VOLUME 4, ISSUE 10, OCTOBER 2015
A Location-Based Privacy Preserving Framework for M-Learning Adoption to Enhance Distance Education in Kenya: Literature Review
Peter B. Obiria, Micheal W. Kimwele, Wilson K. Cheruiyot, Gitau Mwangi
Lab-VIEW Implementation of Automatic Generation Control using Fuzzy Logic Controller
Satyabrata Sahoo, Minakshi Pradhan
A Study on Role of Smart Antennas in Mobile Communication
Parneet Kaur, Dr. Hemant Purohit, Guneet Singh
Improved Generation of Frequent Item Sets using “Apriori Algorithm”
P.Suresh, K.N. Nithya, K. Murugan
Optimization of Cooperative Spectrum Sensing to Minimize the Total Error Rate in Cognitive Radio Networks
Sruthy V, Ajith Joseph
BER & PAPR Reduction in OFDM System using Wavelet based OFDM Analysis
Prof. U. V. Patil, S.V. Dawange
Study of Threats and Security in Cloud Computing Technology
Vinayak D. Shinde, Anas Dange, Muhib Anwar Lambay
SVPWM controller for three phase inverter using PI controller operating under non linear load
Prasanna Sagdeo, Shilpa Patil, Vipinkumar Meshram, Puja Zurale
Content Based Image Retrieval using Dominant Color and Texture features
Miss.Aboli W. Hole, Prof Prabhakar L. Ramteke
Image Segmentation Using Adaptive PDE based New Level Set Method
K.Sreedhar, Dr.K.Rama Linga Reddy
Modified PCA with Genetic Algorithm for Age Invariant Face Recognition
Sonu Agrawal, Dr. Sushil Kumar, Dr. Sanjay Kumar
Performance Comparison of Symmetric Algorithms for SMS Communication
Amardeep Kaur, Rohit Dhadwal
Perfect Hashed Skyline Analytics on Big Data
G. Manikanta, H. Appala Naidu
Cloud Computing Environment for Secure Data Storage – An Overview
Anupama P.L, Bismi M
SWIMAC: Enhanced SMAC Architecture for Business Solutions in Digitalization of IT Infrastructure Services
Gerard Deepak , Navya Prakash , Md. Zakir Ameen , Dheera Kasaraneni
Refined VM-Assign Load Balancing in Cloud Computing
Prithpal Mohini Singh, Shaveta Angurala
A Review of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks
Kalaivani C, Kowsalyadevi S
A polynomial time algorithm to find number of paths in directed acyclic graph between given two vertices s and t.
Dr. Ishwar Baidari, Nagaraj Honnikoll
Biometric system based on off-line signatures
Bhanu Priya Taneja, Navdeep Kaur
Evaluating the Objectives of User Queried Images in Search Engine
P.R. Jhansi Rani, Dr. M. Sreedevi, B. Tech, M. Tech, Ph. D
Steganographic Authentication in Conjunction with Face Recognition for Mobile System
Sharma Davinder Kumar, Dumane Sagar Vinayak, Dumbre Anup Sanjay, Gadalikar Ashok Bhau, Sandip A Khate
Pain Detection in Children using Image Processing
Jithi Krishna P P, Sreejesh V K, Suresh Kumar R
Two Node Tandem Communication Network Model with Weibull Inter Arrival Times and Dynamic Band Width Allocation having Intermeadiatery Departures
K.Srinivasa Rao, P.Srinivasa Rao, G.Sita Ratnam
Segmentation of Abnormality in Ultrasound Images using Active Contour Segmentation
Jean Magdalene Rodrigues, Jagruti Save
Abandoned Object Detection via Visual Surveillance
Aishwarya Khaire, Rajashree Ladkat, Arati Shelar, Mrunal Wansale
Ontology Based Personalized Mobile Search Engine With Location Preferences
Snehal D. Jadhav, Vaishali P. Suryawanshi
Enhancing Comparable Entity Mining from Comparative Questions
Shrutika Narayane and Sudipta Giri
Error Correction Channel Coding Practices for Wireless Communication Systems – A review
Akanksha Tiwari, Vikas Kumar Sahu
A Spatially Modulated Efficient Channel Coding Scheme for CCSDS based Advanced Orbiting System Architecture using connected RS-Turbo Codes
Akanksha Tiwari, Vikas Kumar Sahu
Virtual Furniture: An Augmented Reality Approach
Prof. Sonal Fatangare, Akshata Salunkhe, Priyanka Paygude, Arti Salunke, Amit Wachakawade
Attribute – Based Data Sharing
Rahila Fatima, Dr. S. S. Lomte, Saad Siddiqui
A Hybrid Processing Approach for Enhancement of MAV Aerial Images
R Jayadevan , Akhila H Das, Vani M E , Athira N P , Sreerag K M , Jithinraj M V
Implementation of Industrial Security System using Motion estimation and Visual identification
Mirza Hafez Baig, Prof.S.M.Shende, Prof.S.P.Kharde
A Comprehensive Survey of Image Search Based on Visual Similarity
Rahul Shroff, Jaykumar Dhage
Implementation of Classification System for Brain Tumor using Probabilistic Neural Network
Miss. Priyanka Katti, Mr. V. R. Marathe
An Effective Approach for Maintaining High Accurateness in Cloud Environment
Mr. Rajeshwar Rao Kodipaka, Mr. M. Amarendhar Reddy, B. Venkat Ramudu
Implementation of Trouble Intimation System in GSM & GPS Based Mobiles
K. Navatha, R. China Appala Naidu, Naga Durga Saile .K, K. Meghana
A Dynamic and Trust Based Privacy Preserving Mechanism to Secure the Data during Transmission using Cryptography
E. Soumya, Dr. R. China Appala Naidu, A. Santhoshi, A S V R R Prasada
Secure Data Aggregation in Wireless Sensor Network using BECAN Scheme
Miss. Priyanka G. Padmane, Prof. K.G. Bagde
Sketch Retrieval using Contour Detection by Chain Codes
Mohan Mahanty, D. Kiranmayi, P. Chandana
LPCC and SIFT Based Biometric Amalgamation of Iris and Speech for Authentication and Identification
Kanika Mehra, Parul Malhotra
Knowledge Discovery from Student Database using Association Rule Mining
Mahendra Sahu, Smita Bagde, Rubina Sheikh, Narendra Dhawade
A Review on Spatial Approximate String Search in Road Networks using RSASSOL Algorithm
Sunil Shelke, G. P. Chakote
Performance Analysis of Dispersion Compensation using FBG and DCF in WDM Systems
Gopika P, Sunu Ann Thomas
Portable Camera Based Information Reading of Hand Held Packaged Product for Blind Person
Nitin N. Gaurkar, Prof. P. M. Soni
A Study on Evolution of Data in Traditional RDBMS to Big Data Analytics
Surajit Mohanty, Kedar NathRout, Shekharesh Barik, Sameer Kumar Das
A Review on Brain Tumour Segmentation
M. Selvi M.C.A., M.Phil, K. Maheswari M.C.A., M.Phil., Ph.D.,
A Model for Ethical Artificial Intelligence
Rohit Dsouza, Shraddha Ravishankar, Arushi Shah, PurvaRaut
Survey on Application Models using Mobile Cloud Technology
Vinayak D. Shinde, Usha S Patil, Anjali Dwivedi
Influence of Cross Validation Parameter for the Classification Algorithms by using Yeast Dataset
S. Kalaivani, S. Gandhimathi
Discovering Locally Frequent Patterns from Temporal Data
Fokrul Alom Mazarbhuiya
Fast Weighted Guided Image Filter
Seella Krishnaveni, Dr. G. Umamaheswara Reddy
An Investigation on Image and Data Storage in Cloud Environment with an Enhanced Approach of Data Compression using Compressed Sensing
Manju Sadasivan, Radha Sridharan, Ranjitha M
A Recommendation Method for Travel Packages using Hybrid Approach
Mr. Dipak R. Pardhi, Ms. Tejashri A. Patil
Study of Mosix Software Tool for Cluster Computing In Linux
Vinayak D. Shinde, Priyanka Tarmale, Shahista shaikh
Alternative Path Selection through Density Based Approach for Controlling the Traffic in VANETs
Nagaraja S R, Dr. Nalini N, Rama Krishna K, Satish E G
A Conceptual Model of Automated Attendance System using Image Processing
Prof. Sumita Chandak, Mansi Patange, Himani Deshpande, Saifina Maredia, Prathmesh Bagwe
Data Mining Using Secure Homomorphic Encryption
Raunak Joshi, Bharat Gutal, Rajkumar Ghode, Manoj Suryawanshi, Prof U.H. Wanaskar
Improved Energy and Route Failure Protocol (IERFP): A Framework for MANET Routing
Dr. P. R. Gundalwar, Dr. Vinay Chavan
Model Predictive Control and Generalized Adaptative PID for Load Sharing In Systems of Multiple Sources of Energy
Mouhamadou Falilou Ndiaye, François Guérin, Dimitri Lefebvre, Papa Alioune Ndiaye
Annotating Search Results from Web Databases
Prof. P. S. Badgujar, Shagufta Pathan, Aayesha Sayyed, Salina Ansari
An Empirical Analysis of Hype-cycle: A Case Study of Cloud Computing Technologies
Amol C. Adamuthe, Jyoti V. Tomke, Gopakumaran T. Thampi
DupliCut: Redundant File Finder and Remover
Sumita Chandak, Abhishek Kadam, Bhagyashree Gawade, Jidnyesh Sankhe, Rohish Badkar
Augmented Reality System for Engineering Graphics
Dhara Parmar, Krupali Pelmahale, Romil Kothwade, Prof. PankajBadgujar
Facial Expression Based Music Player
Prof. Jayshree Jha, Akshay Mangaonkar, Deep Mistry, Nipun Jambaulikar, Prathamesh Kolhatkar
Watermarking Techniques and Embedding Techniques using AES-128 in digital image and text files
Preeti Singh, Manju Mathur
Performance Study of Fifth Generation Scalable Channel Emulator for Wideband MIMO Systems
A. Lakshminarayanan, V. Krishnakumar, N. Jayapal, K. Kumar, T. Meenal
Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds
A. Sree Valli, R. Chandrasekhar
Honking with Reduced Effect on Noise Pollution
Pratik Doshi, Prem Halani, Vinit Jasoliya, Madhur Jain, Prof. Vinaya Sawant
Web Intrusion Using Advanced SQL Injector and Countermeasures
Mrs. R. Raghavi Tharani, S. Jayasurya, A. Azath
Quantum Key Distribution
Shaunak Shah, Mrinalini Shah, Ayush Shah, Rishi Shah
Secure Optical Communication using Spreading Codes and Cryptography
Mintas Parveen C. M.
A Survey on Fine-Tuning MapReduce Slot Configuration for Hadoop Clusters
P. Ramarajpandiyan, R. Dharmaraj
Content Based Image Retrieval using HSV Color, Shape and GLCM Texture
Cheruvu Mahammad Ibraheem, Dr. G. Umamaheswara Reddy
Electronic Vein Finder
Vivek Sureshkumar, Sheba Elizabeth Kurien, Smilu Sunny, Stephy James, Lakshmy .S
Comparative Study of AODV, DSR and AOMDV Routing Protocols in MANET
Yashashree A. Jakhade, Nitin R. Gavai
Study and Analysis of the Scope of Improvements in Fitness Advisor Systems using Data Mining
Christy Samuel Raju, Sanchit V Chavan, Karan Pithadia, Shraddha Sankhe, Prof. Sachin Gavhane
Privacy Preserved Image Recognition on MSB Encrypted Images
Sayyada Fahmeeda Sultana, Dr. Shubhangi D.C.
A Study on Data Mining Methodologies and Trends with Big Data Healthcare Analytics/Analysis
M. Saranya M.Sc., M.Phil, K. Sarojini M.C.A., Ph.D.,
Video Enhancement to Obtain Intra and Inter Frame Quality of a Video
A. Harikrishna, S. Swarnalatha
Autonomous Mapping Using RSSI-based Fingerprinting
Arjun Prasath, Upasna Suman
Improvement of Accuracy of Human Blood Groups Determination using Image processing Techniques
Mehedi HasanTalukder, Md.Mahfuz Reza, Mahbuba Begum, Md. Rabiul Islam, Md. Mahmudul Hasan
Secure Encounter-Based Mobile Social Networks: Requirements, Designs and Tradeoffs
Unnati Dhavare , Prof. Umesh Kulkarni
Power and Pressure Efficient Data Dissemination Protocol for Underwater Sensor Networks
Mrs. G. Angeline Prasanna, R. Indhumathi
Shrewd Cities with Internet of Things
Prof. Mayur Raut, Mr. Shashank Singh
Ontology Learning based on Bootstrapping Approach using Improved ET Algorithm for Semantic Web Services with WSDL
Sasanka Bhimavaram, Dr. P. Govindarajulu
Spectrum Sensing and Optimization Based on New Energy Detection Methods in Cognitive Radio
Sunil Raghuwanshi, Balram Yadav, Bharti Chourasia
Brain Tumor Disease Identification Using GNSWF – Based Feature Extraction and Random Forest Classifiers
Amol B. Shinde, Prof. P. R. Devale
Android Assisted Wireless Slide Cruising and File Transfer Application
G. P. Mohole, Rohan Kulkarni, Amit Shinde, Vitthal Jadhav, Umesh Ahire
An Identification of Variety of Leaf Diseases Using Various Data Mining Techniques
Dr. N. Sasirekha, N. Swetha
Study of Cluster, Grid and Cloud Computing
Vinayak Shinde, Amreen Shaikh, Chris Donald D’Souza
Trustworthiness in E-Commerce Context using TRS Algorithm
Prof. Reena Mahe, Rahul Jadhav, Pratik Gaikwad, Rahul Gadekar, Kiran Bhise
Prediction of Human Talent using Enhanced Naive Bayes Algorithm
Rajvir Kaur, Ms. Poonamdeep Kaur, Ms. Lovepreet Kaur
Matlab/Simulink – Based Research on Maximum power point Tracking of Photovoltaic System
Alok Kumar Gautam, Dr N.S.Beniwal
Simulation studying of MPPT Control Method for photovoltaic Power system
Alok Kumar Gautam, Dr N.S.Beniwal
A balanced sentiment analysis approach with stemming porter for neutralized emotion weightage
Navpreet Kaur, Er Mohit Kakkar
LAN Supervising and Controlling Through Android Device
Avinash Sasidharan K, Tushar Nerkar, Kartik Purohit, Harsh Devani, Prof. Amruta pokhare
Application Opening Based on Emotion Using HOG Features
Prof. G.P. Mohole, Dhanashree Tambe, Amey jadhav, Manoj khairnar, Abhishek Sonar
A Review On Generation Of Side Information Mining Text Data & Protection Of Cyber Attack
Rajesh A. Roy, Prof. P. S. Kulkarni
Prediction of User Opinion in Microblog
Tabrez Khan, Javed Khan Sheikh, Rehal Qureshi, Nouman Khatib, Priya Goankar, Fauziya Khan, Siddiqua Shaikh
A Review on Efficient Organization for Wireless Sensor Networks
Madhuneha A. Shrivastava, Prof. R. K. Krishna
Two Level Implementation of Multicasting in Wireless Networks with Multirate Scheme
T. Srikanth, Dr. K. Venkata Rao
Perfect Cyber Entrap: Fast Automatic Detection & Quarantining of Internet Scanning Worms, Topological Worms, Web Worms, Botnet on the Internet Networks
Miss. Gaikwad Kiran Dhondiram, Miss. Mairan Swati Balasaheb, Prof. Chougule Meghraj Balasaheb
A Wireless Application of Automatic Control of Drip Irrigation System
R. Aarthi, Dr. A. Shaik Abdul Khadir
Computer-Based Comparative Analysis of BPSK versus other PSK Modulation Models
B. O. Omijeh, C. E. Adabanya
Monitoring of Disease Residues in Pomegranate
Abhirami, Dr. Antony Selvadoss Thanamani
Nantenna – A Review
Aakash Shah, Payal Furia, Tejas Shanbhag, Ayush Shah
Big Data Analytics
Rohit Kapdoskar, Sanket Gaonkar, Nihar Shelar, Akshaya Surve, Prof.Sachin Gavhane
Personalized Course Recommendation in Formal Learning Based on Logistic Regression
Ms Hanh Nguyen Tran Diem
Error Analysis of Multi User CDMA System over α-µ Fading Channel
Dharmraj, Himanshu Katiyar
Low Power and Area-Efficient 16-Bit Modified SQRT Carry Select Adder Structure
Balasubramani M, Naveen R, Prasanth C
Secure Network Storage System in Distributed Applications using Fused Data Structures
Dr. S. Ravichandran
Multi-Scale Adaptive NICK Thresholding Method for ALPR system
Rohollah Mazrae Khoshki, Subramaniam Ganesan
Improvement in Sinter Productivity with Intelligent Mathematical Model Based Control System
Ayan Goswami, A K Biswal, V T Selvan, Shyamlesh Khan
Emarketing Techniques using Data Mining Approach
Prof. Dr. Raj B. Kulkarni, Ms. Shankari V. Gajul
Active Aggregation Node Selection for Multiple Targets Tracking in Static WSN
Sethulekshmy P Manmadhan, Lakshmy Sasidharan Nair
Integration of Resource Reservation Protocol with Earliest Deadline First to Achieve Real Time Communication in Switched Ethernet
A K Saleena, V Nagarajan
A Novel Study on Improved Routing Mechanism with Performance Analysis in MANETs
Er. Deepak Negi, Dr. Kishori Lal Bansal
Enhancing VANET safety message transmission using cognitive Radio in high traffic
Ajay Lathar, Rajdavinder Singh
Abstract
A Location-Based Privacy Preserving Framework for M-Learning Adoption to Enhance Distance Education in Kenya: Literature Review
Peter B. Obiria, Micheal W. Kimwele, Wilson K. Cheruiyot, Gitau Mwangi
DOI: 10.17148/IJARCCE.2015.41002
Abstract: The aim of this paper is to study m-learning literature in order to propose and develop a privacy-preserving framework which can be used to foster sustainable deployment of mobile learning within open and distance education in Kenya. Location-based privacy in mobile learning is essential to retain users� trust, key to influencing usage intention. Any risk on privacy can negatively affect users� perceptions of a system�s reliability and trustworthiness. While extant studies have proposed frameworks for mobile technologies adoption into learning, few have integrated privacy aspects and their influence on m-learning implementation. The framework would provide University management with informed approach to consider privacy preserving aspects in m-learning implementation. Also, it could provide enlightened guidance to mobile learning application developers on the need to cater for learners� privacy aspects.
