VOLUME 5, ISSUE 9, SEPTEMBER 2016
Comprehensive Study on Software Defined Network for Energy Conservation
Dr. Mohammed Najm Abdulla, Bassam Noori Shaker
A Review of the Recurrence Based Techniques for Detection of Various Neurological Disorders
Mohd. Suhaib Kidwai, S. Hasan Saeed
High Performance Smart Routing for Network on Chip
Himani Mittal, Dr. Yogendera Kumar
Modelling and Performance Analysis of Zinc Oxide based Thin Film Transistor
Abhishek V, Ramavenkateswaran N
Algorithm for Automatic Placement of ROI’S and Calculation of Contrast Recovery and Background Variability in Nema-IQ Phantom
Raksha S, Dr. Anand Jatti
Energy Efficient Peer-To-Peer Rectangular Indexing-System Architecture
Prof. Prashant P. Rewagad, Mrs. Tejaswini N. Patil
Design and Implementation of Spectrum Analyzer
Monali Chaudhari, Vaishali Kulkarni
Gradient Histogram Based De-Noising for Videos using Additive White Gaussian Noise
Sangeeta Khatarkar, Sumeet Dhillon
Pixel Based Quality Improvement of Black & White Noisy Images
Dr. Raghuvinder, Kavita Rani
Energy Efficiency Analysis for MIMO Communication Systems
SK. Sirajuddin, V. Vittal Reddy
A Survey on Applications of Fractal Dimension upon Various Image Processing Applications
Sumitra Kisan, Sarojananda Mishra, Sasmita Mishra
A Survey on K-Means Clustering Algorithms for Large Datasets
Jitendra Pal Singh Parmar, Prof. Shivank Kumar Soni, Prof. Anurag Jain
An Enhanced Technique on Security System Using Multifactor Authentication
Tirupati Bala, Surinder Singh
A Study on “Part of Hadoop in Data Innovation period”
Ravula Kartheek, B. Sampath Babu, Billa Manindhar
A Review of Technology Paradigm for IOT on FPGA
Ajay Rupani, Deepa Saini, Gajendra Sujediya, Pawan Whig
Study and Analysis of Vertical Handover Algorithm in 4G
Krishan Kumar Ranga, Jatin
High Speed Wireless Data Transmission Using LEDs (Light-Fidelity)
M. Rama Krishnan, Dr. M. Rajasenathipathi
Performance comparison and evaluation of efficient Routing Protocols for MANETs: Ant Inspired Adaptive Routing
S. Nagalakshmi, Dr. Rakesh Poonia
Analysis of Modified SSA for Interpolation of Missing Values in Geo-Physical Data
Devarapalli Siva Subrahmanyeswara Rao
A Hybrid Approach for Scheduling in Cloud Computing
Navdeep Kaur, Mandeep Kaur
Survey on Digital Video Watermarking Techniques
Shafali Banyal, Shivi Sharma
Dynamic Hierarchical Attribute Set-Based ECC Encryption for Secure Cloud Storage
Sadia Syed, Dr. M. Ussenaiah
Audio Water marking for Digital Image Protection using Source-Channel Coding
L. Veda Kumar, S. Bhavani
Firewall as a Service in Cloud Infrastructure
Pavan Harapanahalli B, Suresh Rathinam, Minal Moharir
Real Time Noise Cancellation and Improving Speech Intelligibility of Sensor neural Hearing Impaired by Using DSP Processor
Miss Ashwini V. Vikhe, Prof: Ulhas V. Patil
Portable Low Cost Electronic Nose for Instant and Wireless Monitoring of Emission Levels of Vehicles Using Android Mobile Application
Vishesh S, Manu Srinath, Karthik P Gubbi, Shivu H N, Prashanta
Speech Recognition Operation with Efficient Accuracy Rate and Factors Affecting It
Pritam Padhye, Vijaya Chavan, Sagar Mane
Computations of Image Compression Using Haar Wavelet Transform to Reduce Redundancy at Different Levels
Chaithra. G, Vidya. M. J, Dr. K. V. Padmaja
Recent Application of Neural Network in Prediction of Non-Linear and Dynamic System: A Review Article
Usha Sharma, Dr. Sanjeev Karmakar, Dr. Navita Shrivastava
Improved Twitter Sentiment Analysis Using N Gram Feature Selection and Combinations
Payal B. Awachate, Prof. Vivek P. Kshirsagar
Real Time Environmental Data Monitoring with Help of Wi-Fi Module and MQTT Potocol
Kirit Vanani, Jignesh Patoliya, Hardik Patel
Uses of Bitcoin an Exploration of the Bitcoin Community
Anshu Verma, Mr. N.K. Gupta
High-Tech Poly House Cultivation using Intel Galileo with Sensor Network through Internet
Ajith G.S, Girija M.G
Implementation of Linux Web Server for Web-Based Automation System Using Raspberry Pi
Amit S. Wankhade, Daithala Sreedhar, Dr. B. Satyanaryana
A Survey on Data Mining using Machine Learning Techniques
Kalpana Kushwaha, Pinkeshwar Mishra
Intrusion Detection in Fast and Streaming Network Data using In-Memory Stream Processing in Spark
N. Pramila, G. Ravi
Safety Device for Drowsy Driving using IOT
Tanish Sehgal, Sumedha Maindalkar, Shubham More
Internet of Things(IoT): A study on Architectural elements, Communication Technologies and Applications
Shruti G Hegde, Soumyalatha
A New Protocol for Data Protection of Cloud Environment Based on UCON
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari
FPGA Implementation of pipelined Architecture in Humming bird Algorithm for Reducing Area and High Throughput
G. Kavitha, B. Vinoth
Sentiment Analysis on Huge Streaming Data using Hadoop
S. Suganthi, M. Mohamed Surputheen
Design & Implementation of High Data Rate LTE System for Improving Capacity
Vanya Mehta, Er. Timsi
An Implementation of Tracking and Detecting Fish from Videos Using Adaptive Gaussian Mixture Model
Harmoninder Singh Brar, Er. Mandeep Kaur
A Transition from Traditional to Agile Software Development
Anupama Kaushik
Removal of Current and Voltage Harmonics in 3 Phase Four Wire System using Smart Filter
Sonali Dilip Pawar, Prof. S. S. Khule
Performance Analysis of Various Multipliers for Digital Signal Processing Applications
C. Saranya, Dr. M. Balasubramaniam, Dr. R. Naveen
An Overview on Quality of Services based Routers for NGN
Santosh D. Bhopale, Dr. Mrs. S. V. Sankpal, Dr. D. Jayadevappa
Overview of QoS Routing Protocols under MANET Scenario
Neeru Jhanji, Prof. Tilotma Sharma
Dynamic Multi-Keyword Ranked Search Based Security Mechanism for Cloud Data Management
Sinu V Agnes, Dr. K. Thamodaran
Personal Pollution Exposure Estimates using Pollution Sensors and Health Prediction
Aditya Mahabudhe, Prof. Dr. M. T. Kolte, Prof. S. N. Motade
Effect of Intensity Resolution on Wiener Filtering and Spectral Subtraction Method for Noise Suppression in Cochlear Implants
Kalyan S. Kasturi, K. Dinesh and K. A. Dwarakanadh
Experimental Solution to the Laplace Equation, a Tutorial Approach
G. Moradi, M. Marvasti
Implementing Adaptation and Reconfiguration Method in WSN
Er. Pinki Devi, Er. Promila Singhal
DRLBP and DRLTP Based Object Recognition for Image Retrieval Systems
Ms. Rajashri. A. Kolhe, Prof. A. S. Deshpande
A Different Type of Feature Selection Methods for Text Categorization on Imbalanced Data
Senthil Kumar B, Bhavitha Varma E
Design of Low Power Digitally Operated Voltage Regulator by using CMOS Technology
Nikita V. Dhomane, Dr. U. A. Kshirsagar
A Review on Multi Focal Image Fusion Techniques and Approaches
Mamta Sharma, Sarika Khandelwal
Internet of Things (IOT) Based Weather Monitoring system
Bulipe Srinivas Rao, Prof. Dr. K. Srinivasa Rao, Mr. N. Ome
A Memory Efficient Key Management and Distribution Scheme for Vehicular Adhoc Network
Ankur Jain, Ratnesh Dubey, Vineet Richariya
Vehicular Adhoc Network- Architecture and Operations
Ankur Jain, Ratnesh Dubey, Vineet Richariya
Study of Detecting and Localizing Concept Drifts from Event Logs in Process Mining
Trupti Kakkad, Dr. Rahila Sheikh
Cloud Service using Differential Query System
MG. Chandrasekhar, T. Kumar Raja
Image Enhancement using Texture Synthesis
Sarita Verma, Sanjay Bhardwaj
SVAP: Secure Visual Authentication Protocol
Sonal Sonyabapu Shinde, Ujwala H. Wanaskar
Detect and Identify the Defects of Industrial Pipe
Mayuri Dharma Shinde, Prof. Ramesh Y. Mali
Efficient Diagnosis of Breast Cancer Using Statistical Parameters
Sonal S. Naranje, Prof. Venkat N.Ghodke
Color Compensation for Vision Defects
Anupama Jamwal, Sanjay Bhardwaj
Image Denoising using Non Local Algorithm
Tamanna Thakur, Sanjay Bhardwaj
Suspended Aerosol Particulate Matter Counter
Pratap Singh D Naik, Dr Vijay Mishra, Dr Kiran Gupta, Avinash Kumar, Puneet Sharma
Comprehensive Study & Implementation of ANN based Optical Wireless System
Er. Manjeet Kaur, Er. Parul Sharma
An Implementation of Scheme Performance Analyser Intelligence System
Pooja Singh, Priya D
Design of APD Efficient Carry Select Adder
Mugdha Godbole, Prof. Ramesh Y. Mali
Designing of Digital Adaptive Filter for Removal of Artifacts in PCG Signal
Jyoti Chouhan, Prajyant Pathak
A Review of Melanoma Skin Cancer Detection Techniques using Medical Image Processing
Shefali Laddha, Komal Paliwal
Survey on Wireless Sensor Network Protocol to Enhance the Network Lifetime
Harpreet Kaur, Amit Verma, Manit Kapoor
Static Clustering of Web pages for Relevant Recommendation
Tina D Abreo, Anand Khandare, Prachi Janrao
Link Lifetime Prediction and Secure Data Transmission in Mobile Adhoc Network
Ashish Kumar Awadhiya, Prof. Rohit Vyas, H.O.D .Vivek Sharma
FPGA Based Digital Filter Module
Dr. Haresh Pandya, Mr. Mahesh Rangapariya, Mr. Kamaldeep Gosai, Mr. Jatin Savliya
Educational Game Design for Improving the Children with Number Sense
Huda Zaki Naji, Hazim Majeed Jasim
Energy Efficient Data Collection in Wireless Sensor Networks Using Quotient Partition Method (QPM)
M. G. Annapoorani, C. Indrani, V. Dharani
Denoising ECG Signal Using Daubechies and Symlet Wavelet Transform Techniques
Tanuj Yadav, Rajesh Mehra
Analysis of Efficient Security Depends on Pairing Based ECC in VANET
K. Iswarya, K. Haridas
A Novel Method of Fingerprint Recognition Based on Neural Network
Vinod Kumar Bhasker, Shahanaz Ayub
A Survey on Coral – A Cloud-Backed Frugal File System
P. Rohini, K. Palraj
Priority Management of Emergency Vehicles Using IOT Approach
Ashit S Chitta, Dinesha P
Recommendations System Applications
Shakila, Dr. Sheetal Rathi, Prachi Janrao
Reduce the Consumption of Energy in Wireless Sensor Network Using Improved STR Protocol
Niharika Namdev, Vivek Sharma
Enhanced Data Gathering with Compressive Sensing in WSN using Dynamic Merge Compressive Algorithm
Sumaiah barveen S, C Grace Padma MCA, M.Phil, MBA
Social Media Analytics for Enterprise
Ms. Ankita Chopra, Ms. Yogita Sharma
An Empirical Study of Topical Relation in Opinion Mining
Prajkta Akre, Harshali Patil, Anand Khadare, Mohammad Atique
A Raspberry Pi Based Global Industrial Process Monitoring through Wireless Communication
Priyanka S Lonare, Dr. Mahesh Kolte
Online Recognition of Malayalam Scripts with Minimized Feature Dimensions
Baiju K.B, Sabeerath .K, Lajish .V.L
Automated Toll System for Number Plate Detection and Collection
Ankita S. Bhore, Priya D. Thombare, Punam B. Pure, Bhawana W. Nimbhorkar, Pro. Gunjan Agre
Self Adaptive Routing Framework with Faux Node Generation to Detect and Mitigate OLSR Security Threats
Shyam Chandran P, Anupama K N
Time Efficient Item Elimination Based Technique for Mining High Utility Items from a Data Set
Bharti Ahuja, Mrs. Rupali Bhartiya
Performance Analysis of Effect of Fiber Length, Input Power and Attenuation Coefficient on Dispensation Compensation Using FBG
Sami Haider, Dr. D K Srivastava, Ravindra Kumar
Analysis of Dispersion Effect in Single OFDM and WDM System
Ravindra Kumar, Dr. D.K. Srivastva, Sami Haider
Solving of Lectures Timetabling Problem and Automatic Timetable Generation using Genetic Algorithm
Nashwan Ahmed Al-Majmar, Talal Hamid Al-Shfaq
Measuring Quality of Electronic Service Bareillymedicalhelp.com
Anand Kr. Shukla, Zubair Khan, Prof. Jagdish Rai
Detecting and Classifying Malicious Apps Using Rule Mining Algorithms
Shyam Chandran P, Mubeena V
Integrating Voice over Internet Protocol Technology as a Communication Tool on a Converged Network in Laos
Phoutthasine Chouyapaseuth
Digital India: Mission Transformative in Totality by 2020
Kusum Sharma, Kushagra Sharma, Rupika Rana
Improved LWT SWT Resolution Enhancement Technique by Switching Interpolation Technique
Shalini Dhiman, Pawan Kumar Mishra
Teaching Reforms in Automotive Power train and Chassis Control System Experiment
Luo Xiao, Wu Jianzhen, Chen Xiaolong
A Novel Study on Capacity Improving Algorithm for High Data Rate LTE-A Downlink System
Prem Chandra Gupta, Mrs. Garima Saini
Runtime Optimization of 802.11 based Wireless Mesh Network by Multi-Radio Multi-Channel
Er. Navneet Kaur, Er. Gurjot Singh
New Secure Image Transmission Technique Using Mosaic Image By RCT
Prof. Ulhas V. Patil, Miss. Shital R. Khande
Design and Analysis of Planar Inverted F-Antenna
Hemant Singh, Dr. Mahendra kumar
File Replication for Achieving Querying Delay in Mobile Ad Hoc Networks Though Replication for Efficient File Sharing
B. Jaya Lakshmi, Bandam. Sairam
Abstract
Comprehensive Study on Software Defined Network for Energy Conservation
Dr. Mohammed Najm Abdulla, Bassam Noori Shaker
DOI: 10.17148/IJARCCE.2016.5901
Abstract: SDN is another NW topology that gives more encourage to the overseer for dealing with the entire NW (administrations and resources) by decoupling the control plane from the information arrange and concentrate the control coherently .in this papers we presented. A comprehensive view of the SDN begins with definition then primary standards of SDN. Next, we illuminated the fundamental segments of the SDN architecture and how these segments communicate with each either. Next, we introduced ideas about the energy conservation in SDN environment and we discussed the virtualization and its significance from the perspective of the SDN.
Keywords: SDN, virtualization, openflow, NFV, TCAM, energy saving.
Abstract
A Review of the Recurrence Based Techniques for Detection of Various Neurological Disorders
Mohd. Suhaib Kidwai, S. Hasan Saeed
DOI: 10.17148/IJARCCE.2016.5902
Abstract: There are certain neurological disorders like Alzheimer�s disease, epilepsy etc which are characterized by recurring patterns in EEG obtained from the patient. If this recurrence pattern is observed and the degree of repetition can be studied then we can detect the presence of a disease and moreover if the degree of the repetition or recurrence can be detected by any parameter then further the intensity or the stage of the neurological diseases can also be diagnosed. This work mainly focuses on developing the algorithm and then a program using MATLAB so as to detect the seizures occurring in humans. This program will take the EEG signals from the Subject as input and will detect the recurrence patterns in the subject by using the mathematical concept of recurrences. Moreover different schemes of recurrence detection will also be used and the results will be compared so as to find the best of all the recurrence methods. This paper aims at giving the understanding of the synchronization that occurs in various natural and biological phenomenons and paves the way and prepares a ground for utilising this synchronization to detect and diagnose the neurological disorders in humans like epilepsy, alzheimer�s disease etc.
Keywords: EEG Waves, Synchronization Index, Coupling Index, Recurrences.
