VOLUME 5, ISSUE 10, OCTOBER 2016
Microcontroller based Muscle Stimulator
Sharique Rahman, Shahanaz Ayub
Random Area Selective Image steganography with LSBMR
Tibin Thomas, Neethan Elizabeth Abraham
Contrast Enhancement Using Optimal Threshold Histogram Equalization
Parmeshwar Kumar, Kailash Patidar, Manoj Kumar Yadav
Coin Based Automated Blood Sugar Level Monitoring System for the Public
Vishesh S, Manu Srinath, Jnanesh Kumar N, Karthik P Gubbi, K Sri Krishna, Mohan M, Gaurav Raj Chattarki
Expanding the Existing Time Span of Wireless Sensor Network by Incorporating Differential Evolution Algorithm in Clustering
Sonia Battan, Lakshit Bakshi
Protection of Android Application against Malware Attack
Priyanka Rane, Madhuri Dalal
Image Segmentation by Using Linear Spectral Clustering
N. Sandeep Reddy, Mr. Shaik Umar Faruq, K. Rajya Lakshmi
Survey of Localization Techniques in Mobile Wireless Sensor Network
Suresh Rathod and Raj Kumar Paul
A Hybrid Approach for GTS Using Min-Max Algorithm on GPU and CPU
Dipali V. Patil, Kishor N. Shedge
A Novel Neighbour Coverage-based Probabilistic Rebroadcast Protocol for Mobile Ad Hoc Networks
Aswathi .C
Sketch- Based Image Retrieval Hypothesis-Driven Object Boundary Selection with HLR Descriptor
Prashant Sanjay Patil
Dynamic Non-Linear Authenticator Protocol (DNAP) For MANETS
JayaPrakash .R, Saroja. K
Simple Satellite Network Simulation using OMNET++ 5
Narendra Kumar Dewangan, Narayan Sahu
Fingerprint Combination for Resisting Attacks
Austin J Gladston, Ashitha .S.S
“Low Latency Low Complexity Compare and Decode Architecture for LTE Turbo Codes”
Aaquib Javed, Vijay L. Agrawal
Visualization of Geometrical Defects of Radiators using Edge Detection Techniques
M.H. Thasin Fouzia, S. Vinu Kiran, Dr. K. Nirmala
Distributed Pattern Sequences with Mining Principle Using Hierarchical Representation
Dr. K. Subramanian, S. Surya
A Survey on Application of ANNs in Solid Waste Prediction
Mr. Shrikant R. Chaudhari, Dr. Chitra A. Dhawale
Design and Analysis of Fundamental Gates and Adder using Adiabatic Array Logic
Gurdeep Kaur , Abhinav Vishnoi
Raspberry Pi Based Weather Monitoring System
Meetali V. Rasal, Prof. Jaideep G. Rana
An Efficient Black Hole and Gray Hole Detection Using Fuzzy Probabilistic Detection Scheme in DTN
Mythili .M, Renuka .K M.Sc. M. Phil
The Legend “JAVA” Vs “C++” Programming Languages
Nelapatla Swetha, Mulagani Supriya, Ravula Kartheek
Performance Calculation of Adhoc Network under the Impact of Wormhole Attack and its Prevention Mechanism
Niharika Shrivastava, Prof. Tilotma Sharma
A Survey on Searching Shared and Encrypted Data for Security on Cloud
Swati Virkar, Priti Chinchwade, Shivani Ajmire, Prof. R.A. Badgujar
Associate Rule Mining for Social Network Data using Map Reduce
Miss Shruti S. Gadgil, Prof. L. M. R. J. Lobo
An Implementation and Modification of VANET Routing Protocols using Multipath and Multicast Algorithm for Varying Node Density
Apurva Kukade, Prof. Tilotma Sharma
Optimized Encrypted Entries for S & Pp Box
Jambunathan S, Sathish A, Shankar R
Vector Field Based Conversion of Color Image to Gray Scale
Sheelbrat O. Mishra, Devarkonda S.S. Sudhakar
Survey on the Police Tracking System
Vishwas Deulgaonkar, Yogesh Jawadwar, Akash Hiwarkar, Priyanka Doijode, Prof. Sarita Patil
Cotton Leaf Disease Detection & Classification using Multi SVM
Supriya S. Patki, Dr. G. S. Sable
A Survey on Mobile Data Offloading in Heterogeneous Networks
K. Kalaiselvi, N. Venkatesan
A Survey on Secure Video Delivery through Encrypted in- Network Caching
S. Jeyalakshmi, P. Murugeswari
Implementation of Multi Zone Smart Gardening System
P. Tulasi Santosh Kumar, K. N. Balaji Kumar
Implementation of Audio Player Using ARM Cortex-M4
Thadi Harita Nath
Location Selection for a Company using Analytic Hierarchy Process
Vivian Brian Lobo, Nazneen Ansari, Blety Babu Alengadan, Pooja Gharat, Edwina Jacob, Priti Mishra
Advanced Security Mechanism at ATM Centres
K. Sowmya Sree, Ravindran Vishal, Andavolu Prakash, Vinutha Gogineni
Implementation of Dynamic Programming to Find All Pairs Shortest Path on Fibre Optics Networks Routing and to Formation of Virtual Topology Reconfiguration
M. Anupama Narayana, Dr. V. Raghunatha Reddy
Innovative Methods of Monitoring and Regulating River Water between Dams: A Noble Solution for Interstate Water Distribution
Sreeharsha A.N, Vishesh S, Manu Srinath, Jnanesh Kumar N, Anuradha Vidyadhar Shastry, Gaurav Raj Chattarki, Suhas S, Karthik P Gubbi, K Sri Krishna, Mohan M
Implementation of Low power Level Shifter with Logic Error Correction Circuit for Extremely Low-Voltage Digital Circuits
Kadam Sai Srinivas, Sagar Krishna Sivvam
Digital Video Watermarking Using DWT and SVD Techniques
Shafali Banyal, Shivi Sharma
Implementation of MESI Protocol Using Verilog
Penmetsa Durga Devi, Tammineni Ravindra
Application of Genetic Algorithms in Software Testing Techniques
Dr. V. Sangeetha, T. Ramasundaram
Design and Analysis of Microstrip Patch Antenna for L-band Applications using IE3D v15
Aman Barsaiyan, Dr. D.C. Dhubkarya, Dr. Manoj Kumar Tiwari
Analysis of Dispersion Compensation Using FBG in a 12 GBPS Optical System with RZ Modulation
Sami Haider, Dr. D K Srivastava, Ravindra Kumar
An Intelligent V2V Communication Based Traffic Control System
Miss. Sadaf A. Shaikh, Prof. L.M.R.J. Lobo
A Survey on Game Theory Against Attack in Honeypot Enabled Networks for IoT
R. Sangeetha, M. Mohana
Realization of Multi Carrier Direct Sequence CDMA System for Multipath Faded Channels using Adaptive Viterbi Decoder
Ashish Chand Singh, Dr. N. S. Beniwal
Improve Secure Anti-Collusion Data Sharing Scheme for CP-ABE Security System
Kavitha .D, Karpagam .R
Rule based Stemmer using Marathi WordNet for Marathi Language
Pooja Pandey, Dhiraj Amin, Sharvari Govilkar
Theoretical Study of Optical and Electrical Properties of Organic Photovoltaic Cell PEDOT: PSS / P3HT: PCBM
T. Sahdane, A. Laghrabli, H. Bougharraf, R. Benallal, B. Azize, B. Kabouchi
Review on Tweet Segmentation using Correlation and Association
Mr. Umesh A. Patil, Miss. Snehal D. Gouraje, Miss. Ashwini P. Patil, Miss. Madhuri M. Pisotre
Survey on WIFI based Indoor Tracking System
Payal Tat, Manisha Nimbekar, Aboli Varpe, Sayali Gadade, Swati Khodke
Smart Irrigation
Maria Chettiar, Dolcy Koli, Jerin Mathew Varghese, Merin Francis, Sreedevi Nair
Data Acquisition of Weather Parameters and Wireless Monitoring
Mr. Dipak V. Sose, Dr. Ajij D. Sayyad
Improved Next Web Page Recommendation using Multi-Attribute Weight Prediction
Prof. Umesh A. Patil, Mr. Avinash Kunnure, Mr. Vaibhav Herwade, Mr. Vijaykumar Dawarpatil 4, Mr. Satyawan Magar
Simulative Analysis of Event-Related fMRI Design
Ramandeep Kaur, Jyoti Saxena and Sukhjinder Singh
A Technical Review on Variants of Stable Election Protocol (SEP): SEP-E, TSEP and ETSSEP in Heterogeneous Wireless Sensor Networks (HWSNs)
Shailie Rai, Pallavi Gupta
Color Sensor Robotic ARM
Mrs. Ruchi Varshney, Sneha Arora, Shivani, Sneha Gupta, Saksham Agarwal
Implementation of Content Addressable Memory using MSML Architecture
Pravallika Gutta, Sreenivasulu Mamilla
Sentiment Analysis using Feature Based Opinion Mining Algorithms
T.M. Saravanan, Dr. A. Tamilarasi, A. Raja
Internet of Things (IoT) based Sensors to Cloud system using ESP8266 and Arduino Due
Mr. Nerella Ome, Mr. G. Someswara Rao
High Performance Vedic Multiplier Design using Compressors
Bhavana Siripurapu, K. Naresh Kumar
Cost Adequate Reliable and Anonymous Data Distribution with forth Security
G. Chandrika, N. Praveen Kumar, V. Sangeeta
Design, Analysis & Simulation of 30 nm Cylindrical Gate all around MOSFET
Tarun Kumar Sachdeva, Dr. S.K. Aggarwal , Dr. Alok K Kushwaha
Modified Vedic Multiplier using Koggstone Adders
Y. Rama Lakshmanna, G.V.S. Padma Rao, K. Bala Sindhuri, N. Udaya Kumar
Performance Analysis of Radio Access Technology Selection Algorithms in Heterogeneous 4G Networks
Marko Porjazoski, Ivana Todorovska, Pero Latkoski, Borislav Popovski
Energy Efficient Wireless Communication using Channel Coding
Seth Mohit Rakesh, Jitender Chhabra
Acoustic Echo Cancellation of Speech signal using Average Recursive Least Square Adaptive Algorithm
Praveen N, Ranjitha S, Dr. H.N. Suresh
Developing Citizen Centric Application for Smart city Services
Ashwini V. Shabadi, Prof. R.V. Argiddi
To Study Trading Rules Using Biclustering in Financial Market
Rutika A Shah, Prof. R.V. Argiddi
Medical Image Processing
O. Rama Devi, V. Sathvik, N. PavanKumar, M. Srinivas Rao
Identifying Unknown and Identical Users in Cross-Application Social Media Networks
Monika Dangore, Gauri Gholap, Ankita Kutal, Pragati Mali, Neha Takawale
Summative Assessment for Performance Evaluation of a Faculty Using Data Mining Techniques
Renuka Agrawal, Jyoti Singh, A.S. Zadgoankar
Fuzzy based Link Utilization Aware Path Ranking Scheme for Multipath Routing
Shalini Aggarwal, Shuchita Upadhyaya
Remote User Authentication in WSN using ABCRNG
D. Thamaraiselvi, Dr. M. Ramakrishnan
Intrusion Prevention System for Wireless LAN Security: A Study
S V Athawale, M A Pund
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization
Shivani, Pooja Rani
Trie Based Improved Apriori Algorithm to Generate Association Rules
Chirag Mewada, Rustom Morena
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud TEES (Traffic and Energy saving Encrypted Search)
Prerna Yadav, Mrunal Badade, Swati Patil
The Design and Testing of a Web Application by Using Modern Implementations Technologies
Al Rubaie Evan MadhiHamzh
An Open CV Framework of Automated Sign language to Text translator for Speech and Hearing Impaired
Anchit Biswas, Shreedeep Gangopadhay
Measurement and Assessment of Long Term Electric Field Strength in Different Locations
Begum Korunur Engiz
Intrusion Detection System with various Classification and Optimization Techniques: A Survey
Babita Kumari, Piyush Singh
Precised Detection of CMBS using HCSD
R. Ieshwarya, R. Sudha, S. Sridharani, M. Sureka
Analysis of Provable Data Possession on Clustered Data
D Prasanth, N Sandeep Chaitanya, T Chaitanya Sai Kumar
Comm Trust by Mining Tweets, Feedbacks & Comments
Mrs. Vijaya Sayaji Chavan, Dr. M.Z. Shaikh
Effect of Interference on Capacity of CDMA Technology
Chandan Kumar Verma, S.K. Sriwas, J.P. Saini, M. Shukla
A Survey on Load Balancing Techniques Based on Virtualization in Cloud
Anupama Tiwari, Pankaj Richhariya, Dr. Satyaranjan Patra
Surveillance and Sequestration Issues of Internet of Things (SSIoT)
Ayesha Taranum, Dr. Reshma Banu
Using Product Reviews from Twitter for Mining Insights to Predict Sales
Salama Shaikh, Prof. L.M.R.J. Lobo
Innovative Foot Pressure Mapping Technology On-The-Go Using Android Application
Vishesh S, Manu Srinath, Gaurav Raj Chattarki, Anuradha Vidyadhar Shastry, Abhishek Chanda, Mohan M
A Survey Paper of Cluster based Key Management Techniques for Secured Data Transmission in Manet
K.E Hemapriya, K. Gomathy
Efficient and Smart Attendance System using Local Wireless Network
Mr. Abhijeet R. Jadhav, Mr. Akshay C. Awte , Mr. Chetan D. Oswal, Mr. Vikrant B. Ghadge
Data Mining Model for Domain Selection
Miss. Amruta R. Jadhav, Miss. Rohini V. Pillai
Early Stage Identification of Brain Tumour using HV Scan Axial Partition Method
Priyanka Pareek, Komal Paliwal
Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
Syama .N, Mr. G. Pandiyan
D2c2 – Dynamic and Desertion Based Credible Communication in Mobile Ad-Hoc Networks
P. Saranya, Dr. S. Yamini
Performance Analysis of Arrhythmia Detection using Multiclass Classifier
Yedukondalu Kamatham, Nasreen Sultana
Detecting and Identifying Web Application Vulnerabilities with Static and Dynamic Code Analysis using Knowledge Mining
Vineetha K R, N. Santhana Krishna
A Review of QoS Routing Protocols under Implementation of MANET
Neeru Jhanji, Prof. Tilotma Sharma
A Survey: Compiler and Simulators used for optimization of code for Multiprocessors
H T Prakash, Dr. M Srinivas, Chetan R
A Study on Cryptography and its Algorithms
H.M. Kantharaju, Dr. M Srinivas
Privacy Preserving Association Rule Mining in Partitioned Databases
Pankaj P. Joshi, Prof. R.M. Goudar
A Study on Median Filter with Big Data
T Phanindra Reddy, Vidya Sagar Appaji Setti
Design and Analysis of WDM OFDM System Using Optisystem
Ravindra Kumar, Dr. D.K. Srivastva, Sami Haider
Smart City Garbage Management using Android Application
S.A. Chiwhane, Pratik Pawar, Akshay Gunjal, Pratik Girme
Efficient IOT Bus Transaction
Rishikesh S. Kulkarni, Azruddin K. Nadaf, Sumit Bagul
Avoiding Duplication of Encrypted Data Using Cloud
Ashweta Magar, Trupti Jagtap, Pradnya Gaikwad, Rashmi Singh
Video Surveillance System for Handling Suspicious Object
Mrunalinee Patole, Abhishek Charwad, Akshay Mengade, Naresh Choudhary, Vrushali Chondhe
A Prototype for Updation of Stateless Keys using AES modes of Operation
H M Kantaraju, Dr. M Srinivas, Chetan R
Re-Ranking of Images Based on Attribute-Assisted with Query-Specific Semantic Signatures
Ms. Pooja Vasant Lad, Prof. Priti Subramanium
Abstract
Microcontroller based Muscle Stimulator
Sharique Rahman, Shahanaz Ayub
DOI: 10.17148/IJARCCE.2016.51002
Abstract: Muscle stimulation devices are used to restore or maintain the muscle activity of paralyzed patients who suffer from musculoskeletal injuries for several decades. In this paper, a portable and low-cost versatile muscle stimulator for two channel TES applications is described. The microcontroller-based programmable stimulator with two bipolar output channels send arbitrarily specified electrical pulses to the element in the electrode array for enabling the complex schemes of muscles. The amplitude and phase of each pulse in the stimulus sequence are in-dependently variable, and the two channels are independently programmable, al-lowing a wide variety of stimulus patterns. We also designed an output circuit that can provide bi-phasic, voltage-regulated, charge-balanced outputs while avoiding the electrochemical erosion of electrode due to charge accumulation, the electrodes are electrically isolated from one another to effect regional (Selective) stimulation. Selective stimulation offers greater control over the spatial pattern of muscle stimulation and may allow for increased muscle efficiency. The proposed stimulator has provided an opportunity for further study of a potential novel electrical stimulator with closed-loop stimulation paradigm suitable for a variety of FES (Functional electrical stimulation) applications, both for experimental and clinical studies.
Keywords: Muscle stimulation; microcontroller; medical device; FES applications.
