VOLUME 5, ISSUE 11, NOVEMBER 2016
Power Optimized Secure Routing Protocol in Manet
Akanksha Ganesh Heda, Mrs Prajakta .P. Nalgirkar, Mr. Mazher Khan
Common Control Channel Design Schemes in Cognitive Radio Networks
Kalyana Chakravarthy Chilukuri, Swetha Devrapalli C
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Mr. Mangesh Nagarkar, Prof. Patole R.G
A Survey on IOT Based Security System
Indrajit Patil, Saurabh Jaiswal, Pallavi Sakhare, Mohammad Shoaib, Asst. Prof. Poonam Gupta
Design of 4-Bit Pipeline ADC using Switch Capacitor Circuit in 0.25µm CMOS Technology at 2.5 V
Sumit Jaiswal Megha Soni, Vijay Sharma
Safe and Secure Transfer Framework for Data on Cloud
Vivek Manukonda, B Vamsi Krishna
Survey for a Cloud Based Parking System using IoT Technology
Sushmita Bore, Abhipsa Chand, Alisha Dhuri, Akshada Jadhav, Madhavi Darokar
Border Gateway Protocol (BGP): A Boon to Internet Application and ISPs
Vishesh S, Manu Srinath, Suhas S, Srivatsa S Murthy, Amar Tejas M
IDS Based: Response and Recovery Engine
Jivan Sunklod, Rahul Jadhav, Gangadhar Survyanshi, Digambar Gadhaling, Dr. Kishor Wagh
Survey on DDOS attacks on E-Banking Systems
Bhushan Bhonkar, Nishant Mehta, Rahul Gaikwad, Amit Kumar, Madhavi Darokar
Incorporating Database Management System in Cloud
Abhi Vora, Disha Jain, Gayatri Mavani, Sakshi Shah
Implementation of Middleware Architecture in Cloud Computing Environment
Mr. Naveen Chandra Gowda, Ms. Rekha K B
Performance Analysis of ROPCORN and WCETT Routing Protocols in Cognitive Radio Ad-Hoc Network (CRAHN)
Yashoda Krishna Lenka
FPGA Implementation of Cordic Processor for Square Root Function
Ms. Preeya Ambulkar, Prof. Ashish B. Kharate
A Survey on Military Security System
Amol Sanap, Prasad Khandelwal, Shubham Dhumal, Prithviraj Shinde, Prof. R.N. Phursule
Survey on Efficient Resource Utilization using Hadoop Cluster for Big Data Processing
Poonam Mahajan, Manish Patel, Amol Agarwal, Nikhil Raut, Devendra Gadekar
Image Kernel Sharpening using Hadoop Mapreduce Framework
M. jayashree, S. Vidya Sagar Appaji
Image Denoising Technique by using Various Filters
Vikash Panthi, Prof. Jyotsan Ogale
An Improved Preprocessing and Clustering Using Web Log Data
Bharat Chauhan, Hemant Kumar, Mihul Singh, Piyush Kumar, Ms. Sakshi Hooda
Comparative Analysis on Efficient Heuristics Based Algorithms in Grid Computing
Avriti, Er. Ranbir Singh
Cloud Computing and its Techniques to Improve Data Security and Storage Utilization
Eng. Jasim M. A. Albazzaz, Anwar J. Alzaid
Appraisal of Hidden Markov Model and Dynamic Time Wrap Techniques for Isolated Word in Speech Recognition
Indu Bala, Dr. Kailash Bahl
An Improved M-Layer Architecture to Minimize Energy in Heterogeneous Wireless Networks
Rajanandhini .S, Suganya .R
An Approach towards Efficient Search Technique within Information Networks
N. Mounika, G. Thirupathi
Tele-Medical Aid System: A Virtual Bridge between Remote Villages and District/Taluk Hospitals
Sreeharsha A.N, Vishesh S, Manu Srinath, Keerthan Bharadwaj, Dewarsh Diwakar Joshi, Abhishek Chanda
Spectrum Sensing Optimization using Fuzzy Interface system in Cognitive networks
G. Kishore, G. Suvarna Kumar
A Review on Lean Thinking for Software Process Improvement
Dr. Poornima Nataraja, Bharathi Ramesh
An Efficient Approach for Data Security based on DNA Algorithm
Deen Dyal Sharma, Er. Varinderjit Kaur, Dr. Naveen Dhillon
A Survey on Recommendation System Used in E-Commerce
Jayashri Sonawane, Shivani Gore, Laxmi Duggineni, Prof. Sharmila Shinde
Increasing the Visibility of Image under Haze and Low Light Conditioning Environment
Priya Turkhade, Prof. A.P. Dhande
Noise Reduction on Web pages Using LSA with Naïve Bayesian Classification Algorithm
A. Ashikali, B. Loganathan
Load Re-Balancing using Linear Programming for HDFS in Clouds
Pravin S Patil, Prof R.R. Badre
Data Mining Techniques for Diagnosing Diabetes and Hepatitis Disease
Ms. N. Gayathri, Ms. K. Yemuna Rane M.Sc., M. Phil., M.Sc (App. Psy)
A Survey on Heart Disease Forecasting using Hybrid Technique in Data Mining
Vivek Barot, Prof. Jay Vala
Predictive Analysis to Prognosis of Mellitus Caused by the Diabetics
K. Arun, M. Ananda Kumar
Person Identification using Dental X-Ray Images of Maxillary Bone for Dental Biometrics
Krutika P. Khandare, Dr. A.A. Gurjar
Study of Effects of Metallic Pin via in Metamaterial Structure
D. Sushma, M. Ramya Harika, T. Kalpana
Survey on Spam SMS filtering using Data mining Techniques
Nikunj Chaudhari, Prof. Jayvala, Prof. Vinitashah
Modified Kerberos and Multimedia Internet Keying (MIKEY) for Authenticated Transport of Group Keys using Blum Shub algorithm
P. Aditya Pavan Kumar, S. Kesava Rao, Dr. A. Chandra Sekhar
Life Detection System Using L Band
Vishakha Borkar, Prof S.M. Patil
Leaf Disease Detection and Classification using Neural Networks
V. Ramya, M. Anthuvan Lydia
Speckle Denoising by the Combination of Spatial and Transform Domain Filters
Meenal Gupta, Amit Garg
Survey on Privacy Preserving Multi Keyword Search in Cloud Computing
Shreejit Pillai, Gaurav Ransing, Navanath Ransing, Sumit Markad, Prof. Nilesh Sable
Mammogram Characterization using Cohesive Gray Level Feature Domain in Probabilistic Neural Network
Dr. B.N. Prathibha, Dr. G. Sivaprakash
A Survey on Large Scale Dataset Processing Into Batches Using Map Reduce Query Language (MRQL) Technique
Pragati P. Pachghare, Prof. Pravin G. Kulurkar
Novel Routing Protocol for Implementing Internet of Nano Things
Syed Rameem Zahra
Implementation of Friend Recommendation System for Social Networks
Anuja Shahane, Prof. Rucha Galgali
Review Paper on Research Trends in Computing
Sharad Srivastava, Shubham Jain, Manjula R
Performance Enhancement in Combinational Circuit using Gate Diffusion Technique
S. Sivaranjani, G. Kavitha
Analysis of Rain Drop using Image Fusion and Image Segmentation Technique
Nikita Anil Kubal, Pandharinath A. Ghonge
Design and Simulation of Wallace Tree Multiplier using Compressor
Kirthica S, Unmai A
Energy Consumption using Femtocell Network
Shatakshi Sharma, Naveen Kumar Saini
Prediction of Varied Network Attacks using Data Mining Techniques – A Review
R. Thilakavathi, P. Kalaivani
Design and Analysis of Fairness Aware Round Robin CPU Scheduling Strategy
Sumandeep Kaur Sidhu, Rakesh Kumar Bansal, Savina Bansal
Avoiding Computer Viruses and Malware Threats
Eng. Jasim M. A. ALBazzaz, Nassar E. ALMuhanna
A Study on Virtual Machines Placement in Distributed Cloud Data Centers for Reducing Energy Consumption and Carbon Emission
Ajit Mali, Ajit Jadhav, Sneha Jagtap, Saloni Mirje, Anjali Pawar
Shape and Texture based Facial Expression Recognition using Score Level Fusion
J. Suneetha, K. Sandhya Rani
Performance Enhancement of MIMO Channel Capacity for Antenna Selection using SVD- Water Filling Technique
Richa Yadav, Naveen Kumar Saini
RFID & Mobile Fusion for Authenticated ATM Transaction
Nishigandha S. Deshmukh, J. N. Mohite
A Smart Decision Methodology for Scheduling Contending Operations
Jun-Yong Lee and Sunil Kim
Survey on Map-Reduce Based High Utility Item Sets Mining Using Concise and Lossless Representation
Ashwini Bhosale, Veena Bhende
Pervasive Computing: An Overview
Anurag Singh Yadav, Gaurav Jaiswal
A Comparative Analysis of Different Machine Learning Algorithms Used in Predicting Stock Market Prices
Siddharth Chakravarthy, Shraddha Sunil
Object Detection in Android Smartphone for Visually Impaired Users
Prof. S.P. Jadhav, Stelly Tomy, Sonali S. Jayswal, Harshvardhan D. Dhaware, Akshay R. Vijapure
Implementation of Low Power and Area Efficient Shift Register by Register Reusing
S. Soundarya, K. Prasanna
Goodness Analysis of Generator Polynomial for Convolution Code with Varying Constraint Length
Juganpreet Kaur Brar, R K Bansal, Savina Bansal
An Online Malicious Attack Detection using Honey Pot and Episode Mining
M. Narmatha, Shri Hari Aravind .K
Performance Enhancement in Public key Cryptosystems for Security using RSA Algorithm
Ajay Pal Singh, Parvez Rahi
Performance Comparison of DSR, AODV and DSDV Routing Protocols for Ad Hoc Networks
Neha Sharma, Alok Katiyar
A Survey Paper on Distributed Secret Sharing Approach on QR Code
Prof. D. H. Patil, Rutuja Mhaskar, Aishwarya Shirgurkar, Priya Surywanshi, Aniket Panmalkar, Rohit Patil
Comparison of Various Intrusion Detection Systems in Wireless Sensor Network
Mohd. Abdul Sattar, Mohd. Anas Ali
A Review on Mood Prediction based Music System
Apurva Saswadkar, Snehal Kodale, Sarika Lalge, Megha Somavanshi, Prof. Mrs. P. U. Thakre
Design and Analysis of a Hybrid Technique for Code Clone Detection
Jai Bhagwan, Kumari Pramila
A Report on Improving Website Content by Measuring Site Engagement
B Niket, Santosh Inchal, Arati S Gaikwad, Akarsh R Kapasi
Study of an Effective Online Bus Pass Generation and Renewal System
Niteesh Joshi, Mahesh Waghmare, Sujeet Bhosale, Ankit Singh
Conceptual Study of Wireless BAN using Bluetooth/IEEE 802.11n
Sujaya B.L, Vishesh S, Manu Srinath
Clustering Methods in Data Mining Techniques- A Review
M. Latha, Dr. K. Subramanian, M.Sc., M.Phil., Ph.D.,
A Survey on Automatic Heterogeneous Face Recognition
J. Kamalakumari, Dr. M. Vanitha
An Improved Watermarking of Digital Images using DWT & SVD Approach
Amanpreet Kaur, Dr. Naresh Kumar Garg
Exemplar Based Image Inpainting using Pattern Extraction Approach & Restoration using Improved JSM Technique
Amandeep Kaur, Dr. Naresh Kumar Garg
Gesture Recognition using Marathi/Hindi Alphabet
Monika Dangore, Rakshit Fulzele, Rahul Dobale, Shruti Girolla, Seoutaj Singh
A Survey on Indian Coin Detection Techniques using Digital Image Processing
Nida Rahman, Mr. Jay Kant Pratap Singh
Cloud Computing- A Computing Technique
Mukesh Kumar, Rajpal Singh, Kiran, Navpreet Kaur
Intelligent Network for Traffic Control System: Emergency Vehicle Clearance, Stolen Vehicle Detection, Automatic Fine Collection
Akshay Surve, Varsha V. Shinde, Shatawari S. Raut, Monika Nawale
Voice based Interaction System with a Synthetic Model of Character based on Artificial Cartoon and AIML Standard Intelligence
Meghavi M Prajapati, Aimanzaki N Kagzi, Sumit Chaudhary
Privacy Preservation in Content Based Retrieval of Large-Scale Information
Prajakta Pramod Mane, Suhas B. Bhagate
A Tool for Brand Analysis with Twitter Data
Vaibhav Lanke, Amrish Raghuwanshi, Siddhant Gholap, Paresh Nankar
Analysis and Design of a Novel Multi Taper Slotted Vivaldi Antenna for enhancing directivity
Sumanth Talluri, Saritha Vanka
Analysis and Mitigation of Flip-Flop Timing in Subthreshold Logic Design using Adaptive Feedback Equalization
R. Nithya, P. Sathyaraj
Design of Secure File Transfer over Internet
Akanksha Srivastav, Ajeet Bhartee
Enhancement of Network-Lifetime through Clustering in Heterogeneous Wireless Sensor Network: A Survey
Pooja Mishra, Roshni Kapoor
Performance of C4.5 and Naïve Bayes Algorithm to Predict Stomach Cancer – An analysis
Dr. P. Indra Muthu Meena, Dr. Vani Perumal
File Processing in a Distributed Environment
Aayushi Vora, Dhruv Porwal, Vinaya Sawant
A Brief Review on Cluster Based Routing Protocol
Vartika Srivastava, Pallavi Gupta
Energy Efficient Data Collection in Wireless Sensor Network
Shipra Nigam, Pallavi Gupta
Implementation and Analysis of Image Base Key Generation and Authentication for Cyber Security
Ms. B. P. Mohod, Prof. V. R. Raut
The Comparative Study of MANET Routing Protocols AODV, DSDV, OLSR and DSR in Random Walk Mobility Model using NS-3
Katta Koteswari Devi, Dr. M. V. Rama Krishna
An Implementation of Intrusion Detection System Based on Genetic Algorithm
Mr. Kamlesh Patel, Mr. Prabhakar Sharma
A Review of Classification based on User using Facebook based Profile Implementation
Jeevan Pisal, Nikhil Tanpure, Rahul Hinge, Aniket Potdar, Mrs. Sonali A. Patil
An Efficient and Scalable way using UP-Growth and UP-Growth+ Algorithms for finding Mining High Utility Item sets from Transactional Databases
Mr. S. H. Sangle, Prof. Mrs. R. C. Samant
A Survey on Private Message Sharing and Document Authentication Methods using QR codes
D.H. Patil, Sumit Sawant, Tushar Tamhane, Ganesh Khedkar
Design and Analysis of Microstrip Rectangular Patch Antenna using Different Permittivity Substrate
Sudarshan Kumar Jain
Survey on Optimization of Number of Hidden Layers in Neural Networks
Dinesh P. Pitambare
Healthcare Monitoring Mobile Application using Wearable Sensors
Sachin Patil, Kaustubh Gaikwad, Vishal Dabare, Akash Bondage
Result Analysis on Memory Recall via Image Processing Intelligent using Social Contacts Based on Eigen Value Implementation
Miss. Snehal S. Gulhane, Prof. A. S. Kapse
Reweighing strategies for Relevance Feedback in CBIR
Renuka Devi SM
Cuckoo Search Optimization and its Applications: A Review
Venkata Vijaya Geeta. Pentapalli, Ravi Kiran Varma P
Review on Hand Gesture Recognition using Sensor Glove
Shubham Jadhav, Pratik Shah, Avinash Bagul, Parag Hoshing, Ashutosh Wadhvekar
Smart Fault Identification and Monitoring of Transmission Line using X Bee
Ashwini Deshmukh, Prabhu Raddy
DOA Estimation using MOD MUSIC Method and Calculation of Signal and Noise Power
Bhawna Singh, Pratyush Tripathi
Designing of Digital Adaptive Filter for Removal of Artifacts in PCG Signal
Jyoti Chouhan, Prajyant Pathak
Video Enhancement for Low Light Conditions
Piyanka U. Giri, Prof. Ravi .G. Hirulkar
Subgroup Identification in Vertically Partitioned Data Using UNIFI Protocol
Dr. Madhavi Karanam
Ammonia Gas Leakage Monitoring System using MQ-137 Sensors, IoT and framing suitable Reflexive Actions
Vishesh S, Manu Srinath, Nakul R B, Vivek Adithya, Pragathi Prema Kumar, Swathi S
An Intense Review of Task Scheduling Algorithms in Cloud Computing
Jai Bhagwan, Sanjeev Kumar
A Load Balancing in LTE Heterogeneous Networks: A Review
Manoj, Dr. Sanjeev Kumar
Abstract
Power Optimized Secure Routing Protocol in Manet
Akanksha Ganesh Heda, Mrs Prajakta .P. Nalgirkar, Mr. Mazher Khan
DOI: 10.17148/IJARCCE.2016.51102
Abstract: Power aware is important challenge issue to improve the communication energy efficiency at individual nodes in MANET. We propose here a POS routing protocol for MANET.POS identifies the capacity of the node not only battery power but also the energy spent in reliably forwarding data packet over a specific link .using encryption and decryption process POS creates a key between energy node to secure the message forwarded while creating these two path two parameters are also considered here of energy balance control and security parameter to send message using less energy and full security .these scheme reduces the power consumption , increases the network lifetime and increases the message delivery ratio
Keywords: POS, MANET, OPNET, AODV
Abstract
Common Control Channel Design Schemes in Cognitive Radio Networks
Kalyana Chakravarthy Chilukuri, Swetha Devrapalli C
DOI: 10.17148/IJARCCE.2016.51103
Abstract: Wireless applications have been increasing rapidly due to which the available frequency is overcrowded and cannot satisfy the needs of the users. In static spectrum allocation scheme the frequency is allocated to the user on long term basis which leads to spectrum scarcity. To overcome the spectrum scarcity problem dynamic spectrum allocation came into existence. Cognitive radio network was a key enabling technology for dynamic spectrum allocation, which allows the secondary users to make use of licensed spectrum in opportunistic manner. MAC protocol plays a vital role in opportunistic spectrum utilization, primary user�s interference management and secondary user�s coordination. Cognitive Radio (CR) users coordinate with each other by making use of Common Control Channel (CCC), which was a common medium used to exchange the control information. When the primary user comes back or when the QOS of the current channel was not satisfied, then CCC moves on to the new available channel. The CCC coverage is one of the most challenging issues in cognitive radio networks and can be addressed by proper control channel design. In this paper, we elaborate on various controls channel design schemes and some security issues in the same.
Keywords: Cognitive Radio (CR), Common Control Channel (CCC), QOS.
