threshold voltage for Si-based nano channel length MosFet. Simulation results will in between of 180 to 30 nm length of Si-based n-channel MosFet according to constant theory of voltage scaling. The structure of this MosFet is lightly doped drain which reduces to electric field magnitude and effect on short channel at drain region. In this paper, we analyzed the threshold voltage of these type devices and this analysis will provide some applicable limitations inside at ICs and used for basis data at VLSI Circuit design methodology.
Keywords: VLSI, MOSFE, LDD.
Abstract
Study of factors effecting to getting internship to Second/Third year students: A data mining Approach
Ashish Pant, DevendraKushwaha, JitendraMaurya
DOI: 10.17148/IJARCCE.2015.45121
Abstract: The main concerns of any higher educational system is evaluating and enhancing the educational organization so as to improve the quality of their services and satisfy their customer�s needs. This is an attempt to find suitable predication techniques using data-mining tool called WEKA.As the second and third year is very important for the engineering student cause after this a student go out for internship and get experience in his field. So we are trying to evaluate the factors for getting internship after 2nd year or 3rd year and if he is not been a better chance to get internship so he can work in the field in the third year. So the education institute can check his student performance and give student the notification that he has to do such work and have to work hard to increase his performance. The process of finding a suitable prediction algorithm was also described.
Keywords: Classification, Prediction, Student performance,data mining.
Abstract
An Approach for Restoring Occluded Images for Face-Recognition
Sandesh V Khamele, Shyamal G Mundada
DOI: 10.17148/IJARCCE.2015.45122
Abstract: The Systems that rely on Face Recognition (FR) biometric have acquired great importance ever since terrorist threats injected weakness among the implemented security systems. Rest biometrics as iris or Fingerprints recognition is not trustworthy in such situations whereas FR is considered as a better compromise. In Image processing, Occlusion refers to facade of the face image which can be due to hair, moustache, sunglasses, or wrapping of facial image by scarf or other accessories. Efforts on FR appears in controlled environment have been in the picture for past several years; however identification under uncontrolled condition like partial occlusion is typically quite a matter of concern. Based on review of literature and its analysis so far, a classification made in this paper to solve the challenges in recognition of face in the presence of partial occlusion. The methods used are INPAINTING based methods that make use of Exemplar-based Inpainting, Feature-Extraction, and Fast Weighted-Principal component analysis (FW-PCA),etc. The presented approach in this paper describes the removal of Occlusion from images or restore the occluded part of image using Exemplar-based Image Inpainting technique, feature extraction and FW-PCA(Restoration) combinations.
Keywords: Occlusion; Image Inpainting; Exemplar based inpainting technique, Face-detection, Feature extraction, Image Restoration, FW-PCA
Abstract
A Proposed Approach to Classification and Novel Class Detection in Data Streams
Ms. Rimjhim Singh, Manoj. B. Chandak
DOI: 10.17148/IJARCCE.2015.45123
Abstract: In the field of data mining, data streams play an important role. In order to make intelligent use of data streams, first we need to handle them properly. The notation data stream itself represents the nature of such data. They possess the property of being dynamic and continuous in nature. That is the data keeps on changing the features and properties with time. Due to the above mentioned properties of data streams, various challenges are posed by them to researchers. These challenges are infinite-length, concept-evolution, feature-evolution and concept-drift. Infinite-length is due to the continuous nature of data. Concept-evolution is due to the new emerging classes. Concept-drift is due to the drifting concept of the stream and feature-evolution is there because of the changing features. These challenges have been well studied by various researchers and they have proposed various approaches to handle them. In this paper we also try to propose a strategy based on strings to handle the problems of infinite-length, concept-evolution and concept-drift.
Keywords: mining, novel, concept-drift, concept-evolution
Abstract
A Sepic Converter with Linear Transformer and Ripple Free Output for Wide Range Input Applications
Kirthi.C.S, Karthik.Sitapati
DOI: 10.17148/IJARCCE.2015.45124
Abstract: A linear transformer based SEPIC converter with ripple free output is proposed in this paper. The topology utilizes a linear transformer in order to obtain optimized magnetics The conventional power factor correction(PFC) single ended primary inductor converter(SEPIC) topologies proposed so far have achieved low conduction losses and reduced input ripple current but they have failed to achieve optimized magnetics.. In addition input current ripple and the voltage stresses across the switches is reduced by utilizing a clamping capacitor across the switch. A detailed analysis is carried out on MATLAB/SIMULINK platform and the various results are tabulated and analyzed. The hardware prototype model of proposed topology is designed and implemented for the input voltage of 24/55 v DC for which the expected output voltage 150v DC with the circuit efficiency of 94% is achieved.