Abstract
Random Area Selective Image steganography with LSBMR
Tibin Thomas, Neethan Elizabeth Abraham
DOI: 10.17148/IJARCCE.2016.51003
Abstract: Steganography is the way of hiding the information in a multimedia. So no one other than the creator and the receiver can identify the existence of the message. Even though there are so many image steganography exist, most of them are not adapted to the amount of secret data that to be embedded. In this paper, we are presenting a method which dynamically selects the region for embedding the data based on its size. We use a selection method to find the region for embedding and in that region, we embed the message using the LSBMR method. Regions may be a single pixel or group of pixels. Regions are scattered in different locations of the image and thus it achieves high security.
Keywords: Substitution Encryption Method, Steganography, LSB, LSBM, LSBMR, Steganalysis
Abstract
Contrast Enhancement Using Optimal Threshold Histogram Equalization
Parmeshwar Kumar, Kailash Patidar, Manoj Kumar Yadav
DOI: 10.17148/IJARCCE.2016.51004
Abstract: Image enhancement is one of the challenging issues in image processing concept. Contrast enhancement techniques are used for improving visual quality of low contrast images. Contrast enhancement plays a fundamental role in image/video processing. Histogram Equalization (HE) is one of the most commonly used methods for image contrast enhancement. However, HE and most other contrast enhancement methods may produce unnatural looking images. The images obtained by these methods are not suitable to use in applications such as consumer electronic products where brightness preservation is necessary to avoid annoying artifacts. To solve such problems, we proposed a novel and efficient contrast enhancement method based on genetic algorithm in this paper. This algorithm is fast and very less time consuming as compared to other techniques such as global histogram equalization by taking CDF and finding out the transfer function. Here in our work we are going to enhance images using histogram equalization of images by reconfiguring their pixel spacing using optimization through GA (Genetic algorithm). We will get more optimized results with the use of GA with respect to other optimization techniques.
Keywords: Contrast Enhancement, Foreground Enhancement, Genetic Algorithm, Histogram Equalization, Cumulative Density Function.
Abstract
Coin Based Automated Blood Sugar Level Monitoring System for the Public
Vishesh S, Manu Srinath, Jnanesh Kumar N, Karthik P Gubbi, K Sri Krishna, Mohan M, Gaurav Raj Chattarki
DOI: 10.17148/IJARCCE.2016.51005
Abstract: In this paper, we propose a blood sugar level monitoring system (blood glucose monitoring) for the public which is easy to use, automated, coin based and prints instant results. Blood glucose monitoring is a way of testing the concentration of glucose in the blood (glycaemia). Particularly in the case of diabetes mellitus, a blood glucose test is performed by piercing the skin (typically on the finger) to draw blood and then applying the blood on to a chemically active disposable �test strip�[1]. Most people with diabetes mellitus are advised to monitor their blood glucose level at least twice or thrice in a day or even more in cases where the patients have very high blood sugar levels. This can be done at home or hospitals. The present cost of monitoring blood sugar level at hospitals in India ranges from Rs 50 to Rs 100. If an individual wants self monitoring of blood glucose level at home, the device named �Glucometer� may cost him up to Rs 2500 (approximately) and the cost of each test strip ranges from Rs 30 to Rs 50. This will be a costly affair for people who are suffering from diabetes mellitus and cannot afford the above luxury. So, we have developed a coin based blood glucose monitoring system for the public. By inserting a Rs 5 or Rs 10 coin, one can easily monitor the blood glucose level. This machine can be placed in public places like municipality offices, community buildings, hospitals, etc. The machine is automated and even an illiterate person can operate it and obtain the test results. We have designed a system which is light weight, compact and user friendly. Also the needles used for piercing is of �one time use�, sterile and will be disposed after every single use making the device safe and risk free.
Keywords: blood sugar level monitoring, glycaemia, test strip, diabetes mellitus, Glucometer, �one time use�, sterile.
Abstract
Beneficial and Deleterious effects of Wine
Dr. A. Jaganathan
DOI: 10.17148/IJARCCE.2016.51006
Abstract: Since ancient times, in various cultures and religions, there has been a strong belief that alcohol offers important health benefits. In recent years, the idea that regular alcohol consumption protects against cardiovascular disease has gained momentum. Individuals who drink moderately reduce their risk of dying from heart disease by approximately 40%. Wine has been part of human culture for 6,000 years, serving dietary and socio religious functions. Its production takes place on every continent, and its chemical composition is profoundly influenced by ecological techniques, the grape cultivar from which it originates, and climatic factors. In addition to ethanol, which in moderate consumption can reduce mortality from coronary heart disease by increasing high-density lipoprotein cholesterol and inhibiting platelet aggregation, wine (especially red wine) contains a range of polyphenols that have desirable biological properties. The antioxidant effects of red wine and of its major polyphenols have been demonstrated in many experimental systems spanning the range from in vitro studies (human low-density lipoprotein, liposomes, macrophages, cultured cells) to investigations in healthy human subjects. Wine is like any other food it should be consumed sensibly and in amounts that are beneficial to health. Overindulgence of any kind does not promote good health.
Keywords: Wine, polyphenols, bacteria, ROS.
Abstract
Expanding the Existing Time Span of Wireless Sensor Network by Incorporating Differential Evolution Algorithm in Clustering
Sonia Battan, Lakshit Bakshi
DOI: 10.17148/IJARCCE.2016.51007
Abstract: Wireless sensor networks gains attention of everyone as they have wide range of applications. Networks are divided into clusters which contain nodes. Energy optimization of these nodes and increasing their life time is the main issue to be considered. Cluster Heads are selected using various algorithms such as Leach, Genetic, Differential Evolution and many more. This research paper represents use of Differential Evolution Algorithm for selecting cluster head. The results show that the lifetime of network is improved by using this algorithm as compared to Genetic Algorithm.
Keywords: Differential Evolution (DE), Genetic Algorithm, Cluster Head, First End Node, Half End Node.
Abstract
Protection of Android Application against Malware Attack
Priyanka Rane, Madhuri Dalal
DOI: 10.17148/IJARCCE.2016.51008
Abstract: Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current state of mobile malware in the wild. We analyse the incentives behind 46 pieces of iOS, Android, and Symbian malware that spread in the wild from 2009 to 2011. We also use this data set to evaluate the effectiveness of techniques for preventing and identifying mobile malware. After observing that 4 pieces of malware use root exploits to mount sophisticated attacks on Android phones, we also examine the incentives that cause non-malicious smartphone tinkerers to publish root exploits and survey the availability of root exploits.
Keywords: Android malware, Android detector, Benignapps, DroidBox,Malicious apps.
Abstract
Image Segmentation by Using Linear Spectral Clustering
N. Sandeep Reddy, Mr. Shaik Umar Faruq, K. Rajya Lakshmi
DOI: 10.17148/IJARCCE.2016.51009
Abstract: In this paper a super pixel segmentation algorithm called Linear Spectral Clustering (LSC), which produces compact and uniform super pixels with low computational costs. Basically, a normalized cuts formulation of the super pixel segmentation is adopted based on a similarity metric that measures the color similarity and space proximity between image pixels. However, instead of using the traditional eigen-based algorithm, we approximate the similarity metric using a kernel function leading to an explicitly mapping of pixel values and coordinates into a high dimensional feature space. We revisit the conclusion that by appropriately weighting each point in this feature space, the objective functions of weighted K-means and normalized cuts share the same optimum point. As such, it is possible to optimize the cost function of normalized cuts by iteratively applying simple K- means clustering in the proposed feature space. LSC is of linear computational complexity and high memory efficiency and is able to preserve global properties of images. Experimental results show that LSC performs equally well or better than state of the art super pixel segmentation algorithms in terms of several commonly used evaluation metrics in image segmentation.
Keywords: Linear Spectral Clustering (LSC), super pixel segmentation, eigen-based algorithm.
Abstract
Survey of Localization Techniques in Mobile Wireless Sensor Network
Suresh Rathod and Raj Kumar Paul
DOI: 10.17148/IJARCCE.2016.51010
Abstract: Wireless sensor network (WSN) is employed to gather and forward information to the destination. It is very crucial to know the location of the event or collected information. This location information may be obtained using GPS or localization technique in wireless sensor networks. Localization is a technique to obtain the location of sensor nodes in the network. Localization of nodes in sensor network is a motivating analysis space, and lot of works are done to this point. It is highly required to design energy aware, economical and scalable localization techniques for WSNs. In this paper, we have done analyse of various localization techniques, and few possible future research directions.
Keywords: Wireless sensor network (WSN), sensor network, Localization Techniques, actors networks.
Abstract
A Review on Li-Fi (Light Fidelity): The Future Technology
Pummy Dhiman
DOI: 10.17148/IJARCCE.2016.51011
Abstract: Nowadays almost all the peoples are using internet to accomplish their task through wired or wireless network. As number of users are increases in utilizing wireless network, speed decreases. Though Wi-Fi gives us speed up to 150 mbps as per IEEE 802.11n, which is not sufficient to accommodate number of desired users. A solution to this problem is by the use of the proposed system. Li-Fi stands for the Light-Fidelity. Li-Fi is transmission of data through light by sending data through an LED bulb that varies in intensity faster than the human eye can follow and the faster data transmission speed. Li-Fi is the new technology has used to label the fast and cheap wireless communication system, which is the next optical version of Wi-Fi.
Keywords: Wireless-Fidelity (Wi-Fi), Light-Fidelity (Li-Fi), Light Emitting Diode (LED), Visible Light Communication (VLC).
Abstract
A Hybrid Approach for GTS Using Min-Max Algorithm on GPU and CPU
Dipali V. Patil, Kishor N. Shedge
DOI: 10.17148/IJARCCE.2016.51012
Abstract: In field of the game theories and artificial intelligence Game-tree-search is the classical problem. The general use of GTS algorithm is in the real time applications having much higher complexity like video games, chess, connect4/connect6 etc. Different algorithms for game tree are used to search out the player's next best move on the game tree in minimum time. Main focus of system is on increasing massive parallelism abilities of GPUs to accelerate the speed of game tree algorithms and propose general parallel game tree algorithm on the GPUs. In game tree search, GPU surpasses CPU if there is highest level of parallelism is achieved due to its searching is in BFS manner and CPU is in DFS manner so that CPU didn�t produce improvement. Here combination of DFS and BFS technique is main focus and appropriate selection will be the depth-first-search on CPU and use breadth-first-search on GPU and looks like hybrid CPU and GPU solutions.
Keywords: SIMD, MIMD, GPU, Connect6, Parallel Computing.
Abstract
A Novel Neighbour Coverage-based Probabilistic Rebroadcast Protocol for Mobile Ad Hoc Networks
Aswathi .C
DOI: 10.17148/IJARCCE.2016.51013
Abstract: Because of high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures. This paper, proposes a novel neighbour coverage-based probabilistic rebroadcast protocol for reducing routing overhead in MANETs. In order to effectively exploit the neighbour coverage knowledge, a novel rebroadcast delay is used to determine the rebroadcast order, and then it can obtain the more accurate additional coverage ratio by sensing neighbour coverage knowledge. By combining the additional coverage ratio and connectivity factor, it can set a reasonable rebroadcast probability. This approach combines the advantages of the neighbour coverage knowledge and the probabilistic mechanism, which can decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance.
Keywords: AdhocNetworks, Neighbour Coverage, Network Connectivity, Probabilistic Rebroadcast, Routing overhead.
Abstract
Sketch- Based Image Retrieval Hypothesis-Driven Object Boundary Selection with HLR Descriptor
Prashant Sanjay Patil
DOI: 10.17148/IJARCCE.2016.51014
Abstract: The appearance gap between sketches and photo-realistic images is a fundamental challenge in sketch based image retrieval (SBIR) systems. The existence of noisy edges on photo-realistic images is a key factor in the enlargement of the appearance gap and significantly degrades retrieval performance. To bridge the gap, we propose a framework consisting of a new line segment-based descriptor named histogram of line relationship (HLR) and a new noise impact reduction algorithm known as object boundary selection. HLR treats sketches and extracted edges of photo-realistic images as a series of piece- wise line segments and captures the relationship between them. Based on the HLR, the object boundary selection algorithm aims to reduce the impact of noisy edges by selecting the shaping edges that best correspond to the object boundaries. Multiple hypotheses are generated for descriptors by hypothetical edge selection. The selection algorithm is formulated to find the best combination of hypotheses to maximize the retrieval score; a fast method is also proposed. To reduce the distraction of false matches in the scoring process, two constraints on spatial and coherent aspects are introduced. We tested the HLR descriptor and the proposed framework on public datasets and a new image dataset of three million images, which we recently collected for SBIR evaluation purposes.
Keywords: Photo-realistic images; histogram of line relationship (HLR); Large-scale sketch retrieval; line segment-based descriptor.
Abstract
Dynamic Non-Linear Authenticator Protocol (DNAP) For MANETS
JayaPrakash .R, Saroja. K
DOI: 10.17148/IJARCCE.2016.51015
Abstract: The Path Detection (PD) protocol used to select the shortest path and DNAP (Dynamic Non-linear authenticator Protocol) algorithm protocol used to find the alternate path to transfer a message to destination. To improve the detection accuracy to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, develop a dynamic Path routing protocol (DPR) mechanism based dynamic routing privacy preserving protocol architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes.
Keywords: Privacy preserving, Routing, Service, Authenticator.
Abstract
Simple Satellite Network Simulation using OMNET++ 5
Narendra Kumar Dewangan, Narayan Sahu
DOI: 10.17148/IJARCCE.2016.51016
Abstract: In present day�s satellite play important role in various part of life and industry. Security, entertainment, data communication and many other things are dependent on satellite networks and communication modules. Satellite is more or less like wireless networks with broadcasting data transfer facility. Data can be transmitted from one point of earth to another point through the geostationary satellites. Satellite implementation is very costly in real, so we have to make first virtual simulation of satellite network to measure its performance. This paper describe the Satellite network Simulation with tool OMNET++5. Before implement a real time model of communication channel, we create simulation model for testing.
Keywords: Satellite network, wireless, OMNET++ 5, Network Simulation, wireless networks.
Abstract
Role of IoT and Cloud in Healthcare a Survey
Santosh Pawar
DOI: 10.17148/IJARCCE.2016.51017
Abstract: Internet of Things is the group of devices that are connected to the internet to perform the processes and service that support our basics needs, economics, health and environment. Cloud computing is an archetype, in which dynamical, scalable and virtualized resources are provided as services via internet. Cloud computing along with the Internet of Things will enhance the performance capabilities and resource storage to the maximum. Hence, cloud computing is used as a front end to access Internet of Things. The consumerization of the healthcare industry is developing rapidly which empowers people to live healthier lives by using connected devices such as tablets, wearables and hand-held devices. Internet of Things is an advancing technology that bridges interoperability challenges to radically change the way in which healthcare will be delivered, driving better outcomes, increasing efficiency and making healthcare affordable. Internet of Things equips people centricity with technology to deliver enhanced results. Here we present a survey on how Internet of Things and Cloud plays a vital role in health care.
Keywords: Cloud Computing, Internet of Things. Resource Pooling, Rapid Elasticity.
Abstract
Fingerprint Combination for Resisting Attacks
Austin J Gladston, Ashitha .S.S
DOI: 10.17148/IJARCCE.2016.51018
Abstract: The success fingerprint combination and their extensive deployment all over the world have prompted some individuals to take extreme measures to evade identification by altering their fingerprints. The problem of fingerprint alteration or obfuscation is very different from that of fingerprint spoofing, where an individual uses a fake fingerprint in order to adopt the identity of another individual. While the problem of spoofing has received substantial attention in the literature, the problem of obfuscation has not been addressed in the biometric literature, in spite of numerous documented cases of fingerprint alteration for the purpose of evading identification. We introduce a novel system for fingerprint privacy protection by combining two fingerprints into a new identity. In the enrolment, the system captures two fingerprints from two different fingers. The algorithm based on the features extracted from the orientation field and minutiae satisfies the three essential requirements for alteration detection algorithm.
Keywords: Minutiae, Orientation, Template, Fingerprint combination.
Abstract
“Low Latency Low Complexity Compare and Decode Architecture for LTE Turbo Codes”
Aaquib Javed, Vijay L. Agrawal
DOI: 10.17148/IJARCCE.2016.51019
Abstract: A new architecture for matching the data protected with an error-correcting code (ECC) is presented in this brief to reduce latency and complexity. Based on the fact that the codeword of an ECC is usually represented in a systematic form consisting of the raw data and the parity information generated by encoding, the proposed architecture parallelizes the comparison of the data and that of the parity information. To further reduce the latency and complexity, in addition, a new butterfly-formed weight accumulator (BWA) is proposed for the efficient computation of the Hamming distance. Grounded on the BWA, the proposed architecture examines whether the incoming data matches the stored data if a certain number of erroneous bits are corrected. For a (40, 33) code, the proposed architecture reduces the latency and the hardware complexity by, compared with the most recent implementation. the proposed architecture reduces the latency and the hardware complexity by ~32% and 9%, respectively, compared with the most recent implementation.
Keywords: Reduce the latency, less complexity, High-speed access, Communication Decoding system.
