VOLUME 5, ISSUE 2, FEBRUARY 2016
Application of XML Compressor [EXI] in Medical Image Database (DICOM)
Gaurav Jaiswal, Adesh Chandra, Niharika Srivastava
Detection of Distributed Denial of Service and Counter Measure Selection Mechanism in Cloud System
Mrs. Sweta Kamat, Mrs. Poonam Sinai Kenkre, Mr. Shreedhar Niradi
A Study on Security Approaches for Authentication Processes for Email Transactions
Shananda Dey, Ms. Jharna
Single Image Dehazing for Robust Image Matching
Waman Kumar Gangber, Mrs. Urmila S. Soni
Advent for Detection of Movement using Raspberry Pi by an Internet of Things: A Survey
Usha K, Dr.S.Ambareesh
A Review of Wireless sensor networks System for monitoring of Asthma Trigger Factors
Miss.Anumeha Lal, Mr. Girish A. Kulkarni
Intrusion Detection on Highly Imbalanced Big Data using Tree Based Real Time Intrusion Detection System: Effects and Solutions
Dr.R.Balasubramanian, S.J.Sathish Aaron Joseph
Image Intensification using Various Edge Detection Mechanisms
Reena Jangra, Abhishek Bhatnagar
Embedded Visual Cryptography for Secret Color Images Sharing using Stamping Algorithm, Encryption and Decryption technique
Prof. N. N. Thorat, Snehal M. Kaware, Dhanashri D. Patil, Neha R. More
A Review on Redundancy Management of Multipath Routing for Intrusion Tolerance in Hetrogeneous WSN
Manisha Dangi, Prof. R. K. Krishna
Spectral Clustering based Approach on Large Water Distribution Network
S.V.S. Santhi, Poosapati Padmaja
Energy Efficient Scheduling of Map Reduce for Evolving Big Data Applications
Mrs.P.Sheela Rani, S.Shalini, J.Rukmani@keerthika, A.Shanthini
SHA-ZHLS: Security Enhancement in MANETs using SHA Algorithm
M V Narayana, Dr G Narsimha, Dr SSVN Sarma
Big Data – Concepts, Applications, Challenges and Future Scope
Samiddha Mukherjee, Ravi Shaw
A Review on Data Anonymization in Privacy Preserving Data Mining
Kinjal Parmar, Vinita Shah
Prediction Accuracy of Academic Performance of Students using Different Datasets with High Influencing Factors
Jai Ruby, Dr. K. David
A Survey Study For Deduplication In Large Scale Data
Supriya Allampallewar, Mr. J. Ratnaraja Kumar
A Novel Approach to Detect Intruder for Hierarchical WSN Network
Manoj Kumar Gupta, Lokesh Singh
A Review: Customer Relationship Management Classification using Data Mining Technique
Easha Mangal, Mr. Anurag Jain
Recommender System for Hotels based on user’s personalized ratings using Hadoop and Cloud
J. S. Pawar, Nisha R.Patil, Harshala R.Khinde, Snehal S.Dandge, Sampada S. Bhavsar
Survey on Wireless Body Area Network
Stefina Macwan, Nikhil Gondaliya, Nirav Raja
Precision and Recall of Google and Baidu for Retrieval of Scholarly Information in the field of Computer Applications
Aasim Bashir, Peerzada Mohd Iqbal
Topic Quarrying Over Same Time Period Text Documents
Sujata B. Sanap, Prof. Vivek P. Kshirsagar
Reversible Image Watermarking Based on Histogram Shifting Technique: Review
Salunkhe Pallavi P, Dr. Kanse Y.K
Critique of Wordcount Blueprint By Virtue of MapReduce Postulate
Priyaneet Bhatia, Bhawna Mallick
Optimized Image Classification based on Universal Image Distance and Support Vector Machines
Nandita Chasta, Manish Tiwari
Energy Aware Ant Colony Optimization based Dynamic Random Routing Strategy for MANET
S. Beski Prabaharan, Dr. R. Ponnusamy
Raspberry Pi based Interactive Smart Home Automation System through E-mail using Sensors
Shruti G. Suryawanshi, Suresh A. Annadate
HR Application Using IBM’s Bluemix
Akash Narhe, Avinash Dhobale, Shweta Tikhe, Prajakta Suryawanshi, Prof. U.A.Joglekar
A Study of Analyzing Greedy Approach for Fractional Knapsack Problem
Sri Lakshmi Kanagala
A Review-Recognition of License Number Plate using Character Segmentation and OCR with Template Matching
Mr A. N. Shah, Ms A. S. Gaikwad
A Review On: Protocols and Standards in Different Application Areas of IOT
Chetal. S. Patil, Kanaksing. N. Pawar
Graphical Password based Authentication System
Anitha H.B, Adithi Reddy, Irudaya Mary S, Vidya V
A Defended and Adequate Mutual Verification with Key Concession Architecture in Wireless Network
N. Praveen Kumar
A Novel Creative Photo grid Android mobile Application for Photo Editing
Prof. Keerthan Kumar T G, Harika E, N Vani, Aishwarya Patted
Enhanced Energy and Secured Using Position Based Routing Protocol Design for Wireless Mesh Networks
Dr. K. Kumaravel, Ms. V. Renugadevi
A Pragmatic Approach to Optimize Energy Efficient Resource Allocation Technique in Cloud Computing Data Center
Neha Pangotra, Meenakshi Sharma
A Survey on Genetic Algorithm for Vehicle Routing Problem
Ms. S. Geetha Msc., Mrs. N. Vijayalakshmi MCA., M. Phil.,
Performance Analysis on Clustering Approaches for Gene Expression Data
D. Asir Antony Gnana Singh, A. Escalin Fernando, E. Jebamalar Leavline
Security Vulnerabilities and Solution for Electronic Commerce in Iraq
Huda Hamdan Ali, Hasan Abdulrazzaq Jawad
Performance Analysis of AODV, AOMDV and ZRP using NS-2: A Survey
K. Gowri Raghavendra Narayan, N.V. Ramana Gupta, Dr. M.V. Rama Krishna
Automated unified system for LPG using Microcontroller and GSM module
B. B. Didpaye, Prof. S. K. Nanda
Performance Evaluation of Trigger Driven Zero Remnance Proof Based Data handling for Digital Forensic
Pooja Bhavsar, Rakesh kumar Lodhi
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Mr. K.S. Saravanan, S. Karthika
Implementation of Smart Home Control by Using Low Cost Arduino & Android Design
Zaid Abdulzahra Jabbar, R.S. Kawitkar
Hop-By-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
Mrs. C. Theebendra, S. Prema
A Review: Handwritten Character Recognition System
Mahesh R. Barkul, S. S. Lokhande
A Review: Comparison of Different Algorithms to Improve the Quality of Image
Mayur M. Sonavane, Dr. S. S. Agrawal
A study of Image classification using BoF model
Charulata Rathi, S.V. Jain
Survey on Preventing Vampire Attacks in Wireless Sensor Networks
Ms. S. Jayashree, Ms. S. Hebziba Jeba Rani
Meliorated Cooperative Message Authentication Scheme in VANET
Anushree K, Divya K, Pavithra A, Asmitha Shree R
Solution for Farmer Consumer Interaction
Mahesh M. Jadhav, Akash V. Ingale, Sandhya N. Hiranwale, Umesh M. Bhavsar
Review of Bank Locker System Using Embedded System
Abhilasha A Sayar, Dr. Sunil N Pawar
A Review: Contrast Enhancement Methods
Namrata Khaparde, Dr. S.S. Agrawal
A Survey on Identification of Dipoles in Climate Data
Ramireddy Thushara Bharathi, J. Velmurugan, Dr. M. Venkatesan
A Survey Paper on Climate Changes Prediction Using Data mining
E. Sreehari, J. Velmurugan, Dr. M. Venkatesan
A survey on Weather forecasting by Data Mining
Audireddy Gayathri, M. Revathi, J. Velmurugan
Brief Survey of data mining Techniques Applied to applications of Agriculture
Ami Mistry, Vinita Shah
Verifying Human Identities Using Major and Minor Finger Knuckle Pattern
Shubhada Sonawane, Prof. Ganesh Dhanokar
System for Enhancing Agriculture
Dibin Thomas, Kaiwalya Limaye, Rachana K P
Night Vision Motion Estimation: A Survey
Patel Ami M., Assi. Prof. Swapna J Jadhav
Security & Concurrency control in Real-Time Database Systems: A Survey
Ebrahim Abduljalil, Dr. S.B. Thorat
An Intelligent Compression: A Reliable Space Optimization in Cloud Storage
Shyma Manzoor, Amrutha Chandran, Raji Jayan, Nayana P, Archana R S, Sowmya K S, Jooby.E
Evaluation of EKF Based Receiver for Bluetooth in Presence of IEEE 802.11 Interference
Mr. Alhaj-Saleh Abdallah, Prof. Mohamed Zohdy
Review on: Hand Gesture Based Interactive Photo Slider
Sampada Muley, Prof .A. M. Rawate
Conservation of Power Quality in Micro Grid Using Photovoltaic Interfaced Shunt Active Power Filter
Aruna.V, Jagan.R, Selva Kumar.S
Importance of TPA and Homomorphic Token for Data Storage Security in Cloud
Sneha S. Bhandarkar, Buri Chanukya, Sandhya Rani, Y. V. N. Phani Kishore
An Analytical Approach to Wireless Communication using Vodka Vapours
Rohit Kashyap, Shivam Thabe, Sahil Sawant, Rahul Kashyap
A Survey Paper on Personalized Web Search
Durgesh Sawkhedkar, Sonal Patil
A Novel Scheme for Congestion Control in Mobile Ad Hoc Networks
S.TamilSelvi, O.P.UmaMaheshwari
An Overview of Various Improvements of DBSCAN Algorithm in Clustering Spatial Databases
K. Nafees Ahmed, T. Abdul Razak
Detection and Prevention of Black Hole Attacks in Manets Using NTP Method
Arshdeep Singh, Er. Harshdeep Trehan, Er. Varinderjit kaur, Dr. Naveen Dhillon
ATM Security Using Virtual Password
Renjith R, Arya S, Jasmine Yesudasan, Keerthy S Kumar, Krishnaveni S, Ajeesh S, Jooby E
Monitoring and Controlling of Environmental Parameters Using Embedded Web Server
Ashwini .S. Malewar, Prof. Shaila Kharde, Prof. Sonali Chincholikar
Gesture Recognition System for Indian Sign Language on Smart Phone
Ankit P. Parmar, Dr. Nehal G. Chitaliya
Security Analysis of Handover Key Management in 4G LTE/SAE Networks
Dr.P.Sumitra, P.Ponkavitha
An Optimized Parallel Computation of Advanced Encryption Algorithm using Open MP -A Review
Vishal Sathawane, Tausif Diwan
A Study on Gender Prediction using Online Social Images
Minal Gadiya, S. V. Jain
Forestalling the Risk of Cognitive Distraction Accidents by using Cellular System
M. Vignesh, S.R. Sannasi Chakravarthy
A Survey: Text Extraction from Images and Video
Vivek Dhanapal Sapate
Intercell Interference and Cross Tier Interference Mitigation in LTE based Femtocell Network using ‘CASFR’ Scheme
Prof. Dimple Chaudhari, Reshma Khandare
Study of Various Security Attacks in Network Layer and the Mitigation Techniques for MANET
R. Divya Paramesvaran, Dr. D. Maheswari
Survey on Dynamic Query Forms for Database Queries
Subhash Pingale, Swapnaja A. Ubale, Anandrao G. Deshmukh
Preserving Text search privacy through blind storage towards secure Storage and retrieval of data
D.Kavitha, S.Hemavathy
A Comparative Study on Prediction of Heart Disease using Cluster and Rank based Approach
K. Aravinthan, Dr. M. Vanitha
A Novel Approach for Transaction Management in Heterogeneous Distributed Database Systems
Mr. Dheeraj Bhimrao Lokhande, Prof. Jyoti I. Nandalwar, Prof. Dr. R.C. Thool
Confidentiality Technique for Enhancing Data Security using Encryption and Obfuscation in Public Cloud Storage
S. Arul Oli, Dr. L. Arockiam
Data Fusion Using Conflict Identification Methods for Knowledge Mining Based Repository Creation
I. Carol, Dr. S. Britto Ramesh Kumar
A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model
P. Anitha, Dr.G.Satyavathy
Amigos.com: An Attitude based Friend Recommendation System on Social Network
Alsaliha S, Anjali Unnikrishnan, Kripa Mariam John, Pavithra P, Vineetha B T, Ms. Deepa K Daniel, Ms. Jooby E
A Novel Method of Digital Image Watermarking in Spatial Domain Based on Interpolation
Kullayamma and Sathyanarayana
Enhanced Security Framework for Cloud Storage Using Decentralized, Dynamic and Policy-Based Security
Khushbu Malviya, Priya Saxena
Google Analytics Tracking for Flex
Ms. Shradha Dhakate, Ms. Rutumbhara Kolhe, Prof. Swati Ramteke
Advancement in Antivirus
Priya Upadhyay, Ayushi Saxena, Ankuj Singh, Pradeep Sharma
Performance Enhancement of AODV in MANET over Black-Hole Attack
Mr. Ankush Jain, Mr. Sandeep Gupta
Vulnerabilities of Routing Protocols in Wireless Sensor Networks
Celia John, Charu Wahi
Design and Implementation of a GSM based Electronic Appliances Monitoring and Controlling System
Oyediran Mayowa Oyedepo, Akande Noah Oluwatobi
Document Clustering for College Student Database
Amol Patil, Shahezad Arif, Ajit Patil, Prof. Deveshree Wankhede
Real Estate Management System
Jitendra Mahajan, Ganesh Mahajan, Vivek bhuvad, Prof Reena Chaudhari
Design and Development of a Portable ECG Acquisition System
K.Anuradha, M.Saravanan
A Survey Exploring Student’s Experiences through Analyzing Social Media Data
Ajinkya A Londhe, Jamgekar R.S, Solunke B.R
A Survey on Parallel Mining of frequent itemsets in MapReduce
Indumathi S, Kavya D S, Madhusudhan V
Web Usage Mining – A Review
Mr. Ankit Rathi, Prof. Abhijeet Raipurkar
Curvilinear Structure of HFET for Low Frequency Noise Measurements
Naresh Chandra Agrawal, Dr. Anil Kumar
Identification of glaucoma disease using optic disk and cup segmentation from retinal images
Renuka Deshpande, Anita Kurmi, Jyoti Yadav, Prajakta Borole
Automatic Wi-Fi based Student Push Notification in College Campus by using Cloud Computing
Prof. Renuka Deshpande, Shubham Jaiswal, Harshal Joshi, Mayur Gondhale
Data Mining Technique to Predict Missing Items and Find Optimal Customer for Beneficial Customer Relationship and Management
Saroja T.V., Greeshma Nair, Kajal Nalawade, Yojana Prajapati
M-Learning: Effective Framework for Dyslexic Students Based on Mobile Cloud Computing Technology
Weam Gaoud Alghabban, Reda Mohamed Salama, Abdulrahman Altalhi
Speech and Speaker Recognition System Using Artificial Neural Network and Hidden Markov Model
Pallavi Chandratre, Shweta Chile, Sarvesh Gawali, Asmita Jadhav
Keylogging-resistant Visual Authentication Protocol
Prof.Diksha Bhave, Pratiksha Bhavsar, Surekha Chavan, Krutika Gore
A Review: Integration of Open vSwitch on the OpenDataPlane Framework
N. D. Kakade, S. G. Tamhankar
Security Trends in Delay Tolerant Networks
Audumbar T. Mohite, S.P. Sonavane
Enhancement Techniques of Medical Images- A Review
Radhika M. Kokate, Vijaya K. Shandilya
Image to Text Viewer (iTV)
Atul Thorat, Deepak Singh, Rohit Kadam, Prof. Uttara Gogate
A Survey on Image Modification for Deuteranopic Viewers
Ms. Jyoti D. Badlani, Mr. C.N. Deshmukh
Optimizing the Health Needs of Users by Moulding up an E-Hospital
Aleena.Wahid, Anice.John, Athira.S, Prabha.M.R, Sivendu.B.S , Jooby.E, Deepa.K.Daniel
A Desirable Strategy for Enhancing Cost Containment in Cloud Cache
Suganthi.J, Abinaya.B, R.G. Suresh Kumar, T. Nalini
Secure Online Payment System using Visual Cryptography
Nikita Chaudhari, Priya Parate
Protecting Outsourced Data in Cloud Using Deduplication and Enhancing Key Management
Anuja Kunjumon, Devu S Nair, Saranya P, Shahanas Abdul Sammad, Smitha C S
SCADA Implementation for Power Generator Performance and Condition Monitoring System
Miss. Sargar Anita, Miss. Ghadage Shital, Miss. Shweta S. Joshi
Security Issues and Social Impacts of Mobile Applications
Ms. Y Sowjanya, Ms. M Nishantha
Review Paper on QR Code Watermarking Algorithm Based on Wavelet Transform
Prof. Mrs Sarita Verma, Prof. Mrs. Jaya S. Wakode, Ms. Priyanka S. Kannurkar
Equality in Soft Erosion and Soft Dilation in Multi Scale Environment
Kompella Venkata Ramana
Smart Home Automation using IOT
Dhakad Kunal, Dhake Tushar, Undegaonkar Pooja, Zope Vaibhav, Vinay Lodha
Computerized Automated Detection of Skin Cancer
Darshana Kokitkar, Apurva Amberkar, Vaishali Giri
Comparison of Complex Event Processing Techniques in Sensor Networks
Dr. M. Senthil Kumar, M.Sumithra
Prevention against Attacks in MANET Using Secure IDS
Darshana Salvi, Ruchira Samant, Ashwini Patil, Manali Repale, Prof. Manisha Sonawane
M-Commerce: Risks, Security and Mobile Banking Payment Methods
Akanksha Srivastav, Ajeet Bhartee
Resource Sharing via Social Networks
Amrutha J Raj, Archana Ravi, Keerthy Raj, Sree lekha A, Bichu Ben, Devi Dath, Deepa K Daniel
Comparative Analysis of Prevention and Detection Policies for Selfish Behaviour in MANET
Ms. Lilu Odedra, Prof. Ashish Revar, Prof. Munindra H. Lunagaria
Improved Content Adaptive Image Detail Enhancement by Using Guided Image Filter
Seema, Er. Harshdeep Trehan, Er. Varinderjit Kaur, Dr. Naveen Dhillon
A Survey on Image Steganography Techniques using Compression
Pranjal Shrivastava, Sandeep Pratap Singh
Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application
Himani Mehra, Mr. Tarun kumar Sahu, Miss Garima Tiwari
An Android-Based Emergency Alarm Message and Healthcare Management System
Karan Jadhav, Akshay Satam, Abhijeet Salvi
Local Activity and Social Similarity based Data Forwarding Scheme
Vaibhav Dandale, Himanshu Chaudhary, Sameer Lakhe, Sumeet bhosikar, Prof. V.S.Phad
A Survey on Face Annotation for Content Filtering based on Different Techniques
Ms. Mahvash Iram Khan, Mr. K.N.Hande
Survey on Digital Image Forensics Using Different Contrast Enhancement Techniques
Ms. Nishat Fatema, Mr. M.S. Chaudhari
A Novel Approach to Compute Reputation Value for Trust based Hybrid Security Architecture for Mobile Agents
Dr. Heman Pathak
Multicloud Collaboration: The Cloud Mush up and Security Issues
Ghodake P.R, Nagode M.S, Fatale P.R, Menkudale K.S
Study on Framework for Password-less Authentication
Sabin K Ravi, Sivadasan E T
A Survey on Sharing of PHR using ABE in Semi-trusted Servers
Ambadas Vairagar, Rahul Kanthale, Sandeep Pawar, Prof. S.K. Markad
A powerful Wi-Fi XML Buffer Supporting Twig Structure Requests Using Lineage Coding
J.Jakkulin Joshi, D.Kalaimani, R.Priya
An Adaptive Approach for Mobile Robot Path Planning Using Optimized Artificial Potential Field Method
Urvashi Jaiswal, Anwiti Jain, C.S. Satsangi
Abstract
Application of XML Compressor [EXI] in Medical Image Database (DICOM)
Gaurav Jaiswal, Adesh Chandra, Niharika Srivastava
DOI: 10.17148/IJARCCE.2016.5202
Abstract: Recently, many healthcare organizations are planning to adopt Cloud Web services for storing and transmitting of medical information. SOAP (Simple Object Access Protocol) is the basic communication protocol of Cloud Web services, completely based on XML (eXtensible Markup Language) as an encoding language. The XML is a format that is widely used as a tool for data exchange and storage, but XML files are verbose in nature which means that the amount of information has to be stored, transmitted, and queried is often larger than that of other data formats. This huge size introduces bandwidth communication overhead, end to end communication delay, increased processing time and increased storage space. In this paper, we have presented an effective model to compress and to reconstruct digital imaging and communications in medicine (DICOM) images by using EXI compressor. The experimental results proved that the performance of the proposed technique shows better results than any other XML compression standards.