Abstract
High Performance Smart Routing for Network on Chip
Himani Mittal, Dr. Yogendera Kumar
DOI: 10.17148/IJARCCE.2016.5903
Abstract: With the advancement of Very-large-scale integration (VLSI) technology, research is going on to build more complex and robust computing systems in a single silicon chip. Interconnection requirements increase with a rapid pace with the increase of the number of components that appear on the chip thereby posing a limitation on overall on performance. Keeping this in mind we try to propose a Network on chip. The idea of a Network-on-Chip (NoC) borrows networking theory from the computer networking domain and considers each intellectual property (IP) core as a single node. In each node, a high-speed router connects with other routers of neighboring nodes. In a nutshell, the tradeoff between performance, area, and power is significant while designing routers of Network on chip. According to literature survey, the router architecture always contains buffers on the input ports. The buffer scheme is used to store packets; these packets must wait for the output resource due to contention with other packets. These designs have been widely adopted due to their improved performance. Finally, we propose a smart routing with low power, low area and improved performance. In our design Loop Back module is designed as old one, FSM is removed ,Routing Error detection , Logic, centralized Journal of data Packet are removed as our loop back module itself does the same functionality ,Ordinary Buffers are removed , instead of FIFO is used to achieve better performance.
Keywords: Hamming code, Loop Back Module, FIFO, Adaptive algorithm, dynamic reconfiguration, network-on-chip (NoC), reliability, performance, area, power, latency.
Abstract
Modelling and Performance Analysis of Zinc Oxide based Thin Film Transistor
Abhishek V, Ramavenkateswaran N
DOI: 10.17148/IJARCCE.2016.5904
Abstract: In this paper, thin film of Zinc oxide is considered to be the active layer for the TFT. There are many advantages of using ZnO material as in large band gap of 3.37eV and photo transparency due to which it is extensively used in optoelectronics. The technology of macroelectronics has been the trend over the past few years and many research works mainly have been directed towards this macroelectronic domain. In this work the wurtzite crystal structure is assumed and a bottom aluminium gate TFT is designed having a glass substrate on which a layer of silicon nitrate dielectric layer is deposited, followed by the uniform deposition of ZnO active thin layer. The fabrication process is simulated on Athena framework of Silvaco TCAD and the IV characteristics of the TFT is extracted using the atlas framework. Finally the TFT is modelled into simple circuit to check the feasibility of ZnO based TFT in integrated circuits.
Keywords: TFT, ZnO, RF Magnetron sputtering, Silvaco.
Abstract
Algorithm for Automatic Placement of ROI’S and Calculation of Contrast Recovery and Background Variability in Nema-IQ Phantom
Raksha S, Dr. Anand Jatti
DOI: 10.17148/IJARCCE.2016.5905
Abstract: The present work deals with A new approach for the automation tool for the analysis and evaluation of images as per the requirements of NEMA standards so that change in orientation of spheres in the phantom can be well taken care of. This tool supports automatic segmentation of lesions in the phantom images, calculation of Background Variability & Contrast Recovery for various orientations of spheres.
Keywords: Automation tool, NEMA standards, automatic segmentation of lesions in the phantom images.
Abstract
Energy Efficient Peer-To-Peer Rectangular Indexing-System Architecture
Prof. Prashant P. Rewagad, Mrs. Tejaswini N. Patil
DOI: 10.17148/IJARCCE.2016.5906
Abstract: Mobile P2P networking is an enabling technology for mobile devices to self-organize in an unstructured style and communicate in a peer-to-peer fashion. Due to user mobility and the unrestricted switching on/off of the mobile devices, links are intermittently connected and end-to-end paths may not exist, causing routing a very challenging problem. The major problem with peer-to-peer applications is to ?nd the nodes having desired information and downloading the same by saving the battery power in mobile prevalent computing environment. The past techniques though have produced satisfactory results but none of them addressed this problem. In this paper we propose a architecture of peer-to-peer minimum boundary rectangle (PMBR) indexing scheme designed for mobile peer -to-peer environment. Here the node which contains the users information of interest is easily ?nd out by reading the index.
Keywords: Mobile P2P networking, PMBR, peer -to-peer environment, Indexing-System Architecture.
Abstract
Design and Implementation of Spectrum Analyzer
Monali Chaudhari, Vaishali Kulkarni
DOI: 10.17148/IJARCCE.2016.5907
Abstract: Over the last couple of decades, different types of spectrum analyser were developed for numerous applications in various fields, such as, measurement of spectral purity of multiplex signals, percentage of modulation of AM signals, and FM modulation characteristics and pulse-modulated signals. The spectrum analyser is also used to interpret the demonstrated spectra of pulsed RF radiated from a radar transmitter. A spectrum analyser is the primary tool used for studying the spectral anatomy of numerous electrical and optical waveforms. The present day�s spectrum analyser is a vital portion of the engineer's toolbox. Which is used for the demonstrations of a power spectrum over a given frequency range, altering the display as the assets of the signal modification. Here, we present the basic idea around how the spectrum analyser works in a different environment, how it is efficient as compared to other type of measuring instruments and all additional characteristics of the spectrum analyser. In the presence of many signals, monitoring is very complicated to determine the performance of a system or device. The major components of spectrum analyser and how it is used during analysing the performance of devices.
Keywords: Signal, Spectrum, Period gram, Fast Fourier Transform (FFT).
Abstract
Gradient Histogram Based De-Noising for Videos using Additive White Gaussian Noise
Sangeeta Khatarkar, Sumeet Dhillon
DOI: 10.17148/IJARCCE.2016.5908
Abstract: Image and video denoising is very popular and governs the performance of many other algorithms. In this paper gradient histogram method is applied on the frames of the video i.e. images for denoising and hence the complete video is denoised. Gradient histogram approach has one advantage in addition to other approach; it also improves visual quality of denoised image. In this paper gradient histogram method is applied after applying additive white Gaussian noise to the images retrieved from video. It is found that PSNR of denoised video is 17.4 which is more as compared to previous approaches which has maximum of 16.
Keywords: Gradient histogram, image denoising, spatial domains, transforms domains, psnr.
Abstract
Pixel Based Quality Improvement of Black & White Noisy Images
Dr. Raghuvinder, Kavita Rani
DOI: 10.17148/IJARCCE.2016.5909
Abstract: Resolution is designated as significant holding for images. Resolution is an underlined expression of any image. Gratifying quality images are required almost in every field. For this we propose new modified algorithm having the extension in scaling and the algorithm is applied on image mingled with text for producing the pleasing quality of image. This research explains resolution method for enhancing digital gray images. The proposed enhancement technique is based on the interpolation of the high frequency sub-bands.
Keywords: DWT, SWT, IDWT, WZP, CWT
Abstract
Energy Efficiency Analysis for MIMO Communication Systems
SK. Sirajuddin, V. Vittal Reddy
DOI: 10.17148/IJARCCE.2016.5910
Abstract: The paper presents to optimize the energy efficiency in the MIMO system. The Energy Efficiency and the power consumption are the two important factors for the wireless communication systems. Recently the dramatic growth in high-rate multimedia data traffic driven by usage of wireless devices has been straining the capacity of today�s networks and has caused a large amount of energy consumption. In the past decade, suboptimal algorithm is implemented, which requires more energy and power allocation for the transmission of data in distributed antenna system. Therefore the developed optimal resources allocation algorithm in the MIMO systems optimizes the energy efficiency in the uplink and downlink transmission of data with the increase of mobile stations. The energy-efficient system design has recently drawn much attention in both academic and industrial worlds, and is becoming the mainstream for the next generation of wireless communications. The demonstrated optimal resource allocation algorithm requires less transmission power, less complexity and more energy efficient.
Keywords: Distributed antenna systems (DASs), energy efficiency (EE), fractional programming, proportional fairness, resource allocation, spectral efficiency (SE) Multiple Input and Multiple Output (MIMO) systems.
Abstract
A Survey on Applications of Fractal Dimension upon Various Image Processing Applications
Sumitra Kisan, Sarojananda Mishra, Sasmita Mishra
DOI: 10.17148/IJARCCE.2016.5911
Abstract: Image processing is the analysis and manipulation of a digitized image, especially in order to improve its quality. It is very necessary in case of medical science and other marine images to process the image to improve the quality of research. There are several techniques in this area to process this type of images. Fractal Dimension Calculation is one of the very popular and updated topics in this field to process various images. In fractal geometry, a fractal dimension is a ratio providing a statistical index of complexity comparing how detail in a pattern changes with the scale at which it is measured. In this review article we have provided a detail application of fractal dimension and fractal geometry in the field of various type of image processing like marine images, brain images, human body images etc. We have also provided a 2D image processed by fractal geometry.
Keywords: Fractal, Image Processing, fractal geometry
Abstract
A Survey on K-Means Clustering Algorithms for Large Datasets
Jitendra Pal Singh Parmar, Prof. Shivank Kumar Soni, Prof. Anurag Jain
DOI: 10.17148/IJARCCE.2016.5912
Abstract: In this article we present a detailed survey on K-Means clustering algorithms for huge datasets like high dimensional dataset etc. Our study gives an overview of different clustering scheme of data mining. The k-means algorithm and its variations are very well recognized to be speedy clustering algorithms. Nevertheless, they are susceptible to the choice of initial points and are unproductive for solving clustering troubles in very large datasets. Currently, incremental schemes have been developed to determine difficulties with the choice of initial points. The global k-means (GKM) and the fast global k-means (FGKM) algorithms are based on such a scheme. They iteratively append one cluster center at a time. Numerical experiments show that these algorithms considerably improve the k-means algorithm. Nevertheless, they require buzzing the whole affinity matrix or computing affinity matrix on all steps of algorithms. This creates both algorithms time consuming and memory demanding for clustering even moderately large datasets. We give comparative study of different k means algorithms to understand them effectively.
Keywords: High Dimensional dataset, clustering, K means, GKM.
Abstract
An Enhanced Technique on Security System Using Multifactor Authentication
Tirupati Bala, Surinder Singh
DOI: 10.17148/IJARCCE.2016.5913
Abstract: In the today�s world with the remarkable development in computer system, single factor authentication, is no more examined as secure way to protect our confidential data. It is very simple and easy to guess passwords most often, they are short and based on subjects close to the user birthdays, partner names, children�s names and they are typically only letters and can be found via the secret key gathering programs. Multifactor authentication guarantees a higher level of protection by extending the single authentication factor. Authentication is basically the process of verifying the identity of a user. Our proposed idea focuses on the implementation of multifactor authentication methods by using OTP password and image based Password and question based password as gateway for authentication. An attempt has been made to provide extra layers of security by adding additional passwords.
Keywords: Multifactor Authenticaction; Security; OTP (One Time Password); Graphical Password; Biometric based authentication.
Abstract
A Study on “Part of Hadoop in Data Innovation period”
Ravula Kartheek, B. Sampath Babu, Billa Manindhar
DOI: 10.17148/IJARCCE.2016.5914
Abstract: At the moment, of these days, firms require to process many (PB) Petabyte Datasets shrewd. The information may not have dour blueprint (or schema) for the enormous system. It has grown into plush to shape the loyalty in each Application for processing (PB) petabyte of datasets. If there is a dispute of Nodes, blunders regularly, some of the reasons of defeat may be. Defeat is familiar, alternatively exceptional. The whole number of nodes in a cluster is not consistent. So there is must need for most natural infrastructure to have influentially, decent, *Open Source Apache License*.The Hadoop platform was planned to figure out troubles or problems where you have a bunch of data maybe a mixture of composite and structured information and it doesn�t match nicely into tables. It�s for positions where you desire to go analytics that are deep and computationally pervasive, similar to targeting and clustering. That�s precisely what *Google* was performing when it was indexing the web (www) and analysing user behaviour to upgrade the performance of the algorithms. This report has made an effort to analyze its need, purpose and application, therefore brought to the notice of the readers.
Keywords: Petabyte (PB), Name node, Map Reduce, HDFS.
Abstract
A Review of Technology Paradigm for IOT on FPGA
Ajay Rupani, Deepa Saini, Gajendra Sujediya, Pawan Whig
DOI: 10.17148/IJARCCE.2016.5915
Abstract: In recent years, the integration of a whole set of technologies, commonly known as the Internet of Things (IOT) activating an ecological system blossoming architectures and platform where objects smart, users and communication infrastructures between act to support smart context - aware services and applications. Smart-grids, medical monitoring, smart cities and teaching of pollution is distributed gust concrete some examples of applications that are gaining attraction between industries and institutions. In this paper the application of IOT is examined in the FPGA platform, production deices Mars. It includes data collection, congeal, automation algorithms along with the implementation of the TCP / IP stack in FPGA with an interface cable or Wi-Fi Ethernet.
Keywords: IOT (Internet of Things), FPGA, Wi-Fi, TCP/IP, Future Internet, Sensor Data Acquisition.
Abstract
Study and Analysis of Vertical Handover Algorithm in 4G
Krishan Kumar Ranga, Jatin
DOI: 10.17148/IJARCCE.2016.5916
Abstract: The rapid increase and development of mobile communication network system has accelerated the data transfer speed. These technologies are expected to provide services like voice, data, web browsing, video conferencing, video streaming and telemetry with mobility of the end users. The horizontal handoff is available in 2G, 3G, 4G and 5G to provide mobility for all kinds of services. So to provide mobility within such types of network generations, the vertical handoff is essential to avail uninterrupted services. In this research, we aim to find such an approach which provides results in reduced call drop rate with less handover failure. Such kinds of handoff process failures incur maximum communication loss. Recent studies that have been done for reducing call drop problem, provide different algorithms and approaches to reduce call drop rate. As in 4G networks, vertical handover is performed, so our main aim is to reduce handover failure and improve the quality of communication in 4G.
Keywords: GSM, HHO, KWHN, RSS, VHO etc.
Abstract
High Speed Wireless Data Transmission Using LEDs (Light-Fidelity)
M. Rama Krishnan, Dr. M. Rajasenathipathi
DOI: 10.17148/IJARCCE.2016.5917
Abstract: Whether you�re using wireless internet in a coffee shop, stealing it from the guy next door, or competing for bandwidth at a conference, you�ve probably gotten frustrated at the slow speeds you face when more than one device is tapped into the network. As more and more people and their many devices access wireless internet, clogged airwaves are going to make it increasingly difficult to latch onto a reliable signal. But radio waves are just one part of the spectrum that can carry our data. What if we could use other waves to surf the internet? One German physicist, DR. Harald Haas, has come up with a solution he calls �Data Through Illumination��taking the fiber out of fiber optics by sending data through an LED light bulb that varies in intensity faster than the human eye can follow. It�s the same idea behind infrared remote controls, but far more powerful. Haas says his invention, which he calls D-Light, can produce data rates faster than 10 megabits per second, which is speedier than your average broadband connection. He envisions a future where data for laptops, smart phones, and tablets is transmitted through the light in a room. And security would be a snap�if you can�t see the light, you can�t access the data. Li-Fi is a VLC, visible light communication, technology developed by a team of scientists including Dr Gordon Povey, Prof. Harald Haas and Dr Mostafa Afgani at the University of Edinburgh. The term Li-Fi was coined by Prof. Haas when he amazed people by streaming high-definition video from a standard LED lamp, at TED Global in July 2011. Li-Fi is now part of the Visible Light Communications (VLC) PAN IEEE 802.15.7 standard. �Li-Fi is typically implemented using white LED light bulbs. These devices are normally used for illumination by applying a constant current through the LED. However, by fast and subtle variations of the current, the optical output can be made to vary at extremely high speeds. Unseen by the human eye, this variation is used to carry high-speed data,� says Dr Povey, Product Manager of the University of Edinburgh's Li-Fi Program �D-Light Project�.
Keywords: Wireless-Fidelity (Wi-Fi), Light Fidelity (Li-Fi), Light Emitting Diode (LED), LDR (Light Dependent Register).
Abstract
Performance comparison and evaluation of efficient Routing Protocols for MANETs: Ant Inspired Adaptive Routing
S. Nagalakshmi, Dr. Rakesh Poonia
DOI: 10.17148/IJARCCE.2016.5918
Abstract: Mobile nodes in a network often create link changes that demand reconstruction of the already identified routes. A routing algorithm is consistently challenged with route discovery and successive route maintenance. The Ant Colony Optimization (ACO) is a probabilistic technique designed for solving computational problems and which can also be adopted to find optimal paths in wireless ad hoc networks. Many researchers have take inspiration from the foraging behavior of the ants, its optimal route finding capability and the fact that it lays down a chemical substance called pheromone along the path of their movement which has a limited time before it evaporates. In this paper we bring out the characteristics and analyze the performance of a proposed Ant Colony Optimization (ACO) based ad hoc routing protocol and compare it with well-known ad hoc routing protocols. The performance and comparison is made through evaluating network parameters like average end to end delay, packet delivery ratio and throughput, residual energy of a network and is simulated by Network Simulator 2 (NS2).
Keywords: Ant Colony Optimization, Routing, MANETs, Mobile Ad Hoc Networks, packet delivery fraction, average end-to-end delay, routing overhead.
Abstract
Analysis of PCB Images Based on Triclass Thresholding Technique for Segmentation
Ankita G. Sangle
DOI: 10.17148/IJARCCE.2016.5919
Abstract: The iterative triclass thresholding technique is a parameter free technique. It is based on Otsu�s method where the Otsu�s threshold is obtained, which minimizes the intra-class variances of the segmented images, but instead of classifying the histogram of that image into two classes, the iterative method separates it into three classes. This triclass is defined as: 1) foreground class, 2) background class, 3) to-be-determined (TBD) region, obtained from the respective means of the other two classes. Iteratively the Otsu�s method is applied onto the TBD region until the preset criteria is met keeping the foreground and background regions unchanged and finally their respective unions are formed for final result. The proposed work is to use this method and another method called Window based thresholding in order to reveal the fine structures in the Printed Circuit Board (PCB) in a minimal computational cost and achieve better accuracy for the same.