Abstract
Visualization of Geometrical Defects of Radiators using Edge Detection Techniques
M.H. Thasin Fouzia, S. Vinu Kiran, Dr. K. Nirmala
DOI: 10.17148/IJARCCE.2016.51020
Abstract: Quality of products is needed to be inspected before they are used in the industries. A radiator is a heat exchanger composed of layers of tubes and fins bonded together known as the core of the heat exchanger. Any damages to the fins of the radiator, reduces the heat dissipation capacity of the core. The traditional inspection system of the products classify defects only based on their gray value, which is far from satisfactory because of its low productivity, low reliability and poor economy. This paper proposes an efficient approach for the detection of defects using Edge detection methods based on canny edge detector. From the pre-processed image, defect areas are located by specifying the region of interest. The total matched percentage is calculated with the number of white and black points by comparing the images.
Keywords: Pre-processing technique, Image enhancement, edge sharpening, edge detection filters.
Abstract
Distributed Pattern Sequences with Mining Principle Using Hierarchical Representation
Dr. K. Subramanian, S. Surya
DOI: 10.17148/IJARCCE.2016.51021
Abstract: The principle of analyzing the pattern sequences in mining domain is always a complex task in data-mining process. Many approaches are already defined to mining the sequential patterns which are complex and strucked up with certain points such as database complexity, cannot support for large database, structural mismatching and so on. A new methodology is required to mining the sequential pattern with more innovative way, called Modified Searching Algorithm [MSA]. This algorithm is suitable for solving the task complexities such as structural mismatching and the size of the database is even huge as well as this approach of MSA is integrated� with energetic pruning� techniques to resolve the problem of database structuring complexities even in distributed database domains. This approach is further� extended by using Complex Structural Scheme [CSS] to improve the performance under fast processing and retrieval of results. This two approaches of Modified Searching Algorithm and Complex Structural Scheme are highly worked together to propose a compact and flexible environment for sequential pattern mining with large databases. For all the entire paper clearly illustrates the model to make the pattern mining more successfully with sequential approach and it is explained in detail via two powerful approaches called MSA and CSS.
Keywords: Complex Structural Scheme Modified Searching Algorithm, Pattern Mining, Structural Patterns.
Abstract
A Survey on Application of ANNs in Solid Waste Prediction
Mr. Shrikant R. Chaudhari, Dr. Chitra A. Dhawale
DOI: 10.17148/IJARCCE.2016.51022
Abstract: Success of solid waste management system depends upon the prediction accuracy of solid waste generation in the city, hence it plays very important role in SWMS. This is a survey paper dealing with the use of neural network models for solid waste prediction. There are two types of prediction short term prediction and long term prediction mainly depends upon the data availability over the period of time. Artificial Neural Networks (ANNs) is become a key machine learning system in prediction area and proves that it is far superior to traditional statistical methods. Even though there is limited availability of data; artificial neural networks are competent of predicting waste generation with good results. Prediction of solid waste quantity for one particular city cannot be applicable to other study area due to different waste generating conditions belongs to that study area.
Keywords: Artificial Neural Networks (ANNs); Solid Waste Management System (SWMS); Neural Network (NN); Weekly Waste Generation (WWG); Solid Waste (SW).
Abstract
Design and Analysis of Fundamental Gates and Adder using Adiabatic Array Logic
Gurdeep Kaur , Abhinav Vishnoi
DOI: 10.17148/IJARCCE.2016.51023
Abstract: Adiabatic logic uses the principle of reversible logic in order to minimize the power consumption. The reduction of power dissipation in adiabatic is achieved through the use of power clock instead of DC voltage. Adiabatic switching is mostly used to minimize the power consumption during charging and discharging. The main purpose is to design a low power circuit using adiabatic array logic which consumes less power. In this paper we have designed fundamental gates adders using adiabatic array logic and compare their power dissipation, delay and area with CMOS logic
Keywords: Adiabatic Array Logic, Complementary metal oxide semiconductor (CMOS ), Quasi adiabatic logic, Carry Select Adder (CSLA) , fundamental gates.
Abstract
Raspberry Pi Based Weather Monitoring System
Meetali V. Rasal, Prof. Jaideep G. Rana
DOI: 10.17148/IJARCCE.2016.51024
Abstract: Implementing a prototype model for the weather monitoring system is the main aim of the paper Temperature, relative humidity and atmospheric pressure measurement by using the appropriate sensors is very beneficial for industrial, weather monitoring. A weather monitoring model or system has been developed as discussed in this paper to record and displaying of the weather parameters like temperature, humidity, wind direction speed, rain fall detection and atmospheric pressure Various weather monitoring techniques have been reviewed in this paper. Recorded information is kept in the device for further use. User can find out the data saved by the system anytime as per the request. Among Various techniques radars, satellites, microcontrollers of weather monitoring systems raspberry pi is the latest& efficient wireless weather monitoring technique.
Keywords: Raspberry Pi. Cloud Server, Weather monitoring sensors, Python programming
Abstract
An Efficient Black Hole and Gray Hole Detection Using Fuzzy Probabilistic Detection Scheme in DTN
Mythili .M, Renuka .K M.Sc. M. Phil
DOI: 10.17148/IJARCCE.2016.51025
Abstract: Blackhole and Grayhole behaviors represent a serious threat against routing in Delay or Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN represents a great challenge. The proposed fuzzy based probabilistic attack detection scheme, for secure DTN routing. The basic idea of FPDS is introducing a periodically available vehicle to vehicle authority, which judges the node�s behavior based on the collected routing evidences. The proposed model FPDS as the Inspection theoretical analysis to demonstrate that, by setting an appropriate investigation probability, the security of DTN routing at a reduced cost. To further improve the efficiency of the proposed scheme, fuzzy detection probability with a node�s reputation, this allows a dynamic detection fuzzy probability determined by a node�s reputation. The extensive analysis and simulation results show that the proposed scheme substantiates the effectiveness and efficiency of the proposed scheme.
Keywords: Delay or Disruption Tolerant Networks; Fuzzy Rule; Probability Detection; Secure Routing.
Abstract
The Legend “JAVA” Vs “C++” Programming Languages
Nelapatla Swetha, Mulagani Supriya, Ravula Kartheek
DOI: 10.17148/IJARCCE.2016.51026
Abstract: This paper develop an examination between two principle programming's utilized as a part of programming applications that are Java what's more, C++, the examination operation incorporates the time expected to play out some calculation i.e. speed of operation, adaptability to altering some code, and proficiency. Similar code is utilized to contrast between the two programming with figure out which one is better. It is found that C++ needs less time to execute similar code contrasting and Java. Java needs around 10% overabundance time to execute similar code portion contrasting with C++.
Keywords: C++; Java; Code Flexibility, Algorithm Speed.
Abstract
Performance Calculation of Adhoc Network under the Impact of Wormhole Attack and its Prevention Mechanism
Niharika Shrivastava, Prof. Tilotma Sharma
DOI: 10.17148/IJARCCE.2016.51027
Abstract: Mobile ad hoc network is a new generation communication technology. Now in these days that is adoptable in different manner of small and large range communication. Due to their ad nature of network organization and topology formation the network suffers from various security issues and performance issues. Thus the proposed work is investigation of the security issues ad hoc network. This developed methodology is to identify Worm-hole node. The technique works with slightly modified AODV protocol give the method of preventing WORMHOLE attack by using IDS algorithm. This proposes a solution that will increase the basic AODV routing protocol, which will be capable to avoid Wormholes. To reduce the probability of Wormhole, it is proposed IDS based methodology for prevent Wormhole and find safe route to reach the neighbour nodes. A wireless IDS monitor�s wireless network traffic and analyzes its wireless networking Protocol to identify suspicious activity.
Keywords: Calculation of Adhoc Network, Wormhole Attack, IDS algorithm
Abstract
A Survey on Searching Shared and Encrypted Data for Security on Cloud
Swati Virkar, Priti Chinchwade, Shivani Ajmire, Prof. R.A. Badgujar
DOI: 10.17148/IJARCCE.2016.51028
Abstract: Cloud computing is a capable, evolving Internet computing of this era. It presents the users with a secure storage for storing the documents online wherein the users can take the benefit of freedom to access it remotely avoiding the usage of the data storage services. When it comes to cloud data security, new technique is required. Protecting data in the cloud can be similar to caring data within a traditional data center or enhanced data center like cloud. Authentication and uniqueness, access control, encryption, protected deletion, is a numerous authentication encryption term. For encryption-based data access control for cloud, in which it shows that the mechanism of security is dealing with revocation could achieve by the different security techniques. It demonstrates that a encryption method in cipher text updating key for authentication for trusted user, so a security susceptibility appears. A revoked user can still decrypt new cipher texts for that user want to request for the new secret keys to access data.
Keywords: Encryption, Trapdoor, Index, Searchable Encryption.
Abstract
Associate Rule Mining for Social Network Data using Map Reduce
Miss Shruti S. Gadgil, Prof. L. M. R. J. Lobo
DOI: 10.17148/IJARCCE.2016.51029
Abstract: Social Network is a network of individuals connected by interpersonal relationships. A social network data refers to the data generated from people socializing on this social media. This user generated data helps to examine several assets of the socializing community when analyzed and mined. Data mining is the process of analyzing data from different perspectives for finding unknown insights. Association Rule mining, one of the significant task of data mining helps in the discovery of associations, correlations in social networks. This paper presents an approach of extracting associations between the contents of Social Network Data using Apriori Algorithm based on MapReduce framework which is a programming model working in parallel form to find frequent itemsets for the Social Network data and then makes use of Genetic Algorithm for generating association rules from the frequent itemsets. Here Genetic Algorithm is used as an optimization technique to generate Association Rules.
Keywords: Data mining, Genetic Algorithm, Apriori Algorithm, Association rules, MapReduce.
Abstract
An Implementation and Modification of VANET Routing Protocols using Multipath and Multicast Algorithm for Varying Node Density
Apurva Kukade, Prof. Tilotma Sharma
DOI: 10.17148/IJARCCE.2016.51030
Abstract: Wireless networks between vehicles formed by VANET (Vehicular Ad hoc Networks). VANET incorporates the wireless communication and data sharing capabilities to turn into vehicles as a network topology. VANET is showing great potential in research area. Inter-vehicle communication system in VANET improves traffic safety. VANET consists of high dynamic topology alternating connectivity Patterned mobility and on board sensors etc. A challenging task in vehicular ad hoc network is routing of data due to its high dynamic behavior. An efficient routing protocol by understanding the dynamic behavior of VANET topology will plays an essential role in communication of vehicles. Mobility of nodes, road topologies are some of the internal factors are presented on the performance of routing protocols. Routing protocols are of mainly categorized into: Proactive, Reactive and Hybrid routing protocols. This paper occurs with performance evaluation of AODV (Ad-Hoc on-Demand Distance Vector), DSDV (Destination-Sequenced Distance Vector) routing protocols based on metrics such as packet delivery ratio, throughput and average end to end delay. AODV is reactive routing protocol and DSDV is proactive routing protocol. VANET represent a rapidly emerging and challenging class of MANET. In this type of network, each node operates not only as a host but also as a router; promote packets for other mobile nodes. Communication between nodes i.e. vehicles by means of wireless technology has a large potential to improve traffic safety and travel comfort for drivers and passengers. VANET, being an infrastructure-less networks, vehicle will be expected to cooperate to perform essential networking tasks such as routing.In this work, nodes have been used as vehicles and based on evaluation between four mostly used routing protocols Ad hoc on demand distance Vector routing protocol (AODV), DSDV and modified-AODV in VANET scenario. 30 sec time is taken for simulation with varying nodes i.e. 25 nodes, 50 nodes and 75 nodes and 100 nodes. Various mobility have been analyzed here which are 50 m/sec and 100 m/sec and performance has been evaluated on the basis of residual energy, packet delivery ratio, routing overhead, throughput and end to end delay with different environments. The simulation study has been completed using network simulator (NS2)tool. In this work we have carried out the detailed analysis of the routing protocols AODV, DSDV and modified AODV and concluded that varying mobility as well as varying node density drastically affects the behavior of the routing protocols.
Keywords: VANET, AODV, DSDV, Modified-AODV, IEEE802.11p, Network Simulator-2.35
Abstract
Optimized Encrypted Entries for S & Pp Box
Jambunathan S, Sathish A, Shankar R
DOI: 10.17148/IJARCCE.2016.51031
Abstract: Advanced Encryption Standard is a reliable cryptosystem which is used in many applications. It consists of four rounds and byte substitution is the major of those rounds. Procedure of this round is to substitute the values with the entries of Substitution-Box which is known as S-Box. Its entries are pre-computed and stored on lookup tables (ROMs) to avoid tedious real time computations. There also have possible chance of attacks (known & Side-channel) proposed due to direct storage of S-Box and it spoils the overall security of the cryptosystem. To protect against such vulnerabilities, tracking on the security of the S-Box is necessary. Existing system that provides such security to the S-Box has time and space complexities in storage and searching mechanism. Our objective is to propose an optimized system from all the existing along with the space and time complexity of direct S-Box.
Keywords: S-BOX, IS-BOX, PP-BOX, IPP-BOX, S-Box, IS-Box
Abstract
Vector Field Based Conversion of Color Image to Gray Scale
Sheelbrat O. Mishra, Devarkonda S.S. Sudhakar
DOI: 10.17148/IJARCCE.2016.51032
Abstract: The following paper proposes a vector based technique of image processing for converting color images to grayscale images. The three base color channels of red, green and blue are assumed to form the three vector axes of a 3-dimensional vector space with every color having an equal influence at the resultant vector of the three axes. The results of the proposed algorithm are compared with those from the averaging technique or the same.
Keywords: Grayscale, Image Processing, Color channels, vector space
Abstract
Survey on the Police Tracking System
Vishwas Deulgaonkar, Yogesh Jawadwar, Akash Hiwarkar, Priyanka Doijode, Prof. Sarita Patil
DOI: 10.17148/IJARCCE.2016.51033
Abstract: Studies have found requirement of an application for the police to effectively manage the police personnel and to get updates quickly about impending traffic rule breakers and in a better manner. There is distinct need of this application for the police to be smart in smart city scenario, we have implemented this application to help the police in better manner and quickly have good solving of the problem and doing police duties in a proper way. The resultant draws attention to the problems faced by police officers and creates effectiveness in the working of this system. Solving the problem of corruption is the primary end result of this project. We provide a survey base paper for understanding and judging the requirement for the police personnel and present the required solution.
Keywords: Police, suspect, identification.
Abstract
Cotton Leaf Disease Detection & Classification using Multi SVM
Supriya S. Patki, Dr. G. S. Sable
DOI: 10.17148/IJARCCE.2016.51034
Abstract: Agriculture is an important source of livelihood where 65% population is depend on it. The crop loss due to disease is increasing day by day which affects on the quality and productivity of crop. As diseases on the crop are certain, the early disease detection of the crop plays major role to control the loss in agriculture. In the proposed disease detection system, the work is carried out on cotton leaves. Initially the infected region is captured and pre-processed by converting captured RGB image to other color space. During segmentation, leaf as well as diseased part is segmented using Otsu's global thresholding method and different features are extracted such as color and texture with the help of color-co-occurrence method. Finally classification technique is used for detecting the diseases with the help of Multi SVM (Multi Support Vector Machine) classifier.
Keywords: crop, disease, color, feature, Multi SVM.
Abstract
A Survey on Mobile Data Offloading in Heterogeneous Networks
K. Kalaiselvi, N. Venkatesan
DOI: 10.17148/IJARCCE.2016.51035
Abstract: An extra ordinary increase in the mobile applications, data traffic is becoming a major issue in the network. With use of smart phones, laptops and tablets gradually increase the mobile data traffic. Now a day various solutions are available to recover this problem. Mobile data offloading and heterogeneous system is used for controling data traffic and improves the performance, user mobility and coverage ratio. Mobile data offloading reduces difficulties on the cellular network and provide the solution with low cost. In this paper, we present a complete survey of Mobile data offloading techniques and extract the offloading functional requirements for today�s mobile network.
Keywords: Mobile data offloading, heterogeneous system, user mobility, coverage ratio, cellular network.
Abstract
A Survey on Secure Video Delivery through Encrypted in- Network Caching
S. Jeyalakshmi, P. Murugeswari
DOI: 10.17148/IJARCCE.2016.51036
Abstract: With the dramatic increase the video application, security is becoming a major problem of the network. Intruders on the network are increasing day by day. The attackers are easily access the video content. This problem is recovered by In-network content caching. In-network content caching is new emerging network architecture that effectively handles video traffic in network. At present many technologies (like HTTPs) to effectively handle the video traffic but the main drawback is end to end security. In-network caching provides the encryption method for secure video delivery. This paper presents a survey on different method for secure and efficient video delivery through in network caching.
Keywords: Video traffic, attackers, in-network content caching, encryption, Http.
Abstract
Implementation of Multi Zone Smart Gardening System
P. Tulasi Santosh Kumar, K. N. Balaji Kumar
DOI: 10.17148/IJARCCE.2016.51037
Abstract: The main objective is to develop a wireless Gardening system using zigbee technology and Internet of Things (IOT) gateway. This wireless gardening system keeps track the moisture levels of the soil in the field. Depending on the reading the valves at particular places will be opened wherever moisture levels are less. The proposed system consists of two types of nodes, one is sensor node and the other is actuator node are placed in zone wise. The collected data is displayed on the webpage by using the IOT gateway. These collected data will be transfer in between the nodes and IOT gateway through the zigbee. In this system, zigbee can form the mesh network for transfer in between the nodes and IOT gateway. The system has ability to work remotely.