Keywords: Lossless image compression, medical images, SOAP, XML, EXI, DICOM, FI, XML compressor.
Abstract
Detection of Distributed Denial of Service and Counter Measure Selection Mechanism in Cloud System
Mrs. Sweta Kamat, Mrs. Poonam Sinai Kenkre, Mr. Shreedhar Niradi
DOI: 10.17148/IJARCCE.2016.5203
Abstract: Cloud security is one of most significant problems that have attracted plenty of analysis and development effort in past few years. Significantly, attackers will explore vulnerabilities of a cloud system and compromise virtual machines to deploy additional large-scale Distributed Denial-of-Service (DDoS). DDoS attacks typically involve early stage actions like multi-step exploitation, low frequency vulnerability scanning, and compromising known vulnerable virtual machines as zombies, and eventually DDoS attacks through the compromised zombies. Inside the cloud system, particularly the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is very troublesome. This is often as a result of cloud users could install vulnerable applications on their virtual machines. to forestall vulnerable virtual machines from being compromised within the cloud, we have a tendency to propose a multi-phase distributed vulnerability detection, activity, and measure choice mechanism referred to as NICE, that is constructed on attack graph primarily based analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow schedule genus Apis to create a monitor and management plane over distributed programmable virtual switches so as to considerably improve attack detection and mitigate attack consequences. The system and security evaluations demonstrate the potency and effectiveness of the planned resolution.
Keywords: Network security, cloud computing, intrusion detection, attack graph, zombie detection.
Abstract
A Study on Security Approaches for Authentication Processes for Email Transactions
Shananda Dey, Ms. Jharna
DOI: 10.17148/IJARCCE.2016.5204
Abstract: Email, sometimes written as e-mail, is simply the shortened form of �electronic mail,� a system for receiving, sending, and storing electronic messages. It has gained nearly universal popularity around the world with the spread of the Internet. In many cases, email has become the preferred method for both personal and business communication. So, enhance the security provision in essential to maintain integrity and confidentiality of data. Currently the system offers only OTP as an additional verification during email transactions. The current paper focuses on conducting a study on concept of email security and challenges.
Keywords: Handshaking Protocol, OTP, Captcha, Email Security.
Abstract
Single Image Dehazing for Robust Image Matching
Waman Kumar Gangber, Mrs. Urmila S. Soni
DOI: 10.17148/IJARCCE.2016.5205
Abstract: The visibility of images of outdoor scenes is degraded by bad weather conditions. Atmospheric phenomena like haze and fog reduce significantly the visibility of the captured image. Haze is the atmospheric phenomenon that dims the clarity of an observed scene due to the particles such as smoke, fog, and dust. Due to these atmospheric particles there is a significant degradation in the color and contrast of the captured image in the bad weather conditions. If two or more images of same scene are given, then the process of image matching requires find valid corresponding feature points in images. Image matching is a fundamental aspect of many problems in computer vision. Besides the geometric and photometric variation, outdoor and aerial images that are subjected to the process of matching are often degraded by the atmospheric phenomenon of haze. In this paper we presented an efficient physics based method for recovering a haze-free image when a single photograph is available as an input. This technique restores the hazy images based on the estimated transmission (depth) map. Our method benefits from three main contributions. The first is a new constraint on the scene transmission. Second contribution is contextual regularization that enables us to incorporate a filter bank into image dehazing. Our final contribution is an efficient optimization scheme, enables us to quickly dehaze images of large sizes. Our method requires some general assumption and can restore a high quality haze free image. At final stage we have performed matching of images by SURF operator to show efficiency of our method and also demonstrate that our technique is suitable for the challenging problem of image matching based on local feature points.
Keywords: Single image dehazing; Haze; Air light; Transmission map; Image matching; Local feature detectors and descriptors; Speeded up Robust Feature (SURF).
Abstract
Advent for Detection of Movement using Raspberry Pi by an Internet of Things: A Survey
Usha K, Dr.S.Ambareesh
DOI: 10.17148/IJARCCE.2016.5206
Abstract: Internet of things is the interchange of anything with any other thing, the interchange mainly fetch of useable data, like a sensor in a room to observe and control the temperature. the home environment has seen a rapid introduction of network enabled digital technology. It is estimated that by 2020 there will be 50 billion internet-enabled tools. This paper aims to outline a security alarm system using low processing power chips using Internet of things which helps to observe and get alarms when motion is detected and convey photos and videos to a cloud server. Also, internet of things based application can be used remotely to view the agitation and get notifications when movement is detected. The photos and videos are sent directly to a cloud server, when the cloud is not available then the data is stored locally on the Raspberry Pi and sent when the connection restarts. Hence, advantages like these make this application ideal for monitoring homes in absence.
Keywords: Internet of Things, detection of movement, cloud, tools, environment, internet.
Abstract
A Review of Wireless sensor networks System for monitoring of Asthma Trigger Factors
Miss.Anumeha Lal, Mr. Girish A. Kulkarni
DOI: 10.17148/IJARCCE.2016.5207
Abstract: Asthma is one of the widespread chronic diseases. Firstly, the medical background of asthma is given. Pathology and symptoms are presented. Afterwards, the problem of persistent asthma management is introduced with a short overview of traditional disease management techniques. A review on approaches to asthma telemonitoring is made. This paper presents a web information system and a wireless sensor network for indoor or outdoor air quality monitoring with application in asthma trigger factors assessment. Employment of low power wireless sensor networks (WSN) paired with Smartphone technologies is reviewed as a novel asthma management tool. The wireless sensor network includes a set of sensing nodes with ability to measure environment parameters like temperature, relative humidity, carbon monoxide among others and to send processed information to a smart coordinator. Using the technology, the aim is to retain the disease in a controlled state with minimal effort, invasiveness and cost, and assess patient�s condition objectively.
Keywords: Author Guide, Article, Camera-Ready Format, Paper Specifications, Paper Submission.
Abstract
Intrusion Detection on Highly Imbalanced Big Data using Tree Based Real Time Intrusion Detection System: Effects and Solutions
Dr.R.Balasubramanian, S.J.Sathish Aaron Joseph
DOI: 10.17148/IJARCCE.2016.5208
Abstract: Due to the increased digitalization of information, a huge amount of data is being generated. Information richness in such data has attracted researchers to this data. The major problem existing in real time data is that it is usually huge and is imbalanced. This paper deals with analysing the tree based real time intrusion detection technique for intrusion detection from highly imbalanced Big Data. Classifiers tend to exhibit lower accuracies and reliabilities when the imbalance levels in the data are increased. Hence a highly imbalanced data is applied on the proposed classifier to determine its efficiency. Sampling techniques are some of the mostly used techniques to reduce the impact of imbalance on classifiers. Hence sampling techniques were applied on the data and the threshold limits for imbalance that can be effectively handled by the proposed classifier is identified.
Keywords: Classifier; Tree based Intrusion Detection; Sampling; Oversampling; Under Sampling; Imbalance; Big Data.
Abstract
Image Intensification using Various Edge Detection Mechanisms
Reena Jangra, Abhishek Bhatnagar
DOI: 10.17148/IJARCCE.2016.5209
Abstract: Edge (Boundary line)s are borders between various textures. Edge (Boundary line) can be defined as discontinuities in image(picture) intensity from one pixel to another. Edge (Boundary line)s for an image(picture) are always essential character that suggest an pointer for a better-quality frequency. Detection of Edge (Boundary line)s for an image(picture) may help for image(picture) segmentation, data compression, & also help for well identical, such as image(picture) modernization & so on. There are many way to make Edge (Boundary line) detection. Most universal method for Edge (Boundary line) detection is to analyze discrimination of an image(picture). Edge (Boundary line) detection is an image(picture) processing technique for finding borders of objects within image(picture)s. It works by detecting discontinuities in brightness. Edge (Boundary line) detection is used for image(picture) segmentation & data extraction in areas such as image(picture) processing, computer vision, & machine vision. Common Edge (Boundary line) detection algorithms include Sobel, Canny, Roberts, Prewitt & fuzzy logic methods.
Keywords: Edge (Boundary line) detection, Canny Edge (Boundary line) detection, Sobel operator.
Abstract
Embedded Visual Cryptography for Secret Color Images Sharing using Stamping Algorithm, Encryption and Decryption technique
Prof. N. N. Thorat, Snehal M. Kaware, Dhanashri D. Patil, Neha R. More
DOI: 10.17148/IJARCCE.2016.5210
Abstract: Now-a-days, peoples are using emails for sharing their data. Sharing of secret information via emails is not that much secure as the information or data can be hacked easily by the third-party. In this current work we have proposed Visual Cryptographic Scheme for color images where the divided shares are enveloped in other images using stamping. The shares are generated using Random Number. Visual Cryptography Schemes (VCS) is a process of encrypting the image which hide the secret information present in images. In simple visual cryptographic technique encryption of secret image is done by splitting the image into n number of shares and the Stamping process is performed by overlapping k number of shares. It may helps to hide secret image. The decryption process of simple visual cryptographic system can be performed by a human eye so there is a possibility of security issues while using cryptography for sharing information. and to solve this problem we are using password technique. Previous methods faced some security issues like pixel expansion and noise troubleshoot the proposed system add more security to generated transparencies by applying an envelope to each shares by using stamping algorithm.
Keywords: Visual cryptography, shares, transparencies, stamping algorithm.
Abstract
A Review on Redundancy Management of Multipath Routing for Intrusion Tolerance in Hetrogeneous WSN
Manisha Dangi, Prof. R. K. Krishna
DOI: 10.17148/IJARCCE.2016.5211
Abstract: Multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept of our redundancy management is to exploit the tradeoff between energy consumption vs. the gain in reliability, timeliness, and security to maximize the system useful lifetime. We formulate the tradeoff as an optimization problem for dynamically determining the best redundancy level to apply to multipath routing for intrusion tolerance so that the query response success probability is maximized while prolonging the useful lifetime. Furthermore, we consider this optimization problem for the case in which a voting-based distributed intrusion detection algorithm is applied to detect and evict malicious nodes in a HWSN. We develop a novel probability model to analyze the best redundancy level in terms of path redundancy and source redundancy, as well as the best intrusion detection settings in terms of the number of voters and the intrusion invocation interval under which the lifetime of a HWSN is maximized. We then apply the analysis results obtained to the design of a dynamic redundancy management algorithm to identify and apply the best design parameter. We observe that many existing trust models adopting watchdog as their monitoring mechanism do not explicitly address these weaknesses. Our goal in this paper is to demonstrate how serious insider attacks can be in WSNs.
Keywords: Network security, virtual network system computing, intrusion detection, attack graph, zombie detection.
Abstract
Spectral Clustering based Approach on Large Water Distribution Network
S.V.S. Santhi, Poosapati Padmaja
DOI: 10.17148/IJARCCE.2016.5212
Abstract: Minimum spanning tree(MST) based clustering approach is a powerful tool for performing cluster analysis on large graphs. The algorithm produces k-clusters with the MST. To identify the crucial components, MST based clustering approach plays a major role. Real world applications like Water Distribution Networks are complex networks that require innovative technological solutions for efficient management of the system. Spectral clustering algorithm is more effective than traditional clustering algorithm. In this paper we propose a clustering approach on Water Distribution Network. We suggest to find the MST for the large graph and apply spectral clustering algorithm to divide the MST into K-clusters. Spectral clustering algorithm is capable of detecting clusters with irregular boundaries. Experimental results show that the proposed approach performed well and found to fit to the expected results for both synthetic data and real world data.
Keywords: Large graph, Minimum Spanning Tree, Clustering, Spectral Clustering, Water distribution network.
Abstract
Energy Efficient Scheduling of Map Reduce for Evolving Big Data Applications
Mrs.P.Sheela Rani, S.Shalini, J.Rukmani@keerthika, A.Shanthini
DOI: 10.17148/IJARCCE.2016.5213
Abstract: In recent years the data mining applications become stale and obsolete over time. Energy wastage is the major problem more of the IT firms. More workload and more computational will increase high energy cost. Incremental processing is a promising approach to refreshing mining results. It utilizes previously saved states to avoid the expense of re-computation from scratch. In this paper, we propose Energy Map Reduce Scheduling Algorithm, a novel incremental processing extension to Map Reduce, the most widely used framework for mining big data. Map reduce is a programming model for processing and generating large amount of data in parallel time. In this paper, EMRSA is algorithm provide more energy and less maps. Priority based scheduling is a task will allocate the schedules based on necessary and utilization of the Jobs. For reducing the maps, it will reduce the system work so easily energy has improved. Final results show the experimental comparison of the different algorithms involved in the paper.
Keywords: BigData, EMRSA, MapReduce, incremental processing.
Abstract
SHA-ZHLS: Security Enhancement in MANETs using SHA Algorithm
M V Narayana, Dr G Narsimha, Dr SSVN Sarma
DOI: 10.17148/IJARCCE.2016.5214
Abstract: Mobile Ad-hoc Network (MANET) is an important field in while many of the users are using mobile devices for last few years where ad-hoc routing in networks is one of the prominent issues. The routing protocol is aimed to offer best route from source to destination in terms of energy efficiency and security. Zone Based Hierarchical Link State Routing Protocol (ZHLS) is one among in hybrid routing protocols for Mobile ad-hoc network, which is not tolerable large number of internal attacks that come from malicious nodes. A malicious node is drops the routing information, data packets intentionally and disturb the process of the routing protocol. To solve this problem, we proposed a novel approach for effective key management, and prevention of malicious nodes. Security to the routing protocol is incorporated with traditional Secure Hashing Algorithm (SHA-256) symmetric and asymmetric key encryption methods. The performance of the proposed algorithm is analyzed and results shown improvement in terms of the packet delivery fraction, communication overheads and percentage of released packets.
Keywords: MANET, ZHLS, SHA-256, Hashing, Communication Overhead.
Abstract
Big Data – Concepts, Applications, Challenges and Future Scope
Samiddha Mukherjee, Ravi Shaw
DOI: 10.17148/IJARCCE.2016.5215
Abstract: The term, �Big Data� has been coined to refer to the gargantuan bulk of data that cannot be dealt with by traditional data-handling techniques. Big Data is still a novel concept, and in the following literature we intend to elaborate it in a palpable fashion. It commences with the concept of the subject in itself along with its properties and the two general approaches of dealing with it. The comprehensive study further goes on to elucidate the applications of Big Data in all diverse aspects of economy and being. The utilization of Big Data Analytics after integrating it with digital capabilities to secure business growth and its visualization to make it comprehensible to the technically apprenticed business analyzers has been discussed in depth. Aside this, the incorporation of Big Data in order to improve population health, for the betterment of finance, telecom industry, food industry and for fraud detection and sentiment analysis have been delineated. The challenges that are hindering the growth of Big Data Analytics are accounted for in depth in the paper. This topic has been segregated into two arenas- one being the practical challenges faces whilst the other being the theoretical challenges. The hurdles of securing the data and democratizing it have been elaborated amongst several others such as inability in finding sound data professionals in required amounts and software that possess ability to process data at a high velocity. Through the article, the authors intend to decipher the notions in an intelligible manner embodying in text several use-cases and illustrations.
Keywords: Big Data, 3 V�s, Sentiment Analysis, Data Visualization, Integration, Data Democratization, Encryption.
Abstract
A Review on Data Anonymization in Privacy Preserving Data Mining
Kinjal Parmar, Vinita Shah
DOI: 10.17148/IJARCCE.2016.5216
Abstract: People today are very reluctant to share their information as they are well aware of the privacy threats of their sensitive data. Data in its original form contains sensitive information about individuals, and publishing such data without revealing sensitive information is a difficult task. The major risk is of those non-sensitive data which may deliver sensitive information indirectly. Privacy preserving data mining (PPDM) try to overcome this problem by protecting the privacy of data without sacrificing the integrity of data. A number of techniques have been proposed for privacy-preserving data mining. This paper provides a review of different approaches for privacy preserving data mining along with merits and demerits. It provides a brief explanation of anonymization approach along with its different techniques like k-anonymity, l-diversity and t-closeness. It also includes comparison between different algorithms of anonymization with their advantages and disadvantages.
Keywords: Privacy preserving, Anonymization, Randomization, Sensitive attributes, k-anonymity.
Abstract
Prediction Accuracy of Academic Performance of Students using Different Datasets with High Influencing Factors
Jai Ruby, Dr. K. David
DOI: 10.17148/IJARCCE.2016.5217
Abstract: For the past few years, a lot of higher educational institutions tussle for providing quality education. To provide a quality education the institutions need information regarding their students. In higher education institutions a substantial amount of knowledge is hidden and need to be extracted. Various Data mining techniques are useful for deriving such hidden knowledge. The knowledge can be any student specific information like academic performance, dropouts, course preference, subject specialization etc. The quality of the students in a higher education institution is categorized by their academic performance. Many socio economic, non academic and academic factors influence the performance of the students. The factors that describe student performance can be used for predicting students performance by using a number of well - known data mining classi?cation algorithms such as ID3, Simple CART, J48, NB Tree, MLP, Bayesnet etc. The model is mainly focused on finding the prediction accuracy of academic performance of students using two different datasets. The experimental model also proves that the student attributes considered are highly influential in predicting the results using MLP classification algorithm.
Keywords: Educational Data Mining, Academic Performance, Prediction, Classification, Influencing Factors.
Abstract
A Survey Study For Deduplication In Large Scale Data
Supriya Allampallewar, Mr. J. Ratnaraja Kumar
DOI: 10.17148/IJARCCE.2016.5218
Abstract: The deduplication process is nothing but finding duplicate records or duplicate data when comparing with one or more data base or data sets. The process in which we match records from several data bases is known as record linkage. The matched data (which is out- put of whole deduplication process) contains important and useable information. This information is too costly to acquire because of which deduplication process getting more attention day by day. In data cleaning process removing duplicate records in a single database is a critical step, because outcomes of subsequent data processing or data mining may get greatly influenced by duplicates. As the database size increasing day by day the matching process�s complexity becoming one of the major challenges for record linkage and deduplication. To overcome this in some extent we propose a Two Stage Sampling Selection (T3S) model in this article. Basically T3S has two stages, in which, in the first stage the strategy is proposed to produce balanced subsets candidate pairs which are to be labeled. In the second stage to produce smaller and more informative training sets than in the first stage an active selection is incrementally invoked so that redundant pairs get removed which are created in the first stage. We are extending our work in classification phase by using more advanced classification approach i.e. Adaboost algorithm. Several studies said that Adaboost gives better accuracy than SVM classifier. Our experimental results on real world dataset will show the comparative analysis of both methods, which proves that proposed method, performs better as compare to SVM. This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an International Journal. The authors must follow the instructions given in the document for the papers to be published. You can use this document as both an instruction set and as a template into which you can type your own text.
Keywords: Deduplication, T3S, Adaboost.
Abstract
A Novel Approach to Detect Intruder for Hierarchical WSN Network
Manoj Kumar Gupta, Lokesh Singh
DOI: 10.17148/IJARCCE.2016.5219
Abstract: As of late, with wide utilization of PC frameworks, web, and fast development of PC systems, the issue of interruption discovery in system security has turned into a critical issue of concern. In such manner, different interruption recognition frameworks have been produced for utilizing abuse recognition and inconsistency discovery strategies. These frameworks attempt to make strides identification rates of variety in assault sorts and diminish the false positive rate. In this paper, another interruption discovery strategy has been presented utilizing Min Max K-means clustering algorithm, which defeats the lack of affectability to starting focuses in K-means algorithm, and expands the nature of clustering. The investigates the NSL-KDD information set demonstrate that the proposed strategy is more effective than that in view of K-means clustering algorithm. Additionally, the strategy has higher discovery rate and lower false positive recognition rate.
Keywords: K-means algorithm, NSL-KDD, clustering algorithm.
Abstract
A Review: Customer Relationship Management Classification using Data Mining Technique
Easha Mangal, Mr. Anurag Jain
DOI: 10.17148/IJARCCE.2016.5220
Abstract: In business process, the role of Customer Relationship Management (CRM) is very important. CRM provides a customer classification and prediction, which is used for the optimization of business process. In new trends of CRM, one of them is Social customer relationship management (SCRM). In the system we are using a data mining technique to implement customer classification in CRM as we need to analyze the mass volume of data. The research reviews the basic concepts of CRM and Data Mining Techniques. This paper describes many data mining techniques used for the CRM model.
Keywords: Data mining, Customer relationship management, CRM, Data mining techniques.