Keywords: power electronics, power factor correction (PFC), bridgeless converter, single ended primary inductor converter (SEPIC)
Abstract
SWARRECOG- THE EUPHONY AIDE
Shreyash Bardia, Krishnakumar Natthani, Sachin Rawool and Sakshi Kukreja
DOI: 10.17148/IJARCCE.2015.45125
�� A b s t r a c t : A l m o s t e v e r y o n e i s i n t e r e s t e d i n l e a r n i n g m u s i c . B u t d u e t o l a c k o f k n o w l e d g e a b o u t m u s i c , t h e y a r e u n a b l e t o m a k e i t h a p p e n . I t i s w h e r e t h i s s y s t e m c o m e s i n t o p i c t u r e . T h e S w a r R e o r g a n i z a t i o n S y s t e m w i l l h e l p m u s i c i a n s a s w e l l a s m u s i c e n t h u s i a s t s t o h a v e n o t a t i o n s o f a s o n g o n - t h e - g o w h i c h i n t u r n w i l l e l e v a t e t h e i r m u s i c l i t e r a c y . T h e n e e d a s y o u k n o w i s w e l i v e i n a d i g i t a l e r a w h e r e a l m o s t e a c h a n d e v e r y t h i n g w e u s e t o i n t e r a c t w i t h e a c h o t h e r i s d i g i t a l i z e d . T h e m a i n m o t i v e b e h i n d i t b e i n g c o m p u t e r i z e d i s t h a t i t w i l l h e l p m u s i c i a n s a n d m u s i c e n t h u s i a s t w i t h a n o p p o r t u n i t y t o r e c o r d , l e a r n a n d s h a r e t h e i r i d e a s w h e n e v e r a n d w h e r e v e r r e q u i r e d i . e . p r o v i d i n g p o r t a b i l i t y w i t h i t w h i c h a s w e a l l k n o w i s t h e m o s t v i t a l a n d r e q u i r e d f u n c t i o n o f a s y s t e m t h e s e d a y s , a s y o u r s y s t e m m o v e s w i t h y o u . K e y w o r d s : S W A R R E C O G , s r a n g +i n
Abstract
Genetic Algorithm based Optimal Allocation of Distributed Generators for Maximizing the Benefits
Madhuri Hombal, Rekha C M
DOI: 10.17148/IJARCCE.2015.45126
Abstract: This paper proposes a Genetic Algorithm (GA) optimization technique for optimal allocation of Distributed Generators in the distribution network to maximize the benefits to the Local Distribution Company(LDC), as well as the customers connected to the system. The suggested methodology programmed under MATLAB software, helps to identify the optimal buses on which to connect these DG units. The benefits which are considered in this paper are postponement of upgrade investments, reduction of the cost of energy losses and reliability improvement. The implementation of the algorithm is illustrated on a 39-bus test system.
Keywords: Distributed Generation, Distribution system, Genetic Algorithm
Abstract
Secure Interoperation Model for Different User Authentication System using Multi Level Security (MLS)
Muthukumaran T
DOI: 10.17148/IJARCCE.2015.45127
Abstract: Service Oriented Architecture (SOA) is more important concept for secure sharing of information or services accessing among distributed environments. It comes from the idea of Object Oriented Architecture and it also adopted with web service technologies. Sharing the services among two or more different distributed domains or within their subdomains, there is a need for secure interoperation among those systems when they access, sending, and retrieving data services. This is most important and challenging issue nowadays in every distributed environment. For example, consider three different university domains having different characteristics and policies sharing their resources among them in a distributed environment. Integration among the domains varies based on the trust relationship among them by specifying the access rights. Some domain may give full access rights to their trusted domains based on the trust relationship and some may give partial access. The issue here is user may have the chance to access the data from un-trusted domain through their trusted domains. The idea behind the paper is to protect and enhance the secure way of communication among the domains by introducing the Multi Level Security (MLS) Method and Two Server Password Authentication for high assurance security. The Token key and Two Server Password Authentication Key Exchange Manager which prevents the untrusted users access the services through their trusted domain. The proposed architecture also improves the security of the interoperation using trusted web server. It assured by path authentication and authorization which also can reject the un-trusted users from security misuse.
Keywords: service oriented architecture (SOA), web service technology, secure interoperation, multi level security (MLS), Identity Management.
Abstract
Software Improvement Model for small scale IT Industry
T.B. Patil, S.D. Joshi
DOI: 10.17148/IJARCCE.2015.45128
Abstract: Over the years, the software development has evolved from just being science to a combination of �art� and �science�. Today�s software progress environment, follow lifecycles with phases that are either sequential or parallel in execution. The software process is a set of actions, methods and transformations that people use to develop and maintain software and the associated products, for example: product plans, blueprint, code, test cases and user manuals. This paper presents a methodology for assessing software processes which assist the activity of software process improvement in small organizations. There is an effort to address issues such as the fact that: (i) process assessment is expensive and typically requires major company resources and (ii) many light assessment methods do not provide information that is detailed enough for diagnosing and improving processes.
Keywords: Design Phase, Implementation Phase, KPA, Planning Phase, Security Phase, Six Sigma, Software Metric
Abstract
A Survey and Comparison of Various Cloud Simulators Available for Cloud Environment
Ramandeep Kaur, Navtej Singh Ghumman
DOI: 10.17148/IJARCCE.2015.45129
Abstract: Cloud computing is new technology with its ease of access and a variety of applications. If offers various types of services to the user, such as software as a service, platform as a service and hardware as a service or infrastructure as a service. The deployment of real cloud for commercial use is quite expensive. Therefore, various kinds of simulators such as CloudSim, GroudSim, CDOSim, GreenCloud are available in the market for cloud environment. In this paper, we have done a study and analysis of various simulators available for cloud computing.