Keywords: Sensor node, Actuator node, Internet of Things (IoT) gateway, Zigbee.
Abstract
Implementation of Audio Player Using ARM Cortex-M4
Thadi Harita Nath
DOI: 10.17148/IJARCCE.2016.51038
Abstract: ARM is0one of the leading advanced digital technology in the industry. It enables the creation of new markets and transformation of the industries and society. At present processors are intelligent enough to deliver the applications in terms of enhanced capabilities with the advancement in embedded technology. Today, most of the electronic gadgets are equipped with audio hardware where the processing of audio signals is difficult in recording and storing. The present audio players have a drawback in the absence of the intelligent surface and incapability of replacing the storage devices. Consumers are searching for moderate interactive media gadgets with high performance and durability. The ARM Cortex-M4 meets the needs of smart embedded applications with integrated floating point unit that includes digital signal processing features. In this paper, ARM Cortex-M4 is used to play the wave format audio files from a USB flash drive and records the audio using MEMS microphone and PDM audio software decoding library.
Keywords: ARM Cortex-M4, MEMS, Pulse Density Modulation, Floating Point Unit, STM32F4.
Abstract
Location Selection for a Company using Analytic Hierarchy Process
Vivian Brian Lobo, Nazneen Ansari, Blety Babu Alengadan, Pooja Gharat, Edwina Jacob, Priti Mishra
DOI: 10.17148/IJARCCE.2016.51039
Abstract: Analytic hierarchy process (AHP)�developed by Prof. Thomas L. Saaty (1970s)�is a decision-making method for prioritizing alternatives when multiple criteria needs to be considered. It structures a problem as a hierarchy or a set of integrated levels. AHP is structured into three levels, i.e., goal, criteria, and alternatives. It does not require absolute judgment or assessment but helps us to make a relative assessment between two items at a time. AHP judgments are known as pairwise comparisons. It uses a weighted average approach idea, but it uses a method for assigning ratings and weights that are considered to be more reliable and consistent. A company wants to select a best location for building a new plant from a set of three locations for enlarging its operations. In order to assist such a company, we will be using AHP by taking into account four criteria such as property price, distance from suppliers, quality of labor pool, and labor cost. This study attempts to help the company in selecting the best location so that it can build its new plant and expand its operations by using the aforementioned criteria.
Keywords: Analytic hierarchy process, company, distance from suppliers, labor cost, location selection, multicriteria decision-making problem, property price, quality of labor pool.
Abstract
Advanced Security Mechanism at ATM Centres
K. Sowmya Sree, Ravindran Vishal, Andavolu Prakash, Vinutha Gogineni
DOI: 10.17148/IJARCCE.2016.51040
Abstract: Invention of ATM machines is all the way beneficial to man-kind. However, people are facing few security issues like physical security and robberies. Few security measures are already in practice like security guards at the centers, reverse pin, CC cameras and few mobile applications; these are reliable up to certain extent but cannot avoid the problems on the whole. In this research we present an idea which can provide advanced security at ATM centers, involving Scanning the card for validation, using automatic door access card reader (Yetong model no-M2000) to permit the person into the room, and limiting the entries which are detected. Use of vibrators in ATM machine to sense abnormal actions, sharing the entry card details between card reader and ATM machine to access the doors for the exit of same person, on scanning the card after transaction.
Keywords: ATM, Card-reader, camera, Bull horn.
Abstract
Intelligent Headlights
Hardik Mehta, Priyaj Nabar, Rishikesh Palve
DOI: 10.17148/IJARCCE.2016.51041
Abstract: The primary goal of an automotive headlight is to improve safety in low light and poor weather conditions. But, despite decades of innovation on light sources, more than half of accidents occur at night even with less traffic on the road. Recent developments in adaptive lighting have limited flexibility and are not designed for all driving environments. This paper is regarding an ultra-low latency reactive visual system that can sense, react, and adapt quickly to any environment while moving at highway speeds. A single hardware design can be programmed to perform a variety of tasks.
Keywords: LED, Halogen Lamps, Xenon Lamps, DMD source.
Abstract
Implementation of Dynamic Programming to Find All Pairs Shortest Path on Fibre Optics Networks Routing and to Formation of Virtual Topology Reconfiguration
M. Anupama Narayana, Dr. V. Raghunatha Reddy
DOI: 10.17148/IJARCCE.2016.51042
Abstract: Fiber optic networks- WDM technology - The formation of virtual topology on existing physical Network-Using Dynamic programming approach has been developed to produce different sets of traffic matrices for finding shortest path from each source to different destinations- Heuristic logical design Algorithm (HLDA) is implemented to find shortest path varying number of optical transceivers. A study on 4-node stage wise traffic matrices produced- and made formation of virtual topology reconfiguration done using dynamic programming - Comparative study on different object function on using dynamic programming virtual topology and reconfiguration of virtual topology
Keywords: Fibre Optics, Dynamic programming, Virtual Topology, All pair shortest path, Stages, Virtual topology Reconfiguration
Abstract
Innovative Methods of Monitoring and Regulating River Water between Dams: A Noble Solution for Interstate Water Distribution
Sreeharsha A.N, Vishesh S, Manu Srinath, Jnanesh Kumar N, Anuradha Vidyadhar Shastry, Gaurav Raj Chattarki, Suhas S, Karthik P Gubbi, K Sri Krishna, Mohan M
DOI: 10.17148/IJARCCE.2016.51043
Abstract: India is a federation with distinct regions and complex water problems. India�s internal borders however reflect the vagaries of history and political compromise and bare little relation to the natural contours of the river basins. The same can be said for virtually every other nation in the world. India is facing serious inter-state water distribution crisis leading to interstate disputes which further leads to violence and political disorder in the country. The fault lies in the present system of water distribution between states or union territories. In this paper, we have proposed a semi-automatic water distribution system and innovative methods of monitoring and regulating river water between dams. We use automatic water level sensors to monitor the water levels in different dams instead of existing manual water level measuring scales. Measuring the water levels alone is not the solution; we propose a system which makes use of satellite images of the agricultural lands, thermal satellite images of the crop lands and weather reports by the meterological department to analyse the scenario and regulate the water between dams unlike the present manual system. Our system is semi-automatic - meaning human intervention is possible at any level of the system in case of system failure or system upgrade. Also we make use of a data acquisition and web-server (national server) to store data of each and every dam to provide proof or transparency in case of water sharing and a central decision logic which will behave accordingly as programmed. A particular signal will be sent wirelessly to each and every gate of the dams to regulate water. Also, the basic idea behind this paper is to virtually connect all the existing dams in India through a network and have a central server (star topology) and respective state or district servers, interconnected in a full mesh topology.
Keywords: Semi-automatic water distribution system, automatic water level sensors, satellite images, data acquisition, web-server, central server, star topology, full mesh topology.
Abstract
Implementation of Low power Level Shifter with Logic Error Correction Circuit for Extremely Low-Voltage Digital Circuits
Kadam Sai Srinivas, Sagar Krishna Sivvam
DOI: 10.17148/IJARCCE.2016.51044
Abstract: This paper presents the design of low power level shifter that can convert extremely low and to higher output voltages. Level shifters are used to convert voltages from one level to other. In Conventional level shifter circuits the output voltage cannot be discharged at low input voltage. In this paper a Level shifter with lower power dissipation is proposed, it consists of a level conversion circuit and logic error correction circuit. Performance of proposed circuit performance is compared in terms of power dissipation and delay with other existing level shifter circuits. The proposed circuit and other existing level shifter circuits used have been simulated using cadence tool in gpdk180nm technology.
Keywords: Level Conversion Circuit, Level shifter (LS), Logic error correction circuit (LECC), Wide swing cascode current mirror.
Abstract
Digital Video Watermarking Using DWT and SVD Techniques
Shafali Banyal, Shivi Sharma
DOI: 10.17148/IJARCCE.2016.51045
Abstract: Video watermarking is well known as the process of embedding copyright information in video bit streams. It had been proposed in recent years to solve the problem of illegal manipulation and distribution of digital video. In this study, an effective, robust and imperceptible video watermarking algorithm was proposed for copyright protection. This algorithm was based on a cascade of two powerful mathematical transforms; Discrete Wavelets Transform (DWT) and Singular Value Decomposition (SVD). Two different transform domain techniques showed high level of complementary and different levels of robustness against the same attack will be achieved through their combination.
Keywords: Authentication, DWT, Robust Techniques, SVD, Video Watermarking.
Abstract
Implementation of MESI Protocol Using Verilog
Penmetsa Durga Devi, Tammineni Ravindra
DOI: 10.17148/IJARCCE.2016.51046
Abstract: Multiprocessor system is a system which contains two or more processors working simultaneously and sharing the same memory. Nowadays multiprocessors are being widely used due to their high throughput and reliability. It is important to maintain data consistency in multiprocessor system as different processors may communicate and share the data with each other. In multiprocessor systems caching plays a very important role. Cache coherence is a major issue in multiprocessor systems. In this paper we have designed three direct-mapped caches and to maintain cache coherence and data consistency among the processors we have used the MESI protocol. The MESI protocol is invalidation based cache coherence protocol. In this protocol each cache block can be in one of four states i.e., Modified, Exclusive, Shared and Invalid. In this protocol, whenever a processor writes into the local cache, all copies of it in other processors are invalidated in order to maintain data consistency and cache coherence. The cache design is simulated and synthesized using Xilinx ISE 14.7 Simulator and XST Synthesizer.
Keywords: Cache Coherence, Direct-mapped Cache, MESI, Xilinx.
Abstract
Application of Genetic Algorithms in Software Testing Techniques
Dr. V. Sangeetha, T. Ramasundaram
DOI: 10.17148/IJARCCE.2016.51047
Abstract: The ultimate aim of the software testing is to deliver a quality and reliable software product to end user. To ensure software quality, we need an effective software testing, but it is not an easy job, we have to face certain issues like an effective generation of test cases, prioritization of test cases and so on. To overcome these issues, various techniques and methodology have been proposed. At present, automatic test case generation using evolutionary algorithm has been the area of interest for many researchers. Genetic Algorithm (GA) is one of the evolutionary algorithms whi1ch produce an optimal solution to any problem. In this paper, we are going to briefly discuss applications of genetic algorithm in various software testing techniques.
Keywords: Genetic Algorithm, Software Development Life Cycle, Software Testing, Test Data
Abstract
Design and Analysis of Microstrip Patch Antenna for L-band Applications using IE3D v15
Aman Barsaiyan, Dr. D.C. Dhubkarya, Dr. Manoj Kumar Tiwari
DOI: 10.17148/IJARCCE.2016.51048
Abstract: Here we are presenting the design of microstrip patch antenna with rectangular patch for L Band applications. We measure experimentally various parameters of rectangular patch antenna such as return loss, VSWR, %BW, gain, antenna efficiency and directivity. Now a day bandwidth of microstrip patch antenna is main concern. A lots of method such as slotting like E-slot, U-slot, L-slot, I-slot and many are carrying out in order to increase the percentage bandwidth of patch antenna, but these methods are complicated to design. Therefore we design a rectangular patch antenna using computer software Zealand IE3D v15, which improves the percentage bandwidth of proposed antenna by 28.95%. The proposed antenna covers the L Band, has many applications such as mobile services, satellite navigation, aircraft surveillance and digital broadcasting.
Keywords: Microstrip patch antenna, line feeding, L Band, mobile communications.
Abstract
Analysis of Dispersion Compensation Using FBG in a 12 GBPS Optical System with RZ Modulation
Sami Haider, Dr. D K Srivastava, Ravindra Kumar
DOI: 10.17148/IJARCCE.2016.51049
Abstract: Dispersion is the main barrier in achieving an efficient Optical Communication system. In this paper we simulate an optical communication system which involves FIBRE BRAGG GRATING (FBG) as a mean of compensating dispersion in the system. RETURN TO ZERO (RZ) modulation format is used to analyze the simulated transmission system for different parameters using OPTISYSTEM Simulator. We have taken different values for parameters like Fiber length (Km), Input power (dBm), and Attenuation coefficient (dB/Km) and analyzed the effect on Quality factor, Gain (dB), output power (dBm), Noise Figure (dB) and Min BER. The system is simulated and all the results are analyzed using OPTISYSTEM 14.0 at 12 GBPS.
Keywords: Fiber Bragg Grating, Fiber Length, Input Power, Attenuation Coefficient, Quality Factor, Output Power, Gain, Noise Figure.
Abstract
An Intelligent V2V Communication Based Traffic Control System
Miss. Sadaf A. Shaikh, Prof. L.M.R.J. Lobo
DOI: 10.17148/IJARCCE.2016.51050
Abstract: Vehicular Ad-Hoc Networks (VANETs) technology is the most promising technology to increase traffic security and proficiency, and to enable various other related applications in the domain of vehicular communication. Applications using VANETs have diverse properties. Applications such as clearance to emergency vehicles (e.g. Ambulance, Fire Trucks), Vehicle-to-Vehicle (V2V) Communication is important to properly manage traffic situations. Using V2V communication, warns a driver about instances like crash, before it happens .This takes into account distance between each vehicle and speed adjustment for avoiding collision and better traffic flow has been developed. Based on experiments conducted it is found that the efficiency of HardBrake Vehicle System is 57.13% more than Smart Vehicle System and accuracy is found to be 21.6% more than Smart Vehicle System. These applications are classic models of what we call an Intelligent Transportation System (ITS) which aims to enhance security and efficiency in road transport using new technologies for information and communication. VANETs target to offer a high data rate and at the same time minimize latency within a small communication zone.
Keywords: Ad hoc network, communication, Traffic Control, Vehicles, Vehicle Safety.
Abstract
A Survey on Game Theory Against Attack in Honeypot Enabled Networks for IoT
R. Sangeetha, M. Mohana
DOI: 10.17148/IJARCCE.2016.51051
Abstract: At present the communication and information is increased by many devices that are associated to the internet. Growing, information technology and communication device require defense against intrusion. Now a day, network attacks are increasing gradually. Many of the intrusion detection are protected the network intrusion but it is not fully protect the current network attacks. Internet of Things (IoT) produces the honey pot technique for against the attacks. Honey pot techniques based on game-theoretic method with easily identify the network abnormal behavior data. The threshold frequency range classifies the attacker�s action. The valuable intrusion detection system require low success rate of attacker, detection rate and accuracy is high. This paper presents a survey on Deceptive Attack and Defense Game in Honey pot Network for IoT. These successfully resist all type of attacks in networks for Internet of Things.
Keywords: Network attacks, Intrusion detection, Internet of Things, Honey pot, Game-theoretic, Deceptive Attack, Defense Game.
Abstract
Realization of Multi Carrier Direct Sequence CDMA System for Multipath Faded Channels using Adaptive Viterbi Decoder
Ashish Chand Singh, Dr. N. S. Beniwal
DOI: 10.17148/IJARCCE.2016.51052
Abstract: In this paper Multi Carrier-Direct Sequence Spread Spectrum CDMA technique has been consider for users to support multimedia service in wireless mobile communication systems. It is a one of the recent technology to provide higher data rates over conventional medium access techniques like Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA) and Code Division Multiple Access(CDMA). Recently, a new CDMA system that combines advantages of both Orthogonal Frequency Division Multiplexing (OFDM) and DS-CDMA which is term as �MC-DS-CDMA,� system combined with the adaptive viterbi decoder algorithm. It is to be considering for bit error rate of system over multipath fading channels.
Keywords: MC-DS-CDMA, OFDM, Adaptive Viterbi Decoder, OSTBC
Abstract
Improve Secure Anti-Collusion Data Sharing Scheme for CP-ABE Security System
Kavitha .D, Karpagam .R
DOI: 10.17148/IJARCCE.2016.51053
Abstract: The data outsourcing development challenges the approaches of traditional access control architectures such as reference monitor; that a trusted server is in charge of describing and enforcing access control policies. The main scope of the project is used to deliver the user data in the third party area for on demand access. The user access the details as privilege level based on access control. The dual encryption is processed in the cloud environment which is varied form one group to another for secure process. The paper propose a novel algorithm namely ciphertext-policy attribute-based encryption to enforce access control guidelines with efficient attribute and user revocation capability. Dual encryption mechanism which takes advantage of the attribute-based encryption and selective group key sharing in each attribute group. The ciphertext-policy EABE (CP-ABE) provides a scalable way of decoding data such that the encryptor defines the attribute set that the decrypt or needs to possess in order to decrypt the ciphertext. Thus, different users are permitted to decrypt different pieces of data per the security policy. This effectively eliminates the need to trust on the storage server for preventing unauthorized data access.
Keywords: Cloud Computing, Secure Data Sharing Scheme, Certificate Authorities, Untrusted cloud, Ciphertext-policy Attribute Based Encryption.