Keywords: Location Privacy; Mobile Learning; M-learning; Security; Distance Education.
Abstract
Lab-VIEW Implementation of Automatic Generation Control using Fuzzy Logic Controller
Satyabrata Sahoo, Minakshi Pradhan
DOI: 10.17148/IJARCCE.2015.41003
Abstract: This paper deals with Automatic Generation Control (AGC) of an interconnected Power System using conventional Proportional Integral Derivative (PID) and fuzzy logic controllers. To minimize the effect of noise in the input signal, a filter is employed with the derivative term. A comparative study with PID and Fuzzy is being described on the Lab-VIEW platform.
Keywords: Automatic Generation Control (AGC), PI, Fuzzy Logic, Lab-VIEW.
Abstract
A Study on Role of Smart Antennas in Mobile Communication
Parneet Kaur, Dr. Hemant Purohit, Guneet Singh
DOI: 10.17148/IJARCCE.2015.41004
Abstract: The global acceptance of cellular technology or personal communication service raised the wireless communication beyond all the expectations. But this led to the shortage of the number of radio frequencies that can be utilized thereby increasing the cost of few remaining licenses to use these frequencies to manifold. With emerging techniques that provided voice, data and multimedia facilities in an extensive range, space was the final frontiers. Spatial division is the only promising multiple access technique that is successful in providing capacity, coverage and quality. For many years, antennas were most neglected part in mobile communication. But with the need of spatial division, advancement of antenna led to the evolution of smart antenna. The goal of this paper is to study what is smart antenna, what makes it smart and efficient from Omni directional antenna and how its implementation made the communication system more efficient.
Keywords: Adaptive Array Antenna; Delay Spread; Fading; SDMA; Smart antenna; Switched Beam Antenna.
Abstract
Improved Generation of Frequent Item Sets using “Apriori Algorithm”
P.Suresh, K.N. Nithya, K. Murugan
DOI: 10.17148/IJARCCE.2015.41005
Abstract: Association Rule is a vital technique applied in the task of Data Mining to search and generate associations among large number of databases. A variety of algorithms have been introduced and used to find the relationships existing in databases. A very popular algorithm is Apriori algorithm. Though it is a very efficient process, it takes a considerable time to scan large amount of transactions in database to generate frequent item sets. Therefore an attempt is made to create an Improved Apriori algorithm that reduces the amount of scans needed to give away the frequent sets.
Keywords: Association Rule, Frequent Item Sets, Original Apriori algorithm, Improved Apriori algorithm.
Abstract
Optimization of Cooperative Spectrum Sensing to Minimize the Total Error Rate in Cognitive Radio Networks
Sruthy V, Ajith Joseph
DOI: 10.17148/IJARCCE.2015.41006
Abstract: Cognitive radio is an emerging technology for the opportunistic use of under utilized spectrum. It promises to change the future technological trends forever if employed properly. Spectrum sensing is the major function of a cognitive radio network. This paper proposes a new strategy to optimize the overall performance in cooperative spectrum sensing. Optimization strategy is proposed in order to optimize the overall performance by varying the SNR. We consider optimization of cooperative spectrum sensing with energy detection to minimize the total error rate. Here we derive optimal voting rule for optimal value of cognitive radios. The effects of spectrum sensing technique type that used locally at each CR, the local SNR, and the total number of cooperated CRs on the optimal fusion rule are found. The Energy Detector(ED) spectrum sensing technique is used as local spectrum sensing techniques. Here, different error levels are founded by varying the SNR values to find the optimal number of CRs for minimizing the error levels.
Keywords: Cognitive Radio, Spectrum Sensing, Optimization, Cooperative Spectrum Sensing.
Abstract
BER & PAPR Reduction in OFDM System using Wavelet based OFDM Analysis
Prof. U. V. Patil, S.V. Dawange
DOI: 10.17148/IJARCCE.2015.41007
Abstract: BER & PAPR reduction in OFDM system using different types of wavelet like as Symlet, Coiflet, Daubechies etc. The Wavelet based OFDM has better spectral efficiency than the OFDM. The wavelet based OFDM does not required any Guard intervals and no pilot tones, but it is necessary in conventional OFDM. The reduction of Bit error rate & Peak to average power ratio is obtained by using complete wavelet based OFDM & distribution of output signal at transmitter respectively. All wavelet based OFDM system are required 3 dB improvement .The Order of wavelet is higher and it contain the large number of coefficients.
Keywords: Wavelets; FPGA; Orthogonal Frequency Division multiplication; Bit Error Rate ; Peak-to-Average Power Ratio.
Abstract
Study of Threats and Security in Cloud Computing Technology
Vinayak D. Shinde, Anas Dange, Muhib Anwar Lambay
DOI: 10.17148/IJARCCE.2015.41008
Abstract: Cloud computing plays a vital role in the service of internet by providing the facility of virtually infinite computing resources on-demand and eliminating the need of hardware and software infrastructure. The advantages of virtualizing applications are eminent: minimizing the cost of hardware, reducing the need to buy software license, decreasing the implementation cost as client pays only for what is needed and globalizing the workforce which improves the accessibility there by increasing the efficiency. This support has led to the evolution of many new cloud initiatives, ranging from private clouds to the well-known publicly accessible clouds such as Google, Amazon, etc. Cloud computing is not just of what computing service is delivered but how it is being delivered is equally important. In spite of its indispensable benefits, there are certain critical challenges that need to be taken care of before going in for this technology. On one hand, the untrusted cloud servers are not entitled to access the outsourced data content for data secrecy, and on the other hand, the data resources are not physically under the full control of data owner. In this paper, we analyse the various security threats and vulnerabilities involved in cloud computing which will help us to upgrade the benefits of cloud computing. Finally, this paper discusses some solutions to secure the information of an enterprise for cloud computing deployment.
Keywords: cloud computing, virtualization, service of internet, security threats.
Abstract
SVPWM controller for three phase inverter using PI controller operating under non linear load
Prasanna Sagdeo, Shilpa Patil, Vipinkumar Meshram, Puja Zurale
DOI: 10.17148/IJARCCE.2015.41009
Abstract: In the past several years, there is rapid increase of power electronics-based loads connected to low and medium voltage power distribution systems. As these loads draw non sinusoidal current from the mains, it degrades the power quality by causing Harmonic distortion. So to reduce harmonics and to increase power quality Space vector control strategy is presented for three phase inverter system operating under highly nonlinear loads. Pulse width modulation are mainly used in industrial application for better performance. Proportional Integral (PI) controller is used to design SVPWM in closed loop. The proposed controller design generates gating signals which drives inverter and guarantees high quality output with less distortion for non linear load. MATLAB/SIMULINK is used for designing and development of SVPWM based three phase inverter.
Keywords: Inverter , non linear load, PI controller, Space Vector PWM.
Abstract
Content Based Image Retrieval using Dominant Color and Texture features
Miss.Aboli W. Hole, Prof Prabhakar L. Ramteke
DOI: 10.17148/IJARCCE.2015.41010
Abstract: The purpose of this Paper is to describe our research on different feature extraction and matching techniques in designing a Content Based Image Retrieval (CBIR) system. Due to the enormous increase in image database sizes, as well as its vast deployment in various applications, the need for CBIR development arose. Content Based Image Retrieval (CBIR) is the retrieval of images based on visual features such as color and texture. Image retrieval using single feature cannot provide good solution for accuracy and efficiency. The most important visual features are Color and texture. In this paper technique used for retrieving the images based on their content namely dominant color, texture and combination of both color and texture. The technique verifies the superiority of image retrieval using multifeature than the single feature.
Keywords: Content Based Image retrieval (CBIR), Co-occurrence matrix, Euclidian distance, Centroid, Dominant color.
Abstract
Image Segmentation Using Adaptive PDE based New Level Set Method
K.Sreedhar, Dr.K.Rama Linga Reddy
DOI: 10.17148/IJARCCE.2015.41011
Abstract: The most widely used image segmentation methods are Adaptive PDE-based and new level set algorithm typically depend on the uniform of the image intensities in the regions of interest, which often fail to provide accurate segmentation results due to the lack of homogeneity. This paper proposes a novel region-based method for image segmentation, which is able to deal with intensity inhomogeneities in the segmentation. First, based on the model of images with intensity lack of homogeneities, we derive a local intensity clustering property of the image intensities, and define a local clustering criterion function for the image intensities in a neighborhood of each point. This local clustering criterion function is then integrated with respect to the neighborhood center to give a global criterion of image segmentation. In a Adaptive PDE based new level set formulation, this criterion defines an energy in terms of the level set functions that represent a partition of the image domain and a bias field that accounts for the intensity inhomogeneity of the image. Therefore, by minimizing this energy, our method is able to simultaneously segment the image and estimate the bias field, and the estimated bias field can be used for intensity lack of homogeneity correction (or bias correction). This method has been validated on synthetic images and real images of various modalities, with desirable performance in the presence of intensity inhomogeneities. Experiments show that this method is more robust to initialization, faster and more accurate than the well-known piecewise smooth model.
Keywords: Adaptive Partial Differential Equations (PDE), Image segmentation, Inhomogeneity, Level set, MRI.
Abstract
Modified PCA with Genetic Algorithm for Age Invariant Face Recognition
Sonu Agrawal, Dr. Sushil Kumar, Dr. Sanjay Kumar
DOI: 10.17148/IJARCCE.2015.41012
Abstract: Security systems based on traditional techniques are more prone to be attacked by hackers and, such major attacks exposed weakness in most sophisticated security systems. A number of supervision agencies are now more motivated to improve security based on body or behavioral uniqueness, often called biometrics. Face recognition is non-intrusive since it is based on images recorded by a distant camera and can be very effective even if the user is not aware of the existence of the face recognition system. Automatic face recognition is a challenging problem in the field of Pattern Recognition and image processing due to its varying nature. It has wide range of applications such as law enforcement, national identity, banking, and logical access control. In this research paper a modification of an existing technique (PCA) will be discussed to improve the efficiency of face recognition. In Principal Component Analysis (PCA) Technique face images are represented as vectors by concatenating the pixels of the image line-by-line. A mean face is calculated by computing the average of each vector. A difference vector is also computed for each user to qualify the differences to the mean face. Than a covariance matrix of the difference vectors is computed. As a final step, principal axes are obtained by Eigen decomposition of covariance matrix. First N eigenvectors presenting the highest Eigen values will be retained and represents the most significant features of face images. Finally, each user model is represented as a linear combination (weighted sum) of coefficients corresponding to each Eigen faces. PCA is performed only for training the system, due to which this method results to be very fast when testing new face images. Due to this property PCA is selected for this work as modification will take place during training phase.
Keywords: AFR, PCA, Face Recognition, Genetic Algorithm, Age Invariant.
Abstract
Performance Comparison of Symmetric Algorithms for SMS Communication
Amardeep Kaur, Rohit Dhadwal
DOI: 10.17148/IJARCCE.2015.41013
Abstract: A popular way for mobile phone users to send and receive simple text messages is Short Message Service (SMS). A secure communication channel and environment for confidential data transmission is missing in the literature for SMS; therefore it is desirable to secure SMS by additional encryption. Encryption algorithms differ from one another by their ability to identify &prevent the valuable data against data hack attacks and their speed and efficiency in doing securing data. This study provides a performance comparison between the best symmetric encryption algorithms for usage in SMS communication: Blowfish and RC4 (Rivest Cipher 4)). The comparison analysis ran on parameters: size of text data, encryption time, decryption time, encryption throughput, decryption throughput, average encryption time and average decryption time. Based on analysing the criteria�s for efficient way of securing SMS, performance analysis of these algorithms under different parameters and input features is provided in the conclusion section.
Keywords: Cryptography, Decryption, Encryption, Blowfish, RC4.
Abstract
Perfect Hashed Skyline Analytics on Big Data
G. Manikanta, H. Appala Naidu
DOI: 10.17148/IJARCCE.2015.41014
Abstract: Sky line is an important function in many programs to come back a set of exciting factors from a possibly large information area. Given a desk, the function discovers all tuples that are not covered with any other tuples. It is found that the current methods cannot process skyline on big information effectively. This document provides a novel skyline criterion SSPL on big information. SSPL uses categorized positional catalog details which require low area expense to decrease I/O cost considerably. The categorized positional catalog list Lj is designed for each feature Aj and is organized in climbing order of Aj . SSPL includes two stages. In stage 1, SSPL determines check out detail of the engaged categorized positional catalog details. During accessing the details in a round-robin style, SSPL works trimming on any applicant positional catalog to eliminate the applicant whose corresponding tuple is not skyline outcome. Phase1 finishes when there is an applicant positional catalog seen in all of the engaged details. In Phase 2, SSPL uses the acquired applicant positional indices to get skyline outcomes by a particular and successive check out on the desk. The trial outcomes on artificial and real information places show that SSPL has a important benefits over the current skyline methods.
Keywords: ZINC, SDC+, ZB-Tree, Skyline Computation.
Abstract
Cloud Computing Environment for Secure Data Storage – An Overview
Anupama P.L, Bismi M
DOI: 10.17148/IJARCCE.2015.41015
Abstract: Cloud computing is an innovative computing paradigm that offers amazing advantages in economical aspects such as reducing time, improved performance, flexible computing capabilities, and advantageous computing power. But the security of the data in cloud is under risk. We can explore the cloud computing for so many applications as an individual or as a group work. This paper gives the basics of cloud computing with its history, architecture, features along with pros and cons. The paper also gives two ideas for secure data storage in cloud environment. It helps to store data without confidentiality leakage and also helps to retrieve only accurate files.
Keywords: Cloud Computing, Security, Storage, User data.
Abstract
SWIMAC: Enhanced SMAC Architecture for Business Solutions in Digitalization of IT Infrastructure Services
Gerard Deepak , Navya Prakash , Md. Zakir Ameen , Dheera Kasaraneni
DOI: 10.17148/IJARCCE.2015.41016
Abstract: Redefinition of the Business Trends in the IT Infrastructure Solutions industry took place in the last few years with the incorporation of SMAC stack as the major constituent of the major IT Business Model that led to Digitalization of the IT Business Solutions. The SMAC architecture is quite good but it lacks two major aspects namely the Semantics of the Web and Web Optimizations and the usage of Internet of Things (IOT) as its primary technology. A new technology stack SWIMAC for enhancing the IT business trends is proposed and analyzed. The Technology-Impact Distribution of the constituent technologies in the SWIMAC architecture is studied. Also a survey is conducted for the technologies in SWIMAC and the results are studied. Finally empirical justifications for SWIMAC as a separate architecture is put forth for incorporation of Web Semantics and IOT in the SWIMAC architecture.
Keywords: Digitalization, Social media, Semantic Web, IOT, Mobility, Analytics, Cloud Computing, Business Trends, SMAC, SWIMAC, Intelligent Agents.
Abstract
Approaches to Measuring the Intelligence of Machines by Quantifying them
Prerna Kapoor
DOI: 10.17148/IJARCCE.2015.41017
Abstract: Artificial intelligence is a very broad term which covers many fields and thus for measuring how far researchers have reached we need an accurate method of characterizing the intelligence of machines. The reason there isn�t one common test for all systems is because intelligence depends on various factors which may vary depending on the environment.The most famous test for measuring intelligence, the Turing Test, has flaws attached to it.Thus, this paper highlights a few of the limitations of the Turing Test and also, describes a few of the other tests used by researchers to evaluate intelligent machines.
Keywords: Artificial Intelligence, Turing Test, intelligent systems, measure of intelligence.
Abstract
Maximum Bandwidth and Self-Adaptable Back-off Mechanism Based Reliable Energy Efficient Routing Protocol (REERP) for Fully Connected Wireless Ad Hoc Networks
M. Thenmozhi
DOI: 10.17148/IJARCCE.2015.41018
Abstract: The paper aims to propose a maximum bandwidth and self-adaptable back-off mechanism based reliable energy efficient routing protocol (REERP) for fully connected wireless ad hoc networks. The proposed protocol makes use of the mechanism to uncover maximum MAC throughput that a wireless link can achieve regardless of interfering traffic along with a back-off mechanism is applied with binary exponential back-off that has the capability to progress the reliability of the protocol. The simulations are accepted with varying traffic loads along with scalable network scenario. Performance metrics such as aggregate throughput, energy consumption and average packet delay are taken into account for comparing the proposed REERP. NS2 simulation proved that the proposed protocol performs results are better in terms of delay, energy consumption and throughput.
Keywords: Wireless ad hoc network, back-off mechanism, bandwidth, x routing, fully connected.
Abstract
Refined VM-Assign Load Balancing in Cloud Computing
Prithpal Mohini Singh, Shaveta Angurala
DOI: 10.17148/IJARCCE.2015.41019
Abstract: One of the major challenges in Cloud is the scheduling of the requests to get optimized (faster) response time and better performance in the Cloud Configuration. Various Load Balancing methods are developed to improve the efficiency of the Cloud. The paper aims to provide a combination of three different techniques as Refined VM-Load Balancer Algorithm; Batch Processing, Defined Value and Priority Algorithm, to balance the load and for proper utilization of resources in Cloud Computing environment. The paper also compares the Proposed Refined Load Balancer with the existing Optimal Load Balancer Algorithm to analyse the results using Cloud-Analyst simulator. The results showed improvements on response time improving the performance and efficiency of the Cloud.
Keywords: Cloud Computing, Scheduling, Load Balancing, Virtual Machines, Response Time, Utilization, Virtualization, Refined Load-Balancer, Batch, Priority.
