VOLUME 5, ISSUE 3, MARCH 2016
Cloud Computing Intelligent Management by Metaheuristic Algorithm of Intelligent Water Drop
Majid Abdous, Touraj Banirostam
Performance Evaluation of Different Multipliers in VLSI using VHDL
M. Aravind Kumar, O. Ranga Rao, M. Dileep, C V Pradeep Kumar Reddy, K.P. Mani
Dynamic Query Form for Relational Database
Priyanka Gupta, Rakesh Kumar Singh, Rambha Agrahari
An effective Image steganography using LSB Matching Revisited
Miss. Vaishali V. Jadhav, Mrs. P.P. Belagali
A Survey on Different Classification Techniques Used in Financial News Sentiment Analysis
Prabhjot Kaur, Rupinder Kaur Gurm
Data Partitioning Technique to Improve Cloud Data Storage Security
Kiran Gabhale, Narendra Jadyal, Anurag More, Vinayak Bhalekar, Prof. V.V. Dakhode
Detecting Intrusions in Multitier Web Application
Shraddha Dabholkar, Rohit Khambe, Prof. Pallavi Chandratre
Disease Treatment Analysis for Knowledge based System by using Natural Language Processing
Divya Kere, Sagar Manchadi, Prof. Savita Sangam
Railway Ticket Scanner System
Neha Jadhav, Prajakta Dolas, Malini Kurrey, Komal Dhawale, Prof C V Rane
Wi-Fi Hotspot Based M-Ticketing System for Railway Unreserved Ticketing System
Omkar Chavan, Vihang Manchekar, Chetan Chavan, J. W. Bakal
SMS Based Remote Mobile Phone Data Access System
Tejas Supe, Akshay Shinde, Ashwith Shetty, Prof. Manisha Sonawane
Network Architecture for SCADA Implementation
Prof. D.G. Chougule, Mr. Kunal D. Patil
Video Based Behaviour Modelling System for Drug Testing Application
Prof. P. P. Waghralkar, Dhanishatha Hejib, Manali Joshi, Sugam Dhole, Bramhanand Karlekar
Data Mining and Pattern Recognition Techniques Using GIS/RS
Mr. N.K. Gupta, Sachin Kumar, Anshu Verma
Integrating Computer Game-Based Learning into Educational System
Saurabh Karlekar, Rutwik Deokar, Mithil Jadhav, Prof Savita Sangam
Classification and Detection of Oil Spills Using Artificial Neural Network (ANN)
Prof. Uttara Gogate, Priyanka Desai, Madhura Gawde, Sailee Harne
Minimising Industrial Power Consumption Penalty by Engaging APFC Unit
Shivani Yeole, Shraddha Sambare, Shreya Nandeshwar
Web Page Template Generation and Detection of Non- Informative Blocks Using Trinity
Sheetal Patil, Prof. Gauri Rao
Unconventional Tasks and Challenges Faced by Big Data in Medical Science
Sukhpreet Singh, Manjeet Kaur, Inderjeet kaur
Immediate Accident Precision over Medical Application for Android Technology
Mrs. G. Dhanalakshmi, C. Archana, G. Deepalakshmi
Abuse Free Fair Contract Signing Protocol
Aiswarya.V, R. Priyanka Raj, Reshma.S, Sreeka.S.Mohan, Remya.R
Third Party based Model for Security in Cloud Computing Environment
Pragya Pateriya, Mr. Anil Panwar
NFC- Based Attendance System
Prof. Krishna Tripathi, Bijoy Kunnappillil, Rohit Meshram, Vicky Bhoir
XACML Based Solutions for Multiple Environment
Dr. S. Sivasubramanian, S. Geetha, S. Hari Priya
Enhancing Cloud Data Security Using Elliptical Curve Cryptography
Ms. Nikita N Chintawar, Ms. Sonali J Gajare, Ms. Shruti V Fatak, Ms. Sayali S Shinde, Prof. Gauri Virkar
An Automated System to Filter Unwanted Message from OSN User wall
S.B. Madankar, Anupama Mishra, Apurva Bhandari, Reshma Chaudhari, Aishwarya Kulkarni
Survey and Taxonomy of Feature Selection Algorithms in IT log analytics
Mrs.S.Nithya Roopa, P.Karthika, S.Monisha
PLC based Control of Motors in Cranes using Remote Control
M.I.Akhilya, S.P.A.Hemalatha, P. Ramesh babu
Efficiency of Classification Techniques in Detecting Congestion in Wireless Sensor Networks
Mrs. Jayashri B. Madalgi and Dr. S. Anupama Kumar
A Novel Method of Brain Tumor Detection from MRI Images Using Fuzzy C Means Clustering and Neural Networks – A Survey
Ramya R, Kavitha Bai A S
Secure Cloud Storage via Deniable Attribute Based Encryption with Efficient Revocation
Aswathy S, Thahsin V P, Veena Gopakumar, Suja Rani
A Review Paper on Project LOONS
Prof.Mrs.A.G.Andurkar, Miss PrachiZodpe
Speech Based Interactive System for Physically Challenged People
Prasanna Deshmukh, Swapnil Shedge, Pranav Dhole, S. P. Patil
Ranking and Mapping of Hotels & Restaurants Using Approximation Algorithm
Prof. Reena mahe, Abhijeet Javlekar, Pratik Dabholakar, Madhav Kantak, Jayesh Dhawase
3D Face Recognition under Expressions, Occlusions, and Pose Variations
Prof. Diksha Bhave, Rasika Choudhary, Rupali Gavali, Pallavi Gholap
Securely Eradicating Duplication by Generating File Tags and Tokens over Hybrid Cloud Using Security Algorithm
Madhuri Ghodke, Priyanka Bais, Abhirupa Saha, Poonam Singh, Prof. G.M. Gaikwad
A Review Paper on Text Summarization
Deepali K. Gaikwad and C. Namrata Mahender
iBeacon: Newly Emerged Technology for Positioning and Tracking in Indoor Place
Mr. Sehul A. Thakkar, Mr. Sunil Patel, Mr. Brijesh Kamani
Game-Theoretic Pricing for Streaming Videos in Mobile Networks
Vinesh Bagul, Ravindra Bule, Akash Chavan, Swapnil Gholap
A Review- Patch Based Image Denoising Using Pixel-Wise Weighting Approach
Kapil Chavan, Prashant Paikrao
Securing Cloud Data using Crypto-Stegno based Technique
Kirti Kini, Meera Mithani, Rinali Naik, Divyata Raut, Prof.M.K.Kumbar
Fully Anonymous Profile Matching In Social Network
Deepak Thorat, Alok Salvi, Pradeep Shingade, Swapnil Gholap
Secure Big Data Processing Through Homomorphic Encryption in Cloud Computing Environments
J. Josepha Menandas, J. Jakkulin Joshi
Mobile Tracking Based on Phone Theft Detection
B. Srilekha, Dr. V. Dhanakoti
Centralized Control and Digital Registration For Vehicles
Albina Sebastian, Anees Faisal K, Kiran Johnson A, Sikha Suresh, Nihil T M, Lintumol P N
Using Binarization Method Rebuilding of Historic Document Images
Sireesha R, Haritha G, Manasa K
Face Recognition Utilising Motion Blur, Illumination and Pose
Mekha Unnikrishnan, Minu Mariya Thomas, Reenu Sara Rajan, Sudhin Sara Kurian, Muth Sebastian
Security in Wireless Sensor Networks: Attacks and Solutions
Swati Bartariya, Ashutosh Rastogi
Online Search and Recommendation in Consumer Market
Abhishek Jadhav, Akshay Gaikwad, Omkar Barve, Prashant pagar, R.M.Samant
A Review: Local Search Metaheuristic Algorithm using GPGPU
Pramod. H. Yelmewad, ED. B. Kulkarni
Design of High Capacity, Reliable and Efficient Core WAN Network using DWDM
V. Ranjani, R. Rajeshwari, R. Ranjitha, P. Nalini
Path Designing of Known Complex Environment by Using Hybrid of GA & PSO
Sushma Bhatt, Mr. Anil Kumar Mishra
Comparison of Performance of Feature Selection Methods
P. Karthika, Mrs. S. Nithya Roopa, S. Monisha
Motion Detection for Smart Video Surveillance Using Hadoop
S. Madankar1, Vaishali Kolhe, Rajashree Karande, Rohini Sonar, Snehal Salunkhe
Data Back Up and Recovery Using Seed Block Algorithm
Shraddha Rokade, Kanchan Pable, Pandit Suryavanshi, Prof.Snehal Jhaveri
Network Traffic Analysis Measurement and Classification Using Hadoop
Preeti Joshi, Arati Bhandari, Kalyani Jamunkar, Kanchan Warghade, Priyanka Lokhande
Fast Retrieval of Musical Data from Optimized Clusters using PSO
Ms. Priyanka J. Howale, Ms. Sanketa S. Pradhan, Ms. Shraddha G. Lohar, Asst. Prof. Anagha N. Chaudhari
Krushi-Unnati An Online Trading App (OLTP)
Prof. K.K.Patil, Ms. MohiniWalekar, Ms. VaishaliWaghmare, Ms.Chitra Khinde, Ms.Supriya Pathade
Secure Routing Protocols in WSNs: A Survey
Arpita Pateliya, JigneshKumar. N.Patel, Ketan R. Tandel
Hybrid Usage-Based Ranking Model for Information Retrieval (Web Search Engine)
Nikita Patil, Neha Raverkar, Tanvi Sardare, Manisha Upadhyay, Prof. Shweta Barshe
A Review-Cluster Computing Based Video Surveillance: Smart Hub
Pooja Mane, Prashant Kharat
Ultrasonic Haptic Vision System
Sager Pangavhane, Sopan Patil, Vishal More, Pallav Kulkarni
A Novel Reversible Data Hiding Scheme using IWT with Reduced and Fixed Book keeping Information
Ankita Meenpal, Dr. T. Meenpal
A Review on Improve Network Lifetime Using H-HEED Protocol
Gitanshu, Shivi Sharma
Contributing Secured Session with Less Traffic Using Device-To-Device Communication for Social Networks
A. Kalaivani, G. Thiruchelvi
Privacy Preservation and Detection of Sensitive Data Exposure over Cloud
Pooja Pawar, Supriya Palwe, Shweta Munde, Priyanka Gadhave, Mrs. Shikha Pachouly
Annotation on SRRS with Decorative Tag Detection & Composite Text Node Splitting
Thushara K P, Neethu T
Progressive Product Development with Agile
Y. Padma, Dr. P.V.S. Lakshmi, A. Haritha, G. Venu Gopal
Review on: Head Movement Controlled Computer Mouse Interface
Shivani Pawar, Prof. A. M. Rawate
Survey on Energy Efficiency using LEACH for Retransmission Problem
Vishal kaushal, Shivi Sharma
A Review on: Abandon or Removed Object Detection
Divya C. Patil, Dilip S. Patil
Methodology to Shielding Against SQL Injection Using Internet Protocol Address
Sanjay Mishra, Subodh Mishra, Vivek Sharma
Scalable Processing of Continuous K-Nearest Neighbour Queries in Spatio Temporal Database
Prof.S.Athinarayanan, Aswin.R, Krishna Raja Sabari.S, Nethaji.T.P.
Efficient Policy based Detection of Jamming Attacks in MANETS
R.Akila, Mabel P Jenefer
A Survey of Different Adiabatic Techniques for Low Power
Rajasekar G, Boobalan A, Ramkumar M
Comparison of Energy Efficient Scheduling Schemes for Private Cloud Environment
Dr. Shailesh Shivaji Deore
Development of an Excellent System for Information Retrieval Corresponding to Vivid Comparisons of Distinct Methodologies Incorporating DR and Clustering Schemes
Mr. Aditya G. Bhor, Ms. Komal K. Rahane, Ms. Poonam P.Rajurkar, Ms. Neha S. Pathak, Ms. Anagha N. Chaudhari
A Real Time Implementation of Advance Information Processing System for Manufacturing Industries
K.Vaishali, G.Anbarasan, N.Senthamaraiselvi
Hand Gesture Recognition Based Wheel Chair Direction Control Using AVR Microcontroller
Gaurav Kumar Soni, Vidhata Poddar, Yogita Sahu, Pratima Suryawanshi
Offline Signature Cognition and Verification Using Artificial Neural Network
Rushikesh Suryawanshi, Shantanu Kale, Rahul Pawar, Sidharatha Kadam, V. R. Ghule
Improving Iris Recognition Performance by Using Cryptography
Pooja, R. M. Potdar
Downlink Scheduling for Multi-Cell MIMO Systems
Jayakrishnan Murali, Junaid T U, Shaheera Abdullakutty, K P Aiswarya Vijay, Indraja K R, Viji A S
Gesture Based Vocalizer for Deaf and Dumb
Supriya Shevate, Nikita Chorage, Siddhee Walunj, Moresh M. Mukhedkar
Hand Gesture Recognition Using Open CV
Salman Shaikh, Raghav Gupta, Imran Shaikh, Jay Borade
Study of Smart Home Architecture Based on Internet of Things
Hetashavi Shah, Dimpal Jayani, Elita Dsouza, Vinaya Sawant, Darshana Desai
Epilepsy seizure detection using EEG – Curvelet feature selection and SVM classification
Mr.P.V.Rao, S.Akilan, S.Arumugam, V.Dhivakar, D.Karthikeyan
Plant Leaf Disease Identification System for Android
Prof. H.M. Deshmukh, Jadhav Sanjivani, Lohar Utkarsha, Bhagat Madhuri, Salunke Shubhangi
Car Black Box
Manish Bhelande, Viraj Chaudhari, Prathamesh Gore, Raj Dhure, Abhishek Bhayye
Picture Component Technique based SVM Classification and GLCM for Diagnosis and Detection of Dermoscopic Images
B. Suganya Devi, Dr. R. Shanmugavadivu
Make Any Surface as Touch Screen
P. Waghralkar, Devang Mishra, Smriti, Vishal Jagtap, Ajinkya Ghuman
Distributed Cut Detection in Wireless Sensor Network
Sangeetha .V, Prof. B. Murali
Raspberry Pi Based Gesture Photography
Jyoti Yadav, Mohammed Firash Khan, Muhammed Shahan K.K, Sreedevi P, Sumayya K, Manju V.M
Electronic Security through Pattern Generation Using Android and GSM Technology
B. MahaLakshmi, V. Mounika, D. Thriveni, SK. Apsarunnisa, A. Praveena, P. Manasa
A Review on Video Encryption Technologies
Keshav S. Kadam, Prof. A.B. Deshmukh
Cloud Computing Applications and their Testing Methodology
Prof. S.D. Gaikwad, Kavita Rajpure, Supriya Patil, Sonal Kasare, Ojaswini Parange
An Intelligent Health Care Monitoring System for Health Care Applications
Dr. G. Uma Maheswari, Mr. N. Murugan, Bhavadharani C, Arumuga Selvi S, Divya S, Logapriya N
I-FARM: an Automatic Drip Irrigation System
Prof. N. R. Talhar, Gaikwad Anjali, Ghodke Agraja, Minal Kumavat, Swapnali Shinde
An Automated Approach for Database Queries by using DQF.
Prof. Jagruti A. Dandge, Mr. Subodh Patil, Miss. Shital Patil, Mr. Bhushan Kelhe, Mr. Shrikant More
Implementation of Bizwings: An ERP Solution
Kalyani Pendke, Pranay Bhalerao, Kavita Thakre, Pratiksha Raut
Peer to Peer Multimedia Content Distribution Using Automatically Recombined Binary Key
Mrs. M. Rajeswari, M. Harini, K. Kiruthika, S. Nandhini
Content Based Image Retrieval: A Study
Miss. Mrunali D. Pawar, Miss. Shraddha N. Shinde, Mr. Ramdas P. Bagawade
Advance Tools and Techniques for Software Risk Management
Satwik Kumar B Shiri, Sanam Satya Krishna Teja, Nithya Ganesan
Comparative study of various Security Algorithms applicable in Multi-Cloud Environment
Ms.Theres Bemila, Karan Kundar, Lokesh Jain, Shashikant Sharma, Nayan Makasare
A Survey on Dynamic Slot Configuration Techniques for Hadoop Clusters
Rashmi S , D Khasim Vali
Study of Geometrical structure of Perfect Difference Network (PDN)
Sunil Tiwari, Rakesh Kumar Katare, Vinod Sharma, C.M.Tiwari
Review on Vocal Cords Analysis using Speech for various Voice Disorders
Trupti Natthu Dhoke
Different Binarization Techniques for Improvisation of Degraded Documents
Shivagaje Pranoti Ashok, Prof. Mrs. A. S. Patil
A Review on Techniques of Image Segmentation
Ms. Kabade Mankarnika Manohar, Prof. Mrs. A. S. Patil
Anonymous Authentication of Data Stored on Distributed Cloud
Prof. Sagar Rajebhosale, Mr. Pravin Dobe, Mr. Piyush Dani, Mr. Kaustubh Kulkarni, Mr. Sunil Jadhav
Design and Implementation of Dual Polarized Printed Antenna for RFID Application
N. Kanniyappan, V. Saranya, M. Swarnalatha, N. Tamilarasi
Automatic Detection Method of Leukaemia by Using Segmentation Method
Dinesh Warude, Ramanand Singh
Literature Review: Navigation Systems for Fastest Route
Prof. Suvarna Pansambal, Nikhil Iyer, Vira Meherkar, Pankaj Sharma
Semisupervised Based Spatial EM Structure for Microarray Analysis
M.Revathi, K.Abinaya, R.Geetha
Real Time Patient Monitoring System Using LabVIEW
Manju Babu, Roshna Rose Raju, Sunil Sylvester, Teenu Mary Mathew, K M Abubeker
Cost Based Navigation
Prof. Mahendra Patil, Kiran Roy, Bhakti Tigdi, Amit Kumar Yadav
A contextual survey on Speech Recognition Systems for Natural Language
Priyanaka R, Manjunath A E
Collaborative Wireless Gesture Controlled Robotic System
Prof. Amol Sankpal, Surabhi Chawan, Saif Shaikh, Arzoo Tisekar
Interpretation of Human Stages from EEG Signals Using LabVIEW
Tina Thomas, Mareena James, Roshmi Rose Shaji, Binu C Pillai
Grading Based Analysis System
Nikhita Karkera, Anamika Malakar, Jyotikumari Pradhan, Prof.Rohini Patil
Loan Prediction Using Ensemble Technique
Anchal Goyal, Ranpreet Kaur
Vehicle Recognition Based on Tail Light Detection
Chinmoy Jyoti Das, Parismita Sarma
Children’s Transportation Safety System Using Real Time Face Recognition
Mekha Joseph, Nimmy Joseph, Surya Sajeev, Therese Yamuna Mahesh
Understanding the Fundamentals of Content Based Image Retrieval System
Sukhdeep Kaur, Loveneet Kaur
Source-Channel Coding Approach to Generate Tamper-Proof Images
R.Saravanamoorthi, S.Ravindiran, I.Sasidharan, M.Pushparaj, K.Sathish
Detection of Unavailability and Black hole Attack over ALERT protocol in MANET
Akshay Jaitpal, Pavan Kodihal, Pratik Gothiwadekar
Automated Attendance by Face Recognition and SMS Sending to the Authorized Person
Prof. Hina Malik, Prerna R. Sakharkar, Pranita S. Giri
Image Registration Algorithm Based on Image Normalization
Wu Jianzhen, Li Hongqin, Luo xiao
PCB Fault Detection using Embedded Image Processing
Snehal Rane, Vartika Rai, Sukeshna Awate
An Efficient Parallel Fuzzy Rough set Based Rule Generation Using Map Reduce
N. Sukanya, B. Madusudhanan
An Android based application: Cab pooling
Mrs. Chaitrali Dangare, Ms. Gouni Akila
A Secure Protocol for Location Based Queries
Pooja M. Navagan, Nikita S. Kamble, Yogita S. Kayande, Prof. M. M. Kokate
RBI 3X-Fingerprint Based ATM Machine
Bharti Patil, Bhagwan S. Chandrekar, Mahesh P. Chavan, Bhavesh S. Chaudhri
A Review: Geo-Information Technology for Web-mapping application
M. R. Heda, S. V. Chikurde
Video based Heart Rate Measurement from Human Faces
Anjali Garala, Pournima Temkar, Shreyash Trigune, Tulsidas Patil
A Survey on Various Classification Techniques in Email Spamming
Gurwinder Kaur, Rupinder Kaur Gurm
Face Recognition using Principal Component Analysis and ANN
Shiwani, Dr. Kamal Sharma, Er. Gurinder Singh
Knock Monograph Procreation – An Automatic Question Paper Generation System
D.Dharani, Mrs.S.Rajini, V.Gokilavani
Security enhancement for finger print using double encryption and fuzzy vault scheme
Limshe Pearce.A, Mala.R, Nirmala.A, Chandru.B
Making things invisible using Optical Camouflage Technology
Rahul.T, RathinaMurugan.R
Image Acquisition on Unearthing Recaptured Images
Pathruni Shiva, Epuri Priyanka, P. Susan Ruthjessy, N.S.M. Akhilesh, G. Lakshmi, A. Haritha
Detect and Separate Localization Text in Images
Mujaffar Shikalgar, Suraj Thorat, Saddam Mulla, Prof. B.A. Jadhawar
Security Danger to Portable Interactive Media Applications: Camera Constructs Assaults With Respect to Cellular Telephones
Prof. S.R. Javheri, Bhumika Attarde, Dipika Patil, Pradnya Gulave, Rakhi Tarde
Review on Clustering and Routing Algorithm to Prolong the Lifetime of Wireless Sensor Network
Priyanka Yadav, Nidhi Gulati
Model of Solar Hydrogen Power and Fuel Cells System
Musaed Saeed Alyazeedi
4th Generation SCADA Implementation for Automation
Ashish N Koushik, Rashmi BS
A Proposal for Detecting Vampire Attacks in Wireless Sensor Networks
Shiwani N. Laghawe, Nekita A. Chavan
A Review on Secure Video Steganography Technique using LSB & MSB
Er. Ginni, Er. Pushpinder Singh
Bus Tracking System and Li-Fi System
Malathi.R, RaveenaRagavi.G, Gopal.K, Dhanasekar.J
A Quality Based Novel Subclass Coupling Factor Metric for Evaluating Software
Dr. S.A. Sahaya Arul Mary, M.Kavitha
Edge Detection for X-Ray Image using LabVIEW
Meenal Bhatia, Swati.R.Dixit
Performance Metrics Optimization of Cluster Based Location Routing in VANET
Bhushan T. Dhok, Atul D. Deshmukh
A New Construction for Para Virtualization in the Cloud Data Storage and Access the Data Using Web Services
Mrs. Mary Rexcy Asha, Ms. S. Sangeeta, Ms. S. Keerthika, Ms. S. Tharani, Ms. B. Swathisri
GUI Controlled Arduino
Mrityunjaya D H, Naveen Kumar, Hemanth Kelagadi
An Introduction to MIMO OFDM System with BER Analysis
Pooja Gupta, Prof. Rakesh Kumar Singh, Pratibha Singh
A Cost Effective Approach towards Virtual Reality: Phobia Exposure Therapy
Tejas Parab, Deepankar Pawar, Akshay Chaudhari
Analysis of Affective Speech Signals for Emotion Extraction and Attitude Prediction
Punam M Vitalkar, Prof. P.N. Bendre
An Ontological Approach for the Semantic Web Search and the Keyword Similarity Metrics
R. Deepa, Dr. R. Manicka Chezian
Detecting Targeted Malicious Email by Spam Filtering Using Naïve Bayesian Classification
Mrs. M. Rajeswari, Radhika Rama Rao, Priyadharshini .R, Aarthi .R
RFID-based Bus Ticketing System
Dr. Vinit Kotak, Ms. Archana Chaugule, Aakanksha Utkhede, Tushar Chemburkar, Saurabh Tendulkar
A Survey on Challenges, Technologies and Applications of IoT
M. Suruthi, D. Nivetha
A Survey on Internet of Things approach for Smart Eco-System
Yashaswini K, Janhavi .V
Anti-Theft Application for Android Based Devices
Shweta Dhanu, Afsana Shaikh, Shweta Barshe
Agriculture Crop Monitoring using GSM in WSN
S. Shanthi, Abinaya. R, Akshaya. V, Gowri. S
Cost Based Ranking Service Models in Cloud Computing
Dhivya .A, Saravanan .M
Improving Data Integrity and Compressing Transmission Mobile cloud computing using RSA
Manu sharma, Mandeep kaur
Switched Boost DC and AC Converter
Dhinesh Kumar.S, Aswath.V, Arvind Gokul .V
A Novel Approach to Semantic Search for Accurate Source Code
Divya Kumari Tankala, Vikas Boddu
Improved Accuracy and User Satisfaction by Inferring User Search Goals Based on Feedback Sessions
Rasika A. Sarambale (Rasika M. Shintre), Prof. Kanchan Doke
Keyword Extraction and Clustering For Document Recommendation in Conversations
Pooja Pandit, Umar farooq Shahbad, Manpreet Singh, Varsha Gaykwad, F.S. Ghodichor
A Survey Paper on Data mining Techniques and Challenges in Distributed DICOM
P. Haripriya, R. Porkodi
Efficient Image Classification Using Sum Product Tree Based Parallel Computing Approach Using Large Feature Set
B Venkat Raman, Vaidya Saikumar and Naresh Ashetti
Text Classification of CrowdSourced Data Using Parallel Computing Nested Baye’s Classifier
Venkat Raman B, Rajesh Jakkula and Mahesh Pathyam
Controlling Mouse Events Using Eye Blink
Sanjay Gantyala, William Godad, Neelam Phadnis
Performance Analysis of Hierarchical Location Management Scheme to Locate Mobile Agents
Heman Pathak, Swati Aggarwal
Cell Counting and Particle Analysis from Image Captured by using Microscope
Swapnali Patil, Mayuri Pawaskar, Varsha Sawant, Kajal Godage, Prof.B.A.Jadhawar
A Review on Routing and Scheduling Algorithm in Wireless Sensor Network
Sukrati Dixit, Vimlesh Kumar
Interactive Wireless Communication System for Easy Conveyance of Visually Challenged
Binila Treesa Babu, Aishamol Naushad, Basil Chacko, Bilal A Rehman
Design and Development of Affiliate Tracking Application for Real-Time Price Comparison on E-Commerce Platform
Prashant Dahiwale, Aishwarya Shinde, Pawan Verma, Vikas Rathod, Avantika Munghate, Ashwini Kamble
Intelligent Backup System
Shrinivas Dube, Rashmi Mandave, Vaibhav Chhajed, Pratik Bobde, Mrs. Shikha Pachouly
RGSP for Energy Efficient MAC Cross-layer in WSN
Vidyashree BN, V Shivakumar
A Review on Cocktail Approach for Travel Package Recommendation
Mohit Bisen, Mayur Sontakke, Shirish Singnapure
Fraud Detection on Bulk Tax Data Using Business Intelligence Data Mining Tool: A Case of Zambia Revenue Authority
Memorie Mwanza and Jackson Phiri
Big Data: An Emerging Future Technology
G Rajesh, S Sudarshan, Kareemunnisa, Ch Swetha
Survey of Security Enhancements in MANET Routing Protocols for Networking
Neeraj Arora, Prof. Kamal Kishore Arora, Piyush Vyas
Cross-Layer Source Distribution for Video Streaming over OFDMA Cognitive Radio Networks
Mr.K.Sridharan, I.Abhinav, E.Dinesh, N.Dinesh Raj, S.Vikram simmhan
In-a-Nutshell Document Summarizer
Mrunmayi Anchawale, Shravani Joshi, Rajat Shenoi, Shreya Bamne
A Novel Framework for Authentication as a Service (AaaS) in Public Cloud Environment
N. Veeraragavan, Dr. L. Arockiam
Automatic Time-Table Generation System using Genetic Algorithm
Amey Salvi, Omkar Khanvilkar, B.W. Balkhande
Optimized Water Controlling Approach for Irrigation System Based on Wireless Sensor Network and GPRS Module
Shweta B. More, Prof. D. L. Bhuyar
A Leverage Based Trust Scheme for Wireless Sensor Networks
M.Ranjitha, R.Gopal
Design of Smart Security System using Image Processing and Embedded System
T. V. Karpagam, R. Keerthana, K. Latha, K. Nalini, A. Srinivasan
Design and Implementation of Step Up DC – DC Converter for Microsource Application
Prajakta Bhutange, Rambha Thakur, Ravina Kumbhalkar, Reshmi Bhagwat
Firewall Based Signature Enhancement for Flooding Attack in MANET
Harikrishnan Nair M P, Sreeja Nair M P
Making an Interpretation of Spreadsheet from Queries
K. Sasikala, B. Sathishkumar
Implementing Efficient Multi-Keyword Ranked Search Using Encrypted Storage Data
K. Anu, S. Sakthi Vinayagam, R. Rajkumar, G. Karthika
OFDM: A System Based Comparison with Cyclic Prefix
Jaipreet Kaur, Manjit Sandhu, Sukhdeep Kaur
Control Strategy for Trajectory Tracking of Robotic Arm
Kiran Kumar Hirwani, Naveen Kumar Dewangan
Using HDFS Approach for Practical Performance Analysis
R.Vasavi, MD. Moona Tasleem, L. Bharath Reddy, B. Ramya, P. Rojashalini
A Survey on Scene Text Detection and Text Recognition
Priyanka Patil, S I Nipanikar
High Secure Digital Image Steganography for the Secrete Communication
K. Suganya, P. Sunilkumar
Noise Removal in Remote Sensing Image Using Kalman Filter Algorithm
S. Priyanka, Dr.A.S.Naveen kumar
Tumor Segmentation in Brain MRI using a Fuzzy Approach with Class Center Priors
D.Balasubramaniam, S.Saranya, E.Sutha, U.Umamaheswari
Hybrid Network Intrusion Detection for DoS Attacks
S.Anu, K. Pradeep Mohan Kumar
Review: Online Voting System Using Android
Badave Malhar S., Kadam Amit B., Nalawade Ranjit S. , Hipparkar Abhijit A.