Abstract
Rule based Stemmer using Marathi WordNet for Marathi Language
Pooja Pandey, Dhiraj Amin, Sharvari Govilkar
DOI: 10.17148/IJARCCE.2016.51054
Abstract: Stemming is integral part of many natural language processing and information retrieval application. Stemmer for a given language basically extracts root or base word for the input word. Marathi word being rich in morphological variation requires an efficient stemmer which can deal with various morphological structures associated with words. Marathi WordNet consists mainly of Marathi root and base words with their Part of Speech information which is useful to reduce over and under stemming issues. Proposed system augments rule based approach with WordNet to perform stemming of the Marathi words with the help of Name entity and stem exception dataset.
Keywords: Stemmer, Root words, Marathi WordNet, Stem Word, Suffix, Inflection and Marathi
Abstract
Theoretical Study of Optical and Electrical Properties of Organic Photovoltaic Cell PEDOT: PSS / P3HT: PCBM
T. Sahdane, A. Laghrabli, H. Bougharraf, R. Benallal, B. Azize, B. Kabouchi
DOI: 10.17148/IJARCCE.2016.51055
Abstract: The mechanism and equivalent circuit model of organic photovoltaic cell were analyzed, and the simulation system of current-voltage (I-V) characteristics of organic photovoltaic cell was established by gpvdm software. Using numerical modeling we show that the increase in efficiency is caused by optical absorption in the pure polymer layer and hence efficient charge separation at the polymer bulk-heterojunction interface between the poly(3,4 ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS) and poly(3hexylthiophene): phenyl-C61-butyric acid methyl ester (P3HT:PCBM) layer. The effect of internal series resistance and shunt resistance on its I-V characteristics, open circuit voltage and short-circuit current was quantitatively simulated.
Keywords: Organic photovoltaic cells, P3HT, PEDOT, open circuit voltage, short-circuit current
Abstract
Review on Tweet Segmentation using Correlation and Association
Mr. Umesh A. Patil, Miss. Snehal D. Gouraje, Miss. Ashwini P. Patil, Miss. Madhuri M. Pisotre
DOI: 10.17148/IJARCCE.2016.51056
Abstract: Twitter is an online social network used by millions people. It used to provide a way to collect and understand user�s opinion about much private and public organization. Twitter has become one of the most important communication channels with its achieve to providing the most up-to-date information to the user. In this paper we present to find the correlation of two words using the association rule. There must be an application to establish the mutual relationship between two words or sentences or segment. In the first step we collecting tweets are editable group of tweets hand selected by twitter user. These collected tweets are preprocessing in which stop words removed and then tweet segmentation. The form of generalized association rules, from messages posted by Twitter users. The analysis of Twitter post is focused on two different but related features: their textual content and their submission content. Due to its invaluable business value of timely information from these tweets, it is imperative to understand tweets language for a large body of downstream application, such as true named entity.
Keywords: Tweet dataset, Tweet segmentation, Microsoft N-gram, Correlation and Association.
Abstract
Survey on WIFI based Indoor Tracking System
Payal Tat, Manisha Nimbekar, Aboli Varpe, Sayali Gadade, Swati Khodke
DOI: 10.17148/IJARCCE.2016.51057
Abstract: We typically use wireless location network for getting direction to a particular area using GPS. We can effectively track and map the location we visit, however GPS cannot be applied in the indoor environment. Hence to save the cost we use RSSI- based trilateral location algorithm. This algorithm is one of the most used algorithms in sensor based network using Wi-Fi. We can calculate the current location of the mobile devices and navigate to a particular destination and use minimum mobile battery. Indoor navigation is one of the newest innovation in the mobile technology and we use extensively.
Keywords: Wifi, Tracking, Indoor, Mapping, blueprint, navigation
Abstract
An Overview of QoS Approach
S.S. Dwivedi, K.S. Vaisla
DOI: 10.17148/IJARCCE.2016.51058
Abstract: The refinement of clients has emulated the transistor, and current trends suggest that the deployment of I/O automata will soon emerge [10]. Given the current status of authenticated communication, mathematicians famously desire the simulation of access points, which embodies the confirmed principles of crypto analysis. We introduce a ubiquitous tool for deploying the partition table.
Keywords: SMP, fault tolerance, SCSI disk, NP complete.
Abstract
Smart Irrigation
Maria Chettiar, Dolcy Koli, Jerin Mathew Varghese, Merin Francis, Sreedevi Nair
DOI: 10.17148/IJARCCE.2016.51059
Abstract: This document deals with the tracking of solar energy and usage of this energy to power a water pump and water a piece of land. Based on the soil moisture levels the pump will be made ON/OFF. This employment of a green resource will help farmers in times of drought and also help them obtain a better yield than otherwise.
Keywords: PV panel, irrigation system, moisture sensor, water pump.
Abstract
Data Acquisition of Weather Parameters and Wireless Monitoring
Mr. Dipak V. Sose, Dr. Ajij D. Sayyad
DOI: 10.17148/IJARCCE.2016.51060
Abstract: Weather forecasting is the application of science and technology to predict the state of the atmosphere for a given location. Human beings have attempted to predict the weather informally for millennium and formally since the nineteenth century. Weather forecasts are made by collecting quantitative data about the current state of the atmosphere on a given place and using scientific understanding of atmospheric processes to project how the atmosphere will evolve on that place. Wireless technology has been tremendously growing day by day. The need of wireless technology is that it replaces the conventional methods including long wires for communication and thereby increasing the redundancy of the whole system. The measurements of temperature, atmospheric pressure and relative humidity remotely by using the appropriate sensors are not only important in environmental or weather monitoring but also crucial for many industrial processes. A device for weather monitoring will be described in this project to monitor and display the, Temperature (0C), Humidity in RH% (0C), Light Intensity, Atmospheric Pressure in KPa, Vibration or Acceleration, Wind Speed, Wind Direction, Rainfall in mm, O2 Contents in air, CO2 contents in air using analogue and digital components. The analogue outputs of the sensors are connected to a microcontroller through an ADC for digital signal conversion and data logging.
Keywords: Microcontroller, Sensors, ADC.
Abstract
Security of Big Data in Cloud Computing a Survey
Santosh Pawar
DOI: 10.17148/IJARCCE.2016.51061
Abstract: Today we are creating huge amount of data, due to high Volume and Velocity of data , created data is stored in Cloud environment for availability and security reasons the number of users in cloud computing are increasing enormously due to its advantage of providing flexible storage requirement. it is an effective option to store big data in the cloud Attribute-Based Encryption (ABE) is a capable technique to ensure the end-to-end security of big data in the cloud. Eventhough, framing of business policy and its updation has always been a challenging issue when ABE is used to construct access control schemes. A trivial implementation is to let data owners retrieve the data and re-encrypt it under the new access policy, and then send it back to the cloud. This method, however, incurs a high communication overhead and heavy computation burden on data owners.
Keywords: Security, Correctness, Competence. Attribute Based Encryption (ABE), Policy Updating, Big Data, Cloud Computing.
Abstract
Improved Next Web Page Recommendation using Multi-Attribute Weight Prediction
Prof. Umesh A. Patil, Mr. Avinash Kunnure, Mr. Vaibhav Herwade, Mr. Vijaykumar Dawarpatil 4, Mr. Satyawan Magar
DOI: 10.17148/IJARCCE.2016.51062
Abstract: Web page prediction is the web usage mining by performing pre-processing of the data from a web site. The needfor predicting the user�s needs in order to improve the usability and user maintenance of a web site is more thanmarked now a day�s lacking proper guidance, a visitor often wanders aimlessly without visiting significant pages,loses attention, and leaves the site earlier than expected. When they access the network, a largeamount of data is generated and is stored in Web log fileswhich can be used efficiently as many times user repeatedlysearched the same type of Web pages recorded in the log files. These series can be considered as a web access pattern, helpful to find the user behaviour. Through thispersonalized information, it�s quite easy to predict the nextset of pages user might visit based on the previouslysearched patterns, thereby reducing the browsing time of auser.
Keywords: Web usages mining, recommendation, web log analysis, session based predication, K-NN algorithm.
Abstract
Simulative Analysis of Event-Related fMRI Design
Ramandeep Kaur, Jyoti Saxena and Sukhjinder Singh
DOI: 10.17148/IJARCCE.2016.51063
Abstract: Event-related fMRI allows estimation of the hemodynamic response associated with transient brain activation evoked by various sensory, motor and cognitive events. Choosing a sequence of events that maximizes efficiency of estimating the Hemodynamic Response Function (HRF) is essential for conducting event-related brain imaging experiments. This paper presents a comparative analysis of two different paradigms of event-related fMRI using MATLAB platform. The distinction between random and periodic stimulus trial is used to distinguish between designs that are specified in terms of the occurrence that an event will occur at a series of time points (random) and those in which events always occur after a fixed interval of time or pre-specified time (periodic). These designs can be parameterized using General Linear Model (GLM) in terms of design matrix that embodies constraints and the model of HRF. This analysis shows that statistical efficiency falls off dramatically as the Inter-Stimulus Interval (ISI) gets sufficiently short, if the ISI is kept fixed for all trials. However, if the ISI is properly randomized from trial to trial, the efficiency improves with decreasing mean ISI. The results demonstrate the feasibility of using randomized experimental design for event-related fMRI thereby facilitating imaging modalities.
Keywords: Event-Related fMRI, General Linear Model, Functional Neuro-imaging, Efficiency, Hemodynamic response function.
Abstract
A Technical Review on Variants of Stable Election Protocol (SEP): SEP-E, TSEP and ETSSEP in Heterogeneous Wireless Sensor Networks (HWSNs)
Shailie Rai, Pallavi Gupta
DOI: 10.17148/IJARCCE.2016.51064
Abstract: Wireless sensor networks (WSNs) are presently equipped to handle more complex functions. The main challenges in wireless sensor network include enhancement of stability, conservation of energy, the lifetime of the node and the throughput of the network and its node. To improve the stability of the network as well as to reduce the energy consumption clustering is used. In a cluster, efficient routing protocol plays a vital role in maintaining the stability and also helps in saving energy. In this paper we have surveyed some variants of Stable Election Protocol (SEP): SEP-E, TSEP and ETSSEP, they all are heterogeneous aware protocols i.e. sensor nodes are equipped with different amount of energy levels. These variants of SEP have three levels of heterogeneity in terms of normal, intermediate and advanced nodes.
Keywords: Wireless sensor networks, clustering, heterogeneous environment, stable election protocol.
Abstract
Predictive Diagnosis and Wireless Technologies for Rural Healthcare
Shruti Shinde
DOI: 10.17148/IJARCCE.2016.51065
Abstract: As the latest technologies like Internet of Things and Machine Learning are coming up, people are finding their applications in solving real life problems, like rural healthcare. The lack of human skill for medical diagnosis in rural areas is overcome by intelligent systems which do the job of analysing and diagnosing patients. Big Data Analysis is the field that provides excellent solutions to these problems. The transmission of data is enabled through the recently coming up wireless technologies like Zigbee and LoRa. This paper discusses these concepts and how they individually relate to solving the problem of rural healthcare. Finally, a solution is proposed which involves an intelligent system that addresses and helps overcome the health related issues faced by people living in rural areas.
Keywords: Zigbee, LoRa, Internet of Things, Big Data Analysis.
Abstract
Color Sensor Robotic ARM
Mrs. Ruchi Varshney, Sneha Arora, Shivani, Sneha Gupta, Saksham Agarwal
DOI: 10.17148/IJARCCE.2016.51066
Abstract: This paper presents an application to sort colored objects with a robotic arm. This robot move according to color detecting concept. The detection of the particular colour is done by a light intensity to frequency converter method. In this project we make robot that detect the bomb. The objective of the project is pick the bomb and place at another location. The controller used 89s52 which belongs to the familiar 8051 family which produces an output with low delay and also its cost is low. It is interfaced with color sensor, motors to control the robotic structure. The components are easily available and of low cost, thus making the proposed system cheap and efficient.
Keywords: Robotic arm, Microcontroller, Light to frequency converter, DC servo motor.
Abstract
Implementation of Content Addressable Memory using MSML Architecture
Pravallika Gutta, Sreenivasulu Mamilla
DOI: 10.17148/IJARCCE.2016.51067
Abstract: Content Addressable Memory is a storage unit built on hardware. It is majorly used in internet routers to access fast look up tables. Available techniques to build CAM are power inefficient as CAM implements parallel comparison unit in its design. This project has implemented the content addressable memory using Master-Slave Match Line architecture. In the Master �Slave configuration, the CAM word is divided into number of segments. Each segment is provided with an additional slave match lines along with one Master Match Line. This configuration reduces the voltage swing across the Match Line (ML). By reducing the voltage swing, the power consumption across the Match Line is reduced. Finally, 128x8 CAM memory is implemented. The CAM array is tested for different possible cases. When the data is given to the CAM array, it is searched simultaneously in the entire memory. The 128X8 CAM array is tested at both lower frequencies and higher frequencies.
Keywords: CAM; MSML design; 4T CAM; Match Delay; HSPICE.
Abstract
Sentiment Analysis using Feature Based Opinion Mining Algorithms
T.M. Saravanan, Dr. A. Tamilarasi, A. Raja
DOI: 10.17148/IJARCCE.2016.51068
Abstract: The Explosion of blogs, forums and social networks presents a new set of challenges and opportunities in the way information is searched and retrieved. This huge quantity of information on web platforms put together feasible for exercise as data sources, in applications based on opinion mining and classification. Interest in Opinion Mining has been growing steadily in the last years, mainly because of its great number of applications and the scientific challenge it poses. An effective sentiment analysis process proposes in this research for mining and classifying the opinions. Even though facts still play a very important role when information is sought on a topic, opinions have become increasingly important as well. Opinions expressed in blogs and social networks are playing an important role influencing everything from the products people buy to the product they support. Thus, there is a need for the retrieval of opinions. This paper presents an algorithm which not only analyzes the overall sentiment of a document/review, but also identifies the semantic orientation of specific components of the review that lead to a particular sentiment. The algorithm effectively optimizes the scores of the nouns to extract the potential features. The implementation is carried out on Customer Review Datasets and Additional Review Datasets and also the experimentation results are analyzed.
Keywords: Sentiment Analysis, Opinions.
Abstract
Internet of Things (IoT) based Sensors to Cloud system using ESP8266 and Arduino Due
Mr. Nerella Ome, Mr. G. Someswara Rao
DOI: 10.17148/IJARCCE.2016.51069
Abstract: The system proposed in this paper is an advanced solution for monitoring the weather conditions at a particular place and make the information visible anywhere in the world. The technology behind this is Internet of Things (IoT), which is an advanced and efficient solution for connecting the things to the internet and to connect the entire world of things in a network. Here things might be whatever like electronic gadgets, sensors and automotive electronic equipment. The system deals with monitoring and controlling the environmental conditions like temperature, relative humidity, light intensity and sound level with sensors and send this information to the cloud and then plot the sensor data as graphical statistics. The data updated from the implemented system can be accessible in the internet from anywhere in the world.
Keywords: Internet of Things (IoT), Sensors to cloud System; Arduino Due, Arduino IDE, ESP8266, Thing speak.
Abstract
Clustered Fair Data Transmission in Energy Efficient UWSNs
Sushma V
DOI: 10.17148/IJARCCE.2016.51070
Abstract: In Underwater Wireless Sensor Networks (UWSNs) energy, throughput are wide are of interest. These sensor networks make it possible in real time monitoring of the underwater environment. Major challenges that ar4e faced in such environment are low battery power, high bit error rates, low bandwidth availability etc. This paper mainly examines these challenges and possible solutions to overcome the problem by using a cluster based fair data transmission. Our work mainly focuses the formation of cluster that is supported by a metric known as Time � Distance � Ratio (TDR) and recharging the Cluster Heads by Autonomous Vehicles (AUVs). Finally, by using this strategy we prove that the energy used by sensor networks is lesser than other algorithms.
Keywords: Underwater Sensor Networks, Clustering, Energy Efficient, Autonomous Vehicles, Time-Distance-Ratio
Abstract
High Performance Vedic Multiplier Design using Compressors
Bhavana Siripurapu, K. Naresh Kumar
DOI: 10.17148/IJARCCE.2016.51071
Abstract: This paper presents the design of high performance Vedic multiplier using compressors. The three major trepidations of designing digital circuits are area, speed and power. With advancing technology, encumbrance is being laid on attaining high speed, low power and less area. Multiplier is designed based on Vedic mathematics which has enhanced the performance of the circuit. In this paper, a new technique is introduced for 4:2 compressor and 5:2 compressor to mend the performance of the multiplier. The conventional circuits include designing with XOR modules which has improved performance over the full adders. In this paper, the compressor is designed using multiplexers which have shown advanced performance over the existing techniques. The design is implemented using Cadence EDA tools and area and timing have been calculated. The proposed technique has obtained 8.4 % reduction in area and 27.7 % improvement in PDP compared to the previous technique.