Abstract
A Review of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks
Kalaivani C, Kowsalyadevi S
DOI: 10.17148/IJARCCE.2015.41020
Abstract: Mobile Ad hoc Networks (MANETs) as well as Wireless Sensor Networks (WSNs) suffer from various challenges like low bandwidth, overhead and velocity of nodes. This research contribution is the characterization study between MANETs and WSNs environment with respect to various routing protocols. This study investigates the routing protocols corresponding to packet delivery ratio, routing overhead, throughput and average to end-to-end delay. For MANETs, three protocols AODV, DSDV and TORA are selected and a performance study is done. The AODV perform better in MANETs and given better output, but performance of TORA is very poor and not reliable for MANETs. For WSNs, four protocols AODV, DSDV, TORA and LEACH are selected and evaluated. The AODV and LEACH both perform better but AODV is less reliable than LEACH because the result of AODV is fluctuated but LEACH shows stability. It is concluded that AODV shows better performance in both environments compared to DSDV and TORA. But average end-to-end delay is much higher in WSNs compared to MANETs.
Keywords: Mobile Ad hoc Networks (MANETs), Wireless Sensor Networks (WSNs), Routing Protocols, Simulation, Packet Delivery Ratio (PDR).
Abstract
A polynomial time algorithm to find number of paths in directed acyclic graph between given two vertices s and t.
Dr. Ishwar Baidari, Nagaraj Honnikoll
DOI: 10.17148/IJARCCE.2015.41021
Abstract: The algorithm takes an input a directed acyclic graph G = (V, E) and two vertices s and t and returns the number of paths from s to t in G.
Keywords: directed acyclic graph, paths, queues.
Abstract
Biometric system based on off-line signatures
Bhanu Priya Taneja, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.41022
Abstract: This paper discusses the process of off line signature recognition and verification system using neural networks. The paper consists of two stages 1) Evaluating feature vectors of off line-signature images. 2) Training and Validation using back-propagation artificial neural network. Three layer feed forward MLP classifier have been used for pattern recognition process. The main advantage of feed forward neural network is that they are easy to use, and that they can approximate any input/output mapping with weights and thresholds (biases) of the model. Different stages of the process are explained in the paper by making use of proper algorithms. The overall accuracy achieved is 96.3%.
Keywords: Confusion matrix, Feed forward neural network, Kurtosis, Receiver operating characteristics (ROC).
Abstract
Evaluating the Objectives of User Queried Images in Search Engine
P.R. Jhansi Rani, Dr. M. Sreedevi, B. Tech, M. Tech, Ph. D
DOI: 10.17148/IJARCCE.2015.41023
Abstract: In earlier days image search suffer from the unreliability of the assumptions under which the initial text based image search result. However, producing such results containing a large number of images and with more number of irrelevant images.Many researchers have already supported the web search engines in indentifying the user search objectives, and also locating the nearest content to fulfil their needs. Day by day the dependability on search engines is being increased and today the web search engine (especially Google) has a proverb �IT GOD�. It is the time to concentrate towards betterment of the optimal results from object search like pictures/images, which is very poor at present scenarios. In this connection, we propose a new method to identify the nearest images for user queries by their navigations in the current and previous sessions. We also calculate the ratio of interest and the objective of search. The main problem is to find the users exact requirement, because their query may be ambiguous, for example the word java means a programming language and an ancient bike. Here, we propose scenario that efficiently calculate the user interests and also the main objective of the user query. Finally, our proposal is a promising method in terms of good precision and recall.
Keywords: Query; evaluating the objectives; Goal cluster.
Abstract
Steganographic Authentication in Conjunction with Face Recognition for Mobile System
Sharma Davinder Kumar, Dumane Sagar Vinayak, Dumbre Anup Sanjay, Gadalikar Ashok Bhau, Sandip A Khate
DOI: 10.17148/IJARCCE.2015.41024
Abstract: In today world Securing data is a challenging issue. Most of data travel through the internet and it becomes difficult to secure data. Today mobile-commerce is a new branch of e-commerce, mobile-banking is main part of m-commerce. But the problem in mobile banking is security how to secure the user information such as username, password etc. The aim is to provide a secure environment in terms of security for transaction. In this paper we focus on authentication in conjunction with face recognition for mobile system. For this we use m-banking. We will make use of steganography to improve the communication channel. Steganography is defined as the invisible communication. There are several types of steganography techniques each have their own strengths and weaknesses.
Keywords: Mobile banking, Mobile commerce, Encryption, Decryption, Network Security.
Abstract
Pain Detection in Children using Image Processing
Jithi Krishna P P, Sreejesh V K, Suresh Kumar R
DOI: 10.17148/IJARCCE.2015.41025
Abstract: Pain is a qualitative character which is very difficult to assess and manage. In younger children it is not possible to measure pain by self report. Behavioral scientists say that pain can be measured by using the facial indicators. The existing approach for assessing pain in children requires the services of a skilled staff. The output thus obtained may not be accurate enough and has a subjective bias also. Here we have suggested a method for assessing the pain in children using image processing techniques by considering facial indicators. Using Viola Jones algorithm the image of the face is segmented and the features are extracted. The classification is done with the help of multi SVM classifier. We obtained a reliability of 0.97 for our system by interrator method, which is very high. This technique is very useful for assessing the pain in children in post operative wards, Intensive Care Units etc.
Keywords: Pain, children, pain assessment, image processing, Viola Jones, Multi SVM.
Abstract
Two Node Tandem Communication Network Model with Weibull Inter Arrival Times and Dynamic Band Width Allocation having Intermeadiatery Departures
K.Srinivasa Rao, P.Srinivasa Rao, G.Sita Ratnam
DOI: 10.17148/IJARCCE.2015.41026
Abstract: Communication network models play a dominant role in design and monitoring of communication systems such as, Local Area Networks, Wide Area Networks and Metropolitan Area Networks. This paper addresses the development and analysis of a two node tandem communication network model with the assumption that the inter arrival times of the packets follows Weibull distribution. The transmission in both the nodes follows Poisson processes having dynamic band width allocation. It is further assumed that the packets after getting transmission from the first node may join the buffer connected to the second node or terminated with certain probability. This intermeadiatery departure of the packets have significant influence on the performance of the communication network. The performance of the network is evaluated by deriving explicit expressions for the network performance measures such as, the average content of the buffers, mean delay in the transmitters, the throughput of the nodes. Through numerical study, it is observed that the Weibull inter arrival time distribution parameters have significant influence on the performance measures. The dynamic band width allocation strategy reduces the congestion in buffers and improves the customer satisfaction. This model also includes some of the earlier models on particular cases. The time dependent nature of arrival rate of packets made the proposed model more flexible for analyzing several communication networks.
Keywords: communication network, performance evaluation, dynamic bandwidth allocation, performance measure.
Abstract
Segmentation of Abnormality in Ultrasound Images using Active Contour Segmentation
Jean Magdalene Rodrigues, Jagruti Save
DOI: 10.17148/IJARCCE.2015.41027
Abstract: Ultrasound imaging is a widely used imaging modality for diagnostic purposes, due to its many advantages. However, the usefulness of Ultrasound imaging is degraded by the presence of signal dependent noise known as speckle. This paper proposes a model to segment the abnormality present in the Ultrasound image such as tumor or the lesion or the calculi. First an SRAD (Speckle Reducing Anisotropic Diffusion) filter is applied to the Ultrasound image to reduce the Speckle noise. This is followed by segmenting the abnormality by using active contour approach. Three methods of active contour segmentation are used. First, an edge based active contour called Geodesic active contour is applied. Next, the region based methods which are Chan Vese active contour model and a modified version of Chan Vese method are applied. The algorithm is used to segment different types of abnormality in images of different parts of the body like liver, pancreas, kidneys, breast, prostate and uterus. Segmentation results are compared and visually it can be observed that modified Chan Vese active contour method works better than Geodesic and Chan Vese method in segmenting the abnormality.
Keywords: Ultrasound images, Speckle noise, active contour segmentation, abnormality.
Abstract
Abandoned Object Detection via Visual Surveillance
Aishwarya Khaire, Rajashree Ladkat, Arati Shelar, Mrunal Wansale
DOI: 10.17148/IJARCCE.2015.41028
Abstract: In this paper we are processing the live feed of the CCTV camera with the image processing. If a person is dropping off some bag or any such suspicious thing and leaving it running away, the camera will catch this activity and if such bag is untouched for some time span decided by analyzer then it will give notification to authority. Minimum the time span probability stays 50-50, but as time span increases the probability of that thing being abandon or hazardous increases. We introduce a framework to identify static foreground regions based on the transition of code patterns and to verify whether the candidate regions content abandoned objects by analyzing the back-traced trajectories of luggage owners. Hence the incident can be avoided in that case.
Keywords: Abandoned luggage detection, abandoned object detection, object detection and tracking.
Abstract
Ontology Based Personalized Mobile Search Engine With Location Preferences
Snehal D. Jadhav, Vaishali P. Suryawanshi
DOI: 10.17148/IJARCCE.2015.41029
Abstract: Proximity search is the most frequent activity people do in order to get information about nearby things. During this search most of the users make use of mobile devices for performing this kind of search. The small screen and default keypad of these mobile devices limit the interactions between user and search server. In such case, the search must not be irrelevant to the user search, we need an efficient way to give query and get response. In this paper, we propose a personalization approach by means of which we will be able to capture user�s interests and preferences by maintaining history of their choices. The search keywords are arranged into ontology. The search engine works on client-server model. Heavy tasks such as creation of ontology, maintaining history, performing search are done by the server, client acts as an interface between user and server. We prototype mobile search engine on Google Android Platform. The approach is given an application interface: shopping and navigation. Two approaches are implemented to accomplish the search: Ontology search and Semantic Ontology Search. From the comparison of retrieval times of a normal search engine and an ontological search engine, it has been found that, the retrieval effectiveness of the proposed system is higher than that of a search engine.
Keywords: Ontology search, personalization, mobile search engine, location preference.
Abstract
Enhancing Comparable Entity Mining from Comparative Questions
Shrutika Narayane and Sudipta Giri
DOI: 10.17148/IJARCCE.2015.41030
Abstract: It is a recognized fact that human beings usually tend to compare one thing with the other which is typical part of human decision making process. But, this is difficult to know; what are to be compared and what can be the alternatives. This alternatives foundation process is very much difficult to cipher out what user really wants. This comparison activity is very common in our daily life but requires high knowledge skill. We present a novel way of automatically mining comparable entities from comparative questions in order to address this difficulty overcoming some performance issues of existing system. The results will be very useful in helping user�s exploration of alternative choices by suggesting comparable entities based on other users� prior requests. The proposed system overcomes these drawbacks and improves the efficiency of mining comparators. Therefore, in order to assure high precision, recall and ambiguity resolution, we propose a hybrid approach that combines the Bootstrapping, heuristic rules, pattern matching, and association rules combination. Association rules gives Support and Confidence count of each comparable entity pair aims to extract frequently compared entity pair, interesting correlations from archived questions. The primary goal of this project is to identify comparative question and then we pull out its comparable entities from the query by making use of an extensive question record. Initially, the user presents a query as an input; later the system will identify whether the fired question is comparable or not. Once the system verifies that the query is comparative; the required entities are extracted, and the output is presented to the user with the possible alternative options along with their ranking in repository. This approach provides better results compared to the existing approach.
Keywords: Information extraction, bootstrapping, sequential pattern mining, comparable entity (comparator) mining, POS tagger and association rule.
Abstract
Error Correction Channel Coding Practices for Wireless Communication Systems – A review
Akanksha Tiwari, Vikas Kumar Sahu
DOI: 10.17148/IJARCCE.2015.41031
Abstract: The amalgamation of low-bit-rate data coders into incipient land and satellite mobile communication arrangements presents glitches which aforementioned communication systems have certainly not encountered. One of the utmost important of these complications is the degradation knowledgeable in data quality as a consequence of corruption of the transmitted data information by channel errors. The ambitions of error control mechanisms are to afford and protect the data from errors caused by packet loss due to congestion and link failure. The error control classified into two sorts: Error correction coding and Error detection coding. Error control mechanisms for wireless applications can be classified into four types: forward error correction (FEC), retransmission, error resilience, and error concealment. In this review paper, we provide a survey on the prevailing error control mechanisms, representative error mechanisms systems. We pronounce the encounters and solutions of each error control mechanisms. To end with, we demonstrate the Aspectsupshot in the data quality through transmission over wireless systems.
Keywords: Forward error correction, Channel Coding, Wireless communication, Block codes, convolutional codes, turbo code, reed-Solomon codes, BCH codes, RSC codes, Multiple Antenna System.
Abstract
A Spatially Modulated Efficient Channel Coding Scheme for CCSDS based Advanced Orbiting System Architecture using connected RS-Turbo Codes
Akanksha Tiwari, Vikas Kumar Sahu
DOI: 10.17148/IJARCCE.2015.41032
Abstract: A communication satellites play an outsized character in the socio-economic growth of a country, nevertheless the satellite communication system design trade-offs proliferation with the involvedness of the requirements. Surrounded by various satellite communication know-hows, advanced orbiting systems endorsement is an outstanding one projected by CCSDS (Consultative Committee for Space Data System). In AOS, the error correction coding schemes commonly used are convolutional coding, Turbo coding and RS coding. This paper introduce the implementation procedure of RS-Turbo hybrid code, than make the quantitative analysis of performance in AOS by the data of software simulation experimentation, the work starts with random frame generation, that is converted into a compact information by using spatial modulation (representing data streams in form of constellation points and antenna number). Finally, the communication is performed using BPSK modulation, the inference is that the proposedcode has higher coding gain, smaller complexity cost and less error probability. The advantages of this proposed coding scheme from different points are analyzed. In particular, the impact of proposed coding scheme on measurement accuracy is explained at the end of the paper.
Keywords: Advanced Orbiting System (AOS), Consultative committee for space data systems (CCSDS), Channel coding, forward error correction (FEC) code, convolutional code, Reed-Solomon code, RSC code, Turbo code, orthogonal spatial division multiplexing, space time codes, spatial modulation, satellite communication.
Abstract
Virtual Furniture: An Augmented Reality Approach
Prof. Sonal Fatangare, Akshata Salunkhe, Priyanka Paygude, Arti Salunke, Amit Wachakawade
DOI: 10.17148/IJARCCE.2015.41033
Abstract: The speedy growth of android applications is creating a great impact on our lives. The aim of this research Virtual Furniture: An Augmented Reality Approach is, to create a virtual atmosphere using an Augmented Reality. In this paper, we discuss about how it will look after placing the furniture in the user�s room. The goal purpose of this project is to develop an application for trying different furniture items in furniture stores without physically visiting the furniture store which is very time consuming activity. Due to this application user can analysis virtual furniture and communicate with 3D virtual furniture data using a dynamic and flexible user interface
Keywords: AR- Augmented Reality, 3D -Three dimensional, virtual furniture, Tangible AR, Interior design
Abstract
Attribute – Based Data Sharing
Rahila Fatima, Dr. S. S. Lomte, Saad Siddiqui
DOI: 10.17148/IJARCCE.2015.41034
Abstract: There have been increasing demand and concerns for distributed security, with the recent adoption and diffusion of data sharing in distributed systems such as cloud computing.Enforcement of access policy and policy updates are the challenging issues in data sharing system.This issue can be solved by using cryptographic techniques.Cipher text policy attribute based encryption (CP-ABE) is one of the promising solution. It enables data owners to define their own access policies over user attributes and enforce the policies on the data to be distributed.The major drawback is the key escrow problem.Escrow means storage,here the key is stored in third party that is key generation centre. The key generation center could decrypt any messages addressed to specific users by generating their private keys. This is not suitable for data sharing scenarios where the data owner would like to make their private data only accessible to designated users. In addition, applying CP-ABE in the data sharing system introduces anotherchallenge with regard to the user revocation since the access policies are defined only over the attribute universe.The proposed scheme can solve the two problems key escrow problem and revocation problem.
Keywords: Removing Escrow, Revocation, Attribute Based Encryption, Access Control.
Abstract
A Hybrid Processing Approach for Enhancement of MAV Aerial Images
R Jayadevan , Akhila H Das, Vani M E , Athira N P , Sreerag K M , Jithinraj M V
DOI: 10.17148/IJARCCE.2015.41035
Abstract: This paper proposes a hybrid approach for the enhancement of aerial images obtained from UAV/MAV cameras. Aerial images are prone to many undesirable effects such as non-uniform lighting, turbidity due to haze and other atmospheric noise. The aim of the proposed scheme is to achieve the enhancement, where the existing techniques relying on Wavelet based Dynamic Range Compression (WDRC) algorithm followed by Local Contrast Enhancement (LCE) fails to achieve desired results. The processing involves both spatial and frequency domain operations which have been carried out through the implementation of post-processing techniques to those images which have still very poor contrast after the application of WDRC and LCE. The post processing techniques involve the use of histogram equalization, removal of noisy artifacts and Laplacian sharpening in a sequential order. The scheme was used for the enhancement of a series of aerial images obtained from MAV camera on flight. Images enhanced by the scheme are found to be of much better clarity and vividness, especially in the case of images acquired by MAV inbuilt cameras.
Keywords: Aerial image processing, Laplacian Sharpening, Local contrast enhancement Spatial/Frequency domains, Wavelet-based Dynamic Range Compression.
Abstract
Implementation of Industrial Security System using Motion estimation and Visual identification
Mirza Hafez Baig, Prof.S.M.Shende, Prof.S.P.Kharde
DOI: 10.17148/IJARCCE.2015.41036
Abstract: Security and safety is one of the most talked of topics in almost every facet like surveillance, industrial applications, offices, and in general, in smart environments. In this paper we design a home embedded surveillance system which evaluates the development of a Low-cost security system using small PIR (Pyroelectric Infrared) module and piezo sensor built around microcontroller. Presence of individual is detected when the system senses the signal generated by many sensors and image capturer. The system triggers an alarm detecting the presence of unauthorized person in a specific interval of time and simultaneously sends a message to the MS through GSM Modem. When the embedded system is activated, the CCTV camera is activated. This highly reactive approach has low computational requirement.Therefore it is well suited for home surveillance system. Test performed gave promising results.
Keywords: PIR Module, piezo sensor, GSM Modem, CCTV Camera, ATMEGA 32, Fresnel lens, wiring system.