Abstract
Recommender System for Hotels based on user’s personalized ratings using Hadoop and Cloud
J. S. Pawar, Nisha R.Patil, Harshala R.Khinde, Snehal S.Dandge, Sampada S. Bhavsar
DOI: 10.17148/IJARCCE.2016.5221
Abstract: It is a service recommender system for providing appropriate recommendations to users. In the last decade, the number of customers, services as well as online information has grown rapidly. So, the big data analysis for service recommender systems is required. As a result, traditional service recommender systems often suffer from scalability and inefficiency problems when analysing such BigData. The vital thing is, most of existing service recommender systems present the same ratings of services to different users without considering previous user�s preferences, and hence fails to meet user's personalized requirements. We will propose a method called �Keyword-Aware Service Recommendation�, i.e. KASR, to fulfil the above challenges. In our system Keywords are used to indicate user's preferences. In very first stage data sets will be created for given system. Also user-based Collaborative Filtering algorithm is used to generate appropriate recommendations. KASR is implemented on Hadoop, to improve its scalability and efficiency in big data environment, a widely-used distributed computing platform known as MapReduce is used for parallel processing paradigm. At final stage, experiments are concluded on real-world data sets, and results shows that KASR significantly improves the accuracy & scalability of service recommender systems over existing approaches. As explained above we will use the techniques such as Map Reduce for parallel processing paradigm and the algorithm used in our system are Collaborative Filtering algorithm is for generating appropriate recommendations.
Keywords: KASR, ASC, ESC, Personalized rating, BigData, Cloud Computing, Hadoop.
Abstract
Using Certificate less Encryption for Providing Data Sharing Efficiency in Public Clouds
Ch. Dinesh
DOI: 10.17148/IJARCCE.2016.5222
Abstract: Now a day�s public cloud storages have more benefits to provide service to users to manage their data. However for the rapidly increase of public cloud storage, the public cloud should solve the major issue of data confidentiality. That is sharing sensitive data through all the data must be strongly secured for unauthorized access. In order to provide security of sensitive data store in public clouds, a commonly used approach is to encrypt data before upload into public clouds. So that to provide confidentiality of stored public cloud data, the encryption mechanism should also able to support the access of confidential data. In this paper we are propose public key encryption schema for generation of secret key and encrypt the data using that key. The generation of secret key we are using public key power auditing protocol. Another concept is encryption and decryption of data using data encryption standard algorithm. By implementing those concepts we can improve efficiency and security of give shared data in a cloud.
Keywords: Cloud Computing, Cryptography, Security Access Control, Certificate less cryptography.
Abstract
Survey on Wireless Body Area Network
Stefina Macwan, Nikhil Gondaliya, Nirav Raja
DOI: 10.17148/IJARCCE.2016.5223
Abstract: Recent advancement of wearable computing and wearable sensor devices has empowered the development of Wireless Body Area Networks (WBANs). Wireless body area network is made up of remotely connected miniaturized sensors placed in, on or around the Human Body, which provides continuous monitoring of physiological signs to support medical, lifestyle and entertainment applications. First, we focus on some applications with special interest in patient monitoring. Then the open research issues and challenges are pointed out. Finally, an overview of MAC and network layer is given.
Keywords: WBAN, healthcare, routing, MAC, WSN.
Abstract
Precision and Recall of Google and Baidu for Retrieval of Scholarly Information in the field of Computer Applications
Aasim Bashir, Peerzada Mohd Iqbal
DOI: 10.17148/IJARCCE.2016.5224
Abstract: Google and Baidu, both search engines give different kinds of results for scholarly information using Computer Application related search terms. The modus operandi for this research follows a discrete pattern for search engines which are evaluated by taking the first ten results pertaining to �Scholarly Information in the field of Computer Applications� for estimation of precision and recall. 20 search terms were selected which were divided into three groups Simple, Compound and Complex. The search terms were selected by using a tool from the field of Information Science (Sears List of Subject Headings). The result will cover major fields like Comprehensiveness, Duplication, Currency, Dead Links, Fluctuations and Search Capabilities.
Keywords: Baidu and queries, Computer Application, Google, Precision, Recall, Scholarly information.
Abstract
Topic Quarrying Over Same Time Period Text Documents
Sujata B. Sanap, Prof. Vivek P. Kshirsagar
DOI: 10.17148/IJARCCE.2016.5225
Abstract: Texts are spread over in different database having different timestamps. Text share common topics and thus related with each other. They are correlated with respect to the content they have. The content of text may be related with each other with common topics but have different time stamp. The interaction between common topics may derive valuable information but they may not be arranged in indexed fashion as they differ in timestamp. The main goal of this paper is to extract common topic mining with the help of generative model using exact timestamp. It will perform two main operations alternatively. Common topic extraction with adjusted timestamp and next is adjusting the time stamp according to time distribution of the common topics generated previously. These steps will work alternatively and extract the information of common topics.
Keywords: Timestamp, Asynchronous Sequences, Topic mining, Text mining, Correlation.
Abstract
Reversible Image Watermarking Based on Histogram Shifting Technique: Review
Salunkhe Pallavi P, Dr. Kanse Y.K
DOI: 10.17148/IJARCCE.2016.5226
Abstract: Digital watermarking is a kind of data hiding technology. It is a way of embedding information (i.e., watermark) in multimedia data (image, audio or video), such that the embedded watermark can be later retrieved from the watermarked data for the purpose of content protection or authentication. Among different kinds of digital watermarking schemes, reversible watermarking has become a research hotspot recently. For about ten years, several reversible watermarking schemes have been proposed for protecting images of sensitive content, like medical or military images, for which any modification may impact their interpretation. These methods allow the user to restore exactly the original image from its watermarked version by removing the watermark. Thus it becomes possible to update the watermark content, as for example security attributes (e.g., one digital signature or some authenticity codes), at any time without adding new image distortions.
Keywords: Digital watermarking, reversible watermarking, digital signature, authenticity codes.
Abstract
Critique of Wordcount Blueprint By Virtue of MapReduce Postulate
Priyaneet Bhatia, Bhawna Mallick
DOI: 10.17148/IJARCCE.2016.5227
Abstract: Ubiquitously, Big Data is perceived as an obligatory quantum. Stupendous data types commenced from terabytes to petabytes are bestowed ceaselessly. However, to cache these database competencies is a gruelling chore. Granted that the stereotyped database mechanisms are an intrinsic aspect for repository of immense and inscrutable datasets; nevertheless, it is through the approach of Hadoop that is able to acquire the extravagant information in a proficient style. Besides, on having zillion ingredients, Hadoop paradigm is put forth. Its paramount peripherals are HDFS and MapReduce. Substantially, HDFS is an open source data reservoir benchmark with fault tolerant amplitude. In essence, MapReduce is a programming quintessential on which mining of purposive knowledge is extricated. Over and above, auxiliary elements of Hadoop are perused at length. Consistently, the predominant enchantment is the WordCount algorithm; where it is fascinating to visualize that how this procedure is put into effect adopted by distinctive Hadoop components. Consequently, this algorithm portrays as a pattern for mapping and reducing the dataset.
Keywords: Big Data, MapReduce, Hadoop and its components, HDFS, RDBMS, WordCount, Pig, Hive.
Abstract
Optimized Image Classification based on Universal Image Distance and Support Vector Machines
Nandita Chasta, Manish Tiwari
DOI: 10.17148/IJARCCE.2016.5228
Abstract: Image Classification of remotely sensed images is one of the most important field of research in computer engineering. Image classification techniques are being used in object recognition, quality control and OCR systems. Many of the machine vision systems used in industrial applications employ well known image processing algorithms to discriminate between good and bad parts. Algorithms such as thresholding, blob analysis and edge detection, for example, can be found in every machine vision software vendor's toolbox since they can be used in numerous applications to solve a relatively large number of imaging tasks. Image classification may be performed using supervised, unsupervised or semi-supervised learning techniques. In supervised learning, the system is presented with numerous examples of images that must be manually labeled. Using this training data, a learned model is then generated and used to predict the features of unknown images. Such traditional supervised learning techniques can use either generative or discriminative models to perform this task. In this dissertation, UID techniques are used in an optimized manner to represent an image in the form of a vector in finite dimensions. The distance between this representation and that of a prototype image is computed to find the similarity score between the images. This mating score can be used to train any machine learning system under supervised or unsupervised environment. In this dissertation, an SVM based classifier is trained using feature vectors to train a classifier in a supervised environment. The precision and accuracy of the machine is computed over the benchmark techniques of image classification. The overall performance of the proposed methods is evaluated using R simulator in terms of precision, recall and kappa measure. Simulation results establish the validity and efficiency of the approach.
Keywords: Universal Image Distance, LZ Complexity, Machine Learning, Support Vector Machines.
Abstract
High Speed UART Design Using Verilog
Ambika, Prof. Anuradha S
DOI: 10.17148/IJARCCE.2016.5229
Abstract: Universal Asynchronous Receiver Transmitter (UART) is usually an individual integrated circuit used for serial communication over a computer or peripheral device serial port. This UART is designed for make an interface between RS232 line and a microcontroller or an IP core. It works fine connected to a serial port of a PC for data exchange with custom electronic. UARTs are now commonly included in microcontrollers. A UART is a full duplex transmitter or receiver. UART is the kind of serial communication protocol. In parallel communication the cost as well as complexity of the system increases due to simultaneous transmission of data bits on multiple serial communications alleviates this drawback of parallel communication and emerges the effectively in many applications for long distance communication as it reduces the signal distortion because of its simple structure. The high speed UART is designed using verilog and delay is minimized (5.582ns). The synthesis of UART is done by using Xilinx 13.2 and simulation is done by ModelSim10.1.
Keywords: UART, Verilog, Xilinx 13.2, ModelSim10.1, High speed.
Abstract
Energy Aware Ant Colony Optimization based Dynamic Random Routing Strategy for MANET
S. Beski Prabaharan, Dr. R. Ponnusamy
DOI: 10.17148/IJARCCE.2016.5230
Abstract: Incorporating energy awareness in identifying the routes in MANET is one of the mandatory mechanisms to be incorporated in any routing protocol. This helps reduce selfishness in node and hence prolongs the network�s lifetime. This paper presents a metaheuristic based routing scheme for MANET that identifies next hop nodes not only based on their distance, but also on the residue charge left in them. This approach uses a modified Ant Colony Optimization technique with threshold limits for exploration and exploitation levels. These limits are set such that the exploration is given more importance, in-order to maintain the randomness and avoid repetitive usage of the same node. Experiments reveal that this approach exhibits low computational complexity and provides sufficient randomness for the node selection mechanism.
Keywords: MANET; Routing; ACO; CDF; Energy efficiency; Altruism; Selfishness.
Abstract
Raspberry Pi based Interactive Smart Home Automation System through E-mail using Sensors
Shruti G. Suryawanshi, Suresh A. Annadate
DOI: 10.17148/IJARCCE.2016.5231
Abstract: As the technology improves day by day everyone seems to automate most of the possible things to take advantage in providing ease in life, secure and save electricity. The main objective of this paper is to automate all the devices i.e. home appliances through E-mail using Raspberry Pi, as well as we can have the security for the system by using sensors like PIR, LPG, temperature sensors. So by using this system we can avoid the problems coming in day to day life. The algorithm is developed in Python language, which is default programming language of Raspberry Pi. The system sends the E-mail to the newly generated E-mail Id regarding current status of the devices. The output is stored in the E-mail Id. LEDs are used to indicate the switching action of the devices and sensors.
Keywords: Raspberry Pi, E-mail, LAN, Home Automation, Display, Sensors, Relay.
Abstract
HR Application Using IBM’s Bluemix
Akash Narhe, Avinash Dhobale, Shweta Tikhe, Prajakta Suryawanshi, Prof. U.A.Joglekar
DOI: 10.17148/IJARCCE.2016.5232
Abstract: HR always runs multiple activities simultaneously. Sometimes it gets hard to keep track of all the activities and all the reports along with it. Most of the time these activities involve communication. This communication should be sorted and so should be its end results. Hence we are proposing a system to develop a Cloud system for HR which will manage all HR activities such are recruitments, invite user, post ad for Jobs and conduct tests. This will also keep tracks of user (i.e. job seeker) profiles. In this system, All the HR activities will be done with cloud application. That is cloud will be providing platform as service, through IBM blue mix. HR forum will be set for question and answers. Job offers will be posted and people will be invited for it. Their information will be saved in user profiles. Also different tests will be conducted for hiring process.
Keywords: Cloud Computing, Blue mix, PaaS (Platform as a services), Web application.
Abstract
A Study of Analyzing Greedy Approach for Fractional Knapsack Problem
Sri Lakshmi Kanagala
DOI: 10.17148/IJARCCE.2016.5233
Abstract: The Knapsack Problem belongs to a large class of problems known as Combinatorial Optimization Problem. This problem is to maximize the obtained profit without exceeding the knapsack capacity. It is a very special case of the well-known Integer Linear Programming Problem. The purpose of this paper is to analyze several feasible solutions to a Fractional Knapsack Problem using greedy approach. Based on the knapsack algorithm to take different feasible solutions, in this set of feasible solutions, particular solution that satisfies the objective of the function. Such solution is called optimum solution. The optimum selection is without revising previously generated solutions. The greedy choices are made one after the other, reducing each given problem instance to smaller one. The greedy choices bring efficiency in solving the problem with the help of sub problems.
Keywords: Knapsack, Greedy Programming, Feasible Solutions.
Abstract
A Review-Recognition of License Number Plate using Character Segmentation and OCR with Template Matching
Mr A. N. Shah, Ms A. S. Gaikwad
DOI: 10.17148/IJARCCE.2016.5234
Abstract: License number plate recognition is the most interesting and challenging research topic from past few years. Number plate recognition system (NPRS) is applicable to wide range of uses such as Border crossing vehicle, Highway toll-collection, traffic management, parking management at various locations and many more. In this paper we have developed a system to detect number plate of various fonts especially in INDIA. The detection process is divided into three steps viz. Character segmentation, optical character recognition (OCR) & template matching using MATLAB. By using this we can detect number plates correctly with minimum time duration and approximation.
Keywords: Number plates, Character segmentation, OCR using Templates matching.
Abstract
A Review On: Protocols and Standards in Different Application Areas of IOT
Chetal. S. Patil, Kanaksing. N. Pawar
DOI: 10.17148/IJARCCE.2016.5235
Abstract: Emerging Smart phones and smart systems are to give a whole new dimension to the way we shop, bank, and go about many of our everyday activities. The Internet of Things (IoT) shall be able to incorporate transparently and seamlessly a large number of different and heterogeneous end systems, while providing open access to selected subsets of data for the development of digital services. Building a general architecture for the IoT is hence a very complex task, mainly because of the extremely large variety of devices, link layer technologies, and services that may be involved in such a system. Today, application architects need to use a messaging broker to speed and scale their applications, in the particular cloud. Once we select our messaging middleware application, then application developers need to select the protocol. Finally, we provide our conclusions for the IoT communications based protocols and we have conducted their study in different application area.
Keywords: open access, link layer technologies, and heterogeneous end systems.
Abstract
Graphical Password based Authentication System
Anitha H.B, Adithi Reddy, Irudaya Mary S, Vidya V
DOI: 10.17148/IJARCCE.2016.5236
Abstract: Most of the existing authentication system has certain drawbacks for that reason graphical passwords are most preferable authentication system where users click on images to authenticate themselves. Access to computer systems is most often based on the use of alphanumeric passwords. However, users have difficulty remembering a password that is long and random-appearing. Instead, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and, therefore, more secure. Using a graphical password, users click on images rather than type alphanumeric characters. We have designed a new and more secure graphical password system, called gSign. An important usability goal of an authentication system is to support users for selecting the better password. User creates memorable password which is easy to guess by an attacker and strong system assigned passwords are difficult to memorize. So researchers of modern days have gone through different alternative methods and concluded that graphical passwords are most preferable authentication system. The proposed system combines the existing cued click point technique with the persuasive feature to influence user choice along with image steganography techniques, encouraging user to select more random click point which is difficult to guess. Image steganography, the art of hiding data within an image is used to improve the security of the authentication system. Textual passwords are stored within the images using the steganography techniques.
Keywords: Graphical password, Steganography, Image steganography.
Abstract
A Defended and Adequate Mutual Verification with Key Concession Architecture in Wireless Network
N. Praveen Kumar
DOI: 10.17148/IJARCCE.2016.5237
Abstract: Now a day�s mobile networks are rapid development by performing the e-commerce transaction such as online shopping, internet banking and e- payment. So that to provide secure communication, authentication and key agreement is important issue in the mobile networks. Hence, schemes for authentication and key agreement have been studied widely. So that to provide efficient and more secure techniques is necessary. In this paper we are proposed random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using key x or data transpose technique. By using this technique we provide more security and more efficiency for transferring data.
Keywords: Mutual Authentication Security cryptography Key Aggrement.
Abstract
A Novel Creative Photo grid Android mobile Application for Photo Editing
Prof. Keerthan Kumar T G, Harika E, N Vani, Aishwarya Patted
DOI: 10.17148/IJARCCE.2016.5238
Abstract: This paper presents the Android mobile phone application developed in order to extended available photo grid application and we are more concerned about the advancements made in technology. Once such important advancement in Android mobile phone application is Creative Photo grid. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along with a virtual keyboard for text input. The issue that we address is that quick response policies to prevent waiting time and mean while aim to provide improved layout performance. In proposed Creative photo grid application we are providing both static and dynamic photo frame option which implemented using object oriented concept. By using static photo frame, the user is able to select the frames provided, which gives an idea about how to create dynamic frames. In dynamic photo frame option user is free to customize photo for required format style and also the experimental survey shows that our techniques are very efficient. This creates a new trend in photo editing.
Keywords: Photo grid, Android, mobile, Creative, Editing, PIP (Pic-in-Pic) camera.
Abstract
Enhanced Energy and Secured Using Position Based Routing Protocol Design for Wireless Mesh Networks
Dr. K. Kumaravel, Ms. V. Renugadevi
DOI: 10.17148/IJARCCE.2016.5239
Abstract: The more transmission time and increased failure rate of wireless mesh paths, the issues faced to provide trustworthy message distribution for high secured and power-efficient manner. Past researches without rebroadcast consume lots of energy. In proposed system consist a new multi-path power-control transmission and sleep-wake scheme. It achieving a good balance between overall the energy efficiency and the end-to end packet delay. The proposed system combines power control with multipath routing and packet combining at the destination With carefully designed power control strategies, current research consumes much less energy than the conventional one-path transmission scheme without retransmission. Our results show the proposed protocol is highly energy efficient with low intermediate packet delays, which reduces the power consumed and also focus on disconnected multipath with higher security.
Keywords: Trustworthy Message, Intermediate Nodes, Power Consumed.
Abstract
A Pragmatic Approach to Optimize Energy Efficient Resource Allocation Technique in Cloud Computing Data Center
Neha Pangotra, Meenakshi Sharma
DOI: 10.17148/IJARCCE.2016.5240
Abstract: Rapid growth of the demand for computational power has led to the creation of large-scale cloud computing data centers.The development of computing systems has always been focused on performance improvements driven by the demand of applications from consumer, scientific and business domains, but the ever increasing energy consumption of computing systems has started to limit further performance growth due to overwhelming energy consumption and carbon dioxide footprints. Hence, the goal of the computer system design has been shifted from performance improvements to power and energy efficiency. Data centers consume enormous amounts of electrical power resulting in high operational costs and carbon dioxide emissions. Moreover, modern Cloud computing environments have to provide high Quality of Service (QoS) for their customers resulting in the necessity to deal with power-performance trade-off. Reducing carbon emission by cloud computing data centers has emerged as one the dominant research topics both in industry and academia. The foremost objective of cloud service providers is to have a cost effective and energy efficient solution for allocating virtualized ICT resources to end-users� application while meeting the QoS (Quality of Service) level as per SLA (Service Level Agreement).This paper presents a hybrid energy efficient resource allocation technique which combines predictive with reactive allocation techniques and accomplishes substantial improvements in: (a) meeting SLAs, (b) conserving energy, and (c)meeting static and dynamic resource allocation. In this paper we propose energy-aware allocation heuristics provision data center resources to client applications in a way that utilises the capability of VMs live migration to reallocate resources dynamically and improves energy efficiency of the data center, while delivering the negotiated Quality of Service (QoS). The basic idea is to use a heuristic that is consolidating and rearranging the allocation of resources in an energy efficient manner.
Keywords: Cloud Computing, Energy Efficiency, Resource Allocation, Virtualization, virtual machines, Data Center.
Abstract
A Survey on Genetic Algorithm for Vehicle Routing Problem
Ms. S. Geetha Msc., Mrs. N. Vijayalakshmi MCA., M. Phil.,
DOI: 10.17148/IJARCCE.2016.5241
Abstract: A Vehicle routing problem (VRP) attracts much attention due to the increased interest in various geographical solutions and technologies as well as their usage in logistics and transportation. Many researches on different heuristic approaches can be found for the solution of the vehicle routing problem, where specific situations and constraints are analyzed. The common genetic algorithm approaches involve additional repair and improvement methods that are designed for a specific constraint to keep the generated solutions in the feasible search space. The usage of the repair and improvement methods designed for specific constraints or genetic operators specially designed for a specific problem can produce an inadequate result when they are applied to different problems. In this research we investigate genetic algorithm approaches for solving vehicle routing problem with different constraints. Due to stochastic characteristics, genetic algorithms generate solutions in the whole search space including the infeasible space. We propose a genetic algorithm based on a random insertion heuristics for the vehicle routing problem with constraints. The random insertion heuristic is used to construct initial solutions and to reconstruct the existing ones. The process of random insertion preserves stochastic characteristics of the genetic algorithm and preserves feasibility of generated individuals.
