VOLUME 4, ISSUE 9, SEPTEMBER 2015
Wide-Range Waveform Measurement System with Load-Pull Capability for the Characterization of RF Devices
Walid S. El-Deeb
A Conceptual Model for Ontology-based Mental Model
Somayeh Mohammadi, Hayedeh Saberi, Touraj Banirostam
Dual Key Indexing Method for Least Significant Bit Modification based Audio Steganography
Vipul Sharma, Lalita Sharma, Ravinder Thakur
Analysis and Comparison of WiMax Communication using Cryptographic Techniques
Mrs. Shallu Makker, Mrs. Vidhu Kiran
Performance Analysis of Optical Communication System using Different Channels
Heena Goyal, Jyoti Saxena, Sanjeev Dewra
Comparison of Round Robin Based CPU Scheduling Algorithms
Charu Rani, Mrs. Manju Bala
Design of Suction Pump Manhole
Arvind Vishnubhatla, Bhanu Priya Bapu
Sine-Cosine Computation Using CORDIC Algorithm
Ranjita Naik, Riyazahammad Nadaf
Performance of Turbo Codes using SOVA
Yashkumar Shilankar, Dr. S. L. Badjate, Pratik Hazare
Improved Security, Energy Efficient Load Balancing for the Stable and Reliable Cloud
Mr. B. Subramani, Ms. B. Rajalakshmi
Identify and Rectify the Issues in Mobile Applications in Various Platforms
Dr. R. Selvam, Dr. R. Prabakaran
Image documentation for the Enhancement of text and noisy images
Ankita Malhotra, Er. Deepak Kumar
A Study of a Non-linear Reaction Diffusion Equation Representing Initial and Boundary Value Problems by LDTM
Kiranta Kumari, Praveen Kumar Gupta, Gauree Shanker
Risk Analysis of Android Apps and Fake ID Flaw Solution Model
Shristi Pandey, Ravi Kant, Dr.Vijendra Singh
Efficient Security for Energy Efficient Load Balancing and Application Enhancement for the Stable and Reliable Cloud
Mr. Nikhil k k, Mr.I.Gobi
A Literature Review on Assurance Driven Software Design
Dipak Gade, Dr. Santosh Deshpande
Procedure of Opinion Mining and Sentiment Analysis Techniques: A Survey
Ms. Jayanti Goyal, Ms. Anjali Dadhich
Survey on Low Rate Denial of Service Attacks
Veeradanya. K.S, Dr.Thilagavathi. D
A Survey on Optimal Link State Hop by Hop Routing
Lakshmana Kumar.S, D. Ramya Dorai
A Survey on Similarity Search for Large Scale Database
T. Sowmi, E. Saravana Kumar
Performance Optimization of DPCM System
Sanjeev Singh Bisht, Govind Singh Jethi, Sandeep Kumar Sunori
Design Approach of High Performance 32-bit Multiplier Based on Vedic Mathematics using Pipelining
Arpita S Likhitkar, M.N.Thakare, S.R.Vaidya
Robust and Secure Image Watermarking using DWT-SVD and Chaotic Map
Sanpreet Singh, Savina Bansal, Sukhjinder Singh
A Survey on Concise and Lossless Representation of Frequent Pattern Sets
R.Prabamanieswari, D.S.Mahendran, T.C. Raja Kumar
Energy Efficient AODV Routing Protocol for Mobile Ad-hoc Networks
Jaspreet Singh, Kartik Sharma
ATP RTC Bus Services Information System for Windows Smartphones
P. Gajendra, C. Nagesh
A Small Analysis on Learning to Rank for Information Retrieval
G Saranya, G Swetha
Design and Testing of Wide Band Flat Scalar Ring Horn Antenna System for Ground Station Receiver Applications
P. Nanda Kumar, M. Durga Rao, D. Gowri Sankar Reddy
Eclat-Genetic Approach for Finding Association Rule
Mr. Omkar B. Bhalerao, Prof. L. M. R. J. Lobo
Tamil Sign Language Recognition using Active Shape Modeling
S. Sudha, S. Jothilakshmi, R. Soundaramani
Design of a Double-objective QoS Routing in Dynamic Wireless Networks using Evolutionary Adaptive Genetic Algorithm
Ibraheem K. Ibraheem, Alyaa A. Alhussainy
Analysis of clustering technique for the diabetes dataset using the training set parameter
R.Nithya, P.Manikandan, Dr.D.Ramyachitra
Friendbook: An Efficient Way to Recommend Friends on Social Networks Through Life-Style
Nitish Gaikwad, Ankit Bhanushali, Dheeraj Mishra, Rupali Nirgude
An Effective privacy preserving and Accuracy Constrained Method for Relational Data
Dr.M.Sreedevi, P.Chytanya lakshmi
The Role of SSL & SET Protocol in E-Commerce
Rahul Kumar, Arun Kumar Shukla, Ajit Pratap Singh
Comparative Analysis of Robot Detection Techniques on Web Server Log
Mitali Srivastava, Atul Kumar Srivastava, Rakhi Garg, P. K. Mishra
Congestion Control in Multi-Flow Environment Using Multipath Routing Base in MANET
Dr. Vikash Kumar Singh, Devendra Singh Kushwaha, Raju Sujane, Manish Taram
A Study of Mobile Cloud Computing (MCC) & Its Real-Time Application
Rahul Kumar, Arun Kumar Shukla, Ajit Pratap Singh
Design and Implementation of Wireless Sensor Network for Health Care Monitoring in Hospitals via Mobile
Akansha Dhobley, Prof. N. A. Ghodichor, Prof. S. S. Golait, Dr. P. S Prasad
Three way controlled android Smartphone based robotic vehicle via Bluetooth
Arita Dey, Akash Pal, Sayantan Nandi, Lusika Roy
Security of File through Splitting and Hybrid Encryption Mechanism
Vishu Sharma, Meenakshi Sharma
A survey of biometrics: features, components, examples and applications
Ruaa Adeeb Abdulmunem Al-falluji
The Art of Creating Software Requirements
Adnan Shaout and Anthony Walker
Design and Development of Sensor Networks Interface- Semantic web based Wheat Expert System
Prof. M. S. Prasad Babu, D. Jyothsna
Survey on Resource Allocation Mechanisms for MapReduce Clusters
S. Janani, G.R. Anantha Raman
Multilevel Encryption using Ribbon Based Technique for Symmetric Key Cryptography
Milit Betai, Neha Katre
VNPaaS: Realizing Platform as a Service using Network Function Virtualization
Hrishikesh Arun Deshpande
Performance Analysis of FSO System using Nakagami m Fading Channel
Sarita, Nidhi Mittal
RDBMS Data Retrieval with Term and Ranking Search Scheme: A Survey Effort
Mr. Gajanan Patil, Mr.Prof.S.Z.Gawali
Efficient Data Sharing for Dynamic Groups in Untrusted Cloud Storage
A.Sai Kiran, K.Gnanendra
Robust 2D-Novel Smart Antenna Array for MIMO Applications
Veerendra, Md.Bakhar and Vani.R.M
Design and Implementation of a Digital FIR LPF with Variable Pass-Band for ECG Signal using FPGA
Dr. Kamal Aboutabikh, Dr. Ibrahim Haidar, Amer Garib
Exemplar Based Super-Resolution Technique for Image Inpainting
Abhijit L. Rakshase
Secure Data Sharing With Key Aggregate Cryptosystem
Pallavi Mathur, Nachiket Mahamuni, Nikhil Gondane, Kaushal Singh
A Combined Approach using DWT & PCA on Image Fusion
Harpreet Kaur, Rachna Rajput
Dead Line Scheduling In Grid Computing Environments
R. Ananthi Lakshmi, S.Vidhya
Survey on shopping recommendation system with secure online payment
Ajay Mangaj, Aditya Chavan, Pritesh Joshi, Priti Mithari
“Evaluation of the effect of Node Movements in Mobile Ad Hoc Networks (MANETs)”
Gurbinder Singh, Sarabjit Singh
Detecting Shortest Path Using Vehicular Routing Protocol
N. V. Pardakhe, S.S. Dandge
Study of different types of noise and their effects on digital communications
Azzeddine RIAHI, Sara RIAHI
Web Mining Over Cloud – A Prerequisite for Today’s Enterprises
Jitendra Singh Tomar
Research and Analysis of WiMax Communication
Mrs. Shallu Kalra, Mrs. Vidhu Kiran
Comparative Analysis of Lung Cancer using Different Medical Modality
Shikha Maheshwari, Krishan Kumar
LTE Advanced: Next Generation wireless Broadband Technology: LTE Uplink Communication
Micky Maria Boban, Asha Panicker
Retentive privacy and content based on Location queries
C.Rajeswari, N.S.Jagadeesh
Using Shortest Job First Scheduling in Green Cloud Computing
Abeer H. El Bakely, Hesham A.Hefny
Efficient Video Feature Extraction and Retrieval on Multimodal Search
S.B. Mahalakshmi, Capt. Dr.Santhosh Baboo
Hybrid Authentication Technique
Yash Khandelwal, Jay Shah, Shaunak Shah, Neha Katre
Human Identification by Classifying the Features of the Sclera Region of the Eye
Therese Yamuna Mahesh, Dr.K. L. Shunmuganathan
SaaS: Privacy Data Auditor in Private Cloud Computing
Gadekar Anant, Dr. S. Lomate, Prof. Saad Siddiqui
Literature Survey of MANET under Blackhole and Grayhole attack
Tejasvi Thanvi, NeerajArora, Piyush Vyas
Implementation of an Investment Information System Based on Google Maps API
Sayed Ahmed, Mohammed Badawy, Eman Zidan, Romani Farid Ibrahim
Crawdy: Integrated crawling system for deep web crawling
Mangesh Manke, Kamlesh Kumar Singh, Vinay Tak, Amit Kharade
Shadow Detection in Single Image using Color Spaces
Harpreet Kaur, Navdeep Kaur
Bio-Medical Image Enhancement using Counter Let Transformation & Bacterial Foraging Optimization
Er. Gurpinder Kaur, Er. Aashima
SQL Injection Attack Prevention for Web Applications
Prem Shanker Dwivedi, Atma Prakash Singh
Plant Disease Identification using Segmentation Techniques
S. Nagasai, S. Jhansi Rani
Improved EF-Leach Routing Protocol To Extend Network Lifetime
V. Ramatulasi, S. Jhansi Rani
A New Methodology to Avoid Deadlock with Dining Philospher Problem in Rust and Go System Programming Languages
Tata A S K Ishwarya, Dr.R.China Appala Naidu
A Survey on Opinion Mining for Extraction of Opinion Word and Opinion Target
D. Menaka, E. Saravana Kumar
Integration of the Data Distribution Service middleware protocol in an SCADA system
Ioan Ungurean, Nicoleta Cristina Gaitan
A Survey on Concept based Pattern Discovery for Text Mining
Muthuvalli .A.R, Manikandan.M
Communication between Cloud-of-Clouds Environment
Nitesh Khandare, Dinesh Yadav
A Survey On Secure Data Transmission Over Cluster Based Wireless Sensor Networks
Amsapriya.S, Geetha.D
Nutrient Management System for Paddy Based on Multi Linear Regression
B. Karteek, V. Valli Kumari
A Clustering Based Performance Evaluation System for MGNREG Scheme
Ch. Geethanjali, V. Valli Kumari
A Secure Image Steganography Technique Based on Kekre’s Algorithm
Priyanka Jagota, Er. Surbhi Gupta
A Novel Fuzzy Rule Based Hybrid Technique for Image Segmentation
Sudhanshu Vashistha, Er. Surbhi Gupta
Performance Analysis of Optimize AODV and AODV Routing Protocol
Amrapali Arya, B.P. Chaurasia, S.K. Gupta
New Trust Model for Online Auction Depend on Intelligent Swarm
Eng. Fawzeya M. A. Alhallaq, Yaquob H. A. Alkandary
Decision Support Information System for Crop Advice and Water Management
A. Pravallika, V. Valli Kumari
A Critical Review of Cryptographic Hash Functions
Smriti Gupta, Prof. Sandeep Kumar Yadav
Analysis Methods for Search Engine Optimization
Dinu.D, P.Vijayakumar
Distributed Databases Rules of Mining in the field of Association
K.Rajeshwar Rao, A.Prakash, B.Venkat Ramudu
Smart Warehouse: An RFID-IoT Approach
Deepak, Amitav Shaw, Biswajit Nayak
Packet Scheduling in Wireless Sensor Networks using Dynamic method
Meethu M B, Ayana Ajith
Encryption of RGB image using Arnold transform and involutory matrices
Anand Joshi, Maneesha Kumari
FNDRA: Failure or Dead Node Detection and Recovery Algorithm for Wireless Sensor Networks
M.Arun Sathya, V.Nellai Nayaki
Implementing Data Aggregation to Improve Energy Efficiency in Wireless Sensor Networks
Snehal Lonare, Dr. A. S. Hiwale
Design and Development of Semanctic Web based Guava Expert System for Disease Classification
M. Surendra Prasad Babu, Dasari Siva Krishna
Interaction K-means Clustering for Finding Similar Interaction Patterns among Brain Regions
S. Bencyangel, J. Dhivya Merlin
Message Authentication and Source Privacy in Wireless Sensor Networks
Prof. P. A. Khodke, Mansi S. Nanwani
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
V.Kalaivani, M.Sumathi
Fault Node Detection and Recovery in Wireless Sensor Network (WSN)
Pranali Shejwal, Asmita Mokal, Sonali Mujagule, Asha Thoke, Priyanka Narode
A Survey on Dynamic Resource Management Technologies in Cloud Datacenter
Ashwini.K.L, Dr Suresh.S
Design of an Enterprise Network Infrastructure of a City
Mehzabul Hoque Nahid
Digital Visual Cryptography Transmission Scheme by Diverse Image
Prajakta Nikam, Preeti Kale
Privacy protection in personalized web search
Khwaja Aamer, Dr. A. S. Hiwale
Enhancing Security in Cloud by Self-Destruction Mechanism
Kshama Bothra, Sudipta Giri
Efficient Image Retrieval Based on Fuzzy Color Feature Extraction
Mrs.S.Rathika M.C.A., Mr.P.Vijayakumar M.Sc.,M.Phil.,
Abstract
Wide-Range Waveform Measurement System with Load-Pull Capability for the Characterization of RF Devices
Walid S. El-Deeb
DOI: 10.17148/IJARCCE.2015.4901
Abstract: In this paper, a simple, effective, and time saving measurement setup for nonlinear RF power amplifier characterization is presented. This setup gives the ability of measuring AM-AM, AM-PM and waveforms for SISO, SIMO, and MIMO RF power amplifiers in one measurement step. The system incorporates the advantages of high-speed MTA for waveform measurements and the advantages of using Focus load-pull setup for the characterization of RF devices. Several measurements of multiport balanced amplifier at 1 GHz, using the proposed measurement setup, are presented.
Keywords: AM-AM, AM-PM, MIMO, Power amplifier characterization, RF measurements, SIMO, SISO.
Abstract
A Conceptual Model for Ontology-based Mental Model
Somayeh Mohammadi, Hayedeh Saberi, Touraj Banirostam
DOI: 10.17148/IJARCCE.2015.4902
Abstract: Utilizing mental models by different fields leads to generation of various definitions for this concept. In this paper, these field�s significant definitions for mental models will be presented and their key concepts in each field will be analysed. By using regarded features of mental models definitions, ontology will be presented. In the ontology, the main fundamental concepts and their relations have been presented and analysed and then presented in the proposed model. Thirteen basic characteristics have been used to describe the proposed model�s functionality. In additional to, types of memory will be analysed and relations between them and presented model will be studied and then illustrated in a conceptual model. The aim of proposed model is to design cognitive agent that thought human-like.
Keywords: Cognition, Memory, Mental Models, Modelling, Ontology.