Load Frequency Control of Hybrid System using Fuzzy Controller and Implementing Neuro Fuzzy Controller
N. Rajesh Kumar Gowd, M. MD. Sayeedi Baig, V. Naresh
Aggregate Estimation in Hidden Databases With Checkbox Interfaces
S.Gayathri, B.Madusudhanan
An Approach for Semantic Based Paper Evaluation Using Keywords
G. Thilagavathy, S. Mythili, R. Arun Kumar
To Automate Entire Placement and Training Cell for The College using Android Application with Cloud Computing
Vikrant A Agaskar, Surjit H Singh, Srujan S Chaudhari, Keyur P Rajyaguru
Secure Data Deduplication in Hybrid Cloud
Krishnapraseeda V, Karthikeyan C
Interpreting Sentimental Analysis for Customer Commands on E-Commerce
R. Jeevitha, D. Sathyavani
Graph Database: A Contemporary Storage Mechanism for Connected Data
N.M.A. Mohamed Ali, Dr. T. Padma
A Study on Different Part of Speech (POS) Tagging Approaches in Assamese Language
Bipul Roy, Bipul Syam Purkayastha
Computer Aided Diagnosis Tool for Identification of Tumors in Brain MRI Images and Performance Evaluation
Gopi Karnam, Ramashri Thirumala
Clock Related Flip-Flop with Sleepy Transistor Merging For Power Saving
K. Shilpa, D. Ganesh Kumar
Outliers Analysis of Real-time Metereological data using Elastic Search repositories for a proposed Natural Disaster Prediction System (NDPS)
Manoj Sakhala, Yogesh Dasgaonkar, Ajay Kumar, Jignasa Patil
A Survey on Node Scheduling Methods for Wireless Sensor Networks
Neha Patel, Shweta Singh
Internet of Things (IoT) : Challenges and Future Directions
Ms. Yogita Pundir, Ms. Nancy Sharma, Dr. Yaduvir Singh
Analysis of the Effective Advanced Encryption Standard Algorithm
Umalaxmi Sawant, Prof. Kishor Wane
Elaborated Glimpse of Furniture Outline
Prof. P. S. Toke, Aditya Limaye, Susmit Mane, Vishal Metri, Aniket Paste
Authentication Using Graphical Password
Komal Patil, Pranita Khape , Swapnali Pawar, Chaitrali Kamble, Prof.B.L.Sutar
Android Based LAN Monitoring System
R.V.Kurkute, B.M.Jadhav, A.S.Walunj, Prof.S.B.Bhosale
Android Based Mini ERP System for College Institutions
R.Raheema Nilofar, K.Sigappi, R.Soundarya, SP.Valliammai, AT.Barani Vijaya Kumar
An Application of Image Processing to Detect the Defects of Industrial Pipes
Mayuri Dharma Shinde, Prof. Kishor Wane
Enabling Public Auditability and Data Dynamics for Storage Security and Data Integrity in Cloud Computing
Adith .A. Varghese, M.M. Ashwin, R. Harsshath Prabu, T. Praveen, Mr. B. Karthikeyan
Detection and Recognition of Outdoor Objects based on SIFT Features
R. Arun Kumar, Dr. M. Balasubramanian, C. Arul Selvi
SQL Query Formation Using Natural Language Processing (NLP)
Prof. Debarati Ghosal, Tejas Waghmare, Vivek Satam, Chinmay Hajirnis
Visual and Textual Content based Anti-Phishing
Mr.Digambar Pawar, Mr.Anuraj Jagdale, Mr.Rohit Hinge, Mr.Rupesh Gangtire
Quality Enhancement and Reduction in Hand-off Latency in Cognitive Radio Network
Kalyani Gokhale, Kaustubh Apte
Smart Traffic App Using Android Phone
Mehra Varsha, Kodgire Nikita, Mehetre Komal
Effective Crawling In Web Forum
D. Dhivya , R. Venkadeshan , D. Vidhya
Digital Video Watermarking for Copyright Protection
Soumya Naik, Shyamali Patil, Shweta Salgaonkar, Prof. Nagmani
Smart Trolly
Swapnil Patil, Avdhoot Mahale, Avinash Landge, Ankush Mahajan
Building Ecommerce Framework for Online Shopping using Semantic Web and Web 3.0
Pranita Barpute, Dhananjay Solankar, Ravi Hanwate, Puja Kurwade, Kiran Avhad
Mobile Based Event Initiator
Nirmita Shah, Antara Dighe, Indu Anoop
Application of Educational Data mining Techniques in E-Learning Systems with its Security Issues: A Case Study
Ms. Ankita Chopra, Ms. Aakanksha Chopra
The detection of Urea, Sugar, Sodium Chloride, and Measurement of PH Parameter in the Milk
Prof. Santosh M. Tambe, Prof. Mahindra R.Gaikar, Prof. Snehal S. Somwanshi
Visual Based Image Search using Perceptual Hash Codes for Online Shopping
Shradha kadam, Priyanka Gupta, Charul Veer, Akshay Loke
Human Identification using Major and Minor Finger Knuckle Pattern
Ms. Aditi S. Pekhale, Ms. Prachi D. Thakur, Ms. Kavita D. Thorat, Ms. Ashwini V. Waje, Prof.Satish.N.Bhadane
A Review on Parallel Data Acquisition for Industrial WSN in IoT Environment
G.H.Bhise, S.S.Thorat
Implementation of efficient FFT Algorithm for WiMAX applications
K.SandhyaRani, Kishore Sonti
Automatic Electricity Billing
Markose Babu, Meera Antony, N. Pranav Ashok, Niranjana. K. R, Darsana. P
Advanced Optimized Next Hop Routing Link State Routing In Wireless Sensor Network
Sonatte .A.A, Mrs. N. Gomathi M.E
A Comparative Study of Chatbots and Humans
Amit Mittal, Ayushi Agrawal, Ayushi Chouksey, Rachna Shriwas, Saloni Agrawal
A Novel Design of Electrostatic Actuation Based on Comb Drive MEMS Resonator Using Vibrating Energy Storage Application
K.Vinotha, S.Muruganand, S.Sathya, V.SenthilKumar
Dust Bin Monitoring System
Ann Mary Thomas, Annu Reji Philip, Tessy Elsa Peter, Er. Nishanth P R
Analysis of Public Sentiment on Twitter
Ms. Ashwini Patil, Mr. Chandrakant Jadhav, Ms. Tejaswini Patil
Recognition of Paddy Plant Diseases Based on Histogram Oriented Gradient Features
K. Jagan Mohan, M. Balasubramanian
Novel Approach to Infer User Search Goal for Query by Clustering Its Feedback Session
Ku. Sushama K. Deotale, Prof. M. S. Khandare
A Survey: Wireless Sensor Networks for Personal Health and Structural Health Monitoring
Prof. Prashant S Bibave, Prof. Liladhar P. Bhamare
Digital India – Challenges Faced by IT Sector
Ashok Patel, Sheetal Thakkar, Viren Parmar
Secured Hadoop as A Service Based on Infrastructure Cloud Computing Environment
Atul U. Patil, A.P.Pande, R.U.Patil, B.S.Patil
Novel Method to Improve ACO Performance on the GPU Using CUDA for Nurse Roster Scheduling Problem
Mr. A. P. Pande, Mr. B. S. Patil, Mr. A.U. Patil
Secure auditing and De-Duplicating data in cloud
Mohammed AhasanNafis Rizvi, Rohit Singh Sawan, B.W Balkhande
Congestion Avoidance in WSN Clusters using Token Bucket Algorithm
Prabhdeep kaur, Jaswinder singh
A Review of Various Protocols for WSNs in Search of Most Efficient Congestion Control and Clustering Techniques
Prabhdeep Kaur, Jaswinder Singh
Multi-Level Priority Based Packet Scheduling Scheme For Wireless Sensor Network
P.Palanisamy, V.S.Sathish kumar
Beacon Based Vehicle Tracking and Vehicle Monitoring System
G. Kumaresan, J. Gokulnath
Design of Efficient Backup with Security
Kadam Shweta A, Khot Swapnali B, Katkole Pooja P, Sargade Pradnya P, Nalwade Snehal S
Abstract
Cloud Computing Intelligent Management by Metaheuristic Algorithm of Intelligent Water Drop
Majid Abdous, Touraj Banirostam
DOI: 10.17148/IJARCCE.2016.5301
Abstract: One of the most important challenges in Cloud Network is the matter of allocating physical resources to virtual machines. The goal of this paper is to present a method to have an optimized installation of virtual machines� resources onto physical machines with intelligent water drop so that overall energy consumption in data center is reduced with decreasing the number of active physical servers. Utilizing policies to host overload detection and immigrant virtual machine; and through comparing results of simulation with existing methods; is the best method to manage physical resources in cloud networks which for this purpose, intelligent water drop algorithm has been used. Also to simulate cloud environment, Cloudsim 3.0 simulator library in Netbeans IDE 7.4 develop environment are going to be used. Results shows that in comparison with other methods, the algorithm of intelligent water drop using MAD algorithms as host overload detection algorithm and MMT as the algorithm of selecting virtual machine, the most optimized answer will be found for physical resource management in cloud computing.
Keywords: cloud computing, resource management, water drop algorithm, intelligent water drop.
Abstract
Performance Evaluation of Different Multipliers in VLSI using VHDL
M. Aravind Kumar, O. Ranga Rao, M. Dileep, C V Pradeep Kumar Reddy, K.P. Mani
DOI: 10.17148/IJARCCE.2016.5302
Abstract: Multiplier modules are common to many DSP applications. The fastest types of multipliers are parallel multipliers. Among these, the Array multiplier is the basic one. However, they suffer from more propagation delay. Hence, where regularity, high performance and low power are primary concerns, Booth multipliers tend to be the primary choice. Booth multipliers allow the operation on signed operands in 2's-complement which are derived from array multipliers where each bit in a partial product line an encoding scheme is used to determine whether the bit is positive, negative or zero. The Modified Booth algorithm achieves a major performance improvement through radix-4 encoding. In this algorithm each partial product line operates on 2 bits at a time, thereby reducing the total number of the partial products. This is particularly true for operands using 16 bits or more.
Keywords: Array multiplier, parallel multiplier, propagation delay, VHDL, LUT, DSP block, utilization and twiddle f- actors.
Abstract
Dynamic Query Form for Relational Database
Priyanka Gupta, Rakesh Kumar Singh, Rambha Agrahari
DOI: 10.17148/IJARCCE.2016.5303
Abstract: There is a rapid development of the morden scientific database and internet database. These databases have thousand numbers of relations and attributes. So static query form does not work with a large number of relations and attributes, as they do not satisfy many ad-hoc database queries on the real world databases. Thus there is a requirement of a system which will satisfy the user requirement and generate the query form dynamically at the run time. In this paper we propose the Dynamic Query Form (DQF), which is going to provide the solution of the large and heterogeneous database. DQF captures the user�s interest and provide the rank query form component, which is usefull for the user to make his/her decision. DQF is the iterative process and each iteration is guided the user. In each iteration system generates the ranking list of form component automatically and user can add any component according to his/her requirement. The component ranking is generated by capturing the user preference. Now user can fill the enrich query form and execute the query and the result will be shown to the user. This process is repeated until the user is satisfied.
Keywords: Query form, Query execution, User interaction, Query form generation.
Abstract
An effective Image steganography using LSB Matching Revisited
Miss. Vaishali V. Jadhav, Mrs. P.P. Belagali
DOI: 10.17148/IJARCCE.2016.5304
Abstract: The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis and extensive experiments, especially for those images with many smooth regions. The LSB matching revisited image steganography with an edge adaptive scheme can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. The new scheme can enhance the security significantly compared with typical LSB-based approaches as well as their edge adaptive ones, such as pixel-value-differencing-based approaches, while preserving higher visual quailty of stego images at the same time.
Keywords: steganography, LSBM, LSBMR, edge adaptive LSBMR.
Abstract
A Survey on Different Classification Techniques Used in Financial News Sentiment Analysis
Prabhjot Kaur, Rupinder Kaur Gurm
DOI: 10.17148/IJARCCE.2016.5305
Abstract: The data mining is the interdisciplinary subfield of computer science. The goal of data mining process is to extract information from the data set and transform it into an understandable form for further use. The objective of this paper is to describe the classification techniques used in financial news sentiment analysis. Sentiment analysis is widely use to movie reviews and social media for a variety of applications, ranging from marketing to customer service. Generally, the aim of sentiment analysis is to determine the attitude of a speaker or a writer with respect to some topic or the overall contextual polarity of a document. The attitude may be his or her judgment or evaluation. The attitude may be bad or good. Sentiment analysis of financial news deals with the identification of positive and negative news.
Keywords: Data Mining; Sentiment analaysis; Classifications; References;
Abstract
Data Partitioning Technique to Improve Cloud Data Storage Security
Kiran Gabhale, Narendra Jadyal, Anurag More, Vinayak Bhalekar, Prof. V.V. Dakhode
DOI: 10.17148/IJARCCE.2016.5306
Abstract: Cloud computing enables on-demand network access to a shared pool of conquerable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use. Cloud storage refers to the delivery of storage resources to the consumers over the Internet. Private cloud storage is restricted to a particular organization and data security risks are less compared to the public cloud storage. Hence, private cloud storage is built by exploiting the commodity machines within the organization and the important data is stored in it. When the utilization of such private cloud storage increases, there will be an increase in the storage demand. It leads to the expansion of the cloud storage with additional storage nodes. During such expansion, storage nodes in the cloud storage need to be balanced in terms of load. In order to maintain the load across several storage nodes, the data need to be migrated across the storage nodes. This data migration consumes more network bandwidth. The key idea behind this paper is to develop a dynamic load balancing algorithm to balance the load across the storage nodes during the expansion of private cloud storage.
Keywords: TPA-Third Party Authentication, MD5-Message Digest 5, Data centre, Data Partitioning Technique.
Abstract
Detecting Intrusions in Multitier Web Application
Shraddha Dabholkar, Rohit Khambe, Prof. Pallavi Chandratre
DOI: 10.17148/IJARCCE.2016.5307
Abstract: Internet services and applications have become an inseparable part of daily life, enabling communication and the management of personal information from any places. To contain this increase in application and data complexity, web services have moved to a multitier model how the web server runs the application front-end logic and data are outsourced to a database or file server. In this paper we are presenting double guard and IDS models the network behavior of user sessions across both the front-end web server and the back-end database. By observing both web and subsequent database requests, we are able to find out attacks that are not dependent IDS would not be able to identify. Furthermore, we compute the limitations of any multitier architecture in terms of working sessions and functionality coverage. We implemented Intrusion Detection system using an Glassfish web server with SQL Server 2014 and lightweight virtualization. We then collected and processed real-world traffic over a 15 day period of system deployment in both dynamic and static web applications. Finally, using Double Guard, we could expose a large range of attacks with 90 percent accuracy while maintaining 5 percent false positives for static web services and 5 percent false positives for dynamic web services.
Keywords: Multitier, Double Guard, Escalation attack.
Abstract
Disease Treatment Analysis for Knowledge based System by using Natural Language Processing
Divya Kere, Sagar Manchadi, Prof. Savita Sangam
DOI: 10.17148/IJARCCE.2016.5308
Abstract: The machine learning becomes a very important field in many research domain and just become a very important tool in medical domain field. with the help of machine learning, computer based system is integrated with medical field in order to get a better and a well organized medical treatment care. It shows a machine learning based methodology for making an application that is capable of identifying and improving healthcare information. It selects sentences from published medical papers that shows disease and treatments and finds semantic relation exist between them.
Keywords: mining, Electronic healthcare record system, Machine learning, natural language processing.
Abstract
GIFI New Era of Wireless Technology
Velan.P, Roshini.U
DOI: 10.17148/IJARCCE.2016.5309
Abstract: GI-FI will helps to push wireless communications to faster drive. For many years cables ruled the world. Optical fibers played a dominant role for its higher bit rates and faster transmission. But the installation of cables caused a greater difficulty and thus led to wireless access. The foremost of this is Bluetooth which can cover 9-10mts. Wi-Fi followed it having coverage area of 91mts. No doubt, introduction of Wi-Fi wireless networks has proved a revolutionary solution to �last mile� problem. However, the standard�s original limitations for data exchange rate and range, number of channels, high cost of the infrastructure have not yet made it possible for Wi-Fi to become a total threat to cellular networks on the one hand, and hard-wire networks, on the other. But the man�s continuous quest for even better technology despite the substantial advantages of present technologies led to the introduction of new, more up-to-date standards for data exchange rate i.e., GI-FI. GI-FI or Gigabit Wireless is the world�s first transceiver integrated on a single chip that operates at 60GHz on the CMOS process. It will allow wireless transfer of audio and video data up to 5gigabits per second, ten times the current maximum wireless transfer rate, at one-tenth of the cost, usually within a range of 10 meters. It utilizes a 5mm square chip and a 1mm wide antenna burning less than 2watts of power to transmit data wirelessly over short distances, much like Bluetooth. The development will enable the truly wireless office and home of the future. As the integrated transceiver is extremely small, it can be embedded into devices. The breakthrough will mean the networking of office and home equipment without wires will finally become a reality. In this we present a low cost, low power and high broadband chip, which will be vital in enabling the digital economy of the future.
Keywords: Wi -Max, Optical fibers, Gigabit Wireless, high broadband chip.
Abstract
Railway Ticket Scanner System
Neha Jadhav, Prajakta Dolas, Malini Kurrey, Komal Dhawale, Prof C V Rane
DOI: 10.17148/IJARCCE.2016.5310
Abstract: Data on the ticket will be read using barcode reader which is interfaced with microcontroller. It will send this data to the ticket checker using Zigbee technology. The ticket checker will come to know the exact number of passengers aboard on the train. SMS alert system for the passengers is provided using GSM System .The code for microcontroller is developed using embedded in C language .also, visual basics in C++ is used for serial communication between microcontroller and zigbee modem.LPC2148 microcontroller is used for interfacing. Therefore, keil and flash magic software�s are used for coding.
Keywords: Barcode Scanner, Zigbee, Microcontroller, GSM kit.
Abstract
Wi-Fi Hotspot Based M-Ticketing System for Railway Unreserved Ticketing System
Omkar Chavan, Vihang Manchekar, Chetan Chavan, J. W. Bakal
DOI: 10.17148/IJARCCE.2016.5311
Abstract: Technological development has resulted in a boundary free digital world. This development has resulted in transaction through virtual money instead of real. One of the most popular forms of online trading is E-ticketing. Android Phones can reduce the trouble of the customers to stand in queue and book the tickets. With the advent of the smart cards the overhead of waiting for ticket was reduced but the user should always remember to carry the card with him. Moreover one has to pay attention that it is not misplaced or stolen. After that came E-Ticketing where passengers have to carry a SMS or a printout of the ticket booked online. But that required laptops or desktop for booking. Currently there is a mobile ticketing system provided by the Indian Railways implemented in Chennai and Mumbai. The proposed system aims to eliminate drawbacks of the currently implemented mobile ticketing. Thus came into front the use of smart phone application where carrying a smart phone will do all the work. This proposed system aims to provide tickets without Internet and GPS which mainly makes the current implementation of the mobile ticketing less popular. The ticket can be bought easily and ticket will be present in the customer�s phone in the digital data. The Ticket Checker will scan the QR code for checking the integrity of the ticket.
Keywords: CVMs, ATVMs, M-ticketing by UTSonmobile application by CRIS.
Abstract
SMS Based Remote Mobile Phone Data Access System
Tejas Supe, Akshay Shinde, Ashwith Shetty, Prof. Manisha Sonawane
DOI: 10.17148/IJARCCE.2016.5312
Abstract: A mobile phone to send and receive text message, with wide coverage area, high reliability, high popularity, easy development, low expenditure and other characteristics using Short message service (SMS) technology. Using GSM module or network platform of short message, messages can be sent and received between the computer and the mobile terminal. This paper has realized and designed a set of remote SIM card�s Address Book access system based on SMS communication. The remote mobile phone data access system can also be programmed to send specific SMS to predetermined number if any event .If your mobile phone is not available at the moment and you need to call a person urgently whose contact number is not available at that instant. To get that specific contact you have to go through very tedious process of calling home or where you�re mobile are left and get that contact number etc. The proposed remote mobile phone data access system project helps to simplify this problem. You have to send an SMS to your own mobile get contact with the contact name and automatically that contact will be returned to the same number.
Keywords: Short Message Service (SMS); General Packet Radio Service (GPRS); Global Positioning Service (GPS); Multimedia Message Service (MMS); Global System for Mobile Communications (GSM); Remote control; Text message;
Abstract
Network Architecture for SCADA Implementation
Prof. D.G. Chougule, Mr. Kunal D. Patil
DOI: 10.17148/IJARCCE.2016.5313
Abstract: This paper describes the implementation of distributed control systems with network architecture as compared to traditional systems with a central processor. A use of standard protocol, CAN, is briefly presented for industrial automation and compared over other techniques. The work is presented the implementation of smart sensors for monitoring various parameters and for communicating among them self using the CAN protocol. It is protocol of serial communication that allows the control of systems distributed in real time with high level of safety.
Keywords: Wireless communication, Zigbee, RF, SCADA, CAN Protocol.
Abstract
Video Based Behaviour Modelling System for Drug Testing Application
Prof. P. P. Waghralkar, Dhanishatha Hejib, Manali Joshi, Sugam Dhole, Bramhanand Karlekar
DOI: 10.17148/IJARCCE.2016.5314
Abstract: Behavioural modelling is used in every aspect of human life, system design, testing, verification in all domains. The behavioural modelling can be created with respect to time and change of the object. In this paper we are going to analyse the behaviour of the object with respect to time and its behavioural change. Also the analysis will be based on object tracking method. We examine this analysis for to study the animal behaviour. The purpose of the system is also to observe the micro movements of the objects. We also have done the detection of the live object and the tracking of live object. Also the live video has been captured. It allows the recording of activity, events, behavioural interactions and performs the calculations of wide range of analysis parameters. Some parameters are provided like eating food, drinking water, resting and based on these parameters the behaviour of the object will be recorded respect to time and change.
Keywords: Behavioural Modelling, Object Tracking, Video Analysis, Computer Modelling.
Abstract
Data Mining and Pattern Recognition Techniques Using GIS/RS
Mr. N.K. Gupta, Sachin Kumar, Anshu Verma
DOI: 10.17148/IJARCCE.2016.5315
Abstract: Data Mining techniques is one of the major research domain and in the recent past it is useful in extracting the implicit and very helpful/handy information to increase the knowledge of the human beings, as it increases the knowledge base of the system to some certain levels about the particular database system and its subsets which further increases the chances of the new inventions as the data analyser analyses the extracted information. Artificial Intelligence is one of the invented techniques by the studied of the data mining techniques. Data Mining extracts the implicit information from the database which analysed manually using statistical techniques of the mathematics. Due to the technology advancement, semi-automated data mining came into existence but it was not enough to support as the storage led to the analysis demands which leads to the failure of the semi-automated data mining. After sometimes, fully automated data mining were developed which supports the analysis demands by the users on the large storage of the data. In this paper, data mining and pattern recognition techniques/methods are shown here to search the lost living beings and non-living beings and also exploits the unseen and untold facts about the earth. The use of the GIS/RS technologies are used to show the definite and exact locations of the objects found in the unknown and non-visited areas.
Keywords: Data mining, Pattern Recognition Techniques, Decision Trees, GIS, RS imagery, knowledge base system, LIDAR.
Abstract
Integrating Computer Game-Based Learning into Educational System
Saurabh Karlekar, Rutwik Deokar, Mithil Jadhav, Prof Savita Sangam
DOI: 10.17148/IJARCCE.2016.5316
Abstract: The attention to computer game-based learning has grown as research continues to demonstrate its effectiveness for education. Games have been proven to be an effective tool in amplifying regular or traditional teaching methods. However, prior to the development of such educational game, in order to be effective, it is essential that such teaching skills are addressed first and implemented into the game design process. Educational games cannot be designed and developed by instructional designers alone, or just by a game developer. It requires both the instructional designer and game developer to be equally involved during the design stage. This paper presents a logical summary of the phases involved in the Instructional Design Process and Tasks, and the Game Design Process of a game. This paper also includes a short overview of the Game Concept and Design Document and discussed how it can be adapted for an educational system. Teachers know little about game development, and the game developers know little about the science of teaching and learning. So a proper communication should be made between the two in order to create a content which plays very well and interests students but also at the same time teaches them concepts in a way that the teachers want to.
Keywords: Motion Gaming , Leap Motion , Unity 3D, hand detection, sensors, infrared.
Abstract
Network Security, A Challenge
Harish Singh
DOI: 10.17148/IJARCCE.2016.5317
Abstract: The Internet is expanding with a tremendous speed so as its Security. Security is an important field that consists of the provisions made in underlying computer network infrastructure, policies adopted by the network administrator to protect the network, the network-accessible resources from unauthorized access and the effectiveness of these measures combined together. Personal, government, and business applications continue to multiply on the Internet and these work-based application and services can pose security risks to individuals and to information resources of companies and governments. Information is an asset that must be protected. Network security is more challenging than ever, as today�s corporate networks become increasingly complex.
Keywords: Internet, Network Security, Firewall, Attacks, Threats, Phishing, DoS, Cookies.
Abstract
Classification and Detection of Oil Spills Using Artificial Neural Network (ANN)
Prof. Uttara Gogate, Priyanka Desai, Madhura Gawde, Sailee Harne
DOI: 10.17148/IJARCCE.2016.5318
Abstract: Oil spills represented a greater threat to marine ecosystem and their health. From the recent incident in the Gulf of Mexico, the adverse effects of oil spills on the nature are imminent. Synthetic Aperture Radar (SAR), a high resolution remote sensing imagery, can be effectively used for the detection and classification of oil spills. Pollution caused by Oil spills may appear as dark spots in SAR images. However, these images may contain numerous contents which very closely might resemble to oil spill area, resulting in misidentification. The main aim of paper is the development of algorithms to distinguish oil spills from �look-alikes. This paper, with the help of two different Artificial Neural Networks (ANN), describes the development of a new approach to SAR oil spill detection. The first ANN identifies the pixels of a SAR image belonging to candidate oil spill features. The second ANN, on the basis of the feature parameters, classifies objects into oil spills and their look-alikes.
Keywords: Artificial Neural Network, Synthetic Aperture Radar (SAR) imagery, Edge detection, Adaptive thresholding, Image segmentation.
Abstract
Minimising Industrial Power Consumption Penalty by Engaging APFC Unit
Shivani Yeole, Shraddha Sambare, Shreya Nandeshwar
DOI: 10.17148/IJARCCE.2016.5319
Abstract: Power is the basic necessity for the economic development of country. Power consumption is increasing day by day at a very high rate. The modern system is so much dependent upon the use of electrical energy that it has become the part and parcel of our life. So we need to find out the causes of power loss and improve the power system. Due to industrialization the use of inductive load increases and hence power system losses its efficiency. So we need to improve the power factor with a suitable method. Now a days, the embedded is very much popular and most of the product are developed with microcontroller based embedded technology.
Keywords: Automatic power factor correction, zero crossing detector, microcontroller, embedded technology, capacitor bank.
Abstract
Web Page Template Generation and Detection of Non- Informative Blocks Using Trinity
Sheetal Patil, Prof. Gauri Rao
DOI: 10.17148/IJARCCE.2016.5320
Abstract: The Search engine is a program which searches specific information from huge amount of data. The use of internet is very large with the help of different web sites or web pages get lots of information within seconds. Hence for getting results in an effective manner and within less time this technique is used. Getting useful information from World Wide Web is very difficult task. Therefore for overcoming this type of problem, web extraction concept is used. It extracts useful information from collection of large data. Information extraction has become an important task for discovering knowledge or information from web. In the proposed system, one or more documents collected by the same server side template and then regular expression are created with modules. It and can later be used from similar documents. This technique not provides relevant data but searches shared pattern and divides into three sub parts and then apply different ranking function and store it into data base. It is also remove useless noise from web pages like advertisement, navigation, and unwanted links. This technique gives more effectiveness as compared to other web extraction techniques.
Keywords: Web data extraction, Automatic wrapper generation, Unsupervised learning.
Abstract
Unconventional Tasks and Challenges Faced by Big Data in Medical Science
Sukhpreet Singh, Manjeet Kaur, Inderjeet kaur
DOI: 10.17148/IJARCCE.2016.5321
Abstract: Big Data can be combined with new technology to bring about positive conversion in the health care segment. A technology aimed at making Big Data analytics a certainty will act as a key element in transforming the way the health care industry operates today. The study and analysis of Big Data can be used for tracking and managing population health care effectively and efficiently. This also plays a vital role in delivering preventive care. Health care will change a great deal as it becomes a data-driven industry. But the size of the data, the speed at which it�s growing and the threat it could cause to individual privacy mean mastering it is one of biomedicine's most critical challenges. Hiding within this huge amount of data is knowledge that could change the life of a patient. Health information that can be extracted from patient records is another rich resource of data. In my research I would explore how big data can enhance healthcare segment in country like India which has a huge population and huge medical complexities. I addition to this I would also explore problems faced by big data, obstacles in using big data in the health industry, how big data analytics can take health care to a new level by enhancing the overall quality of patient care. Today, a significant proportion of the cost and time spent in the drug development process is attributable to unsuccessful formulations. By enabling researchers to identify compounds with a higher likelihood of success, Big Data can help reduce the cost and the time to market for new drugs. Also, by integrating learning from medical data in the early stages of development, researchers will now be able to customize drugs to suit aggregated patient profiles.
Keywords: Big Data, framework, medical science, EMR, HIS.
Abstract
Immediate Accident Precision over Medical Application for Android Technology
Mrs. G. Dhanalakshmi, C. Archana, G. Deepalakshmi
DOI: 10.17148/IJARCCE.2016.5322
Abstract: With the rapid development of society, there are some side-effects including the increasing number of car accidents. On average one out of every three motor vehicle accidents results in some type of injury. There are many solutions proposed to avoid the problem. Many lives are lost due to improper post-accident signaling and tracing out the exact location. Our project provides solution for the above stated problem which involves intimating the nearby hospitals and relatives by giving the accident location of vehicle using GSM and GPS technologies. Heart of our project is the android app where we can use the existing internal hardware modules like GPS, GSM etc. to get/send the required information to the concerned persons. Our system as stated above consist of two units namely Crash Detector and Android Control Unit. Crash Detector is responsible for detecting the accident condition using three-axis accelerometer sensor and one false alarm switch details of which is mentioned in system architecture. Android Control Unit send the accident notification to the victim�s android phone where an android app will get the GPS location of accident spot and get nearby hospital�s location around 5KM and send the notification in the form of SMS. We also send the intimation to their relatives as well hence avoiding any chance of mislead and/or no communication after the accident.
Keywords: Global Positioning System (GPS) System, Global System for Mobile Communication (GSM), Smart Phone, Crash Detector, Android Control Unit, False Alarm.
Abstract
Abuse Free Fair Contract Signing Protocol
Aiswarya.V, R. Priyanka Raj, Reshma.S, Sreeka.S.Mohan, Remya.R
DOI: 10.17148/IJARCCE.2016.5323
Abstract: A fair contract signing protocol allows two potentially mistrusted parties to exchange their commitments to an agreed contract over the Internet in a fair way so that either each of them obtains the others signature or neither party does. The existing protocols face the problem of more number of transactions in between TTP and party. Also the time complexity and computational complexities are more. In this paper we are proposing a fair contract signing protocol based on secret sharing scheme. The proposed method satisfies property of abuse freeness and fairness. That is if the protocol is executed unsuccessfully, none of the two parties can show the validity of intermediate results to others. The proposed scheme is more reliable, secure and less complex.
Keywords: Fair-exchange protocols, digital signatures, security, privacy preserving, dynamic groups.
Abstract
Third Party based Model for Security in Cloud Computing Environment
Pragya Pateriya, Mr. Anil Panwar
DOI: 10.17148/IJARCCE.2016.5324
Abstract: In this paper we give a survey of third party based model for security in cloud computing environment. Cloud Computing is becoming the heart or the central theme for all sort of computing. Cloud is a remote place, at which user can upload data, can download data, can do processing of data, etc. Cloud provides space, computing power, platform and many more services on rent. This paper presents a brief introduction to the concept of clouds & its services. This paper also presents the issues related to the security of data in cloud environment. A few modern attribute based encryption models for the data security have been discussed.