Keywords: Triclass, Printed Circuited Boards (PCB), segmentation, Threshold, Otsu's method, Window based thresholding, Binarization.
Abstract
Analysis of Modified SSA for Interpolation of Missing Values in Geo-Physical Data
Devarapalli Siva Subrahmanyeswara Rao
DOI: 10.17148/IJARCCE.2016.5920
Abstract: To learn about the natural geophysical process first we need regular observations of various parameters such as precipitation, cloud water, temperature, and soil moisture. For example, the spatiotemporal data set of soil moisture is collected National and Snow Ice data centre. This spatiotemporal data set size is{ 44 � 102 � 92}.In this dataset, there are several inherent gaps due to various reasons such as sensor error, failure of data recording devices, lack of coverage and so on. The goal of an interpolation process is to estimate the unknown values in the gaps based on knowledge from existing values in the spatio-temporal neighbourhood. Here we plan to study an efficient spatio-temporal interpolation scheme based on singular spectral analysis (SSA). It was complicated because multiple hydrologic processes are there in soil moisture interpolation, this method uses to drive the content the modes of variation in soil moisture pattern to estimate missing values. The reconstructed data includes the estimates of missing values. The main goal of this research is to know the efficiency of the SSA based spatio-temporal data filling method.
Keywords: NSIDC, AMSRE Data, Empirical Orthogonal Function (EOF), Singular Spectral Analysis (SSA).
Abstract
A Hybrid Approach for Scheduling in Cloud Computing
Navdeep Kaur, Mandeep Kaur
DOI: 10.17148/IJARCCE.2016.5921
Abstract: Cloud computing is emerging as a potential player in field of Distributed computing. Therefore enhancement in scheduling algorithm is the major research area which is being under focused by various researchers. Efficient scheduling algorithm tends to increase the potential of any Cloud Service Provider (CSP) infrastructure. In order to increase the performance of scheduling capabilities, this work has been focused on improving Map e-K algorithm with the combination of worst fit scheduling algorithm. The Map e-K loop provides monitoring, analysing, planning & execution phases & under the planning phase we have used latency matrix that will create plan to allocate job request to VMs. Also, in this work thebinary search technique has been used to find appropriate VMs for incoming job request from the userThis hybrid version of Map e-K is successfully tested& shown under observed results.
Keywords: Cloud, Map e-K, Binary Search, latency Matrix.
Abstract
Survey on Digital Video Watermarking Techniques
Shafali Banyal, Shivi Sharma
DOI: 10.17148/IJARCCE.2016.5922
Abstract: With the advancements of Internet along with the increasing probability of multimedia has spawned a number of copyright issues. One of the main most important areas that this growth has feed is digital watermarking. Digital watermarking is a technique of hiding a message similar to a digital signals in different forms such an image, song, video within the signal itself. In this paper we present survey on digital video Watermarking techniques for better performance, robustness and discuss the various important factors used in watermarking, attributes and application area where watermarking technique needs to be used. Also survey of latest work is done in digital video watermarking field.
Keywords: Types of watermarking, Applications, Watermarking techniques
Abstract
Dynamic Hierarchical Attribute Set-Based ECC Encryption for Secure Cloud Storage
Sadia Syed, Dr. M. Ussenaiah
DOI: 10.17148/IJARCCE.2016.5923
Abstract: Accessing Data and control it is an efficient way to provide data security in the cloud. But in untrusted cloud servers, the data storage and retrival control becomes a challenging in cloud storage systems. Existing access control schemes are not satisfactory in cloud storage systems, because they either produce multiple encrypted copies of the same data or require a fully trusted cloud server. Since this new computing technology requires users to entrust their precious data to cloud providers, in that sense the security and privacy concerns on outsourced data is increasing. Attribute-based encryption (ABE) provides a mechanism for typical access control over encrypted data. But in most ABE systems, the cipher text size and the decryption overhead, which causes for the complexity of the access policy, and also one single Trusted Authority (TA) and Cipher text Policy (CP-ABE) are unable to manage multiple group owners for encryption process and access policy. For achieving scalability, flexibility, and fine-grained access control of data in cloud, we propose Hierarchical Attribute-Set-Based Encryption (HASBE). This is an extension of cipher text-policy Attribute-Set-Based Encryption (ASBE) with a hierarchical structure of users with compound attributes. Through which we will achieve Sophisticated, flexible and scalable data access control with the help of compound attributes of HASBE.In addition to that we are using ECC Elliptic Curve Cryptography Instead of RSA in ABE. This scheme achieves scalability due to its hierarchical structure, but also achieve flexibility and fine-grained access control. In addition, HASBE with ECC employs idol access time to deal with user revocation more efficiently than existing schemes. We formally proved the security of HASBE based on security of the cipher text-policy attribute-based encryption (CP-ABE) scheme by analyzing its performance and computational complexity. We have implemented our scheme and proved that it is both efficient and flexible in dealing with access control for outsourced data in cloud with comprehensive experiments.
Keywords: Cloud Computing, Cloud Data Storage Security, ABE, HASBE, Access Policies, ECC.
Abstract
Overview of Data Mining Applications
Ms. Gurpreet Kaur
DOI: 10.17148/IJARCCE.2016.5924
Abstract: In this Paper we have discussed about data mining technologies. As we aware that there are large organization, each organization generate large amount of data. The data warehouse is helpful in making the effective decisions. The huge amount of data is available in the form of terabyte. To manage and make decision of such type of huge amount of data we need a technique called data mining.
Keywords: Data mining Task, Data mining Life cycle, Types of Data Mining System, Application of Data Mining System.
Abstract
Audio Water marking for Digital Image Protection using Source-Channel Coding
L. Veda Kumar, S. Bhavani
DOI: 10.17148/IJARCCE.2016.5925
Abstract: Digital watermarking is new procedure of delivering protection to multimedia knowledge and digital content material from unauthorized copying. Potent and imperceptible audio watermarking scheme utilizing Discrete Wavelet Transformation (DWT) is existed. So It is mighty information hiding manner for audio signal. Therefore, an appropriate design of channel code can protect the reference bits against tampering. In the present proposed method, the total watermark bit-budget is dedicated to three groups: 1) source encoder output bits; 2) channel code parity bits; and 3) check bits. In watermark embedding phase, the original image is source coded and the output bit stream is protected using appropriate channel encoder. By using this source coding and channel coding we will get the output information without loss and will get better PSNR values, bit error rate values in proposed method comparing to the existing method. By using this source coding we can calculate the maximum and minimum pixel values and using channel coding for compression of the image.
Keywords: watermarking, data embedding, self recovery, source, channel coding audio signal.
Abstract
Data Mining: Current Trends and Applications
Sandeep Godara
DOI: 10.17148/IJARCCE.2016.5926
Abstract: Data mining have various applications and these applications have enriched the various fields of human life including business, education, medical, scientific etc. There is formerly a blast in the amount of data which is produced and have accessed. Data mining can unearth significant information and widespread utilizations in business, medical, telecommunication wireless and ubiquitous computing. Objective of this paper is to discuss various improvements and breakthroughs in the field of data mining also to explore the future trends.
Keywords: Data mining, Knowledge discovery, business, medical, telecommunication, wireless and ubiquitous computing
Abstract
K-Means Clustering for Horse Colic Data
Sandeep Godara
DOI: 10.17148/IJARCCE.2016.5927
Abstract: Equine colic is a relatively common disorder of the digestive system. Although the term colic, in the true definition of the word, simply means �abdominal pain,� the term in horses refers to a condition of severe abdominal discomfort characterized by pawing, rolling, and sometimes the inability to defecate. Clustering is one of the unsupervised learning method in which a set of essentials is separated into uniform groups. The k-means method is one of the most widely used clustering techniques for various applications Cluster analysis for Horse colic data sets has proved to be a useful tool for identifying biologically relevant groupings of genes and samples. In this paper the K-means algorithm is used for clustering Horse Colic Data Set.
Keywords: Data mining, Clustering, K-Means Clustering, Horse colic.
Abstract
Wireless Sensor Network Security and Analysis
G. Anuradha
DOI: 10.17148/IJARCCE.2016.5928
Abstract: A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application�s design objectives, and cost, hardware, and system constraints. The sensor nodes will perform significant signal processing, computation, and network self-configuration to achieve scalable, robust and long-lived networks.. More specifically, sensor nodes will do local processing to reduce communications, and consequently, energy costs. We believe that most efficient and adaptiverouting model for WSN is cluster based hierarchical model. For a cluster based sensor network,the cluster formation plays a key factor to the cost reduction, where cost refers to the expense ofsetup and maintenance of the sensor networks. In this paper, we will take a more security in WSN and discuss countermeasures. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, and Y. Sankarasubramaniam. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and thenreview the literature on various aspects of WSNs. We classify the problems into three differentcategories: (1) internal platform and underlying operating system, (2) communicationprotocol stack, and (3) network services.
Keywords: Wireless sensor network (WSN), Network Security, Micro-Electro-Mechanical Systems (MEMS)
Abstract
Firewall as a Service in Cloud Infrastructure
Pavan Harapanahalli B, Suresh Rathinam, Minal Moharir
DOI: 10.17148/IJARCCE.2016.5929
Abstract: OpenStack is most widely used cloud platform to set up private cloud. OpenStack offers Compute, Identity, Image and Networking services to deploy cloud platform. Firewall as a Service (FWaaS) of OpenStack secures tenant�s network. OpenStack installers automate OpenStack services deployment to reduce human efforts involved. Currently none of the installers support FwaaS deployment nor support different scenarios of OpenStack Network service deployment like Distributed Virtual Routing (DVR), Virtual Router Redundancy Protocol (VRRP). The proposed work focuses on automating OpenStack basic services deployment with different scenarios of Network Service and FWaaS with Graphical User Interface (GUI) using Ansible tool. This work has made OpenStack service deployment very easy with GUI, reduced human efforts and errors due to human mistakes. This work efficiently sets up OpenStack cloud with FWaaS supporting different scenarios of OpenStack-Neutron on multi cluster environment.
Keywords: Cloud Computing, Distributed Virtual Routing, Firewall as a Service, OpenStack, Virtual Router Redundancy Protocol, Ansible.
Abstract
Real Time Noise Cancellation and Improving Speech Intelligibility of Sensor neural Hearing Impaired by Using DSP Processor
Miss Ashwini V. Vikhe, Prof: Ulhas V. Patil
DOI: 10.17148/IJARCCE.2016.5930
Abstract: In human body out of the three hearing losses, the foremost extreme listening to loss that we tend to can�t do surgery is sensor neural listening to loss. Sensor neural hearing problem is one style of hearing disorder, during which causes stops operating within the receptor. Sensor neural disablement causes reduction within the notion of speech and widening of sense of hearing filters. Widening of sensory system filter leads to central masking. Spectral masking leads to degraded speech belief as there is also covering of frequency parts with the help of adjacent frequency parts. Earlier studies have state that, frequency protective is also reduced by method of sound recorded by electro-acoustic transducer devices that causes dichotic presentation, exploitation necessary band filter institution. For someone with paying attention to impairment the range of levels between weakest sound which will be detected and also the most intense sound which will be tolerated is a smaller amount than everyday auditor. For compensating this, hearing aids expand vulnerable sounds larger than they create larger extreme sound.
Keywords: Sensor neural, numerous, filter.
Abstract
Portable Low Cost Electronic Nose for Instant and Wireless Monitoring of Emission Levels of Vehicles Using Android Mobile Application
Vishesh S, Manu Srinath, Karthik P Gubbi, Shivu H N, Prashanta
DOI: 10.17148/IJARCCE.2016.5931
Abstract: Emissions of many air pollutants have been shown to have a variety of negative effects on public health and the natural environment. With the ever increasing population and the need for automobiles for transportation, the number of vehicles have increased considerably which has lead to increase in the emission of air pollutants such a CO, CO2, Hydrocarbons, SO2, etc., which may cause grievous problems to living beings and environment. One solution to this problem is frequent monitoring of the gases in the environment. In India, the present emission monitoring system is available only at emission testing centres located either in petrol bunks or few other places. The model we have designed can be handed over to the traffic police for continuous and instant monitoring of emission levels of vehicles. The present standard device is not portable and involves wired connections unlike our design which is portable, rechargeable and wireless. These features make our design easier to use than the traditional device. Also, our new model is comparatively cheaper than the existing device with the same level of accuracy. Unlike the present emission testing device our model uses an android application to monitor emission levels and does not require any paper work. Moreover, we express our distress in the present emission monitoring system which involves multiple malpractices by manipulating the recorded emission levels for bribe. This can be eliminated by our device which includes instant and real-time monitoring of emission levels of vehicles already certified.
Keywords: Air pollutants, continuous and instant monitoring, portable, rechargeable, wireless, android application, real time monitoring.
Abstract
Speech Recognition Operation with Efficient Accuracy Rate and Factors Affecting It
Pritam Padhye, Vijaya Chavan, Sagar Mane
DOI: 10.17148/IJARCCE.2016.5932
Abstract: Speech has always been an important activity in human life and also contributing a lot to the society. The interaction between human and computer or maybe any computing device became a new trend and sometimes a need of an hour. Speech recognition system actually converts the analog spoken inputs to the digital signals that a computer can understand and do the required task or provide the user with the output. This paper gives a brief introduction to this lime lighted topic and explains few of its application, in our information world and also touch topic likes accuracy, and working of the speech recognition, with its future use. This paper will also include the models of speech recognition.
Keywords: recognition pattern, models, accuracy, spontaneous speech, noise.
Abstract
Computations of Image Compression Using Haar Wavelet Transform to Reduce Redundancy at Different Levels
Chaithra. G, Vidya. M. J, Dr. K. V. Padmaja
DOI: 10.17148/IJARCCE.2016.5933
Abstract: Every day, tremendous number of captured images must be stored and/or transmitted. The repetitive data in the images can be lessened utilizing image compression technique. Image compression prior to storage or transmission will lessen the memory byte size of images which in turn reduces the transmission bandwidth. The compressed image is reconstructed to retain the original image at the receiving end by the inverse process. In this paper, Haar Wavelet Transformation is utilized for image compression and reconstruction. This method is a basic type of lossy compression technique that permits data to be encoded according to �levels of detail�. Compression ratio, Peak signal to noise ratio, Bits per pixel and relative data redundancy of different levels of image compression are compared.
Keywords: Haar wavelet transform, level of detail, compression ratio, Peak signal to noise ratio, Bits per pixel, relative data redundancy.
Abstract
Recent Application of Neural Network in Prediction of Non-Linear and Dynamic System: A Review Article
Usha Sharma, Dr. Sanjeev Karmakar, Dr. Navita Shrivastava
DOI: 10.17148/IJARCCE.2016.5934
Abstract: Recent applications of neural network in prediction of non-linear dynamic systems have been reviewed. Intended for significant contributions from 2010 to 2016 have been reviewed and found the various architecture of neural network like back-propagation, redial basis function, multi layer perception recurrence neural network are found suitable sufficient for prediction over 17 different applications in recent years is presented through this review article.
Keywords: Neural Network, Prediction, Non-Linear System.
Abstract
Improved Twitter Sentiment Analysis Using N Gram Feature Selection and Combinations
Payal B. Awachate, Prof. Vivek P. Kshirsagar
DOI: 10.17148/IJARCCE.2016.5935
Abstract: Sentiment analysis is an important research area that identifies the people�s sentiment underlying a text. Sentiment analysis widely studied in data mining. Sentiment analyses of tweets are widely studied. After reviewing and studying the current research on sentiment analysis, the goal of the proposed method is to get the more effective results of sentiment analysis on tweets. The aim of this paper is to improve the performance to classify the tweets with sentiment information. We use a feature combination scheme which uses the sentiment lexicons and extracted tweets n gram of high performance gain. We evaluate the performance of three popular machine learning classifiers among which Kern lab classifier achieves the highest accuracy rate.
Keywords: Data Mining; Sentiment Analysis; Twitter; Classification; Supervised learning Ngram; Feature Selection; Sentiment Lexicon.
Abstract
Real Time Environmental Data Monitoring with Help of Wi-Fi Module and MQTT Potocol
Kirit Vanani, Jignesh Patoliya, Hardik Patel
DOI: 10.17148/IJARCCE.2016.5936
Abstract: The main objective of this paper is develop, real time data monitoring system for particular location like, home, cities, industries, hospitals, etc., where environmental information of various factors such as temperature, air pressure, humidity, and altitude need to be monitoring and get update with specific time interval. With the help of Wi-Fi module, sensors, and MQTT protocols, we can monitoring real time environmental data over remote location and get updating with it anywhere in world if internet connection present, and if internet connection not present than we can get updating with it in local connection via TCP/IP connection.