Abstract
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Mr. Mangesh Nagarkar, Prof. Patole R.G
DOI: 10.17148/IJARCCE.2016.51104
Abstract: The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. Recently some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. However, these schemes are still not secure against the collusion of cloud storage server and revoked group users during user revocation in practical cloud storage system. In this paper, we figure out the collusion attack in the exiting scheme and provide an efficient public integrity auditing scheme with secure group user revocation based on vector commitment and verifier-local revocation group signature. We design a concrete scheme based on the our scheme definition. Our scheme supports the public checking and efficient user revocation and also some nice properties, such as confidently, efficiency, count ability and traceability of secure group user revocation. Finally, the security and experimental analysis show that, compared with its relevant schemes our scheme is also secure and efficient.
Keywords: Public integrity auditing, dynamic data, victor commitment, group signature, cloud computing.
Abstract
A Survey on IOT Based Security System
Indrajit Patil, Saurabh Jaiswal, Pallavi Sakhare, Mohammad Shoaib, Asst. Prof. Poonam Gupta
DOI: 10.17148/IJARCCE.2016.51105
Abstract: Today security is a main issue for protecting the resources. Security is important because risk of intrusion and theft has become increasing. Security is also necessary for protecting homes from fire and other leaking gases. Many people are using various types of security systems. We have found that most of the security systems are developed using Raspberry Pi, because the Raspberry Pi is a powerful small credit card size computer. Raspberry Pi works as computer it allow user to remotely access and control resources, it is affordable system than any other security systems. Raspberry Pi is compatible with most of the programming languages. Using Raspberry Pi user can monitor and provide security to their homes and commercial spaces. Raspberry Pi works with different sensors (PIR, Smoke, Temperature, Humidity, Gas) to detect or identify intruder or unauthorised access to homes and commercial spaces, it will also notify to the user about the illegal activity. Other than security Raspberry Pi also useful for learning so many things. This survey paper is focused on the design and implementation of security system based on IOT.
Keywords: Raspberry Pi, PIR, Wi-Fi, Sensor, Camera, ZigBee, Smart phone, IOT
Abstract
Design of 4-Bit Pipeline ADC using Switch Capacitor Circuit in 0.25µm CMOS Technology at 2.5 V
Sumit Jaiswal Megha Soni, Vijay Sharma
DOI: 10.17148/IJARCCE.2016.51106
Abstract: A 4-bit pipeline Analog-to-digital Converter (ADC) is designed using switched capacitor circuit. ADC is designed in 3 stages, 1.5 bit/stage pipeline is used in first two stages and third stage uses two bit flash ADC. The ADC is designed on 0.25 �m CMOS technology at 2.5 V supply voltage in Tanner EDA tool. S/H is used in first stages that consume most of the power consumed by the ADC, after first stage S/H circuit is removed, and also the scaling is used to reduce the power consumption. Cascodeopamp is designed with gain of 72.52 dB, phase margin of 66� and unity gain bandwidth of 162.61MHz. The ADC is designed at sampling rate of 5 MS/s and consumes 158.1208 mW powers.
Keywords: Analog-to-digital conversion (ADC), capacitor sharing, opamp sharing, switched capacitor, pipeline ADC, Non overlapping clock.
Abstract
Safe and Secure Transfer Framework for Data on Cloud
Vivek Manukonda, B Vamsi Krishna
DOI: 10.17148/IJARCCE.2016.51107
Abstract: Cloud computing offers a new way of resources and services like storage, computing and application get access on the demand of customer. Where rapidly increase of using cloud computing in society drew the attention of security and privacy of data. Therefore the sharing of resources and data over the unauthorized public network will be more unsecure to transfer from user to cloud and vice versa on the unauthorized public network because of malicious attacks like man in middle, reply attacks etc. Other one we cannot trust every Cloud service provider (CSP) and keep our data in there cloud. So in this paper we proposed a method that Kerberos and identity based encryption used for secure data transfer over the untrusted public network and provide confidentiality to data which is uploaded in cloud. This maintain a superior security with the combined approach of Kerberos and IBE in cloud computing because no such a method exists and this method provides features of authentication, confidentiality, integrity, privacy and security to Cloud Service Providers and cloud users. [1]
Keywords: Cloud computing, security, Kerberos authentication, private key generator, identity based encryption.
Abstract
Survey for a Cloud Based Parking System using IoT Technology
Sushmita Bore, Abhipsa Chand, Alisha Dhuri, Akshada Jadhav, Madhavi Darokar
DOI: 10.17148/IJARCCE.2016.51108
Abstract: Recently the upcoming technology of cloud is being used to solve many common problems we take this cloud based system and use it for the effective deployment of the smart parking system. The smart parking system is relatively new system which creates a platform for easy booking of parking slots and effectively manages the parking in a mall. The basic feature of the parking system is to make it easier for the customer to select the slot, and for the in-charge in a quick manner. Using the technology of QR code we authenticate the users who are or will be parking and make the identification of the user efficient. Thereby, we implement this technology and make the life easier for the user and create a benchmark for future development.
Keywords: Smart Parking System, IOT, QR code.
Abstract
Border Gateway Protocol (BGP): A Boon to Internet Application and ISPs
Vishesh S, Manu Srinath, Suhas S, Srivatsa S Murthy, Amar Tejas M
DOI: 10.17148/IJARCCE.2016.51109
Abstract: The internet today runs on a complex routing protocol called Border Gateway Protocol (BGP). BGP is unique compared to other routing protocols. BGP is a rich protocol that has many ways to sustain nodes or network failures as well as change in network topology, a boon to �internetwork� or �the internet�. In this paper, we present to you the fringe benefits that the Border Gateway Protocol offers over Internal Gateway Protocol (IGP). We discuss the major fringe benefits offered by BGP: Multihoming and Scalability, and methods of achieving the same. We also shed light on iBGP and eBGP, BGP attributes Autonomous system (AS), Autonomous System Number (ASN) and BGP route selection process.
Keywords: Border Gateway Protocol (BGP), BGP is unique, to �internetwork�, Internal Gateway Protocol (IGP), Multihoming, Scalability, iBGP, eBGP, BGP attributes, Autonomous system (AS), Autonomous System Number (ASN), BGP route selection process.
Abstract
IDS Based: Response and Recovery Engine
Jivan Sunklod, Rahul Jadhav, Gangadhar Survyanshi, Digambar Gadhaling, Dr. Kishor Wagh
DOI: 10.17148/IJARCCE.2016.51110
Abstract: In today's life the internet user population are very increased that why the user face of fast-spreading intrusion. The intrusion detection possible not only detection algorithms, but also it required the special tool hence we create a new tool that is intrusion response and recovery in short RRE tool. In this paper, we propose a new product this product can do the automated response the intrusion this is called the Response and Recovery Engine (RRE). Our engine employs a user data transaction response strategy against adversaries modeled as opponents in a two-user stochastic transaction. Our software whose name is RRE involves attack-response trees to response the attacker and analyzes undesired security events and their countermeasures using Boolean logic to combine lower-level attack consequences. In addition, RRE database involve only the users data those who registered in the RRE. The product involves the intrusion detection system which detects the intrusion in Boolean form. RRE then correct option to take optimal response actions by solving a partially overt competitive Markov decision process that is automatically derived from attack-response trees. Experimental results show that RRE, using the Snort�s alerts, the snorts alert can provide the security for networks for which assailment-replication trees have more than 500 nodes.
Keywords: Response and Recovery Engine (RRE), IP fragmentation, SMTP mass mailing, DoS attacks.
Abstract
Survey on DDOS attacks on E-Banking Systems
Bhushan Bhonkar, Nishant Mehta, Rahul Gaikwad, Amit Kumar, Madhavi Darokar
DOI: 10.17148/IJARCCE.2016.51111
Abstract: In the current world the most important threat to servers across the world is Denial of Service attack. DDOS attack often target web based services hosted on high profile servers such as banks or credit card payment gateways. A DDOS attack is analogous or similar to multiple groups of people crowding the entry door or a gate to a shop or business and not letting legitimatize parties enter into the shop or business disrupting normal operations. There is a distinct need of such an application to stop multiple attacks on the system. These attacks originate from a singular point of contact. Being DDOS creates a massive flood of users which can extensively break the system and stop its functioning. This survey paper constitutes in depth study of the problems seen by multiple banks and card based businesses. The major problem seen in banks and their response on the same is studied in depth to provide the required solution to these problems.
Keywords: DDOS, Multiple attack prevention, Banking application, SDN.
Abstract
Incorporating Database Management System in Cloud
Abhi Vora, Disha Jain, Gayatri Mavani, Sakshi Shah
DOI: 10.17148/IJARCCE.2016.51112
Abstract: Cloud computing is the practice of using a network of remote servers hosted on the internet to store, manage and process data rather than a local server or a personal computer. A database management system is a system software for creating and managing databases. In this paper, we are incorporating Database Management System in Cloud. A Cloud Database Management System is a service provided over the internet which provides means for sharing of software, resources and data between multiple nodes in a network. The motivation for this paper is the growing need for handling massive amounts data which can be easily achieved by integrating Cloud with DBMS. In this paper, we discuss the history of Database Management System and the recent shift of DBMS to Cloud. We have also deliberated on the merits and drawbacks of using Cloud Services to manage data. In the end, we propose architecture of DBMS in Cloud.
Keywords: DBMS, Database Management System, Cloud, CDBMS
Abstract
Implementation of Middleware Architecture in Cloud Computing Environment
Mr. Naveen Chandra Gowda, Ms. Rekha K B
DOI: 10.17148/IJARCCE.2016.51113
Abstract: The cloud computing provides an efficient way of sharing the various resources. Most of the cloud computing platforms are not involved completely in service-oriented system architecture, which will bring more flexibility, high extendibility and reusability compared to existing cloud computing solutions. One of the key to service-oriented is cloud computing middleware. Considering if PaaS is the core is the cloud computing system, then the middleware is the core of PaaS. The exiting cloud computing platform is closely related to the middleware technology. Implementing the service-oriented on cloud computing is based on the assumption that middleware will be backbone of the cloud computing. Installing the new hardware based the new requirement on the existing system results in high cost. Even this will result in inefficient uses if existing hardware. Implementing the cloud computing results in efficient use of existing hardware to integrate with new hardware. Usage of cloud computing results in effective use of distributes resource. The general cloud computing platform helps the user to make use of rich resource and strong hardware support to resolve the larger-scaled computing at any time and any place. The middleware is the service-oriented system architecture of the cloud computing platform. This defines that middleware is a necessary part of the platform.
Keywords: Cloud Computing, Service Oriented System, Middleware
Abstract
Performance Analysis of ROPCORN and WCETT Routing Protocols in Cognitive Radio Ad-Hoc Network (CRAHN)
Yashoda Krishna Lenka
DOI: 10.17148/IJARCCE.2016.51114
Abstract: In the past few years, cognitive radio paradigm has emerged as a solution to avoid problems of spectrum scarcity and inefficiency in spectrum usage. Cognitive Radio (CR) capable to identify the unused spectrum in order to allow CR users to occupy it without interfering the primary users (PUs). Routing is a crucial task in CR network (CRN) due to diversity in available channels. In this paper, Routing Protocol for Cognitive Radio Ad Hoc Network (ROPCORN) and Weight Cumulative Expected Transmission Time (WCETT) routing protocols used to address the efficient route selection between the source and destination in a Cognitive Radio Ad-Hoc Network (CRAHN). The performance of ROPCORN and WCETT is evaluated on the basis of average throughput in three kinds of routing structure to satisfy different requirements from users: 1) single radio multi-channels, 2) equal number of radios and channels and 3) multi-radios multi-channels. The simulation result shows ROPCORN has a significant average throughput in single radio multi-channels where the average throughput is 48.25% higher compared to average throughput in WCETT. However, WCETT has a significant average throughput in equal number of radios and channels; as well as in multi-radios multi-channels where the difference of average throughput is 38.22% and 34.63% respectively.
Keywords: cognitive radio; routing protocol; ROPCORN; WCETT.
Abstract
FPGA Implementation of Cordic Processor for Square Root Function
Ms. Preeya Ambulkar, Prof. Ashish B. Kharate
DOI: 10.17148/IJARCCE.2016.51115
Abstract: Today most of the DSP applications are supported real time transmission method. Digital illustrations of transmission data are typically handled inside a similar methodology as text; however the method rate possesses to be overabundant faster. On account of this real time production constraint, normal processors are not acceptable for up to date day DSP systems. Some hardware economical algorithms are, therefore required for these high speed applications. These algorithms need to be enforced associate optimized in hardware therefore on modify them to handle real time data whereas maintaining associate optimum trade-off between fully totally different performance parameters (speed and power). CORDIC is one such algorithmic rule. CORDIC (Coordinate Rotation Digital Computer) could also be a hardware economical shift-and-add algorithmic rule which is able to be wont to calculate varied arithmetic functions. The algorithmic rule incorporates a really simple operation requiring exclusively shift and add operations. So, this project aims to implement a CORDIC processor with every rotation mode and vectoring mode on FPGA Virtex-5. This project focuses on reducing low power in bit-parallel unrolled CORDIC structures by modelling the shift activity and the charging/discharging capacitance among the essential path.
Keywords: FPGA, Virtex-5, sine cosine, square root function, LUT.
Abstract
A Survey on Military Security System
Amol Sanap, Prasad Khandelwal, Shubham Dhumal, Prithviraj Shinde, Prof. R.N. Phursule
DOI: 10.17148/IJARCCE.2016.51116
Abstract: Studies have found requirement of an application for military based system for effective and secured access to multiple secret documents with major requirement of being completely secured with the emergence of IT. There is a huge gap in the systems which require complete security and encryption for better and effective document exchange. The resultant draws a major attention to understanding of the armed services requirements and making tools readily available for the defence of these important systems. The product creates a better and effective information management for armed forces across the world. Creating such an application will be a boon for the armed forces and will create value for them in a better manner.
Keywords: Information Security, Military System, Encryption, Multilevel based security.
Abstract
Survey on Efficient Resource Utilization using Hadoop Cluster for Big Data Processing
Poonam Mahajan, Manish Patel, Amol Agarwal, Nikhil Raut, Devendra Gadekar
DOI: 10.17148/IJARCCE.2016.51117
Abstract: Hadoop is a framework which is used to store and process large amount of data. Hadoop cluster is designed to analyze and store a huge amount of data. As day by day amount of data stored and processed is increasing rapidly, so we need such an optimal scheduling algorithm to meet the requirement. Job Scheduling is an important parameter to achieve high performance in Hadoop cluster. Hadoop scheduler is pluggable module used for resource allocation. Majorly used schedulers are FIFO, Fair and Capacity scheduler. In this paper we compare and classify parameter such as Average Response Time, Average waiting time and Fairness of various scheduling algorithm in different environment.
Keywords: Hadoop, MapReduce, Scheduling.
Abstract
Image Kernel Sharpening using Hadoop Mapreduce Framework
M. jayashree, S. Vidya Sagar Appaji
DOI: 10.17148/IJARCCE.2016.51118
Abstract: Here, paper represents a model of processing parallel mechanism which is substantiated on Hadoop environment for images processing on massive images, because of its accuracy and scalability of memory distribution on distributed computing; it achieves the fast processing in computation speed and its storage capacity. In this model we are applying the Hadoop streaming technology. We are implementing image processing operations like image sharpening, image convolve & brightness on large number of images as an input The main tasks of the program induction is written in the module of mapper in Hadoop streaming, for this respective assigned file list is used as the input for the processing. The massive numbers of photo documents are ship to cluster computer systems for synchronic processing of an image. Hence, digital machines are used for implementing the parallel process. Now in this we implements one of the image processing, i.e. kernel image sharpening which is used in different application areas. A batch of experimental conclusion and reasoning are also indulged.
Keywords: Hadoop technology, operation on image - sharpening, convolves, HDFS, MapReduce, Hadoop Streaming.
Abstract
Image Denoising Technique by using Various Filters
Vikash Panthi, Prof. Jyotsan Ogale
DOI: 10.17148/IJARCCE.2016.51119
Abstract: In this paper, two novel image filters are presented. These filters, named as Far Distance Filter (FDF) and Near Distance Filter (NDF), are actually based on calculating the distance between image pixels and their neighbours in order to construct arbitrary values used to enhance abnormal pixels (noise). FDF and NDF use (5 x 5) kernel instead of the usual (3 x 3) kernel to produce better image results. The performance of proposed filters and the well-known mean filters is investigated through the measurement of PSNR and MSE. This performance shows clearly the efficiency of the proposed filters.
Keywords: Image enhancement, noise removal, spatial filters, near distance filter, far distance filter
Abstract
An Improved Preprocessing and Clustering Using Web Log Data
Bharat Chauhan, Hemant Kumar, Mihul Singh, Piyush Kumar, Ms. Sakshi Hooda
DOI: 10.17148/IJARCCE.2016.51120
Abstract: The process of web usage mining is implemented in an attempt to discover the patterns of user browsing from the web log data available on the server side of almost each and every website or in the user's cache. By analyzing the browsing behavior of various users, next web page predictions can be made which is an important aspect of most of the websites around these days. But the prediction of future requests comes with its own set of issues which make it unreliable at times; there are some concerns with accuracy and efficiency. In this paper, we have designed a custom algorithm for the Clustering process. The main aim of this algorithm is to provide more efficient and accurate results as compared to the other Clustering algorithms.
Keywords: Web Usage Mining, Recommendation, Prediction, Browsing Patterns, Patterns, Clustering, Preprocessing.
Abstract
Comparative Analysis on Efficient Heuristics Based Algorithms in Grid Computing
Avriti, Er. Ranbir Singh
DOI: 10.17148/IJARCCE.2016.51121
Abstract: The grid computing pacts controlling and active structure, with the several resources, distributed CPU loads, beside with the extent of futile memory continually varying. This paper shows virtual study of many familiar grid computing built scheduling methods by pleasing into account the completing environment as well as metrics used similar relaxed computing, environment besides metrics used through the goal to determine the proficiency of every existing raising procedure. This study discovered that ACO has properly weighty results over the presented techniques.
Keywords: Grid Computing, Resource Discovery, Heuristics Based Algorithms.
Abstract
Cloud Computing and its Techniques to Improve Data Security and Storage Utilization
Eng. Jasim M. A. Albazzaz, Anwar J. Alzaid
DOI: 10.17148/IJARCCE.2016.51122
Abstract: Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing IT services over the Internet that enable convenient, on demand and pay for use access to a pool of shared resources. It is a new technology that can support a broad-spectrum of applications without physically acquiring them. Like other IT services, there are bound of fears and concerns about cloud technology. In this paper, we identify the major security issues and security threats. This paper provides techniques to improve data security by discussing the cryptography and authentication concepts. Additionally deduplication technique is discussed to improve storage utilization in the cloud environment. Finally, we provide some cloud security recommendations.