Keywords: cloud security, third party based model, encryption, decryption method, key generation.
Abstract
NFC- Based Attendance System
Prof. Krishna Tripathi, Bijoy Kunnappillil, Rohit Meshram, Vicky Bhoir
DOI: 10.17148/IJARCCE.2016.5325
Abstract: The number of students enrolling in educational institutions is always increasing every year. As the attendance records of a student indicate the punctuality and discipline of a student, teachers use attendance in giving out final grades and so it has become necessary to device newer and better technologies for recording student attendance and maintaining records. Usually attendance is taken using paper sheets and then the record is manually updated into a register or a system. This method is however time consuming and flawed in many ways. This paper focuses on harnessing the potential of the ever increasing technology of NFC into building a portable attendance system which tries to erase many of the flaws in the conventional method of taking attendance and makes the procedure more concrete and automatic. Portable devices like an NFC enabled smart phone can be used to implement this project.
Keywords: NFC, NFC Card, NFC Card Number, Attendance.
Abstract
XACML Based Solutions for Multiple Environment
Dr. S. Sivasubramanian, S. Geetha, S. Hari Priya
DOI: 10.17148/IJARCCE.2016.5326
Abstract: Online Collection and Publication of data about individuals may reveal sensitive information about users. In-line with different access scenarios health-Science data is a known example. When searching for information online atomically the Sensitive data may not be revealed but when integrating the data from different web-servers the sensitive information may be revealed. So privacy policy is needed when accessing data online. XACML is a privacy policy language that is used to provide access control to the users by dynamically evaluating rules and Policies.
Keywords: Context, Data, Privacy, Web Service.
Abstract
Enhancing Cloud Data Security Using Elliptical Curve Cryptography
Ms. Nikita N Chintawar, Ms. Sonali J Gajare, Ms. Shruti V Fatak, Ms. Sayali S Shinde, Prof. Gauri Virkar
DOI: 10.17148/IJARCCE.2016.5327
Abstract: Cloud computing is one of the hottest technology of the IT trade for business. Cloud computing security has changed into a popular topic in sector and academic research. Cloud Computing is a conceptual service based technology which is used by many companies widely these days. ECC algorithm provides secure communication integrity and authentication, along with non_repudiation of communication and data confidentiality. ECC is known as a public key encryption technique based of Elliptical Curve theory that can be used to create speedy, tiny and more efficient cryptography key. It has three protection points: authentication, key generation and encryption of data. This paper will create cloud security and data security of cloud in cloud computing by creating digital signature and encryption with elliptical curve cryptography.
Keywords: Cloud computing, Data security, Cloud security, Encryption, Decryption, Elliptical Curve Cryptography, Digital signature.
Abstract
Traffic Analysis Using Multicast Routing For Mobile Ad Hoc Network
D. Karuppaiah
DOI: 10.17148/IJARCCE.2016.5328
Abstract: Several obscurity enhancing techniques are projected supported packet cryptography to shield the communication obscurity of mobile ad hoc networks. However, we have a tendency to show that MANETs are still vulnerable below passive applied mathematics traffic analysis attacks. Statistical procedure works passively to perform traffic analysis supported applied mathematics characteristics of captured raw traffic. A statistics technique is capable of discovering the sources, the destinations, and also the end-to-end communication relations. Empirical studies demonstrate that statistics technique achieves sensible accuracy in revealing the hidden traffic patterns for anonymous communication. Tagging attacks are requiring to at least one attacking node. The method is mainly focused on the tagging attacks for the message traversing path.
Keywords: Mobile Unintentional Networks, Anonymous Communication, Tagging Attack.
Abstract
An Automated System to Filter Unwanted Message from OSN User wall
S.B. Madankar, Anupama Mishra, Apurva Bhandari, Reshma Chaudhari, Aishwarya Kulkarni
DOI: 10.17148/IJARCCE.2016.5329
Abstract: One fundamental issue in today On-line Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now OSNs provide little support to this requirement. To overcome this problem, we propose a system allowing OSN users to have a direct control on the messages posted on their walls. This is achieved through a flexible rule-based system, that allows users to customize the filtering criteria to be matter-of-fact to their walls, and a Machine Learning based soft classifier automatically labelling messages in content-based filtering.
Keywords: Facebook, Filtered walls, Machine Learning, Filtering Rules, Text Categorization.
Abstract
Survey and Taxonomy of Feature Selection Algorithms in IT log analytics
Mrs.S.Nithya Roopa, P.Karthika, S.Monisha
DOI: 10.17148/IJARCCE.2016.5330
Abstract: Feature selection is an important for high dimensional dataset. The best subset contains the least number of dimensions that highly contributes to the accuracy and so the remaining unimportant dimensions are ignored. Selecting relevant features from unlabelled data is a challenging task due to the absence of label information by which the feature relevance can be assessed. The unique characteristics of IT log further complicates the challenging problem of unsupervised feature selection, (e.g., part of IT log data is linked, which makes invalid the independent and identically distributed assumption), bringing about new challenges to traditional unsupervised feature selection algorithms. In this paper we compare the performance of Linked Unsupervised feature selection algorithm [1]and feature selection using feature similarity [2].We perform experiments with IT log dataset to evaluate the effectiveness of the both the frameworks.
Keywords: IT log analysis, high dimensional, unlabelled data, attribute-value.
Abstract
PLC based Control of Motors in Cranes using Remote Control
M.I.Akhilya, S.P.A.Hemalatha, P. Ramesh babu
DOI: 10.17148/IJARCCE.2016.5331
Abstract: EOT (electrically overhead trolley) or Crane is used to lift and move materials in industries. For efficient operation, an induction motor with VVVFD in industrial applications. The relay logic in crane control is implemented using PLC .This method is controlled by using remote system.
Keywords: Variable Voltage Variable Frequency Drive (VVVFD), Programmable Logic Controller (PLC), Human Machine Interface (HMI), Radio Frequency (RF) & Peripheral Interface Controller (PIC).
Abstract
Efficiency of Classification Techniques in Detecting Congestion in Wireless Sensor Networks
Mrs. Jayashri B. Madalgi and Dr. S. Anupama Kumar
DOI: 10.17148/IJARCCE.2016.5332
Abstract: Wireless Sensor Network (WSN) is network of hundreds/thousands of sensor nodes. Each node is capable to sense, process and transmit the environmental information. Congestion occurs in wireless sensor networks when an event occurs. Congestion leads to performance degradation of a system. The data mining techniques help to detect congestion and then it can be mitigated by adjusting transmission rate. In this paper we analyze the efficiency of data mining classification to detect the congestion in WSN. In this paper we have implemented PART, RIPPER and j48 classification algorithms to detect the congestion over the network. For the given data set, it is found that PART algorithm is more accurate than RIPPER and j48 in detecting the congestion.
Keywords: WSN, Data mining, Congestion control, classification, PART, RIPPER, j48 algorithm.
Abstract
A Novel Method of Brain Tumor Detection from MRI Images Using Fuzzy C Means Clustering and Neural Networks – A Survey
Ramya R, Kavitha Bai A S
DOI: 10.17148/IJARCCE.2016.5333
Abstract: Magnetic Resonance Imaging (MRI) is the major technique to detect the brain tumor. In the proposed system classification of MRI images are done using data mining techniques. A new hybrid technique is proposed based on neural networks and fuzzy c-means for brain tumor classification. The proposed algorithm is a combination of neural networks and fuzzy c-means clustering. In the proposed algorithm an image is enhanced using enhancement techniques such as mid-range stretch and contrast improvement. Double thresholding and morphological operations are used for skull striping. Fuzzy c-means clustering (FCM clustering) is used for the segmentation of the image to detect the suspicious region in MRI images of the brain. Gray level run length matrix (GLRLM) is used for extraction of feature from the brain image, after which neural networks technique is applied to classify the brain MRI images, which provide accurate and more effective result for classification of brain MRI images.
Keywords: Data mining, MRI, Neural networks, Gray level run length matrix, Fuzzy c-means clustering.
Abstract
Secure Cloud Storage via Deniable Attribute Based Encryption with Efficient Revocation
Aswathy S, Thahsin V P, Veena Gopakumar, Suja Rani
DOI: 10.17148/IJARCCE.2016.5334
Abstract: Cloud computing, also known as �on-demand computing�, is a kind of internet based computing, where shared resources, data and information are provided to computers and other devices on demand. As cloud computing brings ease and cost-saving features, the security and privacy of data is simultaneously becoming very challenging. For providing privacy, many encryption schemes have been proposed. Most of them assume that it provides proper security and cannot be hacked by any unauthorized users, but in practice, some authorities may force cloud providers to reveal user secrets in some circumstances. Here in this paper we propose an encryption scheme which convinces the fake users by providing fake details to the unauthorized users and provide efficient revocation schemes. Thereby we can make our data more secure and private and can be protected from unauthorized users.
Keywords: ABE, CP-ABE, KP-ABE, LSSS.
Abstract
A Review Paper on Project LOONS
Prof.Mrs.A.G.Andurkar, Miss PrachiZodpe
DOI: 10.17148/IJARCCE.2016.5335
No abstract available.
Abstract
Speech Based Interactive System for Physically Challenged People
Prasanna Deshmukh, Swapnil Shedge, Pranav Dhole, S. P. Patil
DOI: 10.17148/IJARCCE.2016.5336
Abstract: In a study about how humans and robots can successfully interact to accomplish specific tasks is important in creating more sophisticated robots that may eventually become a part of human society. Advances in human-computer interaction technologies are being extensively used in improving human�robot interaction (HRI). This paper demonstrates an interactive and always on system that helps people to carry out specific tasks like check Facebook notification, weather, news, etc. by using natural voice commands effortlessly. The main objective of this work is to help physically disabled people to interact with the system without any physical contact. The system uses speech recognition to get the query, processing is done using cloud based third party services and Text-to-Speech (TTS) is used for the results.
Keywords: Human-Robot interaction, Text-to-Speech, Speech-to-Text, Cloud Services, Raspberry pi.
Abstract
Ranking and Mapping of Hotels & Restaurants Using Approximation Algorithm
Prof. Reena mahe, Abhijeet Javlekar, Pratik Dabholakar, Madhav Kantak, Jayesh Dhawase
DOI: 10.17148/IJARCCE.2016.5337
Abstract: Keyword queries on databases provide easy access to data, but often suffer from low ranking quality, i.e., low precision and/or recall, as shown in recent benchmarks. It would be useful to identify queries that are likely to have low ranking quality to improve the user satisfaction. For instance, the system may suggest to the user alternative queries for such hard queries. In this paper, we analyze the characteristics of hard queries and propose a novel framework to measure the degree of difficulty for a keyword query over a database, considering both the structure and the content of the database and the query results. We evaluate our query difficulty prediction model against one effectiveness benchmarks for popular keyword search ranking methods. Our empirical results show that our model predicts the hard queries with high accuracy. Further, we present a suite of optimizations to minimize the incurred time overhead. We also provide mapping methodology for hotels and restaurants which will be used for getting directions with the help of Google Maps.
Keywords: Query performance, query effectiveness, keyword query, robustness, databases,Google Maps.
Abstract
3D Face Recognition under Expressions, Occlusions, and Pose Variations
Prof. Diksha Bhave, Rasika Choudhary, Rupali Gavali, Pallavi Gholap
DOI: 10.17148/IJARCCE.2016.5338
Abstract: We propose framework for analysing 3D faces, with the specific goals of comparing, matching, and averaging their shapes. Here we represent facial surfaces by radial curves emanating from the nose tips shape analysis. Here we detect facial deformations and large facial expressions large pose variations, missing parts, and partial occlusions due to glasses, hair, and illustrates the use of radial facial curves on 3D meshes. Here we represent facial surface by indexed collection of radial geodesic curves on 3D face meshes emanating from nose tip to the boundary of mesh and eyes and compare the facial shapes by comparing shapes of their corresponding curves. Here we using MATLAB for implementing our project.
Keywords: Occlusion- Blockage due to which image can not be properly seen. Pose Variation- Different views of the same image. Euclidean Distance- Distance between two points in Euclidean space. Face Recognition - a type of biometric software application that can identify a specific individual in a digital image by analysing and comparing patterns.
Abstract
Securely Eradicating Duplication by Generating File Tags and Tokens over Hybrid Cloud Using Security Algorithm
Madhuri Ghodke, Priyanka Bais, Abhirupa Saha, Poonam Singh, Prof. G.M. Gaikwad
DOI: 10.17148/IJARCCE.2016.5339
Abstract: A composition of two or more clouds i.e. private and public that remains distinct entities but are bound together, providing advantages of number of deployment models is called Hybrid Cloud. Eliminating duplicate copies of repeating data to save storage can be managed by data deduplication which is a specialised data compression technique. Existing system shows that each user will be issued private keys for their corresponding privileges. These private keys can be used for generating file token for duplicate checking. However, during file uploading, the user needs to use file tokens for sharing with other users with privileges. To compute these file tokens, the user needs to know the private keys. This restriction leads the authorized deduplication system unable to be widely used and limited. This failure can be overcome by implementing block level deduplication which eliminates duplicate blocks of data that occur in non-identical files. New deduplication algorithms supporting authorized duplicate check in hybrid cloud using token number and privilege key are used such as SHA1 and AES algorithms. SHA-1 produces a 160-bit hash value known as message digest. AES algorithm will be used to convert a given plaintext of 256 bit into cipher text of 256 bits. Thus we will implement a deduplication construction supporting authorized duplicate check in hybrid cloud architecture.
Keywords: Data Owner Module, Encryption and Decryption module, Remote User Module, Cloud Server Module.
Abstract
A Review Paper on Text Summarization
Deepali K. Gaikwad and C. Namrata Mahender
DOI: 10.17148/IJARCCE.2016.5340
Abstract: Text summarization is a process of extracting or collecting important information from original text and presents that information in the form of summary. Text summarization has become the necessity of many applications for example search engine, business analysis, market review. Summarization helps to gain required information in less time. This paper is an attempt to summarize and present the view of text summarization from every aspect from its beginning till date. The two major approaches i.e., extractive and abstractive summarization is discussed in detail. The technique deployed for summarization ranges from structured to linguistic. In Indian many languages also the work has being done, but presently they are in infancy state. This paper provides an abstract view of the present scenario of research work for text summarization.
Keywords: Text Summarization, Natural Language Processing, Extractive Summary, Abstractive Summary.
Abstract
iBeacon: Newly Emerged Technology for Positioning and Tracking in Indoor Place
Mr. Sehul A. Thakkar, Mr. Sunil Patel, Mr. Brijesh Kamani
DOI: 10.17148/IJARCCE.2016.5341
Abstract: Indoor tracking is a variant of wireless tracking. It is an excellent way to monitor and track the location of people or valuable objects within a specific area, such as a building, hospital etc. where no other positioning technology works like GPS. Bluetooth Low Energy(BLE) is the newly emerged technology in the context of indoor tracking. Indoor tracking can be achieved when scattering BLE device such as iBeacons, which is attached to particular asset in various location of particular area. The Received Signal Strength Indicator (RSSI) is the parameter used as basis for the positioning and tracking approaches.With an iBeacon tag attached on asset, it is possible to track asset by various RSSI algorithms and techniques. The Web-Application or Android Application can be introduced to analyze the result of asset tracking.
Keywords: iBeacon, BLE, Indoor, RSSI, Asset.
Abstract
Game-Theoretic Pricing for Streaming Videos in Mobile Networks
Vinesh Bagul, Ravindra Bule, Akash Chavan, Swapnil Gholap
DOI: 10.17148/IJARCCE.2016.5342
Abstract: The main aim of project is to develop an application that prevents the unauthorized user to access the video content. It provides functionality that each registered user will access the video content by paying some amount and unregistered user not able to see this video. For this purpose, each user is provided a login account with login ID and password access.
Keywords: Video-Stream Redistribution Game, Equilibrium Analysis, H.264/AVC video and AAC LC audio.
Abstract
A Review- Patch Based Image Denoising Using Pixel-Wise Weighting Approach
Kapil Chavan, Prashant Paikrao
DOI: 10.17148/IJARCCE.2016.5343
Abstract: Many of the Patch based image denoising algorithms filter overlapping image patches and aggregate multiple estimates for the same pixel via weighting. Current weighting and filtering approaches assume the restored estimates as independent random variables, which is not convenient with the reality. In this paper, we consider the correlation among the estimates and propose model to estimate the Mean Squared Error under various weights of the image patches. This model identifies the overlapping information of the patches, and then use the optimization to try to minimize the MSE. We propose a new weighting approach based on Quadratic Programming, which can be embedded into various denoising algorithms.
Keywords: Patch based, Mean Squared Error (MSE), Weighting, Bias variance model, Filtering, Weighting.
Abstract
Penetration Testing
Ms. Sarabjit Kaur, Mr. Sangram Singh
DOI: 10.17148/IJARCCE.2016.5344
Abstract: Penetration tests are an excellent method for determining the strengths and weaknesses of a network consisting of computers and network devices. However, the process of performing a penetration test is composite, and without care can have disastrous effects on the systems being tested. The goal of this is not to cause damage, but more to identify attack surfaces, vulnerabilities, and other security weaknesses from the perspective of an attacker. Such testing can range across all aspects of a system; the areas of computer, operational, personnel, and physical security can all encompass potential weaknesses that a malicious attacker can use, and thus a penetration tester may examine. Depending on the organization's prime concern, risk assessment, and policies, some of these areas may be out of scope or not deemed as important, so a decreased scope penetration test may be conducted.
Keywords: pen testing; network security; vulnerability; testing; pen testing tools.
Abstract
Securing Cloud Data using Crypto-Stegno based Technique
Kirti Kini, Meera Mithani, Rinali Naik, Divyata Raut, Prof.M.K.Kumbar
DOI: 10.17148/IJARCCE.2016.5345
Abstract: In our Paper, the problem of transmitting redundant data over an in Secure, bandwidth-constrained communications Channel is discussed. A content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least signicant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. Using data hiding key the receiver can extract additional data even the receiver has no information about the original image content. Using the decryption key the receiver can extract data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryptions key, the receiver can extract the additional data and the original image without any loss.
Keywords: Content owner, data-hider key, decryption key.
Abstract
Fully Anonymous Profile Matching In Social Network
Deepak Thorat, Alok Salvi, Pradeep Shingade, Swapnil Gholap
DOI: 10.17148/IJARCCE.2016.5346
Abstract: In this paper, we study how the user profile matching is done with privacy-preservation in mobile social networks(MSNs).We propose two techniques for comparison of profile i.e Explicit comparison based profile matching protocol (eCPM) runs between two parties a initiator and a responder. In this method initiator obtain the comparison-based matching result about the specified attributes in their profiles, while preventing their attribute values from disclosure. The profile matching based on implicit comparison protocol (iCPM) allows the initiator to directly obtain some messages instead of the comparison result from the responder.
Keywords: Mobile Social Networks (MSNs), Explicit comparison based profile matching protocol (eCPM), implicit comparison protocol (iCPM).
Abstract
Secure Big Data Processing Through Homomorphic Encryption in Cloud Computing Environments
J. Josepha Menandas, J. Jakkulin Joshi
DOI: 10.17148/IJARCCE.2016.5347
Abstract: With the fast development of rising applications like informal community examination, semantic Web investigation and bioinformatics system investigation, an assortment of information to be handled keeps on seeing a speedy increment. Viable presents a few major information handling techniques from framework what's administration furthermore, investigation of vast scale information represents a fascinating however basic challenge. As of late, Big Data has pulled in a great deal of consideration from the scholarly world, industry and additionally government. This paper more, application viewpoints. To start with, from the perspective of cloud information administration and enormous information preparing systems, we show the key issues of enormous information preparing, including distributed computing stage, cloud structural planning, cloud database and information stockpiling plan. Taking after the MapReduce parallel preparing structure, we then present MapReduce streamlining techniques furthermore, applications reported in the writing. Then we use standard encryption methods when we transferred to the cloud to secure the operations and the storage of data. Homomorphic Encryption is used to perform functions on encrypted data. Here we provide various homomorphic encryption schemes available on cloud computing environment for secure data processing. At last, we discuss and find the best homomorphic encryption method in cloud computing environment in big data.
Keywords: Big Data, Map Reduce, Homomorphic Encryption.
Abstract
Mobile Tracking Based on Phone Theft Detection
B. Srilekha, Dr. V. Dhanakoti
DOI: 10.17148/IJARCCE.2016.5348
Abstract: Lots of Applications are developed to track a Smart phone but still it is a major concern. User has to manually report to the customer care to block the IMEI Number of the lost Phone. So that, Android Application is deployed with initial registration of Alternative Mobile numbers. An Application which is deployed in the mobile devices can be able to Track the current location of the device. If the robber changes the SIM card, immediately then location details are sent to the alternative Phone number of the original User. In this paper, both the logic of tracking the Theft Phone with SIM Card & Theft Phone with changed SIM Card is tracked continuously. The registered mobile numbers can get the SMS alert from the Theft Mobile. This process is reworked continuously to track the android mobile phone.
Keywords: Location tracking, Android, Smart Phone, Context, Tracking.
Abstract
Centralized Control and Digital Registration For Vehicles
Albina Sebastian, Anees Faisal K, Kiran Johnson A, Sikha Suresh, Nihil T M, Lintumol P N
DOI: 10.17148/IJARCCE.2016.5349
Abstract: Due to the large use of vehicles, government enforces several laws to avoid serious harmful situations to human life. But in day-today life the public and police find much difficulty to keep these laws. Though there are several methods for keeping up these laws, most of these methods are not foot proof. Therefore, here we propose an idea that can technically solve the whole problems and mess in the law enforcement of motor vehicle departments beside, it can help for both public and the vehicle users in a variety of ways. Also in future, it can be modified to any desired level with minimum expenditure. The core idea is that each and every vehicle in the nation should have a unique digital ID which may be the same as the registration number. This unique ID should be encoded in an embedded system designed as per the standards of government regarding this product and it will increase the security of the product. Vehicles manufactured without this circuitry should not be eligible for registration or fitness. This embedded system in the vehicle contains some sub-circuits such as RFID Reader,GPS Chip, Alcohol Detector, Accelerometer, Display etc. which performs functions such as automatic speed limit according to different zones , concentration based warning on dangerous blind spots , automated rash drive penalty, detection of drunken drivers, force-stopping any desired vehicles by department, can recover a stolen vehicle, checking the validity of license, traffic block and location based alert to the driver, automatic accident detection and rescue service which all aredone in connection with stationary RF transceivers which is placed on the road side at a particular distance apart. Thus the system discussed in our project will not only very helpful in solving the problems faced in the law enforcement of motor vehicle department but also of assistance to drivers and public.
Keywords: ECU, GPS, RFID.
Abstract
Using Binarization Method Rebuilding of Historic Document Images
Sireesha R, Haritha G, Manasa K
DOI: 10.17148/IJARCCE.2016.5350
Abstract: The segmentation of the text from the historical degraded image documents is a very challenging task because the variations between the foreground text and background text are hard to determine. In this paper we have implemented a new segmentation algorithm to analyze and extract the words from a degraded image; the process carried here is the image contrast which is adaptively found to solve the issue. Initially the contrast map is taken from the degraded document images. The combination of local image gradient and the local image contrast is the adaptive image contrast, and then it is converted to binary level and combined with canny edge detecting algorithm to extract text edge pixels. The document text is further segmented by a local threshold that is estimated based on the intensities of detected text stroke edge pixels within a local window.
Keywords: Binarization, Otsu threshold, canny edge detector, document enhancement.
Abstract
Face Recognition Utilising Motion Blur, Illumination and Pose
Mekha Unnikrishnan, Minu Mariya Thomas, Reenu Sara Rajan, Sudhin Sara Kurian, Muth Sebastian
DOI: 10.17148/IJARCCE.2016.5351
Abstract: The existing face recognition techniques cannot deal with non-uniform blurring conditions which arise from tilts and rotations in cameras. Different factors such as exposure time, stability of the platform and user experience affects the degree of blurring. In this paper a method is proposed for face recognition across motion blur, variations in illumination and pose. Images of different persons are collected and stored in the gallery. The probe set is formed using the set of above images with different blur, illumination and pose. One image among the probe set is selected and its blur is estimated using hessian matrix. A threshold value for blur is fixed. If amount of blur is greater than threshold then the estimated blur is applied to the entire gallery. The LBP (local binary pattern) features of the blurred gallery images and the given probe image is extracted and the distance between them is calculated. The gallery face which gives the minimum distance is recognised as the probe face. If the blur is less than the threshold, gaussian filter is applied to the probe image and DCT is calculated. The 3/4th of the probe image as well as all the gallery images is cropped. The HOG of LBP is found out from the cropped probe image. DCT (Discrete Cosine Transform) and HOG (Histogram of Gaussian) of LBP forms the extracted feature set. PCA (Principal Component Analysis) is used to reduce the dimension of the feature set. The feature so obtained is compared with the RDF model of all the gallery images and thus the correct user is found out.
Keywords: Blur estimation, face recognition, illumination, LBP, motion blur, pose.
Abstract
Security in Wireless Sensor Networks: Attacks and Solutions
Swati Bartariya, Ashutosh Rastogi
DOI: 10.17148/IJARCCE.2016.5352
Abstract: To many thought provoking problems, Wireless Sensor Networks have become a feasible solution. However, the deployment of new technology without security has often proved to be immoderately dangerous. WSN have recently attracted a lot of interest to the researchers due to wide range of applications. In this paper, we identify the security threats and attacks in WSN. Security solutions are also discussed and we also provide a brief discussion on the future research direction in WSN security.
Keywords: Wireless Sensor Network, Security, Sybil, Wormhole, Sinkhole.
Abstract
Online Search and Recommendation in Consumer Market
Abhishek Jadhav, Akshay Gaikwad, Omkar Barve, Prashant pagar, R.M.Samant
DOI: 10.17148/IJARCCE.2016.5353
Abstract: Recommender systems are one of the new- generation internet based tools that help users in navigating through information and receive information related to their purchase preferences. To overcome the information overload of internet-based shopping customers, we introduce a semantic recommendation based procedure which is more efficient and easier to use than available methods in the market. The suggested procedure based its recommendation of the products to the customer and is originally based on data mining techniques, like associate rule mining and frequent pattern mining. The novelty of our approach lies in providing the information of geographically nearby local markets to the users. Purchase recommendations will be also based on locality reference, and user�s purchase profile.
Keywords: Recommender System, (GSM) Global System for Mobile Communications, (GPS) Global Positioning System, ID3 (Iterative Dichotomiser 3), Machine learning, (NLP) Natural language processing.
Abstract
A Review: Local Search Metaheuristic Algorithm using GPGPU
Pramod. H. Yelmewad, ED. B. Kulkarni
DOI: 10.17148/IJARCCE.2016.5354
Abstract: Local search meta-heuristic algorithm (LSM) is the meta-heuristic approximate problems solving method used to solve real world complex problems and those problems, which come in under NP-Hard category. The drawback of using the exact algorithm (e.g., Branch and Bound) is that its computation time increases exponentially when input size is increased. Therefore, meta-heuristic algorithm significantly reduces the search space size to be explored and also the time required to search it. Although LSM finds near- optimal solution in very optimum time compared to the exact algorithm, its computation time increases when the size of input increased beyond some limit. Therefore, General Purpose Graphics Processing Units (GPGPU) based parallel computing is the best alternate way to speed up the search task. Moreover, GPGPU based computing for LSM is rarely investigated and analyzed. This paper gives detailed information about local searching strategy to solve optimization problem on GPU based computing.
Keywords: Exact algorithm, Local search meta-heuristic, GPGPU computing.
Abstract
Design of High Capacity, Reliable and Efficient Core WAN Network using DWDM
V. Ranjani, R. Rajeshwari, R. Ranjitha, P. Nalini
DOI: 10.17148/IJARCCE.2016.5355
Abstract: This paper deals about the use of DWDM technique and its design. The DWDM technique refers to optical signals multiplexed in the range of 1550nm. It works effectively in the range of C-Band which has the wavelength from 1530-1565 nm. This technique enables us to increase the throughput by decreasing the usage of the medium which is the optical fibre. It deals with the twin concept of Optical transport network and Wavelength division multiplexing. By implementing in DWDM, the network gets optimised to have extended coverage area and maximization of bandwidth. DWDM terms like throughput, latency, Bit Error Rate, Optical Signal to Noise ratio are analysed by this technique.
Keywords: DWDM (Dense Wavelength Division Multiplexing), multiplex, throughput, Optical transport network, Wavelength division multiplexing, latency, Bit error rate, Optical signal to noise ratio.
Abstract
Path Designing of Known Complex Environment by Using Hybrid of GA & PSO
Sushma Bhatt, Mr. Anil Kumar Mishra
DOI: 10.17148/IJARCCE.2016.5356
Abstract: A hybrid of Genetic Algorithm (GA) & PSO for associate optimized path designing for known atmosphere containing obstacles is conferred. The goal of our project is to seek out a best answer with best price & minimum distance to achieve destination. There are two sorts of atmosphere that are known and unknown atmosphere. Our project is based on known atmosphere. Earlier projects were supported single objective however when it involves real world,several parameters affects like temperature, humidity etc. We apply hybrid of GA with PSO. We have implemented the algorithms described in this paper and finally our approach can perform in various known environment with minimum energy and minimum distance. For the PSO parameter we have taken 500 of maximum iteration, 150 No of population (SWARM size), 1 inertia weight, 0.98 Inertia Weight Damping Ratio, c1 =1.5 Personal Learning Coefficient, c2=1.5 Global Learning Coefficient and with best cost we get result after the simulation in matlab using hybridization of GA & PSO.
Keywords: PSO, GA , Hybrid, Known Atmosphere, Single Objective, Damping Ratio, Global Learning Coefficient.
Abstract
Comparison of Performance of Feature Selection Methods
P. Karthika, Mrs. S. Nithya Roopa, S. Monisha
DOI: 10.17148/IJARCCE.2016.5357
Abstract: Feature selection is a process of selecting the relevant subset of features among all the features in a dataset. The objective of the paper is to improve the performance level, understanding and reduce time complexity, which is also known as variable selection and attribute selection. In this paper, the best performance of feature selection methods has been examined using relief, fast clustering algorithm and ranked forward search algorithm. The results of performance of algorithms is compared and given in a graph.
Keywords: Feature Selection, Performance, Algorithms, Subset Features.
Abstract
Motion Detection for Smart Video Surveillance Using Hadoop
S. Madankar1, Vaishali Kolhe, Rajashree Karande, Rohini Sonar, Snehal Salunkhe
DOI: 10.17148/IJARCCE.2016.5358
Abstract: Visual article recognition and following are vital parts of video investigation (VA) in multi-camera observation. We create framework for accomplishing these errands in a multi-camera system. Framework con?guration is unique in relation to existing multi-camera observation frameworks in and which use normal picture data removed from comparable ?eld of perspectives (FOVs) to enhance the item discovery and following execution. Notwithstanding, practically speaking, such camera setup may not be effortlessly accomplished as a result of efficient concern, topology confinement, and so on. Along these lines, we concentrate on the non covering multi-camera situation in this framework, and our fundamental target is to create dependable and strong item discovery and following calculations for such environment. Programmed object location is normally the ?rst errand in a multi-camera reconnaissance framework and foundation displaying (BM) is regularly used to remove prede?ned data, for example, item's shape, geometry and so forth., for further handling. Pixel-based versatile Gaussian blend demonstrating (AGMM) is a standout amongst the most prominent calculations for BM where object discovery is defined as an autonomous pixel location issue. It is invariant to step by step light change, marginally moving foundation and ?uttering objects.