Keywords: Cloud Computing, Services, Features, Advantages, Cloud Simulator, Comparison
Abstract
A Study on Image Enhancement Techniques
Pooja Rana, Vinay Chopra
DOI: 10.17148/IJARCCE.2015.45130
Abstract: The purpose of image enhancement is to make images better than the original so that they become clearer and they can be easily interpreted. The image enhancement techniques may have spatial domain or frequency domain. But the researchers have proved that frequency domain techniques are better than spatial domain techniques. Today optimization algorithms are used in the approach used for image enhancement. This paper reviews the various image enhancement techniques.
Keywords: DWT, SVD, CLAHE, DCT, Cuckoo Search Algorithm, Bacterial Foraging Optimization Algorithm
Abstract
Performance Analysis of 16 × 2.5Gb/s FSO System for the Most Critical Weather Conditions
Aneet Kaur, Anu Sheetal
DOI: 10.17148/IJARCCE.2015.45131
Abstract: Free space optics (FSO) uses air as a transmission medium and is significantly affected by the various weather conditions such as haze, rain, fog, snow, wind, etc. In this paper, the behaviour of 16 � 2.5Gb/s FSO system under the effect of the most critical weather conditions using RZ format has been investigated. The operating channel frequencies range from 193.4THz to 189.7THz with the frequency spacing of 100GHz.The performance of the 10th channel has been considered being the worst case scenario to analyse the system. The FSO system is evaluated by varying attenuation from 4.2850dB/km to 116dB/km under different weather conditions. It has been found that as attenuation increases the performance drastically degrades owing to scattering, absorption, free space path loss, geometric losses and other losses suffered by the FSO system. The faithful transmission distance achieved is 9000m in clear weathers and has reduced to 2000m and 100m in case of heavy rain and dense snow respectively. Further, it is shown that channel 2 operating at 193.16THz, gives best results for the FSO system at 40Gb/s where the highest value of Q factor is 29.16dB and OSNR is 80.060dB and 4.9dB value of OSNR for heavy rain has been achieved thus, dense snow, fog and heavy rain are the worst weather conditions which intensely degrade the performance of FSO system.
Keywords: BER, RZ, MZM, Q-Factor, FSO,PD
Abstract
Weapons and Explosives Information Tracking and Alerting System: A Real-Time Approach
Moses O. Onyesolu, Macdonald N. Onyeizu, Celestine. O. Uwa, Charles. O. Ugwunna
DOI: 10.17148/IJARCCE.2015.45132
Abstract: One of the teething concerns of government is the security of the citizens of the country. It is no news to say that individuals who do not have licenses gain access to ammunition and weapons. Suffice to say that inadequacy in the management of weapons especially those kept in the stockpiles has been identified as a major contributing factor. Poor stockpile management of weapons results in the deterioration of ammunition leading to an unsafe environment for citizenries. Conversely, the safe, efficient, and effective management of national stockpiles of conventional ammunition and explosives would enhance military and police capabilities and also reduce threat and fear of unwanted explosions. The main idea of this work is to study the national weapon and ammunition stockpiles and develop an effective system with real-time features to enable countries have effective mechanism to keep track of their weapons, ensuring safe storage and reduce risks of illegal theft of weapons and identifying losses quickly. This work will serve as an effective element for counter-proliferation and ensuring the safety of explosives. The real-time feature of the system will help in identifying weapons and explosives that require maintenance. However, pre-information on weapons and ammunition expiry date and shelf-life will be notified by the system. Finally, legal weapons recovered from crime scene would be run an instant check to know the personnel officially assigned to it/them.
Keywords: Ammunitions, Armoury, Explosives, Personnel, Real-time, Shelf-life.
Abstract
A Review on Optical Fiber Long Period Grating, its applications in Optical Communication System
Mr.Puneet Sehgal, Ms Himani Dua
DOI: 10.17148/IJARCCE.2015.45133
Abstract: Innovations in optical fiber technology are revolutionizing world communications. As we can se that optical fiber long period grating can be used in designing of devices which are used to meet the growing demands for various ranges in the field of optical communication systems. Thus, this paper deals with the descriptive study of long period fiber grating (LPG) and its applications in emerging field of optical communication systems. LPG forms an important component of optical communication. The paper covers the analysis of long fiber grating and their fabrication. This paper also deals with the cladding mode analysis of the fiber which describes the inaccuracies of two layer model of the fiber and implementation of three layer fiber geometry to calculate the effective refractive index of the fiber so that it can effectively couple the signal for its efficient transmission. In the cladding mode analysis the whole mathematical derivation along with the requisite mathematical expressions are explained to find the effective refractive indices of the various cladding modes being supported by the fiber which are used to plot the transmission spectrum of the LPG designed for a particular frequency or wavelength used for telecommunication purposes.
Keywords: Optical Fiber Communication, long period Grating, Optical Filter, coupled mode equations, LPG fabrication.