Keywords: Cloud Computing, SaaS, PaaS, IaaS, Cloud drivers, Security issues, Security threats, Cryptography, Authentication, Deduplication.
Abstract
Appraisal of Hidden Markov Model and Dynamic Time Wrap Techniques for Isolated Word in Speech Recognition
Indu Bala, Dr. Kailash Bahl
DOI: 10.17148/IJARCCE.2016.51123
Abstract: This paper defines the overall review of speech recognition Technique. Speech recognition has the ability of a machine to identify the words in spoken language or convert it into machine readable form. In a real intelligent computer qualities should have that the machine can hear, understand, and act upon spoken information, and also speak to complete the information exchange The objective of this review paper is to sum up some well-known methods used in various stages of speech recognition system such as Dynamic Time Wrap Model and Hidden Markov Model approaches for isolated speech recognition.
Keywords: Dynamic Time Wrap Model, Hidden Markov Model, isolated speech recognition, time-dependent,, autocorrelation, cepstral, probabilistic model
Abstract
An Improved M-Layer Architecture to Minimize Energy in Heterogeneous Wireless Networks
Rajanandhini .S, Suganya .R
DOI: 10.17148/IJARCCE.2016.51124
Abstract: The increasing consumer demand for access to communication services anywhere and anytime is accelerating the technological development towards the integration of various wireless technologies, such as, Radio networks, Wi-Fi, WiMAX and cellular systems, which is called as heterogeneous networks. The wireless systems provide higher data rates, high speed, and allow global roaming among a diverse range of wireless access networks. In such a heterogeneous wireless environment, energy minimization is a promising process. In this thesis, some important problems within the heterogeneous networks are addressed, with an emphasis on the efficient use of the system parameters, to achieve certain application specific objectives. In this thesis, a novel approach for the design and implementation of a multi-layered energy minimization technique for heterogeneous wireless networks is presented. In general, energy management is performed in different phases, in the routing phase, channel selection phase, Network selection, and signal processing. An efficient, routing algorithm with ON/OFF/IDLE state selection algorithm is proposed, which focuses on the first three steps is developed. In literature, Energy consumption analysis and minimization in heterogeneous wireless network has several problems, such as on/off scheduling, network selection etc., Energy minimization is the toughest task and this is mandatory in wireless networks to improve the network performance. This thesis handles the energy consumption analysis and minimization in heterogeneous networks using new dynamic programming and m-layer architecture. However several researches have been done and addressed the energy consumption task in different wireless networks. But the proposed system is concentrating a hybrid approach for the energy reduction technique in HetNets. The experiments and results show the proposed system increases the energy consumption rates than the existing systems effectively.
Keywords: Energy minimization, heterogeneous wireless network, Ad-hoc networks, Wireless LAN, cellular networks, cell-association, on-off schemes.
Abstract
An Approach towards Efficient Search Technique within Information Networks
N. Mounika, G. Thirupathi
DOI: 10.17148/IJARCCE.2016.51125
Abstract: Information discussing and trades across a website boundary are desirable for a number of application needs. We suggested o-MPPI to deal with the requirements of differentiated privacy protection of multi-term phrases inside a PPI system. To better of our understanding, o-MPPI is first focus on the issue. O-MPPI guarantees the quantitative privacy protection by carefully controlling false positives inside a PPI and therefore effectively restricting an attacker�s confidence. To deal with the difficulties of efficient secure o-MPPI construction, our core idea would be to draw a line between your secure part and non-secure part within the computation model. We minimize the secure computation part whenever possible by exploring various techniques. Hence separated the complex NLP computation in the MPC part so that the costly MPC within our o-MPPI construction protocol only is applicable to a simple computational task, thus optimizing overall system performance. In the style of o-MPPI, we recognized a collection of challenging problems and suggested novel solutions. For just one, we formulated the quantitative privacy computation being an optimisation problem that strikes an account balance between privacy upkeep and check efficiency. We addressed the cruel problem of secure o-MPPI construction within the multi-domain information network which lacks mutual trusts between domain names.
Keywords: Information sharing, Privacy protection, o-MPPI construction, Secure computation, Multi-domain information, Mutual trust, Privacy preservation.
Abstract
Tele-Medical Aid System: A Virtual Bridge between Remote Villages and District/Taluk Hospitals
Sreeharsha A.N, Vishesh S, Manu Srinath, Keerthan Bharadwaj, Dewarsh Diwakar Joshi, Abhishek Chanda
DOI: 10.17148/IJARCCE.2016.51126
Abstract: India is a vast country with more than half a million villages. Only a few of these villages are blessed with adequate medical facilities. Most of the villages do not have necessary amenities like roads, bridges, healthcare centres, etc. Most of the times, the villagers will have to travel about 50 kilometres to get proper medical assistance. In this paper, we propose a rural medical aid system wherein one can get immediate medical attention. A system named �Rural medical aid� is deployed in the Anganwadi centres in each village and through wireless and distance/tele communication, the residents in these villages can be treated under the supervision of doctors in district/taluk hospitals, thereby saving many lives. Using this model, we can keep a track of compulsory vaccinations, malnutrition, communicable and non-communicable diseases. The system can virtually reduce the distance between remote villages and districts/taluks. As Mahatma Gandhi once quoted �The future of India lies in its villages�. In this paper special attention is given to infants and women (during pregnancy and post-pregnancy).
Keywords: half a million villages, rural medical aid system, Anganwadi centres, district/taluk hospitals, wireless and distance/telecommunication.
Abstract
Spectrum Sensing Optimization using Fuzzy Interface system in Cognitive networks
G. Kishore, G. Suvarna Kumar
DOI: 10.17148/IJARCCE.2016.51127
Abstract: Spectrum sensing is one of the challenge in the hidden terminal which comes across in cognitive radio is .so has to overcome this we are proposing a optimal selection process for secondary nodes using fuzzy interface system. Using fuzzy logic rule the selection of secondary node play an important role in the enhancement of output of the cognitive radio spectrum sensing. if the node is not optimal the error rate will increase and packet transform may delay which may damage he data packet in forwarding process. So we implement energy detection system for taking decision by using the probability alarm by using fuzzy interface system we can reduce the spectrum sensing loss in forwarding the packets.
Keywords: Cognitive Radio, Fuzzy Inter face system Fuzzy Rules, SNR, Spectrum Sensing, error rate.
Abstract
A Review on Lean Thinking for Software Process Improvement
Dr. Poornima Nataraja, Bharathi Ramesh
DOI: 10.17148/IJARCCE.2016.51128
Abstract: Software engineering is rapidly evolving field with new methodologies, technologies, design tools, and paradigms emerging every year. Software industry is a relatively young business, actively searching for innovative ways of developing products. The latest trends towards a more customer-centric, responsive, iterative software development are bringing up new paradigms, frameworks in the field of software development processes. Lean software development is a translation of Lean manufacturing and Lean IT principles and practices to the software development domain which introduces a Continuous Improvement Model that provides a stable development model for organizations. Lean has become a standard for efficiency in production systems. This paper mainly focused on lean, principles and practices of Lean with Agile, importance of lean in reducing wastes during software development and maintenance.
Keywords: Lean, Lean Thinking, Software Development life cycle, Lean Software Development[LSD], Process Improvement,defects, Software wastes,Software maintenance.
Abstract
An Efficient Approach for Data Security based on DNA Algorithm
Deen Dyal Sharma, Er. Varinderjit Kaur, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2016.51129
Abstract: As technology is growing, role of digital media becomes productive. Consequently, recording, editing and duplication of multimedia contents happen. Thus, protection and illegal use of digital media should be blocked. For this purpose, digital watermarking has become a consideration for the researchers. Due to this concept, online contents can keep safe and protect. There are numerous techniques have been proposed for image watermarking. In this thesis, a new technique has been proposed named as DNA optimization technique. Evaluations have been performed on the image and results show the performance of the proposed work. Additionally, alluded to as basically watermarking, an example of bits embedded into a computerized picture, sound or feature document that recognizes the record's copyright data (creator, rights, and so on.). The name originates from the faintly obvious watermarks engraved on stationery that recognize the maker of the stationery. Using this concept secure transmission can be possible with this technique.
Keywords: Steganography, Watermarking, Spatial Domain, Frequency Domain,
Abstract
A Survey on Recommendation System Used in E-Commerce
Jayashri Sonawane, Shivani Gore, Laxmi Duggineni, Prof. Sharmila Shinde
DOI: 10.17148/IJARCCE.2016.51130
Abstract: Nowadays many major e-commerce websites are using recommendation systems to provide relevant suggestions to their customers. The recommendation could be based on various parameters such as items popular on the companies websites. Consider buying a book where reader usually goes to book store personally and selects a book, it takes so much time to go through all the books and select one book out of it. This is very time consuming process and after that also there is no guarantees that the person will get the book he really wanted. There is requirement of system which consumes less time and gives higher probability of what reader wants. Hence we are proposing a web recommendation system for book readers, which will recommend book depending upon previous choices made by reader and readers profile. The proposed recommendation system will give its users the ability to view and search books as well as novels which will be use to draw out conclusions about the stream and genre of the books liked by the user. The system will analyse the user behaviour by using multiple recommendation techniques like content based algorithm, Time sequence based collaborative filtering.
Keywords: Books, Content based algorithm, Time sequence based collaborative filtering.
Abstract
Increasing the Visibility of Image under Haze and Low Light Conditioning Environment
Priya Turkhade, Prof. A.P. Dhande
DOI: 10.17148/IJARCCE.2016.51131
Abstract: This paper describes the problem of visibility of outdoor images under haze and poor light condition. Visibility is a very important issue in case of computer based surveillance, crime analysis, driver assistance system designs etc. The most important challenge related to visibility is the atmospheric haze and poor lighting. The problem becomes more challenging if haze is too dense and lighting during night is extremely poor. The image processing is the vast emerging field in the era of technology of machine vision, machine intelligence and automation for real time processing or the post processing of the image captured in different atmospheric conditions. The image captured in the outdoor scene are highly degraded due to the poor lighting condition or over lighting condition or due to the presence of different suspension particle like the water droplets or dust particles. So due to these particles the irradiance coming from the object is scattered or absorbed. And hence the phenomena of haze, smoke and fog occurs. The haze removal is very essential in the field of image processing because the different computer vision algorithm assumes the input image as the original scene radiance or scene reflectance. But in most outdoor processing the images are degraded due to hazy, hence the input image is hazy image not the original radiance. In this paper we presented a technique Dark channel prior and Adaptive Histogram Equalization to improve visibility of outdoor images for different atmospheric condition. We have calculated performance parameters such as RMSE, PSNR and correlation coefficient.
Keywords: haze, poor lighting, dark channel prior method, adaptive histogram equalization, MSE, PSNR.
Abstract
A Review Paper on: Organic Light-Emitting Diode (OLED) Technology and Applications
Fazia Batool
DOI: 10.17148/IJARCCE.2016.51132
Abstract: Organic LEDs is a semiconductor device, solid in state containing a conducting and an emissive layer between two electrodes to create light with application of electricity. The concept of hole or electron limited electroluminescence in OLED devices has made it renowned in display technology. Being lighter, thinner and more flexible than LEDs and LCDs, OLED has stepped into commercialization. In addition, the cost advantages of OLED make it lead to future applications.
Keywords: AMOLED, LED, OLED, PMOLED.
Abstract
Noise Reduction on Web pages Using LSA with Naïve Bayesian Classification Algorithm
A. Ashikali, B. Loganathan
DOI: 10.17148/IJARCCE.2016.51133
Abstract: The web pages are managed in the evidently fixed manner. The users are sanctioned to recognize the healthy impression from the internet page. The user�s convenient evidence is the pleasant statement for the users and various references are discordant one. The user extracts the enjoyable suspicion from the internet page on the essence of internet page template. Data mining on the Web by means of this becomes a consistent task for discovering convenient knowledge or information from the Web. However, satisfying information on the Web is constantly accompanied by a large approach of noise such as auspicious advertisements, navigation bars, copyright notices, etc. Although such information items are functionally relaxed for human viewers and binding for the Web site owners, they often control automated information gathering and Web data mining, e.g., Web page clustering, categorization, artificial intelligence, and information extraction. The proposed approach to minimize the noise webpage is the hybrid of Latent semantic examination (LSA) mutually Naive Bayesian Classifier. LSA is used to analyses the World Wide Web documents or web pages. Naive Bayes classifiers are intensively scalable, requiring an abode of parameters linear in the location of variables (features/predictors) in a training problem. Maximum-likelihood training can be done by evaluating a closed-form anticlimax, which takes linear presage, alternative than by invaluable iterative estimate as helpful for many other types of classifiers.
Keywords: Web Page Purification, Information Extraction, DOM Tree.
Abstract
Load Re-Balancing using Linear Programming for HDFS in Clouds
Pravin S Patil, Prof R.R. Badre
DOI: 10.17148/IJARCCE.2016.51134
Abstract: A distributed file system often forms a central building block for cloud computing based on Map-Reduce Programming paradigm. The nodes in file system simultaneously serve computers in network and perform storage operations. During processing the file gets partitioned into multiple number of chunks so that Map Reduce task can be performed in parallel over the nodes. Often nodes fail when they upgrade, replace or add. File operation such as create, delete and append results in load imbalance in DFS. Uniform distribution of file chunks gets bit difficult in distributed file system. The centralized load balancing technique includes central load balancer which emerges with bottleneck problem. Proposed system focuses on load rebalancing problem in distributed file system and aims to design a load rebalancing algorithm with linear technique approach to allocate file chunks appropriately to system considering low cost, less execution time. The system will also include Hadoop Distributed File System for maintaining logs and data sets.
Keywords: Cloud Computing, DFS (Distributed file system) Load Balancing, Linear Programming, Hadoop Distributed File System.
Abstract
Data Mining Techniques for Diagnosing Diabetes and Hepatitis Disease
Ms. N. Gayathri, Ms. K. Yemuna Rane M.Sc., M. Phil., M.Sc (App. Psy)
DOI: 10.17148/IJARCCE.2016.51135
Abstract: Data mining tools are giving successful result for disease diagnosis where it is one of the applications. Widely used in classification and prediction technology in the field of bioinformatics. In this paper diseases such as diabetes and hepatitis has been analyzed and compared using data mining applications. It also summarizes some techniques on medical field (diagnosis and prognosis). To develop disease estimation process using data mining technique it is focused on current research which is being carried out.
Keywords: Data mining techniques, Data mining applications, Hepatitis, Diabetes, Disease diagnosis, Classification, prediction.
Abstract
A Survey on Heart Disease Forecasting using Hybrid Technique in Data Mining
Vivek Barot, Prof. Jay Vala
DOI: 10.17148/IJARCCE.2016.51136
Abstract: Data mining is a process of extracting information and discovering useful patterns from the vast amount of data. It is also known as Knowledge Discovery from Data (KDD).The healthcare industry gathers very large amounts of healthcare data which leads to the need for powerful data analysis tools to extract useful information. Disease diagnosis is one of the applications where data mining techniques are showing successful results. Researchers are working on several statistical analysis and data mining techniques to enhance the disease diagnosis accuracy in medical healthcare. Heart disease diagnosis is evaluated as the complex tasks in the medical field. Every year the number of death is increasing because of heart disease. Different data mining techniques individually give low accuracy for disease diagnosis. Researchers are examining the effect of combining more than one technique showing enhanced results in the diagnosis of heart disease. In this paper, we survey different papers in which single techniques or combination of different data mining techniques are used to the forecasting of heart disease so that we can recognize the technique with high accuracy for future research.
Keywords: Data mining; Heart disease forecasting; Data mining techniques.
Abstract
Wireless Environment Monitoring System by using Pic16f877a
Neha P. Aher
DOI: 10.17148/IJARCCE.2016.51137
Abstract: Wireless sensor networks technology has great advantage to revolutionize many engineering research domains. We present a wireless environmental monitoring system with a focus on the overall system architecture for easy integration of wired and wireless sensors for remote, and near-real-time monitoring system. We also present a unified structure for sensor data collection, database management. In this paper, we discuss and review wireless sensor network applications for environmental monitoring system. It is also proven that these approaches can increase the system performance, and provide a appropriate and efficient method and can also fulfil system requirement.
Keywords: PIC16F877A, Zigbee Module, MQ2, MQ7 Sensor, Temperature sensor, PC.
Abstract
Predictive Analysis to Prognosis of Mellitus Caused by the Diabetics
K. Arun, M. Ananda Kumar
DOI: 10.17148/IJARCCE.2016.51138
Abstract: In the modern digitalized world, the health care industries are moving towards the processing of those health records to analyze it for getting the immediate remedy for the complexities due to the mellitus. The growing of unstructured data has the nature if Big Data. So, we have to emphasis its size in nominal value with possible solution done by converting it as structured data. It is necessary because the health care industries have to face the difficulties over analyzing the Health data�s. The Diabetic Ailment (DA) was the one of the NCD, which is the major health hazard in the Developing countries such as India. The DA was associated with huge number of long term complications and health disorder. In this paper, the use of predictive analysis algorithm based on the ANN in MapReduce of Hadoop Environment have been able to predict the disorders associated with the DA and what type of treatment has been provided. By the analysis, this system provides an efficient way to take care of patients who has affected by the diabetics and help them to cure from it.
Keywords: Hadoop/MapReduce, Predictive analysis (Artificial Neural Networks), Big Data, Health care Industries, Diabetic Analysis (Non-Communicable Diseases);
Abstract
Person Identification using Dental X-Ray Images of Maxillary Bone for Dental Biometrics
Krutika P. Khandare, Dr. A.A. Gurjar
DOI: 10.17148/IJARCCE.2016.51139
Abstract: Dental Radiograph based human bio-metric information is the latest research area in the biometric identifier domain. Human identification is becoming one of the major worldwide issue now a days. Dental biometrics is the leading biometric technique to identify individuals on the basis of their dental characteristics. Dental Features of the person are naturally unique. They can be used to authenticate humans exactly or almost to the maximum possible similarity. In order to achieve our desired mentioned goal, dental biometrics automatically analyzes dental radiographs, stored in a database through some described processing. Here, we used efficient workable method to authenticate humans correctly and identify them properly, which is based on dental work information extracted from the dental data. The method used here comprises of some processing stages that processing stages include preprocessing, feature extraction, KNN classification etc. This whole part is implemented in Matlab software for easy identification. The results obtained by using this identification system are very encouraging. Accuracy rate obtained by the system is 92.03%.