Abstract
A Comprehensive Survey of Image Search Based on Visual Similarity
Rahul Shroff, Jaykumar Dhage
DOI: 10.17148/IJARCCE.2015.41037
Abstract: Image search based on visual similarity is the widely applicable image processing method, which is used extensively. One of the important stage in content based image retrieval system is Feature Extraction, where low level features are extracted from image, then The features vector is formed by the extracted features. Feature Extraction is used for indexing images and interpretation of image. Effective storage, ranking and organizing a large image database is a critical issue in computer systems. To overcome these problems many methods has proposed. However, the accuracy and speed of image retrieval is still an interesting topic of research. This paper presents a survey of various states-of-the-art- image search techniques such as color edge detection, Discrete Wavelet Transform and Singular value decomposition etc. that allows faster and effective visual similarity search.
Keywords: Feature Extraction, Similarity Matching, Canny Edge Detection, Color Edge Detection, Haar Wavelet Transform, singular value decomposition.
Abstract
Implementation of Classification System for Brain Tumor using Probabilistic Neural Network
Miss. Priyanka Katti, Mr. V. R. Marathe
DOI: 10.17148/IJARCCE.2015.41038
Abstract: In this paper Brain cancer detection & classification system has been designed & developed for distinguishing different types of brain MRI into three classes such as Benign, Malignant and Normal. The image processing techniques such as image acquisition, image segmentation, morphological operations & feature Extraction have been developed for detection of brain tumor. In this project we have obtained the features related to the Discrete Cosine Transform as well as Discrete Wavelet Transform. For segmentation of tumor region K-means clustering is used. The extraction of texture features in the detected tumor has been achieved by using Gray level co-occurrence matrix (GLCM). Probabilistic Neural Network is employed to implement an automated brain tumor classification. The performance of the PNN classifier is evaluated in terms of training performance and classification accuracies. Tumor area is calculated. Finally there is comparison between accuracy analysis for Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) over 90 MRI of brain. Simulation is performed by MATLAB software.
Keywords: Discrete Cosine Transform(DCT), Discrete Wavelet Transform (DWT), Gray level co-occurrence matrix(GLCM), K-means Clustering, MATLAB, Magnetic Resonance Images(MRI), Probabilistic Neural Network.
Abstract
An Effective Approach for Maintaining High Accurateness in Cloud Environment
Mr. Rajeshwar Rao Kodipaka, Mr. M. Amarendhar Reddy, B. Venkat Ramudu
DOI: 10.17148/IJARCCE.2015.41039
Abstract: Generally Software-as-a-service clouds were built on software as a service along with service-oriented architecture. This assists the providers of application service in conveying their applications by means of substantial cloud computing infrastructure. In the traditional efforts while confidentiality as well as privacy protection exertions was broadly studied, the problem of service integrity attestation has not been appropriately addressed. In our work we mainly spotlight on data processing services which have turned out to be popular with applications in numerous usage areas. We present IntTest, which is a scalable and efficient integrated service integrity attestation structure intended for software-as-a-service cloud multitenant cloud systems. The proposed approach offers a novel integrated attestation graph analysis method which can not only identify attackers more resourcefully by taking an integrated approach, but also can hold back aggressive attackers and limit the scope of damage that is caused by colluding attacks.
Keywords: Software-as-a-service, Integrated attestation graph analysis, Cloud computing, IntTest, Attackers.
Abstract
Implementation of Trouble Intimation System in GSM & GPS Based Mobiles
K. Navatha, R. China Appala Naidu, Naga Durga Saile .K, K. Meghana
DOI: 10.17148/IJARCCE.2015.41040
Abstract: Communication is an exchanging of information by speaking, writing, or by using some other medium. If information exchange is carried out with the help of mobile devices that Communication is called Mobile Communication. Communication in mobile networks is possible whenever the signal is receiving by the mobile. If the signal is not receiving by the mobile and the user is in some trouble, intimation about that trouble to any other is not possible. So, intimation about that trouble is possible by sending SMS (Short message service) in GSM (Global system for Mobile communication) based and GPS (Global Positioning System) based mobiles even if the mobile is not receiving network signal with the help of location based services. In this paper we explain how to reach the user when his/her mobile is not in coverage area.
Keywords: GSM (Global system for Mobile communication), GPS (Global Positioning System), SMS (Short message service), Mobile, Trouble Intimation System.
Abstract
A Dynamic and Trust Based Privacy Preserving Mechanism to Secure the Data during Transmission using Cryptography
E. Soumya, Dr. R. China Appala Naidu, A. Santhoshi, A S V R R Prasada
DOI: 10.17148/IJARCCE.2015.41041
Abstract: In today�s world of computer security, integrity and confidentiality of data is the most important and a primary concern. The issue related to the security of electronic data when transmitted over the internet is dealt in this paper. Data encryption is widely used to ensure security of the data. The encryption standards such as DES (Data Encryption Standard) and AES (Advanced Encryption Standard) are widely in use to resolve the issues of transmission over an insecure channel. With the advancement in computer software and hardware, these standards seem not to be so secure and fast as one would like. In this paper we have proposed a fast and secure dual encryption algorithm using permutations, shifting operations. The proposed symmetric encryption procedure has two advantages over conventional schemes. Firstly, the encryption and decryption processes are much simpler and faster. Secondly, the security level is higher due to the application of dual encryption on the data which is being transmitted. The encryption and decryption procedures are explained in this paper.
Keywords: Integrity, Confidentiality, Encryption, Decryption, Symmetric Key, Permutations, Cryptography.
Abstract
Secure Data Aggregation in Wireless Sensor Network using BECAN Scheme
Miss. Priyanka G. Padmane, Prof. K.G. Bagde
DOI: 10.17148/IJARCCE.2015.41042
Abstract: Wireless Sensor Networks (WSNs) are used in many applications in the area of tracking and monitoring. WSNs have many constraints like low computational power, small memory, and limited energy resources. Most of the energy consumption is due to data transmission. For that we apply Data aggregation approach on the sensed data by the deployed sensor nodes. This approach helps to reduce the number of transmissions and improves the life time of wireless sensor network with less energy usage of sensor nodes and also to protect Data Aggregation process from various kinds of attacks becomes extremely critical. So we give some general framework for Secure Data Aggregation.
Keywords: Wireless Sensor Network, Sink Node, Security, Attacks, Cluster, Data Aggregation.
Abstract
Sketch Retrieval using Contour Detection by Chain Codes
Mohan Mahanty, D. Kiranmayi, P. Chandana
DOI: 10.17148/IJARCCE.2015.41043
Abstract: Shape recognition, is a major problem in image processing. It is used in many areas like detection of patterns, face recognition, medical field, space, manufacturing industry, defense etc. In search by image, search is done in the web or dataset by text based query only. Sketch based image retrieval(SBIR) is a young research area, which requires the image like hand drawn black and white sketch as input. Today we have plenty of resources to draw the sketches and we are proposing a novel method to compare these sketches with the images with in our dataset using Contour Detection by Chain Codes.
Keywords: Chain Code, Contour Detection, SBIR, Sketches.
Abstract
LPCC and SIFT Based Biometric Amalgamation of Iris and Speech for Authentication and Identification
Kanika Mehra, Parul Malhotra
DOI: 10.17148/IJARCCE.2015.41044
Abstract: Multimodal biometric system verifies a person�s identity based on physiological (face, iris, fingerprint) or behavioral biometric traits (voice, signature). During this work, a brand new multimodal biometric system is developed i.e. using iris and speech. Initially, Iris and Speech recognition systems area unit developed singly by extracting their features from the Independent Component Analysis (ICA) technique for iris and from Gammatone Frequency Cepstral Coefficients (GFCCs) technique for speech. In proposed work, the speech and iris traits area unit combined along and also its performance is verified throughout authentication with the help of techniques Scale Invariant Feature Transform (SIFT) and Linear Predictive Cepstral Coefficient (LPCC). The performance evaluation of proposed method is done by Falsely Accepted Rate (FAR), Falsely Rejected Rate (FRR) and Accuracy, in MATLAB environment. The results obtained by proposed method are better than ICA and GFCC methods.
Keywords: Authentication, LPCC, SIFT, Iris, Speech.
Abstract
Knowledge Discovery from Student Database using Association Rule Mining
Mahendra Sahu, Smita Bagde, Rubina Sheikh, Narendra Dhawade
DOI: 10.17148/IJARCCE.2015.41045
Abstract: Discovering the hidden knowledge from large volume of student database and applying it properly for decision making is essential for ensuring high quality education in any academic institution. This knowledge is extractable through data mining techniques. Association Rule mining technique aims at discovering implicative tendencies that can provide valuable information for the decision maker. In this project, we are going to present an applied research on mining Association Rule using academic data of a university and use it for syllabus design. We are going to discover knowledge regarding the academic performance and personal statistics of students. And we will develop a technique to transform the existing relational database for student�s academic performance into a universal database format using academic and personal data of a student. After that we will transform the universal format into a modified format for suitability of using Association Rule mining algorithm. We will use FP Growth algorithm for finding interested association rules from the transformed database which can be useful to extract knowledge of student�s academic progress, decay in their potentiality, abandonment as well as retention of students. The impact of courses and curriculum and teaching methodologies are also found from the extracted knowledge which is beneficial for any institution of higher education.
Keywords: Data Mining, Reason Find out, Fp-growth Algorithm.
Abstract
A Review on Spatial Approximate String Search in Road Networks using RSASSOL Algorithm
Sunil Shelke, G. P. Chakote
DOI: 10.17148/IJARCCE.2015.41046
Abstract: The related work deals with the fast nearest string search in large spatial databases. Specifically, it investigates spatial range queries extent with a string similarity nearest search predicate in both Euclidean distance and road networks.. The spatial approximate string (SAS) query search problem is common in searching the approximate string in large spatial database. To apply the range queries augmented with a string similarity search predicate in both Euclidean space and road networks. In Euclidean space, we propose an approximate solution, the MHR-tree, which fix min-wise signatures into an R-tree. The min-wise signature for an index node keeps a pithy representation of the union of q -grams from strings under the sub tree of u. We analyze the cut away functionality of such signatures based on the set resemblance between the query string and the q -grams from the sub trees of index nodes. We also discuss how to estimate the selectivity of a SAS query in Euclidean space, for which we present a novel adaptive algorithm to find balanced partitions using both the spatial and string information stored in the tree. For queries on road networks, we propose a more exact method, The RSASSOL algorithm partitions the road network, adaptively searches relevant sub graphs, and prune candidate points using two attributes reference nodes and index of string matching. Lastly, an adapted Multipoint algorithm (MPALT) is applied, together with the exact edit distances, to verify the final set of candidates.
Keywords: Approximate string, Spatial database, RSASSOL, MPALT, Road network.
Abstract
Performance Analysis of Dispersion Compensation using FBG and DCF in WDM Systems
Gopika P, Sunu Ann Thomas
DOI: 10.17148/IJARCCE.2015.41047
Abstract: To improve overall system performance and reduce dispersion, several compensation technologies are proposed. In this paper, dispersion compensation scheme in WDM system is studied. For optical communication the widely used dispersion compensation technologies are Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG). Here an 8 channel optical network is used with two dispersion compensators ie., DCF and FBG. For DCF three compensation schemes (Pre, Post and Symmetrical) are modelled and for FBG two compensation schemes (Pre and Post) are modelled. NRZ modulation format is used in transmitter. From BER and Q-factor, it is observed that FBG when used in post compensation is better than all other compensation schemes.
Keywords: Wavelength Division Multiplexing (WDM), Dispersion, Dispersion Compensating Fiber (DCF), Fiber Bragg Grating (FBG), Q-factor, BER.
Abstract
Portable Camera Based Information Reading of Hand Held Packaged Product for Blind Person
Nitin N. Gaurkar, Prof. P. M. Soni
DOI: 10.17148/IJARCCE.2015.41048
Abstract: It is very difficult to understand the content or material in packaged product for the blind persons. With the help of sensation and smelling blind person can identify the material like sugar, salt etc. but the contents or materials in packaged productsare very difficult to understand so in this project we are dealing with this drawback and find out product information reading for blind person. To identifythe information about thepackaged product by using camera and the image taken from camera is given to mat lab for image processing.In mat lab the image of the product is comparedwith training dataset which was captured by camera and if the comparison of the captured image equals to the training dataset given to Bluetooth module of microcontroller and this is transferred to Bluetooth inbuilt android mobile. The corresponding information or application related to the tag is opened in the android mobile. The image and the text related to packaged productsare displayed on android mobile device and also voice announcement of the same text will be announced from therelated application installed in mobile device. So the user can hear the informationof packaged product by connecting earphones toandroid mobile device.
Keywords: Portable Camera, Blind person, packaged products, mat lab, information reading, android mobile.
Abstract
A Study on Evolution of Data in Traditional RDBMS to Big Data Analytics
Surajit Mohanty, Kedar NathRout, Shekharesh Barik, Sameer Kumar Das
DOI: 10.17148/IJARCCE.2015.41049
Abstract: The volume of data that enterprise acquires every day is increasing rapidly. The enterprises do not know what to do with the data and how to extract information from this data. Analytics is the process of collecting, organizing and analysing large set of data that is important for the business. The process of analysing and processing this huge amount of data is called bigdata analytics. The volume, variety and velocity of big data cause performance problems when processed using traditional data processing techniques. It is now possible to store and process these vast amounts of data on low cost platforms such as Hadoop. The major aspire of this paper is to make a study on data analytics, big data and its applications.
Keywords: BigData, Hadoop, MapReduce, Sqoop and Hive.
Abstract
A Review on Brain Tumour Segmentation
M. Selvi M.C.A., M.Phil, K. Maheswari M.C.A., M.Phil., Ph.D.,
DOI: 10.17148/IJARCCE.2015.41050
Abstract: The data mining is a research field of intersects with many other field such as Artificial Intelligence, Statistics, Visualization, Parallel Computing and Image Processing. Data mining techniques are Brain MRI image classification that can diagnose brain tumor and other diseases. This paper present the current research being carried out using the data mining techniques for the diagnosis of brain tumor. The following algorithms have been identified: Decision Trees, Support Vector Machine, Artificial Neural Networks and Fuzzy C-Means, K-means cluster. The analysis it is very difficult to name a single data mining algorithm as the most suitable for the brain tumor detection or classification. The segmentation of brain tumor is measured to be one of the complicated procedures in medical field. The MRI brain tumors segmentation is a composite process as the location of the edema region is much to identify. The intensity of the tumors differs in every patient which makes the exact boundary location of the lesions to appear blurred in the MRI images. This paper present also provides a critical evaluation of the literature reviewed, which reveals new facets of brain tumor segmentation.
Keywords: Data Mining, Brain Tumor Segmentation.
Abstract
A Model for Ethical Artificial Intelligence
Rohit Dsouza, Shraddha Ravishankar, Arushi Shah, PurvaRaut
DOI: 10.17148/IJARCCE.2015.41051
Abstract: The birth of the field of Artificial Intelligence was primarily due to the curiosity of researchers and inventors to create a perfect replica of the human mind. The thought of being able to simulate the human brain on a machine captured the imaginations of many, enticing and assimilating a wide array of research in the field, leading to a constant string of breakthroughs and new discoveries. With each breakthrough, our understanding of the boundaries and limits of the field were pushed, making it impossible to accurately estimate the complete scope of any project, with the only limitation being the technology available at the time. The primary purpose of any device implementing AI today, i.e. automation, was merely an application of the technology stumbled upon. As automation takes over our daily lives, it leads us to the main concern of where the line of ethics needs to be drawn and when does our pursuit for an ideal rational agent end with us questioning the morality of the decisions made by the machine. This paper tries to understand a model that weighs each choice with it�s moral conformation to truly decipher if a machine can understand each choice beyond the simple weighted values of desirability and goal reachability. After all, are we still trying to create the perfect human intelligence or just a perfect machine?
Keywords: Artificial Intelligence, Neural Networks, Brain Hierarchy, Morality, Ethics, Kant�s Laws, Responsibility.
Abstract
Survey on Application Models using Mobile Cloud Technology
Vinayak D. Shinde, Usha S Patil, Anjali Dwivedi
DOI: 10.17148/IJARCCE.2015.41052
Abstract: Nowadays, Smartphones supports a vast range of applications but in return demands a very high computational power increasing with time. But as we know Smartphone�s computation power, memory, storage, and energy are limited solution to this problem can be Cloud Computing that offers a very wide computational power, memory, storage and energy. Hence, Researches are aiming to get Cloud Computing for smartphones to fulfil its requirements. But the traditional Smartphone application models not supporting the cloud computing features and requires specialized mobile cloud application models has became a challenge for the researchers. This article covers mobile cloud architecture, decision affecting entities on offloading, classification of application models, the latest mobile cloud application models and their critical analysis.
Keywords: Cloud, Mobile Cloud, Application Models, Survey of Mobile Cloud.
Abstract
Influence of Cross Validation Parameter for the Classification Algorithms by using Yeast Dataset
S. Kalaivani, S. Gandhimathi
DOI: 10.17148/IJARCCE.2015.41053
Abstract: Data mining is a process which finds useful patterns from large amount of data. Data mining is the core part of the Knowledge Discovery in Database (KDD). It is also called as knowledge discovery process, knowledge mining from data, knowledge extraction or data /pattern analysis. Data mining techniques can be classified into summarization, classification, clustering, association rules and trend analysis. Classification aims to discover a small set of rules in the database that forms an accurate classifier. There are different classification methods such as decision tree, Rule Induction, Fuzzy rule , Neural Networks etc., In this paper we are analyzing the performance of 3 classification algorithms namely J48 Decision Tree, Decision Table, RBFNetwork. We use the Yeast datasets for calculating the performance of classification algorithms by using the training set parameter. And finally a comparative analysis based on the performance factors such as the Classification and execution time is performed on all the algorithms.
Keywords: Classification, J48 Decision Tree, Decision Table, RBFNetwork, Yeast dataset.
Abstract
Discovering Locally Frequent Patterns from Temporal Data
Fokrul Alom Mazarbhuiya
DOI: 10.17148/IJARCCE.2015.41054
Abstract: Mining patterns from large dataset is an interested data mining problem. Many methods have been developed for this purpose till today. Most of the methods considered the time attributes as one of the attributes like others. However taking the time attribute into account separately the patterns can be extracted which cannot be extracted by normal methods. These patterns are termed as temporal patterns A couple of works have already been done in mining temporal patterns. In this article, we propose an efficient method of mining locally frequent patterns from temporal datasets. The efficacy of our method is established using experiments carried on a real life datasets and a synthetic datasets. Then we make comparative studies with a well established method and found that our method outperforms at least one well-known method.