Keywords: Vehicle routing problem (VRP), genetic algorithm, VRPTW, VRPPD, MDVRP.
Abstract
Performance Analysis on Clustering Approaches for Gene Expression Data
D. Asir Antony Gnana Singh, A. Escalin Fernando, E. Jebamalar Leavline
DOI: 10.17148/IJARCCE.2016.5242
Abstract: Clustering is a way of finding the structures from a collection of unlabeled gene expression data. A number of algorithms are developed to tackle the problem of clustering the gene expression data. It is important for solving the problems that originate due to unsupervised learning. This paper presents a performance analysis on various clustering algorithm namely K-means, expectation maximization, and density based clustering in order to identify the best clustering algorithm for microarray data. Sum of squared error, log likelihood measures are used to evaluate the performance of these clustering methods.
Keywords: Clustering analysis on microarray data, comparison of clustering algorithms, clustering analysis on gene expression data, literature review on clustering methods, survey on clustering techniques.
Abstract
Security Vulnerabilities and Solution for Electronic Commerce in Iraq
Huda Hamdan Ali, Hasan Abdulrazzaq Jawad
DOI: 10.17148/IJARCCE.2016.5243
Abstract: Electronic commerce or e-commerce consists of the buying, selling, marketing, and servicing of products or services over computer networks.However, there are many risks and threats that happen in e-commerce. It is veryimportant to improve the security on e- commerce business according to the highdevelopment and need on the internet business. Vulnerabilities in e�commerce in recently are also the main interesting for case study to explain how much e-commerce business security will be.This paper explain anddiscussthe e-commerce problems and suggestion for solution generally, taking e-commerce in Iraq as especial case, because the security for e-commerce is to makecustomers and business partners feel safe and comfortable when performingtransactions. The basic principles is also important to make understanding abouthow security e-commerce.So e-commerce life cycle ,security issues, e-commerce tool ,threats and a set of suggestion for secure online shoppingis discussed in this paper.
Keywords: e-commerce, security, vulnerabilities, e-business, protecting.
Abstract
Comparative Analysis between Iterative Threshold Technique and Otsu’s Method
Chinmoy Kar
DOI: 10.17148/IJARCCE.2016.5244
Abstract: This paper compares and examines the two image segmentation techniques, traditional Otsu method and the iterative Otsu method which includes the new technique called the iterative tri-class threshold technique. The iterative method selects the first threshold value using the Otsu�s threshold and then computes the mean values of the two classes as separated by this threshold. Using this threshold value and the two mean values as calculated, this method separates the image into three classes instead of dividing into two classes as is done in the standard Otsu�s method. The first class is the background and the second class is the foreground. The third class is the region that needs to be processed in the next iteration. This paper focuses on two parts, at first on stopping criteria and number of iteration in iterative method. Second, comparison between these two methods based on results.
Keywords: Otsu�s method [6], segmentation, threshold, tri-class threshold technique [1].
Abstract
Performance Analysis of AODV, AOMDV and ZRP using NS-2: A Survey
K. Gowri Raghavendra Narayan, N.V. Ramana Gupta, Dr. M.V. Rama Krishna
DOI: 10.17148/IJARCCE.2016.5245
Abstract: A MANET or mobile ad-hoc network is a wireless, self-organizing, self-configuring network of mobile nodes or devices that are connected without any specific infrastructure. In order to communicate in a MANET we have Routing Protocols like AODV, AOMDV and ZRP. To verify the effectiveness of these protocols as a survey we have analysed the performance under different radio ranges and we measured the Throughput, Packet delivery Ratio (PDR), Normalized Routing Load (NRL), and End-to-End delay using different traffic methods like FTP, CBR over TCP. We have taken varying no of nodes along with time. The performance analysis was performed using the Network Simulator-2 (NS2) tool.
Keywords: MANET, AODV, AOMDV, ZRP, Throughput, PDR, NRL, End-to-End delay.
Abstract
Software Development Life Cycle Models – A Comparative analysis
Shubham Dwivedi
DOI: 10.17148/IJARCCE.2016.5246
Abstract: Software Development Life Cycle Models are frameworks used to design, develop and test the software. They define a set of guidelines which are to be followed during the development. These models make sure that the software is designed systematically, according to the need of the customer and within the time schedule. Different types of software development life cycle models are waterfall, iterative, V-shaped, prototype and spiral model. Each of these models has its own benefits and drawbacks. The main aim of this research paper is to study different aspects of all these models and compare them so as to help the developers to choose the most suitable method according to the situation.
Keywords: SDLC, waterfall, iterative, V-shaped, prototype, spiral model.
Abstract
Automated unified system for LPG using Microcontroller and GSM module
B. B. Didpaye, Prof. S. K. Nanda
DOI: 10.17148/IJARCCE.2016.5247
Abstract: A cost-effective, Automated Unified System for Liquefied Petroleum Gas (LPG) booking, leakage detection, Real time gas monitoring system and automatic controlling of LPG regulator is proposed in this paper. The aim of this paper is to monitor for LPG leakage to avoid fire accidents providing house safety feature where security has been an important issue. The system detects the leakage of the LPG using gas sensor MQ6 and alerts the consumer about the gas leakage by sending SMS using GSM module and simultaneously activating the alarm and exhaust fan. The system additionally provides the automatically controlling of LPG regulator using electromechanically operated solenoid valve. To avoid the blast this system will disconnect the main power supply using relay. The additional advantage of the system is that it continuously monitors the level of the LPG present in the cylinder using weight sensor and automatically books the cylinder using a GSM module.
Keywords: LPG, gas cylinder monitoring, gas leakage detection and prevention, GSM, Alarm.
Abstract
Performance Evaluation of Trigger Driven Zero Remnance Proof Based Data handling for Digital Forensic
Pooja Bhavsar, Rakesh kumar Lodhi
DOI: 10.17148/IJARCCE.2016.5248
Abstract: In today�s world web based system security scenario and storage services is getting popularity among individual users and the associations. It involves open medium information exchanges over insecure channels. To present better security against the open vulnerabilities we should be assured about the security offered by those systems. To make the system more secure and strong against the attacks, effective confidentiality and integrity techniques have to be implemented concurrently with designing the new communication system. This work proposed a novel trigger driven zero remnance proof (TD-ZRP) approach for improving the data security. It makes deletion/removal complete following the forensic properties embedded with the data lifecycle events. The approach is using the active object phenomenon which uses attach metadata for activating the events consequently. This paper also presents the result evaluation of proposed approach in comparison with some of the well known existing methods.
Keywords: Information Exchanges, Security, Self Data Removal (SDR), Lifecycle.
Abstract
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Mr. K.S. Saravanan, S. Karthika
DOI: 10.17148/IJARCCE.2016.5249
Abstract: Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TF_IDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a �Greedy Depth-first Search� algorithm to provide efficient multi-keyword ranked search. The secure KNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.
Keywords: secure multi-keyword ranked search.
Abstract
Implementation of Smart Home Control by Using Low Cost Arduino & Android Design
Zaid Abdulzahra Jabbar, R.S. Kawitkar
DOI: 10.17148/IJARCCE.2016.5250
Abstract: This paper provides a low cost-effective and flexible home control and monitoring system with the aid of an integrated micro-web server with IP connectivity for access to and control of equipment and devices remotely using Android-based smartphone app. The proposed system does not require a dedicated server PC with respect to similar systems and offers a new communication protocol for monitoring and controlling the home environment with more than just switching functionality. Smart home interfaces and device definitions to ensure interoperability between ZigBee devices from various manufacturers of electrical equipment, meters and Smart Energy enables products to allow manufactured. We introduced the proposed home energy control systems design intelligent services for users and provides, we show their implementation, with smartphone.
Keywords: ZigBee, Smart Home, Home Automation, Android, Smartphone.
Abstract
Hop-By-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
Mrs. C. Theebendra, S. Prema
DOI: 10.17148/IJARCCE.2016.5251
Abstract: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this project, propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels while providing message source privacy.
Keywords: Hop by Hop authentication, Wireless Sensor Networks.
Abstract
A Review: Handwritten Character Recognition System
Mahesh R. Barkul, S. S. Lokhande
DOI: 10.17148/IJARCCE.2016.5252
Abstract: This method presents an innovative technique to deals with the problem of offline handwritten character recognition of English character. This system is very useful to the people which have a lot of paper work on a daily basis. Handwritten character recognition systems provides the solution for how to convert handwritten words into computer readable format. Image enhancement and noise removal are done at the pre-processing phase. After enhancing the image, segmentation of the character will be done using different methods like Horizontal and Vertical Projection Profile method. Feature extraction will be done by using Scale Invariant Feature Transform (SIFT), chain codes, zoning etc. The Support Vector Machine (SVM), Artificial Neural Network (ANN), Euclidian distance methods will be used to recognize the characters. By following above mentioned processes handwritten article images will be converted into an editable text files.
Keywords: Feature extraction, handwritten character recognition, segmentation, SIFT, Support Vector Machine.
Abstract
A Review: Comparison of Different Algorithms to Improve the Quality of Image
Mayur M. Sonavane, Dr. S. S. Agrawal
DOI: 10.17148/IJARCCE.2016.5253
Abstract: The main aim of Single Image Superresolution (SR) is to build a high resolution image from a sequences of single low resolution (LR) images. The SR is a classic and active image processing problem which aims to generate a high resolution (HR) image from low resolution input image. The SR is challenging because of the missing details in the given LR image. Thus it is very difficult to explore effective prior knowledge for boosting the reconstruction performance. To solve this problem it is necessary to have the prior knowledge of image to make the problem solvable and to improve the quality of generated image. The main goal of SR is to generate the HR image with good visual perception as similar as original image. These algorithms will evaluate the subjective visual effect, objective quality computational time and PSNR, etc. These algorithms will improve quality of image like better visual effect quality, lower reconstruction error and acceptable computation efficiency, etc.
Keywords: Super-resolution (SR), Visual Effect, PSNR, Computational Efficiency.
Abstract
A study of Image classification using BoF model
Charulata Rathi, S.V. Jain
DOI: 10.17148/IJARCCE.2016.5254
Abstract: BOFs model is one of the most prominent, successful and used for the purpose of image classification. In spite of having many advantages such as very less complexity, ability to be scaled and generality, it scum to various drawbacks, which includes local descriptors provided limited semantic descriptors ,vulnerable structures depending upon single visual words and spatial weighting is inefficient. Numerous techniques have been proposed to nullify the effects of the above mentioned disadvantages, such as multiple descriptor extraction, (ROI) detection and spatial context modelling .Although these methods has contributed towards the improvement of BOFs model to little extent but still coherent integration scheme of all the modules is lacking to resolve the above mentioned problems, a unique framework with spatial pooling of various features is proposed in this paper. BOFs model is expanded on three aspects by the proposed model. First, SURF (speed up robust feature) descriptor is used which combines texture and edge based local and global feature together. Next, extraction of spatial context depending upon features required for midlevel image representation is done using geometric visual phrases. Finally, combination of effective and useful spatial weighting technique and smoothed edge map is used to capture the required features of image.
Keywords: Image classification, BoF Model, K-medoid clustering, Image matching, SURF.
Abstract
Survey on Preventing Vampire Attacks in Wireless Sensor Networks
Ms. S. Jayashree, Ms. S. Hebziba Jeba Rani
DOI: 10.17148/IJARCCE.2016.5255
Abstract: In mobile networks the nodes tend to move as they are not stable. Packet transmission in these networks is carried out by hop to hop packet transmission. During transmission of packets in the Wireless Sensor Network, energy of nodes gets reduced as they require certain energy to receive the packets from source and send it to the proper destination. In some cases the nodes energy is highly used up by the packet when a message is transmitted. This indicates that there may be a presence of malicious nodes in the network. These malicious packets which consume more energy than the energy used up by the honest nodes are termed as �Vampire packets�. The presence of these vampires in the network the energy of the nodes get drained gradually which leads to network failure. If these vampire packets can be detected and avoided, the lifetime of the nodes get increased. This paper deals with the types of vampire attacks and the mechanisms that are proposed to detect and control vampire attack.
Keywords: WSN, Vampire Attacks, Mobile Networks, Vampire packets.
Abstract
Meliorated Cooperative Message Authentication Scheme in VANET
Anushree K, Divya K, Pavithra A, Asmitha Shree R
DOI: 10.17148/IJARCCE.2016.5256
Abstract: Most security- and privacy-preserving protocols in vehicular ad hoc networks (VANETs) heavily rely on time-consuming cryptographic operations which produce a huge volume of cryptographic data. These data are usually employed for many kinds of decisions, which poses the challenge of processing the received cryptographic data fast enough to avoid unaffordable delay. Now a day in Vehicular Communication, a Vehicular ad-hoc network (VANET) is facing problem with vehicle anonymity and location privacy while communicating among the vehicle. For security purpose Vehicular Public Key Infrastructure (VPKI) has been used. Security becomes very important for VANET considering the criticality of secured application. By using elliptic curve cryptography PKI algorithm provides trustworthiness of vehicular communications and privacy of vehicles, and enables vehicles to react to vehicular reports containing cryptographic data. New Technique HMAC provides secure and efficient communication in VANET environment. Using malicious Vehicular Analyzer algorithm and Elliptic Curve Cryptography (ECC) malicious messages are identified. It also detects the accident and other problems in the path of the vehicles. Elliptic Curve Cryptography (ECC) algorithm is used for stronger security during communication.
Keywords: Vehicular Ad Hoc Networks (VANETs), Vehicular Public Key Infrastructure (VPKI), PKI algorithm, Elliptic Curve Cryptography (ECC), HMAC, OBU, RSU.
Abstract
Solution for Farmer Consumer Interaction
Mahesh M. Jadhav, Akash V. Ingale, Sandhya N. Hiranwale, Umesh M. Bhavsar
DOI: 10.17148/IJARCCE.2016.5257
Abstract: Owing from the advanced unrest occurring in most people in every viewpoint we do anticipate innovation infringing among farmer client communications as nicely. Our proposed paper goes for giving a system where correspondence among farmer and clients could be held thru android primarily based application. Our target might be collectivizing agriculturist's especially little makers at specific levels over a few states to cultivate innovation infiltration, enhance profitability, and empower improved get admission to to inputs and services and increment agriculturist income. furthermore, giving an effective manner wherein ranchers would have the capability to pick out their horticultural produce costs and especially get joined with cease consumers, therefore destroying a part of pass between with a purpose to empower to decrease edges looked for by move among in this manner buyers can straightforwardly spot requests and look for grains or farming objects from farmers themselves. There will an effective machine given wherein opportune supplement timetable can be produced in view of the agriculturists sowing date. Farmer may be informed approximately the sporting activities he must carry out right from the time on the point whilst seed develops until the day while the harvest is ready to be amassed. Moreover rancher might be helped for his inquiries also as product illnesses thru a picture shifting device accommodated the identical.
Keywords: K-means algorithm, GCM.
Abstract
Review of Bank Locker System Using Embedded System
Abhilasha A Sayar, Dr. Sunil N Pawar
DOI: 10.17148/IJARCCE.2016.5258
Abstract: In this review paper various bank locker security system designs are explained. In today�s high-speed world, security plays significant role. People are now more concern of their belongings like valuable documents, jewelry, and many more material. The safest place to keep all such valuable is bank. With the advancement in technology there are many system designed to keep bank lockers safe.
Keywords: GSM, Fingerprint, motion sensor, electronic nose.
Abstract
A Review: Contrast Enhancement Methods
Namrata Khaparde, Dr. S.S. Agrawal
DOI: 10.17148/IJARCCE.2016.5259
Abstract: Information extracted from the images used in modern image processing application is crucial for processing and for post processing decisions. Hence it is important for the information to be true. Images captured under bad weather conditions tend to lose information regarding the color and contrast. A lot of work has been carried out for clearance of unwanted optical factors from images under adverse weather in terms of its color. This work is aimed at studying the effect of fog on the contrast of the images captured in fog conditions. The aim is to study different methods for the restoration of contrast in images. It gives a better understanding of these methods for appropriate use.
Keywords: Image Processing, Fog, Air light, Contrast Enhancement.
Abstract
A Survey on Identification of Dipoles in Climate Data
Ramireddy Thushara Bharathi, J. Velmurugan, Dr. M. Venkatesan
DOI: 10.17148/IJARCCE.2016.5260
Abstract: In this paper, the concept of climate with regarding to the dipoles formed and its types are illustrated. The concept of using various methodologies such as agglomerative methods in finding the dynamic dipoles and also various algorithms used to find the dynamic dipoles under parameters considered are also illustrated. This mainly involves data regarding the discovery of dipoles in climate data using various data mining techniques.
Keywords: Dipoles, Climate Indices, Agglomerative Method, Clustering Methods.
Abstract
A Survey Paper on Climate Changes Prediction Using Data mining
E. Sreehari, J. Velmurugan, Dr. M. Venkatesan
DOI: 10.17148/IJARCCE.2016.5261
Abstract: The purpose of data mining effort is generally to create a descriptive model or a predictive model. In this paper the concepts of regression was summarized to accomplish the task of prediction and various methodologies of regression and its significance was illustrated. The methodologies include such as multiple regressions, covariance matrix regression method and other methods can be defined here. We provide all the concepts of regression as a framework to achieve prediction in different paths. This paper can also define other best and consistent approaches or methods for prediction in which that can be concluded by other research scholars and scientists.
Keywords: Data Mining, Regression, Prediction, Regression framework, Coefficients.
Abstract
A survey on Weather forecasting by Data Mining
Audireddy Gayathri, M. Revathi, J. Velmurugan
DOI: 10.17148/IJARCCE.2016.5262
Abstract: Weather forecasting is one of the applications of data mining technology to predict the state of atmosphere for a future time and a given location as regards heat, cloudiness, dryness, wind, rain, etc. This paper focuses some of the data mining techniques for prediction of future weather. Classification algorithms such as Decision Tree Induction, Na�ve Bayesian and Back propagation can be used to predict future by applied on the different parameters of weather. Prediction of weather must be accurate and also the weather should be forecasted earlier will be helpful for many applications like agriculture, air traffic, military and so on.
Keywords: Data Mining, Classification, Prediction, Na�ve Bayesian, Back Propagation.
Abstract
Brief Survey of data mining Techniques Applied to applications of Agriculture
Ami Mistry, Vinita Shah
DOI: 10.17148/IJARCCE.2016.5263
Abstract: Survey made on this area reveals the importance of data mining techniques on agriculture. Lots of data mining Techniques have been used in agriculture [2]. We present some of the most used data mining techniques in the field of agriculture [1]. In the near future the penetration of Information Technology and Agriculture results is more interesting area of research. The main aim of the work is to improve and substantiate the validity of yield prediction which is useful for the farmers [6]. Agricultural crop production depends on various factors such as biology, climate, economy and geography. Several factors have different impacts on agriculture, which can be quantified using appropriate statistical methodologies. Agronomic traits such as yield can be affected by a large number of variables. In this survey, we analyzed a DM methods like clustering, classification models to select the most relevant method for the prospect [32].
Keywords: Agriculture, Yield Prediction, agricultural productivity, Classification, Clustering.
Abstract
Verifying Human Identities Using Major and Minor Finger Knuckle Pattern
Shubhada Sonawane, Prof. Ganesh Dhanokar
DOI: 10.17148/IJARCCE.2016.5264
Abstract: This paper investigates a new approach for personal authentication using fingerback surface imaging. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. The finger geometry features can be simultaneously acquired from the same image at the same time and integrated to further improve the user-identification accuracy of such a system. The fingerback surface images from each user are normalized to minimize the scale, translation, and rotational variations in the knuckle images. This paper details the development of such an approach using peg-free imaging. The experimental results from the proposed approach are promising and confirm the usefulness of such an approach for personal authentication.
Keywords: Finger Biometric, Finger Knuckle Methodology, Pattern Recognition, Finger-vein Identification.
Abstract
Lost Update Problem, Pessimistic and Optimistic Concurrency
Ala Yusef
DOI: 10.17148/IJARCCE.2016.5265
Abstract: In this paper, lost update problem occurs when two users read and update the same data in a particular row of the same database at the same time. one of the main problems found in tools that support MDE is the fact that little attention is paid to questions related to the platform features in the software development trajectory. Many machine learning algorithms iteratively transform some global state (e.g., model parameters or variable assignment) giving the illusion of serial dependencies between each operation.
Keywords: Update, Pessimistic, Optimistic, Concurrency, Roles.