Abstract
An Efficient Brain Image Classification Using Probabilistic Neural Network and Tumor Detection Using Image Processing
Kshitija V. Shingare, N. D. Pergad
DOI: 10.17148/IJARCCE.2015.45134
Abstract: The brain is the frontal part of the central nervous system. Brain tumor is an irregular growth caused by cells reproducing themselves in an uncontrolled manner. Brain tumor is may be serious and critical because of space formed inside the skull. So detection, diagnosis and evaluation of brain tumor are an important task in earlier stages. Brain tumor detection helps in finding the exact size and location of tumor. In this paper an efficient algorithm is proposed for brain tumor detection & identification using image processing and classification is done using Probabilistic Neural Network Techniques. These techniques use the MRI Scanned Images to detect the tumor in the brain. Probabilistic Neural Network with radial basis function will be used to implement an automatic Brain Tumor classification. Decision making was performed in two stages: feature extraction using GLCM and the classification using PNN network. The performance of this classifier was calculated in terms of training performance and classification accuracies. The simulated results shown that classifier and segmentation algorithm provides better accuracy than previous methods
Keywords: Brain Tumor; MRI; Probabilistic Neural Network; GLCM: Classifier; Segmentation
Abstract
Channel Estimation Techniques in MIMO-OFDM Systems – Review Article
Raspinderjit Kaur Kahlon, Gurpreet Singh Walia, Anu Sheetal
DOI: 10.17148/IJARCCE.2015.45135
Abstract: Recent mobile telecommunication systems are using MIMO collective with OFDM, which is well-known as MIMO-OFDM, to offer robustness and higher spectrum efficiency. The most important challenge in this scenario is to achieve an accurate channel estimation to identify the information symbols, once the receiver must have the channel state information to balance and process the received signal. The main objective of this paper is to study various techniques and analyze for channel estimation in MIMO-OFDM systems.
Keywords: MIMO-OFDM, channel estimation, LS, MMSE, interpolation, LS-Spline
Abstract
Optimization of the Digital Radio Mondiale Receiver Software Implementation to Support Digital Radio Mondiale Plus on DSP
Bharatha H P, P Nagaraju
DOI: 10.17148/IJARCCE.2015.45136
Abstract: Digital Radio Mondiale is a standard for digital radio broadcasting. To reduce number of cycles consumption, optimization is done to different modules of the current software implementation of the DRM receiver. Profiling is done to all modules. Cycle intensive modules are identified and optimized by using intrinsics. Correlation function achieved optimization with overall ~69% reduction, resample module achieved optimization of ~91.03% reduction, base band filter achieved ~47% reduction and signal presence tacking module optimization resulted in ~49.5% reduction. There is no degradation in the sensitivity of the receiver after optimization. Optimization has brought improvement in the processing time.
Keywords: Digital Radio Mondiale (DRM), Million Cycles per Second (MCPS), Intrinsic, Profiling
Abstract
I2MMS: An Interactive Multi Modal Visual Search Technique
Yojana S. Pawale, P. R. Devale
DOI: 10.17148/IJARCCE.2015.45137
Abstract: Now days, image searching technique is popularized on mobile phones where mobile users search and find desired images through their mobiles. But it is not easy to find desired image through mobile, because mobile phone� screen is too small to display full image. It is also difficult for users to provide input on mobile phones to find targeted image. Hence, by considering all these issues, we have developed one image searching technique called � I2MMS: An Interactive Multi Modal Visual Search Technique. In text based technique, if user provides lengthy queries to find desired image then it will be difficult for system to process that whole query and provides desired images to users and also not user friendly. Hence, we have proposed a new technique for image searching where system accepts multimodal input that can be voice, text and image. This system is useful in a case where users do not know exact name of an image but by describing it using either text or speech or by providing any other relevant image, users can easily find targeted image. The ANN technique is also added into it to increase the performance of the system. The system works in three phases- 1) Image Composition, 2) Image Processing, 3) ANN. Lastly, before providing images to users as an output, images are divided into two sets- positive and negative. All relevant images are present in positive set and non relevant images are present in negative set. Lastly images present in positive set are provided to the user as a final output. Hence our approach improves the quality of image searching technique and provides easy way to finds targeted image.
Keywords: Image Processing, Artificial Intelligence, Content Based Image Retrieval, Multimodal Input
Abstract
A Survey on Context-Aware Middleware
Chitra G. Sahu, Dr. D. S. Adane
DOI: 10.17148/IJARCCE.2015.45138
Abstract: The middleware deals with different functionality such as service discovery, asynchronous messaging, publish/subscribe event management,managingand storage of context information, constructing the user interface and management of the local and network resources. Also, it allows controlling the connectivity of the device; the middleware is proficient to switch traffic from one network connection to another. In this literature review paper, we are presenting the experience of several research papers related to the next generation of middleware systems. Our work is concerned with providing basic understanding about the current requirements of mobile computing systems and how they can be achieved by modifying the existing middleware systems. Initially, we have defined Mobile Computing, its functions and different Mobile Platforms. Further, we have defined middleware and described its common features. Purposely, we have indicated the major challenges in mobile computing systems and analyzed the requirements of mobile computing. Following this, we review the different categories of mobile middleware technologies and show their relative strengths and weaknesses. On a broader perspective, we have tried to identify the major requirements for context-aware middleware systems and discussed how context-aware middleware can resolve the major issues in the development of application for pervasive computing. Also, we have highlighted the latest trend in context-aware computing; Internet of Things (IoT).
Keywords: Mobile Computing; Middleware; Context-Aware Middleware; Internet of Things.