Keywords: Data Mining, Frequent patterns, temporal patterns, locally frequent patterns.
Abstract
Fast Weighted Guided Image Filter
Seella Krishnaveni, Dr. G. Umamaheswara Reddy
DOI: 10.17148/IJARCCE.2015.41055
Abstract: The Weighted guided image filter (WGIF) avoids halo artifacts, which is drawback of Guided image filter (GIF) at a cost of increment on running times. In this paper, a speedup method is included, which can speed up WGIF from O (N) time to O (N/s2). It can applicable in all applications in which WGIF can be used. Experimental results show that it can produce images with better visual quality comparable to WGIF and we can also observe the decrement on running times.
Keywords: WGIF, GIF, halo artifacts, run time.
Abstract
An Investigation on Image and Data Storage in Cloud Environment with an Enhanced Approach of Data Compression using Compressed Sensing
Manju Sadasivan, Radha Sridharan, Ranjitha M
DOI: 10.17148/IJARCCE.2015.41056
Abstract: High definition images are generated using the latest technology in image capturing. However the storage space requirements increases manifold since the large size of high definition images demands more memory. There have been a few methodologies recommended by various studies for the storage and retrieval of image data. This paper has identified two popular approaches to store images on cloud infrastructure. The first approach is to make use of Mirage Library which has commonly been exercised in IaaS Clouds to store image as structured data. The next approach is based on a technology called Deduplication to store the image by deploying kernel-space file system with Deduplication in the image storage server. Both these approaches are found to be effective in reducing the storage needs on virtual image store. This paper discusses a technique to compress data chunks (that are pre-processed through Mirage Library or Deduplication) using Compressed Sensing to further reduce the storage needs. It also encrypts the data chunks to ensure secure data storage.
Keywords: Deduplication, Mirage, Delta deployment, Image storage, Open Stack, Compressed Sensing.
Abstract
A Recommendation Method for Travel Packages using Hybrid Approach
Mr. Dipak R. Pardhi, Ms. Tejashri A. Patil
DOI: 10.17148/IJARCCE.2015.41057
Abstract: The online travel information imposes an increasing challenge for tourists who have to choose from a large number of available travel packages for satisfying their personalized needs. So we have to exploiting effective way of online travel information for personalized travel package recommendation. A critical challenge along this line is to address the unique characteristics of travel data, which distinguish travel packages from traditional items for recommendation. In this paper, we first analyze the characteristics of the existing travel packages and develop a tourist-area-season topic (TAST) model. This TAST model can represent travel packages and tourists by different topic distributions, where the topic extraction is conditioned on both the tourists and the intrinsic features such as locations travel seasons of the landscapes. Then, based on this topic model representation, we propose a cocktail approach to generate the lists for personalized travel package recommendation which follows a hybrid recommendation strategy and has the ability to combine many possible constraints that exist in the real-world scenarios. We extend the TAST model to the tourist-relation-area-season topic (TRAST) model for capturing the latent relationships among the tourists in each travel group.
Keywords: Tourist-Relation-Area-Season Topic (TRAST), Collaborative filtering (CF), Latent Dirichlet allocation (LDA), Advance RISC Machine (ARM).
Abstract
Study of Mosix Software Tool for Cluster Computing In Linux
Vinayak D. Shinde, Priyanka Tarmale, Shahista shaikh
DOI: 10.17148/IJARCCE.2015.41058
Abstract: Mosix conveniently supports a multi-user time-sharing environment for the execution of both sequential and parallel task. it is designed to respond to variations in the resource usage among the nodes by migrating processes from one node to another. Mosix use for load-balancing and to prevent memory depletion from any node .The core of the Mosix technology is the potential of multiple servers (nodes) to work cooperatively. Mosix is a system for sustaining cluster computing. It consists of kernel-level, adaptive resource sharing algorithms that are setup for superiority, overhead-free scalability and ease-of-use of a scalable computing cluster of a single system. It is consider as a leader in the field of high performance computing community.
Keywords: Cluster computing, Mosix Technology, scalability in Mosix.
Abstract
Alternative Path Selection through Density Based Approach for Controlling the Traffic in VANETs
Nagaraja S R, Dr. Nalini N, Rama Krishna K, Satish E G
DOI: 10.17148/IJARCCE.2015.41059
Abstract: Vehicular Ad-Hoc Networks (VANETs) are receiving a lot of attention due to the wide variety of services they can provide. Their applications range from safety, crash avoidance Internet access and multi media. VANETs are the most important component of Intelligent Transportation System (ITS). One of the main goals of the ITS is to improve safety on the roads, and reduce traffic congestion, waiting time, and fuel consumption. A lot of work and research around the globe is being conducted to define the standards for vehicular communication. Technical challenges in vehicular ad hoc network development include network discovery, conjunction control, routing, collaborative signal, information processing, querying and security. Vehicular traffic is the primary problem of many developing countries. Vehicular traffic occurs when the volume of traffic flow demand for space greater than the available road capacity. One of the main issues in this type of system is to control the vehicular traffic signal at the intersection of the roads. But in the traditional signalling of road scenarios this will not fully help for the control of the traffic and will be unable to adjust the timing pattern. In this paper we propose dynamic signalling which is based on the density of the vehicles in the road scenario. Suppose if the density increases in the vehicle then an alternative path has to be selected. So this work prevents the vehicles traffic at the inter section and also reduces the time of the passengers.
Keywords: Inter-Vehicle Communications (IVC), Roadside-to-Vehicle Communications (RVC), Vehicular Networks. Vehicular Ad Hoc Networks (VANETs), Mobile Ad Hoc Networks (MANET), Wireless Access for Vehicular Environment (WAVE), On-Board Units (OBU), Road Side Units (RSU).
Abstract
A Conceptual Model of Automated Attendance System using Image Processing
Prof. Sumita Chandak, Mansi Patange, Himani Deshpande, Saifina Maredia, Prathmesh Bagwe
DOI: 10.17148/IJARCCE.2015.41060
Abstract: Conventionally, student record keeping is done manually by teachers through roll calling or by passing an attendance sheet in the class. These methods are time consuming, prone to errors and proxy attendance. Moreover digital assimilation of records is tedious since teachers need to fill in the details in the database by themselves to generate reports. Consistency in manual and digital records also needs to be maintained. In the recent years, automated systems that have evolved use standard biometrics like fingerprint and iris recognition. These systems are intrusive in nature and require expensive gadgetry. Also deploying them on a large scale is detrimental to the project budget. Thus our project design makes use of facial detection and recognition algorithms like Viola Jones and PCA to identify the students in the image captured by a basic camera. This image is uploaded in the software by the professors using a simple USB cable where various combinations of algorithms detect the faces and compare it to the student image database for recognition phase. Daily attendance automatically gets updated in the database thereafter. This system solves the problem of redundancy in manual records and makes attendance keeping a convenient task.
Keywords: Automated Attendance System, Face Detection, Face Recognition, PCA (Principal Component Analysis), Viola Jones, Camera, OpenCV, PHP.
Abstract
Feature Extraction Using PCA Using Algorithm
Nishu, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.41061
Abstract: In face recognition technology, facial marks identification method is one of the unique facial identification tasks using soft biometrics. Also facial marks information can enhance the face matching score to improve the face recognition performance. As numbers of folk apply their face with cosmetic items.Some of the facial marks are invisible from their faces. Iris recognition is the most accurate biometrics which received increasing attention in departments which require high security. In this paper, we make a comparative study of performance of image transforms using principle of component analysis (PCA).The main aim of this paper is to show that how can we get better overall accuracy than the existing methods of feature extraction of iris recognition system.
Keywords: Face recognition, facial marks, PCA, edge detection, Iris recognition, edge detection.
Abstract
State Estimation Using Neural networks
Ravi Shankar. Mogili
DOI: 10.17148/IJARCCE.2015.41062
Abstract: In underwater scenario, tracking i.e. computing motion parameters of targets is a challenging task. In this field Sonars act as sensors which provide directional or approximate positional measurements of static/moving targets in Polar coordinate system which makes the system parameters nonlinearly related with measurements. The prevalent solutions available in literature like EKF, UKF and PF approximate the relation through linearization etc. Artificial Neural Networks (ANN) is famous as nonlinear model free data driven estimators. They were applied with striking success in the field of control systems (System Identification), Speech processing (Noise cancellation) etc. The present work is a novel effort to apply ANN to handle nonlinearity and to improve tracking accuracy. Performance of proposed algorithm is compared with existing tracking algorithms EKF.
Keywords: Target Tracking, State Estimation, Neural networks, Maneuver.
Abstract
V-Drum: An Augmented Reality Drum Kit
Nestor Lobo
DOI: 10.17148/IJARCCE.2015.41063
Abstract: Most modern drum kits are large in size and difficult to transport. Similarly, the cost of a fully stocked drum kit is far in excess of what an average enthusiast can afford. The maintenance of such equipment can be expensive and keeping the instruments properly tuned involves a considerable amount of time. All this can discourage many from seriously learning to play percussion instruments. Musicians draw inspiration from the world around them and in many cases are unable to construct a new piece due to the lack of readily available instruments. The V-Drum is a low-cost, portable drum kit whose implementation is based in Augmented Reality. With the V-Drum, any person with interest can learn to play percussion instruments and even construct music with the variety of virtual instruments at their disposal.
Keywords: Human Computer Interaction, Image Processing, Musical Instrument, Augmented Reality, Pattern Recognition, Computer Vision.
Abstract
Data Mining Using Secure Homomorphic Encryption
Raunak Joshi, Bharat Gutal, Rajkumar Ghode, Manoj Suryawanshi, Prof U.H. Wanaskar
DOI: 10.17148/IJARCCE.2015.41064
Abstract: Data Privacy is one of the major issues while storing the Data in a database environment. Data Mining based attacks, a major threat to the data, allows an adversary or an unauthorized user to infer valuable and sensitive information by analyzing the results generated from computation performed on the raw data. This paper presents an approach to mine the data securely using k-means algorithm even in the presence of adversaries. This approach assumes that the data is not stored in a centralized location but is distributed to various hosts. This proposed approach prevents any intermediate data leakage in the process of computation while maintaining the correctness and validity of the data mining process and the end results.
Keywords: Data Mining, Security, K-means, Encryption.
Abstract
Improved Energy and Route Failure Protocol (IERFP): A Framework for MANET Routing
Dr. P. R. Gundalwar, Dr. Vinay Chavan
DOI: 10.17148/IJARCCE.2015.41065
Abstract: The importance of MANET routing algorithm proves their equal share to IP networks. Many application domains are heavily based on wireless devices. The requirement is limited by ability to select the best route and minimum energy consumption depending upon the battery level and reliability pair between two neighbors. The IERF protocol proves with equilibrium for such constraints. AODV is modified using reliability pair factor, path accumulation to improve battery strength and route discovery with minimum failure. The IERF protocol is designed, developed and analyzed using NS 2.35 simulator. The newly designed IERF protocol is superior to other existing MANET protocols.
Keywords: MANET, AODV, RPF, PA, NS 2.35.
Abstract
Model Predictive Control and Generalized Adaptative PID for Load Sharing In Systems of Multiple Sources of Energy
Mouhamadou Falilou Ndiaye, François Guérin, Dimitri Lefebvre, Papa Alioune Ndiaye
DOI: 10.17148/IJARCCE.2015.41066
Abstract: This paper describes the control of the energy transfers in Systems of Multiple Sources of Energy (SMSE). The considered SMSE is a Linear Time Varying (LTV) system in view of the sources and load fluctuations. The proposed control scheme includes DC bus voltage and current regulations loops as well as the automatic adjustment of the power ratio associated with each source. DC bus voltage and current regulations loops are carried out by generalized adaptive PID controllers. The calculation of the power ratios is computed with a Model Predictive Controller (MPC) designed to optimize the system overall performance
Keywords: Generalized adaptative PID, Model control predictive, energy, multi source
Abstract
Annotating Search Results from Web Databases
Prof. P. S. Badgujar, Shagufta Pathan, Aayesha Sayyed, Salina Ansari
DOI: 10.17148/IJARCCE.2015.41067
Abstract: In the world increasing number of information. This total information has become web based use of HTML files form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. For the encoded data units to be machine process able, which is essential for many applications such as deep web data collection and Internet comparison shopping, they need to be extracted out and assigned meaningful labels we present an automatic annotation approach which contains the data units on the web result page into a different groups such that same groups have the same semantic labels. Then the six annotations are combined and predict the final annotation label. An annotation wrapper for the search site is automatically constructed and can be used to annotate new result pages from the same web database. Our experiments indicate that the proposed approach is highly effective.
Keywords: Data alignment, data annotation, web database, wrapper generation.
Abstract
An Empirical Analysis of Hype-cycle: A Case Study of Cloud Computing Technologies
Amol C. Adamuthe, Jyoti V. Tomke, Gopakumaran T. Thampi
DOI: 10.17148/IJARCCE.2015.41068
Abstract: Gartner consulting analyst observed that promising new technologies seem to go through a predictable pattern in the early stage. The pattern is positive hype and negative hype caused by high user expectations and disappointment occurred respectively. Existing research literature on hype-cycle fails to provide sufficient consideration for theoretical frame and empirical verification. This paper provides an empirical validation for the hype cycle. Many investigators are reported that cloud computing is disruptive or transformational technology. Hence for case study we have considered cloud computing deployment models, service models and sub-technologies. This paper presents the hype cycle of cloud computing technologies using news articles and compared with Gartner hype cycles. This paper also investigates the correlation between hype cycle and life cycle of cloud technologies.
Keywords: Cloud computing, Hype-cycle, Life cycle, Gartner hype-cycle.
Abstract
DupliCut: Redundant File Finder and Remover
Sumita Chandak, Abhishek Kadam, Bhagyashree Gawade, Jidnyesh Sankhe, Rohish Badkar
DOI: 10.17148/IJARCCE.2015.41069
Abstract: Desktop environment provides storage as an essential service. Data storage is the aim when users outsource their data to be stored in a place irrespective of the locations. File systems are actually designed to control how files are stored and retrieved. Without knowing the context and semantics of the content, file systems often contain duplicate copies and result in redundant consumptions of storage space and network bandwidth. It has been a tedious and challenging issue for enterprises to seek reduplication technologies to reduce cost and increase the storage efficiency. In order to solve such problem, hash values for files have been computed. The hash function competition to design a new cryptographic hash standard `SHA-3' is currently one of the well-known topics in cryptologic research, its outcome largely depends on the public evaluation. Testing the finalists in the competition for a new SHA-3 standard shows generally fast, secure hashing algorithms with few collisions and problems. Focus of computation is performed for duplicate and redundant knowledge removal. Hash computation is done by the method of comparing files initially and followed by SHA3 signature comparison. Saves time and enhances accessibility. It helps you reclaim your valuable storage space and keep your data secure. It provides fast and efficient way to detect and remove duplicate files. Therefore, ample memory can be saved by running DupliCut.
Keywords: Redundant data, DupliCut, SHA-3, Storage efficiency.
Abstract
Augmented Reality System for Engineering Graphics
Dhara Parmar, Krupali Pelmahale, Romil Kothwade, Prof. PankajBadgujar
DOI: 10.17148/IJARCCE.2015.41070
Abstract: Augmented Reality also known as AR is an upcoming technology in which the real-time environment is being totally imposing the information which is being generated by computer which includes graphics, text data, and even the audio contents on to the display device. The existing system is an android based mobile applications and the proposed system will be on the desktop based applications which will be further compatible with all the versions of any operating systems. The main motive of Augmented Reality (AR) is to augment the virtual world objects into the real world objects. It will consider every graphical view such as top, bottom, right, front, left, back side of that particular object. The object will be placed on to the 3D plane/cube which will help to map the actually virtual object completely and then it appears similarly as that of the coexisting within environment. The main advantage will be that it will be already compared to the Two Dimensional applications that would display in the Three Dimensional applications and also will allow any user to rotate it. It�s mainly useful for the Engineering students. It will combine it with interactive 3D content with the purpose for understanding the graphics and also improving the visualization skills.
Keywords: Augmented Reality, Processing, Marker, Operating System, Engineering Graphics, Geometry Applications.
Abstract
Facial Expression Based Music Player
Prof. Jayshree Jha, Akshay Mangaonkar, Deep Mistry, Nipun Jambaulikar, Prathamesh Kolhatkar
DOI: 10.17148/IJARCCE.2015.41071
Abstract: The human face is an important part of an individual's body and it especially plays an important role in knowing an individual's mood. Extracting the required input from the human face can now be done directly using a camera. This input can then be used in many ways. One of the applications of this input can be for extracting the information to deduce the mood of an individual. This data can then be used to get a list of songs that comply with the �mood� derived from the input provided earlier. This eliminates the time-consuming and tedious task of manually segregating or grouping songs into different lists and helps in generating an appropriate playlist based on an individual's emotional features. Various algorithms have been developed and proposed for automating the playlist generation process. Facial Expression Based Music Player aims at scanning and interpreting the data and accordingly creating a playlist based the parameters provided. The scanning and interpreting includes audio feature extraction and classification to get a list of songs belonging to a similar genre or to get a list of similar sounding songs.
Keywords: Music player, Face Detection, Facial Expression Recognition, Audio Feature Recognition, Viola Jones Algorithm.
Abstract
Watermarking Techniques and Embedding Techniques using AES-128 in digital image and text files
Preeti Singh, Manju Mathur
DOI: 10.17148/IJARCCE.2015.41072
Abstract: Digital watermarking mainly used to transmit confidential data, by embedding that data into some color images. This paper presents a technique to implement data hiding in color images using Advanced Encryption Scheme (AES-128) and their restoration to original data to generate a time effective and secure technique. AES-128 is used to encrypt the data and to offer message authentication. Some tentative and structural designs are also given in this paper to explain the effectiveness of proposed technique.
Keywords: Digital Watermarking, Advanced Encryption Standard (AES-128), Structural Designs, Data Hiding.