Keywords: Hadoop, MapReduce, face detection, motion detection and tracking, video processing.
Abstract
Data Back Up and Recovery Using Seed Block Algorithm
Shraddha Rokade, Kanchan Pable, Pandit Suryavanshi, Prof.Snehal Jhaveri
DOI: 10.17148/IJARCCE.2016.5359
Abstract: Today, cloud computing is a technology in itself is gigantic surpassing all previous information technology (such as cluster, grid, distributed, etc.) of this competitive and challenging world of IT [1] .In cloud computing the information generated in electronic format are large in quantity [2]. Cloud computing is one of today most existing technologies because of its ability to reduce the cost associated with computing and the flexibility and scalability day [3] .The need for cloud computing is increasing day and advantages overcome the disadvantage of different first computing techniques [1]. Cloud storage offers online storage, which store data in the form of virtualized pool that is usually hosted by a third party [1] .The hosting company operates large data in large data centers and in accordance with customer requirements these virtualized data center resources and expose as storage pools that help users to store files or data objects [2]. As the number of users sharing the storage and other resources, it is possible that other customers can access their data. Or human error network connectivity faulty equipment, an insect or any criminal intent can put our cloud storage on the risk and danger [1]. And changes in the cloud also made very frequently; we can call dynamic data.
Keywords: Backup Procedures, Fault tolerance, Authentication, Error Handling, Retrieval models.
Abstract
Network Traffic Analysis Measurement and Classification Using Hadoop
Preeti Joshi, Arati Bhandari, Kalyani Jamunkar, Kanchan Warghade, Priyanka Lokhande
DOI: 10.17148/IJARCCE.2016.5360
Abstract: Traffic classification is a process which categorizes computer network traffic according to various parameters (for example, based on port number or protocol) into a number of traffic classes such as Sensitive, Best-Effort, and Undesired etc. Each resulting traffic class can be treated differently in order to differentiate the service implied for the user. Due to growth in Internet users and bandwidth-hungry applications; the amount of Internet traffic data generated is so huge. It requires scalable tools to analyze, measure, and classify this traffic data. Traditional tools fail to do this task due to their limited computational capacity and storage capacity. Hadoop is a distributed framework which performs this task in very efficient manner. Hadoop mainly runs on commodity hardware with distributed storage and process this huge amount of traffic data with a Hive. Hadoop-based Traffic Analysis Measurement and Classification tool which perform Traffic Analysis, Measurement, and Classification with respect to various parameters at packet and flow level. The results can be used by Network Administrator and ISP�s for various usages. Internet traffic measurement and analysis has long been used to characterize network usage and user behaviours, but faces the problem of scalability under the explosive growth of Internet traffic and high-speed access. We proposed a traffic monitoring system that performs IP, ICMP,TCP, HTTP, and UDP analysis of multi-terabytes of Internet traffic in a scalable manner. This can achieve the performance challenges such as accuracy, scalability.
Keywords: Internet Traffic, traffic measurement and analysis, HDFS, HIVE, Qlikview or Tableau.
Abstract
Fast Retrieval of Musical Data from Optimized Clusters using PSO
Ms. Priyanka J. Howale, Ms. Sanketa S. Pradhan, Ms. Shraddha G. Lohar, Asst. Prof. Anagha N. Chaudhari
DOI: 10.17148/IJARCCE.2016.5361
Abstract: Information retrieval is concept related to various optimization techniques and clustering algorithms. High dimensional Textual dataset is required for information retrieval .swarm intelligence is one of the most important technique under evolutionary algorithms. Swarm intelligence technique includes various algorithms for optimization. Comparative study of those gives best algorithm on the basis of there computational time and efficiency. Best algorithm is identified for clustering .Comparative study of clustering algorithms gives best algorithm and used for information retrieval.
Keywords: High Dimensional Dataset Swarm Intelligence Technique, Clustering Optimization, Computational Time, Efficiency, Information retrieval.
Abstract
Krushi-Unnati An Online Trading App (OLTP)
Prof. K.K.Patil, Ms. MohiniWalekar, Ms. VaishaliWaghmare, Ms.Chitra Khinde, Ms.Supriya Pathade
DOI: 10.17148/IJARCCE.2016.5362
Abstract: Krushi-Unnati is operate as online classified market place for used goods such as vegetables, fruits, flowers, grains. It is accessible through internet and through native apps on smartphones. Krushi-Unnati publishes online classified. It is the one of the latest version of its mobile phone app develop specially for farmers. It makes buying and selling very easy using your smart phone. Here we take look at the app and its features. Now farmer can use this mobile app to post free advertisement online and can search current price of that product in the market. Krushi-Unnati is website has a place for farmer to sell of things. Those who are in need of and item they can go to website browser through the product. Here buyer purchase the item. All in all here krushi-Unnati acts as a place where buyer meet farmers(seller).Krushi-Unnati tries to give appropriate price to farmer of there products and it make buying and selling things even more convenient. Features of Krushi-Unnati:The mobile app studded with a number of features that make selling and buying stuff so easy that it looks like a cakewalk.some of these feature are: 1)Share your ad:Here we can share ads through krushi-Unnati app and images of products. After sharing ad of product buyer can get the information about those products like quantity,price. 2) Product Quality: As product is directly come from farm the product will be of good quality. 3)Price: This app provide appropriate price both to seller and buyer.
Keywords: Bits Per Pixel, Frequency Distribution, Image Differencing, Location Preserving, Lossless Image Compression, Mean Square Error, Most Frequent Pixel.
Abstract
Secure Routing Protocols in WSNs: A Survey
Arpita Pateliya, JigneshKumar. N.Patel, Ketan R. Tandel
DOI: 10.17148/IJARCCE.2016.5363
Abstract: Wireless sensor networks are consisting large number of sensor nodes which are limited to sensing, computing, processing the data and communication capability. Due to these limitations it is important to minimize the amount of data transmission so the average lifetime of network and bandwidth utilization improved as well minimize the computational power at every node in order to improve lifetime of network. WSNs are deployed in remote and open environment to transmit the sensitive information, and sensor nodes are easily prone to malicious activity of the attackers so security is most important. Hence, wireless sensor networks protocols must be designed with security in mind. This paper gives the future research directions in secure data aggregation in wireless sensor networks.
Keywords: Wireless Sensor Networks (WSNs), Data Aggregation, Security Objectives, Attacks, Routing Protocols.
Abstract
Hybrid Usage-Based Ranking Model for Information Retrieval (Web Search Engine)
Nikita Patil, Neha Raverkar, Tanvi Sardare, Manisha Upadhyay, Prof. Shweta Barshe
DOI: 10.17148/IJARCCE.2016.5364
Abstract: There are plenty of web pages available on the Internet. It is very challenging for Web Search Engines to find precise result up to user�s expectations for his query from those huge numbers of pages. Most of the search results that correspond to a user's query are not relevant to the user browsing behaviour. Lots of the page ranking algorithms are available to calculate the relevancy of the web page such as Weighted PageRank algorithm or Content Based Ranking to provide a good ranked list. But these ranking algorithms might be not enough to provide a good ranked list, so in this paper, we have come up with a Hybrid Usage-Based Ranking Algorithm where page ranking is generated as a combination of user usage (user hits per link) and vector space result for users query. The result helps the users to get the relevant information quickly.
Keywords: Search engine, Information Retrieval (IR), Usage based, Vector space, Visits of Links (VOL).
Abstract
A Review-Cluster Computing Based Video Surveillance: Smart Hub
Pooja Mane, Prashant Kharat
DOI: 10.17148/IJARCCE.2016.5365
Abstract: Security and surveillance are important and recent issues in computer vision world. Surveillance system means identify suspicious activity for the purpose of security such as prevention of crime, investigation of crime, protecting people or group or object. A video surveillance management system, not only able to find out what happened by viewing real-time video and searching video recordings but also the system must be stable and fault-tolerant. Capturing all of the video from a number of cameras to a centralized server is inherently unscalable and expensive. Distributed video systems scale much more effectively than centralized server system. A video surveillance system must meet different requirement such as availability, scalability, manageability, security. Current high-performance embedded cameras integrate video processing, video sensing, and communication within a single device which is called as smart camera. Today smart cameras are key components for video surveillance systems. This paper review different distributed video surveillance system framework.
Keywords: Video Surveillance System, Distributed Computing, Smart Camera, Events.
Abstract
Ultrasonic Haptic Vision System
Sager Pangavhane, Sopan Patil, Vishal More, Pallav Kulkarni
DOI: 10.17148/IJARCCE.2016.5366
Abstract: Vision is the most important part of human physiology as 83% of information human being gets from the environment is via sight. The 2011 statistics by the World Health Organization (WHO) estimates that there are 285 billion people in world with visual impairment, 39 billion of which are blind and 246 with low vision. The traditional and oldest mobility aids for persons with visual impairments are the walking cane (also called white cane or stick) and guide dogs. The most important drawbacks of these aids are necessary skills and training phase, range of motion and very little information conveyed. With the rapid advances of modern technology, both in hardware and software front has brought potential to provide intelligent navigation capabilities. Recently there has been a lot of Electronic Travel Aids (ETA) designed and devised to help the blind navigate independently and safely. Also high-end technological solutions have been introduced recently to help blind persons navigate independently .Many blind guidance systems use ultrasound because of its immunity to the environmental noise. Another reason why ultrasonic is popular is that the technology is relatively inexpensive, and also ultrasound emitters and detectors are small enough to be carried without the need for complex circuit.
Keywords: Helmet, PIC Microcontroller, Ultrasonic Sensor, RF, Transmitter, Receiver.
Abstract
A Novel Reversible Data Hiding Scheme using IWT with Reduced and Fixed Book keeping Information
Ankita Meenpal, Dr. T. Meenpal
DOI: 10.17148/IJARCCE.2016.5367
Abstract: In this paper we propose a novel reversible data hiding scheme based on integerwavelet transform. The existing similar schemes contains a significant and variablesize of bookkeeping information leading to reduction in the actual payload capacity ofthe cover image, as well as significant amount of pre-processing is generally requiredto avoid underflow/overflow errors. The proposed scheme tries to resolve the statedproblems and contains a fixed and negligible size of bookkeeping information in theform of location map, as well as there is no pre-processing stage required in theproposed scheme to avoid underflow/overflow problem. Scheme also achievesrelatively higher payload and corresponding PSNR.
Keywords: Reversible data hiding; integer wavelet transform; difference expansion; steganography.
Abstract
A Review on Improve Network Lifetime Using H-HEED Protocol
Gitanshu, Shivi Sharma
DOI: 10.17148/IJARCCE.2016.5368
Abstract: In the beginning the development of wireless sensors was driven by military applications but the introduction of civilian wireless sensor systems has greatly diversified application domain which has further boosted research efforts in the field of wireless sensor networks. The protocols implemented in the sensor network i.e. H-HEED protocol which should be energy aware and simple enough to be implemented in the low-end type of hardware and software of many WSN applications. WSNs H-HEED protocol may be deployed outdoors in large sensor fields to detect the spread of wild fires. The other functionality of H-HEED protocol is: One is the periodic collection of data from other members the cluster and aggregates it. Second, is forwarding the aggregated data toward the base station.
Keywords: WSN, HEED, LEACH, H-HEED, DDR.
Abstract
Contributing Secured Session with Less Traffic Using Device-To-Device Communication for Social Networks
A. Kalaivani, G. Thiruchelvi
DOI: 10.17148/IJARCCE.2016.5369
Abstract: Managing sessions for individual users in the current networking environment is a very big task. Networks and sub-networks are playing major role in current evolving networking world. Consider five devices using internet via the sixth device in a network and they all are using same application with unique user id. It should not be mismatched with the data and user id in that network as there is confusion between devices and IP from the Server. And also it will occur unwanted traffic due to accessing same data by multiple users repeatedly. It is proposed a better method to manage the traffic and user�s session security.
Keywords: Device-to-Device communication, social networks, Mobile social network.
Abstract
Privacy Preservation and Detection of Sensitive Data Exposure over Cloud
Pooja Pawar, Supriya Palwe, Shweta Munde, Priyanka Gadhave, Mrs. Shikha Pachouly
DOI: 10.17148/IJARCCE.2016.5370
Abstract: Statistics from security firms, research institutions and government organizations show that the number of data-leak instances have grown rapidly increases years. Among various data-leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and to provide alerts for organizations. A common approach is to screen content in storage and transmission for exposed sensitive information. Such an approach usually requires the detection operation to be conducted in secrecy. However, this secrecy requirement is challenging to satisfy in practice, as detection servers may be compromised or outsourced. In this paper, we present a privacy preserving data-leak detection solution to solve the issue where a special set of sensitive data digests is used in detection. The advantage of our method is that it enables the data owner to safely delegate the detection operation to a semi honest provider without revealing the sensitive data to the provider. We describe how Internet service providers can over their customers DLD as an add-on service with strong privacy guarantees. The evaluation results show that our method can support accurate detection with very small number of false alarms under various data leak.
Keywords: Data leak, network security, privacy.
Abstract
Annotation on SRRS with Decorative Tag Detection & Composite Text Node Splitting
Thushara K P, Neethu T
DOI: 10.17148/IJARCCE.2016.5371
Abstract: Data Mining is a computational process of discovering useful information from large data sets. Web Mining is recently an active research area under Data Mining, where discovery of information from web documents or web pages are done. There is a big influence of technology in our daily life, especially Internet, is more and more important for our life and surely it will be the medium of the future. So extracting information from web and organizing them for human use has a great importance. In this work, we propose an Automatic Annotation Approach, in which information from web databases are collected and grouped according to their similarity. We assign meaningful labels to these groups. A web database is an organized listing of web pages, which have a searching interface through which user can enter their query. Annotation is important since shopping comparison and multiple domain searches are necessary for our day-to-day life. In our work we use four different domains and we search through these domains and results are shown in an annotated format, these annotated results will be easier to interpret by human users and can be used in comparison of data.
Keywords: SRR, Annotation, WDB, Wrapper.
Abstract
Progressive Product Development with Agile
Y. Padma, Dr. P.V.S. Lakshmi, A. Haritha, G. Venu Gopal
DOI: 10.17148/IJARCCE.2016.5372
Abstract: In the rapidly growing world, the concept of the traditional development needs to evolve. The agile methodology is a more acceptable practice, based on producing software at a more rapid pace, while still maintaining efficiency. This being particularly useful for smaller software production firms with limited resources. The agile methodology emphasizes on the quality issue and provides a very stable backbone for today's software development. In this report we discuss the history of agile methodology, in a general context, with listing of the agile manifesto and the agile principles. We explain four of the existing agile methodologies with more focuses on the famous and mostly known agile process: the Extreme Programming. The report includes a discussion about the critical success factors, benefits and weakness of the agile methodologies based on a number of existing surveys with some real world examples that shows some of Agile methodology's advantages and disadvantages.
Keywords: Agile Methodology, Progressive Product Development, Extreme Programming, Non-Agile Projects.
Abstract
Review on: Head Movement Controlled Computer Mouse Interface
Shivani Pawar, Prof. A. M. Rawate
DOI: 10.17148/IJARCCE.2016.5373
Abstract: This paper describes about an economical head operated computer mouse for people with disabilities. It focuses on the invention of a head operated computer mouse that employs one tilt sensor placed in the headset to determine head position and to function as simple head-operated computer mouse. The system uses accelerometer based tilt sensor to detect the user's head tilt in order to direct the mouse movement on the computer screen. Clicking of mouse is activated by the user's eye brow movement through a sensor. The keyboard function is designed to allow the user to scroll letters with head tilt and with eye brow movement as the selection mechanism. Voice recognition section is also present in the head section to identify the small letters which are pronounced by the paralyzed user. This system was invented to assist people with disabilities to live an independent professional life.
Keywords: Computer mouse, head operated, people with disabilities, tilt sensor.
Abstract
Survey on Energy Efficiency using LEACH for Retransmission Problem
Vishal kaushal, Shivi Sharma
DOI: 10.17148/IJARCCE.2016.5374
Abstract: There are number of routing protocols that is energy saver or energy reducer for improving the performance of the network. LEACH is one of the important protocols that we say, energy saver protocol. This protocol may problem in the case link failure and distortion of the network. The current selecting approach will be working on the areas of energy depletion that may occur like link/path distortions. The proposed technique finds out the MAC and Retransmission delay that solves the energy problem in sensor network.
Keywords: WSN, LEACH, RREP, RREQ, MDC, MAC.
Abstract
A Review on: Abandon or Removed Object Detection
Divya C. Patil, Dilip S. Patil
DOI: 10.17148/IJARCCE.2016.5375
Abstract: The automatic detection of objects that are abandoned or removed in a video scene is an interesting area of computer vision, with key applications in video surveillance. There are various methods to detect abandoned or removed objects. Tracking based approaches for detecting abandoned or removed object often become unreliable in complex surveillance videos due to occlusion, lighting changes and other factors. Therefore some authors present other methods like mixture of three Gaussian or using multiple cues like intensity, motion and shape to detect accurate static region. All of these methods are efficient to run in real time applications.
Keywords: Image Processing, abandoned or removed object detection, and visual surveillance.
Abstract
Methodology to Shielding Against SQL Injection Using Internet Protocol Address
Sanjay Mishra, Subodh Mishra, Vivek Sharma
DOI: 10.17148/IJARCCE.2016.5376
Abstract: SQL Injection Attacks (SQLIAs) is a technique through which an unauthorized user can access over database by inserting malicious SQL query segment. The major caused of SQLIAs is improper coding and improper validation of user input. The integrity, confidentiality and availability of web applications are infected by these types of attacks. Now-a-days online services play an important role in our day-to-day life such as email, e-banking, ecommerce, social networking sites, forum etc. However vulnerabilities in these applications may create a wide range of risk as these all contains confidential data such as personal information, banking details and many mores. In this paper we will discuss different types of SQLIAs technique and an algorithm for their preventions against those attacks. This algorithm defeat SQL Injection at different level and protect database to reveal any confidential data from database server when any illegal query is injected for compromising the security. The algorithm using hexadecimal and ASCII value for preventing SQLIAs and a fixed error message is set for protecting database to reveal any valuable information in form of error message.
Keywords: Vulnerability, Structure Query Language Injection Attacks (SQLIAs), Web Application, Hexadecimal, ASCII value, Internet Protocol (IP) Address.
Abstract
Scalable Processing of Continuous K-Nearest Neighbour Queries in Spatio Temporal Database
Prof.S.Athinarayanan, Aswin.R, Krishna Raja Sabari.S, Nethaji.T.P.
DOI: 10.17148/IJARCCE.2016.5377
Abstract: Location Based Services and Geographical Information System together have enabled a new era of the development of a mobile based applications for various commercial and military applications. Unlike the current information services such as those on the web and as mobile apps, the GIS has benefited greatly from developments in various fields of computing. Better database software allows the management of vast amounts of information that is referenced to digital maps. Computer graphics techniques provide the data models for storage, retrieval and display of geographic objects. Geographic Information Science, the field of science behind GIS, offers specialized knowledge about spatial data collection and processing, data modeling as well as modeling of spatial processes for analysis purposes. In our project we propose a method for find the locations of various Places according to user location using Gps in online mode in our project the user can access the important unique data without unwanted data Information related to the searched location. And Location-based search is one of the great promises of the mobile era. Looking for a good searching option based on the user query.
Keywords: GIS, Location-Based Service LBS, GPS, Open Street Map(OSM).
Abstract
Efficient Policy based Detection of Jamming Attacks in MANETS
R.Akila, Mabel P Jenefer
DOI: 10.17148/IJARCCE.2016.5378
Abstract: A mobile Ad Hoc network (MANET) may be a wireless network that doesn't consider any fastened infrastructure (i.e., routing facilities, such as wired networks and access points), and whose nodes should coordinate among themselves to see property and routing. the standard way of protective networks isn't directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments wherever Edouard Manet use may be expected. Since bar techniques are ne'er enough, intrusion detection systems (IDSs), that monitor system activities and detect intrusions, are typically accustomed complement alternative security mechanisms. the way to discover intrusions effectively and expeditiously on this highly dynamic, distributed and resource-constrained setting may be a challenging analysis drawback. during this paper, we tend to investigate the employment of evolutionary computation techniques for synthesizing intrusion detection programs on MANETs. we tend to evolve programs to discover the subsequent attacks against MANETs: dropping attacks and power consumption attack. The planned system may be a novel design that uses knowledge-based intrusion discovering techniques to detect the attacks that an antagonist will perform against the routing cloth of mobile impromptu networks. Mobile unexpected Networks (MANETs) are vulnerable to various node misbehaviours attributable to their distinctive options, such as highly dynamic topology, rigorous power constraints and error-prone transmission media. important analysis efforts have been created to deal with the matter of misbehaviour detection. However, very little analysis work has been done to differentiate reallymalicious behaviours from the faulty behaviours. each the malicious behaviours and therefore the faulty behaviours are typically equally treated as misbehaviours with none additional investigation by most of the traditional misbehaviour detection mechanisms. during this paper, we propose and develop a policy-based malicious peer detection mechanism, within which context data, like communication channel standing, buffer standing, and transmission power level, is collected so wont to confirm whether or not the misbehaviour is likely a results of malicious activity or not. Simulation results illustrate that the policy-based malicious peer detection mechanism is able to differentiate malicious peers from faulty peers with high confidence. Moreover, the mechanism converges to an even view of malicious nodes amongst all the nodes with a restricted communication overhead.
Keywords: MANET, Jamming, Attack, Intrusion Detection, Network Gateway, Infrastructure.
Abstract
A Survey of Different Adiabatic Techniques for Low Power
Rajasekar G, Boobalan A, Ramkumar M
DOI: 10.17148/IJARCCE.2016.5379
Abstract: This paper describes about different adiabatic logics are used which are all used to provide low power. Adiabatic techniques, such as clocked CMOS logic, latched pass transistor, single phase recovery logic, adiabatic array logic, reversible logic, dual rail logic, adiabatic inverter, pipeline scheduling, CEPAL logics are discussed briefly and comparatively studied those techniques to reduce the power consumption, improve speed of the operation and to minimize area overhead. Different tools are used to design the low power circuits as Microwind, Tanner, and HSPICE.
Keywords: Adiabatic logic, Low power consumption, High speed, Minimum area overhead.
Abstract
Comparison of Energy Efficient Scheduling Schemes for Private Cloud Environment
Dr. Shailesh Shivaji Deore
DOI: 10.17148/IJARCCE.2016.5380
Abstract: A Scheduler is main role to schedule number of virtual machines VMs as per virtual machines request VMr from cloud consumer. Scheduler schedules number of virtual machines VMs requests call Lease such as conserve maximum amount of energy, achieves greater scale of load balancing and less resource utilization with less time less efficiency. In this paper we review scheduling schemes in private cloud environments which is recently proposed in our previous work on base of Energy Efficient.
Keywords: VM, VMr, Energy Efficient, VMs, Host, Guest.
Abstract
Development of an Excellent System for Information Retrieval Corresponding to Vivid Comparisons of Distinct Methodologies Incorporating DR and Clustering Schemes
Mr. Aditya G. Bhor, Ms. Komal K. Rahane, Ms. Poonam P.Rajurkar, Ms. Neha S. Pathak, Ms. Anagha N. Chaudhari
DOI: 10.17148/IJARCCE.2016.5381
Abstract: We are accompanied by huge data nowadays. Everyone produces enormous data through variety of operations, transactions and devices. Ultimately it ends up with the overhead for machines to generate and keep such huge data. The noticeable exponential growth of data becomes difficult and utmost challenging. Such data is literally large and not easy to work with for storage and retrieval[15]. This type of data can be treated with various efficient techniques for cleaning, compression and sorting of data[15]. Pre processing can be used to remove basic English stop-words from data making it compact and easy for further processing; later dimensionality reduction techniques make data more efficient and specific[16]. This data later can be clustered for better information retrieval[16]. This paper elaborates the various dimensionality reduction and clustering techniques applied on sample dataset C50test of 2500 documents giving promising results, their comparison and better approach for relevant information retrieval.
Keywords: High Dimensional Datasets, Dimensionality reduction, SVD, PCA, Clustering, K-means, Fuzzy Clustering, Hierarchical Clustering.
Abstract
A Real Time Implementation of Advance Information Processing System for Manufacturing Industries
K.Vaishali, G.Anbarasan, N.Senthamaraiselvi
DOI: 10.17148/IJARCCE.2016.5382
Abstract: Advance Information Processing is to develop an efficient data storage and retrieval. This work mainly focuses on reducing the manual work with ease of access. The data retrieval is from centralized database with an authenticated communication which avoids the local database access. In the centralized database the information can be easily transposed, transformed and maintained which improves the efficiency of retrieval and storage. It is purely a web application. Our proposed work for information retrieval and storage is implemented in a company for selling and producing ATM parts like card reader, cassettes, depositors, dispensers, displays etc. whenever a customer requires an ATM part the request is sent to the company where the process starts. In the company the employee who is responsible for processing the request sends the information to the approval team as customer specified. The approval team identifies the part number and verifies with part review team and processes are done to finalize the part. The instruction for the new part is generated as a PDF file with all the necessary specifications relevant to the requested part. This file is sent to the part development team which delivers the requested parts. Our proposed project makes the development team�s work easier as all the necessary information�s are available from the approval team as a single file.
Keywords: Advance Information Processing System(AIPSI), Centralized database, Authentication, ATM, PDF file.
Abstract
Hand Gesture Recognition Based Wheel Chair Direction Control Using AVR Microcontroller
Gaurav Kumar Soni, Vidhata Poddar, Yogita Sahu, Pratima Suryawanshi
DOI: 10.17148/IJARCCE.2016.5383
Abstract: In today�s world, physically handicapped person & elder peoples are depending on others peoples. But today�s world becomes fast, everyone is very busy & there are few peoples to take care of these peoples properly. They find the automated wheelchairs for an easy transportation for these physical disable persons. The proposed work is to design & develop a hand gesture based wheelchair using Gesture Control System. Wheelchairs are used by which person who cannot walk due to physiological, injury or any disability. Recent development promises a wide scope in developing hand gesture based wheel chair or smart wheelchairs. The present article presents an accelerometer sensor using gesture based wheelchair which controls the direction of wheelchair using hand movements. This paper presents a model for hand Gesture controlled user interface and identifies trends in current technology, application and usability. We present very useful an integrated approach to real time detection, hand gesture based data glove technique is very used which controls the wheelchair using hand movements by using the accelerometer sensor. This paper proposed a low voltage supply, low-cost and small 3-axis wireless system to control the wheelchair using AVR microcontroller.
Keywords: microcontroller, accelerometer sensor, wheel chair control, hand gesture recognition, RF module.
Abstract
Gray Scale Image Compression
Mr. Neeraj Manglani, Ms. Savita Singh
DOI: 10.17148/IJARCCE.2016.5384
Abstract: The process of reducing the size of a data file is referred to as data compression. Compression is useful because it helps in resources usage reduction, such as data storage space or transmission capacity over internet. Image compression is a main technology in transmission and storage of images and scanned documents, because of large amount of data and information is associated with them. This paper proposes a compression technique for scanned documents and images, based compression method using discrete wavelet transformation (DWT), Discrete Cosine Transformation, (DCT) and Code Book Vector. The importance of the DCT in an image compression is that it takes correlated input image and concentrates its energy in just the first few transform coefficients. This feature of DCT makes it useful in data compression. The effectiveness of the algorithm has been justified over some real images and scanned documents. The performance of the proposed algorithm has been compared with other common compression algorithm.
Keywords: Discrete Wavelet Transformation (DWT), Discrete Cosine Transformation (DCT), Code Book Vector, Customized file format, JPEG images.
Abstract
Offline Signature Cognition and Verification Using Artificial Neural Network
Rushikesh Suryawanshi, Shantanu Kale, Rahul Pawar, Sidharatha Kadam, V. R. Ghule
DOI: 10.17148/IJARCCE.2016.5385
Abstract: The signature verification is the oldest security technique to verify the identification of person. Recently, signature recognition schemes are growing in the world of security technology. It offers two different types of schemes those are offline and online method. The offline technique means to verify a signature written on paper which is scanned to convert it into a digital image, where as the online system required an online device such as Tablet PC, touch screen monitor by a pressure sensitive pen to verify the signature. Offline signature verification scheme is considered as a highly secured technique to recognize the genuine person�s identity. Project will implement offline signature verification technique using Artificial Neural Network (ANN) approach.
Keywords: ANN, Authentication, Offline Signature Verification, Neural Network.
Abstract
Improving Iris Recognition Performance by Using Cryptography
Pooja, R. M. Potdar
DOI: 10.17148/IJARCCE.2016.5386
Abstract: Various aspects of existence area unit step by step being digitized as our life experiences and inventive effort area unit accumulate in personal computers digital media devices and mobile devices. Folks use password and different authentication strategies to shield these collections of private and probably tip. Ancient strategies (e.g., personal passwords) area unit but secure. But these issues are often resolving through the �physiological passwords� through distinctive personal identification technique. There area unit numerous identification has been accustomed known the individual like face recognition, personal signature or iris recognition. Among of these statistics iris recognition is that the best biometric recognition for individual. Iris is extremely correct and reliable of their stable characteristics throughout lifespan. During this paper we have a tendency to improve the iris recognition performance by victimisation cryptography. Cryptography is that the technique that has a lot of security to the info or feature primarily based templates. In cryptography technique it'll be cipher the initial information of the iris that area unit supported the various options of the iris and at the last within the result half it�ll be rewrite the initial information. Fuzzy commitment theme (FCS) is additionally introduced during this projected technique. It�ll offer the correctness of the iris feature extraction and conjointly cut back the noise and error that area unit manufacture by the various angle of iris pictures. Thus during this paper we have a tendency to mentioned regarding the biometric recognition by victimization-on cryptosystem to boost the performance of iris recognition. Cryptosystem is nothing however it's the system that's victimisation the technique of cryptography meaning secret writing.
Keywords: Biometric, FCS, Physiological passwords, cryptography, cryptosystem, security, iris recognition.
Abstract
Downlink Scheduling for Multi-Cell MIMO Systems
Jayakrishnan Murali, Junaid T U, Shaheera Abdullakutty, K P Aiswarya Vijay, Indraja K R, Viji A S
DOI: 10.17148/IJARCCE.2016.5387
Abstract: In this paper, we study about downlink scheduling for multi-cell multiple-input multiple-output (MIMO) systems. The inter-cell interference experienced by a user is quietly a pre-eminent issue in the communication scenario.Specifically, the performance degradation for the cell-edge users who experience significant inter-cell interference is severe, which may limit the overall system performance. As a result, continuous streaming is not possible and leads to ineffective communication. So in order to overcome these difficulties, we formulate an optimization problem which aims at jointly selecting a user and connecting the user to the tower with high signal strength. We first obtain a calibrated value of signal strength and the distance between tower and the user, which is collectively termed as the RSSI value. The pre-determined RSSI value is fed to the scheduler along with the signal strength to decide as to which tower the user should be switched to. Simulation results show that the performance of the proposed system is better than the existing systems.