Abstract
Dual Key Indexing Method for Least Significant Bit Modification based Audio Steganography
Vipul Sharma, Lalita Sharma, Ravinder Thakur
DOI: 10.17148/IJARCCE.2015.4903
Abstract: In this era of emerging communication technologies, secure transmission of secret & sensitive information has always been a challenge due to various attacks on it. Audio Steganography is considered one of the reliable techniques to hide a secret message with in an audio. LSB technique is very efficient technique to embed secret message by replacing LSBs of carrier audio. In this paper Dual Key Indexing method is proposed to map secret message onto the LSBs of the carrier audio. Primary key is provided by Trusted-Third-Party (TTP) whereas secondary key is provided by the encoder which will be needed to extract the secret message at receiver end. The proposed method injects more randomness & confidentiality as compare to the traditional methods.
Keywords: Audio Steganography, Dual key indexing, Data Embedding, LSB method, Trusted Third Party.
Abstract
Analysis and Comparison of WiMax Communication using Cryptographic Techniques
Mrs. Shallu Makker, Mrs. Vidhu Kiran
DOI: 10.17148/IJARCCE.2015.4904
Abstract: WiMax means Worldwide Interoperability for Microwave Access. It is the wireless technology and enhancement of 802.16 standards. WiMax has many salient advantages suchas: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks. In WiMax, security is the major issue for transmission of data from end to end. We discuss the WiMax security mechanisms for authentication, encryption, and availability. Security protocols are essential for secure transmission of data. Throughput and Packet delivery ratio (PDR) can be increased by using security protocols like AES and RSA. In this report, we study the comparative results of different security protocols in terms of Throughput and PDR by applying encryption schemes of RSA and AES.
Keywords: WiMax, Cryptographic Techniques, Packet delivery ratio (PDR), AES, RSA.
Abstract
Performance Analysis of Optical Communication System using Different Channels
Heena Goyal, Jyoti Saxena, Sanjeev Dewra
DOI: 10.17148/IJARCCE.2015.4905
Abstract: Strong atmospheric turbulence (disturbance due to rain, fog, haze etc.) is a major problem in optical communication system. In this paper, the performance analysis of an optical communication system with Free Space Optics (FSO), Optical Wireless Communication (OWC) and Single Mode Fiber (SMF) in weak atmospheric turbulence has been analysed. Data stream is transmitted at 20Gbps using different channels under attenuation 1dB/km, 2dB/km and 3dB/km. Comparison is made in terms of Q factor, BER and received optical power. It is found that the signal can be transmitted with better Q factor, least BER and high received power with OWC system.
Keywords: FSO, OWC, SMF, Quality Factor, Bit Error Rate.
Abstract
Design of a Low Cost High Gain Microstrip Antenna for Wireless Applications
Kaushik Mandal
DOI: 10.17148/IJARCCE.2015.4906
Abstract: A method to enhance gain of a microstrip patch antenna is investigated. Here the main radiating square patch is surrounded by four side patches. The effect of side patches on the absolute gain of antenna is studied. In absence of side patches the highest absolute gain of the antenna is 5.3 dBi. Maximum absolute gain of 7.85 dBi is obtained in presence of all the side patches. Prototypes of the antenna are fabricated for experimental validation. The measured return loss, gain and radiation patterns are in good agreement with their simulated counterpart for all four antennas. The proposed antenna is simple, less costly and highly suitable for wireless communications.
Keywords: Microstrip patches antenna; low cost; high gain.
Abstract
Comparison of Round Robin Based CPU Scheduling Algorithms
Charu Rani, Mrs. Manju Bala
DOI: 10.17148/IJARCCE.2015.4907
Abstract: The main objective of this paper is to implement the real time scheduling algorithms and to minimize the average waiting time so that given set of tasks may be completed in a minimal time with an efficient output. We will also discuss the advantages and disadvantages of the same. Task within the real time system are designed to accomplish certain service(s) upon execution, and thus, each task has a particular significance to overall functionality of the system. Scheduling algorithms in non real time system not considering any type of dead line but in real time system deadline is main criteria for scheduling the task.
Keywords: Real Time System, CPU Scheduling, First Come First Serve (FCFS), Shortest Job First (SJF), Shortest Remaining Time First (SRTF), Round Robin (RR), Round Robin with SRTF (IRR), Round Robin with Priority (RP).
Abstract
Survey on RSSI Based Sybil Defense
Akshaya.S.U, Dr. Thilagavathi.D
DOI: 10.17148/IJARCCE.2015.4908
Abstract: Wireless network is a self-organized and distributed controlled network. The ad-hoc network is a decentralized wireless network because it does not depend on a pre-existing infrastructure or wireless network. Sybil attack which is commonly called as Pseudo-spoofing in early 2002. The attack is harmful against wireless ad hoc network, in which the node claims multiple identities to gain unfair influences. The Sybil countermeasures deals with various methodology to Prevention, detection, Recovery of Sybil nodes. RSSI is detection technique which is used in IEEE 802.11 standards without using any trusted sources. RSSI observation is made practical in commodity devices to defense against Sybil attackers in network without any trust devices. The survey on 10 studies is concentrated in this area published during 2005-2014. We summarize our observation with common pitfall among the survey work.
Keywords: Sybil attack, RSSI, IEEE 802.11, Trusted Sources.
Abstract
Design of Suction Pump Manhole
Arvind Vishnubhatla, Bhanu Priya Bapu
DOI: 10.17148/IJARCCE.2015.4909
Abstract: In many places in India because of variations in terrain, water logging takes place. In urban areas, this preventing the smooth flow of traffic, till now there does not subsist, any automatic drainage system which can clear the standing water. Many a time resident has to resort to opening the manhole cover for the water to drain. This is a hazardous situation because people and belongings can unknowingly be washed into the manhole. To alleviate this problem we propose the design of a suction pump man hole. This manhole is covered by a rolling shutter. In the event of a heavy rain the rolling shutter can be operated by a wireless remote. The opening of the rolling shutter exposes a wired metallic mesh preventing the suction of useful materials into the manhole. It has been seen that even when the manhole is open, the rate at which the water is sucked into the drain is limited. This blocks the traffic and purposeful utilization of community resources till the water effectively drains away on its own. To accelerate the draining processes we propose to employ a suction pump. The rolling shutter, the wireless mechanism so associated and the suction pump are all controlled with the help of a microcontroller board. There is a need to provide a separate battery backup mechanism so that the system is operational even during power failure.
Keywords: rolling shutter,suction pump,manholes;
Abstract
Sine-Cosine Computation Using CORDIC Algorithm
Ranjita Naik, Riyazahammad Nadaf
DOI: 10.17148/IJARCCE.2015.4910
Abstract: CORDIC stands for Coordinate Rotation Digital Computer. The CORDIC algorithm was introduced for the computation of Trigonometric functions, Multiplication, Division, Data type conversion, Square Root and Logarithms. It is a highly efficient, low complexity, hardware efficient algorithm giving a robust technique to compute the elementary functions. In the paper the CORDIC algorithm, its usage in calculating quadrature functions, its applications and advantages and disadvantages are explained.
Keywords: CORDIC (Coordinate Rotation Digital Computer), Sine-Cosine, CORDIC Algorithm.
Abstract
Performance of Turbo Codes using SOVA
Yashkumar Shilankar, Dr. S. L. Badjate, Pratik Hazare
DOI: 10.17148/IJARCCE.2015.4911
Abstract: Information Theory & Coding, Error Detection & Correction are the techniques that enable reliable transmission of information over unreliable communication channels. Error detection allows detection of such errors while error correction enables reconstruction of original data. The idea behind the error detection & correction is to add redundancy bits i.e. extra bits based on which data can be detected or corrected. The Turbo Codes resulted from the combination of convolutional codes, interleaving, soft-input soft-output decoding and concatenation. Turbo Codes are used to provide better Bit Error Rate performance over noisy channel as they come closest to Shannon�s Capacity Limit. We have to examine the performance of the iterative soft output Viterbi algorithm (SOVA) for turbo codes on an additive white Gaussian noise channel and compare the performance to that of the other algorithm to achieve the best results.
Keywords: Turbo Code, AWGN, SOVA, OFDM.
Abstract
Improved Security, Energy Efficient Load Balancing for the Stable and Reliable Cloud
Mr. B. Subramani, Ms. B. Rajalakshmi
DOI: 10.17148/IJARCCE.2015.4912
Abstract: Cloud computing is a freshly industrializing new technology for multipart systems with large-level services distribution among various users. Therefore, verifying and validating of both users and services is a important issue for the confidence and protection of the cloud computing. SSL Authentication Protocol, once implemented in cloud computing, will become so complex that users will experience high overloaded issues in both calculation and communication. The proposed research is, based on the Attribute-based hierarchical method for cloud computing and its equivalent cryptographic and signature methods, presented a new Attribute-based security protocol for cloud computing and services. Through simulation testing, it is shown that the security protocol is more significant and capable than SSL Authentication Protocol, specially the more significant on user side.
Keywords: Cloud computing, Security, Attribute, Simulation, Protocol.
Abstract
Identify and Rectify the Issues in Mobile Applications in Various Platforms
Dr. R. Selvam, Dr. R. Prabakaran
DOI: 10.17148/IJARCCE.2015.4913
Abstract: The mobile phone has become one of the most popular products amongst today's consumers. Mobile applications or mobile apps are applications developed for small handheld devices, such as mobile phones, smart phones, PDAs and so on. Mobile apps can come preloaded on the handheld device as well as can be downloaded by users from app stores or the Internet. In this provides an overview of important mobile application issues in various mobile platforms and research issues related to the development of applications that run on mobile devices. Among the topics are development processes, tools, user interface design, application portability, quality, and security.
Keywords: Scenario, Platforms, Significant, Simulating.
Abstract
Image documentation for the Enhancement of text and noisy images
Ankita Malhotra, Er. Deepak Kumar
DOI: 10.17148/IJARCCE.2015.4914
Abstract: Digital-image processing, nowadays has been experiencing a vibrant growth and economically begin to use widely in almost every field. Nowadays, each application has different requirements from the others, but there aim is almost same , i.e. to do processing faster, cheaper and more accurate. Earlier, information has been stored on paper, to store it in better form and for faster processing, is now being transformed into an electronic form. The present paper gives the detail of different noise effects on the images and along with that it discusses the different methods to remove the noise by using various filter such as median filter, enhanced median filter, Gaussian filter to improve the image quality. The Experimental results in this has been performed on a standard test images having a wide range of noise corruption levels. The work is implemented on the MATLAB environment.
Keywords: RGB (red, green, blue), Image enhancement, noise, MATLAB, spatial domain etc.
Abstract
A Study of a Non-linear Reaction Diffusion Equation Representing Initial and Boundary Value Problems by LDTM
Kiranta Kumari, Praveen Kumar Gupta, Gauree Shanker
DOI: 10.17148/IJARCCE.2015.4915
Abstract: In this paper, we study the exact solutions of non-linear Reaction-Diffusion equation using the Laplace-Differential Transform method (LDTM). We apply Laplace transform in time domain and differential transform in space domain using initial and boundary conditions. We find that this method requires straightforward differentiation and a few elementary operations for the solution unlike other typical methods which requires integration. Illustrative examples are presented to demonstrate the applicability and efficiency of the technique. The concluding results are accurate and with less computational effort than some existing studies.
Keywords: LDTM, Non-linear Reaction-Diffusion equation, Initial Conditions, Boundary conditions.
Abstract
Risk Analysis of Android Apps and Fake ID Flaw Solution Model
Shristi Pandey, Ravi Kant, Dr.Vijendra Singh
DOI: 10.17148/IJARCCE.2015.4916
Abstract: In this era of modern technology where everyone is rely on the latest technical specifications specially concerning with the latest mobiles and apps. Keeping this in mind the various software company�s has launched their own Operating System for mobile, and in the same field Google also launched their own mobile Operating System Android which has its own technicality and specification which is competing with the other companies Operating System. After using the Android in mobile people came to know that some problems has been faced by the android user and the problem is not hardware related but in fact it is the major flaw of the Android OS which is consider as the fake ID problem. This flaw allow hacker to impersonate the trusted application and potentially hijack the users mobile phone and extract all the critical data from the mobile and the result would be catastrophic. Various solution have been proposed by the researchers around the globe to overcome this problem. Here I am providing a specific method to overcome this critical flaw of android Operating System.
Keywords: APK, Android Apps, Certifying Authority, MinSDK, MaxSDK, TargetSDK, X.509, PKI, IPsec, TLS, PKIX, ASN.1, Malware, Spyware, Risk ware, Trojan, Jelly Beans, Kit Kat, Defense In Depth.
Abstract
Efficient Security for Energy Efficient Load Balancing and Application Enhancement for the Stable and Reliable Cloud
Mr. Nikhil k k, Mr.I.Gobi
DOI: 10.17148/IJARCCE.2015.4917
Abstract: Cloud computing is a freshly industrializing new technology for multipart systems with large-level services distribution among various users. Therefore, verifying and validating of both users and services is a important issue for the confidence and protection of the cloud computing. SSL Authentication Protocol, once implemented in cloud computing, will become so complex that users will experience high overloaded issues in both calculation and communication. The proposed research is, based on the Attribute-based hierarchical method for cloud computing and its equivalent cryptographic and signature methods, presented a new Attribute-based security protocol for cloud computing and services. Through simulation testing, it is shown that the security protocol is more significant and capable than SSL Authentication Protocol, especially the more significant on user side.
Keywords: Cloud computing, ER system, Energy efficient, Load balance, Attribute-based hierarchical,SSL Authentication Security, networking, Cryptography, Encryption and Decryption.
Abstract
A Literature Review on Assurance Driven Software Design
Dipak Gade, Dr. Santosh Deshpande
DOI: 10.17148/IJARCCE.2015.4918
Abstract: Modern critical software systems are more complex and needs to fulfil constantly increasing demands from its users. This is forcing the system architects and software developers to design more reliable and trustworthy software systems which can stand long enough to meet expectations from all of its stakeholders. Designing of such reliable and promising software is not easy, specifically considering the complexity, huge efforts and time required to develop it. Developers have now seriously realised the importance of designing robust and reliable software. From last some years, more research is going on to identify ways and techniques to design the trustworthy and reliable software which can be guaranteed fit for use under given operating constraints. The present paper has reviewed some of the research papers explaining prominent techniques and methodologies for assurance driven software design.
Keywords: Assurance Arguments, Claims & Evidence, Design Assurance, Goal Structure Notations, Safety Cases.
Abstract
Procedure of Opinion Mining and Sentiment Analysis Techniques: A Survey
Ms. Jayanti Goyal, Ms. Anjali Dadhich
DOI: 10.17148/IJARCCE.2015.4919
No abstract available.
Abstract
Review of LEACH Variants
N. V. Deshmukh, Y.M. Patil
DOI: 10.17148/IJARCCE.2015.4920
Abstract: Wireless sensor networks (WSNs) consist of sensor nodes. These sensor nodes are powered by battery to communicate with each other. Energy efficiency is the vital issue in wireless sensor networks. Various Routing techniques have been evolved to maximize network lifetime, throughput and scalability. LEACH is one of the hierarchical clustering protocols widely used in WSNs. The goal of this paper is to provide brief overview of some LEACH variants.
Keywords: Wireless Sensor Network, LEACH, Hierarchical routing, cluster based routing.
Abstract
Survey on Low Rate Denial of Service Attacks
Veeradanya. K.S, Dr.Thilagavathi. D
DOI: 10.17148/IJARCCE.2015.4921
Abstract: Low-rate denial of service attacks sends the sequence of periodic pulse which are low rate, when it is aggregated there will be a huge loss at the victim end. LDoS attack flows low rate of scaling function and hiding information for long duration. LDoS attacks severely degrade the availability of a victim, which can be a host, a router, or an entire network. The occurrence discovering is takes place based on the network traffic features. It will detect both the known and unknown LDOS attack in the considered network traffic features. The traffic records can be analyzed by different algorithm. This paper is concentrated on the survey of LDoS attacks and it is detected by the mechanism using holder exponent of difference value (D-value) between normal and LDoS attack under network traffic.