Abstract
Fg Captcha Advanced
Rohith S Aggithaya, Samraddha, Rakshith M, Karthik Kumar M B
DOI: 10.17148/IJARCCE.2015.45139
Abstract: A CAPTCHA (an acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used in computing to determine whether or not the user is human. Most existing CAPTCHAs are text-based. The user is presented with visually distorted text and asked to type it in correctly to prove he or she is a human and not a computer. Due to recent developments in technology, users are rapidly adopting smartphones, tablets, and other non-traditional smart computing devices in lieu of desktop and laptop computers. Many mobile devices lack a physical keyboard, which makes text-based input cumbersome and error-pron. Further, most text based CAPTCHAs are (English) language-dependent and not suitable for multilingual worldwide usage. Some researchers have proposed alternatives to character recognition, in the form of image recognition CAPTCHAs which require users to identify simple objects in the images presented. The unique touch screen technology of mobile devices can be leveraged to create an additional layer of security that is both effective and user-friendly. Fg CAPTCHA proposes a novel image-based CAPTCHA that combines the touch-based input methods favoured by mobile devices with genetically optimized face detection tests to provide a solution that is simple for humans to solve, ready for worldwide use, and provides a high level of security by being resilient to automated computer attacks. It provides a set of embedded images, some of which are photographs of real human faces and others which are cartoons, sketches, or photos of animals representing face-like images to make correctly detecting human faces challenging for computers, complex background pattern designed to confuse the automatic face detection software, thereby increasing the false positive detection rate and a set of visual distortion types (e.g., blurring, contrast adjustment) and the amount of distortion to apply. The proposed genetically optimized fg CAPTCHA works efficiently on both touch screens used by tablets and smartphones and on traditional computers, achieving a high 88% human accuracy rate during evaluation. It does so without compromising performance, offering an effective 0% automated attack rate.
Keywords: fgcaptcha, existing captcha, newly added features in fgcaptcha , advantages of fg captcha.
Abstract
Performance Evaluation of Steganography and AES encryption based on different formats of the Image.
Farhan R. Patel, Dr. A. N. Cheeran
DOI: 10.17148/IJARCCE.2015.45140
Abstract: During the recent times, there has been tremendous growth in transfer of data across the globe which ultimately has boosted data communication over the computer networks. For any data communication network, the information content security of the messages is of prime concern. Steganography and Cryptography are two different data hiding techniques. Steganography puts a cover onto the messages by some other form of digital media whereas Cryptography on the other hand performs the encryption of the message. In this paper, we present a combination of both these techniques wherein the text is first hidden into some form of cover image using Least significant bit (LSB) hiding method and then encryption using Advanced Encryption Standard (AES) is performed on to the stego image. The combination of both these algorithm will certainly ensure high degree of security, integrity, capacity and robustness to the embedded data. Using GUI based MATLAB simulation, a comparative analysis is being made by employing different formats of the images for learning variations in performance evaluation parameters such as delay, Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and Absolute Mean Square Error (AMSE). The objectives of this paper are to provide security against visual as well as statistical attacks and to ensure better quality of received information.
Keywords: Steganography, Cryptography, LSB hiding, AES encryption standard, Human Visual System (HVS), PSNR, MSE, AMSE.
Abstract
Automotive Crash Insight using AMR Sensor System
Sreevishakh. K.P, Prof. S.P. Dhanure
DOI: 10.17148/IJARCCE.2015.45141
Abstract: Road traffic accidents (RTAs) have turned out to be India�s biggest emerging challenge. Road safety is an issue of global concern on human life and property. In India more than1,37,000 people were killed in road accidents in 2013 alone, which is greater than the number of people killed in all our wars put together. The main aim of this work is to develop an inexpensive and efficient accident prediction and intimation system based on the concept of inherent magnetic feature of vehicle bodies to provide crash insight to vehicles. Anisotropic magneto-resistive (AMR) sensors which are optimized to work in the Earth�s magnetic field range and sonar or ultrasonic sensors are adopted for development of the proposed sensor system. AMR sensors are used to measure the magnetic ?eld disturbances caused by vehicles to Earth�s inherent uniform magnetic field and to get presence and relative position of vehicles. AMR sensors are able to work at small inter-vehicular distances down to 0 meter having high refreshment rate and highly inexpensive and compact. Achieving zero road accidents is practically impossible, but with the help of effective accident prediction and noti?cation, we can reduce the severity to the minimal level. Here we integrated GSM and GPS based noti?cation system which will be providing the timely intimation including the crash location to the nearby police station or hospitals which will ensure post-trauma medical care within minimum time. Accident severity and vehicles involved can also be predicted by the proposed system. A brief review on technologies to predict the collision between vehicles and notification systems are also covered in this paper.
Keywords: Accident prediction, Notification, Magnetometers, AMR, Intelligent transportation system.
Abstract
Efficient Framework of e-Government for Mining Knowledge from Massive Grievance Redressal Data
Sangeetha G, Manjunatha Rao . L
DOI: 10.17148/IJARCCE.2015.45142
Abstract: With the massive proliferation of online applications for the citizens with abundant resources, there is a tremendous hike in usage of e-governance platforms. Right from entrepreneur, players, politicians, students, or anyone who are highly depending on web-based grievance redressal networking sites, which generates loads of massive grievance data that are not only challenging but also highly impossible to understand. The prime reason behind this is grievance data is massive in size and they are highly unstructured. Because of this fact, the proposed system attempts to understand the possibility of performing knowledge discovery process from grievance Data using conventional data mining algorithms. Designed in Java considering massive number of online e-governance framework from civilian�s grievance discussion forums, the proposed system evaluates the effectiveness of performing datamining for Big data.