Keywords: Dental biometrics, Radiographs, KNN classification, Accuracy rate
Abstract
Study of Effects of Metallic Pin via in Metamaterial Structure
D. Sushma, M. Ramya Harika, T. Kalpana
DOI: 10.17148/IJARCCE.2016.51140
Abstract: In this paper, we considered a rectangular patch antenna which operates at 3.3518 GHz frequency is considered for analysis purpose. Here to study the effect that having the metallic pin via for each periodic metallic plate in the metamaterial structure we consider a single layer structure and double layered metamaterial structure. In case (1) the single layered Metamaterial is considered and comparative analysis is given with and without metallic pin via connections. Similarly for the case (2) the two layered metamaterial structure comparative analysis is given for without having any metallic pins in either layers, metallic pins in upper layer, metallic pins in lower layer and metallic pins in both layers. The comparative analysis is presented based on return loss, radiation pattern and other antenna parameters.
Keywords: Metamaterial, single layered, double layered, rectangular patch antenna
Abstract
Survey on Spam SMS filtering using Data mining Techniques
Nikunj Chaudhari, Prof. Jayvala, Prof. Vinitashah
DOI: 10.17148/IJARCCE.2016.51141
Abstract: Data Mining is the process of �Extracting� Use full information from large amount of Data. It is called the Data mining. Data mining is also called the knowledge discovery in Database (KDD). Now days Short Message Service(SMS) is the most popular way to communication for Short message Service for mobile phone user because it is the cheapest mode of Communication compare to other. The advantages to this Fact some company or Spammer used this service for marketing and send the unwanted Spam message to cell phone user and create the disturbance in communication and also consume the networked bandwidth so decrease the network efficiency. To Avoid this Problem Spam SMS filtering Techniques are used in this paper provide the Detail Summary of Spam SMS filtering techniques and Algorithms which will help to overcome this Problem.
Keywords: Data mining; Spam SMS, filtering techniques, Evolutionary Algorithms.
Abstract
Modified Kerberos and Multimedia Internet Keying (MIKEY) for Authenticated Transport of Group Keys using Blum Shub algorithm
P. Aditya Pavan Kumar, S. Kesava Rao, Dr. A. Chandra Sekhar
DOI: 10.17148/IJARCCE.2016.51142
Abstract: The introduced simple practical medications to the KDC database to overcome these attacks. In our modified version of Kerberos, the long-term secret key of the network principle will be independent of the principle's password. Instead, the KDC will save a profile for every instance in the realm that it manages. The type of the problem data contents may be audio, video, image, or simply text data. The KDC database may have mixed types of profiles. The network principle may be a client or a server. Every principle in the network is registered in the KDC database by the principle ID. Then the KDC maps this ID to the proper profile where the profile is named with the principle's ID that belongs to that profile. In order to generate the principle's secret key, we apply a hashing algorithm to the principle's profile and then encrypt the output digest. We control the lifetime of the secret key using the current KDC system time that is appended to the principle's profile every predefined period(this period is a design parameter, i.e. a site constant).By this way, we change the input to the hashing function, and consequently, the output of the hashing function and the secret key will change too. In our implementation, we use Triple-DES in CBC mode as an encryption algorithm, SHA-256 as a hashing algorithm, and Blum Shub as a random number algorithm. The introduced medications to the KDC database will enhance the performance of the protocol since the principle�s long-term secret-key will be independent of the user password. Thus, our modified Kerberos version is no longer vulnerable to password guessing attacks. We tested our implementation on a small LAN and we are looking forward to extend our implementation to cover cross-realm operations.
Keywords: Computer security, cryptographic protocols, authentication, multicast communication and random numbers.
Abstract
Life Detection System Using L Band
Vishakha Borkar, Prof S.M. Patil
DOI: 10.17148/IJARCCE.2016.51143
Abstract: Now this era there were so many natural calamities and are not easily solvable crate. This will caused unusual happenings result in human lives being gone forever. In order to help those suffered under this bondage, a new revolutionary microwave life detection system which is used to locate human beings buried or trapped under earthquake rubble has been designed. This system operating at certain frequency (range defined) can remotely detect the breathing and heart beat signals of human beings buried under this rubble. By application of signal processing of these signals, the status of the person under trap can be easily determined. a new creative idea using microwaves called microwave life detection system which can be used to detect human subjects behind the barrier, wall or under earthquake rubble is discussed. In the past when victims were trapped under earthquake rubble, collapsed debris, there was a little chance they would found. This was due to fact that rescue techniques such as optical devices, acoustic devices or robotic systems were found limited applications for the detection of buried victims. With the help of microwave signals the life signs can be detected as it is able to sense the heart beat and breathing signals of human being trapped under collapsed debris. A microwave life detection system operates at appropriate frequencies lies in X-band, L or S band.
Keywords: Life Detection System, L Band, microwave life-detection system, rescue robot.
Abstract
Leaf Disease Detection and Classification using Neural Networks
V. Ramya, M. Anthuvan Lydia
DOI: 10.17148/IJARCCE.2016.51144
Abstract: Timely and accurate detection and classification of plant diseases are the crucial factors in plant production and the reduction of losses in crop yield. This paper proposes an approach for leaf disease detection and classification on plants using image processing. The algorithm presented has three basic steps: Image Pre-processing and analysis, Feature Extraction and Recognition of plant disease. The plant disease diagnosis is restricted by person�s visual capabilities as it is microscopic in nature. Due to optical nature of plant monitoring task, computer visualization methods are adopted in plant disease recognition. The aim is to detect the symptoms of the disease occurred in leaves in an accurate way. Once the captured image is pre-processed, the various properties of the plant leaf such as intensity, color and size are extracted and sent to SVM classifier with Back propagation Neural Network for classification. The experimental results obtained using 169 images have shown that the classification accuracy by ANN ranges between 88% and 92%.
Keywords: Image pre-processing- Artificial Neural Network-Back Propagation Neural Network-Support Vector Machine.
Abstract
Speckle Denoising by the Combination of Spatial and Transform Domain Filters
Meenal Gupta, Amit Garg
DOI: 10.17148/IJARCCE.2016.51145
Abstract: Ultrasound (US) imaging a technique used for non-invasive detection of flaws inside the human body. The quality of such images has to be at par for the use of doctors. US images are corrupted by speckle noise which arises due to the back scattering of the signal. In this work a new method for image denoising is presented. In this method firstly Approximation and detail bands are obtained from 2 level wavelet decomposition and fast bilateral filter is applied on the approximation band. Secondly the thresholding of the detail bands are done. Then filtered approximation and detail bands combined to get final denoised image. For the performance evaluation of proposed method parameters such as Peak signal to noise ratio (PSNR) and Edge Keeping Index (EKI) are used. The results are obtained for a synthetic kidney image generated by Field II program.
Keywords: Bilateral filter, DWT, speckle reduction, stick filter.
Abstract
Survey on Privacy Preserving Multi Keyword Search in Cloud Computing
Shreejit Pillai, Gaurav Ransing, Navanath Ransing, Sumit Markad, Prof. Nilesh Sable
DOI: 10.17148/IJARCCE.2016.51146
Abstract: Due to cloud computing it has become very popular for data owners to outsource data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, a secure search over encrypted cloud data has motivated several research works under the single owner model. However most cloud servers in practice do not serve just one owner instead they support multiple owners to share benefits brought by cloud computing. In this system we propose schemes to deal with privacy preserving ranked multi keyword search in a multi owner environment to enable cloud servers to perform secure search without knowing the actual data of both keywords we systematically construct a novel secure search protocol. To rank the search results and preserve the privacy of relevance course between keywords and files, we propose a novel additive order and privacy preserving function family. To prevent the attackers from eavesdropping secret keys and pretending to be legal data owners submitting searches we propose a dynamic secret key generation key protocol and a new data user authentication protocol.
Keywords: Cloud computing, multi keyword search, user privacy
Abstract
Mammogram Characterization using Cohesive Gray Level Feature Domain in Probabilistic Neural Network
Dr. B.N. Prathibha, Dr. G. Sivaprakash
DOI: 10.17148/IJARCCE.2016.51147
Abstract: Breast cancer is one of the most common causes of cancer fatality in women. Early detection and treatment are keys to preventing breast cancer from spreading. Digital mammograms are one of the most effective means for detecting possible breast abnormalities at early on stages. Digital mammograms supported with Computer Aided Diagnostic (CAD) systems help the radiologists in taking reliable decisions within short span of time. The proposed CAD system analyses and combines statistical texture features obtained from gray level correlated matrices, for the better classification of mammograms. The Probabilistic Neural Network classifier is used to analyze 256 real mammogram images acquired from different hospitals. The database contains of 136 normal and 130 abnormal i.e., in MLO or CC view. The specific dataset is carefully selected such that the abnormality is apparent in one view and subtle in other due to its complex texture. The proposed system gives 94.76% and 91.31% youden�s ratio, 97.41%, 97.69% accuracies for the two different views respectively. The Youden�s ratio of 94.30 and accuracy 97.14% is attained for normal - abnormal datasets discrimination. The study reveals that features extracted in unified statistical texture domain with PNN classifier proves to be a promising tool for analysis of mammograms irrespective of their appearance and views and Youden�s ratio is the optimum performance measure with justness to sensitivity and specificity.
Keywords: CC, gray level statistics, Mammograms, MLO, PNN, Youden�s ratio.
Abstract
A Survey on Large Scale Dataset Processing Into Batches Using Map Reduce Query Language (MRQL) Technique
Pragati P. Pachghare, Prof. Pravin G. Kulurkar
DOI: 10.17148/IJARCCE.2016.51148
Abstract: Online query processing for large-scale, incremental data analysis on a distributed stream processing engine (DSPE). Our goal is to convert any SQL-like query to an incremental DSPE program automatically. In contrast to other approaches, we derive incremental programs that return accurate results, not approximate answers, by retaining a minimal state during the query evaluation lifetime and by using a novel incremental evaluation technique, which, at each time interval, returns an accurate snapshot answer that depends on the current state and the latest batches of data. Our methods can handle many forms of queries on nested data collections, including iterative and nested queries, group-by with aggregation, and equi-joins. Finally, we report on a prototype implementation of our framework, called MRQL Streaming, running on top of Spark and we experimentally validate the effectiveness of our methods.
Keywords: Outlier detection, Stream data mining, local outlier, Memory efficiency.
Abstract
Novel Routing Protocol for Implementing Internet of Nano Things
Syed Rameem Zahra
DOI: 10.17148/IJARCCE.2016.51149
No abstract available.
Abstract
Error Free Nano Scale Communication
Mir Shahnawaz Ahmad
DOI: 10.17148/IJARCCE.2016.51150
Abstract: With the advancements in Nano technology the Macro scale devices are being replaced by Nano scale devices which are used in different fields for performing multiple tasks at molecular level. These Nano scale devices gather more accurate and detailed information from the environment where they are deployed, which is then communicated to other Nano scale devices over a Nano scale communication channel (to perform a collaborative analysis of system under study). The major drawback of using Nano scale devices is the availability of extremely low transmission power which results in spreading and molecular absorption loss in the signal propagated from one Nano device to another, thereby causing errors in transmitted message. The solution to this problem can be re-transmission, but this technique is not applicable to Nano scale communication because of the limited availability of energy source at each Nano node. So, the only solution to this problem is the use of error detection-correction or prevention techniques. Also, the already available error detection or prevention techniques cannot be used because of their complex nature, so energy efficient and less complex techniques need to be developed and used for such communication paradigm, making it an error free communication. This Paper presents a brief introduction to Nano scale communication, its applications, and limitations and finally proposes methods to overcome these limitations.
Keywords: Nanotechnology; Nano-scale devices; spreading loss; Molecular absorption loss.
Abstract
Implementation of Friend Recommendation System for Social Networks
Anuja Shahane, Prof. Rucha Galgali
DOI: 10.17148/IJARCCE.2016.51151
Abstract: Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflect a user�s preferences on friend selection in real life. In this paper, we present Friend Recommendation system for social networks, which recommends friends to users based on their life styles instead of social graphs. By taking advantage of sensor-rich smartphones, Friend Recommendation system discovers life styles of users from user-centric sensor data, measures the similarity of life styles between users, and recommends friends to users if their life styles have high similarity. Inspired by text mining, we model a user�s daily life as life documents, from which his/her life styles are extracted by using the Collaborative Filtering with threshold algorithm. We further propose a similarity metric to measure the similarity of life styles between users, and calculate users� impact in terms of life styles with a friend-matching graph. Upon receiving a request, Friend Recommendation system returns a list of people with highest recommendation scores to the query user. Finally, Friend Recommendation system integrates a feedback mechanism to further improve the recommendation accuracy. We have implemented Friend Recommendation system on the Android-based smartphones, and evaluated its performance on both small-scale experiments and large-scale simulations. The results show that the recommendations accurately reflect the preferences of users in choosing friends.
Keywords: Mobile Social Networks, Recommendation friend, Privacy, Collaborative Filtering
Abstract
Review Paper on Research Trends in Computing
Sharad Srivastava, Shubham Jain, Manjula R
DOI: 10.17148/IJARCCE.2016.51152
Abstract: A processor is responsible for several thousand calculations that are required to run a system and this capability, efficiency of a processor to do so is based on its type of architecture, the sole purpose of which is to find a balance between the applications that run on the system and the maximum performance attainable in implementing such an architecture. Additionally there are physical limitations to processor architecture which include how many transistors can be placed on a chip or the number of interconnection one can make on the chip and how much heat a chip can dissipate. All these factors contribute towards the computing capabilities of the processor, In regard to which this paper undertakes a critical review of the current challenges and growth in processor technology and design decisions for future implementation. This paper also compares the various architecture alternatives to traditional processor in form of multi core architecture and parallel processing (as an implementation in processing) and the viability of using GPUs as an alternative to CPU processing.
Keywords: Processor, Multicore Architecture, Parallel processing, CPU, GPU.
Abstract
Performance Enhancement in Combinational Circuit using Gate Diffusion Technique
S. Sivaranjani, G. Kavitha
DOI: 10.17148/IJARCCE.2016.51153
Abstract: Low power circuit design has been an important issue in VLSI design areas. Full adders are important components in application such as digital signal processors (DSP) and microprocessors. The full adder design can be designed by using conventional CMOS and positive feedback adiabatic logic (PFAL). The more number of transistors and more power can be needed. Gate diffusion technique (GDI) can be used to implement the full adder design. This technique allows the low power consumption and area of digital circuits while maintaining low complexity of logic design. In this work, the number of transistor and power of the conventional CMOS, positive feedback adiabatic logic (PFAL) and gate diffusion technique (GDI) are compared. Tanner EDA tool can be used for simulation.
Keywords: Full adder, multiplexer, conventional CMOS, Positive feedback adiabatic logic (PFAL), Gate diffusion input (GDI) technique.
Abstract
Ultra Low Power VLSI Design used to Reduce Sub Threshold Leakage Power
Reddappa. Pudi
DOI: 10.17148/IJARCCE.2016.51154
Abstract: Leakage power plays a vital role in current CMOS technologies. As feature size shrinks leakage power also increasing. Power dissipation becomes as important consideration as performance and area for chip design in present days VLSI industry. International Technology Roadmap for Semiconductors (ITRS) forecasts that sub threshold leakage power dissipation may dominate the dynamic power dissipation. There are two types of power dissipations in CMOS technologies those are static power dissipation and Dynamic power Dissipation. This paper mainly concentrates on static power dissipation, in that mainly on leakage power. This paper reviews various low leakage power design techniques to achieve low power dissipation.
Keywords: Leakage power, power Dissipation, low power, CMOS technologies.
Abstract
Analysis of Rain Drop using Image Fusion and Image Segmentation Technique
Nikita Anil Kubal, Pandharinath A. Ghonge
DOI: 10.17148/IJARCCE.2016.51155
Abstract: Rainfall deals with size of drops and amount of water precipitated from cloud in particular time. This method proposes the counting of the processing time, total amount of rainfall per second that is the rainfall rate, total number of rain drops, total volume of raindrops & direction of rainfall. It also represents the rainfall distribution in the graphical form along with the histograms details. In this methodology, the first stage is video acquisition stage in which videos of rainfall are captured by using two slow motion cameras having the same resolution for the identical amount of time. The required results are found out by using the non-sampled contourlet transform(NSCT), energy based image fusion ,a new iterative triclass thresholding technique in image segmentation that is based on Otsu�s method. Human appearance would be neglected in this system due to which errors are minimized. The result which we are getting from this system will take very less time with the help of MATLAB. The proposed system is having greater accuracy than the existing methods in many aspects.
Keywords: Non-sampled contourlet transform, Otsu�s method, Iterative triclass thresholding, Energy based image fusion..
Abstract
Design and Simulation of Wallace Tree Multiplier using Compressor
Kirthica S, Unmai A
DOI: 10.17148/IJARCCE.2016.51156
Abstract: Low power circuit designs have been an important issue in VLSI designs areas. Multipliers play a vital role in high performance systems. The Wallace Tree Multiplier is considered as faster than simple array multiplier.WTM provides a power efficient strategy for high speed multiplication. The 4-bit Wallace tree multiplier constructed by compressor based on carry bypass or carry skip adder operation. The compressor in Wallace tree multiplier reduction can further improve the speed of multiplier. The designs are implemented in TANNER EDA Tool v13.0
Keywords: WTM, Carry Skip Adder, Compressor.
Abstract
Energy Consumption using Femtocell Network
Shatakshi Sharma, Naveen Kumar Saini
DOI: 10.17148/IJARCCE.2016.51157
Abstract: Today we are living in the era of mobile technology. Every third day new mobile technology develops. The load on the cellular network is increasing day by day and it will more and more increasing. Due to the increasing no. of mobile subscribers, demand of the mobile customers is increasing on per day basis. Customers need high data speed, lower call rate and many more services. To fulfill this demand of the customers cellular operators are trying to integrate small cells. Small cells operate at very low power and these are very Energy efficient. Small cells such as femtocell are very reliable and low range, low power cell, it operate in licensed spectrum with the range of 10m. to 3km. Femtocell are almost ten times smaller than a big mobile macrocell network. In this paper, we have used a two tier femtocell network which increases the capacity and coverage. Here, sleeping strategy is used to increase energy efficiency of the network.
Keywords: Energy Efficiency, Power Consumption, Two tier Network, Sleeping strategy.
Abstract
CLQ-CS: An Innovative Subspace Clustering Technique for Dimensionality Reduction
Behera Gayathri
DOI: 10.17148/IJARCCE.2016.51158
Abstract: High dimensional data clustering is an emerging research field as; it is becoming a major challenge to cluster high dimensional data due to the high scattering of data points. Most of the traditional clustering methods are not that appropriate to handle high dimensional data. In this paper, a new algorithm �CLQ-CS� is proposed based on the subspace clustering algorithm called CLIQUE and the Cuckoo Search strategy. The proposed �CLQ-CS� algorithm consists of two phases. The data pre-processing is the first phase where CLIQUE is used for subspace relevance analysis to find the dense subspaces. In the second phase a global search strategy called cuckoo search is introduced to cluster the subspaces detected in the first phase. The problem of losing some of the regions that are actually densely populated due to the high scattering of data points in high-dimensional space can be overcome. The experiments performed on large and high dimensional synthetic and real world datasets demonstrate that CLQ-CS performs with a higher efficiency and better resulting cluster accuracy. Moreover, the proposed algorithm not only yields accurate results when the number of dimensions increases but also outperforms the individual algorithms when the size of the dataset increases.