Keywords: Scheduling, RSSI, CSI, LDPC.
Abstract
Gesture Based Vocalizer for Deaf and Dumb
Supriya Shevate, Nikita Chorage, Siddhee Walunj, Moresh M. Mukhedkar
DOI: 10.17148/IJARCCE.2016.5389
Abstract: Gesture Vocalizer is a project for social purpose. From the survey we found that it is really very difficult for deaf people to communicate with other people. Normally deaf people speak with hand gestures and it is difficult for other people to understand their sign language. We are going to implement gesture based vocalizer which will detect all the gestures of deaf people and convert it into voice and also can display it on LCD screen .For that we are making use of ARM 7 controller to interface all of the sensors and speech synthesizer .Basically data glove contains two types of sensors flex sensor and accelerometer as a tilt sensor. A wireless data gloves is used which is normal cloth driving gloves fitted with flex sensors along the length of each finger and the thumb. Dumb people can use the gloves to perform hand gesture and it will be converted into speech so that other people can understand their expression.This system is useful for dumb people to communicate with other people.
Keywords: Gesture Detection, Data Glove, Bend Detection, Tilt Detection, Speech Synthesizer, LCD display.
Abstract
Hand Gesture Recognition Using Open CV
Salman Shaikh, Raghav Gupta, Imran Shaikh, Jay Borade
DOI: 10.17148/IJARCCE.2016.5390
Abstract: When you use gesture, you are entering into a whole history of human communication, because there is no language that exists entirely without gesture (a fun fact to bring up at parties). People can't communicate without gesture. It's so connected to intention that there is a phrase "empty gesture," used to mean an action or movement that is without genuine feeling. The research effort centralizes on the efforts of implementing an application that employs computer vision algorithms and gesture recognition techniques which in turn results in developing a low cost interface device for interacting with objects in virtual environment using hand gestures.
Keywords: Computer Vision, Hand Gesture, Hand Posture, Human Computer Interface.
Abstract
Study of Smart Home Architecture Based on Internet of Things
Hetashavi Shah, Dimpal Jayani, Elita Dsouza, Vinaya Sawant, Darshana Desai
DOI: 10.17148/IJARCCE.2016.5391
Abstract: Recently, internet of things has enlightened many readers for the innovation of smart house where, everything is controlled on our finger tips. Out of all the reviewed architectures, the most upcoming implementation is conducted on GSM and Cloud-based technology. The GSM architecture makes use of mobile communication technology for communication between users and devices. It makes use of an interface to intercept SMSes from users and decode it into a format understood by microcontrollers. Cloud-based technology provides data aggregation, big data analytics, data visualization, predictive analysis technologies to get more value out of IoT data which can be helpful in smart home development.
Keywords: Internet of Things, Smart Home, GSM, Cloud based architecture.
Abstract
A Survey on Data Mining Algorithms
D. Keerthika, G. Sangeetha
DOI: 10.17148/IJARCCE.2016.5392
Abstract: Data mining is multidisciplinary field of computer science. It is the process of recognizing patterns from massive data sets, which is big data. It contains the approaches of Machine Learning, database systems, artificial intelligence and statistics. A data mining algorithm is a set of problem solving andcomputationthat generates a data mining miniature from data. Data mining contains large collection of algorithms. In this paper, some of the popular algorithms for data mining are closely examined with their advantages and disadvantages.
Keywords: Data mining, data mining algorithms, data sets.
Abstract
Epilepsy seizure detection using EEG – Curvelet feature selection and SVM classification
Mr.P.V.Rao, S.Akilan, S.Arumugam, V.Dhivakar, D.Karthikeyan
DOI: 10.17148/IJARCCE.2016.5393
Abstract: According to World Health Organization (WHO), epilepsy is one of the most common primary diseases of the central nervous system worldwide, which is aggravated by the sudden factor that characterizes the occurrence of an epileptic event. Thus, the ability to detect episode before its onset appears as a mitigating factor to the unpleasant effects arising from this situation. In this paper, already implemented to detect epilepsy by using WiSARD neural network classification through this multiple evaluation had been processed. seizure detection, the WiSARD weightless neural network was explored. We proposed in this project to get high accuracy first collect the features of seizures in EEG signal through DWT co-efficient analysis. And then parameters evaluated continuously in multiple level of wavelet, passed the features to SVM classifier giving effective result compare to existing one.
Keywords: Support vector machine(SVM), Discrete Wavelet Transform(DWT), WiSARD, Electroencephalogram (EEG).
Abstract
Plant Leaf Disease Identification System for Android
Prof. H.M. Deshmukh, Jadhav Sanjivani, Lohar Utkarsha, Bhagat Madhuri, Salunke Shubhangi
DOI: 10.17148/IJARCCE.2016.5394
Abstract: The leaves of a plant provides the most important information or data which provides us to know which type of plant it is and which type of disease is infected on that leaf. The plants play an important role in the biological field. In this project we have describe the development of an Android application that gives users or farmers the capability to identify the plant leaf diseases based on the photographs of plant leaves taken from an android application. Detecting diseases on leaf of plant at early stages gives strength to overcome it and treat it appropriately by providing the details to the farmer that which prevention action should be taken.
Keywords: Image processing, Android, Texture, Plant Leaf Diseases.
Abstract
Car Black Box
Manish Bhelande, Viraj Chaudhari, Prathamesh Gore, Raj Dhure, Abhishek Bhayye
DOI: 10.17148/IJARCCE.2016.5395
Abstract: This paper discusses the configuration and functions of the Car Black Box System. This system focuses on monitoring of real-time driving and also uploads the monitored data to cloud application for further investigation in the case of an accident. This system helps the accident investigators as well as insurance companies to find out the cause of the crash. The author analyzes the problems faced in earlier models proposed and directs development to develop an integrated system with minimalistic hardware and high performance. This system uses Android Smartphone as its hardware component supported with an Android application to provide features for accident monitoring. Android Phone used as it provides all the characteristics to assist with reducing hardware use, as Android Smartphone acts an embedded system to facilitate all the features. Apart from video monitoring, other features such as navigation, speed tracking and anti-theft features are also provided in the system. The perspective of this project is to make the user feel more safety about the car and to help knowing the actual cause of accidents if any.
Keywords: Car Black Box, Android, Accident Monitoring, Open Source Technology.
Abstract
Picture Component Technique based SVM Classification and GLCM for Diagnosis and Detection of Dermoscopic Images
B. Suganya Devi, Dr. R. Shanmugavadivu
DOI: 10.17148/IJARCCE.2016.5396
Abstract: Picture Component Technique (PCT) based Support Vector Machine (SVM) classifier is supervised learning model used for classification, regression analysis. This classifier associated with learning algorithms and this learning algorithms are used to analyze data and recognize patterns. Gray Level Co-Occurrence Matrix (GLCM) is used to extract second order statistical texture features and it has done motion estimation of images. In statistical texture analysis, texture features are computed from the statistical distribution of observed combinations of intensities at specified position relative to each other in the image.
Keywords: Picture Component Technique (PCT), Support Vector Machine (SVM) classification, Gray Level Co occurrence Matrix (GLCM), Expectation Maximization (EM), Optical Coherence Tomography (OCT).
Abstract
Make Any Surface as Touch Screen
P. Waghralkar, Devang Mishra, Smriti, Vishal Jagtap, Ajinkya Ghuman
DOI: 10.17148/IJARCCE.2016.5397
Abstract: The purpose of this system is to describe our research and solution to the problem of designing a simply touch. It outlines the problem, the proposed solution, the final solution and the accomplishments achieved. Due to the enormous increase in use of touch screen technology, as well as its vast deployment in various applications, the need of touch screen development arose. Firstly, this report outlines a description of the primitive features of an touch screen; its purpose, any surface, and its use. These features are extracted and used as the basis for turn any surface as touch screen for user interface with computer system. The stylus used to initialize the co-ordinate of screen to use for touch screen, are then explained. Our final result was to turn any surface as touch screen. It can be used with any system with or without projector.
Keywords: Touch Screen, Any Surface, Touch, Infrared, Touch Pen.
Abstract
Distributed Cut Detection in Wireless Sensor Network
Sangeetha .V, Prof. B. Murali
DOI: 10.17148/IJARCCE.2016.5398
Abstract: A wireless sensor network (WSN) is a deployment of a large number of small, inexpensive, self powered devices that can sense, compute, and communicate with other devices for the purpose of gathering local information about a physical environment. An distributed algorithm to detect �CUT� in Wireless sensor networks has been proposed here, which identifies the failure of a node or a set of nodes that separates the network in to two or more components. Algorithm is iterative and asynchronous.
Keywords: CCOS, CUT detection, DOS, network separation, Wireless sensor network.
Abstract
Raspberry Pi Based Gesture Photography
Jyoti Yadav, Mohammed Firash Khan, Muhammed Shahan K.K, Sreedevi P, Sumayya K, Manju V.M
DOI: 10.17148/IJARCCE.2016.5399
Abstract: In this paper, we introduce a way to eliminate the traditional way of information access, storage and manipulation i.e. the information from paper, screen and digital storage. Although there have been many advancements in technologies that enables us to connect the digital world to physical world, there aren�t any technologies as of now which bridge the gap between the digital world and physical interaction with the real world. Our paper aims to bridge this gap. We make use of Raspberry Pi hardware as the heart of the device and a USB camera to capture images from the real world. The camera captures images based on hand gestures; manipulates it and stores the final image in the main workstation which is connected via the Wi-Fi network. Hence, this technology allows us to interact with digital information using hand gestures.
Keywords: Gesture recognition, Computer Vision, Wearable interface, Hand Gesture Interface.
Abstract
Electronic Security through Pattern Generation Using Android and GSM Technology
B. MahaLakshmi, V. Mounika, D. Thriveni, SK. Apsarunnisa, A. Praveena, P. Manasa
DOI: 10.17148/IJARCCE.2016.53100
Abstract: The main aim of this project is to design a system which is used for security of anything like home, vehicle and banking by opening and closing the door. In our research we presented a part of smart home technology which is using Bluetooth in a mobile device, so it will more easy and efficient to use. It also based on Android which is free open source software. In this paper, a system called door locking system using Bluetooth-based Android Smartphone is proposed and prototyped. First the hardware design and software development are described, then the design of a Bluetooth-based Smartphone application for lock/unlock the door are presented. The hardware design for door-lock system is the combination of android smart phone as the task master, Bluetooth module as command agent, 89C52 microcontroller as controller center / data processing center. All of the tests indicate that all goes according to the initial design of this research.
Keywords: Android, GSM, Bluetooth, Smart Phone, Stepper Motor, LCD Display.
Abstract
A Review on Video Encryption Technologies
Keshav S. Kadam, Prof. A.B. Deshmukh
DOI: 10.17148/IJARCCE.2016.53101
Abstract: Security and privacy are important things in video communication for that reason from last few years different video encryption methods have applied to secure video transmission. large number of multimedia encryption schemes have been proposed and some of them are used in real products, cryptanalytic work has shown the existence of security problems and other weaknesses in most of the proposed multimedia encryption schemes .This review paper describe different video encryption method also give the comparison between encryption methods with respect not only to their encryption speed but also their security level and stream size. A trade-off between quality of video streaming and choice of encryption technologies is shown here. Flexibility, efficiency, security and privacy are the challenges for the design.
Keywords: Video encryption, video transmission, stream size.
Abstract
Cloud Computing Applications and their Testing Methodology
Prof. S.D. Gaikwad, Kavita Rajpure, Supriya Patil, Sonal Kasare, Ojaswini Parange
DOI: 10.17148/IJARCCE.2016.53102
Abstract: Cloud computing has opened up new open doors for testing offices. New innovation and social network patterns are making a flawless tempest of chance, empowering cloud to change inner operations, customer connections and industry quality chains. To guarantee high calibre of cloud applications being worked on, engineer must perform testing to look at the quality and precision whatever they plan. Business clients are attracted to cloud�s rearranged, self-administration experience and new administration abilities. In this exploration paper, we address a testing natural construction modelling with important key advantages, to perform execution of experiments and utilized testing techniques to upgrade nature of cloud applications.
Keywords: Cloud, Cloud Testing, Testing, Cloud Applications, Test Cases, Cloud Infrastructure Environmental Architecture.
Abstract
An Intelligent Health Care Monitoring System for Health Care Applications
Dr. G. Uma Maheswari, Mr. N. Murugan, Bhavadharani C, Arumuga Selvi S, Divya S, Logapriya N
DOI: 10.17148/IJARCCE.2016.53103
Abstract: The main focus of the paper is to implement a prototype model for the real time elderly person monitoring, fall detection system and Medication Reminder. The proposed is used to measure the physical parameters like body temperature, heartbeat, Humidity and Fall detection monitoring with the help of sensors. Conventionally there are number of techniques available for the ICU patient�s health monitoring system with wired communication technology. In the novel system the elderly person health is continuously monitored and the acquired data is transmitted to an ARM Processor using Zigbee wireless sensor networks. Embedded processor supports for analyzing the input from the patient or elderly person and the results of all the parameters are stored in the database. If any abnormality felt by the patient automatic alarm sound will arrive. The implementation of the system is achieved by the advanced processor and simulation results are obtained by Keil c software.
Keywords: ARM LPC2148, sensors, Zigbee and Keil C.
Abstract
I-FARM: an Automatic Drip Irrigation System
Prof. N. R. Talhar, Gaikwad Anjali, Ghodke Agraja, Minal Kumavat, Swapnali Shinde
DOI: 10.17148/IJARCCE.2016.53104
Abstract: Reduction and deficiency in fresh water resources globally has raised serious alarms in last few years. Efficient management of water resources play an important role in the agriculture sector. Unfortunately, this is not given prime importance in the world countries because of adhering to traditional practices. This paper presents a smart system that uses sensors to control water supply in agriculture fields. Sensor values are sent to the centralized server through Wi-Fi communication modules. A user friendly interface is build to visualize the daily data. The users can control irrigation using their smart phone as well.
Keywords: Automation, Android Phone, WI-FI, sensor, cloud server.
Abstract
An Automated Approach for Database Queries by using DQF.
Prof. Jagruti A. Dandge, Mr. Subodh Patil, Miss. Shital Patil, Mr. Bhushan Kelhe, Mr. Shrikant More
DOI: 10.17148/IJARCCE.2016.53105
Abstract: With rapid development of scientific databases and internet information databases are becoming very huge in size and complex in nature. These databases maintain large and heterogeneous data, with large number of relations and attributes. Thus there is need of such system which generate Query Forms dynamically according to the user's need at run time. The proposed system Dynamic Query Form i.e. DQF system going to provide a solution by the query interface in large and complex databases. In proposed system, the core concept is to capture user interests throughout user interactions and to adapt the question type iteratively. Every iteration consists of 2 sorts of user interactions: Query Form Enrichment and Query Execution. In Query Form Enrichment DQF would recommend a ranked list of query form component to user so user can select desired form components into current query form. In Query Execution user fills current query form and submit query, DQF is going to show result and take feedback from user on provided query results. A user would have facility to fill the query form and submit queries to view the query result at each process. So that a query form could be dynamically run till the user satisfies with the query results.
Keywords: Database, Query Form, Query form Generation, Query Execution, User Interaction.
Abstract
Multiple Applications Robot
Krishna Attal, Prof. Shailesh Jadhav
DOI: 10.17148/IJARCCE.2016.53106
Abstract: Embedded System is a section of a integrated device often including hardware, software and mechanical parts. This project presents multiple manual robot that has PIR sensor for Human Detection, which get activated based on extrinsic stimulation. The system transmits simultaneous monitoring through the wired camera attached to the Bot and sends simultaneous information to the CPU. The object in front of camera is placed and directed. A gun hooked up to the Bot is used for pointing the object and hit the object for target object locating and shooting applications. Disputed to most common access, in which detection and capturing are done by an integrated procedure, the approach preferred here relies on a modular architecture, in which detection and locating are moved out individually, and the latter might acquire input data from various detection algorithms. The key to the overall issues is based on the use of a Image altering for detection of object and target tracking accomplished with help of gun movement. The robot also senses gas detection, depth detection ,night vision and appropriately takes steps. Gas Detection is done through MQ6 Gas sensor. Depth detection and night vision functions is done through IR Sensor.
Keywords: Human detection, Target Tracking, Shooting Applications, Gas Detection, Depth detection.
Abstract
Implementation of Bizwings: An ERP Solution
Kalyani Pendke, Pranay Bhalerao, Kavita Thakre, Pratiksha Raut
DOI: 10.17148/IJARCCE.2016.53107
Abstract: In our day to day life we need to handle various tasks, perform different operations, manipulation of data, storage, collection, retrieval, group data by different individual as well as many different businesses. These data can be structured or unstructured and is gathered from various different sources which are required to be refined before its usage. This refinement is necessarily done for the purpose of dispensation of important data in different branches of different businesses present in different cities, countries etc. This whole course is done by various working employees of any business. Bizwings ERP is Designed for predominantly �Unit / Scheme / Product Allowance, tracing, commission and company supervision purposes�, Bizwings ERP can be used by Non-Banking Financial Establishments, Industrialists and Developers and the service region companies having work related to Commercial development, Infrastructure development, Plan and maturity services, customer and agent base installment / charge management of MLM like services. The elementary idea to build this is to handle all the business and its related events. The concept includes one main Non-Banking Financial Corporation which will be having its main branch in its home site and all the linked branches of the same company will be present in different cities of different states. These all branches will be handled by Bizwings. The main branch of the company will contain a single admin whose job is to develop and maintain different policies. These policies will be made on the basis of the terms and conditions of the company and are basically made for customer, so that the customer should invest into the company through policies.
Keywords: MLM- Multilevel Marketing, ERP- Enterprise Resource Planning, NBFC- NonBanking Financial Companies.
Abstract
Peer to Peer Multimedia Content Distribution Using Automatically Recombined Binary Key
Mrs. M. Rajeswari, M. Harini, K. Kiruthika, S. Nandhini
DOI: 10.17148/IJARCCE.2016.53108
Abstract: With increasing number of recent advancement in multimedia technologies, the distribution of multimedia contents have increased to a greater extend. Protection of ownership is required in the distribution of multimedia contents due to enormous increase in duplication and redistribution of contents. Encryption and decryption of contents also becomes cumbersome due to the usage of large amount of data and communication bandwidth to transfer data. In order to control unauthorized redistribution we generate binary key for multimedia contents. This enables us to trace the illegal users by using traitor tracing protocol. Merchant will create number of seed buyers who needs to distribute the content to the child buyers. Each seed buyer will be provided with his/her own binary key. On distribution of multimedia contents to the child buyers the binary key of different seed buyers are automatically recombined and the database is maintained. In case of any illegal distribution, merchant will block the illegal user and will not respond to the particular user.
Keywords: Anonymous Binary Key (Fingerprinting), RSA, HMAC, FFMP, Transaction Monitor, Traitor Tracing Protocol.
Abstract
Content Based Image Retrieval: A Study
Miss. Mrunali D. Pawar, Miss. Shraddha N. Shinde, Mr. Ramdas P. Bagawade
DOI: 10.17148/IJARCCE.2016.53109
Abstract: Content Based Image Retrieval (CBIR) is the today�s most active area in information retrieval and image processing. An image contain various visual information that is difficult to extract manually, the CBIR system aims at finding the most appropriate image from image database by matching the various visual contents of image. In this paper, several methods for image retrieval using the CBIR system are described that take consideration of image features like color, shape and texture to find efficient results. In modern internet based life, there is large development of social networking medium; the digital image uploading rate is very high. So, to access this large collection of image data new and fast techniques are needed. These techniques will ease the database handling as well as it will help user to adequately search the required resulting image. This research is very useful to solve many real world problems.
Keywords: Content Based Visual Information Retrieval System, Query By Image Content, MARS or Multimedia Analysis and Retrieval System, Visual Information Processing for Enhanced Retrieval.
Abstract
Advance Tools and Techniques for Software Risk Management
Satwik Kumar B Shiri, Sanam Satya Krishna Teja, Nithya Ganesan
DOI: 10.17148/IJARCCE.2016.53110
Abstract: Software development process nowadays faces many challenges and risks. Software tools have been used in software development for a long time now. They are used for performance analysis, testing and verification, debugging and building applications. Software tools can be very simple and lightweight, e.g. linkers, or very large and complex, e.g. computer-assisted software engineering ( CASE ) tools and integrated development environments ( IDEs ). Some aspects of software development, like risk management, are done throughout the whole project from inception to commissioning. In order to manage the risks we need to understand the scope and objectives of the software developments and use the appropriate risk management tools and techniques. The aim of this research paper is to demonstrate the advanced tools and techniques used for software risk management.
Keywords: Software development, Software risks, Risk management, Risk management tools, Risk assessment, Software engineering tools.
Abstract
Comparative study of various Security Algorithms applicable in Multi-Cloud Environment
Ms.Theres Bemila, Karan Kundar, Lokesh Jain, Shashikant Sharma, Nayan Makasare
DOI: 10.17148/IJARCCE.2016.53111
Abstract: In Cloud computing, data security is the major issue. Cloud computing environment security issues are handled by the system administrator or Cloud administrator. All the services related to data storage, data Availability is managed by third party who owns the infrastructure .Researches on Security in single Cloud is paid more attention than in Multi-Cloud. Organizations are migrating towards multi-Cloud due to its ability to overcome issues like data Availability, integrity and authenticity in this paper; we describe an architecture for security of data in multi-Cloud environment. The security of the data can be done by using different secret sharing algorithm. A systematic analysis of the various security algorithms is done, to improve security on multi-Cloud. This architecture will address data security in multi-Cloud environment and enhance security to some extent.
Keywords: Multi-Cloud, AES, DES, 3DES, RSA, CSP.
Abstract
A Survey on Dynamic Slot Configuration Techniques for Hadoop Clusters
Rashmi S , D Khasim Vali
DOI: 10.17148/IJARCCE.2016.53112
Abstract: Hadoop is an open-source framework used for processing and handling big data in a distributed environment. MapReduce is a programming model using which we can create applications to process massive amount of data laterally, on large clusters of commodity hardware in a reliable manner. One of the major concerns in Hadoop is to minimize the makespan of a collection of MapReduce jobs. The static slot configuration technique in Hadoop may lead to long makespan and low resource utilization. To improve the performance of system dynamic slot configuration and appropriate scheduling policy must be adapted. This paper is a survey on different dynamic slot configuration techniques.
Keywords: Hadoop, MapReduce, minimum makespan, dynamic slot.
Abstract
Study of Geometrical structure of Perfect Difference Network (PDN)
Sunil Tiwari, Rakesh Kumar Katare, Vinod Sharma, C.M.Tiwari
DOI: 10.17148/IJARCCE.2016.53113
Abstract: Geometrical Structure of PDN architecture can be considered as a parameter for critical study for connectivity and complexity of interconnection network. This paper illustrates the new pattern and properties for improving performance and latency time and is also useful for path selection, fast and secure communication system between processors. In this paper the mapping and message passing problem/method is also discussed, which allows the use of standard tools for solving it/problems. Mapping between processor is done for a study of geometrical structure between processor. The main objective of this paper is to simplify the design and increase the performance of Perfect Difference Network. Out of which we have obtained several pattern and property which is mention in this paper.
Keywords: Perfect Difference Network, Interconnection Networks, Pattern, message passing, Topological properties, modelling, Bit Manipulation.
Abstract
Review on Vocal Cords Analysis using Speech for various Voice Disorders
Trupti Natthu Dhoke
DOI: 10.17148/IJARCCE.2016.53114
Abstract: In this paper we discuss the vocal cords structure, function, position etc. We also discuss various disorders of vocal cord such as vocal cords nodules, polyps, cysts, contact ulcer, gastro esophageal reflux disease, laryngitis, vocal cord tumors, vocal cord paralysis, vocal cord dysfunction, vocal loading, stammering etc. We also discussvarious causes and symptoms of voice disorders. In this review paper we also explain various diagnosis methods method that used by various experts. The various treatments that can be used by doctors to treat the patient according to disease also explain .In this paper we discuss the various technics that can be used to protect vocal cord from overuse and misuse.
Keywords: VCD Gerd, SLP, CT, Stroboscope, Otolaryngologyst.
Abstract
Different Binarization Techniques for Improvisation of Degraded Documents
Shivagaje Pranoti Ashok, Prof. Mrs. A. S. Patil
DOI: 10.17148/IJARCCE.2016.53115
Abstract: In Image binarization, segmentation is a major technique which is used for the separation of foreground and background. Image Binarization technique is used to segment the degraded images in order to gain images similar to that of the original images of the documents. One of the well-known techniques for binarization of documents is-Thresholding. This technique is further classified into Global and local thresholding techniques. There are also many techniques for Binary documentation process. Hence the work states the different techniques of binarization which are used for improving the quality of degraded documents.
Keywords: Image binarization, Segmentation, Binary documentation, Thresholding.
Abstract
A Review on Techniques of Image Segmentation
Ms. Kabade Mankarnika Manohar, Prof. Mrs. A. S. Patil
DOI: 10.17148/IJARCCE.2016.53116
Abstract: Image segmentation is a classic & vital issue in image processing. It has been the hotspot for the researchers in the area of image processing. Segmentation is nothing but the process of dividing the image into multiple segments. The main aim is to make image more simple & meaningful. It also helps to find region of interest in a particular image. In this paper, we have covered a review on various segmentation techniques such as thresholding, edge based segmentation, region based segmentation, and clustering approach.
Keywords: Image segmentation, Image processing, thresholding, clustering.
Abstract
Anonymous Authentication of Data Stored on Distributed Cloud
Prof. Sagar Rajebhosale, Mr. Pravin Dobe, Mr. Piyush Dani, Mr. Kaustubh Kulkarni, Mr. Sunil Jadhav
DOI: 10.17148/IJARCCE.2016.53117
Abstract: Authors propose an anonymous authentication for secure data storage in clouds for different departmental activities of an institute. In this scheme, the cloud verifies the authenticity of the user without knowing the users identity before storing data, also has the feature of access control in which only valid users are able to decrypt the stored information. Along with access control user revocation is also done that is existing user can be removed and cannot further access the data stored in cloud. The cloud storage is distributed. The cloud storage can distributed according to the requirement of the organization. System is very useful for sending messages anonymously. But only authorized user can do so i.e. anonymous but valid user only can send messages. This makes cloud computing a more secure approach. The scheme also gives the feature of text filtration which eliminates the meaningless words to optimize cloud storage. Moreover, our scheme gives the feedback policy needed for the performance improvement with different parameters anonymously. The main focus is on anonymous authentication so that one can give valid feedback, complains without revealing once identity. Authors aim to promote paperless work by means of e-notices. This approach can prove helpful for government and non-government organizations.
Keywords: Access Control, Authentication, Attribute-Based Signatures, Attribute Based Encryption, Cloud Storage, Text Filtering.
Abstract
Design and Implementation of Dual Polarized Printed Antenna for RFID Application
N. Kanniyappan, V. Saranya, M. Swarnalatha, N. Tamilarasi
DOI: 10.17148/IJARCCE.2016.53118
Abstract: The Radio Frequency Identification (RFID) was introduced as a new technology of Barcodes. RFID is automatic identification technology which uses radio frequency electromagnetic field to identify object carrying tags when they come close to the reader. Antenna are utilized respectively at the reader and the tag namely, reader antenna and the tag antenna. The purpose of the reader antenna is to process a transmitting / receiving so the reader can identify the presence of one or several RFID tags. RFID tags features and electronic chip with an antenna in order to pass onto the interrogator. Since the tag antenna on normally linearly polarized, circularly polarized radiation of reader antenna is preferred in order to make the identification reliable and more efficient, regardless of the physical orientation of the tag antenna. One of the important things in RFID tag is reduce size with conserving a good read range. This is can be achieved through developing a small antenna with high gain. Antenna design has played a critical role in the increasing development of RFID technology. Microstrip antenna is the best form of the printed antenna was designed by ADS simulation tool a modification to prevailing design is tried out and comparable results are obtained. This paper present the Design of the patch antenna with the hybrid coupler where the Return loss, Gain, Directivity is discussed for same patch antenna with an increase in its slots. The size of the element is determined by the operating frequency, dielectric constant and height of the substrate. Later the antenna was measured by using VNA (Vector Network Analyzer) to perform the antenna measurements.
Keywords: ADS, Microstrip antenna, Hybrid Coupler, RFID.
Abstract
Automatic Detection Method of Leukaemia by Using Segmentation Method
Dinesh Warude, Ramanand Singh
DOI: 10.17148/IJARCCE.2016.53119
Abstract: In this paper, we are introducing the Disease of Leukaemia or called cancer of blood cell. Number of methods have been introduced for the effectiveness of white blood cell segmentation, multispectral imaging analysis technique like histogram equalization and threshold, k-means clustering, active contours, watershed transform, and many more. These techniques alone not give a significant segmentation rate, that�s why it is better to develop a system which is hybridize with certain segmentation techniques in order to achieve a better segmentation rate in overall procedure. As a new approach we are going to develop a system comprises of techniques like fuzzy c-means clustering, gradient based watershed transform and initial pre-processing done through HSV color transform.
Keywords: [1], HSV color Transform [2], Extract Saturation Component [3], Fuzzy C-means clustering on HSV transformed Image [4], Morphological Operations & Reconstruction Process [5], Gradient Based Watershed Transformation [6], Final Segmented Image (Segmenting leukocytes and blast cells).
Abstract
Literature Review: Navigation Systems for Fastest Route
Prof. Suvarna Pansambal, Nikhil Iyer, Vira Meherkar, Pankaj Sharma
DOI: 10.17148/IJARCCE.2016.53120
Abstract: Navigation system is very Essential for every person, let it be travelling from one place to another or to find the distance between multiple locations or to get information about a place. This paper gives the review of different web based applications which are used in Mumbai for travelling by many users. This paper gives us a study of different applications used for travelling to multiple destinations via different modes of transportation i.e. Bus, Train, Taxi, Metro, etc. Each and every application have some pros and cons because the working of all the applications are different and Each and every application tries to solve a single problem.
Keywords: Navigation system, fastest route, Mumbai transportation system.
Abstract
Semisupervised Based Spatial EM Structure for Microarray Analysis
M.Revathi, K.Abinaya, R.Geetha
DOI: 10.17148/IJARCCE.2016.53121
Abstract: Microarray technology is one of the significant biotechnological means that allows recording the expression levels of thousands of genes concurrently within a quantity of different samples. Among the large amount of genes presented in gene expression data, only little fraction of them is efficient for performing a certain diagnostic test. So implement feature subset selection approach to reduce dimensionality, removing irrelevant data and increase diagnosis accuracy which is able to cluster genes based on their interdependence so as to mine important patterns from the gene expression data using Spatial EM algorithm. It can be used to calculate spatial mean and rank based scatter matrix to extract relevant patterns and further implement classification to diagnosis the diseases. A semi-supervised clustering is shown to be effective for identifying biologically important gene clusters with excellent predictive capability. The experiment results prove that Spatial EM based classification approach provides improved accuracy in diseases diagnosis.