Keywords: component; e-governance, data mining, grievance redressal, knowledge discovery.
Abstract
Cloud Based Solutions to Safeguard Data Transfer
Uma I Guranagoudr, Kumar H R, VivekBongale
DOI: 10.17148/IJARCCE.2015.45143
Abstract: With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving. However, some data might be sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. On the other hand, a secured query service should still provide efficient query processing and significantly reduce the in-house workload to fully realize the benefits of cloud computing. We propose the Random Space data perturbation method to provide secure and efficient range query and kNN query services for protected data in the cloud. This combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries. It also preserves multidimensional ranges, which allows existing indexing techniques to be applied to speedup range query processing.
Keywords: query services in the cloud, privacy, range query, kNN query.
Abstract
Network Reconfiguration For Loss Reduction Of A Radial Distribution System
Laxmi. M. Kottal, Radhika priyadarshini, Dr R Prakash
DOI: 10.17148/IJARCCE.2015.45144
Abstract: By using network reconfiguration process many distribution system problems can be solved such as planning, energy restoration and loss minimization. This paper describes about loss reduction in a radial distribution system by doing network reconfiguration using new algorithm i.e. Gravitational Search Algorithm [GSA].GSA considers all the objectives in order to meet the reliability requirements. And because of this the processing time can be reduced also the quality of solution can be improved. The proposed approach has been applied to distribution test systems including IEEE 33 system.
Keywords: Network reconfiguration; distribution system; loss minimisation; gravitational search algorithm.
Abstract
Evaluating TORA, GRP and OLSR under Voice-IP Telephony Traffic Using OPNET
Gurjeet Singh, Gurbhej Singh
DOI: 10.17148/IJARCCE.2015.45145
Abstract: MANET is a self-organizing and self-configuring network in which mobile nodes communicate with each other with the help of wireless connection. In A mobile ad-hoc network, links between nodes change very quickly because every mobile node in network has a full freedom to move in any direction. There is no need to define the path between any nodes. There are basically three types of protocols used for the communication between the nodes Reactive, Proactive and Hybrid. In this paper routing protocols GRP, OLSR and TORA are compared in Ad-hoc network on the basis of parameters delay, throughput and network delay. In this paper OPNET Modeler 14.5 is used for simulation.
Keywords: MANET,TORA,GRP, OLSR, OPNET,Voice IP Telephony
Abstract
Simulation and Performance Evaluation of Energy-Efficient Routing Protocol in self-organised MANET’s
P.P.Kotekar, Prof. D.G.Chougule
DOI: 10.17148/IJARCCE.2015.45146
Abstract: Mobile ad hoc network is a collection of wireless node and this network is self-organising and configures multi-hop network. Basically each mobile node will be operated on battery. So for transmission and reception it will consume the nodes energy. Because of limited power it will drain faster. So to provide energy-efficient route between source and destination, the routing protocol must consider the residual energy of the node. In this paper, we first introduce an energy model to calculate the energy of the node than we propose the energy-efficient routing protocol by modifying the packet structure of AODV protocol. The performance of proposed protocol is analysed by using performance metrics that is routing overhead, energy consumption, end to end delay and packet delivery ratio.
Keywords: mobile ad hoc network, multi-hop, AODV, unicast.
Abstract
Achieving Security and Data Privacy for VANET using X.509 Certificates
Sowmyashree H, Sharmila K.P
DOI: 10.17148/IJARCCE.2015.45147
Abstract: Vehicular ad hoc networks (VANETs) are emerging as functional technology for providing a wide range of applications to vehicles and passengers. Ensuring secure functioning is one of the prerequisites for deploying reliable VANETs. However, the open-medium nature of these networks and the high-speed mobility of a large number of vehicles harden the integration of primary security requirements such as authentication, message integrity, non-repudiation, and privacy. Vehicular ad hoc networks (VANETs) enable vehicles to communicate with each other and with roadside units (RSUs). REACT system that takes advantage of the RSUs that are connected to the Internet and that provide various types of information to VANET users. REACT faced a problem of delay, hence an enhanced version of REACT is proposed called M-REACT. In M-REACT focuses on making the proposed system more scalable in terms of the number of users that can connect to an RSU. M-REACT provides the security for data and scheduling mechanism of RSU divided into number of time slots. Public key cryptography or public key certificate is about a set of techniques that together combine in a particular system to enable secure communication. This work aims to promote the use of x.509 certificate due to its ability to reduce security risks. The results are compared to those of another system, its feasibility and efficiency.
Keywords: service oriented vehicular ad hoc network, x.509 certificate, road side unit (rsu), security, m-react, public key infrastructure.