Keywords: LDoS, Holder exponent, D-value.
Abstract
A Survey on Optimal Link State Hop by Hop Routing
Lakshmana Kumar.S, D. Ramya Dorai
DOI: 10.17148/IJARCCE.2015.4922
Abstract: Link State routing protocols do not view networks in terms of adjacent routers and hop counts. Using the SPF algorithm, the router creates a "topological database�. OSPF and IS-IS, split traffic evenly over shortest paths based on link weights. However, optimizing the link weights for OSPF/ IS-IS to the offered traffic is a well-known NP-hard problem, and even the best setting of the weights can deviate significantly from an optimal distribution of the traffic. A new link-state routing protocol, PEFT that splits traffic over multiple paths with an exponential penalty on longer paths. The survey shows the best routing algorithm by comparing the previous results with the algorithms named as link state, hop by hop, optimal and adaptive.
Keywords: Link State, Hop by Hop, Optimal, Adaptive.
Abstract
A Survey on Similarity Search for Large Scale Database
T. Sowmi, E. Saravana Kumar
DOI: 10.17148/IJARCCE.2015.4923
Abstract: Data mining is the process of extracting the needed information and knowledge from the database based on the user�s expectance. In Image mining, Similarity search is one of the ongoing research fields for efficient image retrieval. For similarity search, many algorithms based on hashing and genetic were implemented. The aim of these algorithms is to retrieve the relevant images which are similar to the given query image based on feature extraction method. It estimates the fitness value for binary bit generation and will obtain the optimal solution for image retrieval. Among the reviewed papers four datasets were commonly used. The datasets used are MIRFLICKR, CIFAR-10, NUS-WIDE and SIFT-1M which provides clarity for image and specificity for querying. Mostly the implementation was conducted in Matlab which uses Fortan for version 1 and C for commercial use.
Keywords: Similarity search, Hashing, Genetic algorithm, Feature extraction method.
Abstract
Performance Optimization of DPCM System
Sanjeev Singh Bisht, Govind Singh Jethi, Sandeep Kumar Sunori
DOI: 10.17148/IJARCCE.2015.4924
Abstract: Digital Communication systems make the process feasible for sustaining large amount of noise data and avoid distortions mainly generated through various techniques. However, a common problem with commonly used techniques, such as Pulse Coded Modulation (PCM) and Linear Delta Modulation (LDM), is that they negatively affect the communication process by causing quantization error, slope overload distortion, and granular noise. This paper describes the DPCM technique which solves the quantization error faced by the PCM. The performance optimization has been achieved using optimization tool of MATLAB.
Keywords: Differential Pulse Coded Modulation, quantization error, optimization error, PCM.
Abstract
Design Approach of High Performance 32-bit Multiplier Based on Vedic Mathematics using Pipelining
Arpita S Likhitkar, M.N.Thakare, S.R.Vaidya
DOI: 10.17148/IJARCCE.2015.4925
Abstract: Many processor devotes a considerable amount of processing time in performing arithmetic operations particularly multiplication operations therefore high-speed multiplier is much desired. There are various methods of multiplication in Vedic mathe-matics, Urdhva tiryagbhyam, being a general multiplication formula is equally applicable to all cases of multiplication. This is more efficient in the multiplication of large numbers with respect to speed and area. In that we will see the different types of multiplier that will be generated using a Vedic Mathematics. In that we will proposed a 4-bit binary multiplie using this sutra. A new 4-bit adder is proposed which when used in multiplier, . Also we proposed 8-bit adder, 16 bit adder & 32 bit adder using this adder we proposed an 8-bit multiplier, 16 bit multiplier & 32 bit multiplier using a Vedic Mathematics (Urdhva Tiryagbhyam sutra) for generating the partial products. Also this paper proposed the design of high speed Vedic Multiplier using the techniques of Ancient Indian Vedic Mathematics. For Improving our generated result we used the concept of pipelining and design 4-bit, 8-bit, 16-bit & 32-bit pipeline Multiplier.
Keywords: VLSI, Urdhva Tiryagbhyam sutra, Adder, Multiplier.
Abstract
Robust and Secure Image Watermarking using DWT-SVD and Chaotic Map
Sanpreet Singh, Savina Bansal, Sukhjinder Singh
DOI: 10.17148/IJARCCE.2015.4926
Abstract: Various digital image watermarking techniques have been proposed by researchers from time to time. In this paper, a noval image watermarking is proposed (DSAWM) based on DWT-SVD and chaos based encryption using Arnold cat map. The DWT-SVD approach is used to increase the robustness while encryption helps in making the watermark more secure. From the simulation results, it can be concluded that DSAWM algorithm gives better result for rotation, noise and JPEG compression attacks as compared with other relevant work.
Keywords: Robust, Watermarking, Discrete Wavelet Transform, Singular Value Decomposition and Arnold Cat Map.
Abstract
A Survey on Concise and Lossless Representation of Frequent Pattern Sets
R.Prabamanieswari, D.S.Mahendran, T.C. Raja Kumar
DOI: 10.17148/IJARCCE.2015.4927
Abstract: Many approaches are used to develop efficient algorithms for mining frequent patterns. Recent studies on frequent itemset mining algorithms resulted in significant performance improvements. However, if the minimum support is set to low, or the data is highly correlated, the number of frequent itemsets itself can be prohibitively large. To overcome this problem, several proposals have been made to construct a concise representation of the frequent itemsets, instead of mining all frequent itemsets. This survey paper illustrates the importance of FP-growth based algorithms for mining representative pattern sets. It also discusses that the number of representative pattern sets can be much smaller than the total number of frequent patterns; all the frequent patterns and their support can be recovered from the set of representative patterns. That is, the representative pattern sets are used to best approximate all frequent patterns.
Keywords: Depth-First strategy, FP- growth, frequent itemset, closed itemset, Representative Pattern set.
Abstract
Energy Efficient AODV Routing Protocol for Mobile Ad-hoc Networks
Jaspreet Singh, Kartik Sharma
DOI: 10.17148/IJARCCE.2015.4928
Abstract: Mobile ad-hoc networks are infrastructure-less networks used for communication between two or more nodes without a common access point. It is a collection of nodes that is connected through a wireless medium forming changing topologies. In mobile ad-hoc networks all the nodes are mobile in nature and having limited battery charge. Continuous change in position of nodes in the network degrades the battery charge of the nodes therefore it is necessary to save the battery power of those nodes so that the network lifetime can be long lasting. Nodes in the network are working in the presence of limited energy then energy efficient routing is necessary for reducing energy consumption. In this paper we proposed energy efficient AODV routing protocol in which Dijkstra algorithm is enhanced to improve the overall performance of the network. Existing systems are not capable of finding the shortest and energy based path among the nodes in the network if multiple nodes fail simultaneously. Performance parameters are Packet delivery ratio, Throughput, Energy consumption and routing overhead. The simulation is done using network simulator NS-2.
Keywords: Energy efficiency, AODV, Manet, NS-2.
Abstract
Survey on Attacks in MANET
Archana.R, Mrs. Gracy Theresa
DOI: 10.17148/IJARCCE.2015.4929
Abstract: Mobile ad-hoc network is a continuously self configuring infrastructure fewer networks of mobile devices connected without wires. Each device in a MANETs is free to move independently in any direction and in therefore change its link to any other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANETs is equipping each device to continuously maintain the information required to properly route traffic and security. MANETs are usually setup in situations of emergency for temporary operations or simply if there are no resources to setup elaborate networks. As MANETs are deployed in adversarial environment there is no proper security to transmit the data securely. There are many types of attacks that causes while communication takes place between source and destination. Attacks are harmful against wireless ad-hoc network and delay tolerance network, in which a node illegitimately claims multiple identities in order to gain unfair influence. Attacks in MANETs can be classified as active and Passive Attack, Wormhole, Black hole, rushing attack etc. In this survey paper the different types of attacks in ad-hoc networks and security goals, MANET challenges, MANET security challenges and attacks in different layers have been discussed.
Keywords: MANETs,Adversarial, Delay Tolerance, Active Attack, Passive Attack, Wormhole, Black Hole,Rushing Security attacks.
Abstract
ATP RTC Bus Services Information System for Windows Smartphones
P. Gajendra, C. Nagesh
DOI: 10.17148/IJARCCE.2015.4930
Abstract: India is rightly termed as sub-continent for its diversity and heterogeneity. Indian Railways are extensive but can�t provide necessary links between the villages and villages to towns and cities. Road Transportation is popular, familiar, cheaper and important transportation system for transporting the passengers and goals. Road Transportation system is only the single powerful factor on which the economic, social and political activities of a nation depend. APSRTC is one of the major transportation for the people in Andhra Pradesh. According to this service, people are able to travel from one place to another place. Lack of appropriate information about buses for transportation, mainly for passengers to travel various places can causing lot of nervousness among the traveller. This system provides the information about all the bus service travel from anantapur through the windows mobile app.
Keywords: Transportation, Roadways, Windows mobile, APSRTC.
Abstract
A Small Analysis on Learning to Rank for Information Retrieval
G Saranya, G Swetha
DOI: 10.17148/IJARCCE.2015.4931
Abstract: Learning to rank for information retrieval has gained a lot of interest in the recent years because, ranking is the central problem in many information retrieval applications, such as document retrieval, collaborative filtering, question answering, multimedia retrieval, text summarization, and online advertising machine translation etc. The extremely large size of the Web documents makes it generally impossible for the common users to find their desired information by surfing the Web. As a consequence, effective and efficient information retrieval has become more important and also search engine (information retrieval system) has become an essential tool for people to locate their needed information. So, we propose novel active learning algorithm that is two stages Expected loss optimization (ELO), which minimizes the expected loss of information and rank the document which is more relevant to the query and gives the user the most informative document instead of displaying all the related documents which is not useful for the user.
Keywords: Ranking, document, query, Expected loss Optimization, Learning to rank.
Abstract
Design and Testing of Wide Band Flat Scalar Ring Horn Antenna System for Ground Station Receiver Applications
P. Nanda Kumar, M. Durga Rao, D. Gowri Sankar Reddy
DOI: 10.17148/IJARCCE.2015.4932
Abstract: Three different types of horn antenna systems such as pyramidal horn, conical horn and flat scalar ring horn antennas are designed, compared and finally the suitable antenna is selected for the present application at L-Band and S- Band region. The designed antenna has linear polarization, small size, light weight and multi path rejection. The three different types of antennas are simulated with commercially available software known as Ansoft HFSS, detailed design procedure with dimensions is presented and performance results are discussed. The proposed antenna gives decent gain over operating range of L and S frequency bands with wide 3-dB bandwidth.
Keywords: HFSS, horn antenna, flat scalar ring, multipath rejection.
Abstract
Eclat-Genetic Approach for Finding Association Rule
Mr. Omkar B. Bhalerao, Prof. L. M. R. J. Lobo
DOI: 10.17148/IJARCCE.2015.4933
Abstract: Data mining is the process of knowledge discovery in databases. It is the art and science of intelligent analysis of existing large data sets, for finding meaning and previously unknown insights and transforms it into a flexible structure. With the help of Database and data mining we can extract meaningful data sets from huge data. When we apply data mining techniques on huge datasets results of improved quality are achieved. In data mining algorithms, association rule mining finds an important place; it is an easy and popular method to find out association rules from an existing large datasets. In general frequent itemsets are generated from large data sets by applying association rule mining this task takes a lot of computer time to compute all the frequent itemsets. In this paper, the main area of concentration was to optimize the rules that are generated by an Association Rule Mining algorithm (Eclat) by using a Genetic Algorithm. Here we generate more accurate and complete rules. The advantage of using genetic algorithm is to discover high level prediction rules.
Keywords: Eclat, Genetic Algorithm, Association Rule, Data Mining.
Abstract
Tamil Sign Language Recognition using Active Shape Modeling
S. Sudha, S. Jothilakshmi, R. Soundaramani
DOI: 10.17148/IJARCCE.2015.4934
Abstract: Communication is the process of exchanging information, views and expressions between two or more persons, in a verbal and non-verbal manner. Hand gestures are the non verbal method of communication used along with verbal communication. A more organized form of hand gesture communication is known as sign language. Physically disabled persons like the deaf and the dumb use this language to communicate among themselves and with others. The main aim of this paper is to design a system that can modify the sign language accurately so that the less fortunate people may communicate with the outside world without an interpreter. By keeping in mind the fact that in normal cases every human being has the same hand shape with four fingers and one thumb, this paper aims at designing a real time system for the recognition of some meaningful shapes made using hands. In this work Tamil signs are synthesized by combining the texture and the shape extracted from the already trained model. K-nearest neighbor (KNN) classifier, Sequential forward and backward features are used for the synthesis.Experimental results demonstrate the effectiveness of the proposed work (recognizing efficiency 91%).
Keywords: Active shape model, Landmark points, Sign Language, Tamil Language.
Abstract
Design of a Double-objective QoS Routing in Dynamic Wireless Networks using Evolutionary Adaptive Genetic Algorithm
Ibraheem K. Ibraheem, Alyaa A. Alhussainy
DOI: 10.17148/IJARCCE.2015.4935
Abstract: The shortest path problem is studied for finding the shortest route from a specified source to a specified destination in a mobile wireless networks with minimizing the total cost associated with the path. Several QoS measures are proposed to calculate the best path for routing the packets from specific sources to their destination. These measures are end-to-end delay, bandwidth, and No. of hops. The main goal of this work is to solve the problem of route optimization between the sender and receiver in a dynamic mobile wireless networks, and formulating the multi objective QoS measures in such dynamic environment as a multi- objective optimization using weighted sum approach. A new algorithm based on evolutionary multi objective genetic algorithm technique has been proposed and called Adaptive Genetic Algorithm (AGA) to find out the optimal route in dynamic wireless networks that satisfied the multi objective QoS measures. The proposed algorithm is adaptive in the sense that it finds the shortest route even with the dynamic nature of the mobile wireless networks, e.g. moving nodes and a reproduction operator of the proposed algorithm which uses six different selection methods that are changing through the generations of the proposed algorithm and the best selection method is chosen by AGA according to maximum fitness. An experiment has been made for illustrating the behaviour of our proposed algorithm in wireless networks; in this experiment, the AGA has been implemented on double objectives QoS. The AGA is implemented online with predetermined initial population and fitness values. The simulations have been done under MATLAB and Visual Basic environments, and they showed that our proposed AGA performs excellently and adapts quickly to the dynamic nature of the wireless network and satisfying all of the constraints and objective measures imposed on the networks.
Keywords: Adaptive Genetic algorithm, Quality of Service (QoS), double objective optimization, routing, end-to-end delay, shortest path, dynamic networks.
Abstract
Analysis of clustering technique for the diabetes dataset using the training set parameter
R.Nithya, P.Manikandan, Dr.D.Ramyachitra
DOI: 10.17148/IJARCCE.2015.4936
Abstract: The Clustering technique is used to place data elements into related groups without advance knowledge of the group description. The clustering technique belongs to an unsupervised learning and it is used to discover a new set of categories. The clustering technique groups the data instances in to subsets in such a manner that similar instances are grouped together while different instances belong to different groups. This paper represents the performance of three clustering algorithms such as Hierarchical clustering, Density based clustering and K Means clustering algorithm. The Diabetes dataset is used for the comparison of those clustering algorithms based on the performance of execution time and the number of clustered instances.
Keywords: Hierarchical clustering, Density based clustering, K Means clustering, Diabetes dataset, Training set, Clustering.