Keywords: Microarray, Gene Expression, Spatial EM, Scatter Matrix, Disease diagnosis.
Abstract
Real Time Patient Monitoring System Using LabVIEW
Manju Babu, Roshna Rose Raju, Sunil Sylvester, Teenu Mary Mathew, K M Abubeker
DOI: 10.17148/IJARCCE.2016.53122
Abstract: The objective of this paper is to present a Real Time Patient Monitoring System using LabVIEW, which enables continuous monitoring of a patient and helps the doctors to make better diagnosis. The system acquires, analyses and processes certain physiological parameters of a patient such as body temperature, Electrocardiogram and pulse rate. NI LabVIEW is used to take the current body temperature from the temperature sensor and ECG signals and heart rate from the ECG sensor attached to the DAQ (Data Acquisition � NI USB 6211) Signal Accessory. An alert file can also be created when any parameter exceeds the limit beyond a set point and can transfer the alert in the form of messages via Bluetooth. It can be used to perform routine tests as well for continuous monitoring of a hospitalized patient. LabVIEW is a user friendly platform which supports GUI interface for experiments and analysis of various physiological parameters which is essential for the patient�s wellness. Electronic records can be made which is useful for future references.
Keywords: Bluetooth, Data Acquisition, ECG, LabVIEW, Pulse Rate.
Abstract
Cost Based Navigation
Prof. Mahendra Patil, Kiran Roy, Bhakti Tigdi, Amit Kumar Yadav
DOI: 10.17148/IJARCCE.2016.53123
Abstract: Cost-to-go Map is an application used for navigation with cost facility. The project aims at building an application which will be useful to masses. The application includes route guides with cost feature. This application aims to provide approximate travel cost by all modes of transportation from a source to destination. In this application we also include the existing features that includes duration of travel, traffic updates and various path between the source and destination. Besides, it also includes public transit schedules along with fare charts.
Keywords: Cost, distance, time, navigation.
Abstract
A contextual survey on Speech Recognition Systems for Natural Language
Priyanaka R, Manjunath A E
DOI: 10.17148/IJARCCE.2016.53124
Abstract: The paper presents an overview of the automatic speech recognition (ASR) systems with the goal of bringing forth how the advancements in field of ASR have been applied in attempt to develop a natural language ASR. Initial sections of this paper will introduce the basic building blocks of an ASR and interactions among them to implement a speech recognition system. The techniques used in each of these building blocks are briefly introduced. Later sections of this tutorial will focus on efforts at building these essential building blocks for implementing a Kannada ASR and techniques employed for this purpose.
Keywords: ASR, Acoustic, Vector Quantization, DTW.
Abstract
Collaborative Wireless Gesture Controlled Robotic System
Prof. Amol Sankpal, Surabhi Chawan, Saif Shaikh, Arzoo Tisekar
DOI: 10.17148/IJARCCE.2016.53125
Abstract: Many techniques have been developed to control robotic systems using various human computer interaction (HCI) mechanisms. One such method is by using gestures. We have implemented a prototype using gesture as a tool for communicating with machine. Command signals are generated using certain gesture control algorithm. These generated signals are then given to the robot for navigation in specific direction. In previously developed systems, if the robot experiences any obstacles, it either becomes immobile or collides with it. Therefore, we present in our prototype a robotic arm, which will try to remove any obstacle in its path. Gesture command can also be used to operate any robotic system which helps to simplify human task. This paper provides an aid to collaboratively control robot with robotic hand using real time image processing.
Keywords: HCI; gestures; command signals;navigation; image processing.
Abstract
Interpretation of Human Stages from EEG Signals Using LabVIEW
Tina Thomas, Mareena James, Roshmi Rose Shaji, Binu C Pillai
DOI: 10.17148/IJARCCE.2016.53126
Abstract: This document describes the analysis of Electroencephalogram (EEG) or brain signals using computational tool (LabVIEW) to interpret human stages such as drowsiness, sleepy state etc. Different thoughts and human stages generate different EEG signals. LabVIEW (Laboratory Virtual Instrument Engineering Workbench) is a graphical programming language that uses icons instead of lines of text to create applications. The EEG signals are analysed in LabVIEW to reveal the features which describes the human stage. Various filters are used to extract the feature and comparison between the outputs of all filters is also done. This feature will indicate the stage. This result could be displayed using an external hardware indicator. This determined stages or emotions could find applications in various fields such as robotics, mobility control etc. Throughout the project the brain signals will undergo signal conditioning and processing to extract the feature which will determine the human stage.
Keywords: EEG, Lab VIEW, human stages, indicator.
Abstract
Grading Based Analysis System
Nikhita Karkera, Anamika Malakar, Jyotikumari Pradhan, Prof.Rohini Patil
DOI: 10.17148/IJARCCE.2016.53127
Abstract: Accreditation of educational Institutions/programs is a global practice and which is to be known by various developing and developed countries for one or more purposes. Accreditation can be in general summarized as a process, based on professional judgment, for evaluating whether or not an educational Institution meets predefined specified standards of educational quality. In the existing result analysis system, the entire related job with the result analysis has to be done manually. For calculating the pass percentage or to extract the subject wise marks lots of paper work has to be done. It is quite a tedious work and requires lot of hard work. It can even incur errors which will ruin the complete work. Analysis and understanding of the result as well as comparison with the previous years is a difficult. We proposed an application for generation of a result analysis report which will be in format such that the parameters consider while NBA accreditation are satisfied. It will overcome all the drawbacks of the existing system. It will help save a lot of time and effort, as everything will be done in a computerized way, it will be less prone to error. For better understanding and comparisons year wise result, Graphical representations will also be included. This report of result analysis will clearly reflect about the quality of the methods and efforts taken by the institution for betterment of students� performance.
Keywords: CGPA, NBA, Accreditation, Graphical representations, Analysis, Successive, Completely computerized.
Abstract
Loan Prediction Using Ensemble Technique
Anchal Goyal, Ranpreet Kaur
DOI: 10.17148/IJARCCE.2016.53128
Abstract: Extending credit to individuals is necessary for markets and society to function smoothly. Estimating the probability that an individual would default on their loan, is useful for banks to decide whether to sanction a loan to the individual or not. We introduce an effective prediction technique that helps the banker to predict the credit risk for customers who have applied for loan. A prototype is described in the paper which can be used by the organizations for making the correct or right decision for approve or reject the request for loan of the customers. The paper uses three different models (SVM Model, Random Forest Network and Tree Model for Genetic Algorithm) and the Ensemble Model, which combines these three models and analyses the credit risk for optimum results.
Keywords: Ensemble, Prediction, Loan, Random forest.
Abstract
Vehicle Recognition Based on Tail Light Detection
Chinmoy Jyoti Das, Parismita Sarma
DOI: 10.17148/IJARCCE.2016.53129
Abstract: During day time numerous approaches have been implemented on vehicle recognition .It is very much easier to recognize vehicles during day time compared to night time .We can capture photo of every part of vehicle during day. But the appearance of vehicles during night time is strikingly different when compared to its daylight counterpart as several attributes come into picture such as surrounding light, color of vehicles, reflection of lights on the body of vehicles, etc. It becomes difficult to recognize or take a picture of every parts of vehicle. When driving in dark conditions, we cannot see the whole body of the vehicle present in front of us due to lack of light conditions, we are only able to see their tail lights and brake lights. So it becomes very much difficult to understand whether it is bus, car or other vehicle present in front. In this paper we try to show a vehicle recognition system which will be able to recognize vehicle at night time environment by locating and segmenting tail light.
Keywords: vehicle recognition, reflection of light, tail light, brake lights, recognition system.
Abstract
Children’s Transportation Safety System Using Real Time Face Recognition
Mekha Joseph, Nimmy Joseph, Surya Sajeev, Therese Yamuna Mahesh
DOI: 10.17148/IJARCCE.2016.53130
Abstract: In this paper we presents a visual system for monitoring children entering and leaving the school bus. It enhances the safety of children during their daily transportation in school bus. The system contains two parts, entry monitoring and exit monitoring. The basic idea is to detect each child using real time face detection algorithms and subsequently utilize face recognition algorithms to determine the actual identification of children when they enter into and leaves the bus. Hence the system identifies the child who fail to get down from the bus. This information will be communicated to his/her parents by issuing an alert message. The system is mainly useful in situation where air conditioned buses are used, that when the bus comes to a halt the temperature inside the bus will rise and when small children forget to get down from the bus it may lead to death. A complete prototype of the proposed system was implemented and tested to validate the system functionality. The results show that the system is promising for daily transportation safety.
Keywords: Face detection, Face Recognition, Principal Component Analysis (PCA), AT commands.
Abstract
Understanding the Fundamentals of Content Based Image Retrieval System
Sukhdeep Kaur, Loveneet Kaur
DOI: 10.17148/IJARCCE.2016.53131
Abstract: Image retrieval system is used for browsing, searching and retrieving images from a large database of digital images. Content-based means that the search analyzes the contents of the image rather than the metadata such as keywords, tags, or descriptions associated with the image. The term content might refer to colors, shapes, textures, or any other information that can be derived from the image itself. Content Based Image Retrieval (CBIR) is desirable because searches that rely purely on metadata are dependent on annotation quality and completeness. To develop better content based image retrieval system, it is important to improve various processes involved in retrieval like feature extraction, image segmentation, image decomposition and similarity matching techniques. In this paper we discuss the fundamental aspects, visual features and techniques for fast searching and retrieval of images from the database.
Keywords: feature extraction, multidimensional indexing, retrieval design, image decomposition, matching techniques.
Abstract
Source-Channel Coding Approach to Generate Tamper-Proof Images
R.Saravanamoorthi, S.Ravindiran, I.Sasidharan, M.Pushparaj, K.Sathish
DOI: 10.17148/IJARCCE.2016.53132
Abstract: Recent works in this field offer algorithms that not only localize the tampering, but also recover the original content in the lost area. The self-restoration problem can be modeled as a source-channel coding problem. The original image is compressed using an efficient source en-coder. The output is then channel coded to be capable of tolerating a certain rate of tampering. At the receiver, de-coder reveals the encoder output bit stream if the tampering is below the certain limit. Decoder exploits the location of the erased blocks at the decoding, which are known thanks to the embedded check bits. The output of the source decoder is then used to replace the content of the tampered area. Watermarking the original images to protect them against tampering has recently attracted an overgrowing interest. The self-restoration problem from this general viewpoint, the performance is significantly improved comparing to the state of the art schemes, in terms of the quality of watermarked image, quality of the restored content, and tolerable tampering rate.
Keywords: Image tampering protection, self-recovery, and water marking.
Abstract
Detection of Unavailability and Black hole Attack over ALERT protocol in MANET
Akshay Jaitpal, Pavan Kodihal, Pratik Gothiwadekar
DOI: 10.17148/IJARCCE.2016.53133
Abstract: MANET (mobile ad hoc network) is a wireless, infrastructure-less mobile network. Every device in a MANET can move omnidirectional. Mobile Ad-Hoc Network (MANET) uses anonymous routing protocol for security purpose. ALERT protocol hides nodes original identity from an intruder, so that the observer cannot threaten the security of the network. There are few prevailing anonymous routing protocol available for MANET. The protocols such as ASR, AO2P, ALARM provides node anonymity, but these protocols do not provide route anonymity. ALERT protocol dynamically divides the partition into zones. Every zone has nodes which act as intermediate nodes. The nodes get randomly selected for routing so that the observer cannot identify the route. ALERT provides source, destination and route anonymity using pseudonym which changes frequently. ALERT also has a strategy against timing attacks, Blackhole attacks.
Keywords: Mobile Ad-Hoc Network, Anonymity, Timing attack, Black hole attack etc.
Abstract
Automated Attendance by Face Recognition and SMS Sending to the Authorized Person
Prof. Hina Malik, Prerna R. Sakharkar, Pranita S. Giri
DOI: 10.17148/IJARCCE.2016.53134
Abstract: Face recognition is an integral part of biometrics. In biometrics basic traits of human is matched to the existing data and depending on result of matching identification of a human being is traced. Facial features are extracted and implemented through algorithms which are efficient and some modifications are done to improve the existing algorithm models. A face recognition system using the SIFT (Scale invariant feature transformation) algorithm was implemented. The algorithm is based on Image features approach which represents a SIFT method in which a small set of significant features are used to describe the variation between face images. Experimental results for different numbers of faces are shown to verify the viability of the proposed method. In this project an approach to the detection and identification of human faces is presented and then recognizes the person by comparing characteristics of the face to those of known individuals is described. And we introduced a new approach that give report by SMS to parents or authorized person using GSM modem.
Keywords: Face Recognition; SIFT; Local Feature Point; Real-time; Mobile Device.
Abstract
Image Registration Algorithm Based on Image Normalization
Wu Jianzhen, Li Hongqin, Luo xiao
DOI: 10.17148/IJARCCE.2016.53135
Abstract: Image registration is a central problem to many tasks for image processing and is widely used in many applications such as automatic navigation, medical diagnostics, computer vision and etc. An image registration scheme using image normalization is proposed in this paper. Image feature points robust to rotation, scaling, noise and JPEG compression are obtained by the affine invariant Harris feature point detector and used to make the Delaunay triangle to estimate the affine transform parameters through image normalization. Simulation results show that the proposed scheme can effectively estimate rotation, scaling and translate parameters and has high estimation accuracy under common image attacks.
Keywords: Image normalization, Harris detector, Affine transforms, Robustness.
Abstract
PCB Fault Detection using Embedded Image Processing
Snehal Rane, Vartika Rai, Sukeshna Awate
DOI: 10.17148/IJARCCE.2016.53136
Abstract: Initially, the uncovered PCBs (PCB Without components attached to it) were inspected erratically using manual inspection systems, this involves human operators. This technique is costly since it is highly error-prone Due to human error. The intention of this project thus is to supply a different low-priced and Comprehensive defect detection technique. The basic technique of the proposed technique is to detect the defect based on the digital image of the PCB using image processing techniques. We apply the machine vision concept to inspect the bare PCB. We first compare a standard PCB image with a PCB image to be inspected using a simple difference algorithm that can detect the defected region. Image difference method is one of the simplest way for the examination of the PCB defects.
Keywords: Matlab, PIC microcontroller, Conveyer, PCB database etc.
Abstract
An Efficient Parallel Fuzzy Rough set Based Rule Generation Using Map Reduce
N. Sukanya, B. Madusudhanan
DOI: 10.17148/IJARCCE.2016.53137
Abstract: Massive background knowledge detection shows a challenge with the information capacity growing at an unprecented speed. MapReduce has succeeded large computation. The latterly introduced MapReduce method has more consideration from industry for its wide ranging analysis. Rough set concept is a plow which is used to obtain information from completeness data. The proposed system using unrefined sets based knowledge discovery from big data, the parallel approximate set methods for information discovery. The propose fuzzy supported pattern generation. Compare with existing algorithm the proposed system give high accuracy of rule generation based fuzzy based rough set.
Keywords: MapReduce; Bigdata; Roughset theory; fuzzy based rule generation.
Abstract
An Android based application: Cab pooling
Mrs. Chaitrali Dangare, Ms. Gouni Akila
DOI: 10.17148/IJARCCE.2016.53138
Abstract: Many transportation modes are available in our country but, still transportation is a major issue nowadays in metropolitan cities. Increase in number of cars on road leads to many problems such as traffic congestion, health problems, air pollution, environmental degradation etc. This problem can be reduced by using a mechanism called as �Cab sharing or pooling�, which allows you to share your cab with other passengers. Cab pooling is the sharing of car journeys so that more than one person travels in a cab that reduces each person�s travelling cost such as fuel cost, stress of driving and security to passengers etc. In this paper we have proposed to develop an android based application which helps user to share expense, not worry about hiring a cab and making new connections.
Keywords: Cab pooling; android; Location tracing service; cab management; traffic congestion.
Abstract
A Secure Protocol for Location Based Queries
Pooja M. Navagan, Nikita S. Kamble, Yogita S. Kayande, Prof. M. M. Kokate
DOI: 10.17148/IJARCCE.2016.53139
Abstract: In this paper we present a solution to one of the location-based query problems. This problem is a user wants to query a database of location data, known as Points Of Interest (POI), and does not want to reveal his/her location to the server due to privacy concerns. The owner of the location data, that is, the location server, does not want to simply distribute its data to all users. we propose a novel protocol for location based queries. our protocol is organized in two stages. In first stage user privately determines his/her location within public domain by using oblivious transfer this data contains both Id and associated symmetric key for the block of data in the private domain. In the second stage we are concentrating on the content protection where authorized user can only get the information he wants by using private information retrieval(PIR) method. Hence our protocol thus provides protection for both the user and the server. The user us protected because the server is unable to determine his/her location. Similarly, the servers data is protected since unauthorized user can only decrypt the block of data obtained by PIR with encryption key. The LBS has to ensure that LS�s data is not accessed by any unauthorized user. During the process of transmission the users should not be allowed to discover any information for which they have not paid. It is thus crucial that solutions be devised that address the privacy of the users issuing queries, but also prevent users from accessing content to which they do not have authorization.
Keywords: private query, private information retrieval, oblivious transfer, DES algorithm.
Abstract
RBI 3X-Fingerprint Based ATM Machine
Bharti Patil, Bhagwan S. Chandrekar, Mahesh P. Chavan, Bhavesh S. Chaudhri
DOI: 10.17148/IJARCCE.2016.53140
Abstract: The main objective of this system is to develop a system that will increase the ATM security. However, despite the numerous advantages of ATM system, ATM fraud has recently become more widespread. In this paper, we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds..Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. An 8-bit ATmega16 microcontroller developed by Microchip Technology is used in the system. The necessary software is written in AVR studio programmer and the system is tested.
Keywords: ATmega16 microcontroller, Finger print recognition, Liquid Crystal Display, DC motor.
Abstract
A Review: Geo-Information Technology for Web-mapping application
M. R. Heda, S. V. Chikurde
DOI: 10.17148/IJARCCE.2016.53141
Abstract: A GIS is typically consists of Software, hardware, data and users. Today, a vast majority of Internet users uses Web GIS technology, Some example are finding residency and address in an unknown city or even if you lost you can detect your location using your phone GPS and easily find your path. For Creating a Web-GIS application the first and important step is to create GIS data. Second one is to store the created data. In order to store GIS data for web there are many Data Management System (DBMS) that support spatial data. There are many GIS software application to generate, store, manipulate and update GIS data. After storing GIS data on the database publishing map and the data from database is third step. To do this thing, we have much application which allows us to share, edit and process geospatial data. Web GIS is capable to become efficient tool to be used in supporting the process of such as data sharing, decision making, manipulation of data information and map. Therefore by interaction and interoperability of user interface application, database application and server application enable us to create our own Web-GIS application.
Keywords: Web-GIS, Data Server, Web Server, Web Map Server.
Abstract
Video based Heart Rate Measurement from Human Faces
Anjali Garala, Pournima Temkar, Shreyash Trigune, Tulsidas Patil
DOI: 10.17148/IJARCCE.2016.53142
Abstract: This paper presents a method for measuring the heart rate (HR) of a human face and does not require any costly medical equipment. The video sequences are captured with a camera attached to Smart phones. In this paper, we have attempted to measure the HRs of a group of people using red, green and blue signals in the video sequence. In addition, we have repeated the experiment on various parts of the human body. The results reveal that the forehead and checks are more suitable for the measurement purpose.
Keywords: Heart Rate, Video Sequences, Camera, Colors.
Abstract
A Survey on Various Classification Techniques in Email Spamming
Gurwinder Kaur, Rupinder Kaur Gurm
DOI: 10.17148/IJARCCE.2016.53143
Abstract: Email becomes the major source of communication these days. Most humans on the earth use email for their personal or professional use. Email is an effective, faster and cheaper way of communication. The importance and usage for the email is growing day by day. It provides a way to easily transfer information globally with the help of internet. Due to it the email spamming is increasing day by day. According to the investigation, it is reported that a user receives more spam or irrelevant mails than ham or relevant mails. Spam is an unwanted, junk, unsolicited bulk message which is used to spreading virus, Trojans, malicious code, advertisement or to gain profit on negligible cost. Spam is a major problem that attacks the existence of electronic mails. So, it is very important to distinguish ham emails from spam emails, many methods have been proposed for classification of email as spam or ham emails. Spam filters are the programs which detect unwanted, unsolicited, junk emails such as spam emails, and prevent them to getting to the users inbox. The filter classification techniques are categorized into two either based on machine learning technique or based on non-machine learning techniques. Machine learning techniques, such as Na�ve Bayes, Support Vector Machine, Adaboost and decision tree etc. whereas non- machine learning techniques, such as black/white list, signatures, mail header checking etc. In this paper we review these techniques for classifying emails into spam or ham.
Keywords: Ham, Spam, Email Spamming, Spam Filter, Email Spam.
Abstract
Face Recognition using Principal Component Analysis and ANN
Shiwani, Dr. Kamal Sharma, Er. Gurinder Singh
DOI: 10.17148/IJARCCE.2016.53144
Abstract: Human Face detection is the process of identifying the features of faces to detect the faces on the basis of the discriminant features. Features of faces are eyes, ears, eyebrows, nose, lips, hairs, chicks, forehead etc. Face detection can be carried out using these features of faces. Face is important part to identify the person. It can be used as the computer visual application. Face is the important part of our body by which it is easy to identify and recognize the person. Face detection is one of the challenging tasks as there are many issues such as changes in the appearances of faces, variations in poses, noise, distortion and illumination condition. In this paper, the framework for efficient face detection using fusion of PCA and Artificial neural network is presented. The image features are represented as reduced features space by using PCA which is a dimensionality reduction technique. Further these features are given as input to the ANN for training. Multilayer perceptron network is used here for accomplishing this task.
Keywords: PCA, Eigen faces, Eigen space, Face Detection, Face recognition, ANN.
Abstract
Knock Monograph Procreation – An Automatic Question Paper Generation System
D.Dharani, Mrs.S.Rajini, V.Gokilavani
DOI: 10.17148/IJARCCE.2016.53145
Abstract: The process of setting a question paper is tedious process which takes a lot of time and energy. Setting question paper involves depth knowledge in the subject and it is a challenge to set a good question paper that tests the intellectual of student rather than students� memorizing capacity. This system makes that job easier by generating a question paper randomly based on the criteria specified by the teacher. This makes a question paper unpredictable. The existing systems generate only questions based on mark for complete syllabus only. The new system generates question with split up of question into two parts based on the teacher�s opinion and generates a question paper which consist of least similarities between the questions from same unit.
Keywords: Question paper generation, Automation, Random.
Abstract
Security enhancement for finger print using double encryption and fuzzy vault scheme
Limshe Pearce.A, Mala.R, Nirmala.A, Chandru.B
DOI: 10.17148/IJARCCE.2016.53146
Abstract: Security is a major crisis which is faced by everyone in the world. Due to increase in data theft and data hacking it is very essential to build a security system to protect the data which result in the usage of passwords and keys. This method involves the user to memorize the password and key which can be easily lost by the user or broken by the hacker which leads to the development of a better security system. Biometric features have the variety of advantages compared to other features. Biometric features are unique and cannot be misused by others .The most commonly used biometric features face, palm, retina and fingerprint. Among which fingerprint is the oldest method of recognition with high accuracy .This paper focus on using the fingerprint biometric feature for developing the security system with fuzzy vault. Double encryption and chaos encryption are used for encryption process. Also, the experimental result shows that better security is achieved with fuzzy vault.
Keywords: fuzzy vault scheme, Chaos encryption, Double encryption, finger print image.
Abstract
Making things invisible using Optical Camouflage Technology
Rahul.T, RathinaMurugan.R
DOI: 10.17148/IJARCCE.2016.53147
Abstract: In many science fiction movies invisible things are seen. This paper describes the technique of making things invisible by optical camouflage technique. The things to be made invisible is coated or covered with retro reflection material. A projector is used to mask the covered material making object virtually transparent. Capturing the background image requires a video camera, which sits behind the person wearing the cloak. The video from the camera must be in a digital format so it can be sent to a computer for image processing using image based rendering technical. There are some useful applications for this simple but astonishing technology.
Keywords: Optical Camouflage Technology, Retro-Reflective material, Head Mounted Projector (HMP).
Abstract
Compression of Image by K-SVD Method
Rounak Mangroliya, V.M Joshi
DOI: 10.17148/IJARCCE.2016.53148
Abstract: A new fingerprint compression technique based on sparse representation is introduced. Obtaining an over complete dictionary from a set of different fingerprint patches allows us to represent them as a sparse linear combination of the dictionary atoms. In the algorithm, first step is to construct a dictionary for predefined fingerprint image patches. For a new fingerprint images, represent its patches according to the dictionary by evaluating l0-minimization problem and then quantize and encode the matrix. In this paper, we consider various factors affecting the compression results. The main idea behind the project is to construct a base matrix whose columns represent features of the fingerprint images, referring to the matrix dictionary whose columns are known as an atoms; for a given whole fingerprint image, create a patches whose number of pixels are equal to the dimension of the atoms; use sparse representation method to obtain the coefficients; then, quantize the coefficients; and last, encode the coefficients with the help of lossless coding methods. Especially at high compression ratios the proposed algorithm is efficient compared with several competing compression techniques like (JPEG, JPEG 2000, and WSQ).
Keywords: Fingerprint, compression, sparse representation,PSNR JPEG 2000, JPEG, WSQ.
Abstract
Image Acquisition on Unearthing Recaptured Images
Pathruni Shiva, Epuri Priyanka, P. Susan Ruthjessy, N.S.M. Akhilesh, G. Lakshmi, A. Haritha
DOI: 10.17148/IJARCCE.2016.53149
Abstract: As there is a huge growth of technology today we can�t say properly that the image shown by someone is the original copy and other is duplicate just by seeing with our naked eyes .To detect such anomalies the technology to use should be also big in detection perspective. DCT coefficients features are proposed and central moments are analyzed to verify for detection. Furthermore, mode based first digit features of DCT coefficients in both luminance component and chrominance component are presented to distinguish the recaptured images from the real-scene images. Finally, these two kinds of features are combined to improve the detection performance.
Keywords: Recaptured image forensics, Color moments, Mode based first digit features.
Abstract
Detect and Separate Localization Text in Images
Mujaffar Shikalgar, Suraj Thorat, Saddam Mulla, Prof. B.A. Jadhawar
DOI: 10.17148/IJARCCE.2016.53150
Abstract: Detect and separate localization text in Images aims towards an approach with respect different sizes, colors and background complexities. Digital image is to use caption text it provide important information about the image. Use preprocessing method for filtering the noise and sharpening the edges in the complex image. Preprocessing also perform RGB to GRAY conversion. Canny edge detector is used to detect a wide range of edges in images. Sobel edge detector is used to measure edges of the overall boundaries of the horizontal and vertical axis present in the grayscale image. Sobel edge detector used to measure overall boundaries of horizontal & vertical axis in gray scale image. Use localization in this method combined the horizontal& vertical projection method to localize text string present in gray scale images. All the pixels are characters like black as well as white. Use optical character reorganization it is a last & final method.
Keywords: Image segmentation, Optical character recognition, connected component analysis, Text Detection, Edge detection.
Abstract
Security Danger to Portable Interactive Media Applications: Camera Constructs Assaults With Respect to Cellular Telephones
Prof. S.R. Javheri, Bhumika Attarde, Dipika Patil, Pradnya Gulave, Rakhi Tarde
DOI: 10.17148/IJARCCE.2016.53151
Abstract: Today portable cell phones are capable, and numerous cell phones applications use remote media communications. Mobile telephones security has turned into an essential part of security issues in remote sight and sound communications. We concentrate on security issues identified with a few new assaults that depend on the utilization of telephone cameras. We actualize assaults on genuine telephones and show the possibility and viability of the attacks. Furthermore, we propose a lightweight protection plot that can adequately abscond these assaults.
Keywords: Spy camera, Smart phone Application, Android Security, GPS.
Abstract
Review on Clustering and Routing Algorithm to Prolong the Lifetime of Wireless Sensor Network
Priyanka Yadav, Nidhi Gulati
DOI: 10.17148/IJARCCE.2016.53152
Abstract: Wireless sensor network contains the huge number of power constrained sensors, which collect data from other sensors and transmit them towards the base station in a manageable manner. Sensing and transmitting data require high energy. Energy saving is a great challenge in wireless sensor network. Clustering techniques are use to reduce the energy consumption in wireless sensor network. Here we discuss some clustering techniques for heterogeneous and homogeneous wireless sensor network.
Keywords: Energy Consumption, Clustering, Wireless network, Heterogeneous, Homogeneous environment.
Abstract
Model of Solar Hydrogen Power and Fuel Cells System
Musaed Saeed Alyazeedi
DOI: 10.17148/IJARCCE.2016.53153
Abstract: This study is a real model which aims to show how the elements of the photovoltaic system, electrolyzer and fuel cells come to overcome and reform intermittent and fluctuating renewable energy. Some challenges of PV cells are sun set, cloudy skies, snow and dust. These environmental conditions block sunlight capture via photovoltaic, so, the electrolyzer produces gases and stores it via hydrogen tank. During normal day, PV generates electricity to feed the load, but if the sky is cloudy or raining or we have a lack of generation for any reason, the fuel cells will generate power to feed load directly, and this fuel will be the gases that were produced and stored via the electrolyzer the previous day.
Keywords: Photovoltaic, electrolyzer and fuel cells.
Abstract
4th Generation SCADA Implementation for Automation
Ashish N Koushik, Rashmi BS
DOI: 10.17148/IJARCCE.2016.53154
Abstract: SCADA [1] is the acronym that stands for Supervisory Control and Data Acquisition system [2]. Acquiring data in real-time, it can impose supervisory control over the module to monitor and manage states. It comprises of gathering data, exchanging it back to a centralized system, completing essential investigation and control, and after that showing this information on various administrator screens. This paper mainly focuses on the architecture to build a 4th generation SCADA Unit with voltage regulation for automation (Internet of Things) [3] which uses cloud topology to build a scalable and a reliable system. A cloud controlled [4] system which can be operated remotely by using internet which provides maximum flexibility in operation of the unit as well as a solid platform in cloud based automation.
Keywords: IOT, Arduino, SCADA, 4th Generation, Middleware, ESP.
Abstract
A Proposal for Detecting Vampire Attacks in Wireless Sensor Networks
Shiwani N. Laghawe, Nekita A. Chavan
DOI: 10.17148/IJARCCE.2016.53155
Abstract: Wireless sensor networks (WSNs) are the foremost promising research direction in sensing and pervasive computing. Previous security work has focused totally on denial of service at the routing or medium access management levels. Earlier, the resource depletion attacks are thought about solely as a routing drawback, very recently these are classified into new category as �vampire attacks�. Planned work examines the resource depletion attacks at the routing protocol layer that disable networks permanently by quickly debilitating node�s battery power. The new method for detecting Vampire Attacks is discussed in this paper.