Abstract
Performance Study of Fifth Generation Scalable Channel Emulator for Wideband MIMO Systems
A. Lakshminarayanan, V. Krishnakumar, N. Jayapal, K. Kumar, T. Meenal
DOI: 10.17148/IJARCCE.2015.41073
Abstract: The number of wireless devices, diversity of communication standards and class of modulation schemes area unit increasing dramatically annually. The Fifth Generation (5G) cellular communication system is calculable to arrive around 2020. The goals of 5G area unit to attain ten to one hundred times higher typical user knowledge rates, starting from one to ten Gbps in dense urban environments. With every resultant generation of technology, the value of testing wireless devices mistreatment the normal techniques additionally has enlarged. Wireless channel emulation is turning into more and more vital, notably with the arrival of multiple-input�multiple-output (MIMO) systems, wherever system performance is very enthusiastic about the correct illustration of the channel condition. As technology moves forward to require advantage of a lot of advanced channel characteristics like MIMO, the channel modeling required to accurately emulate the radio surroundings becomes even a lot of crucial to a check setup. A large effort has been taken by American state to style a vast MIMO (16X20) channel human to accurately emulate the radio surroundings for testing subsequent Generation Network (NGN) by generating most range of noise samples and achieving a most delay unfold and providing a most range of channels. The design specifications area unit obtained mistreatment MATLAB. The alpha-lipoprotein cryptography is carried for the look to be enforced on Altera FPGA.
Keywords: MIMO, channel emulation, Altera FPGA.
Abstract
A Convergent Version of Maximum SINR Algorithm for MIMO Interference Channel
Ms. Nimmy Mathew
DOI: 10.17148/IJARCCE.2015.41074
Abstract: The problem of designing linear transmits signaling strategies for the multiple inputs, multiple output (MIMO) interference channel is considered. One of the first algorithms inspired by Interference alignment (IA) is Minimum Leakage Algorithm (Min Leakage Algorithm) for the MIMO Interference Channel. Iterative algorithm, Max SINR, was proposed in [5] that gives better sum rate performance. The Max SINR algorithm starts with arbitrary transmits beamforming vectors and then designs receivers to optimize the signal-to-interference-plus-noise ratio (SINR) at each receiver. Next, the algorithm alternates the direction of communication and repeatedly optimizes the SINR at each receiver. This algorithm outperforms the other algorithms mentioned before, but there is no proof that it actually converges. Modified Max SINR is the modified version of Max SINR in which thesum rate converges. Modified Max SINR follows the same basic principleas Max SINR with two key differences. First, Modified Max SINR usesthe sum stream metric as a convergence criterion. Second, Modified MaxSINR changes the powers for each stream when it reverses the direction ofcommunication to achieve SINR duality. Computing Power Allocation to Achieve SINR Duality: In order to achieve SINR duality Algorithm need to compute the appropriate power allocation every time change the direction of communication using a distributed power control algorithmThis algorithm monotonically increases the sum stream and therefore converges.
Keywords: SINR, MIMO Interference Channel, Interference alignment (IA).
Abstract
Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds
A. Sree Valli, R. Chandrasekhar
DOI: 10.17148/IJARCCE.2015.41075
Abstract: Many past systems have explored with the problem is how to eliminate a novel end-to-end traffic redundancy by which improves network efficiency. Several of these systems operate at the application layer while the more recent systems operate on individual packets. In this paper, we present PACK (Predictive ACKs), a novel designed for cloud computing customers end-to-end traffic redundancy elimination (TRE) system. PACK�s main advantage is its capability of increase the offloading the cloud-server TRE effort very end client, thus minimizing the processing costs activate by the TRE algorithm. Like other techniques PACK does not require any external support to maintain client�s status. By combing cloud computing client the efficiency per physical hosted server is improved greatly, data and resources are hotfoot provisioned provided as standardized offerings to users with a flexible price. But it is important to provide the convenient pricing model for the users of cloud. Hence we design a new traffic redundancy and elimination scheme for reducing the cloud bandwidth and costs. PACK is based on a novel TRE technique, which allows the client to use newly received block to identify previously received block chains, which in turn can be used as reliable, with respective predictors to future transmitted blocks. We present a fully functional PACK implementation transparent to all TCP-based applications and network devices. Finally, we analyze PACK benefits for cloud users, using traffic traces from various sources.
Keywords: cloud computing, traffic redundancy elimination, quality of service, caching, network optimization.
Abstract
Object Detection by Colour Threshold Method
Jayati Singh, Shubham
DOI: 10.17148/IJARCCE.2015.41076
Abstract: In this paper, an algorithm is presented for colour object detection and tracking based on colour threshold technique.Thisalgorithm can be implemented to track an object of any colour. The same has been demonstrated on a red coloured phone. Initially, this red coloured phone is detected from a real-time image using colour threshold method. Its� accuracy is improved by the use of morphological process where the object to be detected is denoted as white leaving the background dark. Then its� location is tracked by obtaining its� coordinates from the image. This process can then be used in iteration for real-time video processing.
Keywords: Colored object detection, Object tracking, Image processing, and Video Processing.
Abstract
Honking with Reduced Effect on Noise Pollution
Pratik Doshi, Prem Halani, Vinit Jasoliya, Madhur Jain, Prof. Vinaya Sawant
DOI: 10.17148/IJARCCE.2015.41077
Abstract: Transportation sector is one of the major contributors to the noise pollution in urban areas. Various researches show that honking is one of the major causes for noise pollution. This constant increase in noise pollution due to honking needs to be restrained effectively. We present you various techniques which can be implemented to reduce the impact of honking on noise pollution without reducing the effectiveness of honking.
Keywords: Honking, Noise Pollution, Vehicles, Noise.
Abstract
Web Intrusion Using Advanced SQL Injector and Countermeasures
Mrs. R. Raghavi Tharani, S. Jayasurya, A. Azath
DOI: 10.17148/IJARCCE.2015.41078
Abstract: The topic web intrusion using advanced SQL injector and counter measures, SQL injection has become a predominant type of attack that target web applications. It allows attackers to obtain unauthorized access to the back-end database to alter the intended application-generated SQL queries. Researchers have proposed various solutions to address SQL injection problems. Our dependence on the web applications for the fulfillment of our daily needs (like share trading, banking, ticket booking, online shopping, payment of bills etc.) has increased. Because of this, our private data is present in the databases of various applications on Web. The defense of this myriad amount of data is a theme of major anxiety. In current times, SQL Injection attacks have emerged as a major risk to database security. In this paper we characterize SQL Injections, illustrate how SQL Injections will perform. In addition we have also surveyed the various SQL Injection recognition and anticipation tools and well-known assail methods.
Keywords: Introduction, Injection Mechanism, tools.
Abstract
Quantum Key Distribution
Shaunak Shah, Mrinalini Shah, Ayush Shah, Rishi Shah
DOI: 10.17148/IJARCCE.2015.41079
Abstract: Data security in present age of cutthroat competition is a dire necessity. With present encryption methods to keep pace with hackers, the algorithms for encryption are getting more complicated with day. It is only a matter of time before this equation is reverse engineered, to successfully decrypt it. Thus a need for more secure means of communication is realized. To address this, quantum key distribution is a front-runner. Although it is still in its infancy, this technology has the potential to become a secure means of communication. Here data is encrypted with a private shared key, which changes every minute, possession of source and receiver. This key is sent by encrypting of selectively polarized photons, in form of binary. A hacker can intercept both but interception changes polarization, alerting both involved parties and rendering the message inaccessible. This has wide applications in ever expanding field of communication and could prove to be the future.
Keywords: Security, Cryptography, Symmetric Key, and Quantum Cryptography.
Abstract
Secure Optical Communication using Spreading Codes and Cryptography
Mintas Parveen C. M.
DOI: 10.17148/IJARCCE.2015.41080
Abstract: Fiber optic communication uses several multiple access schemes. Among them Optical Code Division Multiple Access (OCDMA) is one of the multiple access schemes that are widely used because of their advantages such as the flexibility in the allocation of channels, ability to operate asynchronously, enhanced privacy and increased in burst networks. This paper deals with the security enhancement of an OCDMA system. Network security has three major security goals: confidentiality, availability and message integration between senders and receivers. To overcome the drawback of existing OCDMA system cryptography is applied. Cryptography can be used by everyone to protect the confidentiality of their information transmitted over insecure channels as well as to provide privacy, authenticity and data integrity. To provide more confidentiality two cryptographic techniques are incorporated into the system. The proposed technique is based on cryptography which includes the encryption and decryption of the information with the employment of a random key. This paper also discusses the comparison of the above two cryptographic techniques in the OCDMA system to find the best suited encryption technique for OCDMA system that provides strong security.
Keywords: Optical Code Division Multiple Access, Spreading codes, Cryptography, Advanced Encryption Standard, Blowfish.
Abstract
A Survey on Fine-Tuning MapReduce Slot Configuration for Hadoop Clusters
P. Ramarajpandiyan, R. Dharmaraj
DOI: 10.17148/IJARCCE.2015.41081
Abstract: The MapReduce is an open source Hadoop framework implemented for processing and producing distributed large Terabyte data on large clusters. Its primary duty is to minimize the completion time of large sets of MapReduce jobs. Hadoop Cluster only has predefined fixed slot configuration for cluster lifetime. This fixed slot configuration may produce long completion time (Makespan) and low system resource utilization. Our proposed scheme is to allocate resources dynamically to MapReduce tasks. It can be done by following slot ratio configuration between map and reduce tasks, by updating the workload information of recently completed tasks. Many scheduling methodologies are discussed that aim to improve completion time goal.
Keywords: MapReduce, Makespan, Workload, Dynamic Slot Allocation.
Abstract
Content Based Image Retrieval using HSV Color, Shape and GLCM Texture
Cheruvu Mahammad Ibraheem, Dr. G. Umamaheswara Reddy
DOI: 10.17148/IJARCCE.2015.41082
Abstract: In the most recent years, content based image retrieval has been studied with more attention due to huge amounts of image data accumulate in different fields, e.g., medical, satellite, art collections, commercial images and general photographs. Image databases are generally big, and in most of the cases, the images are indexed only by keywords given by a human. Even though keywords are most useful in retrieving images that a user wants, sometimes the keyword approach is not sufficient and not efficient. Instead, a Query-by-example (QBR) or pictorial-query approach gives similar images to the query image given by a user. The query images can be a photograph, user-painted example, or line- drawing sketch. In this method, images are retrieved by their contents such as color, texture, shape, or objects. Thus, the degree of similarity between query images and images in database can be measured by color feature extraction, texture feature extraction, shape feature extraction similarity, or object presence between the two images. Using a single feature extraction for the image retrieval cannot be a amicable solution for the accuracy and efficiency. High-dimensional feature will reduce the query efficiency; low-dimensional feature will reduce the query accuracy, so that, better way is using multi features for image retrieval. Color, texture and shape are the most important visual features.
Keywords: Content Based Image Retrieval(CBIR), Hue(H), Saturation(S), Value (V), Grey Level Co-Occurrence Matrix (GLCM).
Abstract
Electronic Vein Finder
Vivek Sureshkumar, Sheba Elizabeth Kurien, Smilu Sunny, Stephy James, Lakshmy .S
DOI: 10.17148/IJARCCE.2015.41083
Abstract: Electronic Vein Finder is a system which aims to help locate and distinguish vein effectively for various medical purposes. The existing technology is complex and expensive. In this paper a simple design is proposed to capture the vein images under infrared lighting and extract the vein pattern using image processing technique. The enhanced image can be projected back on to the patient�s hand.
Keywords: Image processing, infrared, region of interest, vein display.
Abstract
Comparative Study of AODV, DSR and AOMDV Routing Protocols in MANET
Yashashree A. Jakhade, Nitin R. Gavai
DOI: 10.17148/IJARCCE.2015.41084
Abstract: A Mobile Ad-hoc Network MANET is a dynamic wireless network that is formed even if an infrastructure in which each nodes act as a router does not exist. MANET is an autonomous system in which mobile nodes are connected by wireless links. All the nodes operate as an end system and as a router, to route packets. The nodes are freely movable and organize themselves into a network. The change in positions of these nodes is frequent. In this work we attempt to compare the performance of three prominent on demand reactive routing protocols AODV, DSR and AOMDV.
Keywords: MANETS, AODV, DSR, AOMDV .
Abstract
Study and Analysis of the Scope of Improvements in Fitness Advisor Systems using Data Mining
Christy Samuel Raju, Sanchit V Chavan, Karan Pithadia, Shraddha Sankhe, Prof. Sachin Gavhane
DOI: 10.17148/IJARCCE.2015.41085
Abstract: There are a lot of health related problems today that have a direct or an indirect connection to the respective person's body weight. Efficient diagnosis of the same and spreading proper awareness about the health hazards associated with body weight is the need of the hour. The idea that a �Better diagnosis leads to a Better solution� is the inspiration of the proposed system. The proposed system is a desktop application that advises the user according to his/her requirement (gain weight, maintain weight, reduce weight). The application uses a combination of classification, clustering and association algorithms to efficiently direct all the given data to the best possible solution.
Keywords: Fitness, Advice, Clustering, Association, Classification, Data Mining, Health.
Abstract
Privacy Preserved Image Recognition on MSB Encrypted Images
Sayyada Fahmeeda Sultana, Dr. Shubhangi D.C.
DOI: 10.17148/IJARCCE.2015.41086
Abstract: Cloud computing are the most valuable innovations for business, research, development, etc., providing cheap, virtual-services that will require expensive local hardware. With the availability of Cloud Computing we place almost everything in the cloud, but what do we really know about its security. One of the security risks in cloud computing according to Garfunkel is data intrusion. Privacy preservation of online data while offering efficient functionalities has become an important and focused research issue. Encryption is one of the fundamental techniques that manage the digital rights of any personal or other confidential information. In this paper we present a Privacy preserved image recognition system on MSB encrypted face images performed using one time padding, followed by Face image recognition with PCA-principal component analysis followed by SIFT- Scale invariant feature transform on selected images. MSB encryption provides protection of image with low PSNR from un-trusted managing authority cloud server. Whole face image recognition process performed in encrypted domain.
Keywords: Cloud; Face Images; PCA; PCA followed by SIFT; MSB; ROC;
Abstract
A Study on Data Mining Methodologies and Trends with Big Data Healthcare Analytics/Analysis
M. Saranya M.Sc., M.Phil, K. Sarojini M.C.A., Ph.D.,
DOI: 10.17148/IJARCCE.2015.41087
Abstract: Analyzing and predicting the knowledge from the big data plays a critical role in the real world environment which needs to be concerned more to provide an efficient treatment for the health care patients. Handling and treating the patients online may generate large volume of data dynamically. These large volume of data need to be handled more carefully to predict accurate result. And also establishing connection among multiple patients in the real world environment leads to more troubling process. In this article, more methodologies that were introduced previously to handle large volume of data in terms of scalability and the security are discussed deeply. And also, the methodologies that concentrate on gathering data from multiple locations without anomalies are discussed in detail.
Keywords: Big data, Data mining, Healthcare.
Abstract
Video Enhancement to Obtain Intra and Inter Frame Quality of a Video
A. Harikrishna, S. Swarnalatha
DOI: 10.17148/IJARCCE.2015.41088
Abstract: Video Enhancement is employed in different video applications. In this paper, a new algorithm is proposed to obtain the quality of intra frames and inter frame consistence among the frames in a video. The intra frame Quality is obtained by enhancing the multiple ROI�s in a frame through tone mapping technique. In addition to the intra frame quality, the inter frame consistency is assured. Experimental Results show that the proposed algorithm performs well compared to the existing algorithms.
Keywords: Intra frame, Inter frame, PSNR, MSE, video processing, tone mapping.
Abstract
Autonomous Mapping Using RSSI-based Fingerprinting
Arjun Prasath, Upasna Suman
DOI: 10.17148/IJARCCE.2015.41089
Abstract: In this paper we present an autonomous method of mapping an indoor location by building an RSSI (Received Signal Strength Indication)-based fingerprint database. We use a robot, a Kinect sensor, a laptop and a WLAN receiver in this project. The Kinect gives the coordinates of the robot; the coordinates are stored in a database. Simultaneously, the WLAN receiver sends the RSSI data to the database. Once this is achieved the robot moves forward and the process is repeated till the entire area is mapped.
Keywords: RSSI, fingerprinting, Localisation, mapping.
Abstract
Improvement of Accuracy of Human Blood Groups Determination using Image processing Techniques
Mehedi HasanTalukder, Md.Mahfuz Reza, Mahbuba Begum, Md. Rabiul Islam, Md. Mahmudul Hasan
DOI: 10.17148/IJARCCE.2015.41090
Abstract: It is very crucial to determine human blood groups in an emergency situation. But according to current system, the detection procedure is very slow. At present, human blood groups are determined manually through plate test procedure. It consists of blood collection and mixing with specific reagents in order to determine the blood agglutination. The results are checked microscopically. In this paper, the main objective is to present a methodology to determine human blood groups using image processing techniques.
Keywords: Blood types, Image processing, Standard deviation, Plate method, Agglutination, MATLAB, Accuracy, Human Blood, Antigens.
Abstract
Secure Encounter-Based Mobile Social Networks: Requirements, Designs and Tradeoffs
Unnati Dhavare , Prof. Umesh Kulkarni
DOI: 10.17148/IJARCCE.2015.41091
Abstract: Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflect a user�s preferences on friend selection in real life. In this paper, we present Friendbook, a novel semantic-based friend recommendation system for social networks, which recommends friends to users based on their life styles instead of social graphs. By taking advantage of sensor-rich smartphones, Friendbook discovers life styles of users from user-centric sensor data, measures the similarity of life styles between users, and recommends friends to users if their life styles have high similarity. Inspired by text mining, we model a user�s daily life as life documents, from which his/her life styles are extracted by using the Latent Dirichlet Allocation algorithm. We further propose a similarity metric to measure the similarity of life styles between users, and calculate users� impact in terms of life styles with a friend-matching graph. Upon receiving a request, Friendbook returns a list of people with highest recommendation scores to the query user. Finally, Friendbook integrates a feedback mechanism to further improve the recommendation accuracy. We have implemented Friendbook on the Android-based smartphones, and evaluated its performance on both small-scale experiments and large-scale simulations. The results show that the recommendations accurately reflect the preferences of users in choosing friends.
Keywords: Social networks, Location-based services, Privacy, Semantic-based.
Abstract
Power and Pressure Efficient Data Dissemination Protocol for Underwater Sensor Networks
Mrs. G. Angeline Prasanna, R. Indhumathi
DOI: 10.17148/IJARCCE.2015.41092
No abstract available.