Keywords: CLIQUE, Cuckoo Search, High Dimensional Data, Subspace Clustering, CLQ-CS.
Abstract
Prediction of Varied Network Attacks using Data Mining Techniques – A Review
R. Thilakavathi, P. Kalaivani
DOI: 10.17148/IJARCCE.2016.51159
Abstract: In computer networks, an attack is an attempt to seize, immobilize, destroy, modify, or gain unauthorized access to or make unauthorized use of an asset. Network attacks can cause network services slow, temporarily unavailable, or down for a long period of time. The main aim of this work is to find different types of network attacks and detection techniques to resolve malicious attacks in the network flow. It is necessary for users and network administrator to detect these attacks before they cause damage to the system. Data mining techniques will help the network administrators to identify new network attacks in current scenario.
Keywords: Networks, malicious attacks, Data Mining
Abstract
Design and Analysis of Fairness Aware Round Robin CPU Scheduling Strategy
Sumandeep Kaur Sidhu, Rakesh Kumar Bansal, Savina Bansal
DOI: 10.17148/IJARCCE.2016.51160
Abstract: Round Robin (RR), CPU scheduling algorithm, is widely accepted scheduling strategy for many time shared operating systems. The traditional Fixed quantum Round Robin (FRR) scheme works well for fair share scheduling though the large number of context switches lead to excessive system overhead. On the other hand, the available dynamic quantum based RR algorithm (DRR) reduces context switches though at the cost of fairness and results in service degradation to an individual process. In this paper, a new variant of RR named as adaptive Round Robin is proposed that trades off between fairness and context switches parameters in a judicious way and provide a better balancing among these conflicting parameters. The proposed algorithm chooses the time quantum adaptively based on existing burst time of the available jobs in the job pool. In this way, both smaller and larger size jobs get fair time for their execution. The performance of the suggested technique has been analyzed using extensive simulations on a wide variety of jobs. The paper also presents the comparative analysis of proposed algorithm with existing FRR and DRR scheduling algorithms on the basis of varying time quantum, average waiting time, average turnaround time, performance ratio and number of context switches.
Keywords: CPU scheduling, Round Robin CPU scheduling algorithm, Turnaround time, Waiting time, Context switching, Performance ratio, Simulation analysis.
Abstract
Avoiding Computer Viruses and Malware Threats
Eng. Jasim M. A. ALBazzaz, Nassar E. ALMuhanna
DOI: 10.17148/IJARCCE.2016.51161
Abstract: The paper introduced the concept of the computer viruses and its harm and problems due to virus infection. It introduced the different types of viruses and the evolution of viruses. We discussed the need of anti-virus software and its performance indicators. Detecting viruses and malicious software is a complex problem, for that providing antivirus software is one of the most widely used tools for detecting and stopping viruses and malicious software. We discussed the Cloud Antivirus that uses a powerful combination of virus monitoring technologies to immediately protect your computer from all malware in the cloud computing environment. Finally, the paper put forward prevention recommendations to avoid viruses and malware threats.
Keywords: Computer Virus, Trojan horse, Worm, Malware, Anti-virus, Cloud Computing.
Abstract
A Study on Virtual Machines Placement in Distributed Cloud Data Centers for Reducing Energy Consumption and Carbon Emission
Ajit Mali, Ajit Jadhav, Sneha Jagtap, Saloni Mirje, Anjali Pawar
DOI: 10.17148/IJARCCE.2016.51162
Abstract: Cloud Computing has become a buzzword in the IT industry. Cloud computing is being used widely in IT companies. It provides various benefits to the users like cost savings and ease of use. Because of this benefits the demand for cloud services are increases. Due to this energy consumption in data center increases as well as carbon is emitted in large amount. Therefore, we require to develop some another methodology for environment friendly computing i.e Green Cloud Computing. We proposed our approach toward this.
Keywords: Cloud Computing, Data Center, Energy-Efficiency and Power Consumption, Carbon Emission.
Abstract
Shape and Texture based Facial Expression Recognition using Score Level Fusion
J. Suneetha, K. Sandhya Rani
DOI: 10.17148/IJARCCE.2016.51163
Abstract: Expression is the most important mode of non-verbal communication between people. Facial expression carries significant information about the mental, emotional and even physical states of the conversation. Recognition of facial expressions has used in wide application areas like scientific, surveillance, medical, marketing etc. This paper proposed hybrid technique is called score level fusion. Initially preprocessing operations performed on the given image and the features are extracted. The proposed work consists of two important phases such as feature extraction phase and fusion phase. Shape features are extracted from the eyes and texture features are extracted from nose and mouth. The eye features are extracted by using Active Appearance Model (AAM) and the nose and mouth features are extracted by using Gray Level Co-occurrence Matrix (GLCM). With the help of the Artificial Neural Network (ANN) classifier one score value is calculated from extracted eye feature and in another case with the help of Adaptive Genetic Fuzzy System (AGFS) score value is calculated from the mouth and nose. The score values are given as input to the fusion phase in which simple-sum fusion method is used for the calculation of the final score. This final score is compared with a threshold value in order to classify the facial expressions.
Keywords: Facial Expressions, Active Appearance Model, Gray Level Co-occurrence Matrix, score value.
Abstract
Performance Enhancement of MIMO Channel Capacity for Antenna Selection using SVD- Water Filling Technique
Richa Yadav, Naveen Kumar Saini
DOI: 10.17148/IJARCCE.2016.51164
Abstract: Nowadays MIMO systems have been widely studied for wireless communication. MIMO technology in combination with OFDM is an attractive solution for providing high data rates with reduced errors and high QOS. It can be thought of as a combination of modulation and multiple access schemes that segment a communication channel in such a way that many users can share it. This requires Antenna arrays at the transmitter and receiver to enhance the system capacity on frequency selective channels resulting in a Multiple Input Multiple Output (MIMO) configuration. As there are several antennas at receiver and transmitter, MIMO systems can be employed for diversity. This spatial multiplexing method transmits several parallel information streams at same transmit power. A number of design trade-offs must be considered when developing an OFDM based system. This paper explores MIMO system model, MIMO receivers, SVD of MIMO channel and system capacity, Beam forming techniques, method of MIMO system design including physical channel measurements, space time coding techniques, frequency synchronization, and finally types of distortions in Shannon capacity technique and possible remedies to avoid those distortions.
Keywords: MIMO, Water Pouring, SVD, AST
Abstract
RFID & Mobile Fusion for Authenticated ATM Transaction
Nishigandha S. Deshmukh, J. N. Mohite
DOI: 10.17148/IJARCCE.2016.51165
Abstract: In this paper we report on a new approach for enhancing security and privacy. In the meantime, it is more difficult to secure the privacy of a mobile RFID-enabled device with the change in consumption habits, trending practices have changed from the traditional to the entity stores patterns. They have gradually transformed into the network of online shopping patterns, and most of online shopping is completed by the transaction through the credit card. However, with the traditional trading protocol, the credit card number and code (three digit codes), can be faked by cardholders to carry out all transactions. When the card is lost, the system cannot detect the implementation of the transaction, whether it is by the legitimate credit card holder or not. The main objective of this project is to develop an embedded system, which is used for security applications. In this security system we give access to the authorized people through the RFID tags and mobiles. This project can provide security for the industries, companies, etc. This security system gives information about the authorized and unauthorized persons.
Keywords: DTMF Decoder, GPS, LCD, Keypad, Microcontroller, RFID, Voice synthesizer.
Abstract
A Smart Decision Methodology for Scheduling Contending Operations
Jun-Yong Lee and Sunil Kim
DOI: 10.17148/IJARCCE.2016.51166
Abstract: In this paper, a new intelligent algorithm was proposed to minimize the number of control steps of overall operation when scheduling is performed by deciding the precedence of competing operations under the condition that only limited hardware resources were allowed to use. The proposed method could reduce the number of control steps for operation by using multiple criteria, while previous algorithms use one simple criterion. To combine several criteria, 'Fuzzy Logic' was used which allows continuous logic values between 0 and 1 unlike the traditional Boolean logic. To show the performance of proposed algorithm, a number of randomly generated test cases were used for simulation.
Keywords: Computer Architecture, Artificial Intelligence, Scheduling, High-level Synthesis.
Abstract
Survey on Map-Reduce Based High Utility Item Sets Mining Using Concise and Lossless Representation
Ashwini Bhosale, Veena Bhende
DOI: 10.17148/IJARCCE.2016.51167
Abstract: Now days high utility item sets mining (HUIs) from the large datasets is becoming the vital task of data mining in which discovery of item set with high utilities. But the existing previous methods are representing large number of HUIs to end user which resulted into inefficient performance of utility mining. To overcome this problems, in this project we are presenting the hybrid novel framework of HUIs with goal achieving the high efficiency for the mining task and provide a concise mining result to users using parallel data computing technology to process large dataset fast. The hybrid framework is proposed which is mining close d� high utility item sets (CHUIs), which serves as a compact and lossless representation of HUIs. We used recent three efficient algorithms such as Apriori CH (Apriori-based algorithm for mining High Utility Closed � item set), Apriori HC-D (Apriori HC algorithm with Discarding unpromising and isolated items) and CHUD (Closed � High Utility Item set Discovery) to find this representation. Finally, the method DAHU (Derive All High Utility Item sets) is used to recover all HUIs from the set of CHUIs regardless of accessing main database. To improve the time performance of this approach our contribution is to used map-reduce framework to discover HUIs from last dataset faster as compared to existing recent method.
Keywords: Frequent item set, close d� high utility item set, lossless and concise representation, utility mining, data mining.
Abstract
Android Joystick
Hiral Rayani, Vinaya Sawant
DOI: 10.17148/IJARCCE.2016.51168
Abstract: The project idea presents the design and implementation of turning Android smart phones into computer remote controllers, which allow users to wirelessly operate a computer via Bluetooth connectivity. For user's comfort, the joystick proposed is customizable according to the need of application. The application provides users with different keys of varied colors, shapes and sizes. In comparison to the existing systems, the proposed solution has an advantage of being more user-friendly, provides a stable bluetooth connection and has minimum delay in performing remote control operations.Another advantage of the proposed system is its distributed support- multiple android devices can get connected to the server at the same time, this is very useful for multiplayer gaming.
Keywords: Android, remote controller, Bluetooth, joystick.
Abstract
Pervasive Computing: An Overview
Anurag Singh Yadav, Gaurav Jaiswal
DOI: 10.17148/IJARCCE.2016.51169
Abstract: Pervasive Computing is a technology which is spread everywhere from your cloths to appliances in cars and in homes to our human body to your coffee mug, can be imbedded with chips to connect the device to an infinite network of others. Pervasive Computing is also known as Ubiquitous Computing. Areas of research include software engineering, usability, open-source environments, personal navigation, wireless sensor networks, multiprocessor systems, Internet architectures and protocols and information security.
Keywords: Pervasive Computing, Ubiquitous Computing, Microprocessor.
Abstract
A Comparative Analysis of Different Machine Learning Algorithms Used in Predicting Stock Market Prices
Siddharth Chakravarthy, Shraddha Sunil
DOI: 10.17148/IJARCCE.2016.51170
Abstract: Stock markets can be defined as a trading platform for the exchange of financial instruments such as debt, equity and derivatives. They work on the principle of price discovery, which is the act of studying the market supply and demand of a commodity and determining its proper price. Essentially when a person is investing in the stock markets, there are two kinds of situations that are prevalent. One is uncertainty and the other is risk. A person would hedge a bet only if the proposition is risky, however if things turn out to be uncertain, he would be averse to investing in the stock. By studying different machine learning algorithms, we analyse the best methods available in predicting the movement of stocks.
Keywords: Neural Networks, Genetic Algorithm, Regression, Decision Tree, SVM.
Abstract
Object Detection in Android Smartphone for Visually Impaired Users
Prof. S.P. Jadhav, Stelly Tomy, Sonali S. Jayswal, Harshvardhan D. Dhaware, Akshay R. Vijapure
DOI: 10.17148/IJARCCE.2016.51171
Abstract: The Main goal is to eliminate the need of dedicated devices and other wearable devices. We are implementing to help the visually impaired people using simple android Application with the help of smart phones. By using image processing, object detection, speech synthesis the highlighted key components to use this application. Detecting object using image processing technique can be used in multiple industrial as well as asocial applications. The project purpose is to use object detection for blind people and give them audio or vocal information about it as well as we are doing feature extraction to search for objects in a camera view. To improve the day to day lives of visually impaired blind people and people with low vision. Keeping in mind the challenges faced by them we felt the need of an Android application to provide them necessary information about the environment and the objects. The paper gives an overview of a general method of object recognition and significance of ORB over SIFTS and SURFS in different cases. This paper also provides an idea to implement ORB algorithm on FPGA to increase the execution speed by utilizing the reconfigurable nature and pipelining of the FPGA.
Keywords: Image Processing, Speech Synthesis, Object Detection, Android Application.
Abstract
Implementation of Low Power and Area Efficient Shift Register by Register Reusing
S. Soundarya, K. Prasanna
DOI: 10.17148/IJARCCE.2016.51172
Abstract: As the Word length of the shift register increases, the area and power consumption also increases. This paper proposes a low power and area efficient shift register by register reusing. In this system the multiple non-overlap delayed pulsed clock signals is used which timing problem between pulsed latches. The small number of pulsed clock signals used by grouping the latches to several subshift registers. Moreover, the similar functional operation of Register Reusing has been explained by using the Twisted Ring counter.
Keywords: Pulsed latches, pulsed Generator, Twisted Ring counter (TRC), Sub Shift Registers.
Abstract
Study of Different Wireless Sensor Network MAC Protocols
Pramod Kumar
DOI: 10.17148/IJARCCE.2016.51173
Abstract: Wireless sensor network (WSN) gives a vast area for researchers due to its extensive range of applications such as in healthcare system, environment, military, commercial and structural monitoring etc. The MAC protocols of WSN attract the researcher in the last two decades due to its significance role in the power saving and increase the lifetime of WSN. As WSN is built from a large number of sensors node which operated on batteries, replacing those batteries or recharging them is not cost effective. A lot of work is going on to increase the lifetime of sensor nodes and decrease the power consumption. This survey paper proposed different type of MAC protocols, their behaviour, used strategy and lacking area. After that, we discussed few typical power saving MAC protocols and compare the performance as well. Performance comparing of such protocols gives idea for taking the suitable strategy and protocol for new researcher to take a right direction. Finally, we introduce the Network Simulator version 2.0 (NS-2), using NS-2 we simply analysis the throughput, jitter and delay of simple 6 node mesh topology.
Keywords: WSNs, MAC protocols, NS-2
Abstract
Goodness Analysis of Generator Polynomial for Convolution Code with Varying Constraint Length
Juganpreet Kaur Brar, R K Bansal, Savina Bansal
DOI: 10.17148/IJARCCE.2016.51174
Abstract: Convolutional codes play a vital role in reducing the error produced due to dispersive effect, fading, attenuation, interference and noise during transmission and reception of data. With a proper design, convolutional encoder and Viterbi decoder can jointly provide an acceptable performance with feasible decoding complexity. In this combination, a tradeoff on the error performance and decoding complexity resides on the choice of the constraint length. However, the increase in code constraint length leads to exponential increase in the computational complexity of the Viterbi decoder. In this paper, a simulink model with convolution encoder and viterbi decoder for � code rate is designed with varying constraint length from 3 to 10. The bit error rate performance has been analyzed for different generator polynomials and their goodness is examined with the motive of proposing the best generator polynomial at different SNR values.
Keywords: Convolutional codes, BPSK, AWGN, Viterbi Algorithm, Generator polynomial.
Abstract
An Online Malicious Attack Detection using Honey Pot and Episode Mining
M. Narmatha, Shri Hari Aravind .K
DOI: 10.17148/IJARCCE.2016.51175
Abstract: Internet security is the major part of current network scenario, there are several types of security threats threatens the internet transactions. Even though there are several techniques and approaches are proposed, still some new issues grow tremendously every day. Recently honeypot systems are deployed to trap and trace internet attacks. But the main drawback in it is it accumulates huge size of traced data. The huge data size is very difficult to handle by the network controller. So, effective pruning and summarization of intruder activity is necessary. The proposed system FEM (Fast Episode Mining) blends a new episode mining, pruning, summarizing and allows a network controller to spot malicious activities. So it reduces the time and energy on tackling those huge data�s. The new and enhanced attack episode is composed of a series of proceedings. Through these set of events, the intrusion will be detected. This paper focuses on discovering attack episodes for the Common Internet File System (CIFS) / Server Message Block (SMB), which is an application layer protocol. The proposed system is designed to effectively locate the suspicious events and proceedings that are very likely a new one, from an immense amount of logged data. The proposed system is based on the SMB with intrusion detection and response, so this is named as SSMB (Secure Server Message Block). In addition the proposed system performs the intrusion response for the specified type of attack. The detected attack will be responded according to the response dataset from the intrusion response tree.
Keywords: Malicious attack, Honey pot, Intrusion Detection System, Episode Mining, Pruning.
Abstract
Performance Enhancement in Public key Cryptosystems for Security using RSA Algorithm
Ajay Pal Singh, Parvez Rahi
DOI: 10.17148/IJARCCE.2016.51176
Abstract: This paper introduces the concept and implementation of RSA algorithm for security purpose and to enhance the performance of software system using this algorithm. In this article we have done study about RSA algorithm. This study includes what is RSA algorithm and why they are used in the field of Cryptography & Network Security. After doing several works on this topic we came to conclude that RSA algorithm is important to Network Security because they are the components (i.e. Encryption & Decryption key) which interact with the Security system. Without them the system will be useless as RSA are used to fire a particular Encryption & Decryption keys process because of which Security system is build. Here we are dealing with general problem in which we have a particular Security system event of a software system and our objective is to secure that system into a software security because without software security system cannot be secure any things in this world. Here we are discuss with attacks made against the underlying structure of the RSA algorithm, which exploit weaknesses in the choice of values for the encryption and decryption keys, and their relation to the RSA modulus N.
Keywords: Digital Signature, PKC, Encryption, Decryption.