Abstract
Hybridized Approach for Lossless Image Compression
Malwinder Kaur, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.45148
Abstract: The lossless compression is that allows the original data to be perfectly reconstructed from the compressed data. The main objective of image compression is to decrease the redundancy of the image data which helps in increasing the capacity of storage and efficient transmission. . Image compression plays an important role in computer storage and transmission. The purpose of data compression is that we can reduce the size of data to save storage and reduce time for transmission. Image compression is a result of applying data compression to the digital image. The paper presents a lossless image compression technique using the hybridization of two different entropy coding techniques. Initially data folding technique has been applied to the image. A row folding is applied on the image matrix followed by a column folding. Multiple iterations of this process is applied on the image. After completing the data folding process another entropy coding technique known as arithmetic coding has been applied to the resultant image to get better results.
Keywords: Lossless image compression, data folding, arithmetic coding, compression ratio.
Abstract
Design, development and Performance Analysis Of 8-point FFT chip using VHDL for OFDM Applications
Amit Saini, Sanjay Singh, Vijaya Bhandari
DOI: 10.17148/IJARCCE.2015.45149
Abstract: In several wired and wireless applications high-speed performance is required, which is only possible by using conventional multi-carrier transmission techniques, but this will results in the lowering of spectrum efficiency. So, in such applications the principle of Orthogonal Frequency Division Multiplexing (OFDM) is used. This paper gives the details of the design, development and performance analysis of 8-point FFT algorithms to be used in OFDM systems based on the IEEE 802.11a standard for WLAN. Generally, the inverse Fast Fourier Transform (IFFT) and Fast Fourier Transform (FFT) operations are used as the modulation and demodulation in the OFDM systems, and the sizes of FFT/IFFT are varied in various applications of OFDM systems. Actually, in the complete architecture of OFDM system, all the mathematical manipulations take place in IFFT & FFT blocks while remaining blocks convert the data from one format to another format. VHDL programming language is used to develop the design and synthesized on Virtex-5 FPGA in Xilinx 14.2 software and Modelsim 10.1 is used for functional simulation.
Keywords: Fast Fourier Transform (FFT), Inverse Fast Fourier Transform (IFFT), Orthogonal Frequency Division Multiplexing (OFDM), Hardware Description Language (HDL).
Abstract
Engineering Admission Counseling
Akshay Mantri, Naina SRohra, Naman Verma, Nikita Gaikwad, Prof. Sachin Godse
DOI: 10.17148/IJARCCE.2015.45150
Abstract: Education is indispensible for human. Without education one cannot survive in this world. Every year many student land up in wrong colleges because of lack of information. If a system be devised which can provide them proper college information then a number of students taking admission in wrong colleges can be minimize. This system will also provide prediction for the next or future year cutoff list.
Keywords: Admission Process, Admission Counseling, Ant Algorithm, Web Portal for Engineering Admission, Linear Regression.
Abstract
Modelling of Fuzzy Based Handoff Decision Controller
Honey Soni, Vaishali Sood, Anu Sheetal
DOI: 10.17148/IJARCCE.2015.45151
Abstract: Handoff plays a pivotal role in wireless communication. It is responsible for providing seamless communication between Base Stations (BSs) when user moves from one cell to another. An accurate handoff decision is very hard because at the cell boundary Mobile Terminal (MT) experiences signal from serving BS as well as from neighbouring BSs. In this situation MT fluctuates between BSs due to which unnecessary handoffs occur and demean the signal quality, which is not acceptable. As an attempt in this direction, a fuzzy logic based controller is developed in this paper to reduce the number of unnecessary handoffs. With the advantage of feedback technology, this controller deals with the impact of indeterminable changes in the received signal strength (RSS) as the user moves. This controller helps to take an accurate decision only when handoff is needed. Simulation results reveal that the proposed controller reduces handoff probability and number of unnecessary handoffs.
Keywords: Fuzzy Logic, Handoff Decision, Cellular Networks, Received Signal Strength.
Abstract
Study of Various Components for Detection of Various Parameters in Electrical Generator
Yeshudas Muttu
DOI: 10.17148/IJARCCE.2015.45152
Abstract: The paper focuses on use of various sensors & other components used for detection of various parameters of generator like temperature detection, smoke detection, water level detection & theft detection. The proposed method helps the electrical power generator to work efficiently. The approach uses wireless communication to check to conditions of various backup generators on site. The system works efficiently with use of RF module & action of microcontroller. Thus, the centralised system will connect itself with others present on site.
Keywords: LM35, Wireless module, LCD, Generator, Relay.
Abstract
Technical View of the Super Resolution using Registration, Interpolation and Restoration
Kritika, Vedant Rastogi
DOI: 10.17148/IJARCCE.2015.45153
Abstract: In the paper the most efficient model to implement super resolution using discrete wavelet transform is shown. The model is a three step process of image registration, interpolation and noise filtering using DWT. All the process is explained and simulation result is presented to prove the theory.
Keywords: LowResolution, Highresolution, Superresolution, Registration, Interpolation, Restoration, DWT.
Abstract
High efficiency switched boost inverter within tegrated closed loop control for photovoltaic based applications
Sushma H R, Harsha Anantwar
DOI: 10.17148/IJARCCE.2015.45154
Abstract: In order to supply the power from photovoltaic system or solar panel at a low voltage to a grid at high voltage, a power electronic converter is required which must be capable of both voltage boosting and inversion. Newly introduced Switched boost inverter is a single stage dc-ac power converter whose output voltage can be either greater or less than its input dc voltage and is capable of achieving both these objectives. This converter can supply both ac and dc loads simultaneously which makes it suitable for micro grid applications. This converter allows the switching shoot through switching state of the inverter legs for boosting the input voltage and compensates the dead time effects and avoid the risk of damaging the converter. In this paper principle of operation of switched boost inverter is explained in detail. Also pulse width modulation control strategy for switched boost inverter is formulated and implemented using simple analog circuit.