Abstract
Shrewd Cities with Internet of Things
Prof. Mayur Raut, Mr. Shashank Singh
DOI: 10.17148/IJARCCE.2015.41093
Abstract: The Internet of Things shall be able to incorporate transparently and seamlessly a large number of different and heterogeneous systems by giving open access to appropriate subsets of data for the development of a plethora of digital services. To build common architecture which is general for IoT is hence a very complex task, mainly because of the extremely large variety of devices and services that may be involved in such a system. In this paper, we focus specifically on urban IoT system which is being a broad category, are characterized by their specific application domain. Urban IoTs are designed for supporting the Smart City vision, which aims at exploiting the most advanced communication technologies to support value-added services for the administrative of the city and for the citizens. Furthermore, the paper is going to discuss and present the technical solutions and best-practice guidelines adopted in the Padova Smart City project, a proof-of-concept of deployment of an IoT island in the city of Padova, Italy, performed in collaboration with the city municipality.
Keywords: Automation, Smart Cities, Urban IOT Architecture.
Abstract
Ontology Learning based on Bootstrapping Approach using Improved ET Algorithm for Semantic Web Services with WSDL
Sasanka Bhimavaram, Dr. P. Govindarajulu
DOI: 10.17148/IJARCCE.2015.41094
Abstract: In this research work, we deliberate how ontologies can be constructed by mining information from databases and Web documents in web service description language. This is a stimulating task, because information mining is typically a noisy effort whereas ontologies generally involve hygienic and crispy data. This means that the mined information has to be cleaned, disambiguated and prepared logically stable to certain step. We discuss approaches that extract ontology in this spirit from the relational databases and also present methodologies that objective to extract ontology from documents or by extension from the entire Web then implemented with the improved enhanced traversal algorithm on the databases such as bank and hospital then obtain better accuracy performance. We will show that information mining and ontology creation can arrive into a successful support loop, where additional mined information pointers to a bigger ontology which helps mining more information.
Keywords: Ontology, Semantic Web Services, Bootstrapping, Improved ET Algorithm, WSDL.
Abstract
Spectrum Sensing and Optimization Based on New Energy Detection Methods in Cognitive Radio
Sunil Raghuwanshi, Balram Yadav, Bharti Chourasia
DOI: 10.17148/IJARCCE.2015.41095
Abstract: Development of new wireless applications and services, spectrum resources are facing unprecedented demand. Currently, spectrum allotment is done by providing each new service with its own fixed frequency band. With each passing day most of these technologies are tending toward fully wireless mode. Spectrum scarcity is one of the huge challenges that the current wireless technologies is facing. As Most of the spectrum band is already assigned. It has become more difficult to incorporate the new technologies or expand the existing services. To address this challenge, cognitive radio has rising technology, which avoids the congestion in wireless communication by feat unused radio spectrum. In this paper one of the spectrum sensing method Energy detection is discussed and compare the ROC (Receiver Operating Characteristics) curve and probability of detection (Pd) versus SNR (Signal-to-noise Ratio) curve for Rayleigh channel using cubic , double-squaring and addition of squaring operations. The double-squaring operation show an improvement up to 0.3 times and addition of squaring operation show an improvement up to 0.7 times as compared to the cubic operation for Rayleigh channel.
Keywords: Cognitive Radio, Rayleigh channel, SNR, ROC.
Abstract
Brain Tumor Disease Identification Using GNSWF – Based Feature Extraction and Random Forest Classifiers
Amol B. Shinde, Prof. P. R. Devale
DOI: 10.17148/IJARCCE.2015.41096
Abstract: Now a days, detection and identification of brain tumor we use an image processing techniques for a segmentation of image and RFT are use to classification of tumor result. Using RFT segmented image is divided into nodes, here we detect true and false nodes and according to true node design a tree, generated tree nodes are change according to user selection, then the leap nodes are combining and generated a resulted tree. Bagging and Boosting algorithm are use to improve the RFT result. Generated result is in form of complex tree so we use a bagging and boosting. Final result is in the form of three condition normal pre and post condition. In the existing system neural network is use for result but in neural network result in the form of 0 and 1 so noise is present in result. Hence using the RFT system improves the result and performance with great accuracy because the result in the number of digits like 0.02354689 also the result is in plus and minus. They represent the result according to nodes RFT calculate.
Keywords: RFT; Brain tumor; Filters; edges; canny filters.
Abstract
Android Assisted Wireless Slide Cruising and File Transfer Application
G. P. Mohole, Rohan Kulkarni, Amit Shinde, Vitthal Jadhav, Umesh Ahire
DOI: 10.17148/IJARCCE.2015.41097
Abstract: Now-a-days, data communication has become much faster. Smart phones can send and receive data much faster than older phones. Taking this into account Android-Assisted Wireless Slide Cruising and File Transfer Application is designed and implemented to provide the users with the facility of transferring files across the network, i.e. between PC and android smart phone. Then allow users to navigate the slides of power point presentation remotely and wirelessly. This application can be widely used in the multiple surroundings, such as board meetings, classrooms, seminars and presentations where big screens like projector screens or big televisions are used.
Keywords: Wireless fidelity, Android Phone, IP Address, Socket Programming, Java.
Abstract
An Identification of Variety of Leaf Diseases Using Various Data Mining Techniques
Dr. N. Sasirekha, N. Swetha
DOI: 10.17148/IJARCCE.2015.41098
Abstract: Diseases in plants cause major production and economic losses as well as reduction in both quality and quantity of agricultural products. Now a day�s plant diseases detection has received increasing attention in monitoring large field of crops. Farmers experience great difficulties in switching from one disease control policy to another. The naked eye observation of experts is the traditional approach adopted in practice for detection and identification of plant diseases. This paper review the need of simple plant leaves disease detection system that would facilitate advancements in agriculture. Early information on crop health and disease detection can facilitate the control of diseases through proper management strategies. This technique will improves productivity of crops. This paper surveys the data mining techniques to predict the various leaf diseases of various types of leaf. Different types of leaf diseases of also discussed in this paper.
Keywords: Data mining, Biology diversity, Agriculture.
Abstract
Study of Cluster, Grid and Cloud Computing
Vinayak Shinde, Amreen Shaikh, Chris Donald D’Souza
DOI: 10.17148/IJARCCE.2015.41099
Abstract: Cloud computing is rapidly growing and is gaining popularity across the world because of its numerous features. Cloud computing has evolved from simple networking applications. Its functioning is however based on models of cluster and grid computing. Cluster, Cloud and Grid Computing are practices of distributed and local computing. Cluster consists of computers connected over a LAN, whereas cloud and grid are geographically distributed on a wider scale. This paper strives to compare, contrast and analyze cloud computing with grid computing and cluster computing from various aspects and in conclusion give an understanding of their crucial characteristics.
Keywords: cloud classification, cloud computing, cluster computing, fabric grid, grid computing, high availability cluster.
Abstract
Trustworthiness in E-Commerce Context using TRS Algorithm
Prof. Reena Mahe, Rahul Jadhav, Pratik Gaikwad, Rahul Gadekar, Kiran Bhise
DOI: 10.17148/IJARCCE.2015.410100
Abstract: Trust is an important factor in any sort of relationship. Lack of Trust is the main issue why people fear using E-Commerce for their regular shopping purpose, whereas E-Commerce is very much cost-effective as compared to traditional shopping. But people fear using E-Commerce just because there is no personal contact with the vendor .So it is a biggest challenge to remove this fear from the minds of buyers. The only solution to remove this fear is building Trust in their minds. While Shopping Online Buyers mostly depend on reviews from users available on various websites. Trustworthiness is a very critical element and should be treated as an important reference when customers try to select proper e-commerce systems. Trustworthiness evaluation requires the management of a wide variety of information types, parameters and uncertainties. In the implementation the project ensure that users give genuine feedbacks on the products. Trust Reputation Systems (TRS) Algorithm provide a most trustful reputation score for a specific product or service so as to support relying parties taking the right decision while interacting with an e-commerce application. TRS relies on an appropriate architecture and algorithms that are able to improve the selection, generation and classification of textual feedbacks. This algorithm studies the user�s attitude toward this selection of prefabricated feedbacks. As a result of this study, the reputation algorithm generates better trust degree of the user, trust degree of the feedback and a better global reputation score of the product. This ensures that the product and services sold online get the prefect rating according to its capabilities and in turn helps the customer to make a right choice about which services or product to buy or whether not to, it will in turn help to build a trust in online transaction as there will be true product rating and trusted user reviews only.
Keywords: Trustworthiness, E-Commerce, TRS, Trust Reputation System, Trust Degree.
Abstract
Prediction of Human Talent using Enhanced Naive Bayes Algorithm
Rajvir Kaur, Ms. Poonamdeep Kaur, Ms. Lovepreet Kaur
DOI: 10.17148/IJARCCE.2015.410101
Abstract: A modern day fast-paced, global business surroundings, coupled with the ever growing problem of a rapidly changing labor force, requires a well-planned, rigorous method of talent management. Fortunately, each HR and business frontrunners recognize that talent is an essential driver of business overall performance. It comes as no surprise after that that talent management methods are often cited as an important strategic priority. However, the actual execution of these practices is actually where companies often are unsuccessful. Thus this paper focuses on developing an efficient algorithm to overcome challenges faced by a human resource manager and segregate effective new talents from the rest.
Keywords: Na�ve Bayes, Talent Acquisition, Machine Learning.
Abstract
Matlab/Simulink – Based Research on Maximum power point Tracking of Photovoltaic System
Alok Kumar Gautam, Dr N.S.Beniwal
DOI: 10.17148/IJARCCE.2015.410102
Abstract: In order to improve the efficiency of PV system, A perturbation and observation (P&O) method is proposed to track the maximum power point of PV system. Based on the mathematical model of PV system, this method track the maximum power point by regulating the output voltage after measuring the changes of output power. A Matlab-Simulink based study of PV cell and module / PV array is carried out and presented in this paper. Basically focuses on the Photovoltaic cell five parameters consisting on a current controlled generator series diode, a shunt resistance and series resistances. The experimental results show that the method can track the maximum power point fast and exactly, which shows that adaptive P&O has better steady state and dynamic performance than the traditional P&O, and can improve the efficiency of photovoltaic power generation system effectively.
Keywords: PV panel, MPPT, modeling, simulation, experimental results.
Abstract
Simulation studying of MPPT Control Method for photovoltaic Power system
Alok Kumar Gautam, Dr N.S.Beniwal
DOI: 10.17148/IJARCCE.2015.410103
Abstract: PV array output power is a nonlinear function of the external environment and the load, in order to give full playing to the performance of photovoltaic array, maximum power point tracking (Maximum Power Point Tracking, referred to as MPPT) control adjust the disturbance of accounting space based on the work of photovoltaic arrays. Although the existing variable step size control has a better ability to fast tracking steady-state effect, but it�s complex and less versatile. Contrary to the characteristics of the poor start up in the MPPT, Proposed a new maximum power point tracking (MPPT) control method, that mutations in the external environment or the load, the first fixed voltage method to adjust the operating point of PV array to the maximum power point nearby, to ensure fast tracking; on this basis, the introduction of small step perturbation and observation method of maximum power point to optimize the steady-state characteristics, which can effectively reduce the output power of photovoltaic array maximum power point in the oscillation. The simulation results of the fixed voltage method, perturbation and observation method and the combination of the two proposed methods show that the method can quickly and accurately track the PV array maximum power point, reduce the maximum power point oscillation energy loss and improve the conversion efficiency of the photovoltaic energy system.
Keywords: Photovoltaic array; maximum power point tracking; a fixed voltage method; disturbance observation; variable step.
Abstract
A balanced sentiment analysis approach with stemming porter for neutralized emotion weightage
Navpreet Kaur, Er Mohit Kakkar
DOI: 10.17148/IJARCCE.2015.410104
Abstract: The application of sentiment analysis, also known as opinion mining, is more difficult in Chinese than in Indo-European languages, due to the compounding nature of Chinese words and phrases, and relatively lack of reliable resources in Chinese. This study used seed words, Chinese morphemes, which are mono-syllabic characters that function as individual words or be combined to create Chinese word and phrases, to classify movie reviews found on Yahoo. We use a lexicon based approach for discovering sentiments.Our lexicon is built from the Serendio taxonomy.The Serendio taxonomy consists of positive, negative, negation, stop words and phrases. A typical tweet contains word variations,emoticons, hashtags etc. We use preprocessing steps such as stemming, emoticon detection and normalization, exaggerated word shortening and hashtag detection. After the preprocessing, the lexicon-based system classifiesthe tweets as positive or negative based on the contextual sentiment orientation of the words.
Keywords: NLP, Artificial Intelligence (AI), Sentiment Analysis, Serendio taxonomy.
Abstract
LAN Supervising and Controlling Through Android Device
Avinash Sasidharan K, Tushar Nerkar, Kartik Purohit, Harsh Devani, Prof. Amruta pokhare
DOI: 10.17148/IJARCCE.2015.410105
Abstract: Nowadays android phones are used for various purposes that are used in our daily life [1]. Similarly android phones can be used for supervising and regulating computers over a LAN network. We will use a Wi-Fi network to make a connection between a mobile phone and a personal Computer through servlet socket programming in java. The Wi-Fi network will work as a platform for sending and receiving commands and messages between the server and the client. Here the android phone will be used as a server and the computer as a client. The client program sends some data as a command to computer�s communication port. There is a server program in computer which will read the data from the communication port and executes the commands present in the data.
Keywords: Android, LAN supervising, Wi-Fi Network, Tomcat Apache, Servlet.
Abstract
Application Opening Based on Emotion Using HOG Features
Prof. G.P. Mohole, Dhanashree Tambe, Amey jadhav, Manoj khairnar, Abhishek Sonar
DOI: 10.17148/IJARCCE.2015.410106
Abstract: In this Paper Emotion Detection System is implemented which runs the system applications like Browser, Media- Player, etc. Respectively based on the detected Emotion. The system detects seven universal emotions that are Sad, Disgust, Surprise, Angry, Fear, Happy and Neutral. This system captures real time Images using Web-cam. The captured images are further processed for emotion detection and facial expression is recognized from the captured image. HOG (Histogram Oriented Gradients) is used for feature extraction which allows us to extract facial components from the captured image. SVM is used as a classifier for the extracted features. Proposed method is experimented on JAFFE dataset and an extended on Cohn-Kanade dataset.
Keywords: Emotion Detection, HOG features, SVM, Context Management System and Real Time Image.
Abstract
A Review On Generation Of Side Information Mining Text Data & Protection Of Cyber Attack
Rajesh A. Roy, Prof. P. S. Kulkarni
DOI: 10.17148/IJARCCE.2015.410108
Abstract: As the use of web side information for critical services has increased, the sophistication of attacks against these applications has grown as well. To protect web applications several intrusion detection systems have been proposed. In this paper, several techniques which are meant for detect ion of web application related attacks. The Intrusion detection system provides the following: .Monitoring and analyzing of user and system activity. Auditing of system configurations and vulnerabilities. Assessing the integrity of the files and critical system. Statistical analysis of activity patterns. Abnormal activity analysis. Operating system audit.
Keywords: Side information Intrusion detection operating system audit.
Abstract
Prediction of User Opinion in Microblog
Tabrez Khan, Javed Khan Sheikh, Rehal Qureshi, Nouman Khatib, Priya Goankar, Fauziya Khan, Siddiqua Shaikh
DOI: 10.17148/IJARCCE.2015.410109
Abstract: In this paper, user�s opinion on social media in the form of comments will be analysed to draw conclusion on preference topics. This will be done by using techniques of collaborative filtering, natural language processing and data mining methodology. This will help social media users to determine the conclusion about comments. Analysis will enable user for effective and fast decision making on specific topic. Also Users can find reviews of any product, movie, social issue, political review etc. at single blog itself.
Keywords: Natural language processing,Social Media ,filtering, data mining.
Abstract
A Review on Efficient Organization for Wireless Sensor Networks
Madhuneha A. Shrivastava, Prof. R. K. Krishna
DOI: 10.17148/IJARCCE.2015.410110
Abstract: In this paper we focus on achieving optimal path by taking load and delay as an important parameter. Recently WSNs has focused on the geographic forwarding mechanism. In order to reduce the energy consumption of nodes. It is now shifting toward duty-cycled WSNs in which sensors are sleep scheduled. But the shortest path found by using distance as a parameter may result in delay as the nodes along the path may be heavily loaded. Therefore Load balancing also proves to be equally important factor along with Distance. Hence this research work proposes the system that will calculate the best optimal path from source node to destination by taking into consideration the load on each node and delay incurred by each node in Duty-Cycled Mobile sensor networks along with geographic routing.
Keywords: Geographic Routing, Sleep Scheduling, Duty �Cycled Mobile Sensor Network, Network simulator-2 (NS2)
Abstract
Two Level Implementation of Multicasting in Wireless Networks with Multirate Scheme
T. Srikanth, Dr. K. Venkata Rao
DOI: 10.17148/IJARCCE.2015.410111
Abstract: Multicasting is one of the best solutions for sending data to a particular group of users. It became so prominent because it reduces the bandwidth of data that is intended to transfer than compared to unicast transmission. In multicast transmission data rate in WLAN is limited by the user with lowest receiving data rate in multicast group, which was named as constant base rate problem. We propose a delivery method that utilizes both multicasting and unicasting to solve the constant base rate problem with multirate technique. Multicasting is used between IPV4 server to Access Point (AP) and unicasting is used between AP and mobile nodes. AP converts the multicast packets to unicast packets in order to provide end-to-end multicast transmission. By combing both multicasting and unicasting we are able to solve the problem of constant base rate problem. But if more number of users under an AP wants to receive many streams of multicast type then the congestion is occurred in the wireless network under AP. In the proposed method, the AP switches to multirate mode to solve the congestion problem because the bandwidth utilized by the multirate technique at AP is very less when compared to the existing method.
Keywords: Multicast, Unicast, Constant base rate and Quality of Experience.