Abstract
System for Enhancing Agriculture
Dibin Thomas, Kaiwalya Limaye, Rachana K P
DOI: 10.17148/IJARCCE.2016.5266
Abstract: System for Enhancing Agriculture is a project meant to provide farmers a resourceful methodology to grow crops under optimum conditions which include temperature, soil moisture, humidity, light frequency and automated water supply. These conditions are measured using different components within a single system and stored in a database. The plant is subjected to these optimum conditions and monitored for growth regularly. This will eventually lead to efficient growth of plants.
Keywords: Enhancing Agriculture, Temperature Moderation, Moisture Control, Humidity Control, Enhancing Yield.
Abstract
Night Vision Motion Estimation: A Survey
Patel Ami M., Assi. Prof. Swapna J Jadhav
DOI: 10.17148/IJARCCE.2016.5267
Abstract: Video Surveillance during night is important as far as security is concerned these days. The current technologies require RFIDs which are costly and hence the security domains in all become expensive. This paper describes the use of low cost single board computer Raspberry Pi which follows motion detection algorithm written in python as a default programming environment. It aims to present a review of various block matching algorithms used for night vision motion estimation. Developing a system which captures real time images and transmit it via a 3G Dongle to a Smart phone through e-mail. The algorithm for motion detection is being implemented on raspberry pi which enables live video streaming along with the human detection. The advantages and disadvantages of the algorithms are mentioned in this paper. The major goal of the paper is to provide a comprehensive reference source for the researchers involved in security.
Keywords: Video Surveillance, Raspberry Pi, Image thresholding, Motion detection, Block matching, Motion vector.
Abstract
Security & Concurrency control in Real-Time Database Systems: A Survey
Ebrahim Abduljalil, Dr. S.B. Thorat
DOI: 10.17148/IJARCCE.2016.5268
Abstract: Real-time Database Systems (RTDBS) ought to fulfill timing constraints related to transactions. Usually, a timing constraint is stated as a deadline, which is characterized as a necessity to be utilized by schedulers. Currently, security becomes another significant challenge in several real-time systems. In many systems, sensitive information is expressed by numerous users with various levels of security clearance. More complicated database systems are now being employed in applications that need to support timeliness while coping with sensitive information. Key issues of real-time developers have been addressed in this paper. Furthermore, an extensive survey of real-time systems research has been presented. The survey classification of the proposed mechanisms has been proposed based on the security and concurrency control in RTDBS.
Keywords: Real-Time, security, concurrency control, transaction.
Abstract
An Intelligent Compression: A Reliable Space Optimization in Cloud Storage
Shyma Manzoor, Amrutha Chandran, Raji Jayan, Nayana P, Archana R S, Sowmya K S, Jooby.E
DOI: 10.17148/IJARCCE.2016.5269
Abstract: The deduplication of data is the technique used for avoiding the redundancy of data by placing only one physical copy in the cloud storage. The data uploaded by the users are compared to the history of data in the cloud storage and it is ideal for highly redundant operations like backup which requires repeatedly copying and storing the same data set a number of times for purpose of recovery. To protect the data and to ensure confidentiality while supporting deduplication, convergent encryption technique has been designed to encrypt the data and this encrypted data will be stored in the cloud. The concept of convergent key is used to ensure the confidentiality and authenticity of the secure deduplication system. The concept of master key is used which enables us to protect the convergent key sent by the third party to the users and this ensures the authenticity of the convergent key Dekey is the derived key, which is the second approach, in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across the hash table.
Keywords: Confidentiality, Authenticity, Convergent encryption, Key management, Deduplication.
Abstract
Evaluation of EKF Based Receiver for Bluetooth in Presence of IEEE 802.11 Interference
Mr. Alhaj-Saleh Abdallah, Prof. Mohamed Zohdy
DOI: 10.17148/IJARCCE.2016.5270
Abstract: Evaluation of EKF based receiver has been investigated and analyzed to determine its practicality of robustness as a Bluetooth receiver in the presence of IEEE 802.11b networks. The conducted investigation was performed at the physical and system level layers with the use of MATLAB/Simulink as a programming tool, and bit error rate (BER) and frame error rate (FER) as a mean of measure of the evaluation. The physical layer evaluation considered two scenarios: The first scenario evaluated the receiver when a 50% interference transmission affecting the Bluetooth system, and the second scenario when a 100% interference transmission is in effect. The evaluation of the receiver at the system level layer was conducted to determine the packet loss due to the IEEE 802.11b interference. The results showed that the EKF based receiver has a significant performance improvement in compare to the LDI and Viterbi receivers.
Keywords: IEEE802.11b Interference, AWGN, Bluetooth, Extended Kalman Filter, Gaussian Frequency Shift Keying, Continues Phase Modulation.
Abstract
Review on: Hand Gesture Based Interactive Photo Slider
Sampada Muley, Prof .A. M. Rawate
DOI: 10.17148/IJARCCE.2016.5271
Abstract: In this paper, project presentation or even in class rooms can be effective whenslideshow presentation is used. There are various means to control slides which require devices like mouse, keyboard, or laser pointer etc. The disadvantage is one must have prior knowledge about the devices in order to operate them. This paper proposes the methods to control the slides during a presentation using bare hands and compares their efficiencies. The proposed methods employ hand gestures given by the user as input. The gestures are identified by counting the number of active fingers and then slides are controlled.
Keywords: hand gestures, skin segmentation, active fingers, finger count.
Abstract
Conservation of Power Quality in Micro Grid Using Photovoltaic Interfaced Shunt Active Power Filter
Aruna.V, Jagan.R, Selva Kumar.S
DOI: 10.17148/IJARCCE.2016.5272
Abstract: This paper leads a way to mitigate the harmonic distortion in micro grid system. In conventional system capacitors and voltage source inverter (VSI) are used to generate reactive power and to inject the compensation current into the grid [2],[3],[4]. The performance of SAPF is mainly depends on controllability of DC link voltage [6]. The main objective of this paper is to improve the exploit of the Shunt Active Power Filters (SAPF) by adding RE source in the DC link side. In proposed technique the capacitor banks are replaced by clean renewable energy donors from fuel cell, solar power, bio gas and wind mill generator etc. Among this we prefer PV panels for effective compensation due to its current controllability and the preferable output characteristics. Due to the addition of this Shunt Active Power Filters (SAPF) the power carrying capability of the grid lines must be improved and the efficiency of transmission can be extended. The additional real power demand in the micro grid has been meeting out with the help of this new topology. The output results are observed from MATLAB/Simulink environment.
Keywords: Photovoltaic (PV), Shunt Active Power Filter (SAPF), Maximum Power Point Tracking (MPPT), Total Harmonic Distortion (THD).
Abstract
Importance of TPA and Homomorphic Token for Data Storage Security in Cloud
Sneha S. Bhandarkar, Buri Chanukya, Sandhya Rani, Y. V. N. Phani Kishore
DOI: 10.17148/IJARCCE.2016.5273
Abstract: Cloud computing has been envisaged as the future architecture of IT industry. It has many benefits such as flexibility, scalability. However, it poses many new security challenges such as data integrity and confidentiality. In this paper, we mainly focus on cloud data storage security, which has always been an important feature to assure the quality of service. To be certain of the accuracy of users� data in the cloud, we have put together the studies based on the effective and flexible mechanism of utilizing the homomorphic token combined with the distributed verification of erasure-coded data which helps achieve the integration of storage correctness insurance and data error localization. In addition to the above, the mechanism also supports secure and efficient dynamic operations. Substantial security and execution analysis shows that the proposed mechanism is highly successful and resistant against Byzantine failure, server colluding attacks and unauthorized data modification attack.
Keywords: Cloud; Cloud Computing; Data Integrity; Confidentiality; Homomorphic token; Data Error Localization; Byzantine failure.
Abstract
An Analytical Approach to Wireless Communication using Vodka Vapours
Rohit Kashyap, Shivam Thabe, Sahil Sawant, Rahul Kashyap
DOI: 10.17148/IJARCCE.2016.5274
Abstract: The aim of this article is to throw light on various emerging trends in wireless communication. This article focuses on molecular communication. The vision is to propose a system which can be utilised where and when conventional wireless technology is not appropriate, such as in a network of tunnels, pipelines, etc. with a recent research held in York University, headed by Prof. Andrew Eckford. They experimented and devised a network where messages could be transmitted using evaporated vodka. In this article, their work has been elaborated, analysed and a way on how this system can be implemented in day-to-day life has been discussed.
Keywords: Molecular communication, ITA2 standard, Channel propagation scheme, modulation and demodulation scheme, transmission rate.
Abstract
A Survey Paper on Personalized Web Search
Durgesh Sawkhedkar, Sonal Patil
DOI: 10.17148/IJARCCE.2016.5275
Abstract: Personalised net search has incontestable its effectiveness in up the quality of varied search services on cyber web. However, evidences show that user�s reluctance to disclose their personal knowledge throughout search has become a major barrier for the wide proliferation of PWS. We have an inclination to review privacy protection in PWS applications that model user preferences as class-conscious user profiles. We have an inclination to propose a PWS framework called UPS that will adaptively generalize profiles by queries whereas respecting user such that privacy requirements. Our runtime generalization aims at hanging a balance between two predictive metrics that choose the utility of personalization and thus the privacy risk of exposing the generalized profile. We have an inclination to gift two greedy algorithms, significantly GreedyDP and GreedyIL, for runtime generalization. We have an inclination to put together provide a web prediction mechanism for deciding whether or not or not personalizing a matter is helpful. comprehensive experiments demonstrate the effectiveness of our framework. The experimental results put together reveal that GreedyIL significantly outperforms GreedyDP in terms of efficiency.
Keywords: Privacy protection, customized internet search, utility, risk, profile.
Abstract
A Novel Scheme for Congestion Control in Mobile Ad Hoc Networks
S.TamilSelvi, O.P.UmaMaheshwari
DOI: 10.17148/IJARCCE.2016.5276
Abstract: MANET is one of the important and improving networks in many applications. In MANET, the nodes in the network are self-configuring, without any access points. So, Congestion is considered as important factor which deteriorate the performance of entire network. Due to self-configuring nodes, consumption of energy is high. To avoid this, energy efficiency is needed. In this paper, we developed Energy Efficient Scheme for Congestion Control (EESCC), to improve the energy efficiency of the nodes. Multipath routing is needed to control congestion. Retransmission of packets is minimized by calculating the data energy level and acknowledgement packets. With the help of extensive simulation, this scheme provides minimum consumption of energy and high packet delivery ratio and low delay.
Keywords: MANET, Packet loss, Congestion control, Routing, Energy consumption model.
Abstract
An Overview of Various Improvements of DBSCAN Algorithm in Clustering Spatial Databases
K. Nafees Ahmed, T. Abdul Razak
DOI: 10.17148/IJARCCE.2016.5277
Abstract: Clustering is an important data mining method for knowledge discovery in large databases. It is an exploratory data analysis tool which aims at categorizing different objects into groups (clusters) in such a way that the degree of association between two objects is high if they belong to the same group and low otherwise. Discovering clusters in spatial data is a challenging one because of its complexity nature. The clusters in spatial data are of different sizes, shapes and densities, and also contain noise and outliers. Different clustering techniques have been proposed for knowledge discovery from spatial databases. DBSCAN (Density Based Spatial Clustering of Applications with Noise) algorithm is a traditional and well known density-based clustering method. It defines a cluster as a maximal set of density-connected points. It can detect clusters of arbitrary shapes and filter out noise effectively. The clusters which are formed based on density are easy understandable and it does not limit the shapes. Besides its popularity, DBSCAN needs some improvements for better results. In this paper, we have analyzed and presented various significant enhancements of DBSCAN algorithm for our evaluation.
Keywords: Clustering, Cluster Analysis, Density based Clustering, DBSCAN, Spatial Clustering, Spatial Data.
Abstract
Detection and Prevention of Black Hole Attacks in Manets Using NTP Method
Arshdeep Singh, Er. Harshdeep Trehan, Er. Varinderjit kaur, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2016.5278
Abstract: A mobile ad hoc network (MANET) is an accumulation of wireless mobile nodes which are having the capability for communicating with one another with having no central base station and network infrastructure. Whenever the source node sends the messages of route request in the network the node which is malicious after getting the request of message creates a route reply to the source. In this novel approach is presented in which black hole attack is prevented by using NTP method. Firstly nodes are deployed in the network and the source node sends route request to the destination node and after those first two replies are selected by source and compares them and if sequence number is very high, the node will be considered as malicious node. In this research work, fact considered is that the black hole never sends the message of route request in the network. The number of request packets that are forwarded will be zero. As source node gets many replies from the nodes and it will compare the time. As the time of black hole is less than all other nodes and number of forwarded request packets is zero also, so that malicious path will not be chosen by source node.
Keywords: MANETs, RREP, RREQ, black hole, AODV, NTP.
Abstract
ATM Security Using Virtual Password
Renjith R, Arya S, Jasmine Yesudasan, Keerthy S Kumar, Krishnaveni S, Ajeesh S, Jooby E
DOI: 10.17148/IJARCCE.2016.5279
Abstract: In this project, we implement a system for protecting user passwords from being stolen by adversaries in Automated Teller Machines (ATM).We use VIRTUAL PASSWORD MECHANISM in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security and also BIOMETRICS. ATM allows the account holder to have transactions with their own accounts without allowing them to access the entire bank�s database. Traditional ATM transaction method is replaced with virtual password generation and fingerprint technology. With the use of these technologies a genuine user can be identified. The user�s details such as fingerprint, 4 digit account number, phone number etc are stored in system database during registration. After identifying the user using its ID, the server generates virtual password and sends it to the user�s mobile phone. The user then inputs this virtual password. If it is correct his/her fingerprint is verified and allowed to make transactions.
Keywords: Phishing, Codebooks, differentiated virtual passwords, secret little functions, shoulder-surfing.
Abstract
Monitoring and Controlling of Environmental Parameters Using Embedded Web Server
Ashwini .S. Malewar, Prof. Shaila Kharde, Prof. Sonali Chincholikar
DOI: 10.17148/IJARCCE.2016.5280
Abstract: The paper presents the design of embedded web server based on ARM7 processor and Ethernet controller IC ENC28J60. Embedded web server acts as data acquisition system which stores the data from various sensors like temperature, moisture and humidity which are connected to the processor. This data can be remotely accessed by the client through Ethernet. Depending on different values of sensor data the parameters like temperature, moisture and humidity can be controlled through end devices connected to the processor via relays.
Keywords: Embedded web server, ARM 7 processor, Ethernet controller IC ENC28J60, TCP/IP protocol, HTTP protocol.
Abstract
Gesture Recognition System for Indian Sign Language on Smart Phone
Ankit P. Parmar, Dr. Nehal G. Chitaliya
DOI: 10.17148/IJARCCE.2016.5281
Abstract: One of the most import things that humans have developed through evolution is the ability to communicate through each other by means of language. This is essential for exchanging ideas and expressions. Hearing impaired people uses signs to communicate with others. There is no universal language as every country has its own spoken language so every country has their own dialect of sign language and in India they use Indian Sign Language (ISL).This application will help the person with and without the imparities to communicate with each other. The system consists of two stages. First stage is to capture gestures from real time video. Second stage is to map these gestures into equivalent Indian sign language text output.
Keywords: Gesture Recognition System, Indian Sign Language (ISL), Smart Phone.
Abstract
Security Analysis of Handover Key Management in 4G LTE/SAE Networks
Dr.P.Sumitra, P.Ponkavitha
DOI: 10.17148/IJARCCE.2016.5282
Abstract: The goal of 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) is to move mobile cellular wireless technology into its fourth generation. One of the unique challenges of fourth-generation technology is how to close a security gap through which a single compromised or malicious device can jeopardize an entire mobile network because of the open nature of these networks. Handover key management in the 3GPP LTE/SAE has been designed to revoke any compromised key(s) and as a consequence isolate corrupted network devices. This paper, however, identifies and details the vulnerability of this handover key management to what are called desynchronization attacks; such attacks jeopardize secure communication between users and mobile networks. Although periodic updates of the root key are an integral part of handover key management, our work here emphasizes how essential these updates are to minimizing the effect of desynchronization attacksthat, as of now, cannot be effectively prevented. Our main contribution, however, is to explore how network operators can determine for themselves an optimal interval for updates that minimizes the signaling load they impose while protecting the security of user traffic. Our analytical and simulation studies demonstrate the impact of the key update interval on such performance criteria as network topology and user mobility.
Keywords: Authentication and key agreement, evolved packet system, handover key management, long-term evolution security.
Abstract
An Optimized Parallel Computation of Advanced Encryption Algorithm using Open MP -A Review
Vishal Sathawane, Tausif Diwan
DOI: 10.17148/IJARCCE.2016.5283
Abstract: To protect electronic data, an approved cryptographic algorithm AES (Advanced Encryption Standard) is used. AES is a block oriented complex algorithm which have large amount of mathematical computations. For the large real time data requires a considerable amount of execution time for encryption and decryption, which may or may not be feasible for real time applications. This paper presents optimized AES algorithm in parallel fashion using OpenMP. Real time application requires faster encryption and decryption of data flows. Our approach used optimized strategy to process input data and gives faster results. Parallel computation gives better result if input data is large because parallel programming directive overhead is negligible in that case but it affects when data size is small. Our proposed system switches algorithm as per input data size for improved performance. Proposed optimized AES algorithm is suitable to be implemented in a mulit-core environment. The proposed design exhibits improved performance over present different approaches.
Keywords: AES, OpenMP, Encryption, Decryption, Parallel programming.
Abstract
A Study on Gender Prediction using Online Social Images
Minal Gadiya, S. V. Jain
DOI: 10.17148/IJARCCE.2016.5284
Abstract: Nowadays identifying user attributes from their social network activities has been a common research topic. Age, gender and interest can be common user attributes which can be predicted and are essential for personalization and recommender systems. Most of the researches are based on the textual content created by user, whereas recently multimedia has gained popularity in social networks. In this paper we propose an algorithm that predicts the user gender on different networking sites.
Keywords: Social Network, Social Images, Gender Prediction, Demographics.
Abstract
Forestalling the Risk of Cognitive Distraction Accidents by using Cellular System
M. Vignesh, S.R. Sannasi Chakravarthy
DOI: 10.17148/IJARCCE.2016.5285
Abstract: Conversing on cell phones while driving is as calamitous as driving our car after drinking which can lead to various disastrous major miss incidents. Do you know that using a mobile phone while driving can affect the cognitive functions of persons, amuse his or her visual concentration and also the speed of processing information. It has been also proved that use of cell phones while driving puts a driver at an extremely higher risk of collision by distracting their mind. It matters even if the person makes use of hands free or hand-held phones, which has no escape to it. This deadly combo has crunch increased the risk of accidents in range numbers. The theme of this project is to make the driver to attend only the emergency calls. Initially driver should enable call forward to system number. When a call is made to driver, the caller will receive a message intimating that he is in driving. If once again he calls the driver then it is understood that it is crunch. So the driver will get an intimation regarding the emergency call through LCD display. If he wants to make a call, he must stop the car. Unless the system will recognize in such a way that the driver is speaking in mobile phone while driving. It automatically reduces the car fuel supply by variable Solenoid so that the driver will have time to park the car. Thus the system prevents accidents due to phone calls.
Keywords: GSM Module, Mobile Phone Sniffer ,DC Motor, Solenoid valve, Flow sensor, RPM Sensor.
Abstract
A Survey: Text Extraction from Images and Video
Vivek Dhanapal Sapate
DOI: 10.17148/IJARCCE.2016.5286
Abstract: Text information present in pictures and video contain valuable info. Text extraction from image has stages of detection the text from given image, finding the text location, extraction, improvement and recognition of text from the given image. But variations of text just like the variations in orientation, size, style, alignment; low size image distinction and a lot of difficult background create the matter of automatic text extraction extraordinarily troublesome. The number of techniques and Methodology are planned to this downside, and thus the aim of this paper is to review the paper, discuss datasets and performance analysis, and to point the long run analysis.
Keywords: Text extraction, image, video, compression, text location, extraction, size, style, alignment.
Abstract
Intercell Interference and Cross Tier Interference Mitigation in LTE based Femtocell Network using ‘CASFR’ Scheme
Prof. Dimple Chaudhari, Reshma Khandare
DOI: 10.17148/IJARCCE.2016.5287
Abstract: One of the effective techniques of improving the coverage and enhancing the capacity and data rate in cellular wireless networks is to reduce the cell size and transmission distances. Long Term Evolution (LTE) has developed small cellular base stations called femtocells that can dramatically improve voice and data coverage for the indoor subscribers. Therefore, the concept of deploying femtocells over macrocell has recently attracted growing interests in academia, industry, and standardization forums. Various technical challenges towards mass deployment of femtocells have been addressed in recent literature. However, the inter- and intra tier interferences in such systems can significantly reduce the capacity and cause an unacceptably high level of outage. In this paper we propose a scheme which mitigates co-tier as well as cross tier interference using cluster aware soft frequency reuse scheme. That assigns distinct set of Physical Resource Blocks (PRB)s to each interfering femtocells. The scheme first uses periodic messages from the femto-user (FUE) to identify the interfering femtocells. It then divides each femtocell area into cell-center and cell-edge. Finally, it uses the CASFR algorithm to assign un interfering sets of PRBs to the cell-center and cell-edge users of all the interfering femtocells Same process is followed by macrocells. The proposed interference mitigation scheme for femtocell networks offers significant performance improvement over the existing methods by substantially reducing the co-tier and cross-tier inferences in the system.