Keywords: MQTT, TCP/IP, MQTT-SN, DHT11, BMP180, E2PROM, I2C, SoC, QoS, TCP,
Abstract
Uses of Bitcoin an Exploration of the Bitcoin Community
Anshu Verma, Mr. N.K. Gupta
DOI: 10.17148/IJARCCE.2016.5937
Abstract: Many crypto currencies have come into existence in recent years, with Bitcoin the most prominent among them. Although its short history has been volatile, the virtual currency maintains a core group of committed users. This paper presents an exploratory analysis of Bitcoin users. As a virtual currency and peer-to-peer payment system, Bitcoin may signal future challenges to state oversight and financial powers through its decentralized structure and offer of instantaneous transactions with relative anonymity. Very little is known about the users of Bitcoin, however. Utilizing publicly available survey data of Bitcoin users, this analysis explores the structure of the Bitcoin community in terms of wealth accumulation, optimism about the future of Bitcoin, and themes that attract users to the cryptocurrency. Results indicate that age, time of initial use, geographic location, mining status, engaging online discourse, and political orientation are all relevant factors that help explain various aspects of Bitcoin wealth, optimism, and attraction.
Keywords: Bitcoin, Cryptocurrency, Anonymity, Virtual Currency, Digital Money.
Abstract
High-Tech Poly House Cultivation using Intel Galileo with Sensor Network through Internet
Ajith G.S, Girija M.G
DOI: 10.17148/IJARCCE.2016.5938
Abstract: Poly house Cultivation is being developed to achieve good crops with less labour cost. Poly house is made up of polyethylene sheet having rectangular shape to grow the crops in a controlled environment even in unfavorable conditions. By using automated control system, crucial parameters like temperature, humidity and water level necessary for the growth of plants can be maintained and controlled automatically. The thickness of the sheet can be varied according to the requirement that depends on the crop type to be grown. Generally Poly houses are directed from east toward west to utilize the maximum amount of sunlight. This model has developed with the mesh topology consists various nodes which are deployed inside poly house and are controlled by IOT technology
Keywords: Agriculture, environment monitoring, Poly house, Internet of Things (IoT), Sensors, Android mobile Application, Intel Galileo, PHP, Web server, Arudino
Abstract
Implementation of Linux Web Server for Web-Based Automation System Using Raspberry Pi
Amit S. Wankhade, Daithala Sreedhar, Dr. B. Satyanaryana
DOI: 10.17148/IJARCCE.2016.5939
Abstract: The Raspberry Pi changed the way many engineers and developers thought about the possibilities of an embedded system. When networking technology is combined with it, the scope of embedded systems would be further more. Here, this paper focuses on implementation of Linux web server and web-based automation system. And also give information about how to configure the apache web server, MySQL for database support, and PHP for dynamic web content. The sample web page demonstrates automation to control the raspberry end connected devices via relay board. The primary idea is to make efficient and effective web based automation system at very low cost by using the Raspberry Pi 3 B model.
Keywords: Web Server; MySQL; HTML; PHP; SSH.
Abstract
A Survey on Data Mining using Machine Learning Techniques
Kalpana Kushwaha, Pinkeshwar Mishra
DOI: 10.17148/IJARCCE.2016.5940
Abstract: Data has been growing at a very fast rate. To quickly analyze this data is a challenge. This data is very useful to make decisions and predictions. So data mining for this data is very crucial. In this paper a survey is done on machine learning techniques used for data mining.
Keywords: Data Mining, Machine Learning Techniques, Data preprocessing, Data mining.
Abstract
Intrusion Detection in Fast and Streaming Network Data using In-Memory Stream Processing in Spark
N. Pramila, G. Ravi
DOI: 10.17148/IJARCCE.2016.5941
Abstract: Due to the increased digitalization of information, a huge amount of data is being generated. Information richness in such data has attracted researchers to this data. The major problem existing in real time data is that it is fast and streaming making analysis on them difficult. Intrusion detection is a continuous process and depending on the size of the network and the number of transmissions being carried out in the network, the number of packets to be analyzed varies considerably. The packets being transferred tends to be fast, hence a mechanism to provide analysis in real time becomes mandatory. This paper presents a tree based technique to analyze network traffic and provide real time predictions with higher accuracy. It uses an ensemble of trees called the Random Forest classifier. Experiments were conducted on Hadoop platform using Spark. Spark, being a stream processing framework exhibits effective results in real-time.
Keywords: Classification; Anomaly Detection; Network Intrusion Detection; Hadoop; Spark; Random Forest.
Abstract
Safety Device for Drowsy Driving using IOT
Tanish Sehgal, Sumedha Maindalkar, Shubham More
DOI: 10.17148/IJARCCE.2016.5942
Abstract: This paper presents a safety device for drowsy driving using IOT. Drowsy driving is a major problem in every country. The risk, danger, and often tragic results of drowsy driving are alarming and shocking to everyone. Drowsy driving is the dangerous combination of driving and sleepiness or we can say fatigue. This usually happens when a driver has not slept enough, but it can also happen due to untreated sleep disorders, medications, drinking alcohol, shift work or long late night drives. In this project a self-powered IRIS scanner will be fitted into the dashboard in front of driver that will be scanning the driver eyes. So whenever a driver is drowsy or feeling siesta his/her eyes may go shut very frequently and for longer durations. So whenever the eyes are closed for more than two seconds or longer the sensor will trigger the action and activate the alarm so the alarm makes the driver conscious.
Keywords: Internet of Things, IOT, Drowsy Driving, IRIS Scanner, Alarm, Music system/Navigation System, Alert System.
Abstract
Internet of Things(IoT): A study on Architectural elements, Communication Technologies and Applications
Shruti G Hegde, Soumyalatha
DOI: 10.17148/IJARCCE.2016.5943
Abstract: IoT is an emerging technology wherein billions of sensors from multiple vendors are embedded with the daily objects are interconnected together to sense the data continuously depending on the context and sends these data over the internet to the central database. Data analytics in tern provides the required contextual result. This leads to comfortable life with minimum or without human intervention. This paper addresses working of IoT, general IoT architecture by considering two scenarios where we have also differentiated number of layers required for the different applications. The most important factor of IoT is to understand the essential components required to build IoT and the integration of different communication technologies. For such a scenario, our study paper mainly concentrates on the essential elements to build IoT, different IoT communication technologies and different application domains, which helps the students, researchers and those who can further contribute.
Keywords: Blutooth , Cellular Network, RFID, Sensors, Wi-Fi, ZigBee
Abstract
Design of Software Safety Architecture and Software Safety Lifecycle of a Safety Critical System, Functionality and Model of Adaptive Cruise Control Safety Critical System
P. Sowjanya
DOI: 10.17148/IJARCCE.2016.5944
Abstract: There are many methods to ensure Safety in both Software Architecture and Software development Lifecycle. In this paper we have shown an overview of different types of models and standards used to develop Software Safety Architecture (SSA) and Software Safety Lifecycle (SSL) and mainly in Safety Critical Systems. In SSA we have discussed some types of strategies, approaches, design patterns and steps to analyse Safety Aspect in Software Architecture. In SSL we have shown three different types of implemented models such as: The model-driven software development (MDSD), CESAR domain (aerospace, automotive, rail and automation), and GTST-MLD based software development life cycle model. Safety Integrity and Fault Tolerance are the main important criteria of developing these SSA and SSL. A Safety Critical embedded System i.e. Adaptive Cruise Control System (ACCS) is taken for implementation. We have shown its basic Architecture and explained its Working technique using an Algorithm and based on that Algorithm its basic Functioning in Java and its MATLAB Simulink Model is shown in a brief way with its Screenshots.
Keywords: Adaptive Cruise Control System (ACCS), CESAR domain, GTST-MLD, MATLAB Simulink, model-driven software development (MDSD), Software Safety Architecture (SSA), Software Safety Lifecycle (SSL).
Abstract
A New Protocol for Data Protection of Cloud Environment Based on UCON
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari
DOI: 10.17148/IJARCCE.2016.5945
Abstract: Today modern computing systems leverage distributed models such as cloud, grid, etc. One of the obstacles of wide spreading these distributed computing models is security challenges which includes access control problem. These computing models because of providing features like on-demand self-service, ubiquitous network access, rapid elasticity and scalability, having dynamic infrastructure and offering measured service, need a powerful and continuous control over access and usage session. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. In cloud environment, the definition of data and its protection are gradually varied when contents shifting from one virtual machine to another; in these new scenarios, the multi-tenancy pattern has been taken as a core attribute. For this reason, many users need to change their roles according to different situations, certifications has impact much more complicated challenges in cloud environment while access control was suitable for the static status but no longer for the changing situation. Usage control (UCON) model is emerged to cover some drawbacks of traditional access control models with features like attribute mutability and continuity of control. In this paper, a new usage control protocol model�multi-UCON (MUCON) based on usage control (UCON), combined with encryption technology and the digital watermarking technology, is proposed with the characteristics of flexible accrediting, feature binding, and off-line controlling. The analysis and simulation experiments indicate that the proposed protocol model is secured, reliable, and easy to be implemented, which can be deployed in cloud computing environments for data protection.
Keywords: Cloud computing, Data protection, Access control, UCON, MUCON, Rights transfer.
Abstract
Emotion-Aware Mobile Cloud Computing in 5G
Suzen S. Kallungal
DOI: 10.17148/IJARCCE.2016.5946
Abstract: By the introduction of 5G (the fifth-generation wireless broadband), traditional network applications become more human-centric. Computer systems are increasingly capable of reading and responding to human emotions. These systems can be designed to provide response to human emotions promptly in receiving helpful feedback, dealing with negative emotions, and reinforcing positive feelings. These can be made available through mobile services in the form of instant text or video messaging. Cloud computing provides an illusion of infinite computing resources. Mobile cloud computing (MCC) is a new platform combining the mobile devices and cloud computing to create a new infrastructure, whereby cloud performs the heavy lifting of computing-intensive tasks and storing massive amounts of data. It provides many resource-intensive services to mobile users with the help of big mobile data delivery and cloud assisted computing. Both computational capabilities and the mobile broadband connections have improved, thus enabling the devices to constantly monitor the user, understanding his behavior and thus predicting his needs. Emotional mobile computing (EMC) framework is a system that is built on the development of an affordable and reliable system can perform an online analysis of the user�s emotions. It is a design to provide emotion-aware mobile services by recognizing the changes in user emotions through cloud computing and big data analysis. The traditional MCC architecture is altered to achieve the required quality of experience in emotion-aware applications. The major tasks are processed in the mobile terminal and local cloudlet, while those tasks which require significant amount of resources, are offloaded to the remote cloud. The framework proposes to combine resource-intensive affective computing with mobile applications, while employing MCC to enhance the capability of mobile devices. Thus it proves its helpfulness in providing personalized human-centric emotion-aware services in 5G.
Keywords: Network applications, Human emotions, Computational capabilities, Mobile devices.
Abstract
FPGA Implementation of pipelined Architecture in Humming bird Algorithm for Reducing Area and High Throughput
G. Kavitha, B. Vinoth
DOI: 10.17148/IJARCCE.2016.5947
Abstract: Hummingbird is a new ultra light weight cryptography algorithm target for resources constrained devices like RFID tag, smart card and wireless sensor. In this project we design the hardware implementation of humming bird cryptography algorithm based on the pipelined Architecture in Spartan 3 FPGAs. Humming bird is to meet stringent response of area and power requirements which can provide the design security with a small block size. This algorithm resists to the most common attacks like algebraic attack, linear and differential cryptanalysis. We investigate for integrating humming bird into a privacy preserving and authentication protocol. In this technique to reduce the clock cycle to encryption and decryption the message. In this work, an enhanced hardware implementation of the humming bird cryptography algorithm for reduces area and high throughput for low cost Spartan 3E family.
Keywords: Light weight Cryptography, Mutual authentication Protocol security analysis and FPGA.
Abstract
Sentiment Analysis on Huge Streaming Data using Hadoop
S. Suganthi, M. Mohamed Surputheen
DOI: 10.17148/IJARCCE.2016.5948
Abstract: Sentiment analysis has been a major focus in all consumer oriented industries due to the availability of huge amount of customer opinions in the Internet. This paper presents a sentiment analysis framework that utilizes the processing efficiency of the Hadoop ecosystem to provide real time sentiment analysis. The framework divides the process of sentiment analysis to two major sections; content pre-processing and evaluation. Experiments shows that our application has the ability to scale and handle huge amounts of data.
Keywords: Sentiment Analysis; Polarity Identification; Hadoop; Tokenization; Stemming
Abstract
Design & Implementation of High Data Rate LTE System for Improving Capacity
Vanya Mehta, Er. Timsi
DOI: 10.17148/IJARCCE.2016.5949
Abstract: Long term evolution (LTE) is a 3GPP 4G technology which enhances the development in the field of telecommunication and by improving the performance of the network for the different types of traffic flows. 4G LTE is a packet based networks brings some improvements in the form of higher bit rate and lower latencies. OFDMA technique is used in downlink and SC-FDMA technique is used in uplink. PAPR of OFDMA is higher than SC-FDMA. This paper presents reduction in the values of PAPR for OFDMA in downlink system by using pulse shaping filter and capacity of LTE system is improved by using water filling algorithm.
Keywords: 4G LTE, Downlink, Uplink, OFDMA, SC-FDMA, QPSK, 16-QAM, 64-QAM, PAPR, LTE Capacity, SER.
Abstract
An Implementation of Tracking and Detecting Fish from Videos Using Adaptive Gaussian Mixture Model
Harmoninder Singh Brar, Er. Mandeep Kaur
DOI: 10.17148/IJARCCE.2016.5950
Abstract: Fish abundance estimation, which regularly necessitates the employment of bottom and middle water trawls, is critically needed for the commercially vital fish populations in earth science and fisheries science. In this paper, we present a multiple fish tracking system for low-contrast and low-frame-rate stereo videos with the use of a trawl-based underwater camera system. An automatic fish segmentation algorithm overcomes the low-contrast issues by adopting a histogram back projection approach on double local-threshold images to ensure an accurate segmentation on the fish shape boundaries. The Slowly moving objects detection are present in the scene such problems. A New algorithm for detection and tracking will be implemented in order to investigate improved efficiency. Furthermore, the algorithms developed to perform the video analysis, (such as pre-processing, detection, tracking and counting) could be integrated into a more generic architecture so that the best algorithm for each step will be selected. The quality of underwater image is poor due to the properties of water and its impurities. The properties of water cause attenuation of light travels through the water medium, resulting in low contrast, blur, inhomogeneous lighting, and color diminishing of the underwater images. This proposes a method of enhancing the quality of underwater image. Qualitative and quantitative analyses indicate that the proposed method outperforms other state-of-the-art methods in terms of contrast, details, and noise reduction. Ordinary histogram equalization uses the same transformation derived from the image histogram to transform all pixels. In this work Gaussian mixture model and filter is used to enhance the frames and detect the fish. In this work we are getting the 80% accuracy of the work.
Keywords: Fish, Frame, Cameras, Track, Detection, low-contrast, and low-frame-rate stereo videos etc.
Abstract
A Study on Agile Methodologies
Anupama Kaushik
DOI: 10.17148/IJARCCE.2016.5951
Abstract: Now-a-days the software development environment is very challenging. Organizations are constantly changing their software requirements to adjust with new environment. They have also molded themselves to satisfy the demand for fast delivery of software products as well as for accepting changing requirements. In this scenario, traditional software development methods fail to meet up these requirements. Though traditional software development methodologies, such as life cycle models and object oriented approaches, continue to dominate the systems development few decades. Agile software development brings its own set of novel challenges that must be addressed to satisfy the customer through early and continuous delivery of the valuable software. This paper discusses three of the famous agile software development methodologies i.e. Extreme Programming, SCRUM and Feature Driven Development.
Keywords: Traditional software development; Agile software development; Extreme Programming; SCRUM; Feature driven development.
Abstract
A Transition from Traditional to Agile Software Development
Anupama Kaushik
DOI: 10.17148/IJARCCE.2016.5952
Abstract: The traditional software development methodologies are also known as �Heavy Weight� methodologies. They are based on a strict sequential series of steps such as requirement phase, implementation, testing and deployment. They require defining and documenting a stable set of requirements at the beginning of a project itself. The three most significant traditional methodologies are Waterfall, Spiral Model and Unified Process. Agile software development (ASD) is a new buzz word within software engineering community. These are also known as �Light Weight Methodologies�. Agile processes, or development methods, represent an apparently new approach for planning and managing software development projects. ASD differs from traditional approaches as it puts less emphasis on up-front plans and strict plan-based control and more on mechanisms for change management during the project. In this paper a study on characteristics of both traditional software development as well as agile software development (ASD) and the reasons for transition from traditional to agile development is done.
Keywords: Traditional software development; Heavy Weight Methodologies; Agile software development; Light Weight Methodologies.
Abstract
Removal of Current and Voltage Harmonics in 3 Phase Four Wire System using Smart Filter
Sonali Dilip Pawar, Prof. S. S. Khule
DOI: 10.17148/IJARCCE.2016.5953
Abstract: The new management topology for reduction of current harmonics in 3 part Four wire distribution system was given during this thesis .Starting with incandescent light-weight bulb each load these days creates harmonics. the difficulty of harmonics is of nice concern to engineers, building designers and additionally in industrial applications as a result of they are doing not just distort voltage waveforms, however they will conjointly overheat the building wiring, overheat transformer units, and cause end-user instrumentality failures. Thus, giving attention towards power quality has become necessary these days .The main objective of this project is to review and design good filter exploitation combination of fuzzy and PI controllers. In good filter only used single-phase inductances and capacitors, while not victimization any electrical device or special electromagnetic device. The simulation results supported MATLAB/ SIMULINK were performed to verify the effectiveness of good filter. This filter reduced current harmonics quite previous ways of reducing current harmonics.