Abstract
Friendbook: An Efficient Way to Recommend Friends on Social Networks Through Life-Style
Nitish Gaikwad, Ankit Bhanushali, Dheeraj Mishra, Rupali Nirgude
DOI: 10.17148/IJARCCE.2015.4937
Abstract: In this paper, we have presented a literature review of the modern Activity based friend recommendation services. Social networking sites imply friend recommendation Systems in contribution to providing better user experiences. Online friend recommendation is a rapid developing topic in web mining. Current social networking servicing recommend friends to users based on their social graphs and mutual friends , which may not be the most appropriate to reflect a user�s taste on friend selection in real lifetime . In this paper propose a system that recommends friends based on the daily activities of users. Here a semantic based friend recommendation is done based on the users� life styles. By using text mining, we display a user's everyday life as life archives, from which his/her ways of life are separated by using the Latent Dirichlet Allocation algorithm. At that point we discover a similarity metric to quantify the similarity of life styles between users, and as certain users� effect as far as ways of life with a similarity matching diagram. At last, we incorporate a feedback component to further enhance the proposal precision.
Keywords: Activity Recognition; Social Networks; Text Mining; Data Mining; Pattern Recognition.
Abstract
An Effective privacy preserving and Accuracy Constrained Method for Relational Data
Dr.M.Sreedevi, P.Chytanya lakshmi
DOI: 10.17148/IJARCCE.2015.4938
Abstract: Now-a-days, the usage of www has increased and huge amount of data is getting generated and managed in every second, 20-30% of total volume of data contains sensitive information which needs to be managed with data security mechanism. The data should be exposed through proper access control mechanism. To manage sensitive data more over many Privacy Protection mechanisms are implemented which might not claim complete durability every time. In this situation, to pass proper authentication user needs to share different identity disclosure parameters which also are maintained as generalized data. Privacy protection method use suppression and generalization of relational data to anonymized against attribute disclosure. Normally below processes are used to manage these requirements k-anonymity and l-diversity against identity and attribute disclosure. Anyway the data security and privacy is managed based on only the authorized information. The access control paradigm follows k-anonymity and l-diversity satisfying the data privacy. Imprecision bound validation by PPM should pass to manage privacy control. Technique of workload-aware anonymization is one concern for this assignment, but as multiple role based privacy protection does not bring any significance with this approach.
Keywords: Access control, privacy, k-anonymity, privacy preservation.
Abstract
The Role of SSL & SET Protocol in E-Commerce
Rahul Kumar, Arun Kumar Shukla, Ajit Pratap Singh
DOI: 10.17148/IJARCCE.2015.4939
Abstract: This century is the era of online shopping. The number of internet users is rapidly increasing day by day as now internet has reached to every home. This leads to increase in online transaction. E-commerce is also known as electronic commerce or EC. E-commerce refers to the buying or selling of products or services over internet which involve the use of Electronic transaction that reduces the use of paper work. The major issues of E-commerce are to protect assets from unauthorized access. There are lots of shopping websites like flipkart, snap deal, Amazon, paytm etc are asking for personal information like credit card number, password etc and these information�s are transmitted over the web so it is necessary to protect these information. In this paper we study the E-commerce and its model and two most popular protocols SET and SSL which ensures security of transaction made over the internet.
Keywords: E-commerce; SSL; SET.
Abstract
Comparative Analysis of Robot Detection Techniques on Web Server Log
Mitali Srivastava, Atul Kumar Srivastava, Rakhi Garg, P. K. Mishra
DOI: 10.17148/IJARCCE.2015.4941
Abstract: Web robots are software programs which automatically traverse through hyperlink structure of Web to retrieve Web resources. Robots can be used for variety of tasks such as crawling and indexing information for search engines, offline browsing, shopping comparison and email collectors. Apart from that robots can also be used for some malicious purposes like sending spam mails, stealing business intelligence etc. It is necessary to detect robots due to privacy, security and performance of server related issues. Several well-known techniques to detect robots are : robots.txt check, known robot�s IP address, User agent mapping, keywords matching in User agent field, browsing speed, unassigned referrer etc. In this paper we have discussed as well as implemented various robot identification techniques on real server log data and compared their performance for a given dataset.
Keywords: Robot detection, Web server log, Web usage mining, Data extraction.
Abstract
Raspberry Pi Based Human Face Detection
Swathi .V, Steven Fernandes
DOI: 10.17148/IJARCCE.2015.4942
Abstract: Face detection is concerned with finding whether or not there are any faces in a given image and, if present, returns the image location and content of each face. Most face detection algorithms are designed in the software domain and have a high detection rate, but they often require several seconds to detect faces in a single image, a processing speed that is insufficient for real-time applications. This paper describes a simple and easy hardware implementation of face detection system using Raspberry Pi, which itself is a minicomputer of a credit card size and is of a very low price. The system is programmed using Python programming language. Both real time face detection and face detection from specific images, i.e. Object Recognition, is carried out and the proposed system is tested across various standard face databases, with and without noise and blurring effects. Efficiency of the system is analyzed by calculating the Face detection rate for each of the database. The results reveal that the proposed system can be used for face detection even from poor quality images and shows excellent performance efficiency.
Keywords: Face detection, Raspberry Pi, Histogram Equalization, Python.
Abstract
Congestion Control in Multi-Flow Environment Using Multipath Routing Base in MANET
Dr. Vikash Kumar Singh, Devendra Singh Kushwaha, Raju Sujane, Manish Taram
DOI: 10.17148/IJARCCE.2015.4943
Abstract: The multipath route establishment uses the method that discovers multiple multi hops communication between source and destination. Multi-path routing can balance the load better than the single path routing in ad hoc networks, thereby reducing the congestion by dividing the traffic in several paths. This research presents a new approach of Multipath Load Balancing with AOMDV routing protocol and Dynamic Queue based congestion control mechanism for avoiding congestion in network communication flows. In this scheme the store and forwarding capability of nodes are enhanced by varying the queue length according to incoming data. The AOMDV protocol performance is also enhanced to increment the link expiration time after failure the current connection establishment in network. The new connection is established according to the new link expiration time value, by that the possibility of link failure in AOMDV is also minimizes. It means the multipath routing performance in this technique has increases the link expiration time with vibrant queue length method. The multipath routing has no doubt better than the unipath routing and balance the load by proving the alternative path if the already established path are congested. But the performance of AOMDV is improves after adding the proposed scheme. The performance of normal AOMDV is measured on the basis of load handling capability of nodes in network and through performance matrices. The simulation of both the routing techniques is done in ns-2 simulator.
Keywords: Congestion Multipath routing, Dynamic queue, Link expiration time, load balancing.
Abstract
A Study of Mobile Cloud Computing (MCC) & Its Real-Time Application
Rahul Kumar, Arun Kumar Shukla, Ajit Pratap Singh
DOI: 10.17148/IJARCCE.2015.4944
Abstract: Mobile cloud computing is a integrated form of mobile computing and cloud computing, has become industry buzzword and a major research issue in the industry. In recent year mobile application and Smartphone�s device are increasing rapidly. As we know there are so many research are going on mobile clod computing therefore it is necessary to understand the technology to point out future advancement of mobile cloud computing. With the aim, this paper present brief overview on mobile computing and cloud computing and analysis on the mobile clouds computing architecture, its challenges and its real-time applications.
Keywords: Mobile computing; Cloud Computing; Mobile Cloud computing.
Abstract
Design and Implementation of Wireless Sensor Network for Health Care Monitoring in Hospitals via Mobile
Akansha Dhobley, Prof. N. A. Ghodichor, Prof. S. S. Golait, Dr. P. S Prasad
DOI: 10.17148/IJARCCE.2015.4945
Abstract: Health monitoring is one of the emerging areas for computing technologies. Health monitoring via mobile is using the application of mobile computing technologies for amending communication between doctors and patients. As mobile devices have efficaciously become part of our life it can incorporate health care more seamlessly to our everyday life. There have been many recent advances in sensor technologies which enable us to integrate low- power, low-cost devices with emerging intelligent health monitoring systems.. Wireless Sensor Networks (WSN) have attracted much attention in recent years. The applications of Wireless Sensor Network are immense. Applications of Wireless sensor network in healthcare leads to an area called Body Area Network (BAN) or Body sensor Networks. Here we are building a wireless sensor network for health monitoring in hospitals with the use of mobile application. So in the proposed system a central server will be able to read patient�s incoming data from the sensors and send it to the mobile application and it will also send alert SMS in case of emergency.
Keywords: Health monitoring, Wireless Sensor Networks (WSN), Body Area Network (BAN), Mobile application.
Abstract
Three way controlled android Smartphone based robotic vehicle via Bluetooth
Arita Dey, Akash Pal, Sayantan Nandi, Lusika Roy
DOI: 10.17148/IJARCCE.2015.4946
Abstract: Robots are smart machines that can be programmed and used in many areas such as industry, manufacturing, production lines, or health, etc. Today human-machine interaction is moving away from mouse and pen and is becoming pervasive and much more compatible with the physical world. With each new day the gap between machines and humans is being bridged with the introduction of new technologies to ease the standard of living. As the Smartphone era has evolved with innovative android based applications, engineers are improvising them to improve robotic vehicles which diminish the aforesaid abyss. In this paper we have developed a three way control for the robotic vehicle in which we have used Bluetooth communication to interface the microcontroller and the inbuilt sensors in the android Smartphone. According to commands received from android phone, the kinematics of the robot is controlled. The developed robotic vehicle can be used for numerous applications in the future especially in the field of surveillance and security.
Keywords: Robotic Vehicle, Android Smartphone, Bluetooth, Three ways controlled.
Abstract
Security of File through Splitting and Hybrid Encryption Mechanism
Vishu Sharma, Meenakshi Sharma
DOI: 10.17148/IJARCCE.2015.4947
Abstract: The rapid growth of internet and networks applications has given rise to many data security issues. Encryption algorithm plays a crucial role in information security systems. This paper presents the hybrid encryption scheme which combines the fast encryption speed of symmetric algorithm (Blowfish) with the security of asymmetric cipher algorithm (SRNN). The proposed approach includes file splitting and merging mechanism along with hybrid encryption where each slice is encrypted by its corresponding key.
Keywords: Hybrid cryptosystem, File Splitting, SRNN, RSA, Blowfish.
Abstract
A survey of biometrics: features, components, examples and applications
Ruaa Adeeb Abdulmunem Al-falluji
DOI: 10.17148/IJARCCE.2015.4948
Abstract: Biometric is newest technology in the security field. It uses the inherent characteristic to authenticate persons. This in turn will enhance the reliability of the security systems compared to the traditional based authentication systems such as password or code and solve many of the problems that appeared in the traditional based systems. This leads to using biometrics systems widely in many applications . Many features in the human's body can be used as biometrics if they meet specific requirements .Each one of these biometrics have strength and weakness points. This paper will discuss the commonly used biometrics.
Keywords: Biometrics,Authentication,Verification,Identificatin,Feature Extraction.
Abstract
The Art of Creating Software Requirements
Adnan Shaout and Anthony Walker
DOI: 10.17148/IJARCCE.2015.4949
Abstract: The definition of good software requirements has been the topic of numerous debates between software engineers and test engineers for a long time. The purpose of this research is to find out what could be contributing to the various methods and rules/guidelines for writing requirements. In doing this research, we found out that it is not so much that there are different methods to writing requirements it is more so that there is insufficient training on writing requirements. We will go into detail on what the IEEE standard states are the characteristics of well-formed requirements that support our view of how requirements should be formed. We will also touch a bit on how this debate can be clarified.
Keywords: Software Requirements, Test Engineers, Software Engineers, IEEE Standard, Characteristics of Software Requirements.
Abstract
Design and Development of Sensor Networks Interface- Semantic web based Wheat Expert System
Prof. M. S. Prasad Babu, D. Jyothsna
DOI: 10.17148/IJARCCE.2015.4950
Abstract: In recent years sensors have been increasingly deployed in the Agricultural fields to monitor the extremely sensitive environmental and climatic changes. Since temperature and humidity are the key factors that affect the growth of crops, temperature sensor, humidity sensor, light sensor and growth sensor are generally plays key role in Agriculture. Expert systems may be used in agricultural field to offer information about the disease management and cure for the crop, soil management, irrigation level to be maintained for the crop, to suggest suitable seed varieties, quantity of fertilizers to be used and finally to find out the expected yield of the crop. Expert systems interact with the farmers and provide solution for the different problems they face in the field from time to time. Semantic web adds structured meaning to the available information and facilitates the machine readability of information. The power of semantic web over traditional web is data re-usability and more relevant accurate search. Agricultural knowledge is so vast and is in unstructured format. Hence it is necessary to incorporate the semantic web for building and processing the knowledge in a structured and disciplined way. The present paper is aimed at designing and developing a semantic web based wheat expert system with an automatic sensor interface. The system consists of two components namely Information system and Advisory Systems with separate interfaces to both experts and ordinary farmers. The sensor interface is designed using the LM-35 temperature sensor, ADC, 8051 micro controller and MAX 232. Knowledge base is built using ontological structures for the information about the wheat crop with appropriate classes and properties and inference is achieved through SWRL rules. The information system provides the information about wheat varieties, nutrients, diseases, symptoms etc. The user interface takes the average values of temperature and humidity from the observations recorded and calculates the expected yield of the crop using artificial bee colony algorithm.
Keywords: Sensor Networks, Agricultural Sensors, Semantic Web, Expert System, ABC Algorithm.
Abstract
Review Paper on DRINA Protocol
Mankirat Kaur, Bhupinder Kaur
DOI: 10.17148/IJARCCE.2015.4951
Abstract: Wireless sensor network is a collection of large number of sensor nodes which are deployed in an environment measuring various parameters like humidity, temperature and pressure. In wireless sensor networks, routing of data in non-aggregated manner can lead to more energy consumption. To have energy conservation, aggregation of data is effective as it raise data accuracy, remove data redundancy and also reduce communication load. In this paper we have reviewed DRINA (Data Routing for In-Network Aggregation) which is a cluster based approach for data aggregation. It reduces cost of communication and saves energy consumption by building of routing tree, increasing overlapping routes and removing redundant data.
Keywords: DRINA, wireless sensor networks, in-network aggregation, energy consumption, routing tree.
Abstract
Survey on Resource Allocation Mechanisms for MapReduce Clusters
S. Janani, G.R. Anantha Raman
DOI: 10.17148/IJARCCE.2015.4952
Abstract: MapReduce is one of the programming model for processing large amount of data in cloud where resource allocation is one of the research areas since it is responsible for improving the performance of Hadoop.Many resource allocation strategies are discussed that aims to improve resource utilization in Hadoop by focusing on the speculative execution and maximizing the data locality by meeting the deadlines of the job. The implementation is done in Hadoop slot based MapReduce system ex: Hadoop MVR1.
Keywords: MapReduce, Data locality, Speculative execution, Hadoop.
Abstract
Multilevel Encryption using Ribbon Based Technique for Symmetric Key Cryptography
Milit Betai, Neha Katre
DOI: 10.17148/IJARCCE.2015.4953
Abstract: Symmetric key encryption is not given much importance when it comes to cryptography. Substitution ciphers have been used since a long time. Caesar Cipher is a basic substitution cipher that forms the basis of ROT13 and Vigenere cipher. It is the basic symmetric key cryptographic technique with a very simple implementation. However, there arose vulnerabilities to this technique, as the key was just a number and predicting that number was not difficult at all. Keeping this in mind, the goal of our research was to develop a symmetric encryption technique that encrypts the data in a fashion similar to Caesar Cipher and provides a minimal probability of guessing the key and allowing multiple levels of encryption, thus, harboring more security. Here we offer a multiple character keyset that would enhance the number of possible keys and which would in turn reduce the chances of guessing it.
Keywords: Ribbons, Referral Ribbon, Substitution Cipher, Symmetric, Encryption.