Keywords: Network Lifetime, Routing Protocols, Vampire Attack, Wireless Sensor Networks.
Abstract
A Review on Secure Video Steganography Technique using LSB & MSB
Er. Ginni, Er. Pushpinder Singh
DOI: 10.17148/IJARCCE.2016.53156
Abstract: Steganography is used for secure transmission of secret information by hiding information behind a cover object. Various types of steganography have been used for security of data. Text, audio, image and video steganography were utilized for different purposes. Video steganography can be used for more data to be transmitted under different frames of video. In these paper different types of steganography and different approaches for steganography has been reviewed. On the basis of study of different approaches approach for steganography can be easily adopted.
Keywords: Steganography, Audio Steganography, Video steganography, Security, LSB, MLSB.
Abstract
Bus Tracking System and Li-Fi System
Malathi.R, RaveenaRagavi.G, Gopal.K, Dhanasekar.J
DOI: 10.17148/IJARCCE.2016.53157
Abstract: In this project we proposed a new technology called LIFI (light fidelity). Li-Fi technology provides transmission of data through illumination by sending data through an LED light bulb that varies in intensity faster than the human eye can follow. This paper focuses on developing a Li-Fi based system and analyzes its performance with respect to existing technology. Wi-Fi is great for general wireless coverage within buildings, whereas Li-Fi is ideal for high density wireless data coverage in confined area and for relieving radio interference issues. Li-Fi provides better bandwidth, efficiency, availability and security than Wi-Fi and has already achieved blisteringly high speed in the lab. And in this project an RFID card is used and using this RFID card only a passage can enter into the bus. By using GSM message is send to the person�s relative. And by using GPS, if a bus starts from a particular stop the next stop will be identified before the bus arrives that stop. This can be done by LED.
Keywords: GPS, GSM, Tracking System.
Abstract
A Quality Based Novel Subclass Coupling Factor Metric for Evaluating Software
Dr. S.A. Sahaya Arul Mary, M.Kavitha
DOI: 10.17148/IJARCCE.2016.53158
Abstract: Software metrics are developed for the purpose of evaluating the software in all stages of the development process to ensure the inhabitant of quality in all phases. Though the evolution of software programming has been developing over the years, the categorization of software metrics are centered only on procedure oriented software programming and object oriented software programming. In object oriented modular programming, coupling refers to a justifying factor for measuring the quality of program code. As for the code concern, a module with low coupling and high cohesion is an ideal objective of the programmers. The analysis over the classification of types of coupling in object oriented programming is still diminutive and has been an active research in software metrics. The objective of this paper is to propose a coupling metric that could possibly identify the subclass coupling one of the types of coupling, that exist in the software modules there by highlighting the modules that can be focused for further improvement.
Keywords: software metrics, cohesion, coupling, coupling factor, weyuker�s properties.
Abstract
Edge Detection for X-Ray Image using LabVIEW
Meenal Bhatia, Swati.R.Dixit
DOI: 10.17148/IJARCCE.2016.53159
Abstract: Medical imaging has emerged as a new field of research in image processing which consist of image enhancement, visualization, and edge detection. The main objective is to improve medical diagnosis so that we can obtain an image-based information, which focuses on detection of pathological deformations specially for x-ray images. Medical images consist of object edges and noise, hence it is difficult to distinguish the exact edge from noise. Edge detection technique acts as a fundamental tool in feature extraction and feature detection. Edges are nothing but are changes of intensity in an image. Sobel operator, a popular operator used for edge detection algorithms is considered in this work. Sobel operator uses a derivative approximation for finding out edges and uses 2-D spatial gradient measurement for images with vertical and horizontal gradient matrices. Labview is a graphical programming language and is used for interactive applications, hardware integration and real time processing. The proposed work has been done using Labview 14.0.
Keywords: Edge detection, Sobel operator, LabVIEW 14.0.
Abstract
Performance Metrics Optimization of Cluster Based Location Routing in VANET
Bhushan T. Dhok, Atul D. Deshmukh
DOI: 10.17148/IJARCCE.2016.53160
Abstract: In this paper we present optimization technique for efficient routing for VANET. VANET plays an important role in dissemination of traffic and necessity knowledge among vehicles moving on roads. This information is used by various vehicular applications like road safety applications, route enlightenment applications etc. The survey of routing protocols in VANET is meaningful and crucial for smart ITS. This paper explain the applications of various routing protocols for vehicular ad hoc networks. This paper consult with the main five types of protocols for VANET Topology Based, Positioned Based, Geo Cast, Broad Cast, and Cluster Based Protocols and mainly three types of optimization techniques i.e. Ant colony optimization, Particle Swarm Optimization and Honey Bee optimization.
Keywords: VANET, ITS, CBLR, RSU, OBU
Abstract
A New Construction for Para Virtualization in the Cloud Data Storage and Access the Data Using Web Services
Mrs. Mary Rexcy Asha, Ms. S. Sangeeta, Ms. S. Keerthika, Ms. S. Tharani, Ms. B. Swathisri
DOI: 10.17148/IJARCCE.2016.53161
Abstract: Hybrid cloud computing has be a promising solution for Software-as-a-Service (SaaS) providers to effectively handle the dynamic user requests. The SaaS providers can extend their services into the public clouds seamlessly so that the dynamic user request workload to a SaaS can be elegantly processed with both the local servers and the rented computing capacity in the public cloud. However, although it is suggested that a hybrid cloud may save cost compared with building a powerful private cloud, considerable renting cost and communication cost. We design a service provisioning model to manage the on-spot and on-demand requirements of users. PaaS satisfy on-spot by providing space from public cloud to SaaS. This proposed method is done with online dynamic provision algorithm which calculates the number of users request for service. Depending upon this calculation the SaaS will purchase the virtual machine from PaaS and the transactions are done to pay for what is actually used.
Keywords: Platform-as-a-service (PaaS), Software-as-a-service (SaaS), Virtual machine.
Abstract
GUI Controlled Arduino
Mrityunjaya D H, Naveen Kumar, Hemanth Kelagadi
DOI: 10.17148/IJARCCE.2016.53162
Abstract: With the advancement in science and technology, there has been an exponential increase in the demand in the field of wireless communication. The drawback of wired communication is high cost of materials which can be overcome by wireless communication. In this paper an idea of communication between GUI and Arduino board is presented. A high performance smart phone application is developed and integrated with the robot.
Keywords: Graphical User Interface, Bluetooth, Microcontroller, Wireless Application Protocol.
Abstract
An Introduction to MIMO OFDM System with BER Analysis
Pooja Gupta, Prof. Rakesh Kumar Singh, Pratibha Singh
DOI: 10.17148/IJARCCE.2016.53163
Abstract: OFDM is a frequency-division multiplexing (FDM) system used as a digital multi-carrier modulation method. A large number of closely spaced orthogonal sub-carrier signals are used to carry data on several parallel data current or channels. In this paper, BER performance of MIMO (Multi-Input Multi-Output) OFDM system has been compared for AWGN channel, Rayleigh fading channel and Rician fading channel. Later analyze how with different value of Diversity parameter BER performance of Rayleigh fading channel and Rician fading channel has been effected. This paper has been divided into two parts. In first part basic functionof OFDM has been introduced and then in second part BER performance of OFDM has been analyzed.
Keywords: IFFT, Cyclic prefix, ISI, AWGN, Rayleigh, Rician, BER, Matlab, MIMO, OFDM.
Abstract
A Cost Effective Approach towards Virtual Reality: Phobia Exposure Therapy
Tejas Parab, Deepankar Pawar, Akshay Chaudhari
DOI: 10.17148/IJARCCE.2016.53164
Abstract: Advances in the field of 3D graphics and the increase in computing power, the real-time visual rendering of a virtual world is possible in real world. Virtual reality provides new techniques of visualization, composing on the strengths of visual representations. In some instances, virtual reality can provide more accurately the detailing of some features, processes, and so forth than by other means, which allows it to perform extreme close-up examination of an object, observation from a great distance, and examination of areas and events unavailable by other means. Virtual reality exposure therapy is highly used in order to treat PTSD with a success rate of over 70%. Building further on this, we would be providing environments for phobias as varied as acrophobia, phasmophobia, nyctophobia. These environments would be developed on an android device and using a virtual reality headset based on Google cardboard we would carry out the virtual reality simulation. The three chosen phobias are the most widely recognized phobias whereas an android device is used since it has the largest user base in the world. The main aim of our application is to provide Virtual reality therapy apparatus at cheap and affordable rates without compensating on the quality to various therapists in order to expedite the treatment of patients.
Keywords: Virtual reality, Acrophobia, Phasmophobia, Nyctophobia, Affordable, Therapy.
Abstract
Analysis of Affective Speech Signals for Emotion Extraction and Attitude Prediction
Punam M Vitalkar, Prof. P.N. Bendre
DOI: 10.17148/IJARCCE.2016.53165
Abstract: Sentiment Analysis for Attitude Prediction is one of most emerging and globally accepted technique used in business intelligence. In many business intelligence applications, the huge amounts of telephone quality speech samples or telephone calls recorded by Business Process Organizations (BPOs) are processed for emotion extraction and attitude prediction. In this paper, we are using SVM (Support Vector Machine) as a classifier. Through emotion extraction and attitude prediction, customer opinions, various trends are mined, which helps in decision making for corporate industries. In this paper, the framework analysis of affective speech for emotion extraction and attitude prediction is proposed. The rigorous review of similar kind of existing systems is taken followed by the proposed framework.
Keywords: Emotion extraction; sentiment analysis; speech signal; business intelligence.
Abstract
An Ontological Approach for the Semantic Web Search and the Keyword Similarity Metrics
R. Deepa, Dr. R. Manicka Chezian
DOI: 10.17148/IJARCCE.2016.53166
Abstract: The Semantic web search is the structured and meaningful search where the keywords with context meaning and relations are taken as important features. The service of web which provides an easier path to find, reuse, share and combines information a user is in need. Semantic Web is the new generation Web which makes possible to express information in precise, machine-interpretable form. It enables intelligent services such as information brokers, search agents and information filters, and also offers greater functionality and interoperability. Semantic Web promotes Web based applications with both semantic and syntactic interoperability. The users search the web by querying method. The words used as query gain importance to find a relevant information. This paper is focused on an ontological approach where the meaning of the words and semantic relations are given importance. The web ontological tool prot�g� 4.1 is used to find the semantic relation of the web query. Finally the similarity of the ontological keyword with the document is analyzed with keyword weight and relevance based approach.
Keywords: Semantic Web, Ontology, Prot�g�, Similarity Measure.
Abstract
Detecting Targeted Malicious Email by Spam Filtering Using Naïve Bayesian Classification
Mrs. M. Rajeswari, Radhika Rama Rao, Priyadharshini .R, Aarthi .R
DOI: 10.17148/IJARCCE.2016.53167
Abstract: In recent years, Targeted Malicious Email (TME) has become more dangerous. Beyond spam and phishing designed to trick users into revealing information, TME exploits computer networks and gathers sensitive information. It targets on single users and is designed to appear legitimate and trustworthy. In this paper, we propose a new email filtering technique using random forest classifier. A compromised router detection protocol is developed to identify congestive packet losses. We also develop feature extraction procedure to identify TME specific features. Naive Bayesian classification is used to classify mails as either TME or trusted mail.
Keywords: Targeted Malicious Email, router detection protocol, feature extraction, Naive Bayesian.
Abstract
RFID-based Bus Ticketing System
Dr. Vinit Kotak, Ms. Archana Chaugule, Aakanksha Utkhede, Tushar Chemburkar, Saurabh Tendulkar
DOI: 10.17148/IJARCCE.2016.53168
Abstract: In the daily operation of the public transport system, the movement of buses is uncertain because of conditions such as traffic congestion, unexpected delays, irregular vehicle dispatching times, and other incidents. Such uncertainty results in passengers having to wait for their bus to arrive at the bus stop. This paper proposes a new system based on RFID, in which each commuter owns a smartcard fitted with an RFID tag having a unique ID. This card is scanned by the RFID reader at the entrance and again at the exit, and the fare corresponding to the distance travelled is deducted from the commuter�s account. The system uses Google�s General Transit Feed Specification (GTFS), making it adaptable to any transit system for which a GTFS feed is available. In addition, the commuters can track the position of their desired bus in real time through an Android app, and get an occupancy estimate of the bus. The proposed system aims to increase customer convenience and eventually eliminate the use of paper tickets in transit systems.
Keywords: RFID, Ticket issuing, Android, GTFS, Raspberry Pi.
Abstract
A Survey on Challenges, Technologies and Applications of IoT
M. Suruthi, D. Nivetha
DOI: 10.17148/IJARCCE.2016.53169
Abstract: This paper presents IOT (internet of things), which compromises capabilities to detect and connect worldwide physical object into an integrated system. As a measure of internet of things serious concerns are elevated over access of individual privacy and personal data pertaining device .This survey summaries the elements, challenges, evolution, application, security and privacy concerns of internet of things.
Keywords: Internet of Things, Privacy and Security, Sensors
Abstract
A Survey on Internet of Things approach for Smart Eco-System
Yashaswini K, Janhavi .V
DOI: 10.17148/IJARCCE.2016.53170
Abstract: The Internet of Things (IoT) can be incorporated clearly and seamlessly in a large number of heterogeneous end systems, by providing access to data for large number of digital services. The main focus here is on urban IoT system and smart home control system which supports the Smart Eco System vision, using the most advanced technologies as 5G, Artificial Intelligence via pervasive computing ,Cloud of things(CoT) and Internet of things. The IOT supports �Ubiquity� where devices connected anywhere, anytime, with anything and anyone. The word �smart� Smart city means using sensitive information and Communication Technology(ICT). The real-time human behaviors and activities and can be determined by personal devices as smart phones ,Wearable computing devices, smart home and smart city called as Human Dynamics. The capability of the Big Data and Smart Cities will increase quantitative and qualitative perceptive towards the human behaviors. A Non Parametric Bayesian model can be used to open up themes and scaling up in metropolitan living. This Survey is a combination of Smart home control system, Smart city , determining Human Dynamics, Data privacy and Security leading to a Smart Eco system.
Keywords: Internet of Things(IoT), Big Data, Smart Cities, Artificial Intelligence, Cloud of Things(CoT) ,Smart Grid and Smart Health.
Abstract
Anti-Theft Application for Android Based Devices
Shweta Dhanu, Afsana Shaikh, Shweta Barshe
DOI: 10.17148/IJARCCE.2016.53171
Abstract: This project aims to improve anti-theft for android based mobile phones by using different services like MMS instead of SMS. The scenario proposed in this project is totally dependent on the hardware of your smart phone like front camera, back camera and support for multimedia messages. Once the installation of this software is complete, it will work in the background, it will store the current SIM number and keep on checking continuously for SIM change, whenever SIM card gets changed from mobile, it will take few snapshots and record a video in the background, without taking permission of the user and then it will send a multimedia message, and number of snapshots, to an alternate mobile number and an email id provided by the particular user, during installation of the software.
Keywords: Android, MMS, Multimedia Messages, Snapshots, Email.
Abstract
Agriculture Crop Monitoring using GSM in WSN
S. Shanthi, Abinaya. R, Akshaya. V, Gowri. S
DOI: 10.17148/IJARCCE.2016.53172
Abstract: Our project deals with agriculture. It consists of microprocessor, simulator with e-agriculture that may come to the farmers interest and used to control the natural source. Therefore, this problem has captured farmer�s interest to implement agro-environmental remote monitoring method in their agriculture industries. . Our main aim is to directly interact with the farmers and to make their work easy. This is done by intimating the farmers using mobile phones about soil moisture, temperature, pH level, weather condition and also about the motor level condition. We will send an alert message to farmers both as text and voice message so that they can maintain their land properly. Using this method, the farmer may feel easy and comfortable to work on his land without any stress. Using GSM, the farmer will be able to monitor whenever he is unavailable to maintain his land. The farmers can access their land from anywhere. He will be asked to monitor using GSM so that it will avoid placing the substitute for his land. He can also monitor his crop by control over his mobile phones.
Keywords: sensors, GSM, UART, Motors, ADC, Microcontroller, LCD, Relay.
Abstract
Cost Based Ranking Service Models in Cloud Computing
Dhivya .A, Saravanan .M
DOI: 10.17148/IJARCCE.2016.53173
Abstract: Cloud Computing is an emerging technology where user can store and access services logically over the internet rather than a local server or a computer�s hardware. Internet world is growing rapidly, service providers also increasing their features according to the user requirements. Since users feels discomfort to choose cloud service provider to meet their expectations. The proposed system involves creation of a framework for selecting the service provider based upon user�s requirements primarily by cost. Ranking the service providers based on cost and various parameters of cloud services like response time, security etc... Package levels like Premium, Classic and Standard are derived for better clarity of users to select service providers among the available list. Priority selection model also applied when one or more service providers got the same rank in the pool. Finally, user will be benefited from this framework.
Keywords: Cloud Broker Architecture, Package Selection Process, Ranking Of Services, Priority Selection Model.
Abstract
Improving Data Integrity and Compressing Transmission Mobile cloud computing using RSA
Manu sharma, Mandeep kaur
DOI: 10.17148/IJARCCE.2016.53174
Abstract: Cloud computing has become an emerging standard that brings about various technologies and computing ideas for internet. Massive storage centre are provided by the cloud which can be access easily from any corner of the world and at any time. Problems faced in modern communications are not only just related to security but also concerned with the communication speed and content size, Nowdays network demand exchange of information with more security and reduction in both the data storage and the time for data transmission.The on-demand service provision with utilization of fewer resources of client system benefits the client.This can be realised by adopting an integerated approach using Merkle Hash Tree and RSA algorithm. The proposed storage security scheme also assures data integrity and recovery of data in case of data lose or corruption by providing a recovery system .Thus, the proposed scheme aims at keeping the user data restore.The system reduces the server computation when compared with previous system.
Keywords: Cryptography, Public Key Cryptography, Rivest Shamir Adlemen (RSA), Merkle Hash Tree, Cloud computing, Third Party Auditor.
Abstract
Switched Boost DC and AC Converter
Dhinesh Kumar.S, Aswath.V, Arvind Gokul .V
DOI: 10.17148/IJARCCE.2016.53175
Abstract: The power production in now-a-days is mainly based on Non-Renewable energy sources. Due to that the fossil resources are reduces day by day. In order to prevent that we should use Renewable energy sources to produce electricity. Power electronics is a field which improves the usage of renewable energy sources. The introductions invent in the field is mainly based on increasing efficiency and reducing the power loss. This converter is a combination of DC boost converter and s single phase voltage source inverter (VSI) in order to provide boosted AC voltage at the output side of the converter along with boosted DC supply. The production of power to supply home appliances is the ultimate aim of this converter. Such applications are glowing of LED�s along with fan etc.. Here the voltage given to the converter is only 48V. But the output by this converter is very high when compared to the input (i.e.) 192V DC voltage and 192Vrms AC voltage .This is verified by using the simulation done on MATLAB 2013.
Keywords: Boost converter, VSI, AC and DC voltage.
Abstract
A Novel Approach to Semantic Search for Accurate Source Code
Divya Kumari Tankala, Vikas Boddu
DOI: 10.17148/IJARCCE.2016.53176
Abstract: Reusability is one of the assets of software. The software engineering helps for reusability. It helps in reducing the cost and time in development of software which are one of main influencing factors in software development life cycle. It increases the productivity and results by the programmer. Even it good still scale and approximate matches then complex specification is an open issue. We propose a novel approach to semantic search that addresses some of these limitations and is designed for queries that can be described using an example. In this approach, programmers write lightweight specifications as inputs and expected output examples for the behavior of desired code. Using these specifications, an SMT solver identifies source code from a repository that matches the specifications. This research contributes the first work toward using SMT solvers to search for existing source code. In this, we motivate the study of code search and the utility of a more semantic approach to code search. We introduce and illustrate the generality of our approach using subsets of three languages, Java, Yahoo! Pipes, and SQL. Our approach is implemented in a tool, Satsy, for Yahoo! Pipes and Java. Finally, we show that this approach is adaptable to finding approximate matches when exact matches do not exist, and that programmers are capable of composing input/output queries with reasonable speed and accuracy. These results are promising and lead to several open research questions that we are only beginning to explore.
Keywords: Novel Approach, Semantic Search, SMT Solver, SNIFF, Java, Yahoo! Pipes, and SQL.
Abstract
Improved Accuracy and User Satisfaction by Inferring User Search Goals Based on Feedback Sessions
Rasika A. Sarambale (Rasika M. Shintre), Prof. Kanchan Doke
DOI: 10.17148/IJARCCE.2016.53177
Abstract: User search goals can be defined as information on various aspects of query that user want to obtain and it can be considered as the collection of information needs for a query. Different users may have different search goals in their mind when they pass ambiguous query to a search engine. Thus, it is important to infer and analyze user search goals to improve the performance of a search engine and user experience. By clustering the proposed feedback sessions, we infer different user search goals for a query. The feedback session is combination of both clicked and unclicked URLs and this feedback session is mapped to the pseudo documents to better represent the information needs of user. These pseudo-documents are clustered using K-means clustering algorithm which produces better results than K-means clustering algorithm and reduces computation time. Finally, Classified Average Precision (CAP) evaluation criterion is used to evaluate the performance of system. In this way, the system can infer user search goals efficiently and satisfy information needs of user.
Keywords: User search goals, feedback sessions, pseudo-documents, restructuring search results, and classified average precision.
Abstract
Keyword Extraction and Clustering For Document Recommendation in Conversations
Pooja Pandit, Umar farooq Shahbad, Manpreet Singh, Varsha Gaykwad, F.S. Ghodichor
DOI: 10.17148/IJARCCE.2016.53178
No abstract available.
Abstract
A Survey Paper on Data mining Techniques and Challenges in Distributed DICOM
P. Haripriya, R. Porkodi
DOI: 10.17148/IJARCCE.2016.53179
Abstract: DICOM images are complex objects, due to the nature of storing clinical data and patient images in a single file. The data sector stores roughly around 2000 tags which comprises of clinical, technical, etc. The Image sector stores multiple images as slices for a particular study. The data and images bind into a single file. It�s essential to bind data and image to identify patient records. This makes DICOM images a complex object to store, retrieve and process. Thus we need multiple advanced technologies to solve complex problems in DICOM. By applying multiple Data mining Techniques, information retrieval complexity in DICOM meta data is simplified. Distributed storage is essential for quality data mining. This paper investigates mainly on the data mining techniques used in DICOM (Medical Imaging) which are stored in distributed storage. Data mining on DICOM enables quick retrieval.
Keywords: DICOM, Data mining, Distributed storage, Clustering.
Abstract
Efficient Image Classification Using Sum Product Tree Based Parallel Computing Approach Using Large Feature Set
B Venkat Raman, Vaidya Saikumar and Naresh Ashetti
DOI: 10.17148/IJARCCE.2016.53180
Abstract: To create an efficient classification method using a multi structural analogy for images. Classification is a division of data into groups of similar objects. Representing the data by fewer clusters necessarily loses certain minor details, to minimize the minute error, come up with a theme is to increase and create an efficient classification technique. When we have a large number of data to be processed and it needs to be clustered for simplification. We have to use efficient approach to consume less time should be taken into consideration. This paper represents creating such methodology in keeping mind all the pros and cons occurred in clustering .We have come up with an idea, using multi features like image feature extraction, parallel computing and distance finding algorithms which bind with sum product tree will results in achieving an efficient classification.
Keywords: Parallel computing, K nearest neighbor, canny edge detection, sobel edge detection, sum product tree.
Abstract
Text Classification of CrowdSourced Data Using Parallel Computing Nested Baye’s Classifier
Venkat Raman B, Rajesh Jakkula and Mahesh Pathyam
DOI: 10.17148/IJARCCE.2016.53181
Abstract: Text classification has drawn attention due to the vast applicability in language identification, spam filtering, genre classification, sentiment analysis, readability assessment, article triage etc. With the goal of classifying crowdsourced data which is gathered from many websites into text classification, Crowdsourced data classification has challenges in getting data from various sources and whatever the data we are getting is huge in amount. Our approach will address challenges to classify the crowdsourced data in parallel computing in which many calculations are carried out simultaneously so that the crowdsourced data will be divided into tree format and calculations will be done simultaneously using nested baye�s classifier. Our aim is to classify the algorithms which are obtained using web crawler and will be converted into programmes using nested baye�s classifier technique.
Keywords: Web Crawler, Text Classification, Nested Bayes Classifier, Parallel Computing, CrowdSourcing.
Abstract
Controlling Mouse Events Using Eye Blink
Sanjay Gantyala, William Godad, Neelam Phadnis
DOI: 10.17148/IJARCCE.2016.53182
Abstract: In this paper, a human computer interface using eye blink and head motion is introduced. This system provides hand free computer access for people with severe disabilities. This technology is intended to replace the conventional use of computer mouse with head and eyes instead of human hands. The system track the computer users head movements with a video camera and translates them into the movements of the mouse pointer on the screen and it also detect the user eye blink and translates them into mouse click events on computer screen.
Keywords: Hand Free Mouse Control, Controlling Mouse Pointer by Head, Mouse Clicking by Eye Blink, Hand Free Mouse Events, Mouse Events Using Eye Blink, Head Tracking, Face Detection, Blink Detection.
Abstract
Performance Analysis of Hierarchical Location Management Scheme to Locate Mobile Agents
Heman Pathak, Swati Aggarwal
DOI: 10.17148/IJARCCE.2016.53183
Abstract: A Mobile Agent (MA) is a computer program that takes action autonomously on behalf of a user and moves in the heterogeneous communication environment. Once MA is initiated, its inventor has no control over it and has no information about its location. The location of MA must be traced to communicate with MAs and a suitable communication mechanism must be used. Lots of research has been done in the literature but these are not enough to get the actual location of MA efficiently and accurately. This paper models the novel region based Hierarchical Location Management Scheme (HLMS) for Mobile Multi Agent Environment that has been already proposed by authors in previous works. A mailbox based communication mechanism has also been proposed among the MAs. MA carries this mailbox with it or may leave it on some place. Any MA wants to communicate with other will drop the message to the mailbox. MA then gets the message by using pull or push approach. This paper identifies the variety of components of HLMS and models it using Color Petri Net (CPN) tool. After building the model, various tools provided by CPN such as monitoring, state space and user controlled simulation have been used to check the correctness of the modelled system. The different features of CPN tool like monitor, Mark-up Language are then used to collect the data to check the performance of the HLMS against various parameters such as Migration Probability (intraregional or interregional), Search probability, Trip Time etc .
Keywords: Hierarchical Location Management Scheme (HLMS), Location Management System (LMS), Color Petri Net (CPN) tool.
Abstract
Cell Counting and Particle Analysis from Image Captured by using Microscope
Swapnali Patil, Mayuri Pawaskar, Varsha Sawant, Kajal Godage, Prof.B.A.Jadhawar
DOI: 10.17148/IJARCCE.2016.53184
Abstract: Blood cell count plays very important role in medical diagnosis. Increment or decrement in the count of blood cell causes many diseases to occur in the human body. There are different techniques of blood cell counting which involves conventional as well as automatic techniques. The conventional method of manual counting under microscope is time consuming and yields inaccurate results[5]. A solution to this problem, to provide software-based cost effective and an efficient alternative in recognizing and analyzing blood cells, This paper presents the preliminary study of automatic blood cell counting based on digital image processing. The number of blood cell count that is RBC & WBC count is then may be use to diagnose the patient as well as detection of abnormalities. For this purpose, few pre- processing and post-processing techniques have been implemented on blood cells image in order to provide a much clearer and cleaner image.
Keywords: Automatic detection, Biomedical image processing, Blood cell analysis, Segmentation.
Abstract
A Review on Routing and Scheduling Algorithm in Wireless Sensor Network
Sukrati Dixit, Vimlesh Kumar
DOI: 10.17148/IJARCCE.2016.53185
Abstract: Wireless sensor network is a collection of distributed sensor nodes, which can sense the environment by collecting, processing and transmitting the data to sink node. The main drawback of wireless sensor networks since most sensors are connected by non-rechargeable batteries. The lifetime of a sensor network can be increased by jointly applying different techniques of routing and scheduling schemes also brings great challenges to the design of efficient distributed routing protocols for multi-hop wireless sensor networks. In scheduling algorithms, the nodes are organized in sleep state when they are not required. The scheduling algorithms is applied to diminish resource starvation and to make honesty amongst the parties using the resources. The main impetus of routing algorithm is applied to wireless sensor networks for minimizing energy consumption due to retransmissions and dynamically bypass of different sensor nodes with less energy. This paper gives a review on the latest progress in scheduling and routing schemes that are used in the WSN and compare their strengths and weakness.
Keywords: wireless sensor network, sensor nodes, routing, scheduling, energy constraint, duty cycle.
Abstract
Interactive Wireless Communication System for Easy Conveyance of Visually Challenged
Binila Treesa Babu, Aishamol Naushad, Basil Chacko, Bilal A Rehman
DOI: 10.17148/IJARCCE.2016.53186
Abstract: Visually impaired people have difficulty accessing information about public transportation systems. Several systems have been developed for assisting visually impaired and blind people to use the public transport system. Most systems provide only one-way communication and require high-cost and complex equipment. The purpose of this project is to reduce the difficulties faced by visually impaired people when using public transportation system; this is achieved by using an interactive wireless communication system. The system comprises of three modules: a user module, a bus station module and a bus module interconnected to each other. The connection between the modules is established via ZigBee. The blind person in the bus station is provided with a ZigBee unit which is recognized by the ZigBee in the bus station. . The blind gives the input about the place he has to reach using microphones and the voice recognition system. The bus unit gives information of the buses parked inside the bus station to the bus station unit. The bus with nearest time slot would be acknowledged to the blind unit of the blind man by the bus station. . This input is then passed to the bus station module and the bus numbers corresponding to the location provided by the blind is generated. These bus numbers are converted into audio output using text to speech converter in the blind module. The blind then select the bus in which he wants to travel. Whenever bus has entered into bus station; the bus module notifies the bus station module. Then ZigBee transceiver in the bus station module notifies the blind person that the bus has reached the station. The bus station also notifies the bus driver, the presence of a blind person in the station via its Zigbee module.
Keywords: ZigBee Systems, Speech Recognition System (HM2007),Text to Speech Converter.
Abstract
Design and Development of Affiliate Tracking Application for Real-Time Price Comparison on E-Commerce Platform
Prashant Dahiwale, Aishwarya Shinde, Pawan Verma, Vikas Rathod, Avantika Munghate, Ashwini Kamble
DOI: 10.17148/IJARCCE.2016.53187
Abstract: There is a huge necessity of E-commerce websites in day to day life. The business-to-consumer aspect of e-commerce is the most visible business use of World Wide Web. Electronic Commerce, known as e-commerce which consists of buying/selling of products over Internet based on browser/server system. This paper focuses on the benefits of affiliate marketing as a tool for increasing business profitability. This paper is an attempt to compare the prices of the products from multiple E-commerce sites and display the least price of products from all available e-commerce sites. Thus it helps buying the products through the online shops such as flipkart, snapdeal, etc anywhere through internet by using an android device .It also resolves the problem of internal memory space of an android device.