Keywords: Switched Boost Inverter (SBI), pulse width modulation (PWM), Photovoltaic source (PV).
Abstract
An Overview of Recent Trends in IoT
Kuljeet Kaur, KiranMehta
DOI: 10.17148/IJARCCE.2015.45155
Abstract: The necessity of getting data from every real world entity with the help of embedded sensors, communicating network and remote management resulted in the emergence of Internet of Things, acronymed as IoT. The term IoT, coined by IBM differs from IoE(Internet of Everything) in terms of advancement and interoperable technologies. IoT deals with a network of similar devices such as those of smart phones whereas IoE constitutes network of all smart devices like smart TV, smart AC, smart phone etc. Just like humans, any device with a sensor or machine can communicate in the network with the help of Internet. Thus, huge data gets generated in fraction of seconds, which can be stored and processed in cloud to generate meaningful patterns. In this paper, various aspects of IoT have been covered which provides insights into the future of Information Technology.
Keywords: Big data, PaaS, Internet, smart devices, IoE.
Abstract
Comparative Analysis of HTK and Sphinx in Vietnamese Speech Recognition
Hoa Minh Dinhz, Tan Duy Nguyen, Thanh Duc Pham
DOI: 10.17148/IJARCCE.2015.45156
Abstract: This paper presents the comparative analysis of HTK and Sphinx which are the two most popular open source automatic speech recognition systems. We used many datasets to investigate the performances of these tools in Vietnamese speech recognition.
Keywords: Speech Recognition, HTK, Sphinx, Vietnamese.
Abstract
Twitter Event Summarization Using Phrase Reinforcement Algorithm and NLP Features
Mr. Ganesh Mane, Mrs. Anita Kulkarni
DOI: 10.17148/IJARCCE.2015.45157
Abstract: Now a day's social networking sites are the fastest medium which delivers news to the user as compared to the newspaper and television. There so many social networking sites are present and one of them is Twitter. Twitter allows large no. of users to share/post their views, ideas on any particular event. According to recent survey, daily 340 million Tweets are sent on Twitter which is on a different topic and only 4% of posts on Twitter have relevant news data. It is not possible for any human to read the posts to get meaningful information related to specific events. There is one solution to this problem, i.e. we have to apply Summarization technique on it. In this paper, we have used an algorithm which uses a frequency count technique along with this we have also used some NLP features to summarize the event specified by the user. This automatic summarization algorithm handles the numerous, short, dissimilar, and noisy nature of tweets. We believe our novel approach helps users as well as researchers.
Keywords: Phrase Reinforcement Algorithm (PRA), Twitter API, Twitter, Natural Language Processing (NLP), Textual Entailment, Word Sense Disambiguation, WordNet, ROUGE Toolkit.
Abstract
Survey on Optimal Schedulability Test for Hard Real Time Scheduling
Nitin C. Patil and Prof. S. P. Dhanure
DOI: 10.17148/IJARCCE.2015.45158
Abstract: Real time system is now ubiquitous. In such real time system requires the exactness in result of logical behavior and physical occurrence at which the results are produced. Throughout the paper we consider only hard real time tasks implement on uniprocessor and if dead line is missed in such system then its ruinous. Many scheduler had been proposed to improve the schedulability, here we talks about dynamic and static scheduling only like Earliest Deadline First (EDF) and Rate Monotonic (RM) and considering a scenario of only D T. We analyze tasks in every condition to check its schedulability with respected solution to each problem. First we check utilization of tasks to verify its schedulability, but for optimal schedulability we required response time analysis. Again during task interaction some issues occur such as blocking, priority inversion and jitter which also need to verify. That all issues where discuss and analyze throughout the paper with the help of examples with their solutions.
Keywords: Real time system, task scheduling, EDF, RM, utilization, response time analysis, priority inversion, jitter.
Abstract
Performance Evaluation of NTA Benin Analogue Transmitter in Edo State Nigeria
Anamonye U.G, Otasowie P.O
DOI: 10.17148/IJARCCE.2015.45159
Abstract: This research work is a performance evaluation of the Nigeria Television Authority (NTA) Benin analogue Transmitter in Edo State Nigeria. In this work, the radio frequency (RF) forward Power for Vision and sound, the radio frequency (RF) reflected power for vision and sound, the input and output temperature of the transmitter and the field effect transistor readings (current, Voltage and temperature) were obtained directly from the analogue transmitter for a period of one month(July 2013). The average RF forward vision and sound powers of the transmitter were 4.5kw are 99w respectively while the input and output temperature of the transmitter were 27oc and 32oc at 12noon, 27oc and 32oc at 5pm and 26oc and 30oc at 6am. The result shows that none of the power amplifier module could pass the supposed amount of current of 18A for optimal performance. However the voltage across each module was 28V which indicates that the transmitter performed satisfactorily.
Keywords: Analog, Transmitter, Television, Power, Vision