Abstract
VNPaaS: Realizing Platform as a Service using Network Function Virtualization
Hrishikesh Arun Deshpande
DOI: 10.17148/IJARCCE.2015.4954
Abstract: The advent of cloud computing is causing a far reaching impact on traditional IT infrastructures and has drastically changed the way traditional businesses operate. Platform as a service is a cloud computing model that provides a platform for application developers and enterprises with all the necessary hardware, software, runtime and development tools that are necessary to build, test and deploy applications without having to worry about infrastructure maintenance and upgrades. But traditional PaaS solutions are inflexible and unsuited for real-time scaling and dynamic bandwidth requirements of today�s enterprises. With network function virtualisation, it�s possible to replace existing network functions with virtualized functions to realise a Virtual Network Platform as a Service model that provides users with run-time scaling, resource pooling, dynamic resource allocation and customization capabilities making it a viable alternative to traditional Platform as a Service solutions.
Keywords: Network Function Virtualization, Platform as a Service, Virtual Network Functions, Virtual Machines, cloud computing, orchestration, customization, scaling.
Abstract
Performance Analysis of FSO System using Nakagami m Fading Channel
Sarita, Nidhi Mittal
DOI: 10.17148/IJARCCE.2015.4955
Abstract: This study carry out the performance analysis of bit error rate of free space optical communication system over Nakagami - m fading channel. In this paper, the performance of free space optical communication in the presence of the atmospheric turbulence is presented. Weak turbulence is modeled as log normal distribution of Nakagami-m channel and strong turbulence is modeled as Gamma-Gamma distribution of Nakagami-m channel. The performance controlling parameters are outage probability and bit error rate. In this case, BER and outage probability is studied with different level of channel turbulence in free space optical communication.
Keywords: Atmospheric turbulence, bit error probability, free space optical system, outage probability, Nakagami m fading channel.
Abstract
RDBMS Data Retrieval with Term and Ranking Search Scheme: A Survey Effort
Mr. Gajanan Patil, Mr.Prof.S.Z.Gawali
DOI: 10.17148/IJARCCE.2015.4956
Abstract: In past years, outspreading word search model to relational data has been a lively part of investigation inside databank and Data bank community. A huge amount of methods have remained projected and executed, but notwithstanding plentiful journals, there remnants a unadorned absence of calibration for scheme assessments. This absence of calibration has occasioned in self-contradictory consequences from dissimilar assessments, and frequent inconsistencies mess what compensations are extended by changed methods. This article presents is survey mark in finding search in RDMS and words built search. Our observation designates that numerous prevailing search practices do not afford satisfactory presentation for accurate retrieval errands. In specific, memory feeding prevents numerous search methods from climbing outside small databanks. Execution time other factors in preceding assessments are of less influence on performance. In ending part article presents the sum up of research to be implemented by us in finding a better parameter for RDMS term based search with a better ranking functions and memory utilization with proper Data structure selection and New parameter CAP for RDMS system developed on MAP(mean average precision).
Keywords: Execution period, Graph Systems Query assignments, Relational Terms Searching with rank.
Abstract
Efficient Data Sharing for Dynamic Groups in Untrusted Cloud Storage
A.Sai Kiran, K.Gnanendra
DOI: 10.17148/IJARCCE.2015.4957
Abstract: The movement to cloud computing is the disruptive change in information technology. Cloud computing begin to have an effect on the modern enterprise the basic service provided by the Cloud is Data Storage Cloud computing affords a cost-effective and efficient solution for sharing group resource among cloud users with the character of low and cost effective maintenance. But the major drawback of cloud computing is sharing data in a multi-owner manner, preserving data and identity privacy from untrusted cloud storage. In this present investigation a secure multi-owner data sharing structure called as Mona, for dynamic groups in the cloud is proposed. Any cloud handler can secretly share data with others through leveraging group signature and active broadcast encryption methods. Also, the overhead storage and encryption computation cost of this scheme are self-determining with the number of revoked users. The security of the proposed scheme was analyzed and demonstrated in this study.
Keywords: Cloud computing, Privacy, Dynamic group, Data sharing.
Abstract
Robust 2D-Novel Smart Antenna Array for MIMO Applications
Veerendra, Md.Bakhar and Vani.R.M
DOI: 10.17148/IJARCCE.2015.4958
Abstract: This paper introduces robust adaptive beamforming algorithm using novel antenna array geometry. The proposed array geometry consists of doubly crossed uniform linear arrays (ULAs) which gives high accuracy beamforming and angular resolution as compared to conventional ULA. Furthermore, use of this geometry to adaptive beamforming algorithms namely LMS, NLMS and proposed variable step size NLMS (VSSNLMS) improves the convergence rate and interference suppression in smart antenna system. This makes the system robust for interferences and can be used in wireless communication applications, where the fast convergence and interference suppressions are major issues.
Keywords: Beamforming, LMS, MSE, NLMS, Smart-Antenna, VSSNLMS.
Abstract
Design and Implementation of a Digital FIR LPF with Variable Pass-Band for ECG Signal using FPGA
Dr. Kamal Aboutabikh, Dr. Ibrahim Haidar, Amer Garib
DOI: 10.17148/IJARCCE.2015.4959
Abstract: In this paper, we discuss a practical way to filter an ECG signal in the background of interference signals. This will be achieved by designing the low pass filter (LPF) with Kaiser window of variable pass-band (four pass-bands) of type finite impulse response (FIR) using a digital programmable device (Cyclone II EP2C70F896C6 FPGA from ALTERA) placed on education and development board DE2-70, this filter is designed by VHDL with Quartus II 9.1 design environment and consists of two filters (LPF) connected on serial. The proposed method depends on keeping FIR filters coefficients constant for all required pass-bands and changing the cut off and sampling frequencies together so that the frequency response remains constant for all pass-bands, just these pass-bands sweep on the frequency domain and thereby the pass-band of the filter will be changed without changing its coefficients. Using FPGA to design digital FIR LPF enable as of realization parallel processing to achieve digital convolution algorithm in the real time, where 1500 operation of adding , shifting, multiplying and dividing can be done in 0.5 ms (sampling period) for digital samples of 10 bits length ,this equivalent 3 million operation per second where the general processor cannot do that.
Keywords: Variable PASS-BAND, ECG, FPGA, LPF, FIR
Abstract
Exemplar Based Super-Resolution Technique for Image Inpainting
Abhijit L. Rakshase
DOI: 10.17148/IJARCCE.2015.4960
Abstract: Image Inpainting is the art of filling in missing data in an image. The purpose of inpainting is to reconstruct missing regions in a visually plausible manner so that it seems reasonable to the human eye. There have been several approaches proposed for the same. In this paper, we present an algorithm that improves and extends a previously proposed algorithm and provides faster inpainting. Using our approach, one can inpaint large regions (e.g. remove an object etc.) as well as recover small portions (e.g. restore a photograph by removing cracks etc.). The inpainting is based on the exemplar based approach. The basic idea behind this approach is to find examples (i.e. patches) from the image and replace the lost data with it. We obtained good quality results quickly using our approach.Image Inpainting is the process of reconstructing lost or deteriorated part of images based on thebackground information.This paper introduces a novel framework for exemplar-based inpainting. It consists in performing first the inpainting on a coarse version of the input image. A super-resolution algorithm is then used to recover details on the missing areas. The advantage of this approach is that it is easier to inpaint low-resolution pictures than high-resolution ones. The gain is both in terms of computational complexity and visual quality. However, to be less sensitive to the parameter setting of the inpainting method, the low-resolution input picture is inpainted several times with different configurations. Results are efficiently combined with loopy belief propagation and details are recovered by a single-image super-resolution algorithm. Experimental results in a context of image editing and texture synthesis demonstrate the effectiveness of the proposed method.
Keywords: Image inpainting, super resolution inpainting, Low-resolution, High Resolution, exemplar-based inpainting.
Abstract
Secure Data Sharing With Key Aggregate Cryptosystem
Pallavi Mathur, Nachiket Mahamuni, Nikhil Gondane, Kaushal Singh
DOI: 10.17148/IJARCCE.2015.4961
Abstract: Cloud storage is a storage of information on-line in cloud that is accessible from multiple and connected resources. Cloud storage is the storage that offers smart accessibility and dependability, sturdy protection, disaster recovery, and lowest price. Cloud storage definitely has important practicality i.e. securely, sharing information with others, with great efficiency. New public�key cryptography is introduced that is termed as Key aggregate cryptosystem (KAC). Key-aggregate cryptosystem yield constant size ciphertexts so that trustworthy relinquishment of decryption rights for a prepared bunch of ciphertexts is feasible. Any set of secret keys may be mass composed and form a single key that encompasses power of all the keys being mass composed. This combination key may be sent to the others over a secured channel, and remaining encrypted files are untouched and remain confidential. The system has great potential to leverage secured use of cloud system.
Keywords: Cloud storage, Data sharing, Ciphertext, Key-aggregate, Encryption.
Abstract
Design of a Low Power D-Flip Flop using AVL Technique
Somashekhar
DOI: 10.17148/IJARCCE.2015.4962
Abstract: Power optimization is a very crucial issue in low voltage applications. This paper presents a design of D-Flip flop circuit using AVL techniques for low power operation. It reduces the value of total power dissipation by applying the adaptive voltage level at ground (AVLG) technology in which the ground potential is raised and adaptive voltage level at supply (AVLS) in which supply potential is increased. The main aim of the design is to investigate the power dissipation for D-Flip flop for the proposed design style. The simulation results show the there is a significant reduction in power consumption for this proposed cell with the AVL technique. The AVLS technique has less power dissipation 1.3480nwatts compared to AVLG technique 2.5729nwatts. The circuit is designed using Mentor Graphics 130nm technology.
Keywords: D Flip-flop, AVL Technique, Low power, Mentor Graphics.
Abstract
A Combined Approach using DWT & PCA on Image Fusion
Harpreet Kaur, Rachna Rajput
DOI: 10.17148/IJARCCE.2015.4963
Abstract: Image fusion is the process that fuses the information from multiple images of the same size. The image fusion results generate new images that contain the contents and most desirable information and characteristics of each input image. The main application of image fusion is merging the gray-level high-resolution panchromatic image and the colored low-resolution multispectral image. The image fusion methods perform well spatially but usually introduce spectral distortion. . Which means that the variation of hue before and after the fusion process has appeared? There is color distortion when the fusion is appeared in the color images. There is human visualization and objective evaluation criteria related problems when the fusion of two images occurred. The Hue, Saturation and the Intensity of the color images effected due to fusion. To overcome the problem of color distortion image fusion is implemented. The image fusion is to generating a new image that enjoys the high-spatial resolution of images and the color information of the Multispectral images. To reduce the color distortion of the images without destroying any factor of the images like Hue, Saturation and Intensity and implement the DWT technique of Image Fusion. To implement the image fusion Multilevel DWT technique is implemented. In this research work DWT is combined with PCA and different parameters like PSNR,MSE,AD,AME etc.
Keywords: PSNR, DWT, MSE, PCA, image fusion etc.
Abstract
Dead Line Scheduling In Grid Computing Environments
R. Ananthi Lakshmi, S.Vidhya
DOI: 10.17148/IJARCCE.2015.4964
Abstract: Grid, it is extensively used in science and technology. It fully provides a resource sharing among different organizations. Now days, grid�s usage is rapidly increasing in industry also. In Dead Line Scheduling creates a fundamental in choosing the right order of task scheduling. In the traditional dead line scheduling such as Earliest Deadline First (EDF), provides a results in consuming more resources. On the other hand, we can use the tasks in decreasing order of their deadlines in Latest Deadline First (LDF).
Keywords: Dead Line Scheduling, Computational Model, Task Model, Redundant Scheduling.
Abstract
Survey on shopping recommendation system with secure online payment
Ajay Mangaj, Aditya Chavan, Pritesh Joshi, Priti Mithari
DOI: 10.17148/IJARCCE.2015.4965
Abstract: Recommendation System is used to recommending to the user. The objective of recommender to assist users to find out items which they would be interested in. However, current ways suffering from such issues as information poorness, recommendation quality, and big error in predictions. The paper tends to take ideas of object normality from psychology and gives a unique Typicality-based Collaborative filtering recommended technique named TyCo. A defining feature of normality-based Collaborative filtering is that it finds �neighbors� of users supported user typicality grouped in user teams. E-commerce market is growing rapidly in last 5 years. The ever increasing quality of online searching, Debit or MasterCard fraud and private data security area unit major issues for patrons, merchants and banks especially within the case of situation where Card Not Present. The paper gives an idea about the shopping recommendation with filtering methods and online payment gateway system using steganography.
Keywords: Steganography, Online shopping, E-Commerce, Encryption.
Abstract
“Evaluation of the effect of Node Movements in Mobile Ad Hoc Networks (MANETs)”
Gurbinder Singh, Sarabjit Singh
DOI: 10.17148/IJARCCE.2015.4966
Abstract: This work, focuses on performance evaluation of reactive, proactive and hybrid MANET routing protocols, namely AODV, DSR, OLSR and GRP. OLSR is designed to work in a completely distributed manner and does not depend on any central entity. The AODV protocol consists of two important mechanisms, Route Discovery and Route Maintenance. It is designed to be self-creating in an environment of mobile nodes, withstanding a variety of network behaviours such as a node movement, link failures and packet losses. The GRP is not so much a distinct protocol as it provides a framework for other protocols. The research is carried out using discrete event simulation environment software known as OPNET Modeller version 14.5. It is one of the most widely used commercial simulators based on Microsoft Windows platform and incorporates more MANET routing parameters as compared to other commercial simulators available. Network performance is evaluated in terms of end-to-end delay, retransmission attempts, network load and throughput. Simulation results shows that the overall performance of proactive protocols performs better than both reactive and hybrid protocols. It is concluded that proactive protocols and hybrid protocols performs better in the case of end-to-end delay. If the performance of the network is evaluated on the basis of the network load, AODV performs better than the DSR, OLSR and GRP.
Keywords: HTTP Heavy browsing, Mobile Ad hoc Networks, OPNET, Mobitiy Models, Routing Protocols.
Abstract
Detecting Shortest Path Using Vehicular Routing Protocol
N. V. Pardakhe, S.S. Dandge
DOI: 10.17148/IJARCCE.2015.4967
Abstract: In recent years, mobile computing and wireless networks have enjoyed a tremendous rise in popularity and technology advancement. The design of smaller and more powerful communication devices is rapidly changing the way humans interact and communicate. Amidst the unprecedented growth of mobile computing, Vehicular ad hoc networks (VANET) have emerged as an import Vehicle field in the wireless arena. Mobile ad hoc network is a collection of mobile nodes that communicates with one another via wireless links without the need for any fixed infrastructure. Due to its dynamic nature, a primary challenge of VANET is the design of effective routing algorithm that can adapt its behavior to frequent and rapid changes in the network. This project will present novel scheme for VANET routing enhancement called the Vehicular Routing Algorithm (VRA). VRA is inspired by the ant-colony optimization heuristics to solve complex problems. It utilizes a collection of mobile agents or �Vehicular� to perform optimal routing activities. These �Vehicular� are simple routing packets that collect and disseminate useful routing information as they travel throughout the network. VRA offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. By combining the capability of reactive routing with distributed and multipath routing mechanism, VRA displays a satisfactory performance in terms of throughput, packet delivery ratio, delay and overhead. Utilizing the benefits of pheromones, third-party reply model, ring search model, two-way route establishment method, VRA enables optimal path routing, fast route discovery and effective route failure handling.
Keywords: VANET, Automated Traffic lights, Traffic Routing, Ad hoc Network, Automation.