Abstract
Performance Comparison of DSR, AODV and DSDV Routing Protocols for Ad Hoc Networks
Neha Sharma, Alok Katiyar
DOI: 10.17148/IJARCCE.2016.51177
Abstract: The thesis studies the importance of routing protocol in the field of communication. The main objective of this thesis is to show that among three routing protocol which protocol is best on which performance parameter. Many routing protocols exist in ad hoc networks which enable communication like, DSR, AODV, DSDV, etc. DSR delivers data in the adhoc network with the assumption that the network is connected but DSR fails when the network is partially connected i.e., source and destination are in different networks.
Keywords: Communication like, DSR, AODV, DSDV, etc
Abstract
A Survey Paper on Distributed Secret Sharing Approach on QR Code
Prof. D. H. Patil, Rutuja Mhaskar, Aishwarya Shirgurkar, Priya Surywanshi, Aniket Panmalkar, Rohit Patil
DOI: 10.17148/IJARCCE.2016.51178
Abstract: QR barcodes are used extensively due to their valuable properties, including small tag, huge data ability, consistency, and high-speed scanning. However, the confidential data of the QR barcode lacks sufficient security protection. In this article, we design a secret QR allocation approach to protect the private QR data with a secure and reliable distributed system. The future approach differs from related QR code schemes in which it uses the QR character to get confidential sharing and can oppose the print-and-scan process. The secret can be split and conveyed with QR tags in the sharing application, and the system can retrieve the lossless confidential when authorized participants assist. General browsers can read the original data from the marked QR tag via a barcode reader, and this helps decrease the security risk of the confidential. Based on our experiments, the new approach is possible and provides content readability, cheater identify ability, and flexible confidential payload of the QR barcode.
Keywords: QR barcode, QR data, Distributed Secret Sharing Approach, Quick Response Codes.
Abstract
Comparison of Various Intrusion Detection Systems in Wireless Sensor Network
Mohd. Abdul Sattar, Mohd. Anas Ali
DOI: 10.17148/IJARCCE.2016.51179
Abstract: Wireless Sensor Network is one of the most important part in the field of Communication Technology because it costs less installation charges and has simple network operation. In present days, WSN is used widely in each of the important sector which requires confidentiality and security, hence WSN requires very advance security system. Basically Wireless Sensor Network system suffers from two types of attacks one is active and another is passive. When confidentiality is the most important aspect of any secured network, then it is better to detect intruder before it really harms the network. Therefore for operating a WSN in secure manner, many intrusion detection systems (IDS) were proposed. In this paper we are conducting the comparative study on IDS for wireless sensor networks with their advantages and disadvantages. We are also describing the future research issues and challenges along with their complexity.
Keywords: Wireless Sensor Network, Intrusion Detection System, HIDS, Cross layer, Nodes, Energy Efficiency
Abstract
A Review on Mood Prediction based Music System
Apurva Saswadkar, Snehal Kodale, Sarika Lalge, Megha Somavanshi, Prof. Mrs. P. U. Thakre
DOI: 10.17148/IJARCCE.2016.51180
Abstract: As far as music, we have our interests, most loved specialists, collections and music sort. Parcel of assortment is accessible and our decision contrasts now and again. Right now arrangement depends on labels like Artist, Band (Group), Album, Movie, Year, Bitrate and Genre. Selecting a melody or music piece suiting our state of mind from a vast database is troublesome and tedious, since each of the specified parameter can't adequately pass on the enthusiastic perspective connected with the tune. We frequently select a tune or music which best suites our state of mind right then and there. In disdain in terms of music, we have our interests, most loved craftsmen, collections and music sort. Parcel of assortment is accessible and our decision contrasts every once in a while. Right now arrangement depends on labels like Artist, Band (Group), Album, Movie, Year, Bitrate and Genre. Selecting a tune or music piece suiting our state of mind from a substantial database is troublesome and tedious, since each of the said parameter can't adequately pass on the passionate angle connected with the melody. We frequently select a melody or music which best suites our temperament right then and there. Notwithstanding this solid relationship, the majority of the music applications exhibit today is still without giving the office of state of mind mindful playlist era. What is required is an extra parameter or rather seek channel, for this situation Mood, which connotes the feeling of that specific music piece. Thus an example can be gotten for the same. This example can help us to decide the given parameter i.e. Disposition.
Keywords: Vast database, specified parameter, passionate angle, situation Mood, mind-set Introduction
Abstract
Design and Analysis of a Hybrid Technique for Code Clone Detection
Jai Bhagwan, Kumari Pramila
DOI: 10.17148/IJARCCE.2016.51181
Abstract: Nowadays, the software industry is getting more complex since the software systems are growing massively. In order to meet the software demand, a developer often reuses the existing code. This reuse of code results as a code cloning. Code cloning can be defined as a copying and pasting activity of code sections by doing a minor or no modification. These modifications can be done in terms of addition, removal, renaming. Tremendous demands from software industry could be one of the reasons for a developer to use the cloning beside his lazy behavior in writing a code from new scratch. Though the cloning reduces the development time and efforts but it impacts the maintenance cost of the software in terms of software readability and changeability. So, the demand for code clone detection arises in the software industry to improve the readability and changeability in software. A number of clone detection methods exist today to find out code clones in a software system. This paper presents a research work carried to design a hybrid technique that combines the metric based clone detection approaches with text-based clone detection approaches and gives a better result in accounts of precision, recall, and accuracy.
Keywords: Code clone, duplicate code, cloning, clone detection
Abstract
A Report on Improving Website Content by Measuring Site Engagement
B Niket, Santosh Inchal, Arati S Gaikwad, Akarsh R Kapasi
DOI: 10.17148/IJARCCE.2016.51182
Abstract: User engagement, which has been addressed as the arousing, cognitive and behavioral relation that exists between a user and a source, is the result of reliable, aspect, relevant and interesting content. In this Project, we evaluate one type of appointment, �adhesiveness� also known to as site engagement, which is apprehensive about users �spending time� on a site. The Site success depends on itself, but also it is dependent on how it is connected on the web and how the network traffic arrives towards it. This is of more concerned with large online providers, such as AOL, MSN and Yahoo websites!, which provides a mixture of content sites (e.g. news, sport, e-commerce) Social network sites (SNSs) and this has attracted the educational and engineering researchers intrigued by their affordances and reach. Like other online contexts in which individuals are knowingly able to construct an online representation of self such as online dating profiles and MUDS�SNSs constitute an important research context for scholars investigating processes of idea management, self-presentation, and friendship performance. The way of improving online interactivity is becoming a valuable way of communication quality of business web sites. As a result, it is important that web site designers understand the idea and how it affects the superiority of web site design.
Keywords: Site Engagement, Dwell time, security, Website Content.
Abstract
Study of an Effective Online Bus Pass Generation and Renewal System
Niteesh Joshi, Mahesh Waghmare, Sujeet Bhosale, Ankit Singh
DOI: 10.17148/IJARCCE.2016.51183
Abstract: This project is mainly aims to provide an effective facility of bus pass. It also uses database to store data about passenger. This system has two logins, one for user and another for admin. In this project bus pass generation as well as renewal system has been provided. It is a web application for people to get bus pass through online. It is very useful as it reduces paper work, time consuming and makes process in simple and faster way. User can renew their existing pass by extending their validity of time when pass expires. Admin can view all the details and balance of user through its login. This system was intended to develop an application to perform functions like accessing information for authentication and provide pass to particular person. So, users don�t need to stand in queue for long time. This system is helpful for people to get a pass. User can get a pass from anywhere and anytime. There is no need to do manual process. The benefit of this project is no one can reuse issued pass due to photograph and unique id. The notification will generate before expiring monthly pass. This is beneficial for every passenger to get pass in time. The one time password will be generated for every user while registering first time. Aim of this system is to generate daily and monthly bus pass.
Keywords: Provide an effective facility of bus pass; user can get a pass from anywhere and anytime
Abstract
Conceptual Study of Wireless BAN using Bluetooth/IEEE 802.11n
Sujaya B.L, Vishesh S, Manu Srinath
DOI: 10.17148/IJARCCE.2016.51184
Abstract: Enormous development in embedded computing devices, wearable and implantable bio-sensors have led to Body Area Network (BAN). BAN or Wireless BAN (WBAN) is a network of sensors/devices placed over the body. Remote patient monitoring is one of the needs in today�s medical field. Apart from this, BAN has a wide range of applications like gaming, personal information exchange, etc. In this paper we present an overview of Body Area Network (BAN) analogous to the human circulatory system. We propose a BAN in which each and every component is analogous to the anatomy of the human circulatory system which includes the heart, veins and arteries and end points of the circulatory system such as finger tips, toe tips, ear lobes, etc. The human heart is considered as a central and the most powerful router or switch and is responsible for pumping blood in and out, which is analogous to a central router in star topology, routing data in a network. The veins and the arteries carry the deoxygenated blood from other parts of the body to the heart and vice versa respectively. Here the wireless connection between central router and other nodes or I/O devices acts as veins and arteries. Finger tips, toes and ear lobes, where the veins and arteries end are analogous to the end points (end devices or I/O devices). Places where branching of veins and arteries take place are considered or assumed to be nodes or network nodes or I/O devices. The frequency of heartbeat or number of beats per minute is analogous to the frequency of wireless transmission connecting the network. This communication is called intra-body communication. Inter-body communication or handshaking can also take place between two different entities or human beings. It is so fascinating to see how artificial body area network can be built based on the anatomy of the human circulatory system.
Keywords: Body Area Network (BAN), Wireless BAN (WBAN), human circulatory system, Intra-body communication, inter-body communication, handshaking
Abstract
A Novel Approach on Image Processing Using R Studio
K Naga Babu
DOI: 10.17148/IJARCCE.2016.51185
Abstract: Image processing, it plays an important role in many fields and have its own importance in fields like medical, biomedical, security. The data is increasing massively so the present traditional tools like MATLAB are not sufficient to compute such huge amount of data so, the paper is discussing about such data handling tool i.e., R. R is a tool which is used to analyze the big data. But, till now it is not proven that it can also handle Image processing. The paper is proving how R tool can process the image data and it can also handle huge amount of image data. Two Sample operations such as image stitching and fusion are shown with the R tool.
Keywords: Image Processing, R Studio, Stitching, Fusion, Mosaic.
Abstract
Clustering Methods in Data Mining Techniques- A Review
M. Latha, Dr. K. Subramanian, M.Sc., M.Phil., Ph.D.,
DOI: 10.17148/IJARCCE.2016.51186
Abstract: Clustering is an unsupervised classification of the cluster pattern observations in the group of data elements or eigenvectors. The caking problem is solved in many cases and in many disciplines by researchers. This reflects its broad appeal and practicality as a step in exploratory data analysis. However, grouping is a difficult combination of assumptions in different communities and contextual differences have made useful general concepts and methods of slow turn. This article introduces the basic concepts of statistical pattern recognition and community access to a wider community of professionals, providing an overview of the methods of grouping patterns of useful tips and reference targets. We propose clustering techniques for categorizing and identifying cross-problems and recent developments. Some important applications of clustering algorithms such as image segmentation target recognition and information retrieval are also described.
Keywords: Clustering Algorithm, Data Analysis, Feature Selection, Feature Extraction.
Abstract
A Survey on Automatic Heterogeneous Face Recognition
J. Kamalakumari, Dr. M. Vanitha
DOI: 10.17148/IJARCCE.2016.51187
Abstract: This paper presents a comprehensive and algorithmic study of face detection that is crucial. Face detection is a necessary first step in the face recognition system, in order to locate and extract the region from the bottom. It also has many applications in intelligent interfaces such as content-based image retrieval, video coding, and video conferencing, monitoring crowd and human and computer. Until recently, however, face detection has received considerable attention from researchers. Face is a dynamic object, and has a high degree of variability in appearance, which makes the face detection is a computer vision problems. Face detection is one of the most studied computer vision problems, not only because of the object's challenge, but also requires many applications in face detection applications as a first step because of. Over the past 15 years, tremendous progress has been made thanks to the availability of data collection conditions, not limitations on the Internet (called sexual), community efforts to develop publicly available benchmarks as well as in powerful computers Visual algorithm development progress
Keywords: Computer Vision, Face recognition, Face detection, Geometric Method, Image Retrieval, Template Based Method.
Abstract
A Tool for KDD: Data Mining
Upinder Kaur, Payal Jain
DOI: 10.17148/IJARCCE.2016.51188
Abstract: With the rapid development of computer and information technology in the last decade, an enormous amount of data has been and will continuously be generated in massive scale. All the large MNC�s and organizations rely on database to manage their data and information. These databases are useful for conducting daily business transactions. Also, Data warehousing and data mining are essential elements of decision support, which has increasingly become a focus of database industry. This paper provides an overview of data warehousing and data mining, with an emphasis that how the data are analyzed to derive effective business strategies and discover better ways in carrying out business. This paper also describes various types of data warehousing and data mining methods. Also in this paper we did research on the top trends in data warehousing such as Hadoop, customer experience strategies to improve sales and service etc. We also described some examples and applications of data mining which we see in our day to day life like how data mining is used in Healthcare, data market basket, education system and social media. We described some of the current tools and techniques available at present for data warehousing in terms of the front end and backend tools. We further analyzed problems and issues and identified some of the research areas in the field of data warehousing.
Keywords: Data warehousing, Data Model, analysis, repository, KDD, logistics, Derived model.
Abstract
An Improved Watermarking of Digital Images using DWT & SVD Approach
Amanpreet Kaur, Dr. Naresh Kumar Garg
DOI: 10.17148/IJARCCE.2016.51189
Abstract: The process of embedding information into another object/signal can termed as watermarking. The basic idea of watermarking is embed a stealthy image into the image needed to be secured. The stealthy picture is gotten from the first picture and ought to convey adequate data to guarantee copyright check. Digital watermarking is one of the best solutions to prevent illegal copying, modifying and redistributing the multimedia data. Encryption of the multimedia products prevents an intruder from accessing the contents without a proper decryption key. Digital Watermarking is the process of embedding data called a watermark into the digital media such that watermark can be detected or extracted later to make an assertion about the object. The Proposed research aims to develop an improved Watermarking approach which is based on DWT and SVD along with encryption of color images with higher imperceptibility/quality, large capacity/payload and better in robustness/resistance to attacks. We have tested the proposed system on various images from standard dataset as well as from real world images. Performance of the same had been analyzed by calculating normalized correlation (NC), peak signal to noise ratio(PSNR) men square error (MSE) for various attacks. Moreover the performance of had been compared with Tapas et al Algorithm, DSAWM Algorithm.
Keywords: Digital Watermarking, Image Security, DWT, SVD, Watermark Attacks.
Abstract
Exemplar Based Image Inpainting using Pattern Extraction Approach & Restoration using Improved JSM Technique
Amandeep Kaur, Dr. Naresh Kumar Garg
DOI: 10.17148/IJARCCE.2016.51190
Abstract: Image inpainting issue is a important amongst the most crucial picture recreation issues. It is the strategy of adjusting a picture in an imperceptible structure to a spectator not acquainted with the first image and is as outdated as craftsmanship itself. It likewise suggest to the act of the craftsmen of reestablishing works of art. Analysts chipping away at various applications have embraced distinctive names: picture addition, disocclusion, picture substitution, and blunder equipment however each of them conveys its own individual qualities. The proposed technique inpainted the image using Pattern extraction technique and Remove noise perform de-blurring with the help of JSM (Jonit Statistical Modeling) Technique. Proposed system works in four modules which are Image Processing, Deblurring Image, Text Removal, Mixed Noise Removal. Evaluation of the proposed system is done on colored images using exemplar based image inpainting technique. The comparison between existing method and proposed method is based on three parameters MSE, PSNR and Time and it is shown that proposed method improves these parameter values.
Keywords: Image Inpainting; Noise Removal; Image Processing; Image Deblurring; Image Restroration.
Abstract
Gesture Recognition using Marathi/Hindi Alphabet
Monika Dangore, Rakshit Fulzele, Rahul Dobale, Shruti Girolla, Seoutaj Singh
DOI: 10.17148/IJARCCE.2016.51191
Abstract: In this paper, we are going to implement communication between deaf-dumb and a normal person have always been a challenging task. Sign language uses different means of expression for communication in everyday life. We propose the Marathi sign language recognition system which aims to eradicating the communication barrier between them by developing a system in order to translate hand gesture into textual format without any requirement of special sign language interpreter. This paper presents a translation system using manual gestures for alphabets in Marathi sign language. At first the objective is to develop a database for Marathi sign language. This sign language recognition system can also be useful for helping two people who know two different languages for the same problem. The output of a system is displayed using speaker and mobile.
Keywords: Marathi alphabets, sign language, hand gestures, web-camera, HSV image, colour based hand extraction, the centre of gravity.
Abstract
A Survey on Indian Coin Detection Techniques using Digital Image Processing
Nida Rahman, Mr. Jay Kant Pratap Singh
DOI: 10.17148/IJARCCE.2016.51192
Abstract: We proposed a method for Indian coin detection under varying lighting conditions. The basic idea behind our method is to extract features of known coins and put in a database. And when a new coin is entered its features are compared with the images of the coin that stored in the database. We trained our system under different lighting conditions. We assumed different lighting intensities, which occurs due to various reasons such as power fluctuations. We tried to detect Indian coin value under these conditions. This work basically involved automatic detection and recognition of Indian coin using morphological operations of image processing. Image processing is a process in which an input image is transformed into digital image form and performs some operation on it, In order to get high image property and to extract some useful information from it. This work is a prototype simulation and a proof of concept. The application of this work ranges from simple vending machines to automatic mobile recharging. In this thesis, we use MATLAB based simulation to obtain our result.
Keywords: Edge detection, Segmentation, Thresholding, Edge enhancement, Features extraction, Patter matching.
Abstract
Cloud Computing- A Computing Technique
Mukesh Kumar, Rajpal Singh, Kiran, Navpreet Kaur
DOI: 10.17148/IJARCCE.2016.51193
Abstract: Cloud computing is one of the most popular recent emerging technology of Information technology. Cloud Computing enables us to use the hardware and software resources over the internet according to the requirement of the user on pay per use basis. Cloud Computing devices being able to exchange large amount of data such as images, audio, video, text files as well as business information with the help of internet. As all the data is being stored in clouds, security issues should be addressed properly. All the organizations have concerns about security, privacy, residency, unauthorized access, fabrication, interception, interruption, modification and non-repudiation so security should be properly implemented in cloud computing architecture to properly implement it in businesses. In this paper we will discuss about the cloud computing, working of cloud, different cloud computing deployment models and service models.
Keywords: Cloud Computing, IaaS, PaaS, SaaS, Virtualization.