Keywords: Vedic, Compressor, Multiplexer
Abstract
Cost Adequate Reliable and Anonymous Data Distribution with forth Security
G. Chandrika, N. Praveen Kumar, V. Sangeeta
DOI: 10.17148/IJARCCE.2016.51072
Abstract: The popularity and widespread use of cloud have brought great convenience for data sharing and collection. Not only can individuals acquire useful data more easily, sharing data with others can provide a number of benefits to our society. Due to its openness, data sharing is always deployed in a hostile environment and vulnerable to a number of security threats. Taking energy usage data sharing, there are several security goals a practical system must meet. By providing security of data in a cloud we can convert data into unknown format and stored into cloud. In this paper we are proposed mainly three concepts for performing authentication of data consumers, generation of group key and provide security of sharing data in cloud. By performing authentication of data consumers we can implement the concepts for identity based digital signature. By using this concept we can verify users are authenticated or not. After completion of authentication process the cloud will generate group key and send to all group members. By using that secret key each data consumer will retrieve data from the cloud and get original plain format. Before getting original plain format data each users will perform the decryption process. In this paper we are using blowfish encryption and decryption algorithm for converting data into unknown format and get original data by using decryption process. So that by implementing those concepts we can provide more security of data and also provide efficient user authentication.
Keywords: Cloud Computing, Security, Encryption, Decryption, Authentication.
Abstract
Design, Analysis & Simulation of 30 nm Cylindrical Gate all around MOSFET
Tarun Kumar Sachdeva, Dr. S.K. Aggarwal , Dr. Alok K Kushwaha
DOI: 10.17148/IJARCCE.2016.51073
Abstract: Cylindrical gate all around (GAA) MOSFET is a drastic invention and a potential candidate to replace conventional MOSFET, as it introduces new direction for transistor scaling without hindering the device performance.In this work, electrical characteristics of cylindrical GAA (CGAA) MOSFET at 50nm channel length (Lg), 10nm channel thickness (tsi) are systematically analysed. Various electrical characteristics such as On current (ION), subthreshold leakage current (IOFF), the threshold voltage (Vth), DIBL are calculated and analysed at various device design parameters.All the device performances of Cylindrical GAA MOSFETs are investigated through Atlas device simulator from Silva co.
Keywords: Cylindrical gate all around (GAA) MOSFET, subthreshold leakage current (IOFF),
Abstract
Modified Vedic Multiplier using Koggstone Adders
Y. Rama Lakshmanna, G.V.S. Padma Rao, K. Bala Sindhuri, N. Udaya Kumar
DOI: 10.17148/IJARCCE.2016.51074
Abstract: Multipliers play the key role in the design of high speed arithmetic logic units, Internet of things and digital signal processing applications. Multipliers using Vedic mathematics with different adders improve the performance of the multiplier. Performance parameters like less gate count and high speed are obtained in Vedic multipliers by using different techniques like Carry select adder, Carry save adder and Binary to Excess-1 converter. Vedic multiplier using koggestone adder gives better performance in terms of area, when compared to Vedic multiplier using CSLA. The multiplier is implemented on Spartan 3E FPGA and simulation is performed using verilog HDL.
Keywords: Binary to Excess -1 converter (BEC), Carry save adder (CSA), Carry Select adder (CSLA), Koggstone adders (KSA), Vedic multiplier.
Abstract
Performance Analysis of Radio Access Technology Selection Algorithms in Heterogeneous 4G Networks
Marko Porjazoski, Ivana Todorovska, Pero Latkoski, Borislav Popovski
DOI: 10.17148/IJARCCE.2016.51075
Abstract: In this paper is given a performance analysis of Radio Access Technology selection (RATS) algorithmsfor Long Term Evolution - Advanced (LTE-A) heterogeneous networks. The relevant performances are analysed using atwo dimensional Markov Model. Two RATSalgotithms are applyed:the first oneis simple, based only on the availability of the small cell connection, while the second one is based on two more criteria: user mobility and network load. The performance analysis shows that better results are obtained using the features provided in LTE-A, compared to the ones in previous technologies. The RATS algorithm influences the system performances as well. The results show that using the RATS algorithm based on two more criteria provides better perfotmances than the simpler one.
Keywords: Heterogeneous network, LTE-A, RATS algorithms, Markov Model, Video streaming
Abstract
Energy Efficient Wireless Communication using Channel Coding
Seth Mohit Rakesh, Jitender Chhabra
DOI: 10.17148/IJARCCE.2016.51076
Abstract: Error correcting coding is one of the technique for reducing the signal-to-noise ratio (SNR) required to attain a given bit error-rate. However, this reduction comes at the cost of extra energy consumption required by the baseband processing for encoding and decoding the data. So to study the complete analysis of the trade-off between baseband consumption and coding gain is prime motive of this paper. In this article the energy-consumption of BCH codes with different code rates over AWGN and fading channels is studied. The results show that codes with low code rate are ideal for performing long-range communications, while is better to use less coding redundancy for shorter transmission distance.
Keywords: Baseband processing, coding gain, AWGN, Rayleigh fading channel, BCH.
Abstract
Acoustic Echo Cancellation of Speech signal using Average Recursive Least Square Adaptive Algorithm
Praveen N, Ranjitha S, Dr. H.N. Suresh
DOI: 10.17148/IJARCCE.2016.51077
Abstract: In this high-tech environment, the use of digital communication systems like hands-free systems for delivering speech in the classroom or in an auditorium are becoming more popular. In such situations, the loudspeaker and a high-gain microphone are commonly found. But, the presence of a large acoustic coupling between loudspeaker and the microphone would produce a loud echo and the background noise that reduces the quality of speech and results in inconvenience to the listeners. The solution to these problems is the elimination of the echo using an echo cancellation algorithm. The basic component of an echo canceller is an adaptive filter which creates a replica of the echo and subtracts it from the combination of the actual echo and the near-end signal. In this paper, the speech signal in an auditorium environment has been enhanced by eliminating the echo and noise signal by adopting an adaptive filter algorithm called Average RLS and using Band pass filter in pre-processing step. Finally for evaluating the performance of the algorithm, the parameters such as Mean Square Error (MSE) and ERLE (Error rate loss enhancement) are measured.
Keywords: Echo-Cancellation algorithm, Adaptive filters algorithm, Average RLS, Mean Square Error (MSE) and ERLE (Error rate loss enhancement).
Abstract
Developing Citizen Centric Application for Smart city Services
Ashwini V. Shabadi, Prof. R.V. Argiddi
DOI: 10.17148/IJARCCE.2016.51078
Abstract: In today�s life the population is increasing. People facing the problems regarding the wastage of electricity and finding the availability of parking area.To understanding these problems, we are implementing two modules. The first module is Automatic Street Light On/Off. Street light is the necessary part of a city�s infrastructure; It is flexible-lighting technology Using this technology system can control the power consumptions at the streets and reduce the manpower. LDR, Microcontrollers and Sensors, are used to implement this module. The second module is Smart Parking. The concept of this module is system can detect the available parking space based on image processing technique. This technique will detect the available parking space in parking area without wasting any time in search of the vacant place.
Keywords: Arduino microcontroller, GSM, Sensor, USB cable, SIM shield, Jumper Wires, Bread Board, Camera.
Abstract
To Study Trading Rules Using Biclustering in Financial Market
Rutika A Shah, Prof. R.V. Argiddi
DOI: 10.17148/IJARCCE.2016.51079
Abstract: As capital growth increased, trading system plays important role in world. Technical analysis analyses price, volume, and market information. Price patterns and market trends are analyzed by technical analyst for investing capital in financial market and these patterns are useful to take right decisions for making investments. For taking such a decisions, it needs to analyze the price movement and provide trading rules to guide investors, so that they can take correct trading decisions. For analyzing and trading decisions, the paper proposes to implement Biclustering mining to discover effective trading rules that contain a combination of indicators from historical financial data series. Biclustering is a clustering algorithm because it clusters the data along the row and the column simultaneously in a 2-D data matrix. The trading rules can be divided in three trading actions (buy, sell, and no-action signals). For optimizing the trading rules we proposed particle swarm algorithm. By particle swarm algorithm we get optimized rules which help investors for investing finance in market and also take right actions.
Keywords: Biclustering, Particle Swarm, Trading Rules.
Abstract
Medical Image Processing
O. Rama Devi, V. Sathvik, N. PavanKumar, M. Srinivas Rao
DOI: 10.17148/IJARCCE.2016.51080
Abstract: Medical imaging is the method of forming visual representations of the internal parts of a body for scientific analysis and medical involvement. Medical imaging seeks to expose internal structures hidden by the skin and bones, as well as to identify and treat any disease. It also forms a database of normal composition and physiology to make it possible to identify various abnormalities.
Keywords: Image Processing, Magnetic Resonance Imaging (MRI), Detection.
Abstract
Identifying Unknown and Identical Users in Cross-Application Social Media Networks
Monika Dangore, Gauri Gholap, Ankita Kutal, Pragati Mali, Neha Takawale
DOI: 10.17148/IJARCCE.2016.51081
Abstract: The internet was born in later 1980�s, as the use of internet was increasing tremendously the evolution of social media networks (SMN�s) began. The SMN proves to be the best platform for information retrieval. However, identifying unknown and identical users on multiple social media application is still an unsolved problem. People use different social media for different purpose; the idea of integrating multiple social media application can take the research a step forward. The main idea of this paper is to identify alias and identical accounts by merging multiple SMN in order to get complete information about a particular user. In this paper, we develop a methodology Friend Relationship-Based User Identification (FRUI) algorithm for mapping individuals on cross application SMN�s. The friend cycle of every individual differs therefore, accuracy of our result will be maintained if we use friend list as a key component to analyze cross application social media networks. We also focus on using two more methods to improve efficiency of our algorithm. Our study has shown that FRUI is effective to analyze and de-anonymize social media.
Keywords: Cross-Application, Social Media Network, Anonymous Identical users, Friend Relationship based User Identification.
Abstract
Summative Assessment for Performance Evaluation of a Faculty Using Data Mining Techniques
Renuka Agrawal, Jyoti Singh, A.S. Zadgoankar
DOI: 10.17148/IJARCCE.2016.51082
Abstract: Assessment as a dynamic process produces data, which acts as a performance indicator for an individual. The evaluation of instructors� performance is especially relevant for the academic institutions as it helps to formulate efficient plans to guarantee quality of instructors and learning process. Effort in this work is directed at modeling an intelligent technique for evaluation of instructors� performance, propose an optimal algorithm and designing a system framework suitable for predicting instructors� performance The proposed technique will improve reliability and efficiency of instructors� performance evaluation system, provide basis for performance improvement that will optimize students� academic outcomes and improve standard of education. Consequently, it will contribute to successful achievement of the goals and objectives defined in the vision and mission of the new education reform agenda. We propose a model to evaluate the performance through the use of techniques of data mining like association, classification rules (Decision Tree, Rule Induction, K-NN, Na�ve Bayesian (Kernel)) to determine ways that can help them to better serve the educational process . The data mining methodology used for extracting useful patterns from the institutional database is able to extract certain unidentified trends in teacher�s performance when assessed across several parameters.
Keywords: Educational Institute, Performance Evaluation, Summative Assessment.
Abstract
Fuzzy based Link Utilization Aware Path Ranking Scheme for Multipath Routing
Shalini Aggarwal, Shuchita Upadhyaya
DOI: 10.17148/IJARCCE.2016.51083
Abstract: In this paper, a multipath-ranking scheme has been proposed based on fuzzy logic if multiple paths are known. The algorithm is based on the assumption that link utilization of each link in the identified paths is known. This paper aims to find the link utilization of complete path using fuzzy controller. The fuzzy metric provides a more precise estimate of how good a path is for future traffic. The output of the fuzzy controller is the path link utilization value on the basis of which paths are ranked.
Keywords: Fuzzy controller, Link utilization, Multipath routing, Path ranking.
Abstract
Remote User Authentication in WSN using ABCRNG
D. Thamaraiselvi, Dr. M. Ramakrishnan
DOI: 10.17148/IJARCCE.2016.51084
Abstract: Authenticating a user is very important in un attended environment like wireless sensor network. Wireless sensor networks are used to monitor physical or environmental conditions. Authenticating a user in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication networks, resource limitation, and unattended operation. As a result, various authentication schemes have been proposed to provide secure and efficient communication. In this proposed paper id based remote user authentication is proposed, where the id is generated by using ABCRNG.
Keywords: Authentication, ABCRNG, Wireless sensor networks, public key cryptography, random number.
Abstract
Intrusion Prevention System for Wireless LAN Security: A Study
S V Athawale, M A Pund
DOI: 10.17148/IJARCCE.2016.51085
Abstract: The security of wireless LAN networks is a talented topic which in current years has been the focus of much interest in the research community. Even as many security issues in these wireless networks can be addressed by etiquette design, wireless nodes have intrinsic much physical vulnerability that can be exploited by attackers to origin disruptions in network traffic. The scenery of these exposures is such that there is little that can be done to eliminate them leaving the network. It is vital that the impact of such attacks is well-understood before IPS for wireless ad hoc networks are used in mission-critical application. This paper is a stride in this threat analysis as our effects of attacks that exploit physical susceptibilities. Our contributions in this paper are, we combine risk and vulnerability characterizes them so that we understand various attack and their attack scenarios. We present study of various attacks along with attack scenarios in the context of a wireless LAN security.
Keywords: Vulnerability, LAN, IPS, Exploit, Attacks
Abstract
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization
Shivani, Pooja Rani
DOI: 10.17148/IJARCCE.2016.51086
Abstract: A Mobile ad hoc network is a infrastructure less network in which nodes change their positions dynamically. Some features of MANET like Dynamic topology, Lack of centralized management, Scalability etc. make it more vulnerable to attacks. Black hole is one of the possible attacks that occur in the network as advertising itself having the shortest path to the destination node in the network. Thus it seeks the attention of source node to itself and takes part in communication. When number of malicious nodes work together, it is called cooperative black hole attack. In this paper, we are analyzing the AODV protocol with PSO (Particle Swarm Optimization) technique to find solution for multiple attacker nodes in the network. Particle Swarm Optimization monitors nodes by changing their values because of ad hoc nature, if node converge then it change node�s value to infinite and prevent the node to send packet. The simulation is performed on the basis of different performance parameters like Throughput, End to End Delay and Drop Packet.
Keywords: Cooperative Black hole Attack, AODV Routing Protocol, Throughput, End to End Delay, Drop Packet
Abstract
Trie Based Improved Apriori Algorithm to Generate Association Rules
Chirag Mewada, Rustom Morena
DOI: 10.17148/IJARCCE.2016.51087
Abstract: The world is generating a massive amount of data. Therefore, there is a need for efficient methods to analyze and visualize enormous amount of valuable data being generated every day. Many methods are available for data mining, which extracts knowledge from data. But there is no method available which outperforms rest of them. Therefore, we have developed an algorithm based on a classic apriori algorithm and fp-growth algorithm to extract knowledge from data. We have used trie data structure to improve the performance by reducing the number of database scans. We have tested our algorithm on End of Day (EOD) data from November 2003 to August 2016 of Multi Commodity Exchange (MCX) of India. We found that our algorithm is faster than classic apriori algorithm.
Keywords: Improved Apriori Algorithm, Frequent Itemset Mining, Data Mining, Multi Commodity Exchange (MCX), Commodity Market
Abstract
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud TEES (Traffic and Energy saving Encrypted Search)
Prerna Yadav, Mrunal Badade, Swati Patil
DOI: 10.17148/IJARCCE.2016.51088
Abstract: Cloud storage provides a convenient and more storage at low cost, but data privacy is a major concept that prevents users from storing files on the cloud. One way of improving the data privacy is to encrypt the files before sending them onto the cloud and decrypt the files when they are downloaded. However, data encryption is a difficult task for the mobile devices, and data retrieval process is a complicated communication between the data user and cloud. With limited capacity and a limited battery life of mobile phones, these issues may introduce heavy overhead to computing and more power consumption for mobile device users, which makes the encrypted search over mobile cloud very difficult and as a challenge task for the user. In this paper, we have proposed, TEES, in which with more bandwidth and better energy efficient encrypted search over a mobile cloud. The proposed architecture removes the computation from mobile devices to the cloud, and hence we further can optimize the communications of the mobile clients and the cloud.
Keywords: Mobile Cloud Storage, Searchable Data Encryption, Energy Efficiency, Traffic Efficiency.
Abstract
The Design and Testing of a Web Application by Using Modern Implementations Technologies
Al Rubaie Evan MadhiHamzh
DOI: 10.17148/IJARCCE.2016.51089
Abstract: The paper involves creating a web architecture which will set the basis for the completion of an e-commerce site. This is part of the "design" stage, a stage which is present in almost all methodologies for the development of software systems. The technology proposed for the subsequent implementation of the site is ASP.NET MVC (model view controller). The application is designed for the submittal of offers for different products and services. Each product is described in detail: name or price, the category to which it belongs, its description and a representative image. The products are put in a basket from which they can be deleted or bought. The application allows its management through a manager's panel: adding new products, creating new categories of products, editing and deleting the already existing products. After an order has been placed, the manager is announced through an email containing the necessary data for filling the order.
Keywords: web design, web application, web programming, and software methodologies.