Keywords: SIMLINK, Filter, smart Filter,
Abstract
Performance Analysis of Various Multipliers for Digital Signal Processing Applications
C. Saranya, Dr. M. Balasubramaniam, Dr. R. Naveen
DOI: 10.17148/IJARCCE.2016.5954
Abstract: Multipliers have great importance in both digital signal processors and microprocessors. So designing a reliable multiplier is the most important factor in designing a signal processor. Fast multiplication process is very important in DSPs for convolution, Fourier transforms etc. Power, speed and area are the prime design constraints of a multiplier for signal processing applications. Here a comparative analysis is made on different multiplier architectures which have been used for various signal processors. The different multipliers architectures chosen are array multiplier, a column bypass multiplier, row bypass multiplier, Vedic multiplier and Booth Wallace multiplier. The multiplier architectures simulated using tanner EDA tool and the results are compared in terms of delay, power consumption and area.
Keywords: Multipliers, power consumption, delay, area
Abstract
An Overview on Quality of Services based Routers for NGN
Santosh D. Bhopale, Dr. Mrs. S. V. Sankpal, Dr. D. Jayadevappa
DOI: 10.17148/IJARCCE.2016.5955
Abstract: Concerning the high performance, QoS supported transport services, it is not sufficient that only the traffic transport under a single domain or Autonomous System (AS) is under the consideration. Inter-domain QoS routing is also in a great need. In this proposed work we identify the challenges that need to be addressed in designing a three level core which consists of policy making, packet queuing and forwarding and resource utilization itself concerning the good performance, QoS supported convey services, it is not adequate that only the traffic transport under a single domain or Autonomous System (AS) is under the thinking. Inter-domain QoS routing is also in a great need. As there has been empirically and hypothetically proved, the dominating Border Gateway Protocol (BGP) cannot address all the issues that in inter-domain QoS routing. Thus some protocol or system architecture has to be developed to be able to carry the inter-domain traffic with the QoS and TE consideration. Moreover, the current network control also lacks the ability to cooperate between different domains and operators. The appearance of label switching transport technology such as of Multi-Protocol Label Switching (MPLS) or Generalized MPLS (GMPLS) supports the traffic transport in a finer granularity and more dedicated end-to-end Quality of Service classes.
Keywords: Gateway, Router, QoS, NGN, MPLS.
Abstract
Overview of QoS Routing Protocols under MANET Scenario
Neeru Jhanji, Prof. Tilotma Sharma
DOI: 10.17148/IJARCCE.2016.5956
Abstract: A mobile circumstantial network (MANET) consists of mobile nodes with none infrastructure. In recent years, each the realm of providing quality of service and routing in mobile circumstantial network have massively raised in importance. For quality of service (QoS) routing, it's not enough to solely realize a route from a supply to 1 or additional then one destination. This route additionally should satisfy one or additional then one QoS constraints, mostly, however not restricted to information measure or delay. In recent year variety of QoS routing protocol with distinctive options are fresh projected but, systematic performance evaluations and comparative analysis of those protocol in an exceedingly common realistic atmosphere are performed solely in an exceedingly restricted manner. This paper gift a through summary of QoS routing matrix, resources and issue touching performance of QoS routing protocol. The relative strength, weakness of the QoS routing protocol are studied and compared. QoS routing protocol area unit classified consistent with the QOs Matrix Used, styles of QoS Routing overhead and there interaction with Macintosh Protocol.
Keywords: Mobile circumstantial network, quality of service (QoS), QOs Matrix Used, styles of QoS Routing
Abstract
Dynamic Multi-Keyword Ranked Search Based Security Mechanism for Cloud Data Management
Sinu V Agnes, Dr. K. Thamodaran
DOI: 10.17148/IJARCCE.2016.5957
Abstract: Cloud computing means saving and retrieving data and programs over the internet instead of your computer's hard drive. The cloud is just a representative for the Internet. It goes back to the days of flowcharts and presentations that would represent the huge server-farm infrastructure of the Internet as nothing but a puffy, white cumulus cloud, accepting connections and distributing out information as it floats. Cloud computing has become a social fact used by most people every day. As with every important social fact there are issues that limit its widespread adoption. Most issues start from the fact that the user loses control of his or her data, because it is stored on a computer belonging to someone else. This happens when the owner of the remote servers is a person or organization other than the user; as their interests may point in different directions. In this paper, a secure multi-keyword ranked search scheme on encrypted cloud data is devised along with dynamic update operations of documents. Scrupulously, the vector space model and the extensively-used TF x IDF model are combined in the index construction and query generation. The special tree-based index structure is formed and propose a Greedy Depth-first Search algorithm to make available efficient multi-keyword ranked search. The secure kNN algorithm is effectively used to encrypt the index and query vectors, and meanwhile provide accurate relevance score calculation between encrypted index and query vectors. In order to withstand statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the updating of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.
Keywords: Cloud data, Dynamic Policy, Greedy Algorithm, Multi-Keyword Search, Security.
Abstract
Personal Pollution Exposure Estimates using Pollution Sensors and Health Prediction
Aditya Mahabudhe, Prof. Dr. M. T. Kolte, Prof. S. N. Motade
DOI: 10.17148/IJARCCE.2016.5958
Abstract: The aim of this paper is to design a wearable air pollution mapping system for an individual. For this it includes interfacing some pollution related sensors (CO2, CO and dust sensor) to the user�s body which will constantly monitor the surrounding air pollution levels and calculate the exact amount of toxic gases inhaled by the user depending upon the breathing rate of the user. Depending upon these values, the user will be alerted in real time by showing warnings where pollution level has surpassed the permissible limits. The data will be preserved and later analyzed using graphs and diagrams prepared in Excel using Visual Basic. The data analysis will provide the user with health prediction i.e. probability of immediate or long term health effects of various poisonous gases or pollutants.
Keywords: air pollution monitoring, personal pollution mapping, real time alerts, data server, health prediction.
Abstract
Effect of Intensity Resolution on Wiener Filtering and Spectral Subtraction Method for Noise Suppression in Cochlear Implants
Kalyan S. Kasturi, K. Dinesh and K. A. Dwarakanadh
DOI: 10.17148/IJARCCE.2016.5959
Abstract: Cochlear implants are biomedical devices that serve as advanced hearing aids for profoundly deaf people. In quiet listening conditions and when no background noise is present, cochlear implant devices produce high speech recognition. However, speech recognition using cochlear implant devices significantly drops in the presence of ambient noise. Since speech recognition using cochlear implants drops due to noise, incorporation of noise suppression methods to suppress noise can improve speech recognition using cochlear implants. In this research paper, the speech recognition improvement using two such noise suppression methods namely, spectral subtraction and Wiener filtering was evaluated using cochlear implant simulations. The performance evaluation of the two noise suppression methods was done in a systematic manner by varying the number of intensity steps. In this experiment the intensity resolution for cochlear implant simulation was varied in four different ways, and the performance of Wiener filtering and spectral subtraction was evaluated for the four different values of intensity resolution. Results indicated that the speech recognition using Wiener filtering was significantly higher than the speech recognition obtained by spectral subtraction method for the four values of intensity resolution.
Keywords: Noise Suppression, Cochlear Implants, Intensity Resolution, Spectral Subtraction, Wiener Filter, Spectral Subtraction Method.
Abstract
Experimental Solution to the Laplace Equation, a Tutorial Approach
G. Moradi, M. Marvasti
DOI: 10.17148/IJARCCE.2016.5960
Abstract: In this paper, experimental solutions of the electromagnetics Laplace equation are presented. First, the papers review the Laplace problem, then solve it using analytical, numerical and experimental methods and compare them together. It also shows that how useful information can be obtained from a raw Laplace equation data. Several tutorial measurements and discussions have been proposed. This paper can be used as a good educational tool in Electromagnetic and physics courses.
Keywords: Laplace equation, boundary value problems, Electrostatic, PDE, experimental setup.
Abstract
Implementing Adaptation and Reconfiguration Method in WSN
Er. Pinki Devi, Er. Promila Singhal
DOI: 10.17148/IJARCCE.2016.5961
Abstract: This work provides a dynamic network reconfiguration in wireless sensor network using controller. A routing protocol designed for WSN should have the ability of adapting to different applications and different network conditions it uses the concept of dynamic reconfiguration routing protocol that achieves the need of various applications and also various network conditions. In this work all nodes are randomly deployed and communicated with each other as well as the head node. There is direct communication between head and sensor nodes. As the result, it can be widely used in a military application for battlefield surveillance wireless sensor network has been an area of active research with many civilian applications, fire detection. A microcontroller is designed which is used to control the movement of nodes (Move Right, Move Up) and location of nodes. Before disaster occurred, all nodes changed their location for security. As disaster under control, there may get back to their locations. But in this, some localization error is present but its value is less than 3% which is very efficient.
Keywords: WSN System, Routing protocol, Dynamic Reconfiguration System, Localization, Mobility etc.
Abstract
DRLBP and DRLTP Based Object Recognition for Image Retrieval Systems
Ms. Rajashri. A. Kolhe, Prof. A. S. Deshpande
DOI: 10.17148/IJARCCE.2016.5962
Abstract: This paper presents the robust object recognition using Discriminative Robust Local Binary Pattern (DRLBP) and Discriminative Robust Local Ternary Pattern (DRLTP) methods for feature extraction. The system proposes new approach in extension with local ternary pattern called DRLTP and DRLBP. By using these methods, the category recognition system will be developed for application to image retrieval. The category recognition is to classify an object into one of several predefined categories. DRLTP & DRLBP is used for different object texture, edge contour and shape feature extraction process. It is robust to illumination and contrast variations as it only considers the signs of the pixel differences. The proposed features retain the contrast information of image patterns. They contain both edge and texture information which is desirable for object recognition. The DRLBP & DRLTP discriminates an object like the object surface texture and the object shape formed by its boundary. The boundary often shows much higher contrast between the object and the background than the surface texture. Differentiating the boundary from the surface texture brings additional discriminatory information because the boundary contains the shape information. These features are useful to distinguish the maximum number of samples accurately and it is matched with already stored image samples for similar category classification. Our proposed features are compared with two classifiers and results are tested on five datasets: WANG, Caltech 101, Caltech 256, VOC 2005, and UIUC.
Keywords: Test image, Preprocessing, Feature Extraction, Database Training, Classification, Parameter analysis.
Abstract
A Different Type of Feature Selection Methods for Text Categorization on Imbalanced Data
Senthil Kumar B, Bhavitha Varma E
DOI: 10.17148/IJARCCE.2016.5963
Abstract: Text categorization is an important and well-studied area of pattern recognition, with a variety of modern applications. Effective spam email filtering systems, automated document organization and management, and improved information retrieval systems all benefit from techniques within this field. The problem of feature selection, or choosing the most relevant features out of what can be an incredibly large set of data, is particularly important for accurate text categorization. The proposed system (i) use well known pre-processing method porter and Lancaster for train the dataset. (ii) A number of feature selection metrics have been explored in text categorization, among which information gain (IG), chi-square (CHI), Mutual information (MI), Ng-Goh-Low (NGL), Galavotti-Sebastiani-Simi (GSS), Relevancy Score (RS), Multi-Sets of Features (MSF) Document frequency (DF) and odds ratios (OR) are considered most effective. Pruning techniques are also proposed using ignore the feature based on TF and DF to further reduce the set of possible features (typically words) within a document prior to applying a method of feature selection. (iii) Finally classify the selected feature based on two algorithm KNN and Navie bayes. Two benchmark collections were chosen as the testbeds: Reuters-21578 and small portion of Reuters Corpus Version 1 (RCV1). The two classifiers and both data collections, and that a further increase in performance is obtain by combining uncorrelated and high-performing feature selection methods.
Keywords: Locally Weighted Spectral Cluster, matrix, Local Scaling, Estimating Weight based Clusters
Abstract
Design of Low Power Digitally Operated Voltage Regulator by using CMOS Technology
Nikita V. Dhomane, Dr. U. A. Kshirsagar
DOI: 10.17148/IJARCCE.2016.5964
Abstract: As portable electronic devices become a part of daily life, it creates a huge market for electronic components for those battery driven devices. Low-power digitally operated (LPDO) voltage regulator is an important part that provides steady DC supplies for other components. Low power, low noise and high stability are the desired features of a regulator. Here, A Low-Power Digitally Operated (LPDO) Voltage Regulator that can operate with a very small Input-output Differential Voltage with 32nm CMOS technology has been proposed. It increases the Packing Density and provides the new approach towards power management. A voltage regulator is capable of providing 0.8V output under the supply voltage of 1.2V and the output voltage level is controlled externally by means of 2 1-bit control signals.
Keywords: Low Drop-Out, Voltage Regulator, Power management, Reduction in chip Area.
Abstract
A Review on Multi Focal Image Fusion Techniques and Approaches
Mamta Sharma, Sarika Khandelwal
DOI: 10.17148/IJARCCE.2016.5965
Abstract: Image fusion is a process of merging two or more images of same scene to generate single fused image which provide vital information in the fused image. Image fusion method is used for removing noise from the images. Noise is an unwanted material which decreases the quality of an image and affecting the clarity of fused image. Noise can be of different types such as impulse noise, Gaussian noise, uniform noise etc. Images distort some times during transmission or acquisition or due to fault memory locations in hardware. Image fusion can be occurring at three levels such as pixel level fusion, feature level and decision level fusion. A lot of research is being done in the field of multi focal image fusion and encompassing areas of Computer Vision, Image processing, parallel and distributed processing, Automatic object detection, Robotics and remote sensing. This paper is a detailed study performed over a sequence of image fusion methods and algorithms regarding their implementation. Research issues in Image Fusion techniques are to increase efficiency in term API, Standard deviation, PSNR, and try to generate more informative fused images.
Keywords: Image fusion, multi focal image, PSNR, Entropy.
Abstract
Internet of Things (IOT) Based Weather Monitoring system
Bulipe Srinivas Rao, Prof. Dr. K. Srinivasa Rao, Mr. N. Ome
DOI: 10.17148/IJARCCE.2016.5966
Abstract: The system proposed in this paper is an advanced solution for monitoring the weather conditions at a particular place and make the information visible anywhere in the world. The technology behind this is Internet of Things (IoT), which is an advanced and efficient solution for connecting the things to the internet and to connect the entire world of things in a network. Here things might be whatever like electronic gadgets, sensors and automotive electronic equipment. The system deals with monitoring and controlling the environmental conditions like temperature, relative humidity, light intensity and CO level with sensors and sends the information to the web page and then plot the sensor data as graphical statistics. The data updated from the implemented system can be accessible in the internet from anywhere in the world.
Keywords: Internet of Things (IoT) Embedded Computing System; Arduino UNO; Arduino Software, ESP8266, Smart Environment.
Abstract
A Memory Efficient Key Management and Distribution Scheme for Vehicular Adhoc Network
Ankur Jain, Ratnesh Dubey, Vineet Richariya
DOI: 10.17148/IJARCCE.2016.5967
Abstract: VANET has lot of security issues. Since evolution of VANET many key management and distribution algorithms have been proposed. In this paper a memory efficient key management and distribution scheme for VANET have been proposed. The proposed scheme is compared with traditional scheme and it is found proposed outperforms the traditional ones.
Keywords: VANET, Vehicular Adhoc Network, Key Management, Distribution Scheme, Memory Efficient.
Abstract
Vehicular Adhoc Network- Architecture and Operations
Ankur Jain, Ratnesh Dubey, Vineet Richariya
DOI: 10.17148/IJARCCE.2016.5968
Abstract: Vehicular ad-hoc networks (VANETs) are the class of mobile ad-hoc network (MANET) applications that have the future chances in improving road safety and in giving travellers contentment. Now a day�s many persons are adopting cars and other individual vehicles. The biggest hazard respect to increased use of private transport is the increasing number of victims of the accidents on the roads; the expense and associated dangers have been predictable as a serious problem being confronted by current society. In this paper we are going to consider the main features related to VANETs its characteristics and functions. This field is favourable for researchers and developers to percept and differentiate the main aspects neighbouring VANETs.
Keywords: Vehicular Ad hoc Network, RSU, OBU global position system (GPS), attacks.
Abstract
Study of Detecting and Localizing Concept Drifts from Event Logs in Process Mining
Trupti Kakkad, Dr. Rahila Sheikh
DOI: 10.17148/IJARCCE.2016.5969
Abstract: Most business processes change over time, contemporary process mining techniques tend to analyse these processes as if they are in a steady state. Processes may change suddenly or gradually. The drift may be periodic (e.g., because of seasonal in?uences) or one-of-a-kind (e.g., the effects of new legislation). For the process management, it is crucial to discover and understand such concept drifts in processes. A generic framework and speci?c techniques to detect when a process changes and to localize the parts of the process that have changed. Different features are proposed to characterize relationships among activities. These features are used to discover differences between successive populations. The approach has been implemented as a plug-in of the ProM process mining framework and has been evaluated using both simulated event data exhibiting controlled concept drifts and real-life event data from a Dutch municipality.