Abstract
Intelligent Network for Traffic Control System: Emergency Vehicle Clearance, Stolen Vehicle Detection, Automatic Fine Collection
Akshay Surve, Varsha V. Shinde, Shatawari S. Raut, Monika Nawale
DOI: 10.17148/IJARCCE.2016.51194
Abstract: This paper is presents Intelligent Network for Traffic Control System. The network is used to pass the traffic. The system uses machine learning for giving the dynamic count to the Traffic System. �Emergency Vehicle Clearance�& �Automatic Fine Collection� are the sub modules of the System. Each individual vehicle is equipped with Infrared Frequency Identification (RFID) tags i.e. attached to vehicle at the time of manufacture to particular location, which makes it impossible to destroy or remove. The Infrared (IR) Sensors are used to generate the count of vehicles that passes the signal. The system maintains huge amount of data of each vehicle at the server machine. The Green Light Duration is depending upon number of vehicles. The traffic rule break collection is collected automatically through RFID tag. The person, who breaks the rule, gets the mail or message from the system.
Keywords: RFID: Radio Frequency Identification Tags and Readers, IR Sensors: Infrared Sensors, Android.
Abstract
Voice based Interaction System with a Synthetic Model of Character based on Artificial Cartoon and AIML Standard Intelligence
Meghavi M Prajapati, Aimanzaki N Kagzi, Sumit Chaudhary
DOI: 10.17148/IJARCCE.2016.51195
Abstract: We humans have five sense and the sixth is the one we have internally. Being a human we can talk and put over opinions to others. You can read this paper and understand the information as I have written it over the time. Talking and chatting is the best communication tool found since discovery of the universe. We have ears to listen, tongue to speak and eyes to see. All this things together make you a perfect human. We grow by learning and no body teach us how to talk, how to walk, run and do natural things. It is true that talking and recognizing speech is very easy for us. But when it comes to the computers they are not comparative with the human, Computers are evolved so much since last few decades, now a days robotics and computers can do such things which are near to impossible for human. This paper talks about the computers having the artificial intelligence, computers that can understand human, computers that can listen to the person and give voice based feedback. Same as talking to the real person. I will be discovering the basics of the Artificial intelligence and the need of that along with the chat bot integration in the computers.
Keywords: Chat Bot, Artificial Intelligence, AIML, Real-time Chat, Human Behaviour, facial expression, ALICE
Abstract
Privacy Preservation in Content Based Retrieval of Large-Scale Information
Prajakta Pramod Mane, Suhas B. Bhagate
DOI: 10.17148/IJARCCE.2016.51196
Abstract: A privacy protection framework for large-scale content-based information retrieval is proposed, which offers 2 layers of protection. To start with, strong hash values square measure used as queries to avoid uncovering distinctive content or options. Second, the client will favour to exclude bound bits in an exceedingly hash values to additional expand the anomaly for the server. Because of the reduced info, it's computationally tough for the server to grasp the customer's interest. The server has to return the hash values of each single client. The client performs a research at intervals the candidate list to find the simplest match. Since simply hash values square measure changed between client and the server, the privacy of each side is ensured. The thought is to highlight vector into items and list each piece with a sub hash value. Every sub hash price is connected with associate inverted index list. The outcomes demonstrate that the privacy upgrade somewhat enhances the retrieval performance.
Keywords: Multimedia database, indexing, content-based retrieval, data privacy.
Abstract
A Tool for Brand Analysis with Twitter Data
Vaibhav Lanke, Amrish Raghuwanshi, Siddhant Gholap, Paresh Nankar
DOI: 10.17148/IJARCCE.2016.51197
Abstract: As one of the largest Social Media in providing public data every day, Twitter has attracted the attention of researcher to investigate, in order to mine public opinion, which is known as Sentiment Analysis. Consequently, many techniques and studies related to Sentiment Analysis over Twitter have been proposed in recent years. However, there is no study that discuss about sentence pattern of positive/negative sentence and neither subjective/objective sentence. In this paper we propose POS sequence as feature to investigate pattern or word combination of tweets in two domains of Sentiment Analysis: subjectivity and polarity. Specifically we utilize Information Gain to extract POS sequence in three forms: sequence of 2-tags, 3-tags, and 5-tags. The results reveal that there are some tendencies of sentence pattern which distinguish between positive, negative, subjective and objective tweets. Our approach also shows that feature of POS sequence can improve Sentiment Analysis accuracy.
Keywords: Dimensions, Reach, Engagement, ROI.
Abstract
Analysis and Design of a Novel Multi Taper Slotted Vivaldi Antenna for enhancing directivity
Sumanth Talluri, Saritha Vanka
DOI: 10.17148/IJARCCE.2016.51198
Abstract: Vivaldi antenna also known as end-fire tapered slot antenna (TSA) is a kind of tapered slot antenna works on the principle of travelling wave antennas having exponential tapered profile, which provide large bandwidth and end-fire radiation patterns with low profile is a good candidate. This single tapered slot end-fire vivaldi antenna (STSVA) possess low directivity. Hence there is a need to improve the directivity without altering the aperture space. This work proposes a novel structure of multi tapered slots of vivaldi antenna without altering the dimension of the aperture area which provided lower HPBW compared to STSVA. The multi-slot structure generates plane-like waves in the End fire direction. This further enhanced directivity of the multi-slot Vivaldi antenna. The simulated results show that impedance bandwidth of the multi tapered -slot Vivaldi antenna is from 2 to 18GHz.
Keywords: Multi tapered slots, Directivity, Half Power Beam Width (HPBW) and Aperture area.
Abstract
Analysis and Mitigation of Flip-Flop Timing in Subthreshold Logic Design using Adaptive Feedback Equalization
R. Nithya, P. Sathyaraj
DOI: 10.17148/IJARCCE.2016.51199
Abstract: Ultralow-power subthreshold logic circuit is becoming prominent in embedded application with the limited energy budget. Minimum energy consumption of digital logic circuits can be obtained by operating in subthreshold regime. However in this regime process variation can result in up to an order of magnitude variation in ION/IOFF ratios leading to timing errors, which can have a destructive effect on functionality of subthreshold circuits. This timing error become more frequent in scaled technology node where process variation are highly prevalent. Therefore, mechanism to mitigate these timing errors while minimizing the energy consumption are not required. We propose tunable adaptive feedback equaliser circuit that can be used along with a sequential digital logic circuit to mitigate proceed variation and reduce the dominant leakage energy.
Keywords: feedback equalizer, leakage energy component, subthreshold.
Abstract
Elimination of Harmonics in Power System Using FFT analysis
A. Yuvaraj
DOI: 10.17148/IJARCCE.2016.511100
Abstract: The electronic circuits such as inverters, choppers, cyclo-converters, SMPS used by industrial and domestic purposes are non-linear in nature. Due to the non-linearity effects the problems such as heating, equipment damages, EMI related problems in power system. The harmonic filter is the best solution for eliminating the harmonics caused by the non-linear loads.
Keywords: Total Harmonic Distortion (THD), Adjustable Frequency Controller (AFC), Matrix Laboratory (MATLAB), Fast Fourier Transform (FFT).
Abstract
Design of Secure File Transfer over Internet
Akanksha Srivastav, Ajeet Bhartee
DOI: 10.17148/IJARCCE.2016.511101
Abstract: Due to the recent innovations in the internet and the network applications and the wide spread of internet and networks, it is now completely possible to conduct electronic commerce on the internet or through the local area networks, and the wide spread of computer and communication network promoted many users to transfer files and sensitive information through the network, this sensitive data requires special deal. This work presents a security system that can provides privacy and integrity for exchanging sensitive information through the internet or the communication networks, based on the use of recently developed encryption algorithms, such as AES, IDEA and RSA. The aim of the work is to develop a simple file transfer system that can obtain privacy, integrity and authentication for the file transfer process. The proposed system uses symmetric cryptography system. File transfer must provide end-to-end visibility, security and compliance management.
Keywords: Cryptography, Encryption, Decryption, Network Security, File Transfer.
Abstract
Enhancement of Network-Lifetime through Clustering in Heterogeneous Wireless Sensor Network: A Survey
Pooja Mishra, Roshni Kapoor
DOI: 10.17148/IJARCCE.2016.511102
Abstract: Energy is one of the scarcest resources in the wireless sensor networks. Most important fact about the energy conservation is deployment of sensor nodes with in network area, so energy which used in network remains balanced throughout the whole network. Clustering algorithm is a kind of key technology used to increase energy efficiency. It can be used to enhance the lifetime and stability period (death of first node) of network by consuming minimum amount of energy. Energy efficient protocol used to characterize the heterogeneous wireless sensor network. It is observed that energy imbalance in wireless sensor networks occurs due to relaying of data from different parts of network towards the sink node, so for improved energy balance instead of using only sensor nodes it is necessary to deploy node with some extra energy with normal sensor nodes to manage such imbalance. In this paper we have survey the previous techniques used for enhancement of energy consumption.
Keywords: wireless sensor networks, connectivity, coverage, node deployment, stability period, energy balance, network lifetime.
Abstract
Performance of C4.5 and Naïve Bayes Algorithm to Predict Stomach Cancer – An analysis
Dr. P. Indra Muthu Meena, Dr. Vani Perumal
DOI: 10.17148/IJARCCE.2016.511103
Abstract: Worldwide cancer survey reports that Stomach cancer is the third leading cause of cancer death in both sexes. The death rate can be minimized in early prediction of the same. Numerous Data Mining algorithms are used to mine the necessary information from the large set of data. It is also playing a significant role in various disease predictions with the aid of different algorithms. This paper concentrates the prediction of the deadly disease Stomach Cancer using two different data mining algorithms named C4.5 algorithm and Na�ve Bayes algorithm. It also analyse the performance and the role of both the algorithms in prediction. The experimental results prove the functionalities and the importance of C4.5 and Na�ve Bayes algorithm.
Keywords: C4.5 algorithm, Na�ve Bayes algorithm, Stomach Cancer prediction, Entropy, Probabilistic Classification
Abstract
File Processing in a Distributed Environment
Aayushi Vora, Dhruv Porwal, Vinaya Sawant
DOI: 10.17148/IJARCCE.2016.511104
Abstract: This paper intends to demonstrate the processing of a file in a distributed environment using Remote Method Invocation. The processing will be in terms of splitting, merging and compression, decompression. By using this over a distributed system mainly distributes the functions needed to be performed by the client over the server. It overcomes the limitations of transferring larger files. It splits any file format as per user requirement and merges it without any loss of data. Similarly, it compresses any file format and also decompresses it. Checksum is provided to verify lossless splitting and merging of the file. Also, auto email facility is provided to email the processed file.
Keywords: split; merge; join; checksum; file processing; lossless; compress; decompress; email.
Abstract
A Brief Review on Cluster Based Routing Protocol
Vartika Srivastava, Pallavi Gupta
DOI: 10.17148/IJARCCE.2016.511105
Abstract: Recent developments in the field of Wireless Communication and Electronics have enabled the growth in application of Wireless sensor network such as health, military etc. Wireless Sensor Networks comprise of large number of sensor nodes which are tiny and low cost. Sensor nodes have dual functionality of being both data originator and router. It communicate together by various wireless strategies which are regulated by routing protocols. The efficiency of sensor network depend on the routing protocol. In wireless sensor network, routing protocol have three main categories 1) Flat routing 2) cluster based routing 3) Location based routing. This paper shows the survey on cluster based routing protocol in wireless sensor network. In this paper, we focus on the classification of cluster based routing protocol. Finally, we conclude the paper with some future direction.
Keywords: Wireless Sensor Network; Classification; Routing protocol; Cluster based routing protocol.
Abstract
Energy Efficient Data Collection in Wireless Sensor Network
Shipra Nigam, Pallavi Gupta
DOI: 10.17148/IJARCCE.2016.511106
Abstract: The use of wireless devices is expanding day by day and is affecting all the aspects of human life throughout the world. Most of these wireless devices are based on very small sensors that translate parameters or events in the physical world into signals that can be measured and analyzed. These tiny sensors thus form a wireless sensor network when employed in a particular area or region. The constraint most often associated with sensor network is that sensor nodes operate with limited energy budgets. As a consequence, the first and foremost important challenge for wireless sensor network is energy efficiency. This paper proposes the various data collection schemes considering energy efficiency as one of the most investigated themes in wireless sensor network based on underlying topology.
Keywords: Wireless sensor network, energy efficiency, data collection, network lifetime.
Abstract
Implementation and Analysis of Image Base Key Generation and Authentication for Cyber Security
Ms. B. P. Mohod, Prof. V. R. Raut
DOI: 10.17148/IJARCCE.2016.511107
Abstract: Information sharing by digital media is a vital and challenging one. These challenges are faced with the help of cryptographic techniques. Cryptography is a progressive technology that Uses key for encryption with plain text. To provide the security of data while communication in cryptography Algorithm and Key are require. The integrity, confidentiality and authenticity of the data in communication depend on algorithm as well as on key. The length of key in cryptography is restricted due to human memorize ability. Only Cryptography is a technique which has a capability to transform the secure information over the internet. The main objective of this paper is to increase the security of communication by providing encryption to the information from the key generated by using an images. Based on the RGB image selected from database a key is generated which is further used for encryption and decryption purpose of the messages which is then transmitted and received between two sides. The AES algorithm is used in this technique on both side for encrypting and decrypting the original message. The generation of key from RGB image(color image)technique is a technique which will work better for key generation than available the traditional key generation method.
Keywords: Cryptography, encryption, decryption and key.
Abstract
The Comparative Study of MANET Routing Protocols AODV, DSDV, OLSR and DSR in Random Walk Mobility Model using NS-3
Katta Koteswari Devi, Dr. M. V. Rama Krishna
DOI: 10.17148/IJARCCE.2016.511108
Abstract: A mobile ad-hoc network (MANET) is a wireless, self-organizing, self-configuring network of mobile nodes or devices that are connected without any specific infrastructure. The mobile nodes can receive and forward packets as a router. In this study compare the performance of four MANET routing protocols Ad hoc On-demand Distance Vector (AODV), Dynamic source routing (DSR), Optimized Link State Routing (OLSR) and Destination Sequenced Distance Vector (DSDV). The performance differences are analyses basing on varying simulation time and number of nodes. The delay, throughput and packet delivery ratio are the common measures used for the comparison of the performance the protocols. These simulations are performed on NS-3 network simulator.
Keywords: MANET, Random Walk models, AODV, DSR, OLSR, DSDV, Throughput, PDR, End-to-End delay.
Abstract
An Implementation of Intrusion Detection System Based on Genetic Algorithm
Mr. Kamlesh Patel, Mr. Prabhakar Sharma
DOI: 10.17148/IJARCCE.2016.511109
Abstract: The intrusion detection downside is turning into a difficult task attributable to the proliferation of heterogeneous networks since the raised property of systems provides larger access to outsiders and makes it easier for intruders to avoid identification. Intrusion observation systems are accustomed detect unauthorized access to a system. By This paper I am going to present a survey on intrusion detection techniques that use genetic rule approach. Currently Intrusion Detection System (IDS) that is outlined as an answer of system security is used to spot the abnormal activities during a system or network. To this point completely different approaches are utilized in intrusion detections, however regrettably any of the systems isn't entirely ideal. Hence, the hunt of improved technique goes on. During this progression, here I even have designed AN Intrusion Detection System (IDS), by applying genetic rule (GA) to expeditiously observe numerous styles of the intrusive activities among a network. The experiments and evaluations of the planned intrusion detection system are performed with the NSL KDD intrusion detection benchmark dataset. The experimental results clearly Show that the planned system achieved higher accuracy rate in distinctive whether or not the records are traditional or abnormal ones and obtained cheap detection rate.
Keywords: Intrusion Detection, Genetic Algorithm, NSL-KDD dataset.
Abstract
A Review of Classification based on User using Facebook based Profile Implementation
Jeevan Pisal, Nikhil Tanpure, Rahul Hinge, Aniket Potdar, Mrs. Sonali A. Patil
DOI: 10.17148/IJARCCE.2016.511110
Abstract: Social Networking Portal like Facebook attracts more and more illegal activities. Social Networking Portal such as Facebook is developed and limitations of Facebook are removed by keeping watch on all types of activities performed on this Portal. Classification of user posts into different categories such as Politics, Education, Entertainment, Sports etc. is made based on analysis of post messages in this Social Network Portal. Interest of any friend can be seen by user of this network from categories graph data. Adult images are blocked into Social Network using adult detection based on Image Processing. User posts, comments are analyzed to classify into Crime, Riots, Worst or Vulgar categories. Sentiment analysis is done on user posts and comments using NLP (Natural Language Processing) algorithm to detect user sentiments. If any user exceeds limit of bad posts or adult images, then he/she is automatically banned from this social networking Portal and this portal is more secure and reliable than Facebook Portal.
Keywords: Social Networking, Portal, NLP, Image Processing.
Abstract
An Efficient and Scalable way using UP-Growth and UP-Growth+ Algorithms for finding Mining High Utility Item sets from Transactional Databases
Mr. S. H. Sangle, Prof. Mrs. R. C. Samant
DOI: 10.17148/IJARCCE.2016.511111
Abstract: Mining high utility itemsets from a large transactional database refers to the discovery of knowledge like high utility itemsets (profits). Since a number of relevant algorithms have been proposed in past years, they fall into the problem of producing a large number of candidate itemsets for high utility itemsets. Such a huge number of candidate itemsets decrease the mining performance in terms of time and space complexity. The situation may become worse when the database contains lots of long transactions or long high utility itemsets. An emerging concept in the field of data mining is utility mining. To identify the itemsets with highest utilities is the main objective of utility mining, by considering profit, quantity, cost or other user preferences. This topic is having many applications in website click stream analysis, cross marketing in retail stores, business promotion in chain hypermarkets, online e-commerce management, finding important patterns in biomedical applications and mobile commerce environment planning.
Keywords: Candidate pruning; frequent itemset; high utility itemset; utility mining; data mining.
Abstract
A Survey on Private Message Sharing and Document Authentication Methods using QR codes
D.H. Patil, Sumit Sawant, Tushar Tamhane, Ganesh Khedkar
DOI: 10.17148/IJARCCE.2016.511112
Abstract: Quick response codes or QR codes are increasing their popularity as they appear in more places in the today�s scenario. Quick Response Codes can be considered as physical hyperlinks that give the ability to users to access information, share messages and authenticate the documents. Apart from marketing, QR Codes have been also adopted in different areas such as the on-line payments. As the usage of QR codes is increasing day by day care must be taken while designing the QR code so that there aren�t any issues regarding its security and privacy. In this paper we have studied various state of the art existing techniques of designing QR code along with their comparison with each other. Also various state of the art existing techniques of document authentication with their comparison with each other.
Keywords: QR Code, Image Processing, Feature Extraction, Digital Signature.