Abstract
An Open CV Framework of Automated Sign language to Text translator for Speech and Hearing Impaired
Anchit Biswas, Shreedeep Gangopadhay
DOI: 10.17148/IJARCCE.2016.51090
Abstract: Generally hearing impaired people use sign language for communication, but they find difficulty in communicating with others who don�t understand sign language. This project aims to lower this barrier in communication. It is based on the need of developing an electronic device that can translate sign language into text in order to make the communication take place between the mute communities and the general public as possible. Computer recognition of sign language is an important research problem for enabling communication with hearing impaired people. This project introduces an efficient and fast algorithm for identification of the number of fingers opened in a gesture representing text of the Binary Sign Language. The system does not require the hand to be perfectly aligned to the camera and any specific back ground for camera. The project uses image processing system to identify, especially English alphabetic sign language used by the deaf people to communicate. The basic objective of this project is to develop a computer based intelligent system that will enable the hearing impaired significantly to communicate with others using their natural hand gestures. The idea consisted of designing and building up an intelligent system using image processing, machine learning and artificial intelligence concepts to take visual inputs of sign language�s hand gestures and generate easily recognizable form of outputs. Hence the objective of this project is to develop an intelligent system which can act as a translator between the sign language and the spoken language dynamically and can make the communication between people with hearing impairment and normal people both effective and efficient. The system is we are implementing for Binary sign language but it can detect any sign language with prior image processing.
Keywords: Image Processing, Sign language, Pattern Reorganization, Colour Detection, Shape Detection, Text Generation, Open CV, C++.
Abstract
Measurement and Assessment of Long Term Electric Field Strength in Different Locations
Begum Korunur Engiz
DOI: 10.17148/IJARCCE.2016.51091
Abstract: As a result of technological developments there has been a substantial growth in the use of mobile communication services and number of base stations over the last few years. Increasing demand for communicating from any place pushes cellular system operators to install more base stations. With the increase in the number of base stations, electric field strengths have also increased. Thus, accurate measurement and assessment of electric field strength (E) levels caused by base stations accordingly are very crucial to take precautions for human health. For this reason, Es were measured for 24 hours at five different locations with PMM 8053 E field meter then assessed. It is seen from the measurement results that the maximum E is 7.88 V/m while the maximum of mean E is 1.83 V/m. Even though the measured E levels are below the limits that are determined by the International Commission on Non-Ionizing Radiation Protection (ICNIRP) and Information and Communication Technologies Authority (ICTA) they exceed the lower limits applied by some countries. It can be also concluded from the measurement results that E levels can change significantly within a day depending on the usage density of the base station.
Keywords: Electromagnetic field measurement, Electric field strength, PMM-8053, Base station, ICNIRP.
Abstract
Data Collection Scheme to Preserve Energy of Sensor Nodes for Wireless Sensor Networks
Soumya Dath G
DOI: 10.17148/IJARCCE.2016.51092
Abstract: Preserving the energy of sensor nodes during data collection is always one of the most crucial problems in wireless sensor networks. In this project, the DCS scheme is proposed to exploit the appearing temporal-spatial correlation in most observable event for energy-efficient data collection of wireless sensor networks. Particularly, for temporal correlation between sensor nodes, to build lightweight Autoregressive model locally to capture data distribution at sensor node; for spatial correlation, by making use of similarity measure between sensor nodes and to perform centralized model clustering, where, this kind of clustering used to emphasizes data similarity between nodes but ignores the distance geographically, to make a group of sensor nodes with similar data distribution on both magnitude and trend into the same cluster. Through scheduling sensor nodes to report readings alternately and performing dual-prediction at both sensor nodes and Sink, Data Collection Scheme obtain sensing readings without compromising too much data accuracy loss. The wireless sensor networks are being deployed at escalating rate for various application fields. Wireless sensor networks (WSN) are mainly useful for obtaining data concerning events limited to a well-defined geographic region, like a disaster site or an agriculture dataset. The critical issue in wireless sensor networks is power saving since sensor nodes are battery-powered. Hence, developing secure and energy-efficient routing algorithm to guard WSNs against these attacks while efficiently utilizing the energy of the deployed nodes has become essential.
Keywords: Time Series Analysis, Energy Efficient technique, Temporal-Spatial, Data Collection, Wireless Sensor Network.
Abstract
Intrusion Detection System with various Classification and Optimization Techniques: A Survey
Babita Kumari, Piyush Singh
DOI: 10.17148/IJARCCE.2016.51093
Abstract: Various kinds of network are becoming very essential nowadays. This value is getting increase due to the more and more need of data and information sharing. Intrusion Detection Systems (IDSs) attempt to identify unauthorized use, misuse, and abuse of computer systems. In response to the growth in the use and development of IDSs, it has become more important aspect. In this paper, we identify a set of general IDS optimization techniques. This article presents the details of the methodology, including strategies for Intrusion. This article also provides background information on intrusions and IDSs to motivate our work. This article mainly deals with the various optimization and classification methods.
Keywords: Classifiers, Optimization techniques, Intrusion Detection.
Abstract
Precised Detection of CMBS using HCSD
R. Ieshwarya, R. Sudha, S. Sridharani, M. Sureka
DOI: 10.17148/IJARCCE.2016.51094
Abstract: Cerebral Microbleeds (CMBs) are small chronic brain hemorrhages which are caused by structural abnormalities of the small vessels of the brain. CMBs are increasingly found in various patient populations and disease settings, including first-ever and recurrent ischaemic or haemorrhagic stroke, Alzheimer's disease, vascular cognitive impairment and healthy elderly individuals. Previous clinical routine, CMBs are manually detected by radiologists and it may produce the errors and time-consuming. In this paper, we proposed a two-stage cascaded framework to detect CMBs from magnetic resonance (MR) images using 3D convolutional neural network (CNN). We first endeavour a 3D fully convolutional Network (FCN) technique to recover the candidates with high probabilities of being CMBs, and afterward apply a well-trained 3D CNN discrimination model to recognize CMBs from hard mimics. Within our framework, the Hierarchical Centroid Shape Descriptor (HCSD) is allows to select only those having a specific structure. We illustrate that proposed framework can be utilized to prepare efficient and accurate classifiers that could introduce further Computer-aided diagnosis.
Keywords: Cerebral microbleeds, convolutional neural networks, Hierarchical Centroid Shape Descriptor, MRI.
Abstract
Analysis of Provable Data Possession on Clustered Data
D Prasanth, N Sandeep Chaitanya, T Chaitanya Sai Kumar
DOI: 10.17148/IJARCCE.2016.51095
Abstract: Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients� data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we also propose a fuzzy clustering system for analyzing the high dimensional Data bases in cloud Environments. This paper proposes novel effective fuzzy soft clustering systems with the combination of possibilistic c-means.
Keywords: Storage Security, Provable Data Possession, fuzzy clustering systems
Abstract
Comm Trust by Mining Tweets, Feedbacks & Comments
Mrs. Vijaya Sayaji Chavan, Dr. M.Z. Shaikh
DOI: 10.17148/IJARCCE.2016.51096
Abstract: Most of the e-commerce applications uses trust reputation trust models, and sellers� reputation trust scores are computed with the help of the users feedbacks and comments. The �all good reputation� problem is arises in todays systems as the reputation scores are high for sellers so it becomes difficult for buyers to trust the sellers. In this paper, depend on opinions of the buyers openly given in free feedback comments, We propose Comm Trust for trust evaluation by mining tweets, feedbacks, comments. Our main proposition is: (1) We propose a multidimensional trust for computing reputation scores from user feedback comments or tweets. (2) We propose an algorithm for mining feedback comments and opinion mining and by using topic modelling. Most experiments on twitter, eBay and Amazon data demonstrate that Comm Trust can effective for the �all good reputation� issue and rate sellers effectively. This paper gives a brief introduction to this lime lighted topic and explains few of its application, in our information world and also touch topic likes trust score, reputation trust. This paper will also include the algorithms based on topic modelling.
Keywords: E-Commerce, topic modelling, Feedback Mining, Trust Score, Comments, tweets.
Abstract
Effect of Interference on Capacity of CDMA Technology
Chandan Kumar Verma, S.K. Sriwas, J.P. Saini, M. Shukla
DOI: 10.17148/IJARCCE.2016.51097
Abstract: Past some decade, mobile communication system has developed from 1G, 2G and 3G and now it has to enter into 4G.CDMA is most eminent multiple access scheme used in 3G.The number of us count in CDMA network exponentially rises and it limits the Capacity of CDMA network. In this article, the performance of CDMA network in wireless environment has been analyzed, using the parameters including the number of users, spreading gain, thermal noise,Multiple Access Interference and BER of CDMA with user count.
Keywords: CDMA,Spreading gain, BER, Multiple User Interference.
Abstract
A Survey on Load Balancing Techniques Based on Virtualization in Cloud
Anupama Tiwari, Pankaj Richhariya, Dr. Satyaranjan Patra
DOI: 10.17148/IJARCCE.2016.51098
Abstract: Cloud computing refers to online available collection of resources like processing elements and storage. In cloud a single server is shared among various users. Virtualization is the concept which provides this service. In this paper a survey on load balancing techniques is performed for cloud.
Keywords: Load Balancing Techniques, Virtualization, PaaS, SaaS, IaaS.
Abstract
Surveillance and Sequestration Issues of Internet of Things (SSIoT)
Ayesha Taranum, Dr. Reshma Banu
DOI: 10.17148/IJARCCE.2016.51099
Abstract: A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing- to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Inter- net protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight technical limitations of standard IP security protocols. Focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Keywords: Denial of Service, RFID, WSN, Internet of Things, DDoS Attack, Surveillance, sequestration.
Abstract
Using Product Reviews from Twitter for Mining Insights to Predict Sales
Salama Shaikh, Prof. L.M.R.J. Lobo
DOI: 10.17148/IJARCCE.2016.510100
Abstract: Tweeter, Facebook, Youtube are common terms now that everyone knows and most people are using them. People have social networking accounts. Social networking activities are a part of social life now days. Human beings interact with each other through social media. Most of the companies who provide services or product have their social accounts on social media to endorse their products or services. They often post online about new product or services. People write reviews about product experiences. These reviews are large in number. We can utilize this data to help a vendor to make intelligent business decisions. This paper presents a system used to mine the predictions of a product. Tweeter data was made use of. A tweeter user posts tweets about a product or service. These tweets were used as database and processed using DynamicLMClassifier algorithm. Based upon the classification, tweets are stored into categories. Categories were negative, positive and neutral. This classification was very helpful to take business decisions.
Keywords: Data mining, Business Intelligence, DynamicLMClassifier, Review Mining.
Abstract
Innovative Foot Pressure Mapping Technology On-The-Go Using Android Application
Vishesh S, Manu Srinath, Gaurav Raj Chattarki, Anuradha Vidyadhar Shastry, Abhishek Chanda, Mohan M
DOI: 10.17148/IJARCCE.2016.510101
Abstract: An average person takes thousands of steps each day, resulting in the placement extreme high pressure on one�s feet. This leads to various bio-mechanical problems with grievous effects. So, there is a need for monitoring foot pressure and treating these conditions effectively. But each person�s feet and walking pattern are different and unique. In this paper, we present a versatile and any-size-fit in-shoe sensor which is capable of capturing data as you walk in real-time; vivid and easy to understand graphics obtained, will let the subject and the doctor see what happens while walking. The graphics are displayed on the Smartphones using an Android application developed by us. It is wireless, portable and user friendly technology and also records the data or history for gait analysis by a podiatrician. The user friendly application will display the foot strikes dynamically as a movie, frame by frame. A podiatrician or the subject can use side by side comparisons of graphics before and after treatment to evaluate effectiveness or suggest correction.
Keywords: bio-mechanical problems, any-size-fit in-shoe sensor, Smartphones, podiatrician, wireless, portable, user friendly device, gait analysis.
Abstract
A Survey Paper of Cluster based Key Management Techniques for Secured Data Transmission in Manet
K.E Hemapriya, K. Gomathy
DOI: 10.17148/IJARCCE.2016.510102
Abstract: In Mobile Ad Hoc Networks (MANETS), Clustering based routing protocol can sufficiently enhance Performance, Scalability and Energy Efficiency. In this research Improved weight based clustering techniques integrated along with a routing protocol is proposed. Our approach is inspired from bird flocking behavior where birds travel long distances in flocks and conserve energy by constantly changing the leader of the flock. We have mainly concentrated on clustering algorithm and designed our clustering algorithm based on moment-to moment decisions of individual nodes during communication. In this protocol, the network is divided into chunks of nodes known as clusters. The clusters are actively maintained and reassembled using specific algorithms and techniques. Due to nature of inconstant wireless medium data transfer is a major problem in ad hoc it lacks security and reliability of data. Cryptographic techniques are often used for secure data transmission wireless networks. Most cryptographic technique can be symmetric and asymmetric, depending on the way they use keys. However, all cryptographic techniques is good for nothing if key management is weak. There is various type of key management schemes that have been proposed for ad hoc. Peer-to-peer computing is a popular paradigm for different applications that allow direct message passing among peers. The existing P2P search algorithms in MANET (Mobile Ad-hoc Network) are flooding-based search that produces much traffic and network overhead. File searching efficiency of peer-to-peer (P2P) network mainly depends on the reduction of message overhead. The research work deals with a full form of cluster based P2P file searching approach for MANETs, which focuses mainly over reduction of control messages. For searching, our mechanism uses cluster head within the cluster but it also allows inter-cluster communication. Moreover, secondary cluster head concept of our proposal ensures lower message overhead during cluster formation stage. Our clustering scheme utilizes request suppression to reduce the number of responses for searching process. Consideration of alternative paths to a node facilitates to overcome link failure. The improved weight based routing scheme is a position based routing approach which incorporates dynamic selection of the gateway nodes to reduce the number of control packets flooded in the network. The improved weight based clustering key management techniques increase the packet delivery ratio, reduce overhead and also reduces energy consumption in the network. The simulation study of proposed improved weight based clustering algorithm achieved better performance than the existing key management schemes. In this research overhead is reduced by 17%, energy consumption is reduced by 5% and packet delivery ratio is dramatically increased by 10%. Overall study of this research work achieves better performance compared with existing methods. This research work compares the eff
Abstract
Efficient and Smart Attendance System using Local Wireless Network
Mr. Abhijeet R. Jadhav, Mr. Akshay C. Awte , Mr. Chetan D. Oswal, Mr. Vikrant B. Ghadge
DOI: 10.17148/IJARCCE.2016.510103
Abstract: Marking attendance in any organization used to be troublesome due to use of pen and paper scheme. In past few years, organizations have switched to a new technology termed as �Biometrics� for attendance. Though biometrics has made possible to save and process attendance records digitally along with a significant advantage of avoiding proxy signatures, it allows only a single person to punch attendance at a time. As the office opens, due to rush of employees and limited number of biometric devices, a lot of time can get consumed.In this project, we emphasize on eliminating the problem mentioned above. We are using smartphone devices of individuals so that many employees can mark their attendance simultaneously. We make use of wireless network for connecting server and employees' smartphones. This system has many benefits such as time efficiency, simplicity and secure authentication. The additional feature of this system is that the availability of the employee can be tracked throughout the working hours, as we are using local area network.
Keywords: Wi-Fi, Android application, Attendance marking and tracking
Abstract
Data Mining Model for Domain Selection
Miss. Amruta R. Jadhav, Miss. Rohini V. Pillai
DOI: 10.17148/IJARCCE.2016.510104
Abstract: Now a days in engineering colleges, domain selection process for project is not been focused seriously the manual procedure of selecting domain consumes unnecessarily too much time. (We can say around 2-3 months). Students in final year need to find the domain details on their own or another option is to ask the queries to respective teachers. It is really irritating as well as time consuming to tell every individual group to explain same domain. Here our system starts working. In our system there will be one module called student in that the sub module called domain will help students to know the details about the types of domain and the description of each and every domain in depth from the list. Moreover we are going to provide an aptitude test on domains, so that student�s interest in particular domain can be calculated. In this module students need to add there percentage marks (transcripts). This data will be displayed to teachers in there login panel. They will be having the result of domain aptitude of every individual student as well as the list of students having domains in common. All these results will help teachers to do the grouping of students in particular domain. The teachers even can combine two domains which can co relate to each other so in result the students as well (e.g. Data mining, database, networking security). Coming back to current system TPO�s in the colleges work is to get the campus details and they forward the same mail to all the students even though they are not eligible for a particular campus drive. Along with this TPO�s are having hard copies of students� data individually. It is time consuming to sort out the eligible and non-eligible personalities. Our system will work smartly in this area as well. We will be providing dynamic categorization in which TPO�s will be having the details of Students like academic marks and extra curriculum (technical, on-technical).TPO will work as a strong bridge between industries and students. As the data is available on web portal, TPO will forward the campus drive information only to the eligible students. Another module is there in which students can share study related material (PPT�s, PDF�s, audios, videos) with other students as well as with teachers.
Keywords: DataMining, Co-operative Learning, Domain Selection, C4.5
Abstract
Early Stage Identification of Brain Tumour using HV Scan Axial Partition Method
Priyanka Pareek, Komal Paliwal
DOI: 10.17148/IJARCCE.2016.510105
Abstract: A manual identification is labour intensive and tedious due to the large amount of medical data to be processed and the presence of small lesions. Automated tumour segmentation from magnetic resonance imagery (MRI) plays a significant role in cancer research and clinical practice. However, tumour segmentation is an extremely challenging task: clinicians believe that a gamut of prior domain knowledge and clinical data should be used, along with the MR image. In this paper a novel approach for segmenting the structure of malignant brain tumour is proposed. The method is general enough to segment different types of abnormalities.