Keywords: Concept drift, ?exibility, hypothesis tests, process changes, process mining.
Abstract
Cloud Service using Differential Query System
MG. Chandrasekhar, T. Kumar Raja
DOI: 10.17148/IJARCCE.2016.5970
Abstract: Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.
Keywords: Cloud storage, Data Sharing, key-aggregate encryption, patient-controlled encryption, Clustering.
Abstract
A Literature Review on Agile Software Development
Anupama Kaushik
DOI: 10.17148/IJARCCE.2016.5971
Abstract: Now-a-days the agile methodologies are the need of an hour for the software development firms. They are susubstituting the traditional methods of software development. Agile process is an iterative approach in which customer satisfaction is at highest priority as the customer has direct involvement in evaluating the software. In this paper a review of major work on agile software development from the year 2012 -2016 is done.
Keywords: Agile Manifesto; Agile software development.
Abstract
Understanding Domain-Driven Design, Command Query Responsibility Segregation & Event Sourcing and their importance in Computer Architecture
Shailee Vora
DOI: 10.17148/IJARCCE.2016.5972
Abstract: The layered architecture which consists of UI, Business Logic and Database as the three sections of it, has been proven to have quite a lot of issues with respect to scaling, maintenance and optimization. Here, I have explained the basic idea behind Domain Driven Design (DDD), Command Query Responsibility Segregation (CQRS) and Event Sourcing (ES) and how they can be leveraged for overcoming the shortcomings of the layered architecture.
Keywords: Domain Driven Design (DDD), Command Query Responsibility Segregation (CQRS), Event Sourcing (ES), Business Logic and Database.
Abstract
Image Enhancement using Texture Synthesis
Sarita Verma, Sanjay Bhardwaj
DOI: 10.17148/IJARCCE.2016.5973
Abstract: The main goal in image enhancement is to specify a images more bright therefore the image can be easily understood a pixel in an image and can be easily clarify. In image enhancement the texture synthesis can be used to filling the holes in an images and used to improve the image by using various application. Texture synthesis is the algorithmically process to constructing a large digital image from a small digital sample image. Image can be enhance by different techniques like histogram and different filters to enhancing an image. It can enhance by using contrast by and resolution feature.
Keywords: Photography, image processing, enhancement image by using texture.
Abstract
SVAP: Secure Visual Authentication Protocol
Sonal Sonyabapu Shinde, Ujwala H. Wanaskar
DOI: 10.17148/IJARCCE.2016.5974
Abstract: Keylogging is one of the harmful malware wherein the activity of recording the keys struck on a keyboard is being observed in such a way that the person using the keyboard is unknown about the fact that their actions are being observed. This paper aims to prevent keylogging attacks by assigning proper authentication codes. The methodology of this research has progressed using System model, Linear and Matrix Barcodes, Message signing and Visual Signature Validation. Demonstration of careful visualization design enhancing the security and the usability of authentication is being successfully reflected in this paper. This research enables the user to store essential information in an encrypted format which can be decrypted very speedily thereby enabling to achieve a high level of usability while satisfying stringent security requirements using strict authentication.
Keywords: Keylogging; Authentication; Encryption; Decryption.
Abstract
Detect and Identify the Defects of Industrial Pipe
Mayuri Dharma Shinde, Prof. Ramesh Y. Mali
DOI: 10.17148/IJARCCE.2016.5975
Abstract: In many manufacturing industries, conventional defect detection is done by experienced human inspectors who sketch the defect patterns or defect types manually and then resolve them. However, such defect detection methods are more costly, less accurate, time consuming and complicated also. To overcome these problems, a new method has been developed to detect and identify the defects in industrial pipes, effectively as well as automatically. This method is based on image processing and embedded system. This method works on video input. This proposed method basically works in three steps. Firstly, it converts the RGB images of the pipe into a grayscale image. Secondly, it extracts the pipe as well as fault. Then lastly it detects and identifies the defect. It also gives the idea about major and minor defect. So, according to this well known decision of pipe modification or removal of pipe from process can be taken.
Keywords: Defect detection, defect identification, embedded system, image processing, pipe industry.
Abstract
Efficient Diagnosis of Breast Cancer Using Statistical Parameters
Sonal S. Naranje, Prof. Venkat N.Ghodke
DOI: 10.17148/IJARCCE.2016.5976
Abstract: Breast cancer has become the leading cause of cancer deaths among women. To decrease the related mortality, disease must be treated early, but it is hard to detect and diagnose tumors at an early stage. Manual attempt have proven to be time taking and inefficient in many cases. Hence there is a need for efficient methods that diagnoses the cancerous cell without involvement of humans with high accuracy. This paper proposes an automated technique using artificial neural network as decision making tools in the field of breast cancer. Image Processing plays significant role in cancer detection when input data is in the form of images. Statistical parameter analysis of image is important in mammogram classification. Statistical parameters are extracted by using image processing The statistical parameter include entropy, mean, energy, correlation, texture, standard deviation, variance, MSE, PSNR. We have also include the comparative analysis of Statistical parameter using bar graph. This parameters will act as a inputs to ANN which will diagnose and give the result whether image is cancerous or non-cancerous.
Keywords: Artificial neural network, Image processing, Statistical parameter, ANN.
Abstract
Color Compensation for Vision Defects
Anupama Jamwal, Sanjay Bhardwaj
DOI: 10.17148/IJARCCE.2016.5977
Abstract: Color blindness is the shortcoming of color vision. It is the reduced ability to distinguish references between different colors. There are many kinds of colorblindness that affects the eye vision in different ways such a red-green, blue-yellow etc. But nowadays the common type of color blindness referred to as red-green in which people are not able to differentiate between red and green. Deficient people finds both the colors as the same one and some people viewed it as beige color. In this paper, we study on some color transformation scales such as RGB to HSV algorithm. This study focus on criteria based on the ease of use, accuracy, easy to analyze the different colors for color deficient people. The output of my research is to improve the red-green deficiency by enhancing the RGB image into HSV scale.
Keywords: Color blindness, Image processing, color vision, red-green color deficiency, RGB to HSV conversion.
Abstract
Image Denoising using Non Local Algorithm
Tamanna Thakur, Sanjay Bhardwaj
DOI: 10.17148/IJARCCE.2016.5978
Abstract: The technology to denoise an affected Image commonly known as Image Denoising technique (IDT) is the most useful and impactful technique used for improvisation of graphics and its assets. Further added with Non-local mean method which is one of the peak performing method. It actually modifies each and every pixel by the mean pixels including nearby neighborhoods. The Non-Local Mean Method actually tests on different types of noised images and it has extremely useful results. The output represents that it decreases the noise and improve its Clarity and performance.
Keywords: Gaussian Noise, Image Denoising, Non-Local Means
Abstract
Suspended Aerosol Particulate Matter Counter
Pratap Singh D Naik, Dr Vijay Mishra, Dr Kiran Gupta, Avinash Kumar, Puneet Sharma
DOI: 10.17148/IJARCCE.2016.5979
Abstract: A complicated blend of solid and liquid particles result in Particulate Matter particles. These particles are to be monitored and regulated for various reasons, and human health being one of them.This paper discusses about the monitoring of particulate matter particles (aerodynamic in nature) in the range of 2.5 �m to 10 �m. Here, a new technique is proposed for counting of particulate mattersusing optical analyser. Optical method uses light blocking or scattering property, where the flow of Aerosol particles causes illumination. Their interaction with electromagnetic waves causes change in light scattering which is detected by the Photodiode. An effort is put to achieve maximum optimization in terms of technology and cost. The main focus of this project is to implement a design which counts the number of particles and determines thesize of theparticlesthat are less than 2.5 �m (course fine particle) to 10 �m (total suspended particle).
Keywords: Particulate Matter, Python IDE, Microcontroller, NX SIEMENS
Abstract
Comprehensive Study & Implementation of ANN based Optical Wireless System
Er. Manjeet Kaur, Er. Parul Sharma
DOI: 10.17148/IJARCCE.2016.5980
Abstract: High-speed wireless optical communication links have become more popular for personal mobile applications. This is a consequence of the increasing demand from the personal information service boom. Compared to the radio frequency domain, optical wireless communication offers much higher speeds and bit rates per unit power consumption. That paper is about indoor optical wireless systems, in that paper the data stream is get first modulated and then get demodulated as in the all cases. The different types of errors are getting introduced in the system which are ISI, artificial light interference and Bit error. The ISI caused by multipath propagation and artificial light interference from fluorescent lamp driven by electronic blast are two major interferences, and these need to be taken into account when validating modulation schemes. The main challenge faced by this work is to seek the most optimized modulation scheme that can provide maximum system throughput while capable of withstanding most if not all of the intense channel interferences at a target BER requirement. Bandwidth efficient schemes such as the OOK and PPM are prone to artificial lighting interferences. This led to a natural conclusion of a modulation scheme that can combine benefits from both above candidates and able to avoid the drawbacks of each individual scheme. So, in this work, Discrete Wavelet Transformation and ANN-based receiver for baseband modulation techniques including OOK, pulse position modulation (PPM) is proposed.
Keywords: Artificial neural network (ANN), optical wireless communication (OWC), wavelet transforms, survey papers.
Abstract
Online Banking System Using Fuzzy with AI
Tasnuva Tehrin
DOI: 10.17148/IJARCCE.2016.5981
Abstract: Online Banking system refers to manage the whole banking system through web. In banking system, it is necessary to retrieve important information of customers from their historical data to give them some opportunities, such as discount on loan interest. To do this it is very necessary to classify them. We have classified the customers based on classical logic and fuzzy logic. We have seen fuzzy classification provides better performance than classical classification. In the last decades, information systems have revolutionized the way information can be stored and processed. As a result, the information volume has significantly increased. It becomes difficult to analyse the large amounts of available data and to generate appropriate management decisions. In practice, Information systems mostly use relational databases in order to store these data collections. This paper makes a comparison between traditional or classical classification and fuzzy classification. Experimental results demonstrate that the proposed intelligent fuzzy query is more effective than the conventional query and it provides the user the flexibility to query the database using natural language. Traditional online banking system is not intelligent, because we can�t retrieve the behaviour of customers through the system. Online Banking system refers to manage the whole banking system through web. It leads to the virtual office. Data mining is the most important research work in real world application. We can retrieve knowledge of employees and customers of any organization from their historical information through data mining. Online banking system with data mining is intelligent. In my research work, I include the most important data mining task classification and I have implemented the classical classification and fuzzy classification on online banking system. And finally, I have showed the comparisons between classical classification and fuzzy classification. Consequently, I have seen the fuzzy classification is better than classical classification due to the over and under estimation value closer to the boundary of the intervals
Keywords: Include at least 4 keywords or phrases
Abstract
An Implementation of Scheme Performance Analyser Intelligence System
Pooja Singh, Priya D
DOI: 10.17148/IJARCCE.2016.5982
Abstract: Business intelligence is a computer-based approach that analyses and interprets the business data. Typically, any business have a sales campaigns which include "trade promotion phase" where in the dealers are incentivized with gifts, coupons, discounts, prizes, etc. based on the targeted business results such as product lift, market share and revenue growth. The existing systems are slow, costly and do not provide user friendly unified view about the data including retailer performance. The rapid development in the amount of data generated and organized retailing has lead to the need of visualizing, analyzing and exploring data for better decision. Scheme Performance Analyzer (SPAN) is a Business Intelligence (BI) system, which helps in taking faster decisions and responds to market response for the sales head and the sales team of the organization.
Keywords: Business Intelligence, Visualization, Data Warehouse, DSS.
Abstract
Design of APD Efficient Carry Select Adder
Mugdha Godbole, Prof. Ramesh Y. Mali
DOI: 10.17148/IJARCCE.2016.5983
Abstract: Many types of adders available to perform fast operation in digital signal processing. Carry Select Adder is high speed device used for the fast computation. In developing era the key contributing factors are faster arithmetic unit, low power and low area arithmetic units are needed. Binary to Excess-1 converter is used to the modified carry select adder (CSLA). In the proposed architecture scheme, some new technique used which is different from conventional approach. Using optimized logic unit efficient CSLA design is obtained. Recently proposed Binary to Excess I Converter based CSLA design involves significantly more delay and area than the recently proposed CSLA. The newly design proposed CSLA is a best platform for square-root (SQRT) CSLA.
Keywords: Adders, Carry Select Adder, Xilinx 14.5, Low power design, ALU.
Abstract
ARM 7 Based Portable Oscilloscope Using LabVIEW
J. Karthika
DOI: 10.17148/IJARCCE.2016.5984
Abstract: The present world measurement and instrumentation has opened up the window for �virtual instrumentation.� This paper describes the development of a portable, very low cost oscilloscope using LabVIEW software. The project, initially designed as a graduate thesis, is currently being used for laboratory purposes. The features of this device make it suitable for implementing as an educational re-source for graduate students from Electrical, Electronics, Instrumentation, and Computer Science faculties.
Keywords: ARM processors, Oscilloscope, LabVIEW, GLCD
Abstract
Designing of Digital Adaptive Filter for Removal of Artifacts in PCG Signal
Jyoti Chouhan, Prajyant Pathak
DOI: 10.17148/IJARCCE.2016.5985
Abstract: The objective of this paper is to serve as how Noise can be combated using adaptive filter for PCG signal. The problem of controlling the noise level has been one of the research topic over the years. This paper focuses on Adaptive filtering algorithms and some of the applications of adaptive filter. The main concept is to use the LMS (Least-Mean-Square) algorithm to develop an adaptive filter that can be used in Adaptive noise Cancellation (ANC) application. In this paper we will learn the various algorithms of LMS (Least Mean Square), NLMS (Normalized Least Mean Square) and RLS (Recursive Least Square) on MATLAB platform with the intention to compare their performance in noise cancellation. The adaptive filter in MATLAB with a noisy tone signal and white noise signal and analyze the performance of algorithms in terms of MSE (Mean Squared Error), percentage noise removal, Signal to Noise Ratio, computational complexity and stability. The Adaptive Filter maximizes the signal to noise ratio & minimize the Mean Squared Error and compare their performance with respect to stability. Adaptive Noise Canceller is useful to improve the S/N ratio. The Adaptive Filter minimizes the mean squared error between a primary input, which is the noisy PCG, and a reference input, which is either noise that is correlated in some way with the noise in the primary input or a signal that is correlated only with PCG in the primary input.
Keywords: LMS (Least Mean Square), NLMS (Normalized Least Mean Square), RLS (Recursive Least Square), MSE (Mean Squared Error).
Abstract
A Review of Melanoma Skin Cancer Detection Techniques using Medical Image Processing
Shefali Laddha, Komal Paliwal
DOI: 10.17148/IJARCCE.2016.5986
Abstract: Skin cancers are the most common forms of human malignancies in fair skinned populations. Although malignant melanoma is the form of skin cancer" with the highest mortality, the non-melanoma skin cancers" (basal cell carcinomas and squamous cell carcinomas, etc.) are far more common. The incidence of both melanoma and non-melanoma skin cancers is increasing, with the number of cases being diagnosed doubling approximately every 15 years. In this manner, early finding of skin cancer can diminish mortality and dreariness of patients. In this paper we are investigating various techniques for early stage melanoma skin cancer detection.
Keywords: skin cancer, Region growing, segmentation, Texture analysis, Edge detection etc.
Abstract
Survey on Wireless Sensor Network Protocol to Enhance the Network Lifetime
Harpreet Kaur, Amit Verma, Manit Kapoor
DOI: 10.17148/IJARCCE.2016.5987
Abstract: Wireless sensor network consists of sensor nodes which are powered by battery; to communicate with each other for environment monitoring. Energy efficiency is the main issue in wireless sensor networks. Therefore, to maximize network lifetime and achieve maximum reliability and scalability, routing techniques have been developed. LEACH is the conventional hierarchical clustering protocol widely used in WSNs. This paper reviews the taxonomy of WSN routing protocols and also highlights issues in LEACH protocol along with disadvantages. The objective of this paper is to provide brief detail of some LEACH improved versions. Finally this paper compares some features of LEACH protocol variants.
Keywords: WSN, LEACH, HEED, LEACH-C, Network lifetime.
Abstract
Static Clustering of Web pages for Relevant Recommendation
Tina D Abreo, Anand Khandare, Prachi Janrao
DOI: 10.17148/IJARCCE.2016.5988
Abstract: Today the Web is the large repository of information. The existence of a profusion of information, in combination with the continuously updating the web information, make its retrieval a difficult process for the user. The search activity carried out by the user is sometimes not productive according to his query. The concept of understanding the query of the user and the system varies. This intern gives rise to the results which are irrelevant for the user. The web pages in the results which are retrieved may sometimes not be according to the domain specific meaning. This leads to occupying more time of the user in searching the required web page. By clustering the web pages according to the domain will give better search results for the requested query. This paper discusses the recommendation of web pages and clustering it statically, to check the efficiency of the end result.
Keywords: Semantic Web, Domain Knowledge, Recommendation, Clustering.