Keywords: Physical Resource Blocks (PRB), Femto-user (FUE), Inter-cell interference (ICI), PRB Swapping and Exchange (PSE).
Abstract
Study of Various Security Attacks in Network Layer and the Mitigation Techniques for MANET
R. Divya Paramesvaran, Dr. D. Maheswari
DOI: 10.17148/IJARCCE.2016.5288
Abstract: Security is one of the major concerns for protected communication between mobile nodes in a hostile environment. In hostile environments attackers can crew active and passive attacks against intercept able routing in embed in routing message and data packets. In this research, we focus on crucial security attacks in Mobile adhoc networks. MANET has no clear line of deterrence, so, it is accessible to both reasonable network users and malicious attackers. In the existence of malicious nodes, one of the main objections in MANET is to design the robust security solution that can protect MANET from various routing attacks. Yet, these solutions are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they recommend heavy traffic load to exchange and verifying keys. This paper is a study on various security attacks, various mitigation techniques proposed by various Network layers for secure routing and the research on current trends. In particular, we examine routing attacks, as well as remedy against such attacks in existing MANET protocols.
Keywords: Attacks, DSR protocol, MANET, Rushing Attack, Self organization, Router.
Abstract
Survey on Dynamic Query Forms for Database Queries
Subhash Pingale, Swapnaja A. Ubale, Anandrao G. Deshmukh
DOI: 10.17148/IJARCCE.2016.5289
Abstract: Query form is most widely used user interfaces for querying databases. Traditional query forms are designed and pre-defined by developers or DBA in various information management systems. With the rapid development of web information and scientific databases, modern databases become very large and complex. Therefore, it is difficult to design a set of static query forms to satisfy various ad-hoc database queries on those complex databases. In this Paper, the system proposes a Dynamic Query Form system: DQF, a query interface which is capable of dynamically generating query forms for users. The essence of DQF is to captures users preference and ranks the query components, assisting him/her to make decision. The generation of query forms is an iterative process and is guided by the user. At each iteration the system automatically generates ranking list of components and the user adds desired form component�s into the query form. The ranking of forms components is based on the capture user preference. A user can fill the query form and submit queries to view the query result at each iteration. In this way a query form could be dynamically refined till the user satisfies with query views . A probabilistic model is developed for estimating the goodness of query form in DQF.
Keywords: Query Form, User Interaction, Query Form Generation.
Abstract
CyanogenMod as an Aftermarket Firmware Replacement for Android
Ashok Patel
DOI: 10.17148/IJARCCE.2016.5290
Abstract: Android has grown tremendously as an open source operating system for mobile handsets (smartphones) and continues to expand covering various other aspects of our digital lives such as Television, cars, wrist watches, and oth-er smart home devices. CyanogenMod is an aftermarket firmware developed using the Android Open Source Project sources and distributed officially as well as unofficially to numerous smartphones worldwide. Its impact as an alterna-tive to Google�s stock Android user experience and intervention into the realm of already overcrowded industry, with an aim of �taking Android away from Google� is worth studying.
Keywords: CyanogenMod, Cyanogen, Android, Open Source Operating System, ROM.
Abstract
Preserving Text search privacy through blind storage towards secure Storage and retrieval of data
D.Kavitha, S.Hemavathy
DOI: 10.17148/IJARCCE.2016.5291
Abstract: The blind storage is to preserve the outsourced data in cloud through gateway encryption and to implement multi-keyword ranked search over the encrypted data in a secure way by NLP process without downloading and decrypting the entire group member file contents. The access rights of the user are specified by the data owner in order to keep track of the files which are uploaded. The blind storage helps the data owner to save the data securely and it is not known to the server or user until they get the index file. Ranked search over the files help the server to retrieve what the file needed by the search user.
Keywords: Cloud Computing, Multi-keyword search, Blind Storage, Access Control.
Abstract
A Comparative Study on Prediction of Heart Disease using Cluster and Rank based Approach
K. Aravinthan, Dr. M. Vanitha
DOI: 10.17148/IJARCCE.2016.5292
Abstract: Data mining have great potential for healthcare industry to enable health systems to systematically use data and identify the efficiency and improve care with reduce cost. Due to complexity of healthcare and slower improvement of technology adoption needs to implement effective data mining. In data mining there are variety of techniques and methods to suggest or decision making knowledge in database and extracting or support prediction of data. With growing research on heart disease prediction system, this research work has developed a Heart disease prediction with comparative study of several data mining algorithms. Many data mining prediction tools are there in worldwide to make prediction for medical data. In this study it is observed that compare several algorithms to analysis the performance, accuracy of the heart disease prediction system. The commonly used techniques of heart disease prediction and their analytics, summaries are summarized in this research work.
Keywords: Data mining, Heart disease, J48, Na�ve Bayes, Neural Network, Prediction.
Abstract
A Novel Approach for Transaction Management in Heterogeneous Distributed Database Systems
Mr. Dheeraj Bhimrao Lokhande, Prof. Jyoti I. Nandalwar, Prof. Dr. R.C. Thool
DOI: 10.17148/IJARCCE.2016.5293
No abstract available.
Abstract
Confidentiality Technique for Enhancing Data Security using Encryption and Obfuscation in Public Cloud Storage
S. Arul Oli, Dr. L. Arockiam
DOI: 10.17148/IJARCCE.2016.5294
Abstract: Cloud computing with new techniques has become a rapid development in modern technologies. As the importance and usage of cloud demand more access, the problems of cloud security face lot more threats. The problems have caused great influences on the development and popularization of cloud computing. The data storage has become an indispensable part in cloud computing. The data could be either numeric or non-numeric. The data to be stored need to be protected with confidentiality measures. The data must be encrypted before deposited into cloud database. The cryptographic techniques play a vital role in enhancing the security. This paper proposes a technique to store the data of numeric and non-numeric type by obfuscation and encryption methods. This paper also proposes the technique to enhance security level. The paper produces minimum time data size and service while uploading into the cloud storage.
Keywords: Cloud Storage, Obfuscation, Encryption, Cryptography, Confidentiality.
Abstract
Data Fusion Using Conflict Identification Methods for Knowledge Mining Based Repository Creation
I. Carol, Dr. S. Britto Ramesh Kumar
DOI: 10.17148/IJARCCE.2016.5295
Abstract: Accessing heterogeneous metadata can provide deep and meaningful insights. However integrating such data poses a serious problem in terms of duplicates and conflicts. Eliminating those inconsistencies will lead to effective data integration and hence better mining. This paper presents a knowledge repository based data fusion technique that not only eliminated duplicates and conflicts, but also identifies the user�s requirements to provide effective and faster results. The knowledge repository is built based on the user�s feedback and consequent retrievals are made from both the repository and the web in-order to effectively increase the hit ratio. As the repository becomes more mature, retrievals are confined to the repository alone. Experiments conducted depict better accuracies and faster retrieval rates, hence providing an overall high quality of experience for the user.
Keywords: Conflict Identification; Conflict Resolution; Duplicate Identification; Knowledge Repository; Reinforcement Learning.
Abstract
A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model
P. Anitha, Dr.G.Satyavathy
DOI: 10.17148/IJARCCE.2016.5296
Abstract: Mobile ad-hoc networks (MANETs) assume that mobile nodes volunteer collaborates in order to work appropriately. This Cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to selfish node behaviour. Thus, the complete network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to poor performance when detecting selfish nodes, in term of precision and speed. This is especially important on networks with sporadic contacts, such as Delay Tolerant Networks (DTNs), where sometimes watchdog�s lack of enough time or information to detect the selfish nodes. Thus, Collaborative Contact-based Watchdog (CoCoWa) is proposed as a collaborative approach based on the diffusion of local selfish nodes awareness when a contact occurs, so that information about selfish nodes is quickly propagated. As shown in the paper, this collaborative approach will make the selfish node as trusted node by using AODV protocol and provide better security.
Keywords: CoCoWa Architecture, Watchdog, Delay Tolerant Networks, Trust model, Security, Routing Protocol, and AODV.
Abstract
Amigos.com: An Attitude based Friend Recommendation System on Social Network
Alsaliha S, Anjali Unnikrishnan, Kripa Mariam John, Pavithra P, Vineetha B T, Ms. Deepa K Daniel, Ms. Jooby E
DOI: 10.17148/IJARCCE.2016.5297
Abstract: Developing a recommendation system for social network which is to discover life styles of users, measures the similarity of life styles between users. If their life styles have high similarity it recommends friends to users. User�s daily life is modelled as life documents, from which users life styles are extracted. A linear feedback mechanism is integrated that exploits the user�s feedback to improve recommendation accuracy and also providing a web search facility.
Keywords: Social network, Daily Activity, Lifestyles, Friends recommendation.
Abstract
A Novel Method of Digital Image Watermarking in Spatial Domain Based on Interpolation
Kullayamma and Sathyanarayana
DOI: 10.17148/IJARCCE.2016.5298
Abstract: Digital images are very easy to alter, store, publish and this manipulation will lead to serious problems in some applications such as military, medical. The digital documents are easily modifiable, tampered, this property makes it vulnerable to forgery. So the requirement is to produce digital images or documents that are highly unaffected to forgery and easily recoverable. Digital Image Watermarking is a method in which the embedded information cannot easily be recovered. Watermarking methods are classified into two main classes: spatial and frequency based approaches. In spatial domain techniques the watermark is embedded directly into the pixel data. In frequency domain techniques the image data is first converted to frequency domain using transforms such as DWT, DCT, or DFT. The watermark is embedded into the frequency domain coefficients and then the inverse transform is performed to restore the watermark image. This paper presents a new digital watermarking method in spatial domain based on interpolation and compare the result with frequency domain . The results presented in this paper shows that the watermark can be successfully embedded and extracted from an image, without degrading or distorting the original image.
Keywords: DCT, Digital watermarking, DWT, Interpolation, Transform domain, spatial domain.
Abstract
Enhanced Security Framework for Cloud Storage Using Decentralized, Dynamic and Policy-Based Security
Khushbu Malviya, Priya Saxena
DOI: 10.17148/IJARCCE.2016.5299
Abstract: How should the organization can be done to decide what security measures one should have to apply to protect its data and computations, which have different security requirements from a Cloud Service Provider (CSP) with an unspecified or undetermined level of corruption? The answer to this question can be found on the organization�s perception about the CSP�s reliability and the trustworthiness and the security requirements of its data of an organization. This paper proposes a decentralized, dynamic and evolving policy-based security framework that helps any of an organization to derive such perceptions to provide the proper authority from knowledgeable and trusted employee responsibilities and their functionality are based on that, the choice of the most relevant security policy postulating the confidential measures is very much necessary for outsourcing data and computations to the cloud.
Keywords: Cloud computing, cloud storage, cloud services, Cloud security policy.
Abstract
Google Analytics Tracking for Flex
Ms. Shradha Dhakate, Ms. Rutumbhara Kolhe, Prof. Swati Ramteke
DOI: 10.17148/IJARCCE.2016.52100
Abstract: Modern hand held devices such as smart phones and PDA's have become powerful increasingly powerful in recent years. Dramatic breakthroughs in processing power along with the number of extra features included in these devices have opened the doors to a wide range of commercial possibilities. In particular most cell phones particularly include cameras, processors compatible to PC's from only a few years ago, and internet access. However even with all these abilities there are few applications that allow much passing of environmental information and location based events. As mobile devices had become more like PC's they will come to replace objects we tend to carry around such as check books, cameras, credit cards, planners, mp3 players, etc. In short, we will be using them to accomplish our daily tasks. One application that falls into this category is Google Analytics Tracking for Flex for the android phones. The prime objective of �Google Analytics Tracking for Flex� is to create a fully fledged android application which could locate a list of events holding nearby based on locations. The user not only finds all the events in the city but also he can make a choice of best events. This paper presents solution to track the locations and communicate with the members using Google MAPs API, Android Operating System.
Keywords: Mobile Application, Social Networks, Event Guide, Context-Awareness.
Abstract
Advancement in Antivirus
Priya Upadhyay, Ayushi Saxena, Ankuj Singh, Pradeep Sharma
DOI: 10.17148/IJARCCE.2016.52101
Abstract: Antivirus is a program that identified and removed a particular type of malware that is known as VIRUSES. But in day today life, the working area has increased and now antivirus programs are useful for preventing infections caused by many types of malware, including worms, Trojan horses, root kits, spyware, key loggers, ransom ware and adware. As all antiviruses available in market works on same technology, therefore it seems like even the most up-to-date malware package isn�t always enough. The major problems associated with today�s antivirus technology are, �That your antivirus software has not yet been updated to know how to detect it� and �your system application software has not been yet patched to fix whatever vulnerability the virus exploits� .The most popular antivirus applications on the market are rendered useless by around 80percent of new malware, according to AusCERT. Most important function of any antivirus is virus scan engine. It scans the information and if the viruses are detected, it disinfects them. The information can be scanned in different ways like through size, pattern matching, heuristic. These methods have their pros and cons. If the antivirus program uses virus signature mechanism then it must update it at least once a day because 15 new viruses we discovered every day. If an antivirus left for two or more days without updating it cause a serious danger. so new advancement in needed into the antivirus to make it advance antivirus (AAV).This paper involves some new techniques which would not only cure pre-existing malicious files, but also all those unseen new malicious file.
Keywords: sandbox, AAV (advance antivirus), heuristic, signature.
Abstract
Performance Enhancement of AODV in MANET over Black-Hole Attack
Mr. Ankush Jain, Mr. Sandeep Gupta
DOI: 10.17148/IJARCCE.2016.52102
Abstract: A blackhole attack is the most emerging security threat in ad-hoc network. Here, malicious node attempt to compromise mobile nodes and drop packet respectively. Blackhole attack may apply through internal or external mode either to disrupt the communication or degrade network performance by dropping the packet. Here, malicious node attempt to get benefitery position into network to compromise the victim node. In Blackhole attack, malicious node attempt to get achievable position into network and start dropping packets respectively. Work observes that all it happened due to weakness of AODV routing protocol. This research work attempts to develop a mitigation algorithm to avoid and prevent genuine nodes from malicious attack. The complete research work is classified into three categories which are without attack, with attack and preventive scenario. Various scenarios based on variable mobile nodes, speed, pause time and area has been configured to observe the impact of blackhole attack and proposed mechanism with different situation. A NS2 simulator has been used to simulate and evaluate the performance of proposed solution. The complete experimental setup concludes that improvement in mobile node increase the network performance but also increase the blackhole impact. Subsequently, improvement in node speed degrades the blackhole impact. The complete work conclude with the fact the performance of modified AODV is similar with traditional AODV routing protocol but give great height in respect to blackhole attack.
Keywords: AODV, MANET, Black-Hole, Ad-hoc.
Abstract
Vulnerabilities of Routing Protocols in Wireless Sensor Networks
Celia John, Charu Wahi
DOI: 10.17148/IJARCCE.2016.52103
Abstract: The demand for WSN is increasing day by day and in the deployment of WSN the most challenging issue faced is its security. Hence, there is a necessity to design and develop new secure routing solutions for WSN. This research paper discusses about different security attacks like Selective forwarding, Sinkhole, Sybil and blackhole with their impact on the Routing protocols. The effect of these attacks has been summarized. This article emphasizes on reviewing the effects of network layer attacks on Routing protocols in WSNs. A table has been presented summarizing the same.
Keywords: WSN, Routing, Security, Attacks, Sensors.
Abstract
Design and Implementation of a GSM based Electronic Appliances Monitoring and Controlling System
Oyediran Mayowa Oyedepo, Akande Noah Oluwatobi
DOI: 10.17148/IJARCCE.2016.52104
Abstract: This paper presents a GSM based electronic appliances monitoring and controlling system. This enables individuals to connect their home or office electronic appliances to the developed system which in turn enables them to remotely monitor and control these appliances though a Short Message Service (SMS). In remotely controlling the connected electronic appliances, users can determine the status of the electronic appliances remotely and decide whether to either switch any of the connected electronic appliances on or off. The uniqueness of the approach introduced is further revealed in the way the GSM module of the developed system was integrated with the PIC16F877Amicrocontroller to give a single and more compact system. Also, the SMS format used in monitoring and controlling the connected electronic appliances allows users to control their electronic appliances from anywhere provided there is a GSM network; hence, distance was not a barrier. The SMS format used is not lengthy and is simple to understand which makes it attractive to its users. The performance of the developed system was evaluated by connecting twelve (12) electronic appliances with it and the developed system shows the capability to remotely monitor and control them.
Keywords: Electronic Appliances Control, Remote Home Automation, Mobile Phone, Micro- Controller, Short Message Service (SMS), PIC16F877A, Global System for Mobile Communication (GSM).
Abstract
Document Clustering for College Student Database
Amol Patil, Shahezad Arif, Ajit Patil, Prof. Deveshree Wankhede
DOI: 10.17148/IJARCCE.2016.52105
Abstract: Large number of data is available on internet today, these textual data constitutes resources. It is a difficult and important challenge to discover knowledge from textual database or for short text mining. The reason behind this is its richness and its ambiguity of natural language, which also affects analyzing of the data. Thus the question arises who is responsible to read and analyse the data? In this context, manual analysis and effective extraction of useful information may be possible. We think the solution is that it is relevant to provide automatic tools for analyzing large textual collections by automatically finding relevant Info. It depends on keyword features for discovering association rules amongst keywords and labelling the documents. In this work, system ignores the order in which the words occur, but instead it focuses on the words and their statistical distributions in documents. The main contributions of the technique are that to convert the document from unstructured to structured form with Information Retrieval scheme i.e. TF-IDF (for keyword/feature selection that automatically selects the most frequently occurred keywords to generate association rules) and use Data Mining technique for association rules discovery. The system requires Pre-processing phase such as transformation, stemming and indexing of the documents. Stemming is common requirement of natural processing function. The main purpose of stemming is to reduce different grammatical word forms of a word (noun, adjective, verb, adverb etc.) to its root form. Association Rule Mining (ARM) phase and Visualization phase i.e. visualization of results. The input is selected as static web pages related to road accidents on district level and its preventive measures.
Keywords: HARMT algorithm; Porter Stemming Algorithm; Text Preprocessing phase; Association Rule Mining Phase; network lifetime.
Abstract
Real Estate Management System
Jitendra Mahajan, Ganesh Mahajan, Vivek bhuvad, Prof Reena Chaudhari
DOI: 10.17148/IJARCCE.2016.52106
Abstract: Aim of this project was to develop a real estate web application using Microsoft ASP .NET and SQL 2008. The real estate system Give the functionality for buyers, allowing them to search for houses by features or address. It provides functionality for the seller, authorize them to log into the system and add new advertisements or delete existing ones. For this each user is provided a login account with login ID and password.
Keywords: Spatial Database, Information Visualization, Real Estate Information.
Abstract
Design and Development of a Portable ECG Acquisition System
K.Anuradha, M.Saravanan
DOI: 10.17148/IJARCCE.2016.52107
Abstract: ECG, electrocardiogram plays a major role in detection of heart diseases. The main aim of the processing have been developed each of which overcomes the previous technology by means of reliability. PDAs can be designed by the wireless technology ,due to which remote monitoring is possible. The system thus provides remote monitoring of patients wearing a portable device with wireless conectivity which is based on different technologies such as Bluetooth and WIFI .It is highly cost efficient technology with lesser utilization of power and area. Thus a highly accurate architecture is presented.
Keywords: PDAs, real-time, Pulse Rate, Wireless, WIFI.
Abstract
A Survey Exploring Student’s Experiences through Analyzing Social Media Data
Ajinkya A Londhe, Jamgekar R.S, Solunke B.R
DOI: 10.17148/IJARCCE.2016.52108
Abstract: In today�s world most of us depend on Social Media to communicate, express our feelings and share information with our friends. Social Media is the medium where now a day�s people feel free to express their emotions. Information from such instrumented environments can present valuable data to report student problem. Examining data from such a social media can be challenging task. The problem of student�s experiences reveal from social media sited need human analysis or Interaction Social Media collects the data in structured and unstructured, formal and informal data as users do not care about the spellings and accurate grammatical construction of a sentence while communicating with each other using different social networking websites ( Face book, Twitter, LinkedIn and YouTube). Gathered data contains sentiments and opinion of users which will be processed using data mining techniques and analyzed for achieving the meaningful information from it. Using Social media data we can classify the type of users by analysis of their posted data on the social web sites. This paper, presents a workflow to integrate both qualitative analysis and large-scale data mining techniques. This study presents a tactic and outcome that demonstrate how casual social media data can present insight into student�s learning experiences.