Abstract
Perfect Cyber Entrap: Fast Automatic Detection & Quarantining of Internet Scanning Worms, Topological Worms, Web Worms, Botnet on the Internet Networks
Miss. Gaikwad Kiran Dhondiram, Miss. Mairan Swati Balasaheb, Prof. Chougule Meghraj Balasaheb
DOI: 10.17148/IJARCCE.2015.410112
Abstract: Now a day�s internet is the most fundamental thing in the computerized world but because of Internet & various infected devices, the system performance degrades and system becomes slower than its capacity due to that our result, output is not going to maintain certainty and surety. The safety and reliability of current Internet and various System networks have been constantly challenged by the increased frequency and virulence of worm outbreaks. Worms are on the top of malware threats attacking computer system although of the evolution of worms detection techniques. Main reason behind that our Internet is important facility but it has some problems due to scanning worms, topological worms, web worms & botnet.This paper produce a method for detecting unknown worms uses Artificial Neural Network (ANN) for classifying worm/ nonworm traffic and predicting the percentage of infection in the infected network. In this paper we are organizing structure of Perfect Cyber Entrap system that will fastly detect and quarantining all such worms and vulnerable situations and quarantining such worms due to that our system gives perfect security mechanism from all such worms and makes system more accurate and fast.
Keywords: Perfect Cyber Entrap, Botnet, Internet, Scanning worms, Artificial Neural Network (AAN).
Abstract
A Wireless Application of Automatic Control of Drip Irrigation System
R. Aarthi, Dr. A. Shaik Abdul Khadir
DOI: 10.17148/IJARCCE.2015.410113
Abstract: In past couple of decades, there is immediate growth in field of agricultural technology. Irrigation by help of freshwater resources in agricultural areas has a crucial importance. Because of highly increasing demand for freshwater, optimal usage of water resources has been provided with greater extent by automation technology. Traditional instrumentation based on discrete and wired solutions, presents many difficulties on measuring and control systems especially over the large geographical areas. Utilization of proper method of irrigation by drip is very reasonable and proficient in remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper describes an application of a wireless sensor network for low-cost wireless controlled irrigation solution and real time monitoring of water content of soil.
Keywords: Drip irrigation, Fertilizer, Multiplexer, Pressure sensor, Remote monitoring, Soil sensors, ZigBee.
Abstract
Review of Mobile Applications Testing with Automated Techniques
Anureet Kaur
DOI: 10.17148/IJARCCE.2015.410114
Abstract: As the mobile applications and mobile consumers are rising swiftly, it is concern to researchers and testing professionals to devise viable testing techniques to guarantee unwavering quality of these mobile applications. A proper mobile quality charter would serve developers as a parameter for mobile quality confirmation. Due to smaller development life cycle of mobile applications, the developed apps tend to be faulty as little effort is put in ensuring quality of the app. Thus rigorous testing is required for ensuring its quality and that too in little time. Traditional life cycle models which are used for developing desktop/laptop application, same models are adjusted to work on mobile application development. But because of certain characteristics of mobile applications which are diverse from traditional applications, same models cannot be assimilated for mobile application development. For testing also which is a considered as a phase in mobile application development need to be addressed separately. There is various mobile application testing techniques used such as manual and automated techniques. But much importance is given to automated approach due to its various advantages. This paper discusses the characteristics specific to mobile apps along with comparison of manual and automated testing and comparison of various automated testing techniques precisely used for mobile applications.
Keywords: Software engineering, testing, Mobile applications, testing techniques, automated testing.
Abstract
Computer-Based Comparative Analysis of BPSK versus other PSK Modulation Models
B. O. Omijeh, C. E. Adabanya
DOI: 10.17148/IJARCCE.2015.410115
Abstract: Digital communication has been experiencing a lot of tremendous growth and success. It employs digital technique of modulation and demodulation which makes it more efficient, complex and secure in long distance transmission than its analogue counterpart. Of various types of digital modulation, Binary Phase shift Keying (BPSK) technique of modulation is believed to be reliable in long distance transmission with minimal errors. In this paper, computer based analysis is been carried out to comparatively model and analyse BPSK technique along-side other M-PSK techniques over an AWGN channel paying specific attention to the bit error rates(BER), number of errors and number of samples generated by the MATLAB simulation. The MATLAB simulation results show the BPSK method proves to be a better technique where distance and error generation are top factors to be considered.
Keywords: Modulation, BPSK, BER, AWGN channel.
Abstract
Monitoring of Disease Residues in Pomegranate
Abhirami, Dr. Antony Selvadoss Thanamani
DOI: 10.17148/IJARCCE.2015.410116
Abstract: This paper is an attempt to automatically grade the disease on the Pomegranate plant leaves. This innovative technique would be a boon to many and would have a lot of advantages over the traditional method of grading. There has been a sea change in the mindset and the effort put down by the agricultural industry by adapting to the current trends & technologies. One such example is the use of Information and Communication Technology (ICT) in agriculture which eventually contributes to Precision Agriculture. Presently, plant pathologists follow a tedious technique that mainly relies on naked eye prediction and a disease scoring scale to grade the disease. Manual grading is not only time consuming but also does not give precise results. Hence the current paper proposes an image processing methodology to deal with one of the main issues of plant pathology i.e. disease grading. The results are proved to be accurate and satisfactory in contrast to manual grading and hopefully take a strong leap forward in establishing itself in the market as one of the most efficient and effective process. The proposed system is also an efficient module that identifies the Bacterial Blight disease on pomegranate plant. At first, the captured images are processed for enhancement. Then image segmentation is carried out to get target regions (disease spots) on the leaves and fruits. Later, if the diseased spot on leaf is bordered by yellow margin then it is said that leaf is infected by bacterial blight otherwise not. Similarly when black spots are targeted on fruits, they are checked for whether a crack is passing through these spots. If cracks are passing through the spots then the disease identified would be Bacterial blight. Based on these two characteristics bacterial blight on pomegranate can be appropriately identified.
Keywords: Percent Infection, Bacterial Blight, K-means clustering, Morphology, colour image segmentation, Precision agriculture.
Abstract
Nantenna – A Review
Aakash Shah, Payal Furia, Tejas Shanbhag, Ayush Shah
DOI: 10.17148/IJARCCE.2015.410117
Abstract: In a world looking for newer options to sustain renewable energy sources, efficient extraction of solar energy is a primary objective. A nantenna electromagnetic collector (NEC) is a device which can effectively absorb radiations of any wavelength and give out radiations of the required wavelength. They can replace the traditional photovoltaic cells to give a much higher efficiency of around 80%.The paper describes the working of nantennas with the use of MIIM diodes and throws light on some astounding applications this technology can have.
Keywords: Nantenna, Solar, Infrared, MIIM Diodes.
Abstract
Big Data Analytics
Rohit Kapdoskar, Sanket Gaonkar, Nihar Shelar, Akshaya Surve, Prof.Sachin Gavhane
DOI: 10.17148/IJARCCE.2015.410118
Abstract: Big data analytics is the process of examining big data to uncover hidden patterns, unknown correlations and other useful information that can be used to make better decisions. The main goal of this project is to understand and implement the entire process of data mining and analytics. We will be extracting the information from data sources by implementing a web crawler. To remove the inconsistencies in the extracted data we will be cleaning it. The cleaned data will be migrated to database, analyzed and visualized.
Keywords: Web crawler, open refine, visualization, analytics.
Abstract
Personalized Course Recommendation in Formal Learning Based on Logistic Regression
Ms Hanh Nguyen Tran Diem
DOI: 10.17148/IJARCCE.2015.410119
Abstract: The term Technology Enhanced Learning (TEL) is gradually familiar to both researchers in E-Learning and learners. This development aims to facilitate learners in searching for suitable learning resources such as courses, learning contents which can satisfy those learner�s needs or interests. In general, the current techniques of recommender system (RS) play a major role in developing such education applications. There are currently two remarkable trends in building a recommendation system, including collaborative based RS and content based RS. Particularly, each approach employs some different algorithms for implementation depending on applied domains. In this paper, the logistic regression classification is analyzed to design a collaborative filtering (CF) recommendation system for courses in formal training programs where students could be advised to choose some suitable courses to their preferences in an upcoming semester, basing on ratings from previous students who finish the same training program. In addition, the problem of missing values is discussed in detailed. Generally, the purpose of this study is to propose a suitable method for building a CF recommendation system in course domain.
Keywords: Course recommendation systems, Collaborative Filtering, Gaussian Distribution, Missing value, Mean imputation, multivariate Gaussian distribution. Logistic regression.
Abstract
Effective Data Security for E-Commerce Applications
Clopas Kwenda
DOI: 10.17148/IJARCCE.2015.410120
No abstract available.
Abstract
Error Analysis of Multi User CDMA System over α-µ Fading Channel
Dharmraj, Himanshu Katiyar
DOI: 10.17148/IJARCCE.2015.410121
Abstract: In this paper error performance of multi-user code division multiple access (CDMA) system with block coding and interleaving over alpha mu (a-�) fading channel is analysed. It is shown by analysis that with increase in number of users SNR decreases hence the error performance of the system deteriorates. This has been established by simulation over a-� channel for various a and � values.
Keywords: a-� fading, random interleaving, bit error rate, code division multiple access, Walsh-Hadamard code, multi-user interference.
Abstract
Low Power and Area-Efficient 16-Bit Modified SQRT Carry Select Adder Structure
Balasubramani M, Naveen R, Prasanth C
DOI: 10.17148/IJARCCE.2015.410122
Abstract: Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area and power consumption in the CSLA. This paper uses a simple and efficient gate-level modification to significantly reduce the area and power of the CSLA. Based on this modification 8-b, 16-b, 32-b, and 64-b square-root CSLA (SQRT CSLA) architecture have been developed and compared with the regular SQRT CSLA architecture. The proposed design has reduced area and power as compared with the regular SQRT CSLA with only a slight increase in the delay. This work evaluates the performance of the proposed designs in terms of delay, area, power, and uses layout 0.18-m CMOS process technology. The proposed CSLA structure is better than the regular SQRT CSLA from the obtained results.
Keywords: Ripple Carry Adders, Binary to Excess-1 Converter, SQRT CSLA.
Abstract
Secure Network Storage System in Distributed Applications using Fused Data Structures
Dr. S. Ravichandran
DOI: 10.17148/IJARCCE.2015.410123
Abstract: The research work describes a technique to tolerate faults in large data structures hosted on distributed servers, based on the concept of fused backups. The prevalent solution to this problem is replication. To tolerate the faults (dead/unresponsive data structures) among the whole distinct data structures, replication requires replicas of each data structure, resulting in number of servers and the number of fault for additional backups. This project present a solution, referred to as fusion that uses a combination of erasure codes and selective replication to tolerate f crash faults using just additional fused backups. This project shows that the solution achieves savings in space over replication. Further, this work present a solution to tolerate Byzantine faults (malicious data structures), that requires only backups as compared to the 2nf backups required by replication. We ensure that the overhead for normal operation in fusion is only as much as the overhead for replication. Though recovery is costly in fusion, in a system with infrequent faults, the savings in space outweighs the cost of recovery. This research work explores the theory of fused backups and provides a library of such backups for all the data structures in the Visual Studio Collection Framework. The experimental evaluation confirms that fused backups are space-efficient as compared to replication (approximately n times), while they cause very little overhead for updates. To illustrate the practical usefulness of fusion, this work use fused backups for reliability in Amazon�s highly available key-value store, Dynamo. While the current replication based solution uses 300 backup structures, we present a solution that only requires 120 backup structures. This results in savings in space as well as other resources such as power.
Keywords: Data Structure, Distributed Application, Fault Tolerance, Network Storage.
Abstract
Multi-Scale Adaptive NICK Thresholding Method for ALPR system
Rohollah Mazrae Khoshki, Subramaniam Ganesan
DOI: 10.17148/IJARCCE.2015.410124
Abstract: This paper presents improved thresholding method called �Multi-Scale Adaptive NICK thresholding method� for Automatic License Plate Recognition (ALPR) System. By applying Connected Components Labelling (CCL) algorithm on the Binary image, license plate characters candidates will be determined. Improved thresholding method is vital to approach all the license plate characters on the binary image otherwise we might lose license plate characters under various illumination conditions and different weather conditions like rain, snow and fog. Most advantages of this method in compare with Niblack and Savola thresholding method is that it could be adapted for both types of degradation: interfering degradation and intensity degradation depends based on scale or window size, therefore you can improve all types of degradation. The interfering degradation will be restored on high scales size to cover sufficient data from the original input imag. In compare, intensity degradation needs very small scales to deal with disjoint and broken characters in the license plate. In this method we don�t miss any object in the binary image as license plate character�s candidate.
Keywords: ALPR (Automatic License Plate Recognition) system, NICK thresholding method, Connected Components Labelling (CCL), Savola method, Niblack method.
Abstract
Improvement in Sinter Productivity with Intelligent Mathematical Model Based Control System
Ayan Goswami, A K Biswal, V T Selvan, Shyamlesh Khan
DOI: 10.17148/IJARCCE.2015.410125
Abstract: Now-a-day Information Technology (IT) has helped the process industry, particularly steel industry, to become more efficient, highly productive and highly cost effective. Expert system and mathematical model based control systems are now become the integral part of various processes. Sintering is a major process in making steel. In view to this, more and more sinter plants now-a-day are coming equipped with latest and state-of-art automation & IT systems. Steel Authority of India Ltd. (SAIL), under its current modernization program, has installed number of modern, state-of-art sinter plant in Rourkela Steel Plant, Bhilai Steel Plant & IISCO Steel Plant. The objective of this paper is to discuss various model based level-2 systems in recently commissioned Sinter plants of SAIL.
Keywords: Sinter, permeability, mathematical model, moisture control, control system, process optimization.
Abstract
Emarketing Techniques using Data Mining Approach
Prof. Dr. Raj B. Kulkarni, Ms. Shankari V. Gajul
DOI: 10.17148/IJARCCE.2015.410126
Abstract: For billions of people around the world, the Internet has become an essential component of their everyday social and business lives. As the new millennium begins, we are experiencing perhaps the most dynamic and revolutionary changes of any era in the history of advertising. These changes have been driven by advances in technology, and developments have led to the dramatic growth of communication through interactive media, particularly the internet. Advertisement on social media like facebook, twitter, teachstreet and my opera are becoming essential area of advertisement. Internet advertising is a form of marketing and advertising which uses the internet to deliver promotional marketing messages to consumers. Fast retrieval of the relevant information from databases has always been a significant issue. There are many techniques are developed for this purpose; in among data clustering is one of the major techniques. Data mining algorithm is good marketing strategies to analyses needs and lifestyles of people. A data mining technique- clustering technique is used for finding target users and their needs further more graphical representation is required to show different needs of people. This paper emphasizes on finding target users depending on their lifestyles, designing point to point plan, creation of marketing group and analysis of data.
Keywords: E-Marketing, Data mining, Preprocessing, Fuzzy C-Means Clustering.
Abstract
Active Aggregation Node Selection for Multiple Targets Tracking in Static WSN
Sethulekshmy P Manmadhan, Lakshmy Sasidharan Nair
DOI: 10.17148/IJARCCE.2015.410127
Abstract: The main aim of a wireless sensor network is to provide accurate and reliable information about the area in which the sensor nodes are deployed. From the various application of a sensor network, target tracking is the recent advance. Target tracking is a challenging task due to the failure of sensor nodes because of the energy reduction, processing of data, redundancy at the sink and the mobility of the target. Path loss is another problem of a wireless network. Many algorithms have been developed to reduce the issues of target tracking. But they are note dealing with the redundancy of data at the sink due to the detection of target by multiple clusters. And multiple target tracking is the major problem that is faced by the WSN. In this paper, we present a mechanism for tracking multiple targets using a special aggregation node based on the message utility of the received signal.
Keywords: Multiple target tracking, WSN, aggregation node (AgN).
Abstract
Integration of Resource Reservation Protocol with Earliest Deadline First to Achieve Real Time Communication in Switched Ethernet
A K Saleena, V Nagarajan
DOI: 10.17148/IJARCCE.2015.410128
Abstract: Nowadays ethernet is both LAN and WAN technology. This is possible because of switched ethernet. Switched ethernet is a modern counterpart of the historical ethernet. Switched ethernet replaces the shared medium of historical ethernet with a dedicated segment for each station. These segments connect to a switch, which can connect many of these single stations. This paper presents an integrated approach for real time communication in switched ethernet system by using RSVP (Resource reservation protocol) and EDF (earliest deadline first) algorithm. The node which wants to reserve the resources is scheduled in the switch according to EDF.
Keywords: EDF, Real Time Communication, RSVP, Switched Ethernet.
Abstract
A Novel Study on Improved Routing Mechanism with Performance Analysis in MANETs
Er. Deepak Negi, Dr. Kishori Lal Bansal
DOI: 10.17148/IJARCCE.2015.410129
Abstract: Consumption of energy is a vital design concern in mobile ad hoc networks (MANETs), since nodes are powered by batteries with inadequate energy, whereas in existing dynamic source routing (DSR) does not take the energy restriction of MANET nodes into account. Also there occurs a problem of broken links due to the lack of energy which cause disorder in network system. Such problem occurs due to the unawareness of energy of mobile neighbour nodes. In this study, it proposes an efficient algorithm for MANETs, which maximises the network lifetime. It is used to determine the local link connectivity information for monitoring the link status between nodes along with the incorporation of Dynamic On Demand Routing Protocol to reduce the energy consumption of mobile nodes to certain extent. These protocols use shortest path as a main metric to establish routing between source and destination. The proposed mechanism is implemented with MATLAB.
Keywords: MANET, DSR, AODV, Shortest Path, Reactive Routing Protocol etc.
Abstract
Enhancing VANET safety message transmission using cognitive Radio in high traffic
Ajay Lathar, Rajdavinder Singh
DOI: 10.17148/IJARCCE.2015.410130
Abstract: Vehicular ad-hoc network is used for auto driven system. In this system road side units available on the roads communicate with different nodes available on the roads. RSU transmit the safety message to the vehicle using allocated bandwidth. In this paper safety message has been transmitted in the high speed and high load traffic area using cognitive radio channels. Due to traffic message drop ratio increase because of congestion so by using channel sensing and GPSR predicts the nodes location and movement. Radio channel has higher band width as compare to the normal 2.54 GHz band. By using channel sensing safety message can be transmitted to the vehicle without any delay and collision can be avoided. Various parameters represents that purposed approach much better than previous approaches.
Keywords: VANET, CRCN, Spectrum sensing, CCH.