Abstract
Comparative Analysis of Digital Image Watermarking based on discrete cosine transform and Discrete Wavelet Transform Domain
Pallavi Patil
DOI: 10.17148/IJARCCE.2016.511113
Abstract: Due to rapid growth in use of networked multimedia system has created need for copyright protection of digital media like image, video, audio. The watermarking techniques used to solve the problem of protecting digital media. Till date various schemes of digital watermarking have been proposed. This paper present comparative analysis of watermark embedded in the host image by discrete cosine transform (DCT) and by discrete wavelet transforms (DWT) using MATLAB. Experimental results confirm that the watermarking in DWT domain provides good image quality than the DCT domain.
Keywords: Digital watermarking, DCT, DWT, MATLAB.
Abstract
Design and Analysis of Microstrip Rectangular Patch Antenna using Different Permittivity Substrate
Sudarshan Kumar Jain
DOI: 10.17148/IJARCCE.2016.511114
Abstract: In this paper a microstrip rectangular patch antenna using different permittivity of duroid substrate is designed and analysed. The antenna is designed at a resonant frequency of 5.8 GHz. The dielectric substrate used for antenna designed is duroid having a dielectric constant of 2.2. It is observed that the gain of the designed antenna increases on increasing the relative permittivity of the duroid substrate and decreases on increasing the permittivity of the substrate. The return loss of the designed antenna also decreases on reducing the permittivity of the substrate. Voltage standing wave ratio for the design antenna for different permittivity of the substrate is below 2.The designed antenna is energized using microstrip line feeding technique. The different characteristics of the antenna such as gain, bandwidth, return loss, directivity and VSWR is carried out for different values of the permittivity .The antenna is designed and analysed with the software High Frequency Structure Simulator (HFSS).
Keywords: Microstrip antenna, VSWR, Bandwidth, High Frequency structure simulator.
Abstract
Survey on Optimization of Number of Hidden Layers in Neural Networks
Dinesh P. Pitambare
DOI: 10.17148/IJARCCE.2016.511115
Abstract: Artificial neural networks attempt to mimic the basic operations of the brain. Information is pass between the neurons, and based upon the structure and synapse weights, a network behavior or output mapping is provided. Challenges in artificial neural network are finding number of hidden layer and hidden neurons in respected layer, design of a network with more hidden layers, designing optimal network, finding minimal network structure in less time, determination of processing and storage resources in implementation of large and effective network. Among these challenges, finding number of hidden layers and hidden neurons in the respected layer is the core objective of this system. Multi layer neural network permit more complex, non linear relationship of input data to output results. Hidden layer is the intermediate unit between input and output unit used to calculate weighted sums of the inputs. The output result of the network is dependent on hidden layer result. In a network with a hidden layer and an output layer, the hidden layer is computed first and then the result of the hidden layer are used to compute the output layer.
Keywords: Artificial Neural Networks; hidden neuron; hidden layer.
Abstract
Healthcare Monitoring Mobile Application using Wearable Sensors
Sachin Patil, Kaustubh Gaikwad, Vishal Dabare, Akash Bondage
DOI: 10.17148/IJARCCE.2016.511116
Abstract: In this project, we are going to implement the healthcare monitoring android mobile application. The basic idea behind the healthcare systems is to monitor the human parameters using some wearable devices (sensors). Existing systems provides the monitoring of data using sensors and that data is send to android mobile application using some wireless communication techniques like (Bluetooth or Wi-Fi). And that data is send to the cloud based storage for further operations. Doctors can download that data from cloud anytime, analyse that data and send suggestions to the user (patient). By using existing system, the drawback is, data can only analyse by the doctor, but sometimes that may take long time for sending results to the patient. Sometimes that may be harmful to user (patient). In this project, this drawback is recovered using some advancement. In this project, the data collected from human body using some devices(sensors) is directly send to the android mobile application through wireless communication (like Bluetooth�). But this data is analysed by system server as well as the doctor. This will help the user (patient) to take some immediate action. System server will analyse that data and send to user (patient) as well as the doctor. This will also reduce the workload of doctor. System server uses some data mining algorithms to analyse the human body parameters. This will help to doctors as well as the user (patient).
Keywords: Bio-sensors, cloud data, mobile API, web application, data mining
Abstract
Result Analysis on Memory Recall via Image Processing Intelligent using Social Contacts Based on Eigen Value Implementation
Miss. Snehal S. Gulhane, Prof. A. S. Kapse
DOI: 10.17148/IJARCCE.2016.511117
Abstract: Human memory often fails. People are frequently beset with questions like �Who is that person? I think I met him in Tokyo last year.� Existing memory aid tools cannot well support the recall of names effectively. This paper explores the memory recall enhancement issue from the perspective of memory cue extraction and associative search, and proposes a generic methodology to extract memory cues from heterogeneous, multimodal, physical/virtual data sources. Specifically, we use the contact name recall in the academic community as the target application to showcase our proposed methodology. We further develop an intelligent social contact manager that supports 1) auto collection of rich contact data from a combination of pervasive sensors and Web data sources, and 2) associative search of contacts when human memory fails. The system is validated by testing the performance of contact data collection techniques. An empirical user study on contact memory recall is also conducted, through which several findings about contact memorizing and recall are presented. Classic cognitive psychology theories are used to interpret these findings. Here we calculate the Eigen value and display result also by Eigen face detection
Keywords: Contact recall, memory aid, pervasive computing, social contact management, Web intelligence.
Abstract
Reweighing strategies for Relevance Feedback in CBIR
Renuka Devi SM
DOI: 10.17148/IJARCCE.2016.511118
Abstract: CBIR relies on the searches purely is based on metadata obtained from the images like features and annotation information. The evaluation and the effectiveness of image search is more important and has been well-defined. Users of image databases often prefer to retrieve relevant images by categories. Unfortunately, images are usually indexed by low-level features like color, texture and shape, which often fail to capture high-level concepts well. To address this issue, relevance feedback has been extensively used to associate low-level image features with high-level concepts. Among all existing relevance feedback approaches, query movement and feature re-weighting have been proven to be suitable for large-scaled image databases with high dimensional image features. In this paper, we investigated different weight update schemes and compared the retrieval results. As far as feature re-weighting approaches are concerned, one of their common drawbacks is that the feature re-weighting process is prone to be trapped by suboptimal states. To overcome this problem, we introduce a disturbing factor, which is based on the Fisher criterion, to push the feature weights out of sub-optimum. Experimental results show that this method performances well compared to basic re-weighing methods
Keywords: Content based image retrieval, re-weighing features, Short term Learning, Long term learning.
Abstract
Cuckoo Search Optimization and its Applications: A Review
Venkata Vijaya Geeta. Pentapalli, Ravi Kiran Varma P
DOI: 10.17148/IJARCCE.2016.511119
Abstract: The Cuckoo Search is an optimization algorithm developed by Yang and Deb in 2009. It is used in solving optimization problems. It was inspired by a bird species named cuckoo that lays their eggs in the nest of other host birds. The cuckoo egg laying and breeding is the first basic motivation for the development of new optimization algorithm. This optimization algorithm increases the efficiency, accuracy, and convergence rate. In this paper, a brief review is given about the cuckoo search algorithm and also about the optimization and its problems. Different categories of the cuckoo search and several applications of the cuckoo search are reviewed.
Keywords: Optimization, Cuckoo Search, Levy Flight
Abstract
Review on Hand Gesture Recognition using Sensor Glove
Shubham Jadhav, Pratik Shah, Avinash Bagul, Parag Hoshing, Ashutosh Wadhvekar
DOI: 10.17148/IJARCCE.2016.511120
Abstract: Hand Gesture Recognition is popular concept that has grown its wide roots in the field of technology. Hand Gesture Recognition is being used in various applications, in these one of the major is interpreting of sign language as voice or text using Sensor Glove. This makes use of various sensors such flex sensors, contact sensors and 3 axis accelerometer for making glove, that sends readings recorded by the sensors to the microcontroller that computes these values and generates speech(using voice module) or text(using LCD). Various methods have been implemented to recognise various sign languages for helping the speech impaired. Realization of this application allows speech impaired people to interact with other normal people using the same generic sign language they use to interact, with ease and confidence.
Keywords: Sign LanguageRecognition, Flex Sensors, Contact Sensor, 3-axis Accelerometer, microcontroller.
Abstract
Smart Fault Identification and Monitoring of Transmission Line using X Bee
Ashwini Deshmukh, Prabhu Raddy
DOI: 10.17148/IJARCCE.2016.511121
Abstract: There are several proposed or developed systems to locate faults on power transmission Lines. The conventional systems employ methods that are very different from the proposed one. They are based on transient detection on phase cables and make the measurements only at the edges of the transmission line to estimate the fault position. These systems do not perform well with branched transmission lines because of line reactions at the branching points, and neither with parallel lines because of the mutual coupling of adjacent circuits. Here, we propose a new method to locate faults on transmission towers. Line-to-ground Or line-to-line faults induce voltages, which on partially to ground through the towers. In the towers closest to the fault position, the voltages are greater and this behaviour can be used to locate the fault
Keywords: Sensors; X Bee.
Abstract
DOA Estimation using MOD MUSIC Method and Calculation of Signal and Noise Power
Bhawna Singh, Pratyush Tripathi
DOI: 10.17148/IJARCCE.2016.511122
Abstract: The DOA estimation algorithms are designed based on the ideal assumption where the antenna arrays are free from imperfect conditions. But in practical situation, ideal conditions are extremely difficult to obtain and thus due to imperfect conditions, the performance of DOA estimation will be severely degraded. Results of classical methods like MUSIC or Beamforming for direction of arrival estimation degraded when sources are close or coherent or having low SNR. Based on the investigation to classical DOA algorithm (MUSIC and Improved MUSIC), a mod-MUSIC estimation algorithm is proposed which makes full use of signal subspace and noise subspace characteristics. It has good performance in imperfect condition and compare this algorithm with classical algorithms in different conditions.
Keywords: DOA estimation; Array signal processing; Eigen space; Eigen vector
Abstract
Designing of Digital Adaptive Filter for Removal of Artifacts in PCG Signal
Jyoti Chouhan, Prajyant Pathak
DOI: 10.17148/IJARCCE.2016.511123
Abstract: Heart sound signals will replicate the physiological and pathological characteristics of the heart. every heart beat is incredibly advanced and short and also the main frequency of heart sound signals is within the range of 10Hz to 250Hz. Phonocardiogram will record heart sounds, noise and also the extra sounds. Therefore it's a crucial complement to form up center diagnostic technique examination. Heart sounds are very weak acoustic signals. Within the method to gather heart sound signals it's prone to external acoustic signals and electrical noise interference, especially, the friction caused by subjects respiratory or body movement. The sounds made by friction within the phonocardiogram may produce to an enormous busy signal. Thus, it is vital to research heart sound accurately and eliminates the busy signal with success throughout pre-processing. The objective of this work is to serve as how Noise can be combated using adaptive filter for PCG signal. The problem of controlling the noise level has been one of the research topics over the years. This work focuses on Adaptive filtering algorithms and some of the applications of adaptive filter. The main concept is to use the LMS (Least-Mean-Square) algorithm to develop an adaptive filter that can be used in Adaptive noise Cancellation (ANC) application. In this paper we will learn the various algorithms of LMS (Least Mean Square), NLMS (Normalized Least Mean Square) and RLS (Recursive Least Square) on MATLAB platform with the intention to compare their performance in noise cancellation. The adaptive filter in MATLAB with a noisy tone signal and white noise signal and analyze the performance of algorithms in terms of MSE (Mean Squared Error), percentage noise removal, Signal to Noise Ratio, computational complexity and stability. The Adaptive Filter maximizes the signal to noise ratio & minimize the Mean Squared Error and compare their performance with respect to stability. Adaptive Noise Canceller is useful to improve the S/N ratio. This Paper involves the study of the principles of adaptive Noise Cancellation (ANC) and its Applications. Adaptive noise Cancellation is another technique of estimating signals corrupted by additive noise or interference. Its advantage lies in this, with no apriority estimates of signal or noise, levels of noise rejection are attainable that would be difficult or not possible to achieve by other signal processing methods of removing noise. Its cost, inevitably, is that it wants two inputs - a primary input containing the corrupted signal and a reference input containing noise correlate in some unknown approach with the first noise. The reference input is adaptively filtered and subtracted from the first input to get the signal estimate. Adaptive filtering before subtraction permits the treatment of inputs that are settled or random, stationary or time-variable. The result of uncorrelated noises in primary and reference inputs, and presence of signal part
Abstract
Video Enhancement for Low Light Conditions
Piyanka U. Giri, Prof. Ravi .G. Hirulkar
DOI: 10.17148/IJARCCE.2016.511124
Abstract: Digital video has become an important part of various technical and research field for efficient analysis of results. When the video taken for investigation it need to be clean for possible effective results. Every now and then when the facts containing video isn't clean and questions are not prominent as it should be then the fundamental concept of video enhancement comes into the picture. The video enhancement is the process which applied to the noisy video which contain more noise than the signal .The noise into the video can be introduce due to the different reasons such as environmental conditions ,Quality of video capturing devices, distance of object from video capturing device or any other technical reason can affect the quality of video . Thus video captured in such condition needs extra enhancement for the better results Therefore in this project we implemented the enhancement method for such low light video. Implemented method work in two stages in first stage noise reduction is done by using adaptive median filter & Gaussian smoothing. In second stage we are applied contrast enhancement of the video by using Weighted Threshold Histogram Equalization (WTHE) method. These two stags provide better enhance video from the input degraded video especially low light video.
Keywords: Video enhancement, low light video, contrast enhancement, WTHE
Abstract
Segmentation
Garima, Sanjay Sachan
DOI: 10.17148/IJARCCE.2016.511125
Abstract: Digital video processing and computer vision, one of the most challenging and active research areas is video object segmentation. A significant issue for the successful use of many video sequences is video object segmentation that accentuates partitioning the video frames to semantically meaningful video objects and backgrounds. Video object segmentation is a vital operation for content-based video coding, multimedia content description, intelligent signal processing and more. Various techniques are being used by the developers in reviewed. They are background subtraction method, CNAFCM, Kernal based fuzzy c means algorithm, Clustering and enhanced method, optimizing motion detection algorithm. In this paper, an FCM algorithm with SLIC algorithm is used. Clustering is done with the help of FCM algorithm. Because in this we compare the existed technique with the fcm algorithm. Then calculate the PSNR values of existed and proposed segmentation.
Keywords: Image Segmentation, Classification of segmentation, Moving objects, Motion Detection.
Abstract
Subgroup Identification in Vertically Partitioned Data Using UNIFI Protocol
Dr. Madhavi Karanam
DOI: 10.17148/IJARCCE.2016.511126
Abstract: Association rule learning is a popular and well researched method for discovering interesting relations between variables in large databases. It is intended to identify strong rules discovered in databases using different measures of interestingness. Based on the concept of strong rules for discovering regularities between products in large-scale transaction like data recorded by point-of-sale (POS) systems in supermarkets. In data mining, association rules are useful for analysing and predicting customer behaviour. They play an important role in shopping basket data analysis, product clustering, catalogue design and store layout. The proposed work is aimed to implement the protocol used in the existing system to the problem of distributed association rule mining in the vertical data. The proposed work uses unifying lists of locally frequent item sets (UNIFI) protocol to find out the subgroup in vertically partitioned data.
Keywords: Association Rule; Data mining; Horizontally Distributed Databases., Privacy-Preserving.
Abstract
Ammonia Gas Leakage Monitoring System using MQ-137 Sensors, IoT and framing suitable Reflexive Actions
Vishesh S, Manu Srinath, Nakul R B, Vivek Adithya, Pragathi Prema Kumar, Swathi S
DOI: 10.17148/IJARCCE.2016.511127
Abstract: Over the past decade, several major industrial accidents have led the chemical industries and national regulatory bodies to reinforce the safety and regulatory measures. Chemical leaks, such as ammonia, can be the origin of toxic releases. This can lead to severe consequences on the installations as well as the environment and nearby inhabitants. In this paper, we propose one such ammonia gas leakage monitoring system using Internet of Things (IoT), which is an advanced and efficient solution for connecting the things to the internet and to connect the entire world of things in a network. The values of ammonia gas, during leakage are measured using MQ137 sensors and are sent to the cloud wirelessly using a Wi-Fi module. The data is retrieved from the cloud automatically by the receiver and required action is taken (like sprinkling water, sounding loud alarms, issuing warning to the respective institutes for safety, etc.). In this paper, we also present to you the reflexes that have to be carried out after such accidental leakage of ammonia gas.
Keywords: Chemical leaks, gas leakage, Internet of Things (IoT), MQ 137 sensors, Wi-Fi module.
Abstract
An Intense Review of Task Scheduling Algorithms in Cloud Computing
Jai Bhagwan, Sanjeev Kumar
DOI: 10.17148/IJARCCE.2016.511128
Abstract: Cloud Computing is a hot area of research in these days. Cloud is of four types: public, private, hybrid and community cloud. The cloud is based on three models: SaaS, PaaS, and IaaS. Task scheduling is the area in which a lot of research has been done. Still, there is a need to schedule the tasks or jobs as users of the clouds are increasing day to day. In this paper, we provide an extensive review and comparison of various research algorithms related to task scheduling. A few fundamental algorithms are FCFS, Round Robin, Max-Min, Min-Min, Priority based and Most Fit Task Scheduling. This paper compares various latest algorithms based on the techniques like Symbiotic Organism Search, Particle Swam Optimization, Ant Colony Optimization, Genetic Algorithm, Queuing theory etc., and suggest which algorithm is better in the account of various parameters like makespan, total task execution time, task waiting time, transmission, the degree of imbalance, energy consumptions etc.
Keywords: Cloud Computing, SaaS, PaaS, IaaS, Task Scheduling, FCFS, Max-Min, Min-Min, VM (Virtual Machine).
Abstract
A Load Balancing in LTE Heterogeneous Networks: A Review
Manoj, Dr. Sanjeev Kumar
DOI: 10.17148/IJARCCE.2016.511129
Abstract: In present Data traffic demand in cellular networks is increasing at an exponential rate. Third Generation Partnership Project (3GPP) Long Term Evolution/ System Architecture Evolution (LTE/SAE) is the next generation radio access system that carries future end-user requisite. With the rapid use of the cellular network, operators have to give over momentous manual efforts to network management. Manual configuration and management of networks is a time-consuming, costly and error prone due to exponentially growing rate of mobile users and nodes. This shows the way to a preamble of self-organizing capabilities for network management with minimum human enthusiasm. A Load balancing as a part of self organized network solution has become one of the most active and emerging fields of research in Cellular Network. This paper is an attempt to review the various load balancing techniques presently used in mobile networks with special prominence on techniques that are appropriate for self optimization feature in future cellular networks.
Keywords: LTE, Load Balancing, SON, eNB, EPC.