Keywords: Computers and education, social networking, web text analysis Social media sites and data, Naive Bayes, Support vector machine.
Abstract
A Survey on Parallel Mining of frequent itemsets in MapReduce
Indumathi S, Kavya D S, Madhusudhan V
DOI: 10.17148/IJARCCE.2016.52109
Abstract: This paper shows the various parallel mining algorithms for frequent itemsets mining. We summarize the various algorithms that were developed for the frequent itemsets mining, like candidate key generation algorithm, such as Apriori algorithm and without candidate key generation algorithm, such as FP-growth algorithm. These algorithms lacks mechanisms like load balancing, data distribution I/O overhead, and fault tolerance. The most efficient the recent method is the FiDoop using ultrametric tree (FIUT) and Mapreduce programming model. FIUT scans the database only twice. FIUT has four advantages. First: I reduces the I/O overhead as it scans the database only twice. Second: only frequent itemsets in each transaction are inserted as nodes for compressed storage. Third: FIU is improved way to partition database, which significantly reduces the search space. Fourth: frequent itemsets are generated by checking only leaves of tree rather than traversing entire tree, which reduces the computing time.
Keywords: MapReduce, frequent itemsets, mining algorithm, ultrametric tree.
Abstract
Web Usage Mining – A Review
Mr. Ankit Rathi, Prof. Abhijeet Raipurkar
DOI: 10.17148/IJARCCE.2016.52110
Abstract: The web has recently become a powerful platform for retrieval of Information and discovering knowledge from web data. The beginning of discovering useful patterns in data has been given a variety of names like data mining, knowledge extraction, discovery of information and data pattern processing. Web mining is the application of data mining techniques for knowledge drawing out from web data. The data is collected from web server when the web accessed by user. First perform the preprocessing for finding access pattern because, raw data which is collected from the web server is incomplete. The aim of this paper is to understand the preprocessing of usage data and also the discovery of Patterns and their analysis. The discovery and analysis of patterns focuses on data accessed by the user. Web browsing behavior of users is captured by Web usage data through web site. User activities are stored in web logs. Due to more usage, the files in log are increasing at higher rate in size. The Preprocessing plays an important role in efficient mining process as Log data is normally noisy and not distinct.
Keywords: Web Usage Mining, Data preprocessing, Pattern discovery, Pattern analysis.
Abstract
Curvilinear Structure of HFET for Low Frequency Noise Measurements
Naresh Chandra Agrawal, Dr. Anil Kumar
DOI: 10.17148/IJARCCE.2016.52111
Abstract: A combination of the wide bandgap (3.3 eV of GaN to 6.3 eV of AlN) which leads to high breakdown fields. Therefore, output power density has become a very important figure of merit for GaN/AlGaN HFETs. Extensive research has been performed to improve the output power density from 1.1 W/mm in 1996 [1] to the state-of-the-art value of 9.8 W/mm in 2001 [2]. In order to get high power density, the product of ns and electron mobility, ?n, should be maximized. Increasing the Al mole fraction in the AlGaN cap layer will lead to higher , but will drop due to alloy disorder scattering and the crystal quality may degrade as well (e.g., density of impurities is higher.
Keywords: Curvilinear Structure, HFET.
Abstract
Identification of glaucoma disease using optic disk and cup segmentation from retinal images
Renuka Deshpande, Anita Kurmi, Jyoti Yadav, Prajakta Borole
DOI: 10.17148/IJARCCE.2016.52112
Abstract: Glaucoma is one of the major causes of blindness and it is most commonly found in diabetic patients. Many people suffer from eye diseases throughout the world. Glaucoma leads to cause of permanent blindness worldwide. The method proposed for the detection of glaucoma includes optic disc segmentation and cup segmentation techniques considered relevant by glaucoma experts. The aim of this paper is to find the cup to disc diameter ratio of glaucoma patient and check the level of glaucoma. If the cup to disc ratio is more than 0.3 it indicates high glaucoma for the tested patient .
Keywords: Glaucoma, optic disk, optic cup, OD segmentation, cup segmentation, cup-to-disk diameter ratio.
Abstract
Automatic Wi-Fi based Student Push Notification in College Campus by using Cloud Computing
Prof. Renuka Deshpande, Shubham Jaiswal, Harshal Joshi, Mayur Gondhale
DOI: 10.17148/IJARCCE.2016.52113
Abstract: In Today�s world, Communication is a very basic and essential need of our life and wire-less communication is the only in demand. In our colleges, university and even in hospitals there is a need of displaying notifications on notice boards regarding information about college events, result declaration, meetings or even some special announcements. But doing it day-to-day sometimes becomes hectic and also recquires human presence at the spot for the same. To tackle the limtations of this technique, we have a technology called as push notification. It is actually a cloud based, push-styled, notification for mobiles. It uses push services which is provided by gcm as a medium for sending notifications to the pre-specified users and also displaying notifications on the users android based mobile devices.
Keywords: Android operating system, SDK tools, XAMPP, MySQL, PHP, GCM.
Abstract
Data Mining Technique to Predict Missing Items and Find Optimal Customer for Beneficial Customer Relationship and Management
Saroja T.V., Greeshma Nair, Kajal Nalawade, Yojana Prajapati
DOI: 10.17148/IJARCCE.2016.52114
Abstract: The aim of association rule mining is to find frequently co-occurring groups of items in transactional databases. The intention of this knowledge is for prediction purposes. This paper contributes a technique that uses the partial information about the contents of a shopping cart for the prediction of products that the customers wish to buy or are more likely to buy along with the already bought products. So this paper presents a technique called the "Combo Matrix" whose principal diagonal elements shows the association between items and looking to the principal diagonal elements, the customer can choose different items that can be bought with the purchased contents of the shopping cart and also reduces the rule mining cost. In this paper, we also propose a data mining and artificial technique to maintain the customer relationship between company and customers. For this purpose, we maintain a historical database and then we use data mining ARM technique to get the customer information from this database. Also we use Customer Relationship Management (CRM) systems which are developed and used to support marketing, customer interactions, preferences and data.
Keywords: Association rule mining, Prediction, Combo Matrix, Customer Relationship Management, data mining.
Abstract
M-Learning: Effective Framework for Dyslexic Students Based on Mobile Cloud Computing Technology
Weam Gaoud Alghabban, Reda Mohamed Salama, Abdulrahman Altalhi
DOI: 10.17148/IJARCCE.2016.52115
Abstract: As mobile technologies and dissemination become more widespread, mobile learning (m-learning) has become a dominant, powerful approach to educate, teach, and train the world. M-learning has a significant effect on how people, especially dyslexic students, learn. Although there is a good amount of research covering m-learning for dyslexia, there are many gaps that still need to be addressed. One considerable issue is the lack ofan effective m-learning frameworkthatmeets the real needs of dyslexic students based on their cultural backgrounds. In this paper, the authors developa cloud-based m-learning framework architecture and highlight the guidelines of the effective solution that should be met in the design phase. The proposedframeworkarchitecture enhances students� personal and learning abilities by providing adaptability to meet their learning needs.
Keywords: M-learning; cloud computing; mobile cloud computing; dyslexia.
Abstract
Speech and Speaker Recognition System Using Artificial Neural Network and Hidden Markov Model
Pallavi Chandratre, Shweta Chile, Sarvesh Gawali, Asmita Jadhav
DOI: 10.17148/IJARCCE.2016.52116
Abstract: Speaker recognition is becoming an increasingly popular technology in today�s society. Besides being cost effective and producing a strong return on investment in all the defined business cases, speaker recognition lends itself well to a variety of uses and implementations. These implementations can range from corridor security to safer driving to increased productivity. By focusing on the technology and companies that drive voice recognition and identification systems, we can learn current implementations and predict future trends.
Keywords: Hidden Markov Model, Artificial Neural Network, Spectogram, Zero Cross Ratio.
Abstract
Keylogging-resistant Visual Authentication Protocol
Prof.Diksha Bhave, Pratiksha Bhavsar, Surekha Chavan, Krutika Gore
DOI: 10.17148/IJARCCE.2016.52117
Abstract: The Keystroke logging, referred to as key logging or capturing the strokes of keyboard, is the act of recording which means logging the keys pressed on a keyboard, other way round it is, that the person using the keyboard is unknown about the fact that their actions are being observed. Key logging can also be used to study human�computer interaction. We have large number of key logging methods that range from hardware and software approaches to acoustic analysis. Here we have proposed two visual authentication protocols one is a one-time-password protocol, the other one is password-based authentication protocol. We verify that our protocols are much strong and can with stand to many of the challenging authentication attacks. Our main focus is to highlight the potential of our approach for real-world deployment: whether we can achieve a high level of usability with satisfactory and acceptable results.
Keywords: Key logging, Authentication, Transaction, QR code.
Abstract
A Review: Integration of Open vSwitch on the OpenDataPlane Framework
N. D. Kakade, S. G. Tamhankar
DOI: 10.17148/IJARCCE.2016.52118
Abstract: Expansion of data traffic in communication devices requisite advanced and pioneered software provisions to manage bandwidth, performance, and power essentials, as well as scalable systems management and availability solutions. At present there are various type of SoC's in the market and these SoC's provides advanced and advanced and pioneered hardware provisions to some usual networking obstacles, permitting packet processing up to 100Gb/s speeds. To make full use of these capabilities of hardware there is a requirement of software, such that it can use HW potential in well organized manner. Therefore discrete vendors supplies their own software development kits (SDK�s) to design the data plane applications. Because of these SDK�s it is hard for applications to be entirely portable across platforms. Still in recent past there has not been an open software development kit (SDK) available for SoC�s designers and individual software vendors (ISVs) which can issue APIs for the data plane of different SoC architectures. But now there is, developing rapidly through an industry organization, OpenDataPlane� (ODP) [1] is a standardized data plane API that can be used to aid Linux-based network applications over the array of silicon architectures and hardware/software configurations. This cross platform characteristic is used by Open vSwitch (OVS) [3] to accelerate it on different architectures. This paper explores ODP and its characteristics including aid to OVS, and also ODP's relation to the Intel Data Plane Development Kit (DPDK) [5].
Keywords: OpenDataPlane, Open virtual Switch, Software Development Kit, Xen Project Hypervisor, System on Chips.
Abstract
Security Trends in Delay Tolerant Networks
Audumbar T. Mohite, S.P. Sonavane
DOI: 10.17148/IJARCCE.2016.52119
Abstract: Delay Tolerant Network (DTN) is a class of network which has high end to end latency, opportunistic communication and infrastructure less network. The selfish or malicious node may drops the received packet, due to such type of misbehavior the performance of network decreases. In this paper, the survey of security trends in Delay Tolerant Networks is reviewed. The various ways for dropped packet detection and routing misbehavior detection with an appropriate method are presented. It also focuses method for defending against flood attacks in DTNs, secure data retrieval scheme, design and validation of dynamic trust management protocol. The remark is also made with the overall analysis.
Keywords: DTN, Security, Trusted Authority, Misbehavior Detection, Trusted Authority.
Abstract
Enhancement Techniques of Medical Images- A Review
Radhika M. Kokate, Vijaya K. Shandilya
DOI: 10.17148/IJARCCE.2016.52120
Abstract: Improving the clinical capabilities medical image enhancement plays vital role for analysis of image. To gain the accuracy of an image enhancements technique is used.The additional information which is gained by enhancement is used for medical diagnosis and analysis. This method improves the quality of that image and preserves the accuracy. In image enhancement the result is more visible and suitable than the original image for specific information. When images are enhanced for human viewers the objective may be to improve the image quality, intelligibility for visual appearance.
Keywords: Image enhancement, Medical image.
Abstract
Image to Text Viewer (iTV)
Atul Thorat, Deepak Singh, Rohit Kadam, Prof. Uttara Gogate
DOI: 10.17148/IJARCCE.2016.52121
Abstract: Image To Text Viewer is a mobile application which converts a textual image captured by the android devices into editable and searchable text document. It uses smart phones of android platform. This paper introduces the functionality of Optical Character Recognition, Tesseract Engine and Android studio. iTV system provides many features like editing raw data, Memory utilization and Quick translation. iTV is more efficient and easier alternative to scanning a document using a scanner as the image captured using OCR is of exactly the same quality like its scanned copy. The advantage of using OCR is that we can get scanned copy of any document image with the help of a simple mobile phone camera without using a bulky scanner. The aim is to develop a user friendly application that is used to convert the image captured by the android devices into editable and searchable text document anywhere and anytime.
Keywords: Optical Character Recognition System (OCR), Tesseract Engine, Camera Captured Document Images, Android smart phone.
Abstract
A Survey on Image Modification for Deuteranopic Viewers
Ms. Jyoti D. Badlani, Mr. C.N. Deshmukh
DOI: 10.17148/IJARCCE.2016.52122
Abstract: About 8% of men and 0.5% women in world are affected by the Colour Vision Deficiency. As per the statistics, there are nearly 200 million colour blind people in the world. Due to CVD, their ability to effectively perform color and visualization- related tasks is greatly affected. Colour vision deficiency, predominantly caused by hereditary reasons, while, in some rare cases, is believed to be acquired by neurological injuries. A colour vision deficient will miss out certain critical information present in the image or video. But with the aid of Image processing, many methods have been developed that can modify the image and thus making it suitable for viewing by the person suffering from CVD. This paper enlightens some previous research studies in this field and follows the advancement that have occurred over the time. It also approaches different methods of modifying and adjusting images so that the persons suffering from dichromacy are able to better perceive image detail and color dynamics. This paper includes three algorithms; they are LMS daltonization, color contrast enhancement, and LAB color adjustment. Two separate. algorithms are also used for evaluation of the effectiveness of these techniques. First; the simulation of deuteranopia is done on both the original and processed images to observe the algorithm�s effects from the perspective of a color blind viewer. Second; delta E value is calculated between the two images in order to assess the extent to which the image changes from the perspective of a non-color blind viewer. A brief comparison is also done between Color contrast enhancement, LAB color adjustment and LMS daltonization.
Keywords: Deuteranopia, Dichromacy, CVD, LMS Daltonization, RGB Color Constrasting, LAB Color Correction.
Abstract
Optimizing the Health Needs of Users by Moulding up an E-Hospital
Aleena.Wahid, Anice.John, Athira.S, Prabha.M.R, Sivendu.B.S , Jooby.E, Deepa.K.Daniel
DOI: 10.17148/IJARCCE.2016.52123
Abstract: Information technology transform the ways of healthcare services by converting the olden method of consulting a doctor to patients seeking online health information. Many healthcare services has been brought into action . These include Heath Tap, HaoDF ,WebMD etc. They provide faster and trusted answers for the questions asked by the patients. This paper consist of two components: mining and learning. A personal health record, or PHR, is a health record where health data and information related to the care of a patient is maintained by the patient. This stands in contrast to the more widely used electronic medical record, which is operated by institutions (such as hospitals) and contains data entered by clinicians or billing data to support insurance claims. The intention of a PHR is to provide a complete and accurate summary of an individual's medical history which is accessible online.
Keywords: local mining, global learning, PHR-personal health record, query.
Abstract
A Desirable Strategy for Enhancing Cost Containment in Cloud Cache
Suganthi.J, Abinaya.B, R.G. Suresh Kumar, T. Nalini
DOI: 10.17148/IJARCCE.2016.52124
Abstract: The cloud caching service can maximize its pricing scheme based on optimization .There are two major challenges while trying to define an optimal pricing scheme in caching service. The first is to define a simplified model of the price-demand dependency and the second is to establish the pricing scheme adaptable to modelling errors, time-dependent model changes and stochastic behaviour of the application. Also, the iterative optimization allows for re-definition of the parameters in the price-demand model, hence the pricing scheme should be adaptable to time changes. In this paper we propose an optimal pricing scheme and a method for the efficient computation of structure correlation by extending a cache-based query cost estimated subroutine and template-based workload compression technique is used. Pricing optimization proceeds in iterations on a sliding time-window that allows online corrections on the predicted demand, via re-injection of the real demand values at each sliding instant and hence the cost estimation and the consistency can be maintained.
Keywords: cloud cache, optimal pricing, template based workload compression, structure correlation.
Abstract
Secure Online Payment System using Visual Cryptography
Nikita Chaudhari, Priya Parate
DOI: 10.17148/IJARCCE.2016.52125
Abstract: With the commencement of internet E-Commerce is rapidly growing market. Phishing is most popular attack possible in E-commerce environment as Phishing means is the attempt to gain sensitive information of an user such as usernames, passwords, and credit card details, by impersonating as a credible entity in an E-commerce. In this paper we have proposed new approach for secure online payment system using Visual Cryptography. In this Visual cryptography is applied on confidential data such as One-time password from which two shares are generated. One share is send to Client through Email and other is send to Merchant. Merchant in tern send share to Client, So that two-way authentication is done as well as whether the site is Phishing or non-phishing website -is detected.
Keywords: Online Shopping, Phishing, Shares, Visual Cryptography.
Abstract
Protecting Outsourced Data in Cloud Using Deduplication and Enhancing Key Management
Anuja Kunjumon, Devu S Nair, Saranya P, Shahanas Abdul Sammad, Smitha C S
DOI: 10.17148/IJARCCE.2016.52126
Abstract: Data Deduplication is a technique used in cloud storage to remove duplicate copies of similar data. The main motive of deduplication is to reduce storage space and improve bandwidth. In order to provide security and privacy to outsourced data encryption techniques are used. Encryption is performed by generating keys. To attain efficiency and reliability in managing a huge number of keys, a scheme called Dekey is introduced. Dekey is implemented using ramp Secret Sharing Scheme. Dekey provides a way to reduce overhead by distributing convergent keys across multiple servers. This paper also proposes a means of sharing data among multiple users.
Keywords: Data Deduplication, Encryption, Dekey, Ramp Secret Sharing Scheme.
Abstract
SCADA Implementation for Power Generator Performance and Condition Monitoring System
Miss. Sargar Anita, Miss. Ghadage Shital, Miss. Shweta S. Joshi
DOI: 10.17148/IJARCCE.2016.52127
Abstract: The �SCADA Implementation for Power Generator Performance and Condition Monitoring System� is mostly applied in new technologies. Network component, application, features, and function of SCADA system has been discussed in this paper, also the working of SCADA software discussed with merits and demerits. PLC has been discussed in this project which include working, features, automation purpose and also architecture, programming of PLC with its all components like programming devices and program control instruction. This paper focuses on performance of 3 phase power generation and monitoring of parameters through SCADA and PLCs are used for controlling purpose.
Keywords: SCADA, PLC, Human Machine Interface (HMI), Contactor, Motor, Power Generator.
Abstract
Security Issues and Social Impacts of Mobile Applications
Ms. Y Sowjanya, Ms. M Nishantha
DOI: 10.17148/IJARCCE.2016.52128
Abstract: Information and communication technologies made world easy. Mobile applications are one which rapidly growing the global mobile market. Security and social impacts on the society is an open issue. This paper gives security measures for information access by using a layered approach for applications which downloads data from the server, static and dynamic programs to automatically detect suspicious applications. This paper also presents some effect of mobile application on society from the ethical perspective with statistical data on different domains.
Keywords: Android, layered technology, inboxes, social impacts, mobile applications.
Abstract
Review Paper on QR Code Watermarking Algorithm Based on Wavelet Transform
Prof. Mrs Sarita Verma, Prof. Mrs. Jaya S. Wakode, Ms. Priyanka S. Kannurkar
DOI: 10.17148/IJARCCE.2016.52129
Abstract: In the digital world copyright protection and authentication have become more significant, in order to achieve this digital different watermarking techniques are introduced for the security. We propose an algorithm in wavelet domain using wavelet transformation for a digital invisible watermarking is to embedded into a QR code image. In our method we embed a binary image logo considered as watermark embedded into one of selected wavelet sub band. The experimental results show that our method has more robustness to attacks in different considerations and it can achieve a viable copyright protection and authentication.
Keywords: QR code, Digital Watermarking, DWT.
Abstract
Equality in Soft Erosion and Soft Dilation in Multi Scale Environment
Kompella Venkata Ramana
DOI: 10.17148/IJARCCE.2016.52130
Abstract: In this paper, equality is discussed in soft-erosion and soft-dilation. In mathematical morphological environment, the property of equality does not exist. But in soft mathematical morphology, the property of equality will exist. It is going to be discussed in this paper in detail.
Keywords: Equality, Mathematical morphology, Mathematical soft morphology, Soft morphology, Erosion, Dilation, Soft erosion, Soft dilation, Primitive morphological operation.