Abstract
Study of different types of noise and their effects on digital communications
Azzeddine RIAHI, Sara RIAHI
DOI: 10.17148/IJARCCE.2015.4968
Abstract: During propagation between a transmitter and a receiver, the transmitted signal is often subjected to several phenomena related to the propagation environment. It result during reception, a signal comprised of multiple elementary signals. These elementary signals take different paths and therefore have different propagation times and amplitudes. They thus exhibit phase shifts that may lead to recombination of constructive and destructive ways thus causing a complete disappearance of the signal. The latter phenomenon commonly known as �fading� may affect the performance of mobile communication systems. The fading amplitude of the received signal may follow several statistical distributions such as Rayleigh, Nakagami. In this context, the evaluation of performance of these systems is therefore essential to develop highly efficient systems. As the measures in real environments are very tedious, several methodologies will emulate realistic propagation channels multi paths have been proposed. This in order to characterize the performance of mobile communication systems.
Keywords: fading, noise, channel, Rayleigh, Rice, digital fingerprint.
Abstract
Web Mining Over Cloud – A Prerequisite for Today’s Enterprises
Jitendra Singh Tomar
DOI: 10.17148/IJARCCE.2015.4969
Abstract: This paper surveys web mining techniques to mine information on cloud computing platform. WM is extraction of relevant information from the relics and mannerism recorded by the stakeholders on WWW for knowledge management purpose. The online information resource is very large and organizations are utilizing web content mining and access through the web servers. Web mining techniques and applications are much needed in cloud computing. The effective management of information kept over cloud for knowledge and business management could be achieved if the web mining techniques over virtually integrated warehouse are efficiently practiced by an end users.
Keywords: Web Mining, Data Mining, Knowledge Management, Cloud Mining, Web Usage Mining, Knowledge Discovery.
Abstract
Research and Analysis of WiMax Communication
Mrs. Shallu Kalra, Mrs. Vidhu Kiran
DOI: 10.17148/IJARCCE.2015.4970
Abstract: WiMax means Worldwide Interoperability for Microwave Access. It is the wireless technology and enhancement of 802.16 standards. The forum describes WiMax as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL". WiMax has many salient advantages such as: high data rates, quality of service, scalability, security, and mobility. In WiMax, security is the major issue for transmission of data from end to end. In this research paper we discuss about NS2 used as simulation platform, MAC layer and protocol Architecture of WiMax. Security protocols are essential for secure transmission of data. Throughput and Packet delivery ratio (PDR) can be increased by using security protocols like AES and RSA.
Keywords: WiMax, Cryptography, AES, RSA, PDR.
Abstract
Comparative Analysis of Lung Cancer using Different Medical Modality
Shikha Maheshwari, Krishan Kumar
DOI: 10.17148/IJARCCE.2015.4971
Abstract: In our country there are various problems regarding food, clear water, financial, sanitation, natural, man-made, transportation, hi-tech web, technical, etc but majorly they all are directly and indirectly connected to one factor health and it is a problem for both rural and urban people. But rural people suffer more as they have lack of facilities, knowledge and financial support. Even if rural people have facilities they are unable to take the advantage of it, the reason could be their unwillingness to get it. Rural people generally dedicated to their work and working hours are long for the good wages as they get daily basis like labors. In that scene they get addicted to strong tobacco and smoking which give they short release through the pain, that's why they frequently smoke or eat tobacco after short duration. So we had provided an algorithm approach for comparing lung cancer caused by smoking diseases by different medical modality for rural health using image processing with the help of MATLAB and Simulink Modelling so that we can provide best of the solutions to rural community.
Keywords: MATLAB, Lung Cancer, Simulink Modelling, Medical Modality.
Abstract
LTE Advanced: Next Generation wireless Broadband Technology: LTE Uplink Communication
Micky Maria Boban, Asha Panicker
DOI: 10.17148/IJARCCE.2015.4972
Abstract: Long Term Evolution is both a standard for wireless data communication and an evolution of the GSM standards. To increase the speed and capacity of wireless data networks was the goal of LTE and it was achieved using signal processing techniques and modulations. The IP based network architecture with reduced latency compared to 3G systems is a major advantage. The release 8 was the primary technique and LTE Advanced is the modified version. In this paper an LTE-uplink model is developed and output from each block is obtained. Different modulation techniques are used in this LTE uplink for the transmission of symbols and for every SNR values the BER of BPSK modulation is observed to be closer to the theoretical value and hence BPSK modulation is better than QPSK modulation in both channels.
Keywords: System capacity, Uplink communication, DFT model, Modulation scheme.
Abstract
Retentive privacy and content based on Location queries
C.Rajeswari, N.S.Jagadeesh
DOI: 10.17148/IJARCCE.2015.4973
Abstract: In this paper we present the popularity of location based query services leads to serious concerns on user privacy. The main aim to protect user�s database of location data and query privacy issues. The master of the location information that's, the location server, will not desire to purely send out it's information to all or any people. The location server really wants to possess some handle over its information, considering that the information is actually its asset. We suggest a foremost enhancement providing AES Algorithm security on user security and server security for previous solutions by introducing, the 2 phase method, where the initial step is dependent on oblivious Transfer and the next step is dependent on private information Retrieval, to obtain any risk-free solution intended for the two parties. The solution many of us existing is actually successful and functional in most situations. We implement this solution on mobile devices and desktops. We also implement the Security Model and analyse the security in the context of our protocol, finally we provide the privacy.
Keywords: Location based query, location server, private information retrieval, oblivious transfer.
Abstract
Message Displayed on LCD Screen using GSM and Bluetooth Technology
Savan Shah
DOI: 10.17148/IJARCCE.2015.4974
Abstract: In today�s words displaying message and advertisement is an important part of communication as well as advertisement so here I am trying to display message with smart phone or in form of message. Here the message which is displayed on LCD screen is much authenticated. In this I am using two different technology, GSM and Bluetooth technology for displaying message on LCD screen. Here the main part is Microcontroller 8051 . The microcontroller is interfaced with GSM Modem via MAX232 level convertor. It is used to convert RS232 voltage levels to TTL voltage levels and vice versa. The hardware also has a 64K EEPROM chip AT24C64. This EEPROM is used to store the timings and messages to be displayed.
Keywords: Microcontroller, Bluetooth, Buzzer, LCD screen, Power Supply, Rectifier, message centre,64K EEPROM,MAX232.
Abstract
Using Shortest Job First Scheduling in Green Cloud Computing
Abeer H. El Bakely, Hesham A.Hefny
DOI: 10.17148/IJARCCE.2015.4975
Abstract: Researchers try to solve the problem of energy (the demand go up and the supply is declining or flat) by discovering new resources or minimizing energy consumption in most important fields. In this paper we minimize energy in cloud computing by enhancement green scheduler, a cloud datacenter comprises of many hundred or thousands of networked servers. The network system is main component in cloud computing which consumes a non-negligible fraction of the total power consumption. In this paper we minimize energy in cloud computing by presenting a scheduling approach that is called SJFGC which performs the best-effort workload consolidation on a minimum set of servers. The proposed approach optimizes the tradeoff between job consolidations (to minimize the amount of computing servers) by executing firstly task with minimum arrival time and minimum processing time. We use simulator program is called Green Cloud which is extension to network simulator NS2.
Keywords: Green Scheduling, Data center, Green Cloud, Energy Efficiency.
Abstract
Efficient Video Feature Extraction and Retrieval on Multimodal Search
S.B. Mahalakshmi, Capt. Dr.Santhosh Baboo
DOI: 10.17148/IJARCCE.2015.4976
Abstract: The core research in Content-Based Video Retrieval (CBVR) is to automatically parse video and text to identify meaningful composition structure. To facilitate fast and accurate content access to video data, a video document should be segmented into shots and scenes. Recognizing objects sequence from videos is an important Problem of computer vision applications such as web searching, target recognition, surveillance, crime detection etc. To build an Efficient video retrieval system that focuses on features such as color, texture, shape, motion, Visual text embedded in an image .Multimodal is the capacity of system to communicate with one or more input given in search process, It can text, Image, audio embedded in it with signals based, Text embedded in an image. Thus it provides potentially accurate results. These results are used in video searching, video surveillance, text embedded in image .In CBVR, a Video is segmented for its preprocessing Key Frames are used for Feature Extraction. Then clustering and indexing is done with k-means clustering HCT(Hierarchical Clustering Tree),Then Similarity matching is done.
Keywords: Content-Based Video Retrieval, HCT (Hierarchical Clustering Tree), Keyframes, Multimodal.
Abstract
Hybrid Authentication Technique
Yash Khandelwal, Jay Shah, Shaunak Shah, Neha Katre
DOI: 10.17148/IJARCCE.2015.4977
Abstract: The most common type of computer authentication is using alphanumeric characters. This method has significant drawbacks as users tend to pick passwords that are easy to guess. To overcome this problem, some researchers have developed authentication methods that use images as passwords which is known as graphical password. Using graphical password, users click on images rather than entering keywords or alphanumeric characters which proves to be more beneficial in order to overcome the shoulder surfing attack. The authentication done using graphical password is called as graphical password authentication. This authentication strategy has been designed to make the password more memorable and provides a high level of security. In this study, we have proposed a new strategy where the user has to initially choose a certain number of images as his/her password and with each image the user has to enter the corresponding string for that image. During the log-in, the user will be displayed a grid consisting of random images including the first image of the password. The user has to enter the location of the first image along with the string corresponding to that image and continue till the complete password is authenticated.
Keywords: Graphical authentication, textual, password, security.
Abstract
Human Identification by Classifying the Features of the Sclera Region of the Eye
Therese Yamuna Mahesh, Dr.K. L. Shunmuganathan
DOI: 10.17148/IJARCCE.2015.4978
Abstract: Sclera based recognition is identification of a person using the features of sclera region of the eye. This method allows the use of existing imaging systems to acquire the image of the sclera region and identify people. Assuming that the entire sclera region was enrolled for matching, off-angle eyes reveal more of the sclera vein pattern for matching. This method does not require frontal gaze images a necessary condition. Thus, even an individual who was actively attempting to avoid detection or recognition by looking away from the matching system would be unable to avoid presenting a valid biometric pattern for identification.
Keywords: Sclera segmentation; Vein pattern enhancement; Feature extraction; classification, multilayer perceptron.
Abstract
Virtual Wardrobe and Fitting Station for Apparel Sales using Real-Time Image Processing
Nestor Lobo
DOI: 10.17148/IJARCCE.2015.4979
Abstract: The e-Commerce boom has greatly changed the process through which a consumer purchases goods and services. The driving force behind this shift from brick and mortar storesis the sheer convenience of procuring itemsonline. However, consumers are unable to really discern their own appearance in the clothing available from images on a website and are hence hesitant towards such purchases. This paper and its implementationis an attemptto offer a resolution to this issue and provide the consumer with the ability to �visualize� themselveswearing garments as they would in a store mirror. With the use of Computer Vision techniques, it is possible to achieve a real-time implementation of the project.
Keywords: Image Processing, Augmented Reality, Computer Vision, Object Recognition, Open CV.
Abstract
SaaS: Privacy Data Auditor in Private Cloud Computing
Gadekar Anant, Dr. S. Lomate, Prof. Saad Siddiqui
DOI: 10.17148/IJARCCE.2015.4980
Abstract: Cloud Computing has scalable and effective architecture for service provide such as IaaS, PaaS, SaaS. For data storage in cloud it not depends on local hardware and software environments. The Management of hardware and software are depends on remote server and enjoying the service on demand. Service security risks are demanded correctness of the data in cloud. To overcome the problem the privacy data auditor, we propose in this paper a flexible distributed storage integrity third party data auditing mechanism, utilizing the randomized homomorphism token generation and distributed encrypted data with error recovery. The proposed design allows users to audit the cloud storage with data center with low cost of computation and lightweight communication. The Proposed model allows the user to inset, delete and update its data to data center.
Keywords: Cloud Service, correctness of data, error recovery, Token generation, Data Auditor, Cloud Computing.
Abstract
Segmentation of Brain Stroke Image
Abdulrahman Alhawaimil
DOI: 10.17148/IJARCCE.2015.4981
Abstract: Stroke is the 4th leading cause of death in the US, with one person dying every 4 minutes as a result. Approximately 800,000 people have a stroke each year; about one every 4 seconds. Strokes occur due to problems with the blood supply to the brain; either the blood supply is blocked or a blood vessel within the brain ruptures. Due to the increase in misdiagnosis in medical for example misdiagnosis of stroke in brain. This Led to make correct medical diagnosis through many ways. However, it is not easy to correctly diagnose the stroke. In this paper our aim to present a foundational approach to assisting physicians when making medical diagnose for brain stroke. Brain stroke has been detected using image segmentation. The researcher use Matlab image processing software to analyze brain stroke image captured from magnetic resonance imaging (MRI).
Keywords: Stroke, Brain, Image Processing, Matlab and Segmentation.
Abstract
Literature Survey of MANET under Blackhole and Grayhole attack
Tejasvi Thanvi, NeerajArora, Piyush Vyas
DOI: 10.17148/IJARCCE.2015.4982
Abstract: A mobile ad hoc network (MANETs) is infrastructure-less network where nodes communicate with each other without any centralized administration. MANETs are prone to various kinds of security attacks due to its nature as mobile and open media. Blackhole and Grayhole are one of them. The impact of both attacks is most drastic. In both attacks, attacker attracts traffic by claiming that it has shortest route to the required destination and then simply drops the packets. As a result, efficient techniques to detect and prevent blackhole and grayhole attack are needed. In this paper, a review on different existing techniques for detection and prevention of blackhole and grayhole attack are presented.
Keywords: MANET; OLSR; AODV; ZRP; Black hole attack; Grey hole attack.
Abstract
Implementation of an Investment Information System Based on Google Maps API
Sayed Ahmed, Mohammed Badawy, Eman Zidan, Romani Farid Ibrahim
DOI: 10.17148/IJARCCE.2015.4983
Abstract: Obtaining more accurate information of investment chances and the most suitable places for each investment in a specific country are the most concerning things for investors, especially for foreign investors. In this paper, we constructed an information system for investment in Egypt using online map services such as Google Maps API. Based on J2EE platform, adopting technologies of Google Maps API, JavaScript, Liferay Content Management System, SQL Server 2014, and JSP the system was implemented. The system was tested over different platforms such as Microsoft Azure Cloud, VM on Cloud, and on a private remote server. Also, query time at each platform is measured.
Keywords: Investment Information System; Google Maps; Azure Cloud; VM; Remote Server; Liferay.
Abstract
Crawdy: Integrated crawling system for deep web crawling
Mangesh Manke, Kamlesh Kumar Singh, Vinay Tak, Amit Kharade
DOI: 10.17148/IJARCCE.2015.4984
Abstract: As deep net grows at a really quick pace, there has been multiplied interest in techniques that facilitate ef?ciently find deep-web interfaces. However, because of the massive volume of net resources and also the dynamic nature of deep net, achieving wide coverage and high ef?ciency may be a difficult issue. We tend to propose a two-stage framework, specifically Crawdy, for ef?cient gathering deep net interfaces. Within the ?rst stage, Crawdy performs site-based sorting out centre pages with the assistance of search engines, avoiding visiting an oversized variety of pages. To realize additional correct results for a targeted crawl, Crawdy ranks websites to order extremely relevant ones for a given topic. Within the second stage, Crawdy achieves quick in-site looking by excavating most relevant links with associate degree accommodative link-ranking.
Keywords: Two-stage crawler, Deep web, Adaptive learning.
Abstract
Shadow Detection in Single Image using Color Spaces
Harpreet Kaur, Navdeep Kaur
DOI: 10.17148/IJARCCE.2015.4985
Abstract: A shadow basically is a sort of image produced when light is blocked. A shadow generally takes up most of the space behind an opaque item with light right in front of it. Shadows often introduce errors in the performance of computer vision algorithms, such as object detection and tracking. For better performance, there is need to detect shadow from image and remove it to get shadow free image. This paper proposes a simple method to detect shadow from images. In this paper LAB color space is used to detect shadow. Here L means lightness, A and B are two different color dimensions. Working with the Lab color space includes all of colors in the spectrum, as well as colors outside of human perception. This paper discusses all the steps to be carried out in achieving the desired objective i.e to detect the shadow from image by using some simple steps.