Keywords: Brain Tumour, Region growing, MRI, Segmentation, Texture analysis, Edge detection etc.
Abstract
Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
Syama .N, Mr. G. Pandiyan
DOI: 10.17148/IJARCCE.2016.510106
Abstract: Opinion mining has gained increasing attention and shown great practical value in recent years. Extracting opinion words and targets is a main task in opinion mining. For the purpose of customer and business perspective, the task of scanning these reviews manually is computational burden. Hence, to process reviews automatically and summarizing them in suitable form is more efficient. The distinguished problem of producing opinion summary addresses is how to determine the mood, and opinion expressed in the review with respect to a numerical feature value. This paper proposes a novel approach with a hybrid algorithm which combines Expectation Maximation (EM) algorithm. It focused on the main task of opinion mining called as opinion summarization. The extraction of product feature, technical feature value and opinion are critical for opinion summarization as they affect the performance significantly. The proposed approach consists of a software system in which mining of product feature, technical feature value and opinion is performed. The main motto of this software system is to recognize the technical feature value depending on review, which the reviews are summarized. This software is helpful for humans to understand the technical values expressed in the reviews. It represents relations between opinion words and targets, which is employed to measure the confidence of each candidate from opinion words and targets datasets. The words or targets with high confidence are kept in their respective datasets and the rest are removed as false results which are used to refine extraction rules. K-nearest neighbor classifier - used for classify the extracted data�s in an opinion mining. Experimental results Shows the effectiveness of proposed method and finally, candidates with higher confidence are extracted as opinion targets or opinion words.
Keywords: Opinion Mining, Opinion Targets Extraction, Opinion Words Extraction, KNN.
Abstract
D2c2 – Dynamic and Desertion Based Credible Communication in Mobile Ad-Hoc Networks
P. Saranya, Dr. S. Yamini
DOI: 10.17148/IJARCCE.2016.510107
Abstract: Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node behavior. Thus, the overall network performance could be seriously affected. Many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. In our proposed frame work, use hybrid techniques are clustering scheme and RKP for improve network life time and security In this paper, we propose and evaluate an energy efficient clustering scheme for periodical data gathering applications in WSNs. In the cluster head election phase, a constant number of candidate nodes are elected and compete for cluster heads according to the node residual energy. The competition process is localized and without iteration, thus it has much lower message overhead. The method also produces a near uniform distribution of cluster heads. And this cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node behavior. Many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. In our proposed using RKP (Random Key Pre-distribution) .RKP schemes have several variants. Their system works by distributing a key ring to each participating node in the sensor network before deployment. We propose a key management scheme that relies on probabilistic key sharing among nodes within the sensor network. Therefore, the nodes build up the network using their secret keys after deployment, that is, when they reach their target position.
Keywords: Mobile ad hoc networks, Clustering, Public-key cryptosystems, Key Pre-distribution, Mobile nodes, Secure Authentication.
Abstract
Performance Analysis of Arrhythmia Detection using Multiclass Classifier
Yedukondalu Kamatham, Nasreen Sultana
DOI: 10.17148/IJARCCE.2016.510108
Abstract: In this paper, the most authentic and efficacious method for cardiac arrhythmia classification using Multiclass Support Vector Machine (MSVM) is presented. The authors have considered classification of 6 beat types such as normal sinus rhythm (N), Premature Ventricular Contraction (PVC), Right Bundle Branch Block (RBBB), Left Bundle Branch Block (LBBB), Tachycardia (TA) and Bradycardia (BR) by implementing MSVM classifier. Radial Basis Function (RBF) kernel with 5 fold cross validation and zero offset value is used for adjusting kernel values. A total of 24 ECG records are used to collect different types of beats. To feed the classifier the features adopted where QRS complex, RR interval, R amplitude, S amplitude and T amplitude. The MSVM classifier performance is measured in terms of accuracy, sensitivity and specificity. The classifier demonstrates its effectiveness and is found to be highly accurate in ECG classification.
Keywords: Accuracy, cardiac irregularity, classifier, ECG, MSVM, sensitivity and specificity
Abstract
Detecting and Identifying Web Application Vulnerabilities with Static and Dynamic Code Analysis using Knowledge Mining
Vineetha K R, N. Santhana Krishna
DOI: 10.17148/IJARCCE.2016.510109
Abstract: Software developers area unit typically tasked to figure with foreign code that they are doing not perceive. A developer may not recognize what the code is meant to try and do, however it works, however it's purported to work, a way to fix it to create it work, however documentation could be poor, outdated, or non-existent. Moreover, knowledgeable co-workers aren't invariably like a shot offered to assist. we have a tendency to believe that if the developer is given with �similar� code � code that's legendary to execute within the same method or reckon constant perform, the developer may 1) realize the similar code additional readable; 2) determine acquainted code to transfer her existing information to the code at hand; 3) gain insights from a distinct structure that implements constant behaviour. Various researchers have investigated code that exhibits static � matter, syntactical or structural � similarity. That is, code that appears alike. Visual variations may vary from whitespace, layout and comments to identifiers, literals and kinds to modified, additional and removed statements (sometimesreferred to as kind one to kind three �code clones�, resp). Kind four could be a catch-all for all semantically similar clones, but it lacks scientific formulations to classify them. Static detection techniques plan to match the ASCII text file text or some static mental representation corresponding to tokens, abstract syntax trees, program dependence graphs, or a mix of multiple program representations found static similarity at the assembly code level. However static techniques cannot invariably notice code that behaves alike, i.e., that exhibits similar dynamic (runtime) behavior, however doesn't look alike. Once the developer doesn't perceive the code she must work with, showing her additional code that appears regarding constant might not be useful. Butexplaining that bound alternative code that appears quite completely different really behaves terribly equally might offer clues to what her own code will and the way it works. so tools that notice and manage statically similar code might miss opportunities to assist developers perceive execution behavior.
Keywords: Code Vulnerability, Code Similarity, Static and Dynamic Webpage, Code Clone, Developer Behaviour, Runtime, Identifiers.
Abstract
A Review of QoS Routing Protocols under Implementation of MANET
Neeru Jhanji, Prof. Tilotma Sharma
DOI: 10.17148/IJARCCE.2016.510110
Abstract: In mobile unexpected networks (MANETs), the availability of quality of service (QoS) guarantees is way more difficult than in wire line networks, primarily as a result of node quality, multi hop communications, rivalry for channel access, and an absence of central coordination. The difficulties within the provision of such guarantees have restricted the utility of MANETs. Within the last decade, abundant analysis attention has centred on providing QoS assurances in Eduard Manet protocols. During this paper we've analysed differing types of routing protocols and QoS metrics in MANETS. In current year diversity of QoS routing protocol with distinctive possibility square measure contemporary planned however, organized performance analysis associate degree comparative associate degree analysis of the protocol in an passing general realistic atmosphere square measure performed exclusively in an the passing restricted methodology This paper a through outline of QoS routing atmosphere, resources and issue touching presentation of QoS routing protocol. The relation strength, limitation of the QoS routing protocol square measure studied and compared. QoS routing protocol unit of measurement classified in line with the QOs Metrix Used ,styles of QoS Routing overhead and there interaction with Macintosh Protocol.
Keywords: MANET, Quality of Service (QoS), Macintosh Protocol, Eduard Manet Protocols.
Abstract
A Survey: Compiler and Simulators used for optimization of code for Multiprocessors
H T Prakash, Dr. M Srinivas, Chetan R
DOI: 10.17148/IJARCCE.2016.510111
Abstract: Optimization is a program transformation technique, which tries to improve the code by making it consume fewer resources (i.e. CPU, Memory) and deliver high speed. Another important topic is high performance computing, which is used for parallel programming to make the execution of the programs faster and increase the performance of the system. This paper describes the various compilers and simulation tools that can be used for optimization of code in multiprocessor systems.
Keywords: Optimization, high performance computing, parallel programming.
Abstract
A Study on Cryptography and its Algorithms
H.M. Kantharaju, Dr. M Srinivas
DOI: 10.17148/IJARCCE.2016.510112
Abstract: The traditional model of cryptography examines the security of the cipher as a mathematical function. However, ciphers that are secure when specified as mathematical functions are not necessarily secure in real-world implementations. The physical implementations of ciphers can be extremely difficult to control and often leak so called side-channel information. Side-channel cryptanalysis attacks have shown to be especially effective as a practical means for attacking implementations of cryptographic algorithms on simple hardware platforms, such as smart-cards.
Keywords: Cryptography, Implementation, Security.
Abstract
Privacy Preserving Association Rule Mining in Partitioned Databases
Pankaj P. Joshi, Prof. R.M. Goudar
DOI: 10.17148/IJARCCE.2016.510114
Abstract: Fast improvement in the field of information technology rises the serious issue about huge information storage. To establish the correlation among set of data items, also becomes difficult challenge. To overcome these problems in huge data, association rule mining plays a very important role. In recent years, most of the researcher�s point of interest is to enhance the effectiveness of association rule mining based algorithm and thereby increasing the speed of mining. In existing system, association rules are applied on horizontal partitioned database and such technique is depending on IDMA, EMADS communication. In this paper, we consider both horizontal as well as vertical partitioned database, while applying association rule mining. The proposed system also minimizes the communications overhead. Further to enhance the security of system, RC4 algorithm is used to secure the horizontal and vertical partitions of database. Finally, system utilizes the protocol for recognizing the fake and duplicate frequent rules.
Keywords: Association Rule Mining, RC4, horizontal partitioned, vertical partitioned.
Abstract
A Study on Median Filter with Big Data
T Phanindra Reddy, Vidya Sagar Appaji Setti
DOI: 10.17148/IJARCCE.2016.510115
Abstract: At present global scenario, Image processing plays a vital role in the orientation of research area. There are different image operations performed in different applications, one among is the �image enhancement�. As Image enhancement is the problem-oriented procedure, the main aim is to improve the visual appearance of the images, i.e given an input low-quality image that process to get the output with a high-quality image. It is well known that image enhancement techniques are applied on different areas like Aerial imaging Satellite imaging, Medical imaging, Digital camera application, Remote sensing etc.., several methodologies are there to implement image enhancement, and they are: 1.Spatial domain 2.frequency domain. Earlier several research works have been done and proposed in different platforms but the limitation is that they processed one image at once, but in the paper, images are operated at a single time for that the paper introduced a platform named HADOOP [1].
Keywords: Hadoop, Image processing, Image enhancement, spatial domain, frequency domain.
Abstract
Design and Analysis of WDM OFDM System Using Optisystem
Ravindra Kumar, Dr. D.K. Srivastva, Sami Haider
DOI: 10.17148/IJARCCE.2016.510116
Abstract: Orthogonal frequency division multiplexing (OFDM) is a modulation technique which is now used in most new and developing broadband wired and wireless communication systems. We propose WDM OFDM design to reach a data rate of 40 Gbps over 240 km optical fiber. 40 Gbps signal is generated by multiplexing four OFDM with 10 Gbps data rate for each OFDM. We present the performance of single OFDM system by measuring the BER and the constellation diagram. We will also check the performance of the CO-OFDM WDM system for 240 km by measuring the BER and constellation diagram.
Keywords: OFDM, WDM, BER, QAM, Optical Communication.
Abstract
Smart City Garbage Management using Android Application
S.A. Chiwhane, Pratik Pawar, Akshay Gunjal, Pratik Girme
DOI: 10.17148/IJARCCE.2016.510117
Abstract: Nowadays wastage pollution will increase at associate degree dread rate everywhere the globe. It�s the foremost reason behind pollution. The center of a town depends on its purification of Air, cleanliness of the roads and highways and overall it's close atmosphere. Folks living within the town have to be compelled to suffer from numerous causes if the condition discontinuous. Totally different varieties of Diseases opened up. It becomes more durable to steer a healthy life for folks. However, folks will fight with this downside by raising their hand to make up a healthy town. Therefore new a system is group action by national and authority during a Common platform. They�ll work along to create the town Healthier. The system is associate degree humanoid primarily based application wherever the User himself will contribute to wash his town, inform volunteer to return forward or will inform town Corporation. The amenities of this application ar- it ameliorates the user to find close Dustbins location with path, helps to check accessible volunteer on the map and Assists them to submit a report back to authorities if a tangle arise.
Keywords: Social persuasion, intention sharing, collaborative filtering.
Abstract
Efficient IOT Bus Transaction
Rishikesh S. Kulkarni, Azruddin K. Nadaf, Sumit Bagul
DOI: 10.17148/IJARCCE.2016.510118
Abstract: People who uses public transportation vehicles wishes to know the information regarding the general public transportation vehicles and they wish to grasp the travel time of the vehicles while travelling between two places and waiting at the bus stops. The planned system is victimisation GPS which is able to take the location of the user from Google map. Information of the vehicle will be transferred to the central server through a GPS module that functions integrated to android system and net services. We are proposing a system that can provide instant help in a better and faster way. Android phone on the bus stops offer communication with the central server through net services and therefore the bus stops, public transportation vehicles and central server fashioned data network of the transportation.
Keywords: Public Transportation Information System, GPS, Real-time System, Mobile Computing, Client/server, Mobile communication systems, User tracing.
Abstract
Avoiding Duplication of Encrypted Data Using Cloud
Ashweta Magar, Trupti Jagtap, Pradnya Gaikwad, Rashmi Singh
DOI: 10.17148/IJARCCE.2016.510119
Abstract: Deduplication may be a storage saving technique that has been adopted by several cloud storage suppliers like Dropbox. In cloud storage services, deduplication technology are commonly accustomed cut back the world and {knowledge and data} live necessities of services by eliminating redundant knowledge and storing entirely one copy of them. Deduplication is best once multiple users supply an identical data to the cloud storage, but it raises issues concerning security and possession. Issues over information security still forestall several users from migrating information to remote storage. The standard resolution is to write in code the info before it leaves the owner�s premises. Client-side information deduplication specifically ensures that multiple transfers of constant contentsolely consume network information measure and space for storing of one upload. We�ll use server facet information deduplication. During this paper we have a tendency to planned novel server-side deduplication theme for encrypted information.
Keywords: Access control, big data, cloud computing, data deduplication, proxy re-encryption.
Abstract
Video Surveillance System for Handling Suspicious Object
Mrunalinee Patole, Abhishek Charwad, Akshay Mengade, Naresh Choudhary, Vrushali Chondhe
DOI: 10.17148/IJARCCE.2016.510120
Abstract: Nowadays, security of society is major issues for concern. Public place should remain secured in order to maintain peace in society. Image capturing capability has contributed to the popularity of image data. CCTV is one of the important part in image capturing devices. We are using image processing technique through CCTV to implement this application. If person is found with some suspicious activity, this activity is captured by CCTV, hence alert is generated. If some suspicious thing is remain untouched for particular time period which decided by system, then it will generate notification and alert to authority. Hence, we proposed video retrieval systems using images or videos as the inputs. In this paper, we propose method to retrieve video retrieval of a desired object through the inputs as appearance. We firmly believe that such a framework could serve as the foundation for behaviour analysis used in many surveillance systems so that accidents can be avoided.
Keywords: Abandoned luggage detection, abandoned object detection, object detection and tracking.
Abstract
A Prototype for Updation of Stateless Keys using AES modes of Operation
H M Kantaraju, Dr. M Srinivas, Chetan R
DOI: 10.17148/IJARCCE.2016.510121
Abstract: Side-channel investigation misuses the data spilled through inadvertent yields (e.g., power utilization) to uncover the mystery key of cryptographic modules. The genuine danger of SCI lies in the capacity to mount assaults over little parts of the key and to total data over various encryptions. The danger of SCI can be foiled by changing the mystery key at each run. For sure, numerous commitments in the space of spillage versatile cryptography attempted to accomplish this objective. Be that as it may, the proposed arrangements were computationally concentrated and were not intended to take care of the issue of the current cryptographic plans. In this paper, we propose a bland structure of lightweight key upgrading that can ensure the current cryptographic norms and assess the base necessities for heuristic SCI-security. At that point, we propose a complete answer for ensure the usage of any standard method of Advanced Encryption Standard. Our answer keeps up the same level of SCI-security (and here and there better) as the cutting edge, at an immaterial zone overhead while multiplying the throughput of the best past work. We have proposed a prototype implemented in java.
Keywords: Side Channel Attack, cryptography.
Abstract
Text Recognition Applications
Al Rubaie Evan Madhi Hamzh
DOI: 10.17148/IJARCCE.2016.510122
Abstract: Recognition of written texts is one of the many subfields of pattern recognition. Recognition methods are based on driving a large number of symbols. These symbol images are grouped into databases that have mostly very high prices. In order to detect a symbol, we need to detect the direction of the cell where it is located. Although it seems simple, finally we get to solve a problem of pattern recognition to obtain driving data required for similar problem, the recognition of characters. Fortunately, the new problem is simpler and it can be approached using deterministic methods.
Keywords: Pattern recognition, text recognition, image detection.
Abstract
Re-Ranking of Images Based on Attribute-Assisted with Query-Specific Semantic Signatures
Ms. Pooja Vasant Lad, Prof. Priti Subramanium
DOI: 10.17148/IJARCCE.2016.510123
No abstract available.