Abstract
Smart Home Automation using IOT
Dhakad Kunal, Dhake Tushar, Undegaonkar Pooja, Zope Vaibhav, Vinay Lodha
DOI: 10.17148/IJARCCE.2016.52131
Abstract: Smart Building not only refers to reduce human efforts but also energy efficiency and time saving. In this ASP.NET is used in which appliances are connected to sensors and sensors give status of appliances to the web. Here electric appliances are operated by the website. The main objective of home automation and security is to help handicapped and aged people that will enable them to control home appliances and alert them in critical situations.
Keywords: smart, automation, sensors.
Abstract
Computerized Automated Detection of Skin Cancer
Darshana Kokitkar, Apurva Amberkar, Vaishali Giri
DOI: 10.17148/IJARCCE.2016.52132
Abstract: Skin cancers are the most common form of cancers in humans. An early detection of skin cancer can save the patients. Computer based skin cancer detection is most advantageous to patients, by which patients can detect the skin cancer without going to hospital or without using the help of a doctor. Computer based detection uses Image Processing and the Artificial Intelligence techniques. The various stages of detection involves collection of dermoscopic images, filtering the images for removing hair and noises, segmenting the images using method of Maximum Entropy Threshold, feature extraction using the Gray Level Co-occurrence Matrix, and classification done using Artificial Neural Network.
Keywords: Skin cancer, Image Segmentation, Feature Extraction, Artificial Neural Network.
Abstract
Comparison of Complex Event Processing Techniques in Sensor Networks
Dr. M. Senthil Kumar, M.Sumithra
DOI: 10.17148/IJARCCE.2016.52133
Abstract: Complex event processing (CEP) combines information from different sources to infer events or patterns that recommend a lot of difficult circumstances. The goal of complex event processing is to search out significant events and reply to them as quickly as doable. Complex event processing may be integrated into 2 forms specifically Active-rule complex Event processing (ACEP) and In-Network Distributed complex Event processing (INDCEP). Active rules in ACEP enable us to specify a pattern query's dynamic condition and real-time actions. The technical challenge is to handle interactions between queries and reactions to queries within the high-volume stream execution. In-Network Distributed complex Event processing (INDCEP) is employed to perform the process inside the network by pushing complex event processing into network nodes. It focuses on distributed event detection via diffusing distributed plans into a network of sensing element nodes to perform complex event tasks. In this paper, we discuss about real time risks, tackle by active rule embedded CEP and processing by pushing CEP into the network nodes by INDCEP. By comparing these two integrated forms we conclude that In Network Distributed Complex Event Processing is more efficient since it meets both real time requirements and network characteristics.
Keywords: event processing, active rule, network node, AnduIN.
Abstract
Prevention against Attacks in MANET Using Secure IDS
Darshana Salvi, Ruchira Samant, Ashwini Patil, Manali Repale, Prof. Manisha Sonawane
DOI: 10.17148/IJARCCE.2016.52134
Abstract: The wired network to wireless network is a worldwide trend in the past few days. The suspicious or malicious activities are detected using intrusion detection system. The most important and unique application is Mobile Ad hoc NETwork (MANET). In this paper, we have implemented a new intrusion-detection system called Enhanced Adaptive Acknowledgment (EAACK) particularly modelled for MANETs. In this paper, we are focus on Denial of Services Attack.
Keywords: Enhanced Adaptive Network, Dos Attack, MANETs, Digital Signature Algorithm.
Abstract
M-Commerce: Risks, Security and Mobile Banking Payment Methods
Akanksha Srivastav, Ajeet Bhartee
DOI: 10.17148/IJARCCE.2016.52135
Abstract: Mobile commerce is more popular in present time just only because of their mobility. M-commerce is the electronic commerce using mobile device. Here discuss the use of security method for prevention of spy type attacks. Mobile phone security has turned into an imperative part of security issues in wireless multimedia communications. As the most mainstream mobile operating system, Android security has been widely contemplated by scientists. Be that as it may, few works have concentrated on mobile phone multimedia security. In this article, we concentrate on security issues identified with mobile phone cameras. In particular, we find a few new assaults that depend on the utilization of phone cameras. We actualize the assaults on genuine phones, And exhibit the achievability and viability of the assaults Besides, we propose a lightweight protection conspire that can successfully distinguish these assaults.
Keywords: M-commerce, mobile security, multimedia.
Abstract
Resource Sharing via Social Networks
Amrutha J Raj, Archana Ravi, Keerthy Raj, Sree lekha A, Bichu Ben, Devi Dath, Deepa K Daniel
DOI: 10.17148/IJARCCE.2016.52136
Abstract: Social networks enables people to communicate and interact with each other. With the increasing usage of social network platform, we are going to develop a mechanism for allocating resources effectively within a social network . It will be easier for users to share their own services, resources and data via social networks. In this paper, we present a social networking site leveraging cloud infrastructure. Users in this site can share resources to their peers through cloud. This work illustrate how social networks and cloud computing can be effectively utilized for allocating resources in the presence of user sharing preferences. We investigate, via simulation, how resources can be effectively allocated within a social community. There are several design decisions that have to be addressed; the interaction of users in the platform, mechanism to exchange resources, the underlying infrastructure etc
Keywords: Social Networks, Social Cloud, Cloud Computing, Resources Allocation.
Abstract
A Recommender System for Online Advertising
M. Sree Vani
DOI: 10.17148/IJARCCE.2016.52137
Abstract: Recommender systems are now evolving as essential marketing and decision supporting tools in online advertising environment, because many customers who deal with e-commerce and related domains are often overloaded with complex and raw data driven by dynamic workflow operations, processes and business guidelines. Recommender systems will analyze and filter complex data methodically to provide essential and useful information to customers (in e-commerce). In this paper, we have presented an efficient recommender algorithm based on user browsing behavior. This algorithm will study user�s behavior, interests and other parameters to present them relevant ad(s) when they navigate through web pages. The Ad recommendation system works dynamically using input details about an advertisement and user past website visitation behavior. These inputs determine advertisement placement and presentation. The algorithm solves the problem of �recommending more related ad(s)� providing opportunity to generate higher user response, user satisfaction deriving more value for time and money. Our experiments and results prove that the dynamically recommended Ads by recommender system have got the relevance up to 92.47% out of 1900 instances.
Keywords: Recommender system, user behavior, online advertising.
Abstract
Comparative Analysis of Prevention and Detection Policies for Selfish Behaviour in MANET
Ms. Lilu Odedra, Prof. Ashish Revar, Prof. Munindra H. Lunagaria
DOI: 10.17148/IJARCCE.2016.52138
Abstract: Mobile Ad-hoc Network (MANET) is infrastructure less and central object less network in which the mobile nodes can communicate using wireless links. Due to this, Network is vulnerable to many attacks. This paper focuses on selfish behaviour and different countermeasures available. Nodes may deny participating in the routing process for its own benefits like to save battery, storage space, bandwidth etc. Various policies like token based, credit based, reputation based, trust based etc. are used to detect and prevent selfishness.
Keywords: Network Security, MANET, Selfish attack, countermeasures, wireless security.
Abstract
Improved Content Adaptive Image Detail Enhancement by Using Guided Image Filter
Seema, Er. Harshdeep Trehan, Er. Varinderjit Kaur, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2016.52139
Abstract: Image enhancement plays an amazing role within vision dependent applications. Recently considerably work is performed in neuro-scientific digital image enhancement. Many techniques are already proposed currently for enhancing the indegent quality or even low intensity images. It's been found that the large amount of the effective techniques depend on the change domain approaches; which could possibly introduce the color artifacts as well as might minimize the intensity from the already improved image. Image detail enhancement algorithms can easily improve visual appearance related to images. They improve good information even though prevent from halo artifacts and also gradient change artifacts all over edges. The fine detail enhancement technique is commonly a greatly used image enhancing tool.
Keywords: Image enhancement, Applications of Image enhancement, Content Adaptive Detail Enhancement Optimization, guided image filter.
Abstract
A Survey on Image Steganography Techniques using Compression
Pranjal Shrivastava, Sandeep Pratap Singh
DOI: 10.17148/IJARCCE.2016.52140
Abstract: Image steganography is one of the oldest and most famous secure data hiding technique. In this paper a survey is done on various techniques based on combination of Steganography and Image Compression along with focus on Image Compression approach.
Keywords: Steganography, Compression, Reversible hiding, Encoding, Compression ratio.
Abstract
Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application
Himani Mehra, Mr. Tarun kumar Sahu, Miss Garima Tiwari
DOI: 10.17148/IJARCCE.2016.52141
Abstract: For secure data hiding and transmission over the wireless network Image steganography is a best technique . The best way used to propose system is achieved by Least Significant Bit (LSB) based steganography using Genetic Algorithm (GA) along with Visual Cryptography (VC). It initiates with Original message which is converted into cipher text by using secret key and then hidden into the LSB of original image. For enhancing the security during transmission Genetic Algorithm and Visual Cryptography has been used. Genetic Algorithm basic function is to modify the pixel location of stego image and the detection of this message is complicated. Encryption of the visual information is carried out by Visual Cryptography . It breaks the image into two shares based on a threshold. The consummation of the proposed system is experimented by performing steganalysis and conducting benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). This paper is based to design the enhanced secure algorithm which uses both steganography using Genetic Algorithm and Visual Cryptography to ensure improved security and reliability.
Keywords: Steganography, visual cryptography, genetic algorithm, steganalysis.
Abstract
An Android-Based Emergency Alarm Message and Healthcare Management System
Karan Jadhav, Akshay Satam, Abhijeet Salvi
DOI: 10.17148/IJARCCE.2016.52142
Abstract: This paper consist of an emergency alarm message and healthcare management system, which is mainly installed in an android-based phone that is most convenientlyused and carried. Our system is suitable for most of the people. This is done with the help of the GPS and GSM network, the system can make sure the exact location of the users when they are in danger and put the alarm on. When the doctor or family members receive the alarm message, they can immediately take measures to protect the user. It can also manage the health record of the user who has logged in. This user can take online medical test to send their physical condition and then doctor will send prescription to the users phone. Also the family member or close friends can track the location of the concerned person using GPS and Google Maps.
Keywords: Medicines reminder, Healthcare, Emergency alarm message.
Abstract
Local Activity and Social Similarity based Data Forwarding Scheme
Vaibhav Dandale, Himanshu Chaudhary, Sameer Lakhe, Sumeet bhosikar, Prof. V.S.Phad
DOI: 10.17148/IJARCCE.2016.52143
Abstract: Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflect a user�s preferences on friend selection in real life. we present Friendbook, a novel semantic-based friend recommendation system for social networks, which recommends friends to users based on their life styles instead of social graphs. By taking advantage of sensor-rich smart phones, Friendbook discovers life styles of users from user-centric sensor data, measures the similarity of life styles between users, and recommends friends to users if their life styles have high similarity. Inspired by text mining, we model a user�s daily life as life documents, from which his/her life styles are extracted.
Keywords: GCM- Google Cloud Messaging, JSON- Java Script Object Notation, GPS- Global Positioning System, Text mining.
Abstract
A Survey on Face Annotation for Content Filtering based on Different Techniques
Ms. Mahvash Iram Khan, Mr. K.N.Hande
DOI: 10.17148/IJARCCE.2016.52144
Abstract: With the rapid advances in the field of multimedia technologies the collection of numerous digital images are also on verge of increase. This has led to the research in the field of image annotation. Auto face annotation is playing an important role in many real-world applications. Face annotation task is part of face detection and recognition. Various pictures are uploaded on social sites daily but many of them are tagged with false name or improperly. It then becomes problematic in recognizing a person properly. Automatic image annotation is the process of automatically assigning semantic labels to images. This paper presents the survey on different approaches for auto face annotation and image based annotation retrieval and also it aims to cover the latent space and generative approaches for auto face annotation and includes a proposed methodology in short.
Keywords: Face Annotation, Search based face annotation clustering based approximation, unsupervised label refinement.
Abstract
Survey on Digital Image Forensics Using Different Contrast Enhancement Techniques
Ms. Nishat Fatema, Mr. M.S. Chaudhari
DOI: 10.17148/IJARCCE.2016.52145
Abstract: Nowadays use of Contrast Enhancement in Digital Images is on the verge of rise and the issue of current research. Many techniques under Image contrast enhancement have come into existence in previous years, but there is need of some techniques which must be very efficient and removes the drawbacks of previously used methods. As digital images or photos have been widely used as evidence in investigation field, medical, historical records, reports of journalist etc. Also with this the availability of most powerful tools which are capable of easy modification, manipulation, forgeries to image becoming quite easier. This paper is based on the study of different contrast enhancement techniques used in previous years and the methods they used. Also it explains the proposed methodology which uses non linear pixel mapping that introduce artifacts into an image histogram, and then detecting locally applied contrast enhancement in image , detecting histogram equalization in image and one image security algorithm is also used to add more security.
Keywords: Contrast Enhancement, Histogram Equalization, Peak-gap, encryption.
Abstract
A Novel Approach to Compute Reputation Value for Trust based Hybrid Security Architecture for Mobile Agents
Dr. Heman Pathak
DOI: 10.17148/IJARCCE.2016.52146
Abstract: Reputation and trust management systems have been useful in situations that involve interaction between mutually distrusting parties to function correctly and to fulfil their purposes. Trust Management System based on reputation gained popularity in recent time for estimating the trustworthiness and predicting the future behaviour of nodes and other network entities in a large-scale distributed system. Trust and reputation have gained importance in diverse fields such as economics, evolutionary biology, distributed artificial intelligence, grid computing, and agent technology, among others. Many researchers have proposed different approaches to compute reputation/trust value to evaluate the trust worthiness of the entities involved. Approaches mainly differ based on the system model they have used, entity for which trust worthiness is computed and area of application. This paper explores the trust model based on reputation to provide security to both MA and executing host. In order to establish safe and secure communication between agent and hosts, each must be trusted that it would not harm other when it is given the access in a system. Paper presents a new way to compute reputation value of both host and mobile agent based either on past experience or experiences of other trusted and known entities and third party. Reputation of host is evaluated by the previous experience of the MAs being executed on the host and also by using intrusion detection mechanisms.
Keywords: Mobile Agents (MA), Mobile Agent Systems (MAS), security, Intrusion Detector System.
Abstract
A Survey on Cerebrum Tumour Detection in MRI using Medical Imaging Techniques
Priyanka Pareek
DOI: 10.17148/IJARCCE.2016.52147
Abstract: The cerebrum or brain is the front most part of the central nervous system. The area of tumours in the cerebrum is one of the components that decide how a brain tumour impacts an individual's working furthermore, what side effects the tumour causes. Alongside the Spinal rope, it frames the Central Nervous System (CNS). Brain tumour is an unusual development created by cells replicating themselves in an uncontrolled way. Magnetic Resonance Imaging (MRI) is the generally utilized gadget for finding. In MR pictures, the measure of information is a lot for manual understanding and examination. Amid recent years, brain tumour segmentation in magnetic resonance imaging (MRI) has turned into a rising exploration area in the field of medical imaging system. Exact discovery of size and area of cerebrum tumour assumes an imperative part in the conclusion of tumour. In this paper we have done a comparative study of various computer based brain tumour detection method. This paper also discusses the limitation and strength of various algorithms proposed by researchers time to time in this area of medical imaging.
Keywords: brain tumour, Region growing, MRI, segmentation, Texture analysis, Edge detection etc.
Abstract
Multicloud Collaboration: The Cloud Mush up and Security Issues
Ghodake P.R, Nagode M.S, Fatale P.R, Menkudale K.S
DOI: 10.17148/IJARCCE.2016.52148
Abstract: Cloud computing has now became a vital technology in IT sector. Its impact on the current and future technologies can be seen as the most powerful and flexible technology ever. This is due to the on-demand services offered by the cloud computing. The cloud computing model allows the provisioning of virtual resources according to the requirement, thus offering the �Pay As You Go� model. The term Multicloud computing refers to the mash up of different clouds together. A proposed multicloud computing environment let us to share the resources dynamically among cloud based systems. In general, multicloud involves service provider (admin), infrastructure providers and clients. In this proposed system, the service provider responds to the client by providing the file requested by it. The Proxy Service Provider (PSP) establishes the path for communication between different clouds.
Keywords: Multicloud computing, cloud service provider (CSP or admin or data owner), proxy service provider (PSP), Secure Hash Function (SHA).
Abstract
Study on Framework for Password-less Authentication
Sabin K Ravi, Sivadasan E T
DOI: 10.17148/IJARCCE.2016.52149
Abstract: This paper is to study the possibility of new and easy way for authentication which is cheaper and faster. In the time where there are many web based and cloud based applications and all uses password based authentication scheme and user require remembering many passwords. In this paper, a study on different possible authentication methods is done to find which require less user physical effort, which is more convenient, cheaper, faster and secure method so that it can take over the authentication process in future and make it easier for users.
Keywords: Authentication, Password Mobile Device, Human Computer Interaction, Security, Usability, Deployability.
Abstract
A Survey on Sharing of PHR using ABE in Semi-trusted Servers
Ambadas Vairagar, Rahul Kanthale, Sandeep Pawar, Prof. S.K. Markad
DOI: 10.17148/IJARCCE.2016.52150
Abstract: A Personal Health Record system enables a patient to create, manage, and control his/her personal health information in one place with the use of the web, which provides the services such as storage, retrieval, and sharing of the medical information more effectively and efficiently. Especially, each patient has full control on their medical records and can able to share their personal health data among the wide range of users, such as healthcare providers, friends and family members. PHR is an patient centric model of health information exchange, which is outsourced to be stored on third party servers such as cloud. Due to the high cost to build and maintain specialized data centres, many Personal Health Record services are outsourced to third-party service providers, such as Microsoft Health Vault. Recently, scheme of storing PHRs in cloud have been proposed. There are many security as well as privacy concerns such as personal health information could be exposed to the third party servers and unauthorised parties. To assure the patients fully control over their own PHRs, it is very efficient method to encrypt the PHRs before outsourcing. The privacy and security issues such as risk of privacy, key management flexible access, it is an important challenges to achieve the fine-grained access over the data. To achieve scalable and fine-grained access control over PHRs, we used attributed based encryption (ABE) policy to encrypt PHR of each patient. In order to protect the data (PHI) stored on semi-trusted or third party servers, we used attribute based encryption (ABE) technique for encrypting the patient�s PHR data. A degree of patients PHRs privacy is guaranteed by exploiting multi-authority ABE (MA-ABE).
Keywords: Personal health records, patient-centric privacy, cloud computing, , fine-grained access control, Attributed-based encryption.
Abstract
A powerful Wi-Fi XML Buffer Supporting Twig Structure Requests Using Lineage Coding
J.Jakkulin Joshi, D.Kalaimani, R.Priya
DOI: 10.17148/IJARCCE.2016.52151
Abstract: We propose vitality along with latency efficient XML dissemination scheme for the mobile computing. We define a novel system framework called G-hub are used to process twig pattern queries for streaming XML data in the Wi-Fi natural environment. It exploits the benefits of the structure indexing and attributes humanization that can integrate relevant XML elements into a group. It provides a way for selective access of their attribute values and text content. We also propose a lightweight and effective encoding scheme, called Lineage Encoding, to support evaluation of predicates and twig pattern queries over the stream. The Lineage Encoding scheme represents the parent-child relationships among XML elements as a sequence of bit-strings, called Lineage Code(V, H), and provides basic operators and functions for effective twig pattern query processing at mobile clients. Extensive experiments using real and artificial files packages demonstrate our scheme outperforms conventional wireless XML broadcasting methods for simple path queries and complicated twig design questions using predicate problems.
Keywords: twig pattern queries, Lineage Encoding, XML framework Introduction.
Abstract
An Adaptive Approach for Mobile Robot Path Planning Using Optimized Artificial Potential Field Method
Urvashi Jaiswal, Anwiti Jain, C.S. Satsangi
DOI: 10.17148/IJARCCE.2016.52152
Abstract: Robot path planning is an imperative fragment in enlargement of the autonomous systems. Abundant stratagems have been proposed in literature concerning mobile robots but the trajectory planning for manipulators is substantially more challenging meanwhile all-inclusive structure can move & produce accidents with the adjoining obstacles. APF (Artificial Potential Field) technique is extensively used for the mobile robots path planning due to its sophisticated mathematical analysis & minimalism. Nonetheless, this method has some characteristic shortcomings in the path planning. This paper benevolences newfangled effectual method for the autonomous mobile robot path planning in the comprehensive known surroundings. We are primarily considering an artificial potential field process with the amended layers of design after that gain coefficient of repulsion are optimized through proposed the genetic algorithm by considering repulsion coefficient as our objective function, as we know that force of repulsion plays an important role in the path planning. A more efficient technique used here is backtracking model. In this manner, we have to save trace of running algorithm to select the shortest path. A novel total potential concept is also proposed which consider effect of obstacles near target & conception of the velocity based force calculation is also derived in the case of movable obstacles or target. Simulation results show that this technique has a better, accurate & optimized results than other common approaches such as bug & artificial potential field.
Keywords: Articial potential field, Robot path planning, Mobile Robot, Genetic Algorithm, Search Optimization, Backtracking, Potential Learning.