Keywords: Shadow detection, shadow removal, LAB color space, illumination.
Abstract
Bio-Medical Image Enhancement using Counter Let Transformation & Bacterial Foraging Optimization
Er. Gurpinder Kaur, Er. Aashima
DOI: 10.17148/IJARCCE.2015.4986
Abstract: Medical imaging is the technique and process of creating visual representations of the interior of a body for clinical analysis and medical intervention. This transformation use different decomposition filters and reconstruction filters for the process of image enhancement. Contour let transformation & BFOA Algorithm is used in this work. The contour let transformation has been used for the process of image enhancement. The contour let utilize LP and FB decomposition filter to divide the image into different segments. These segments have been enhanced independently using different contour let transformation equations. After the implementation of contour let transformation the BFO algorithm is implemented for optimization process.
Keywords: Medical Image Enhancement, Counter let Transformation, BFOA, PSNR, MSE, EPI, Co-relation.
Abstract
SQL Injection Attack Prevention for Web Applications
Prem Shanker Dwivedi, Atma Prakash Singh
DOI: 10.17148/IJARCCE.2015.4987
Abstract: Presently web users heavily depend on database- driven web applications for an increasing amount of activities, such as banking, reservation and shopping. When performing such activities, we entrust our personal information to these web applications and their underlying databases. Web applications are often vulnerable to attacks, which can give an attacker complete access to the applications� underlying database. In an SQL Injection Attack, an attacker attempts to exploit vulnerabilities in custom web applications by entering SQL code in an entry field such as a login. If successful, such an attack can give the attacker access to the data on the database used by the application and the ability to run malicious code on the Web site. Attacks occur when developers combine hard-coded strings with user-provided input to create dynamic queries. Intuitively, if user input is not properly validated, attackers may be able to change the developer�s intended SQL command by inserting new SQL keywords or operators through specially crafted input strings. As the SQL Injection Attack passes through all the stages as like a normal request from genuine user the core components of the server may not be able to detect the attack on the Database. Several methods have been proposed to detect and prevent SQL injection attacks. We devise a method that uses defensive coding and secure hash algorithm to prevent SQL injection attacks. This method is illustrated by overview, diagrams and step by step procedure for implementing the technique to protect web application against SQL Injection. We show that this technique can be used effectively to prevent SQL Injection Attacks through bypass authentication in web application without degrading the system�s performance. Finally the method is implemented by using a web application and MySQL database.
Keywords: SQL, Hash, Web application, Database, vulnerable.
Abstract
Plant Disease Identification using Segmentation Techniques
S. Nagasai, S. Jhansi Rani
DOI: 10.17148/IJARCCE.2015.4988
Abstract: Plant diseases are the major cause of production in agricultural and medicinal industry worldwide. It leads to economic losses. Monitoring of health and detection of diseases in plants and trees is a critical issue. This thesis describes a method for identification of diseased rose plants based on some important features extracted from its leaf images. The most significant part of research on plant disease to identify the disease based on CBIR that is mainly concerned with the accurate detection of disease of rose plant. We present an approach where the leaf is identified based on its leaf features such as Color, shape using Color histogram and edge histogram. The combination of CBIR, Canny edge detector and HSI Color model identifies the disease accurately.
Keywords: Segmentation, Edge detection, canny algorithm, Edge histogram, HSI histogram, SVM classifier.
Abstract
Improved EF-Leach Routing Protocol To Extend Network Lifetime
V. Ramatulasi, S. Jhansi Rani
DOI: 10.17148/IJARCCE.2015.4989
Abstract: Implementing energy-efficient and fault tolerant routing protocols for Wireless Sensor Networks (WSNs) applications such as, seismic monitoring, battlefield surveillance and civil structural health monitoring is a great challenge due to the continuous change of the network topology. Moreover sensor nodes are prone to energy drainage and failure in WSNs because of harsh environment. Therefore, energy-efficient and fault tolerant are essential issues for WSNs. Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is one of the efficient and important protocols for routing in WSN, which maintains balanced energy consumption. ; EF-LEACH proposes vital solutions to some shortcomings of the pure LEACH. EF-LEACH provides network fault tolerant and achieves reliability and quality of service. But EF-LEACH is suffers with low energy, delay and low network lifetime. So in this paper we modified the EF-LEACH by adding two cluster heads in each cluster. The proposed approach will improve the network life as never the cluster head will die. As a cluster head will die it will be replaced by its secondary cluster head.
Keywords: Clustering, LEACH, Energy Efficient and fault-tolerant LEACH (EF-LEACH) protocol, two cluster heads, Wireless Sensor Network.
Abstract
A New Methodology to Avoid Deadlock with Dining Philospher Problem in Rust and Go System Programming Languages
Tata A S K Ishwarya, Dr.R.China Appala Naidu
DOI: 10.17148/IJARCCE.2015.4990
Abstract: Operating System is playing a major role now-a-days. Operating System acts as a interface between hardware and user. So when number of processes are increased and resources are in limited state then deadlock occurs .To avoid deadlock we have different approaches like dining � philosopher problem one of the approach to omit deadlock concept. In this paper we focus mainly on obtaining deadlock free solution to the dining � philosopher problem. The solution mainly imposes the restriction that a philosopher may only pick the chopsticks if both of them are available. RUST and GO system programming language are used in the coding part. In this paper we also try to justify why Go is widely used than Rust by providing the values for following details program source code details , CPU Seconds, Elapsed seconds, Memory KB Code B and CPU Load.
Keywords: RUST, GO, dining � philosopher problem, program source code, CPU Seconds, Elapsed seconds, Memory KB Code B, CPU Load.
Abstract
A Survey on Opinion Mining for Extraction of Opinion Word and Opinion Target
D. Menaka, E. Saravana Kumar
DOI: 10.17148/IJARCCE.2015.4991
Abstract: Data mining - an analytical process designed to explore data in which the opinion mining deals with the computational treatment of opinion, sentiment and subjective in text. The main application of opinion mining is collecting the online reviews about the product, social networks informal text. The research problem is extracting the opinion targets and the opinion words and detecting the opinion relations among the words. A novel approach based on the partially supervised alignment model for identifying the opinion relations as an alignment process have been proposed to satisfy the long span relations. To precisely mine the opinion relations among words, the Word Alignment Model (WAM) is used and to progress the error propagation, the graph based co-ranking algorithm is motivated. By comparing with the syntax based method, the word alignment model effectively reduces the parsing errors and the co-ranking algorithm decreases the error probability. The datasets CRD, COAE 2008 and Large are used in various methods. The survey shows the algorithm effectively outperforms when compare to previous methods.
Keywords: Data mining, Opinion mining, WAM, Opinion word, Opinion target.
Abstract
Integration of the Data Distribution Service middleware protocol in an SCADA system
Ioan Ungurean, Nicoleta Cristina Gaitan
DOI: 10.17148/IJARCCE.2015.4992
Abstract: SCADA systems are widely spread in automation, monitoring and control systems for industrial processes. These systems are used to develop the factories of the future. Currently, the most SCADA systems allow data sharing only within a local network. With the development of the Internet of Things concept, it was started to be used in the systems for the factories of the future. One of the most powerful middleware systems used for the Internet of Things is these based on the DDS middleware systems. In this paper, it is presented the integration of the DDS middleware based systems within an SCADA system in order to enable the Internet of Things concept.
Keywords: Internet of Things, middleware, data distribution service, SCADA.
Abstract
A Survey on Concept based Pattern Discovery for Text Mining
Muthuvalli .A.R, Manikandan.M
DOI: 10.17148/IJARCCE.2015.4993
Abstract: Text Mining is the technique that helps users find useful information from a large amount of text documents on the web or database.Most popular text mining and classification methods have adopted term-based approaches. The term based approaches and the pattern-based method describing user preferences; yet, how to effectively use large scale patterns remains a hard problem in text mining. This paper discovered two challenging issues like low-support-problem and misinterpretation problem, to make a breakthrough in these challenging issues, presents an innovative model that is concept-based model. A concept-based mining model that relies techniques on the analysis of both the sentence based and document based concept analysis to overcome the issues of low-support-problem and misinterpretation problem and to improve the effectiveness of using and updating discovered patterns for finding relevant and irrelevant documents.
Keywords: Text mining, Text feature extraction, Text classification, Pattern mining.
Abstract
Communication between Cloud-of-Clouds Environment
Nitesh Khandare, Dinesh Yadav
DOI: 10.17148/IJARCCE.2015.4994
Abstract: In promotion of cloud brokers for correspondence between distinctive cloud service providers, and the cloud-of clouds region signifying the joining of diverse clouds- including clouds offering diverse reflections and administrations introduce new difficulties to software engineers. Really, while help for creating specific sorts of uses to run in distinctive individual cloud bases is gradually getting to be satisfactory, there is little backing for programming applications that run over a few clouds or sorts of clouds. Blend of use, Data-centres, and programming procedures in the multi-cloud environment postures various troubles to engineers working on frameworks. Different cloud suppliers offer unique correspondence abstraction, and applications shows different correspondence architecture. By abstracting from hardware addresses and lower-level communication.
Keywords: Cloud Computing; Communication; Cloud-of-Clouds; Brokers; Cloud Service Providers.
Abstract
A Survey On Secure Data Transmission Over Cluster Based Wireless Sensor Networks
Amsapriya.S, Geetha.D
DOI: 10.17148/IJARCCE.2015.4995
Abstract: Clustering is an effective and practical way to enhance the system performance of Wireless Sensor Networks (WSNs). In WSNs, it is highly a difficult task to achieve secure data transmission. In existing system, some of the protocols such as SecLEACH, GS-LEACH, and RLEACH were used, but orphan node problem exists. Thus by using these protocols, the orphan node problem is solved due to Node-to-node communication. Secure data transmission for Cluster �based WSNs (CWSNs) can be provided with help of protocols. In existing system, two secure and efficient Data transmission protocols namely SET-IBS and SET-IBOOS scheme were proposed SET-IBS has a protocol initialization prior to the deployment and operates in round communication. SET-IBOOS operates similarly to the previous SET-IBS. The feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirement and security analysis various attacks. In this paper, a modified protocol SET-IBS has proposed that formed dynamically, randomly and periodically. Thus the probability of two nodes will share a key to orphan rate of the orphan node problem. SET-IBOOS system lifetime will be increased. The time of FND in both SET-IBS is shorter than that of LEACH protocol due to the security overhead on computation cost of the IBS process.
Keywords: WSNs, SecLEACH, GS-LEACH, RLEACH, CWSNs, SET-IBS, SET-IBOOS.
Abstract
Nutrient Management System for Paddy Based on Multi Linear Regression
B. Karteek, V. Valli Kumari
DOI: 10.17148/IJARCCE.2015.4996
Abstract: Rice is the most important food crop of India, extend over one-fourth of the total cropped area and providing food to about half of the Indian population. Fertilizers are an important input for producing sufficient supplies of rice to meet increasing demands. Excess application of fertilizers can have deleterious effects on environment. Therefore, optimum amount of fertilizers should be used. The optimum fertilizer management of a crop depends on crop yield. The quantity of fertilizer application is determined by the target yield and the amount of nutrients required by the crop. In the proposed method, extension agents and farmers are provided with an advice on crop and nutrient management, matching their particular farming conditions by predicting the target yield. Multi linear regression algorithm is used to forecast the crop yield.
Keywords: Multi linear regression, Nutrients, Fertilizers, Nutrient Management System.
Abstract
A Clustering Based Performance Evaluation System for MGNREG Scheme
Ch. Geethanjali, V. Valli Kumari
DOI: 10.17148/IJARCCE.2015.4997
Abstract: The Indian government is introducing many schemes for the welfare of poor but they are not reaching them in a proper and effective way. There is an uncertainty or lack of performance analysis in implementation of schemes. Mahatma Gandhi National Rural Employment Guarantee Scheme (MGNREGS) is one of such schemes implemented by the government of India which aims at providing employment to the poor in rural areas by assigning local works to them. Though the scheme is implemented throughout the country, there is uncertainty in analyzing its impact on rural people. So a performance evaluation system is useful for the government to analyze performance and success of scheme in villages. This paper describes a performance evaluation system on the data collected from www.nrega.gov.in web portal for the district of Visakhapatnam. Suitable statistical and data mining techniques are applied on this data to evaluate the performance of scheme for the district of Visakhapatnam.
Keywords: Clustering, Enhanced k-means, MGNREGS.
Abstract
A Secure Image Steganography Technique Based on Kekre’s Algorithm
Priyanka Jagota, Er. Surbhi Gupta
DOI: 10.17148/IJARCCE.2015.4998
Abstract: The security of data is a critical factor for solving the problem of stealing, modifying and distributing the intellectual properties in an unauthorized way. Steganography can resolve this issue. Steganography is the science of hiding communication in which secret data or message is embedded into a host signal such as video, image and audio. In this paper, we have improved modified algorithm which is based on LSB technique. This improved modified technique has increased the embedding capacity and quality of stego image as compared to the DCT and DWT technique. The simulation results of improved modified algorithms are compared with DCT and DWT which gives us high PSNR value and low MSE values. Thus, it is clear that in proposed algorithm we can embed large images and use one time random password for security purpose. To measure the quality of stegoimage we use parameters such as PSNR, MSE, SSIM, and Correlation.
Keywords: Steganography, Improved Modified Kekre�s algorithm, PSNR, SSIM, MSE, One Time Random Password.
Abstract
A Novel Fuzzy Rule Based Hybrid Technique for Image Segmentation
Sudhanshu Vashistha, Er. Surbhi Gupta
DOI: 10.17148/IJARCCE.2015.4999
Abstract: Image segmentation is the process of partitioning a digital image into multiple segments to simplify its representation and converting it into something that is more meaningful and easier to analyze. Main goal of this paper is to segment a medical image using hybrid and fuzzy techniques to target the part that is to be diagnosed. It is difficult to analyze a medical image because of very similar grey levels or intensity values. Fuzzy is combined with hybrid segmentation technique to resolve ambiguities in the presence of insignificant data. The proposed algorithm uses different rules to resolve the regions which have similar edges. The results are evaluated on the basis of time, variation and accuracy of the segmented image. Efficiency achieved is satisfactory.
Keywords: Hybrid Segmentation, KFCM, FCM, Fuzzy Rule Based Segmentation.
Abstract
Performance Analysis of Optimize AODV and AODV Routing Protocol
Amrapali Arya, B.P. Chaurasia, S.K. Gupta
DOI: 10.17148/IJARCCE.2015.49100
Abstract: An Ad-hoc mobile network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration hence lacking of permanent source of energy. To fulfill the energy requirement independent mobile devices are entirely dependent on battery power. One of the most widely used reactive protocols is AODV. In AODV there is two phases called route discovery and route maintenance. In the conventional AODV routing protocol, in the route Discovery phase, source node forward the route request message (RREQ) to find out path to the destination node. The intermediate nodes having less lifetime or energy also forward RREQ but after expiring their lifetime they are unable to send route reply message which results unnecessary RREQ rebroadcast, less packet delivery ratio (PDR) as well as throughput & more end to end delay. Solution to above problem is given in this paper, in optimize-AODV routing protocol the node does not forward RREQ unless there is sufficient energy (battery lifetime), and until the node density in its surrounding exceeds a particular threshold. The Result obtained using the network simulator NS-2 demonstrates how little changes in the principle of the AODV protocol can completely balance utilization among mobile devices of the network which increases the packet delivery ratio as well as increase the throughput.
Keywords: Mobile Network, AODV, Energy Efficient routing protocol, battery lifetime, QoS.