Abstract
Link Lifetime Prediction and Secure Data Transmission in Mobile Adhoc Network
Ashish Kumar Awadhiya, Prof. Rohit Vyas, H.O.D .Vivek Sharma
DOI: 10.17148/IJARCCE.2016.5989
Abstract: MANET is a system which workings on idea of having network short of any setup. MANET�s having number of node demands high quality of processing power, high bandwidth and memory to provide definite routing information, though induces traffic overhead in the mobile network. DSR protocol is a sensible protocol in MANET. Due to the intrinsically self-motivated nature of the mobile network topology, the existing links are recurrently damaged, and fresh links are often recognized. Nodes mobility has greatest impact on available routes. Mobility leads to dynamic topologies of the network which enforces nodes to update their neighbor information and associated routes to a node. Different routing protocols update this information in different ways. Determination of link lifetime, data security, detection of malicious node and secure information transmission in a MANET is an important tasks in any mobile network. Our proposed protocol discover the link lifetime and if original link is breakdown then new secure node is established and information is transferred from newly created link. We proposed a secure trust value which helps authenticate the node and also keep safe the network from malicious nodes. The system also perform secure routing to protect MANET against malicious node. Experimentally result showed that our scheme is well suited for better data transmission. The simulation results discovered that the data delivery percentage and performance of the system is improved.
Keywords: MANET, Routing, Security, Link lifetime, Multihop network
Abstract
FPGA Based Digital Filter Module
Dr. Haresh Pandya, Mr. Mahesh Rangapariya, Mr. Kamaldeep Gosai, Mr. Jatin Savliya
DOI: 10.17148/IJARCCE.2016.5990
Abstract: Digital filtering algorithms are most commonly implemented using general purpose digital signal processing chips for audio applications, or special purpose digital filtering chips and application- specific integrated circuits (ASICs) for higher rates. This paper describes an approach to the implementation of digital filter algorithms based on field programmable gate arrays (FPGAs). The advantages of the FPGA approach to digital filter implementation include higher sampling rates than are available from traditional DSP chips, lower costs than an ASIC for moderate volume applications, and more flexibility than the alternate approaches. Since many current FPGA architectures are in-system programmable, the configuration of the device may be changed to implement different functionality if required. Our examples illustrate that the FPGA approach is both flexible and provides performance comparable or superior to traditional approaches.
Keywords: Digital Filter Module, VHDL (VHSIC Hardware Description Language), FPGA (Field Programmable Gate Arrays), Electronics Switch.
Abstract
Educational Game Design for Improving the Children with Number Sense
Huda Zaki Naji, Hazim Majeed Jasim
DOI: 10.17148/IJARCCE.2016.5991
Abstract: Number sense is the general comprehension of numbers, operations, and the relationships which involve numbers. Based on previous prevalence studies, there are about 3�6 % of the population who have disabilities to understand the number sense. Thus, the computer technologies and mobile games play an essential role to develop the students with number sense, as it will be a tools to improve their mathematical and logical thinking. The main goal of this paper is to design a new educational math game named as 123GO to develop a basic mathematical skills of students with number sense. This study explores the measuring consideration for the usability of proposed educational math game (123GO) by using the usability testing which adopted to assess student�s motivation towards learning basic mathematical skills. During the usability testing session, the data observations of students are recorded. The usability testing data were quantified to measure the effectiveness, efficiency and satisfaction. The results showed that students' interest when using this game to teach them basic mathematical skills.
Keywords: Number Sense, Mathematical Skills, Educational Games, Computer Technologies.
Abstract
Energy Efficient Data Collection in Wireless Sensor Networks Using Quotient Partition Method (QPM)
M. G. Annapoorani, C. Indrani, V. Dharani
DOI: 10.17148/IJARCCE.2016.5992
Abstract: In wireless sensor network (WSN) the data collection is more challenging one, because each node in the network having limited bandwidth and energy level. With the aim of reducing energy consumption and to achieve high data accessibility with low communication cost in the presence of multiple next hop nodes, the proposed approach is designed with 3 phases (i) initialization phase (ii) packet-splitting phase (iii) forwarding phase. Before the collection of data from sensor node, the sink node broadcast the message to all sensor nodes in the network to form the route path from the sensor to sink. To form the route path the proposed system incorporate the method of Self Centered Friendship (SCF) that means each node will consider itself as root node and appends the nodes that are connected to them by one hop. After the basic formation of SCF Tree the system moves forward with help of QPM for splitting the packets. The Quotient Partition Method (QPM) is characterized by a simple division between the integers. Finally the system simply forwards the sub packets towards the sink which broadcast the message for data. Once all sub packets (called QPM components) are received correctly the sink node will recombine them using mask. When, compared to the existing data collection techniques data collection using SCF Tree with QPM based packet forwarding is found to produce the best result in terms of energy consumption, data accessibility and low communication cost.
Keywords: Energy efficiency, data collection, mobile user, packet splitting, wireless sensor networks.
Abstract
Denoising ECG Signal Using Daubechies and Symlet Wavelet Transform Techniques
Tanuj Yadav, Rajesh Mehra
DOI: 10.17148/IJARCCE.2016.5993
Abstract: In latest years, Electrocardiogram (ECG) acting a commanding role in heart sickness diagnostics, Human Computer Interface (HCI), stresses and emotional states valuation, etc. Generally, ECG signals exaggerated by noises such as baseline wandering, power line interference, electromagnetic intervention, and high frequency noises during data acquirement. With the purpose of recollect the ECG signal morphology; numerous researches have implemented using diverse preprocessing approaches. In this paper, wavelet filtering based Debauchees and Symlet techniques are used to improve SNR and minimize MSE of the ECG signals. The maximum SNR is obtained as 52.07374 dB and the average value of MSE in soft and hard thresholding is 0.0744559. As the SNR is improving the artifacts of ECG signals are fetched up to the optimum level and the exact diagnosis of the heart is possible.
Keywords: Arrhythmia, Electrocardiogram, Electrodes, SNR, Thresholding, Wavelet, FIR Filter ECG Signal, IIR Filter
Abstract
Analysis of Efficient Security Depends on Pairing Based ECC in VANET
K. Iswarya, K. Haridas
DOI: 10.17148/IJARCCE.2016.5994
Abstract: The Vehicular ad hoc network (VANETs) is self organizing network in which vehicles communicate with each other without the presence of any infrastructure. It has a wireless device send information to near vehicles and Road side units. It has prone to several different attacks. Here we need high security to secure our messages from the hackers. There are several algorithms to provide the security; ECC (Elliptic Curve Cryptography) is one of the algorithms that provide security by using minimum number of keys. In this paper we have discussed about the VANET security by using ECC. Elliptic curve arithmetic can be used to develop a variety of VANET security schemes including key exchange, encryption and digital signature.
Keywords: VANET, Security Requirements, ECC, Pairing based ECC, Encryption, Decryption
Abstract
Flash Alert Notification System using Android
Aditya Tomar
DOI: 10.17148/IJARCCE.2016.5995
Abstract: This project aims in developing an application for daily use having easy operation and easy to use. Usually when people are in meeting or any discussion where they have to put their mobile phones on silent mode on which their mobile phones don�t even vibrate or else they are far from their mobile at that time. At that time when they get a call on their mobile phones, they sometimes don�t even know that they are getting a call or someone is calling them. Flash Alert is an app from which whenever you�ll get a call, your mobile phone�s flash will start blinking and you will get to know that you are getting a call on your mobile phone. Also, this app has another functionality of acting as a torch light. It has a button which adds a functionality of torch light. Whenever you will click on that button, flashlight will get on.
Keywords: Android, Genymotion, APK, ADT.
Abstract
A Novel Method of Fingerprint Recognition Based on Neural Network
Vinod Kumar Bhasker, Shahanaz Ayub
DOI: 10.17148/IJARCCE.2016.5996
Abstract: Fingerprints are the great way to identify individuals. Biometric identification through fingerprint is one of the oldest methods. To get a good fingerprint is not always easy because of injury on an individual�s finger and noisy image. So pre-processed of the fingerprint image is necessary before matching. The main aim of this work is to get better and enhanced fingerprint image. We have analysed the components to obtaining high-performance feature point�s detection algorithm, such as quality of image, separation, enhancement of image and feature detection. It is necessary to accurate Separation of noisy background from fingerprint ridges. The simulations are completed in the MATLAB2014 environment to evaluate the performance of the applied algorithms.
Keywords: Biometric, Fingerprints, Neural Network, Feedforward network, MATLAB2014.
Abstract
A Survey on Coral – A Cloud-Backed Frugal File System
P. Rohini, K. Palraj
DOI: 10.17148/IJARCCE.2016.5997
Abstract: At present dramatically increase in the business and internet applications, storage is becoming a major issue in cloud computing. Storage costs are increasing day- by-day. Cloud backed is backing up data that involve distribution copy of the data over a community network to an off-site server. Uncomplicated access interfaces and elastic billing models, cloud storage has become a gorgeous solution to make simpler the storage organization for both enterprises and individual users. This paper presents a survey on the different cloud backed frugal file system. This enables effective storage management, increase the performance and reduce the cost in the cloud.
Keywords: cloud computing, cloud backup, billing models, frugal file system.
Abstract
Priority Management of Emergency Vehicles Using IOT Approach
Ashit S Chitta, Dinesha P
DOI: 10.17148/IJARCCE.2016.5998
Abstract: In the present world, with the growing number of vehicles, traffic has increased to a very greater extent. This mainly has a major impact on the vehicles dealing with an emergency situation. The system employs assistance to such emergency vehicles without any human effort. Conventional technologies use the manual or semi manual systems. Manual system uses the manpower. The semi manual methods use the fixed interval traffic light and image processing which do not distinguish between the emergency and other vehicles. The paper presents a wise traffic control system to pass emergency vehicles smoothly utilizing RFID and Internet of Things (IoT) applications. The system uses ARM7 controller (lpc2148), RFID reader to detect the RFID tags fixed to the vehicle. This module uses ZigBee module CC2500. The total system can be monitored through IoT.
Keywords: ambulance, ARM, GSM SIM300, Internet of Things, RFID, traffic light, ZigBee.
Abstract
Comparison between Thermal Ablation Techniques for Treatment of Cancer
Surita Maini
DOI: 10.17148/IJARCCE.2016.5999
Abstract: Thermal ablation is direct application of heat to a specific tumor in order to achieve complete eradication of tumor There are five methods used to produce thermal ablation: cryoablation, radiofrequency (RF), laser, ultrasound and microwave (MW). The thermal ablation received more attention from research community when they realized its potential to become the superior treatment modality with the advancement in technology. In this paper author has compared the entire thermal ablative to treat the cancer in the deep seated organs.
Keywords: Tumor, Ablation, radiofrequency (RF), ultrasound, (microwave MW)
Abstract
Recommendations System Applications
Shakila, Dr. Sheetal Rathi, Prachi Janrao
DOI: 10.17148/IJARCCE.2016.59100
Abstract: The proposed paper is based on the concept of recommendation. Recommendation has wide application in today�s world. From personalised news suggestion to products and services suggested to the user are all based on recommendation this paper focuses on the different area in which recommendation is applied. The different technique which are used to implement the recommendation are also studied in detail. The paper also includes a survey which compares two famous e-commerce websites that is Amazon and Flip kart. These e-commerce websites are compared based on different parameters the most important of which is semantics.
Keywords: Amazon; Flip kart; recommendation; Applications.
Abstract
Reduce the Consumption of Energy in Wireless Sensor Network Using Improved STR Protocol
Niharika Namdev, Vivek Sharma
DOI: 10.17148/IJARCCE.2016.59101
Abstract: In current scenario ZigBee wireless sensor network suffered from distribution of power and route cost for the selection of root tree node and communicating node. The power supply process of wireless sensor network is fixed type. The process of power used battery. Now most of authors followed the location based and heretical based protocol for minimization process of energy factor in wireless sensor network. In consequence of efficient energy and route cost minimization one is very famous routing protocol is shortcut tree routing protocol. In the process of improvement of ZTR protocol one protocol are available such are called as STR protocol. Basically STR protocol is a combination of two different routing protocols for the processing of energy saving mode and cost. The research gap between ZTR and STR is sharing of information for the selection of tree node process. During the cluster node selection more power is consumed. Now reduction of this power effect used reference node selection mode for the selection of tree head and data transmission for the communicating node.
Keywords: WSN, ZTR, STR, ZigBee Wireless Network.
Abstract
Enhanced Data Gathering with Compressive Sensing in WSN using Dynamic Merge Compressive Algorithm
Sumaiah barveen S, C Grace Padma MCA, M.Phil, MBA
DOI: 10.17148/IJARCCE.2016.59102
Abstract: Data gathering is one of most important functions provided by WSNs, where sensor readings have to be collected from sensor nodes to one or few data collection sinks node. Due to the fact that there may exist high correlations among these sensor readings, it is inefficient to directly deliver raw data to the destination(s).In this study the application of CS with random walks for data gathering in WSNs. The proposed system adopt the standard. Previous works focus on finding the movement patterns of each single object or all objects. This paper proposes an efficient distributed mining algorithm to jointly identify a group of moving objects and discover their movement patterns in wireless sensor networks. Afterward, a compression algorithm, called (Enhanced 2 phase and 2D) E2P2D is proposed, which utilizes the discovered group movement patterns shared by the transmitting node and the receiving node to compress data and thereby reduces the amount of delivered data. The enhance compression algorithm includes a sequence merge and an entropy reduction phases. In the sequence merge phase, a Merge algorithm is proposed to merge and compress the location data of a group of moving objects. The experimental results show that the proposed compression algorithm leverages the group movement patterns to reduce the amount of delivered data effectively and efficiently.
Keywords: Data gathering, Data Collection, Distributed Mining Algorithm, Compression Algorithm, E2P2D.
Abstract
Social Media Analytics for Enterprise
Ms. Ankita Chopra, Ms. Yogita Sharma
DOI: 10.17148/IJARCCE.2016.59103
No abstract available.
Abstract
An Empirical Study of Topical Relation in Opinion Mining
Prajkta Akre, Harshali Patil, Anand Khadare, Mohammad Atique
DOI: 10.17148/IJARCCE.2016.59104
Abstract: Opinion mining applications are used for different purposes in different domains, every application has some common attributes but each application uniquely describes itself. In this paper we have done literature of some applications, also presented the idea of our application. Our main concept is related to Topical Relations, which shows the relation between opinion words and opinion target. Topical Relation gives relation between opinion target and opinion words. We have performed our experiment on electronic product reviews and tried to get accurate relation between target and words.
Keywords: Topical Relation, Opinion Target, Opinion Word, Opinion Mining.
Abstract
A Raspberry Pi Based Global Industrial Process Monitoring through Wireless Communication
Priyanka S Lonare, Dr. Mahesh Kolte
DOI: 10.17148/IJARCCE.2016.59105
Abstract: In recent research work the Wireless technologies are being more and more used in automation and also in the field of wireless communications are diverse. The advancement in wireless technology offers a good opportunity in the area of communication in perfect region . When the embedded devices are provided with internet access the demand will rise due to the remote accessing capability of these devices. Users can monitor & control remote systems by using embedded Easy IOT server. Wireless based industrial automation is a prime concern in our day-to-day life. The approach to Wireless Network for Industrial Applications standardized nowadays. Intelligent and low-cost automation of industrial processes are crucial in order to improve process efficiencies, deliver quality products, and ensure timeliness and accuracy of systems .Wireless is predicted to be one of the fastest growing technologies in the area of process automation sector This paper is focused on design & implementing a secured wireless communication system of ARM embedded IOT server based on Raspberry Pi. For effective designing & implementing a system we use wireless technology. This wireless technology along with router makes the system Accessible from anywhere in the world. Various Sensors are interfaced with microcontroller. Parameters like Temperature, gas, motion, distance, humidity are measured & real time sensed data is available on the remote pc as well as on the android Smartphone. Due to the use of wireless technology we can achieve super speed transmission of large amount of data in very less time. As the overall system is based on generating of dynamic IP address every time, we can say that the system is much secured than all the previous systems. Thus Proper use of wireless sensor networks (WSNs) lowers the rate of failures, overall cost of the system, & increases the productivity, efficiency of overall industrial operations.
Keywords: Easy IOT Server, Raspberry Pi, Real Time, Arduino Wireless sensor networks, Industrial
Abstract
Online Recognition of Malayalam Scripts with Minimized Feature Dimensions
Baiju K.B, Sabeerath .K, Lajish .V.L
DOI: 10.17148/IJARCCE.2016.59106
Abstract: The objective of the work is to develop a database for online Malayalam script and identify online handwritten Malayalam characters with the use of Artificial Neural Network (ANN) and K-Nearest Neighbour (KNN) classifiers. The system uses minimum features (ADP, Aspect Ratio, Intersections and Octants)identified as relevant features and obtained 90.40% accuracy which is observed to be the best performance with these features and classifiers. Experiments are done for handwritten basic vowel alphabets (8) and consonants (36) in Malayalam. The database consists of 12800 samples of 64 Malayalam characters with 200 samples per character.
Keywords: Script Database; OHCR; KNN; ANN.
Abstract
Detecting Abnormalities in the Heart Valve
Ambika R
DOI: 10.17148/IJARCCE.2016.59107
Abstract: �Cardiac murmurs� are noise associated with deviation in blood flow dynamics and improper closure of valves. The whooshing sound is produced by blood flow across abnormal valves or due to abnormal connection between heart chambers. There are various equipment like ECG recording electrical activity of heart and echocardiography depicting structure of heart using Doppler waves. But these equipments require hospitalization and may be expensive to the patient. Clinical tool like stethoscope helps physician to know about heart murmurs, this require expert opinion and a trained ear of a doctor.