Abstract
New Trust Model for Online Auction Depend on Intelligent Swarm
Eng. Fawzeya M. A. Alhallaq, Yaquob H. A. Alkandary
DOI: 10.17148/IJARCCE.2015.49101
Abstract: Online auction is so necessary today because millions of dollars change daily through this market .this allows fraud to occur by malicious users , so trust relationships is important ,this paper investigate new trust model for C2C auction market, proposed a framework depend on seller rating , analysis for Increase Price and using social network to ask about participants than store all in data base than using on swarm intelligence such as Ant colony optimization and Particle swarm Optimization for more high performance.
Keywords: Trust Model, Online Auctions, Rating, Social Network, Ant Colony Optimization.
Abstract
Decision Support Information System for Crop Advice and Water Management
A. Pravallika, V. Valli Kumari
DOI: 10.17148/IJARCCE.2015.49102
Abstract: Decision support information system (DSIS) is a system that analyses raw data and presents the information for the decision makers and assists them in making decisions quickly and accurately. This paper deals with decision support information system for crop advice and water management in Narava Basin, Visakhapatnam district. This proposed system is implemented using artificial neural network based Back-propagation algorithm. The objective of the proposed DSIS is to suggest the type of crop that best yields for a given area and season based on the parameters such as soil type, rock type, rainfall, and humidity.
Keywords: DSIS, Back propagation, Crop advice, Water Management.
Abstract
A Critical Review of Cryptographic Hash Functions
Smriti Gupta, Prof. Sandeep Kumar Yadav
DOI: 10.17148/IJARCCE.2015.49103
Abstract: The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.
Keywords: Message Digest (MD�S), Secure Hash Algorithm (SHA), Pseudo Random Function Families (PRFs), Message Authentication Codes (MACs).
Abstract
Analysis Methods for Search Engine Optimization
Dinu.D, P.Vijayakumar
DOI: 10.17148/IJARCCE.2015.49104
Abstract: Analysis Methods for search engine optimization can be described as a cluster of strategies and techniques used to SEO friendly, (Browser, Mobile, Architecture) Quality and increase the amount of visitors to a website by obtaining a high-ranking position in the search results page of a search engine (SERP) .This review paper things to see different analysis methods to be taken into concern while performing SEO for a website. So the primary goal of SEO Analysis methods is to build the seo friendly website and increase the visitor traffic to your website and convert them to your potential customers.
Keywords: Search Engine Optimization (SEO), Analysis, Testing, Website Optimization.
Abstract
Distributed Databases Rules of Mining in the field of Association
K.Rajeshwar Rao, A.Prakash, B.Venkat Ramudu
DOI: 10.17148/IJARCCE.2015.49105
Abstract: Association Rule mining is one among the data mining technique employed in distributed databases. This technique disclose some attention grabbing relationship between locally massive associate degreed globally massive itemsets and proposed an algorithm, Fast distributed mining of association(FDM) , unsecured distributed version of Apriori algorithm and generates a low range of candidate sets and well reduces the amount of message to be passed at mining association rules. Two secure multi party algorithms are main ingredients in our protocol. One that computes the union of private subsets that every of the interacting players hold, and another that tests the inclusion of element by one player in a subset held by another. This protocol offers increased privacy with relation to the protocol and additionally, it is less complicated and considerably a lot of efficient in terms of Communication rounds, communication cost and computation cost.
Keywords: Privacy Preserving Data Mining, Association Rules, Distributed Databases.
Abstract
Smart Warehouse: An RFID-IoT Approach
Deepak, Amitav Shaw, Biswajit Nayak
DOI: 10.17148/IJARCCE.2015.49106
Abstract: Efficiency of a warehouse plays a pivotal role in the product delivery cycle, both in terms of cost and time. With the advent of RFID in this field, though the efficiency has increased by the use of RFID in locationing and tracking of the items, general functioning of the warehouse has not utilized the concept of RFID in its entirety. The system presented here attempts to use the RFID technology in order to include the basic functions like temperature, light regulation, etc in the existing infrastructure. Also, the paper covers IoT view to connect the devices to the web by exploiting the uniqueness of the RFID identifiers (EPC).
Keywords: RFID (Radio Frequency Identification), IoT (Internet of Things), EPC (Electronic Product Code), AC (Alternating Current), DC (Direct Current), I2C interface (Inter Integrated Circuit), Internet Protocol version 6 (IPv6).
Abstract
Packet Scheduling in Wireless Sensor Networks using Dynamic method
Meethu M B, Ayana Ajith
DOI: 10.17148/IJARCCE.2015.49107
Abstract: Real time packets should be transmitted immediately as many as possible. But the packets which transmitted from nodes which is far away from the base station should not delay. so in dynamic packet scheduling the real time and nonreal time packets are treated separately. Three priority queues are used, in which highest priority used for real time packets second priority for remote nonreal time packets and last one for local nonreal time packets. This reduces the end to end delay and average waiting time.
Keywords: Wireless sensor nodes, priority queue, delay.
Abstract
Encryption of RGB image using Arnold transform and involutory matrices
Anand Joshi, Maneesha Kumari
DOI: 10.17148/IJARCCE.2015.49108
Abstract: The security of image has become an important topic in the process of storage of an image and transmission of image over an unsecured channel such as internet. This paper proposes a new approach for colour image encryption and decryption using involuntary matrix associated with Arnold transformation. In this paper computer simulation with standard examples and the experimental results are given to support the robustness of the scheme. Sensitivity analysis and a comparison between earlier proposed techniques with our proposed approach is also given in this paper.
Keywords: Colour image encryption, Colour image decryption, involutory matrix, Arnold transforms, cryptosystem.
Abstract
FNDRA: Failure or Dead Node Detection and Recovery Algorithm for Wireless Sensor Networks
M.Arun Sathya, V.Nellai Nayaki
DOI: 10.17148/IJARCCE.2015.49109
Abstract: Recently large numbers of applications are developed in wireless sensor networks with more numbers of portable sensor nodes to increase the quality of service of such applications. The failure occurred in sensor nodes typically affects the quality of service of WSNs.This algorithm is a combination of discrete round trip delay & round trip path algorithm and genetic algorithm. The combination of these algorithms are used to preventing traffic in networks and also provides better performance improvement, less delay and less packet loss rate. The simulations are done in network simulator 2 and results shows that this method provides better performance compared with existing systems.
Keywords: QoS, Round trip path, Round trip delay, genetic, chromosome.
Abstract
Implementing Data Aggregation to Improve Energy Efficiency in Wireless Sensor Networks
Snehal Lonare, Dr. A. S. Hiwale
DOI: 10.17148/IJARCCE.2015.49110
Abstract: Wireless sensor network consist of spatially distributed autonomous sensor nodes to monitor physical or environmental conditions (i.e. temperature, sound, atmospheric pressure etc.) for various applications. The major designing issue with WSN is resources utilization. Subsequently, work will be carried out on clustering, routing and securing node�s information for data transmission. The proposed work will be focus on minimizing power utilization during the data transmission in wireless sensor network. A data aggregation with different methods will be investigated for reducing power consumption.
Keywords: Multi Level Network Data Aggregation, clustering methods, energy efficiency, wireless sensor network.
Abstract
Design and Development of Semanctic Web based Guava Expert System for Disease Classification
M. Surendra Prasad Babu, Dasari Siva Krishna
DOI: 10.17148/IJARCCE.2015.49111
Abstract: Neural net is an artificial representation of the human brain that tries to simulate the learning process. Artificial Neural Networks (ANN) architecture is a Multilayer Perceptron (MLP) network, widely used for solving problems related to data classifications, implemented in computer programs which involve large number of necessary calculations. Expert Systems are used to simulate human expert for solving a variety of engineering problems. Normally acquiring knowledge is a big problem in developing the expert systems. In this paper a three layered artificial neural network is used for identifying the disease of the Guava crop. A critical study is conducted for understanding the semantic web stack and applied to design and develop a �Semantic Web Based Guava Expert System". The Guava expert system has two modules namely, information system and expert advisor system. The Guava crop Information system provides some semantic information about Guava varieties, nutrient management, pest and disease management, weed management and post harvesting techniques, whereas advisory system takes inputs from the farmer and processes it using back propagation algorithm to identify the disease.
Keywords: URIs, Resource Description Framework, RDF schema, Ontology, Artificial Neural Networks, Back Propagation Algorithm.
Abstract
Interaction K-means Clustering for Finding Similar Interaction Patterns among Brain Regions
S. Bencyangel, J. Dhivya Merlin
DOI: 10.17148/IJARCCE.2015.49112
Abstract: Brain is an important part, which controls all the functions of the human body. Brain activity is the only resource to understand whether any brain disorders exist or not .Functional Magnetic Resonance Imaging (FMRI) paves the way to study about the brain functions. But the information content from that is large in volume and complex and so the data requires some effective and efficient data mining techniques. To understand the complex interaction patterns among brain regions novel clustering technique is proposed.The objective is to assign objects exhibiting a similar intrinsic interaction pattern to common cluster. Based on this novel cluster notion, interaction K-means (IKM) is proposed, an efficient algorithm for partitioning clustering. IKM simultaneously clusters the data and discovers the relevant cluster-specific interaction patterns. The results on two real FMRI studies demonstrate the potential of IKM to contribute to a better understanding of normal brain function and the alternations characteristic for psychiatric disorders.
Keywords: Clustering, fMRI data, Interaction patterns, Multivariate time series.
Abstract
Message Authentication and Source Privacy in Wireless Sensor Networks
Prof. P. A. Khodke, Mansi S. Nanwani
DOI: 10.17148/IJARCCE.2015.49113
Abstract: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless networks. For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial.
Keywords: Authentication, Elliptic Curve, Symmetric Key Cryptography, Public Key Cryptography.
Abstract
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
V.Kalaivani, M.Sumathi
DOI: 10.17148/IJARCCE.2015.49114
Abstract: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper describes resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes� battery power. These �Vampire� attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.
Keywords: Ad hoc networks, sensor networks, wireless networks.
Abstract
Fault Node Detection and Recovery in Wireless Sensor Network (WSN)
Pranali Shejwal, Asmita Mokal, Sonali Mujagule, Asha Thoke, Priyanka Narode
DOI: 10.17148/IJARCCE.2015.49115
Abstract: This paper proposes a fault node recovery algorithm to increase the lifespan of a wireless sensor network when some of the sensor nodes are getting down. The algorithm is based on the grade diffusion algorithm combined with the genetic algorithm. The algorithm can result into detection and replacement of fewer fault node and more reused routing paths.
Keywords: Smart Sensor Nodes, Grade Diffusion Algorithm, Gradient Diffusion Algorithm, Fault Node Recovery Algorithm, Wireless, Sink, Sensing Node.
Abstract
A Survey on Dynamic Resource Management Technologies in Cloud Datacenter
Ashwini.K.L, Dr Suresh.S
DOI: 10.17148/IJARCCE.2015.49116
Abstract: Cloud computing offers infinite amount of resources which is available anywhere anytime based on the demand. Resource management is the attractive technology and it is based on pay-as-you-go model and the reservation model. Resource management has become one of the major issues in the cloud computing environment due to scale of modern data centers, heterogeneity of resource types and interdependencies. There are many resource management techniques used that must satisfy SLA. The work is about to survey various resource management strategies in cloud computing.
Keywords: Cloud computing, Resource management, Resource monitoring, SLA.
Abstract
Design of an Enterprise Network Infrastructure of a City
Mehzabul Hoque Nahid
DOI: 10.17148/IJARCCE.2015.49117
Abstract: A basic Network infrastructure allude to the resources like hardware and software of an entire network that let network connectivity, communication, operations and control of an enterprise network of a city, industries or home. Enterprise network infrastructure provides the communication path and services between users, processes, applications, services and external networks. The main objective of this research paper is to design a hierarchal enterprise network design of a city with consideration network enterprise edge. Cisco packet Tracer latest version was used to design & simulate this design. Using Cisco packet tracer we can simulate application layer protocols, basic routing with RIP, OSPF and EIGRP. Our design consist three locations in Dhaka, Bangladesh: Data center, Banani Branch & Motijheel Branch.
Keywords: LAN/WAN, OSI Model, Network Switch, Cisco Packet Tracer, Internet Cloud.
Abstract
Digital Visual Cryptography Transmission Scheme by Diverse Image
Prajakta Nikam, Preeti Kale
DOI: 10.17148/IJARCCE.2015.49118
Abstract: Visual secret sharing (VSS) schemes split secret images in shares that are either printed on separate transparencies or are encoded and stored in a digital form. The shares can seems as noise-like pixels or as meaningful images; but shares are suspicious so there is high interception risk during transmission. To overcome this problem, we proposed Digital-image-based VSS scheme (DVSS scheme) that shares secret images via various carrier media to protect the secret during the transmission phase. The proposed DVSS scheme can hide secret image using selected natural images and generate one noise-like share. Secret image and natural images generate one noise like share. The natural shares are unaltered and inoffensive, thus minimize the transmission risk problem. We also propose scheme to conceal the noise like share to minimize the transmission risk problem. LSB and BIT steganography algorithms are used for hiding noise like share and comparative analysis is made.
Keywords: Visual secret sharing scheme, extended visual cryptography scheme, natural images, transmission risk, least significant bit.
Abstract
Privacy protection in personalized web search
Khwaja Aamer, Dr. A. S. Hiwale
DOI: 10.17148/IJARCCE.2015.49119
Abstract: Search engines play important role in fulfilling user�s desire to reach relevant results. Search engine treats all users in same category and follow one profile fits all strategy, neglecting the needs of different kinds of user. Personalized web search (PWS) allow users to get only those results which are relevant to them by generating the most relevant results to each user according to their needs based on their profile, interest and needs. For getting benefit of personalized web search user profile is maintained which includes personal information. This user information can become biggest threat because most of the users are not comfortable to share their personal information in fear of hacking. To protect user information, privacy in PWS is required. To do so our algorithm provides balance between privacy by generating fake queries and quality by using online profiler. Experiment shows that accuracy and privacy protection is achieved.
Keywords: Accuracy, fake queries, online decision, privacy protection, personalized web search.
Abstract
Enhancing Security in Cloud by Self-Destruction Mechanism
Kshama Bothra, Sudipta Giri
DOI: 10.17148/IJARCCE.2015.49120
Abstract: Cloud computing, a recent computing technology is preferred by most of the users to store their data. Large amount of data can be stored in cloud. It is possible to access data stored in cloud by any third party. Providing security to the data stored in cloud is the prime concern. Data stored in cloud may contain personal notes, account information, password. To overcome the problem self-destruction method is proposed. All the data and their copies become self-destructed after user specified time period. Shamir secret sharing algorithm is used which generate key shares. Self-Destruction mechanism is conjoined with time-to-live field to specify the life time of the keys. After user specified time period key should be destructed or become unreadable. Any legitimate user can download file till the timeout. The file should be encrypted before upload and decrypted before download. Self-destruction mechanism indicates that it is practical to use and meet all preserving goals. Self-destruction mechanism reduces the time taken to upload and download file as compared to native system.
Keywords: Cloud computing, self-destruction, Active Storage Object, Time to live (ttl), data privacy.
Abstract
Efficient Image Retrieval Based on Fuzzy Color Feature Extraction
Mrs.S.Rathika M.C.A., Mr.P.Vijayakumar M.Sc.,M.Phil.,
DOI: 10.17148/IJARCCE.2015.49121
Abstract: Image retrieval is an emerging research area for multimedia database. It is the basic requirement task in the present scenario. Retrieval of images based on visual features such as color, texture and shape have proven to have its own set of limitations under different conditions. This paper experiments various methods available for Content based image retrieval System, they are precision, recall and accuracy value for Bag of Visual words, Color and Edge Directive Descriptors, Fuzzy Color and Texture Histogram. The Extraction of an image includes feature description, index generation and feature detection. The methods are implemented and tested based on three parameters like precision value, recall value and Accuracy rate. The Experimental results show that FCTH (Fuzzy Color and Texture Histogram) method is more efficient when comparing with other methods.
Keywords: Content Based Image Retrieval; Fuzzy Color histogram; Edge Directive Descriptors; Similarity measure.