Keywords: Diastolic, Heart sounds, Murmurs, Stethoscope, Systolic.
Abstract
Automated Toll System for Number Plate Detection and Collection
Ankita S. Bhore, Priya D. Thombare, Punam B. Pure, Bhawana W. Nimbhorkar, Pro. Gunjan Agre
DOI: 10.17148/IJARCCE.2016.59108
Abstract: In this system named automated toll system for number plate detection and collection emerges as a convincing solution of the problem to the manual toll collection system applied at tollgates. Time, efficiency, fuel and pollution are a matter of present day. In order to remove the major issues of vehicle congestion and time consumption, image processing technology is used. In this system images and videos will be passed as an input or can be browsed from any location. Using images and videos the number plate is detected and further process .This system various modules are RTO admin, Toll admin, Police admin, Super admin and the general public. The role of the Super admin is to register toll centers at various locations using User name and Password. These credentials are sent to the toll admin, using which he login into the account. Toll admin module is basically used for the calculation purpose of toll deduction based on vehicle type. The RTO registers the vehicle information and associates it with the number plate of the vehicle. In case a stolen vehicle passes through the toll collection center, the number plate is detected and the notification is send to the Police admin module. Toll deduction takes place through e-wallet assigned to the concerned number plate of the vehicle that belongs to the owners� account. Additionally the daily toll collection information can be obtained and send to the Government for verification.
Keywords: E-wallet, Number plate detection, Toll collection, Vehicle number recognition.
Abstract
Self Adaptive Routing Framework with Faux Node Generation to Detect and Mitigate OLSR Security Threats
Shyam Chandran P, Anupama K N
DOI: 10.17148/IJARCCE.2016.59109
Abstract: Wireless networks are infrastructure less. Due to this nature, many types of security threats affect Ad-hoc network process and performance. In this proposal, different types of attacks and its mitigation strategy over ad-hoc network are discussed and finally proposed a new routing framework for OLSR to detect and defend DOS and wormhole attacks. In the infrastructure free network, the abnormal and malicious behavior of nodes disturbs the overall performance of the network, so the detection should be accurate and should reduce packet delay and loss. In existing, various techniques and methods used to mitigate different types of attacks and security threats in OLSR protocol. The proposed system concentrates on the DOS and Wormhole attack issue in OLSR. So the proposed system designs and implements a new routing framework named as SAR (Self adaptive routing framework with faux node generation), which detects and mitigates the routing attacks in OLSR. The self adaptive framework provides effective mitigation process on dynamic node isolation and wormhole behaviors.
Keywords: MANET, OLSR, node isolation attack, faux node.
Abstract
Time Efficient Item Elimination Based Technique for Mining High Utility Items from a Data Set
Bharti Ahuja, Mrs. Rupali Bhartiya
DOI: 10.17148/IJARCCE.2016.59110
Abstract: The data mining and their different applications are becomes more popular now in these days a number of large and small scale applications are developed with the help of data mining techniques i.e. predictors, regulators, weather forecasting systems and business intelligence. There are two kinds of model are available for namely supervised and unsupervised. The performance and accuracy of the supervised data mining techniques are higher as compared to unsupervised techniques therefore in sensitive applications the supervised techniques are used for prediction and classification. This paper presents a high utility item set mining technique. In this technique, the useless patterns are removed at the initial stage of mining. So it is helping in getting less time consumption.
Keywords: Data mining, High Utility Item sets Mining, Transactional Utility, and Weighted Transactional Utility.
Abstract
Performance Analysis of Effect of Fiber Length, Input Power and Attenuation Coefficient on Dispensation Compensation Using FBG
Sami Haider, Dr. D K Srivastava, Ravindra Kumar
DOI: 10.17148/IJARCCE.2016.59111
Abstract: The phenomenon of broadening of pulse as it travel along the optical fiber called dispersion, is the main barrier in achieving an efficient and high speed communication system. In this paper, we have analyzed the effect of fiber length (km), input power (dBm) and attenuation coefficient (dB/km) on the overall performance of an optical communication system containing Fiber Bragg Grating (FBG) as the dispersion compensator. The values of system performance parameters like Quality factor, Output power (dBm), Gain (dB), Noise figure (dB) and Minimum bit error rate (BER) have been calculated and analyzed using Eye diagram and related tables and graphs. All the simulation of the system has been done on the Optisystem 14.0 software.
Keywords: Fiber Bragg Grating, Fiber Length, Input Power, Attenuation Coefficient, Quality Factor, Output Power, Gain, Noise Figure.
Abstract
Analysis of Dispersion Effect in Single OFDM and WDM System
Ravindra Kumar, Dr. D.K. Srivastva, Sami Haider
DOI: 10.17148/IJARCCE.2016.59112
Abstract: In this paper we study about the dispersion effect in optical fiber and also effect of the dispersion for 4-QAM CO-OFDM and CO-OFDM WDM system at 10Gbps data rate. Then we investigate the performance for single OFDM and four channel CO-OFDM WDM system with 50 GHz spacing. For this analysis we use opt wave simulation software Optisystem V.14. And then compare effect of dispersion for single OFDM and CO-OFDM system.
Keywords: OFDM, QAM, WDM, Optical Communication
Abstract
Solving of Lectures Timetabling Problem and Automatic Timetable Generation using Genetic Algorithm
Nashwan Ahmed Al-Majmar, Talal Hamid Al-Shfaq
DOI: 10.17148/IJARCCE.2016.59113
Abstract: The timetabling is a difficult problem, which is an element of the widen field of Scheduling. The scheduling problems belong to NP hard problems and are defined as an allocation problem of resources over time. The classes or lectures timetabling problem is usually solved by hand and taking several days or weeks of repair after feedback from staff and students in departments. This paper proposed an improved algorithm to solve lectures timetabling problem using genetic algorithm (GA), which has enhanced performance especially because the modification of genetic algorithm behavior. This paper also shows implementation details of timetabling software solution, which employs GA for finding an optimal solution of timetabling problem and generating lectures timetables by using real datasets and constraints from the departments at University of Science and Technology, IBB branch (hinted in the paper as college), Yemen. This software was developed by using C# to program genetic algorithm interface and using SQL Server database to store optimal timetables and college information.
Keywords: Genetic algorithm (GA), scheduling, timetabling, chromosome representation, constraints.
Abstract
Measuring Quality of Electronic Service Bareillymedicalhelp.com
Anand Kr. Shukla, Zubair Khan, Prof. Jagdish Rai
DOI: 10.17148/IJARCCE.2016.59114
Abstract: Today the generation is more used to of E-World they are spending their time taking advantage and service from the internet, private sector as well as government are now moving towards the E Services, government are connecting with peoples through the E Service, even Government are providing various schemes through E Services only with the slogan Digital India, so today is the edge of E Service help to create more transparency , this will be more effective with quality E Service, creating and managing the quality should be on priority for the creator of E-Service hence this article is based on quality checking of a E service bareillymedicalhelp.com, for the same a survey has been conducted and analysis of the survey result will be discussed.
Keywords: Easy Accessing, Accuracy, impressive design, information relevancy and efficiency, difficulties level, Helpful for Bareilly.
Abstract
Detecting and Classifying Malicious Apps Using Rule Mining Algorithms
Shyam Chandran P, Mubeena V
DOI: 10.17148/IJARCCE.2016.59115
Abstract: In the recent trend, there are plenty of apps dominating social networks. There are several mobile apps and social site based apps are malicious and duplicate in features. Facing the large amount of apps, app retrieval and app recommendation become imperative task, while users can easily use them to acquire their desired apps without malicious and duplicate. To classify different apps based on its features and security levels is the major task of the proposed work. The recent methods are conducted mostly relying on user�s log or app�s details, which can only detect whether two apps are downloaded or used by the user. Moreover, apps contain many general relationships other than similarity, such as one app needs many permissions, the proposed work classifies the app based on the permission asked by the app. These relationships cannot be performed without the whole details of app descriptions. Reviews contain user�s viewpoint and judgment to apps, thus they can be used to calculate relationship between apps. To use reviews, this paper proposes a similarity and rule matching process by combining review similarity and app rule verification.
Keywords: Data Mining, Mobile APP, Relations among complexity measures, similarity measures, text processing, web mining, malicious detection.
Abstract
Integrating Voice over Internet Protocol Technology as a Communication Tool on a Converged Network in Laos
Phoutthasine Chouyapaseuth
DOI: 10.17148/IJARCCE.2016.59116
Abstract: Currently computer network is widely using in transmitting information especially the connection between servers located in Head Quarter and users in branches. Beside the information, they have to call to others which is separated system. If they consolidate into the existing computer network, the organization can deduct some expenses and boost the utilization on existing infrastructures. The VoIP technology has been widely accepted and has received a boost in many countrieswhere users are now migrating from the legendry Public Switch Telephony Network (PSTN) to VoIP because of the numerous benefits it offers but unfortunately the organizationin Laos is yet to key into this promising technology. This study therefore focuses on introducing and implementing this technology in a converged network in Laos environment by the use of open source Asterisk.
Keywords: VoIP, SIP, Converged Network, Asterisk.
Abstract
Digital India: Mission Transformative in Totality by 2020
Kusum Sharma, Kushagra Sharma, Rupika Rana
DOI: 10.17148/IJARCCE.2016.59117
Abstract: Digital India program is an initiative to make technology access to each and every citizen of the country with a vision to transform India in to a digitally empowered state and a knowledge economy. Digital India initiative could help in achieving the objectives of Education for all, Information for all, Healthcare for all. Digital India program is citizen-centric and will change the system of delivery of services hence will change the quality of life. A Vision of Digital India Centered on 3 Key Areas �(i) Digital Infrastructure as a Utility to Every Citizen ,(ii) Governance & Services on Demand, (iii) Digital Empowerment of Citizens. Nine Pillars of Digital India program are the various areas like Broadband Highways, Universal Access to Mobile Connectivity, Electronics Manufacturing, e-Governance, Public Internet Access Program, e-Kranti, IT for Jobs, Information for all and Early Harvest Projects. Each Pillar has own challenges which we have to manage and overcome to make the program a successful mission.
Keywords: Digital, e-Governance, citizen centric, connectivity, Digital Economy, Digital Infra structure
Abstract
Improved LWT SWT Resolution Enhancement Technique by Switching Interpolation Technique
Shalini Dhiman, Pawan Kumar Mishra
DOI: 10.17148/IJARCCE.2016.59118
Abstract: The generation of the image processing has enormous fields and areas of applications. In this new world of technology it is playing its role efficiently. From health care to the space program, from transportation to the investigations, from entertainment to the information technology etc. �Digital Image Processing� also known as DIP has a major role to make things modern and easy at the same time. In this work it is focused on the enhancement of the digital image in the context of pixels. This enhancement is on the key feature of an image and known as resolution of an image. Resolution of an image is basically the grid size of pixels in an image. There is always a need of enhancing the resolution by other methods such as by external software or program. These resolution enhancement programs are different than zooming program in a way that they just not stretched it but interpolate in which means they generate pixels related to the other pixels of image virtually.
Keywords: LWT Lifting Wavelet Transform, SWT Stationary Wavelet Transform, PSNR Peak signal to noise ratio, MSE Mean square error, SNR Signal to Noise Ratio, RMSE Root Mean Square Error, MAE Mean Arithmetic error.
Abstract
Teaching Reforms in Automotive Power train and Chassis Control System Experiment
Luo Xiao, Wu Jianzhen, Chen Xiaolong
DOI: 10.17148/IJARCCE.2016.59119
Abstract: The Automotive Power train and Chassis Control System Experiment is a supporting course for Automotive Power train Control System and Chassis Control System. This paper discusses the choice of experimental materials and how to vividly explain theoretical knowledge and conduct experiments.
Keywords: Power train Control System, Chassis Control System, Experimental Methods, Reform
Abstract
A Novel Study on Capacity Improving Algorithm for High Data Rate LTE-A Downlink System
Prem Chandra Gupta, Mrs. Garima Saini
DOI: 10.17148/IJARCCE.2016.59120
Abstract: LTE and LTE-Advanced have provided a major step forward in mobile communication capability. It helps for enabling mobile service provisioning to approach for first time. In LTE-A system, heterogeneous networks are important to improve system throughput per unit area. This paper presents a review on high data rate LTE-A system. In this, OFDMA technique is used in downlink and SC-FDMA technique is used in uplink. In downlink, the combined usage of inter-cell interference that reduces the interference from macro cell and cell range expansion is very effective for improving throughput performance. This paper focuses on improving capacity in LTE-A system by concept of increasing power. It also focuses on reducing PAPR value of system by using suitable filtering technique. All simulations will be implemented in MATLAB.
Keywords: LTE, PAPR, OFDMA, SC-FDMA etc.
Abstract
Runtime Optimization of 802.11 based Wireless Mesh Network by Multi-Radio Multi-Channel
Er. Navneet Kaur, Er. Gurjot Singh
DOI: 10.17148/IJARCCE.2016.59121
Abstract: Established WMNs work in single-radio single-channel (SR-SC) design in which single network interface card (NIC) is setup in every router and one basic radio channel is shared by every mesh router. In this engineering, system continues from low limit and throughput because of successive back offs and collision impacts, consequently Single-Radio Multi-Channels (SR-MC) had been intended to upgrade the WMNs execution. In SR-MC design each cross section switch needs to switch between channels progressively with shifting activity load in the system, while incorporating with connecting network hubs to guarantee trade of data for some timeframe through a typical channel yet such coordination can be accomplished by tight time synchronism among mesh nodes, however in a multi-hop WMNs it is hard to accomplish such synchronization among hubs. A satisfactory answer for decrease the high inactivity and at the same time upgrade throughput and diminish end-to-end delay of WMNs is to utilize Multi-Radio Multi-Channel (MR-MC) engineering. In MR-MC WMNs design, various interchanges can happen in the meantime, and diverse channels doled out to connecting connections can convey information packets without impedance. In the wake of authorizing SR-MC WMNs and MR-MC WMNs in Qualnet test system, results are assessed in view of parameters such as throughput and end-to-end delay. Results demonstrate the critical distinction between these two situations. MR-MC WMN gives the better result as contrast with the SR-MC WMN. MR-MC WMN is considerably more suitable for the calamity administration in the broadband web application. But in present eon scalability is also a major factor for the optimization of the network so in this paper effect of scalability on SR-MC and MR-MC wireless mesh networks is optimized.
Keywords: WMN (Wireless Mesh Network), SR-SC (Single radio-Single Channel), SR-MC (Single radio-Multi Channel), MR-MC (Multi radio-Multi Channel).
Abstract
New Secure Image Transmission Technique Using Mosaic Image By RCT
Prof. Ulhas V. Patil, Miss. Shital R. Khande
DOI: 10.17148/IJARCCE.2016.59122
Abstract: A new secure image transmission technique which changes naturally a given enormous volume secret image into a secret-fragment-visible image is called mosaic image of the exactly similar size. The mosaic image, which looks to be like an discretionarily choose target image and it may be used as a disguise of the secret image, is yielded by separating the secret image in sections and changing their shading attributes to those of the comparing pieces of the target image. Skillful techniques are invented to lead the shading change process so that recovered secret image may be almost losslessly. A scheme for handling overflows/underflows in the converted pixels shading values by recording the shading contrast in the untransformed shading space is proposed in addition. The data needed for improving the secret image is embedded in the created mosaic image by a lossless information concealing plan using a key.
Keywords: mosaic image,image encryption, data hiding , secure image transmission.
Abstract
Design and Analysis of Planar Inverted F-Antenna
Hemant Singh, Dr. Mahendra kumar
DOI: 10.17148/IJARCCE.2016.59123
Abstract: The proposed planar inverted F antenna is very simple structure. Planar inverted F antenna is designed which is popular for mobile devices. It can be easily placed in small space present inside the mobile phones. This paper concentrates on design and development of compact antenna used for mobile phones. PIFA design uses the quarter wavelength operation also. Details of antenna design and experimental results are demonstrated in this paper.
Keywords: Antenna designing, PIFA, low profile antenna, DGS.
Abstract
File Replication for Achieving Querying Delay in Mobile Ad Hoc Networks Though Replication for Efficient File Sharing
B. Jaya Lakshmi, Bandam. Sairam
DOI: 10.17148/IJARCCE.2016.59124
Abstract: Mobile computing is becoming more and more popular. The proficiency of file querying suffers from the properties of networks which include node mobility and limited communication range and resource. File sharing is one of the aspects which include peer to peer file sharing over MANET. Main advantages of P2P file sharing are files can be shared without base stations, overload on server can be avoided and it can exploit the otherwise. Wasted peer communication opportunities among mobile nodes. File replication which plays important role in enhancing file availability and reduce file querying delay. By creating replicas the probability of encountered requests can be improved. Random Way Point used for the normal MANET and Community-Based Mobility Model used for Disconnected MANETs. In RWP, nodes are moving with random speed to the randomly selected points, so the probability of meeting each node is similar for all the nodes Community-based mobility model used in some content dissemination or routing algorithms for disconnected MANETs. So both models contain idea of resource for file replication, which considers both node storage and meeting frequency.
Keywords: MANET, peer to peer network, File sharing, cooperative cache.