Keywords: E Commerce, Affiliate marketing, Affiliate tracking, World Wide Web, JSON.
Abstract
Intelligent Backup System
Shrinivas Dube, Rashmi Mandave, Vaibhav Chhajed, Pratik Bobde, Mrs. Shikha Pachouly
DOI: 10.17148/IJARCCE.2016.53188
Abstract: Nowadays, computing devices that rely on a cloud storage environment for data backup, an imminent challenge facing waste of upload bandwidth, storage space due to large amount of redundant data. In this paper, we present Intelligent Backup System, an intelligent data backup scheme that improves data deduplication efficiency by exploiting application awareness, and further combines client and cloud duplicate detection to strike a good balance between cloud storage capacity saving and deduplication time reduction.
Keywords: Data storage, cloud backup, application awareness, effective deduplication.
Abstract
RGSP for Energy Efficient MAC Cross-layer in WSN
Vidyashree BN, V Shivakumar
DOI: 10.17148/IJARCCE.2016.53189
Abstract: This article presents RGSP (for "Rest Gather and Send Protocol") for remote sensor arranges, a system MAC cross layer outline that determines the intrinsic clash between vitality effectiveness and throughput. The convention utilizes as a part of its MAC layer another worldview that we call "rest, gather and send". The thought of RGSP is that a router dozes for a given measure of time, awakens and gathers information from its kids and different routers and afterward send them into a burst amid a timeframe that we call transmission period. In its network layer, the protocol used is LEACH and it�s a hierarchical routing protocol. LEACH also increases the lifetime of the network. RGSP does not require synchronization in the middle of switches and progressively ascertains the rest and gather periods as indicated by the measure of approaching movement.
Keywords: RGSP, MAC, Cross-layer, LEACH, Lifetime.
Abstract
A Review on Cocktail Approach for Travel Package Recommendation
Mohit Bisen, Mayur Sontakke, Shirish Singnapure
DOI: 10.17148/IJARCCE.2016.53190
Abstract: One of the important applications in modern computing is to provide better travel services for tourists. This paper provides a study of utilizing online travel information for the personalized travel package recommendation. Many recommender systems lack an organized framework to dynamically incorporate multiple types of additional context information existing in the tourism domain, such as the travel area, season, and price of the travel packages. First we analyze the properties of the previous travel packages and develop a TAST (tourist-area-season-topic) model. This TAST model helps to represent different travel packages and different topic distributions of tourist, taking out of topic is specified on both the tourists and the natural characteristics of the landscapes. According to the topic model representation, a cocktail approach is incepted so that to form lists for personalized travel package recommendation. The TAST model is expanded to the tourist-relation-area-season topic (TRAST) model for collecting the relationships among the tourists for all travel groups. Then analyze both the TAST and TRAST models, and cocktail recommendation approach on the current travel package information TAST model works better than the old recommendation system by adding tourist�s relationships as TAST model can effectively catches the unique properties of travel data and cocktail approach, an effective estimation for travel group formation can be done using TRAST model.
Keywords: TRAST model, K-means clustering, Authentication, Collaborative filtering, Searching Techniques.
Abstract
Fraud Detection on Bulk Tax Data Using Business Intelligence Data Mining Tool: A Case of Zambia Revenue Authority
Memorie Mwanza and Jackson Phiri
DOI: 10.17148/IJARCCE.2016.53191
Abstract: Zambia Revenue Authority (ZRA) generates large volumes of data that need complex mechanisms in order to extract useful tax information. The purpose of the study was to develop a data mining model for detection of fraud on tax and taxpayer data for ZRA. This study focused on two areas. These were (1) the baseline study that helped to establish the extent of the challenges in fraud detection for the tax payers and (2) the automation and development of the fraud detection tool using the results from the baseline study. Our baseline study showed that the current methodologies, processes, architectures, and technologies that were being used to transform raw data into meaningful and useful information were tedious and time consuming. In order to detect fraud they depended on random audits, informants and under-cover operations. A model which implements outlier algorithms for fraud detection, Continuous Monitoring of Distance Based and Distance Based Outlier Queries was then developed. We used both algorithms to analyse the domestic tax payments to detect underpayments and overpayments according to business rules. Underpayments and overpayments are marked as outliers. Results generated by our tool showed improved accuracy and takes less time in order to detect under and over payments as outliers when compared to the older methods.
Keywords: Business Intelligence, Data mining, fraud detection, outlier algorithm.
Abstract
Big Data: An Emerging Future Technology
G Rajesh, S Sudarshan, Kareemunnisa, Ch Swetha
DOI: 10.17148/IJARCCE.2016.53192
Abstract: The era of big data is that exceeds the processing capacity of conventional database systems. Big data is an emerging paradigm applied to datasets whose size or complexity is beyond the ability of commonly used computer software and hardware tools. Such datasets are often from various sources (Variety) yet unstructured such as social media, sensors, scientific applications, surveillance, video and image archives, Internet texts and documents, Internet search indexing, medical records, business transactions and web logs; and are of large size (Volume) with fast data in/out (Velocity). More importantly, big data has to be of high value (Value) and establish trust in it for business decision making (Veracity). Hadoop is an open-source implementation of the MapReduce model, and is usually used for data-intensive applications such as data mining and web indexing. Using Hadoop, large data sets can be processed across a cluster of servers and applications can be run on systems with thousands of nodes involving thousands of terabytes. Distributed file system in Hadoop helps in rapid data transfer rates and allows the system to continue its normal operation even in the case of some node failures. Hadoop enables a computing solution that is scalable, cost effective, flexible and fault tolerant. Hadoop Framework is used by popular companies like Google, Yahoo, Amazon and IBM etc., to support their applications involving huge amounts of data. This article intends to define the concept of Big Data and the importance of Big Data Analytics and Hadoop.
Keywords: Big Data, Hadoop, Big Data Analytics, MapReduce and HDFS.
Abstract
Survey of Security Enhancements in MANET Routing Protocols for Networking
Neeraj Arora, Prof. Kamal Kishore Arora, Piyush Vyas
DOI: 10.17148/IJARCCE.2016.53193
No abstract available.
Abstract
Cross-Layer Source Distribution for Video Streaming over OFDMA Cognitive Radio Networks
Mr.K.Sridharan, I.Abhinav, E.Dinesh, N.Dinesh Raj, S.Vikram simmhan
DOI: 10.17148/IJARCCE.2016.53194
Abstract: In this paper, a cross-layer source Distribution algorithm is proposed in the context of orthogonal frequency division multiple access (OFDMA)-based cognitive radio (CR) video application systems. User video quality and channel awareness are incorporated in the design, towards an optimal subcarrier and power allocation scheme, subject to minimum secondary receiver (SRx) video quality and primary receiver (PRx) interference threshold constraints. First, the relationship between PRx interference margin and power limits at the secondary transmitter (STx) is analytically derived. Then, to provide PRx with satisfactory quality of service (QoS), we propose a new probabilistic approach to mitigate the total imposed interference of the STx on PRx, considering imperfect STx to PRx channel state information (CSI). The effect of PRx interference limit violation probability, interference threshold, and error variance of imperfect CSI are evaluated through mathematical analysis and computer simulations.
Keywords: Orthogonal Frequency Division Multiple Access (OFDMA), Cognitive Radio (CR), Primary Receiver (PRx), Secondary Receiver (SRx), Quality of Service (QoS), Channel State Information (CSI), Secondary Transmitter (STx).
Abstract
In-a-Nutshell Document Summarizer
Mrunmayi Anchawale, Shravani Joshi, Rajat Shenoi, Shreya Bamne
DOI: 10.17148/IJARCCE.2016.53195
Abstract: Automatic data summarization is part of machine learning and text mining, in which source text is condensed into a shorter version preserving its information content and overall meaning. First developed as a labour-intensive manual discipline in the 1980s, text mining has become ever more efficient as computing power has increased. In-A-Nutshell is an attempt to create a robust automated text summarization system, based on sentence scoring.
Keywords: text mining, summarization, NLP, extraction, abstraction, cue phrases, sentence generation.
Abstract
A Novel Framework for Authentication as a Service (AaaS) in Public Cloud Environment
N. Veeraragavan, Dr. L. Arockiam
DOI: 10.17148/IJARCCE.2016.53196
Abstract: Cloud is the environment for elastic computing resources and provides reliable storage by maintaining the data in different datacentres. Main concern in the cloud is maintaining security by protecting the unauthorized access in the cloud environment. Authenticating the user access is the most important task in cloud. This paper proposes a novel framework, namely VEARAaaS, for authenticating the user for accessing the cloud services. This framework has different Authentication as a Service (AaaS) to protect the illegal users. The framework includes three major components such as Authenticator, Encryptor and Key generator. Authenticator is a cloud and it has two authentication mechanisms as a service to the cloud users. Encryptor is another cloud service for encrypting and decrypting the user credential in the cloud environment. Key Generator is also a cloud service which is used to generate for encryption and authentication service. The proposed framework protects the user by its functionality of verification. Hence, this framework provides better authentication system for the user to access their cloud service at anytime and anywhere.
Keywords: Cloud Computing; Security; Authenticator; Encryptor; Key Generator; Authentication Service.
Abstract
Automatic Time-Table Generation System using Genetic Algorithm
Amey Salvi, Omkar Khanvilkar, B.W. Balkhande
DOI: 10.17148/IJARCCE.2016.53197
Abstract: Time-Tables are very important for any university administration. It informs the students and teachers when and where to be, the availability of the rooms and the availability of the teachers. But, the generation of time-tables manually is a very tedious task and is almost always inconvenient. This project aims at generation of course schedules automatically in a manner which ensures that they are optimal and thorough with little or no redundancy. It involves taking basic constraints and the structure of a time-table and incorporating them into the genetic algorithm. This system would serve as an ideal platform for less strenuous work by providing the administrator with an interactive interface for the time-table generation for all courses and departments.
Keywords: Genetic Algorithm, Time-table Scheduling, Optimal Solution, Multiple Constraints, Efficient.
Abstract
Optimized Water Controlling Approach for Irrigation System Based on Wireless Sensor Network and GPRS Module
Shweta B. More, Prof. D. L. Bhuyar
DOI: 10.17148/IJARCCE.2016.53198
Abstract: Agriculture uses most of available fresh water resources and this use of fresh water resources will continue to be increases since population growth and food demand increases. An automated irrigation system mainly designed to optimize the usage of water on agriculture because of climatic conditions which leads to lack of rains. The system has soil moisture wireless network and a wireless sensor to maintain the quality of water in three parameters- pH, conductivity and temperature. Wireless and soil moisture sensor is programmed with microcontroller based gateway which is used to control and maintain the flow and quality of water. The system which is used here is duplex communication link based on a cellular Internet interface. By using this automated system water is saved of up to 92% and produce a good yield compared with old irrigation systems.
Keywords: Automation, GPRS Module, Internet, irrigation, measurement, water resources and wireless sensor networks (WSNs).
Abstract
A Leverage Based Trust Scheme for Wireless Sensor Networks
M.Ranjitha, R.Gopal
DOI: 10.17148/IJARCCE.2016.53199
Abstract: Various technologies enable the development of large scale sensor networks in a variety of fields. Sensor networks are placed in lot of secured decision making areas. The data collected from it must be trustworthy. In existing system the security mechanism for wireless sensor networks is not present accurate and so we cannot achieve secured trust models. There are several trust models available, but still there are various kinds of attacks on the network. Trust is a dynamic phenomenon which changes along with time and environment conditions. However, most existing trust models do not solve the trust dynamic problem to overcome that a (Leveraging Trustworthiness Topology) LTWT has been proposed which is more trustworthy and prevent the security more effectively.
Keywords: wireless sensor networks, leveraging, trustworthiness, trust models.
Abstract
Design of Smart Security System using Image Processing and Embedded System
T. V. Karpagam, R. Keerthana, K. Latha, K. Nalini, A. Srinivasan
DOI: 10.17148/IJARCCE.2016.53200
Abstract: The conventional design of real time security system typically monitors only the property and lacks physical control aspects. Also the term security is not well defined because there is the time delay between the alarm system going on and actual arrival of the security personnel. This paper discuss the development of the security and monitoring system that works where the traditional security system that are mainly concerned about curbing burglar and gathering evidence against trespassing fail. The paper present the design and implementation of the smart security system based on image processing and embedded system. An additional feature that enhance the security aspect of the system is its capability of monitoring entry points such as doors and windows so that in the event any breach, an alerting short message services and image through email is sent to the authorized members instantly.
Keywords: Global System for Mobile Communication(GSM);Short message services(SMS); image transfer through email; Home/Organization security.
Abstract
Design and Implementation of Step Up DC – DC Converter for Microsource Application
Prajakta Bhutange, Rambha Thakur, Ravina Kumbhalkar, Reshmi Bhagwat
DOI: 10.17148/IJARCCE.2016.53201
Abstract: This paper presents the modelling, simulation and implementation of solar photovoltaic cell using MATLAB Simulink. A high step up DC � DC converter is proposed. The conventional sources of energy are going to be exhausted in few years. The output voltage from most renewable sources like photovoltaic, fuel cell or energy storage device such as super capacitor and batteries are not useful for commercial usage. In order to make them to use we have to step up this voltage to grid voltage level so boost converter are introduced to meet the above mentioned requirement. The 15 V DC is step up to 230 V DC using high step up DC � DC converter. This DC is converted into AC by using inverter.
Keywords: Coupled inductor, DC�DC converter, high voltage gain, microsources.
Abstract
Firewall Based Signature Enhancement for Flooding Attack in MANET
Harikrishnan Nair M P, Sreeja Nair M P
DOI: 10.17148/IJARCCE.2016.53202
Abstract: A mobile adhoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denial of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. In this paper we present a novel technique to prevent flooding attack in MANET.
Keywords: DoS Attack, MANET, Flooding.
Abstract
Making an Interpretation of Spreadsheet from Queries
K. Sasikala, B. Sathishkumar
DOI: 10.17148/IJARCCE.2016.53203
No abstract available.
Abstract
Implementing Efficient Multi-Keyword Ranked Search Using Encrypted Storage Data
K. Anu, S. Sakthi Vinayagam, R. Rajkumar, G. Karthika
DOI: 10.17148/IJARCCE.2016.53204
Abstract: Cloud computing provide efficient storage to the user. The subcontracted records want to be encoded because the user want to kept their data without leakage and trust. The encrypted data must be kept confidential. To overcome the difficulties we specify, by considering the big range of subcontracted files (statistics) within the cloud, we make use of the relevance rating and k-nearest neighbor strategies to expand an efficient multi-keyword search scheme which could go back the ranked seek consequences primarily based on the accuracy. inside this framework, we leverage an efficient index to in addition improve the search efficiency, and undertake the blind storage machine to conceal get right of entry to sample of the request user. safety evaluation demonstrates that our scheme can achieve confidentiality of documents and index, wormhole privateness, wormhole unmanagebility, and concealing get right of entry to sample of the request consumer. eventually, using widespread simulations, we show that our suggestion can attain a good deal improved efficiency in phrases of seek functionality and search time as compared with the prevailing proposals.
Keywords: Cloud computing, searchable encryption, multi-keyword ranked search, access pattern.
Abstract
OFDM: A System Based Comparison with Cyclic Prefix
Jaipreet Kaur, Manjit Sandhu, Sukhdeep Kaur
DOI: 10.17148/IJARCCE.2016.53205
Abstract: The objective of paper is to develop and compare a model of an OFDM system using different values of cyclic prefixes in Matrix laboratory language (MATLAB) on which BER calculations is carried out for various digital modulation schemes like BPSK, 16 QAM, and 64 QAM. The OFDM signal was transmitted over the AWGN channel for various signal to noise ratio (SNR) values. To evaluate the performance, for each SNR level, the received signal was demodulated and the received data was compared to the original information. The convolution coding and interleaving is applied to improve BER performance of OFDM system.
Keywords: OFDM, Convolution coding, Cyclic Prefix, Additive White Gaussian Noise, Bit error rate.
Abstract
Control Strategy for Trajectory Tracking of Robotic Arm
Kiran Kumar Hirwani, Naveen Kumar Dewangan
DOI: 10.17148/IJARCCE.2016.53206
Abstract: Today�s age is the age of technology and there is very small window for error or it can be said that there is no place for error. When it comes to the robot arm manipulator there is no provision for error and this area increased attention in recent years because dynamic modelling is very advantageous for control strategy of robot arm position. Earlier projects are presented in fuzzy form with MSC ADAMS as modelling tool. Methodology is simple in earlier paper i.e. draw fuzzy rules and manipulate the co-ordinate points for the robotic arm. In this paper ANFIS model is presented and compared with fuzzy based models. ANFIS model is presented to obtain good efficiency and the robustness of proposed control scheme. ANFIS model overcomes the drawback of earlier models.
Keywords: ANFIS, MSC ADAMS, Fuzzy, CATIA, MATLAB-Simulink.
Abstract
Using HDFS Approach for Practical Performance Analysis
R.Vasavi, MD. Moona Tasleem, L. Bharath Reddy, B. Ramya, P. Rojashalini
DOI: 10.17148/IJARCCE.2016.53207
Abstract: Distributed file systems are the key component of any cloud-scale data processing middleware. Evaluating the performance of DFSs is accordingly very important. In this paper, we propose a systematic and practical performance analysis framework, driven by architecture and design models for defining the structure and behaviour of typical master/slave DFSs. Our approach is different from others because 1) most of existing works rely on performance measurements under a variety of workloads/strategies, comparing with other DFSs or running application programs, but our approach is based on architecture and design level models and systematically derived performance models; 2) our approach is able to both qualitatively and quantitatively evaluate the performance of DFSs; and 3) our approach not only can evaluate the overall performance of a DFS but also its components and individual steps. We demonstrate the effectiveness of our approach by evaluating Hadoop distributed file system (HDFS).
Keywords: DFS, HDFS, performance, Map reduce, PVFS.
Abstract
A Survey on Scene Text Detection and Text Recognition
Priyanka Patil, S I Nipanikar
DOI: 10.17148/IJARCCE.2016.53208
Abstract: Now a day�s reading words in unimpeded and noisy images is a not an easy problem. Also extracting words or text from natural scenes or videos is very difficult thing. So we should have some mechanism to recognize the text from images and videos. In this paper an effort has been taken to focus the progress made so far in the character feature of scene text recognition system and an overview of technological prospective of scene text recognition systems are discussed. In Text recognition, feature extraction required much attention because recognition performance heavily depends on it.
Keywords: Text Recognition, Text Detection, Character Features, Feature Extraction.
Abstract
High Secure Digital Image Steganography for the Secrete Communication
K. Suganya, P. Sunilkumar
DOI: 10.17148/IJARCCE.2016.53209
Abstract: Highest state-of-the-art image steganographic approach focuses on concealing multiple secret images in a single 24-bit cover image using LSB substitution based image steganography. Steganography, the secret image is embedded in the cover image and transmitted in such a way that the existence of information is undetectable. Proposed paper a message in a cover without leaving a remarkable track on the original message. The digital images, sound files and other computer files can be used as carrier to embed the information using BSC (byte shifting calculation). In this paper, a modified secure and high capacity based steganography scheme of hiding a large-size secret image into a small-size cover image. Combining both domains gives a higher level of security in which even if the use of covert channel is revealed, the true information will not be Minimized distortion using RLBC (rotated Local Balance changes) algorithm. Each secret image is encrypted before hiding in the cover image. Results reveal that the proposed method successfully secures the high capacity data keeping the visual quality of transmitted image satisfactory.
Keywords: steganographic, BSC (byte shifting calculation), RLBC(rotated Local Balance changes), encrypted.
Abstract
Noise Removal in Remote Sensing Image Using Kalman Filter Algorithm
S. Priyanka, Dr.A.S.Naveen kumar
DOI: 10.17148/IJARCCE.2016.53210
Abstract: Noise reduction is a prerequisite step prior to information extraction that attempts from remote sensing images. Reducing Noise in remote sensing Image is an image restoration problem to recover a original image from the corrupted Images. This problem is intractable unless one can make assumptions about the actual structure of the perfect image. Various Noise removing filters make various assumptions depending on the type of image and the goals of the restoration. In this paper Kalman filter is used for gray scale images which is contaminated by Noise. Remote sensing images are affected by different types of Noise like Gaussian Noise, Speckle Noise and impulse Noise. These Noises are introduced in the Remote Sensing image during acquisition or transmission process. In this paper wiener filter and kalman filter is used for reducing the Noise rate, when compare to some other filters. In this the Proposed kalman filter gives better results when compared to Wiener filter.
Keywords: Remote Sensing Image, Wiener filter, Kalman filter, Gaussian Noise.
Abstract
Tumor Segmentation in Brain MRI using a Fuzzy Approach with Class Center Priors
D.Balasubramaniam, S.Saranya, E.Sutha, U.Umamaheswari
DOI: 10.17148/IJARCCE.2016.53211
Abstract: This paper proposes a new fuzzy approach for automatic segmentation of normal and pathological brain MRI volumetric data sets. MRI is generally useful for brain tumor deduction because it provide more detailed information about its type, position, size. Brain tumor segmentation is the separation of different tumor tissues from normal brain tissue. In automatic brain segmentation MRI is a sophisticated tool for medical imaging. Fuzzy is used to segment all the tissues at the same time, and FCM algorithm is used to speed up tumor performances under and noisy and provide better accuracy and fast response. The result obtain from different segmentation by using fuzzy algorithm and comparing normal and pathological brain by automatic segmentation method.
Keywords: fuzzy,FCM, MRI brain image, segmentation.
Abstract
Hybrid Network Intrusion Detection for DoS Attacks
S.Anu, K. Pradeep Mohan Kumar
DOI: 10.17148/IJARCCE.2016.53212
Abstract: The growing use of computer networks, security has become a main challenging task for computer users. It is basically suffering from Denial of Service (DoS) attacks. DoS attack is an attack that sending large number of network traffic towards the Victim server of the organization that bring down the performance of networks. Existing techniques like firewall, access control and encryption mechanism is vulnerable to provide sufficient protection against Virus, warms and DoS attacks,etc.,. So we need new mechanism to monitoring computer systems and network traffic to identify any deviation of the original user behavior. This paper proposes a new hybrid based IDS model for DoS attacks and evaluate its performance based on Particle Swarm Optimization combine with Support Vector machine (PSO-SVM) to increase detection accuracy and reducing false alarms. Here, feature selection is one of the important processes to increase the classification accuracy of this model. So, Particle Swarm Optimization (PSO) is used for selecting necessary feature from the PMU 2015 dataset that will improve the performance of the proposed model. The proposed work was implemented in Mat lab7. 2. The result shows that the proposed hybrid IDS has high detection accuracy (99. 25%) and (0. 75%) of false alarms.
Keywords: Intrusion Detection System (IDS), Network Security, Denial of Service (DoS), PSO-SVM.
Abstract
Review: Online Voting System Using Android
Badave Malhar S., Kadam Amit B., Nalawade Ranjit S. , Hipparkar Abhijit A.
DOI: 10.17148/IJARCCE.2016.53213
Abstract: The traditional approach there was a need to go to the voting booth & cast a vote. People from various locations who don�t have their voting cards are not able to cast their votes. Also validation of the user was poor and not appropriate. There was a bundle of manual work in the traditional voting system which was very time consuming process. Therefore the new system is developed to eliminate the efforts needed in the existing voting process. The given new projected system has an application which is developed for android phone via which the user can cast his or her vote from anywhere on the face of the globe. The user can registers by giving his personal details and the image of his face which gets stored in the database presented at the central side. After the voting date is fixed the user gets pop up notifications on the his or her android phone via GCM (Google Cloud Messaging). After that the user open the application then the face authentication is done at server side using the OTP. If the user is valid user then OTP is send to the user's mail address. Using OTP user opens the voting form then he or she casts their vote and then click on submit button and then logout. On the server side we can check the results. The GCM broadcasts the results notification to the user's device. The SQLite is the local database of the user's device. If his internet connection is down then the notification and other details gets stored on his local server. When user starts his internet connection then stored message are retrieved from the GCM that is the local database of the android phone.
Keywords: Short SMS Service(SMS), Google Cloud Messaging(GCM), SQLite .
Abstract
Load Frequency Control of Hybrid System using Fuzzy Controller and Implementing Neuro Fuzzy Controller
N. Rajesh Kumar Gowd, M. MD. Sayeedi Baig, V. Naresh
DOI: 10.17148/IJARCCE.2016.53214
Abstract: This paper introduces the configuration and investigation of Neuro-Fuzzy controller taking into account Adaptive Neuro-Fuzzy Inference System (ANFIS) structural engineering for Load recurrence control of a segregated wind-smaller scale hydro-diesel half and half power framework, to manage the recurrence deviation and force deviations. Because of the sudden burden changes and discontinuous wind power, expansive recurrence vacillation issue can happen. This recently created control technique joins the upside of neural systems and fluffy deduction framework and has straightforward structure that is anything but difficult to actualize. In this way, so as to keep framework execution close to its ideal, it is alluring to track the working conditions and utilization overhauled parameters to control the framework. Recreations of the proposed ANFIS based Neuro Fuzzy controller in a separated wind-smaller scale hydro-diesel cross breed force framework with diverse burden unsettling influences are performed. a fluffy rationale (FL) controller were outlined independently to control the same half breed force framework for the execution examination. The execution of the proposed controller is confirmed from reenactments and correlations. Recreation results demonstrate that the execution of the proposed ANFIS based Neuro-Fuzzy Controller damps out the recurrence deviation and achieves the unfaltering state esteem with less settling time. The proposed ANFIS based Neuro-Fuzzy controller gives best control execution over an extensive variety of working conditions.
Keywords: fuzzy logic controller FLCs, fuzzy inference system (FIS), Adaptive Neuro-Fuzzy Inference System (ANFIS), artificial neural network (ANN).
Abstract
Aggregate Estimation in Hidden Databases With Checkbox Interfaces
S.Gayathri, B.Madusudhanan
DOI: 10.17148/IJARCCE.2016.53215
Abstract: A large number of web data receptacles are hidden behind restrictive web interfaces, making it an important challenge to enable data analytics over these hidden web databases. This module is used to enabling the aggregate queries over a hidden database with checkbox interface by issuing a small number of queries (sampling) through its web interface. Then I have examined that this approach will be handled in both synthetic and real datasets demonstrate the accuracy and efficiency of the algorithms. Before that in this paper I have done a survey on some papers about the concept what they processed about the data analytics over hidden databases with checkbox interfaces.
Keywords: checkbox interface, data analytics, UNBIASED-WEBIGHTED-CRAWL, aggregate queries.
Abstract
An Approach for Semantic Based Paper Evaluation Using Keywords
G. Thilagavathy, S. Mythili, R. Arun Kumar
DOI: 10.17148/IJARCCE.2016.53216
Abstract: Traditional keyword search mechanism which couldn't meet the needs of current expert knowledge base in searching based on semantic. Semantic search is most powerful and one of the main motivations of the semantic web. The system which focuses on scalability, semantic search, data retrieval performance and usability it uses specific domain information which extracts to improve the performance, providing match making to the users, and simultaneously rank search results. Semantic indexing approach is adapted to achieve the scalability. The performance of the semantic web approach was evaluated in comparison with the traditional system approach. This is the paper which focuses on ontology based indexing and retrieval system based on keyword semantics in the learning of Java content domain. Detailed evaluation is provided to observe the performance by query expansion and specific information extraction. It will be of great use for the developers and researchers who worked on web. But my area of work will be for the process of evaluation, where in the examination like paper correction system.
Keywords: Traditional Keyword Search Mechanism, Semantic Search, Semantic Indexing Approach.
Abstract
To Automate Entire Placement and Training Cell for The College using Android Application with Cloud Computing
Vikrant A Agaskar, Surjit H Singh, Srujan S Chaudhari, Keyur P Rajyaguru
DOI: 10.17148/IJARCCE.2016.53217
Abstract: Placement and Training (PAT) cell is the bridge between students and companies visiting the campus for recruitment so all the data and activities of PAT cell are important. Our system aims at reducing human efforts and errors by automating important tasks of PAT cell such as displaying notices, maintaining information about students, student eligibility, company criteria, training sessions, interview schedule, preparation seminars, etc. To achieve this automation we have created an Android application and a web panel. The Android application has four modules such as Training and Placement Officer (TPO), Students details, Company details and Training sessions. Web panel has a simple interface to allow TPO to send bulk push notifications to all students who have installed the application. We have used Hypertext pre-processor (PHP) and My Structured Query Language (MYSQL) technology as back-end to create and access database on the cloud. TPO, Students and Human Resource (HR) department of recruiting company have different access privileges and unique login credentials for the application which are authenticated online for security purpose. Full adaptation of this system will result in efficient data management for PAT cell and improved selection ratio for students. Let there be n number of students, n number of streams, n number of recruiters the placement process will run smoothly. Being an Android application it is portable and acceptable by majority of users.
Keywords: automation, android, web panel, database on the cloud, online authentication.
Abstract
Secure Data Deduplication in Hybrid Cloud
Krishnapraseeda V, Karthikeyan C
DOI: 10.17148/IJARCCE.2016.53218
Abstract: The cloud computing technology has developed during the past decade; in which data outsourced to cloud service for storage has become an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Also the security for the cloud is still a big task. However, the cloud storage of outsourced data cannot be trusted fully and security concerns are raised on how the data deduplication in cloud achieves integrity audit. In our work, we deal with the issue of secure integrity audit and data deduplication on cloud storage. Specifically, we aim at achieving both cloud data integrity and deduplication, while we propose two secure systems namely SecCloud and SecCloud+, also the process of sending and receiving in case of secure by means of same file content with same file name. SecCloud enables an auditing scheme with the application of a MapReduce cloud, where the clients are responsible to generate data tags before uploading data and audit the integrity which has been stored in cloud as well. Compared to the related works, the computation of integrity auditing of user�s file in SecCloud is highly reduced. SecCloud+ ensures that the files are encrypted before uploading, which provides secure data integrity and encrypted data deduplication.
Keywords: Cloud Computing, Deduplication, Integrity, SecCloud, MapReduce, Auditing.
Abstract
Interpreting Sentimental Analysis for Customer Commands on E-Commerce
R. Jeevitha, D. Sathyavani
DOI: 10.17148/IJARCCE.2016.53219
Abstract: A social network is made up of a set of social actors (such as individuals or organizations) and a set of the process ties between these actors. Previous research mainly focused on modelling and tracking public sentiment (In case of Twitter). In this work, we move one step to interpret sentiment variations. Proposed work that tries to analyse and interpret the public sentiment variations in micro blogging services. We propose a sentimental data analysis model. To develop a application to analyse the sentimental data using sentimental data analysis. Sentimental data can be analysed used negative and positive words given in the statement. This system can be used for any type application to analysis the comment which is in the data set. To further enhance the readability of the mined reasons separated the sentence into various levels and the process can be included in the form of visualization so that the user not need to read entire comments which are commented. The proposed models can also be applied to other tasks such as finding topic differences between two sets of documents. All the result will be shown through charts and graphs. The partitions are classified in well methodology and in case of established functions.
Keywords: Interpreting Sentimental Analysis, Customer Commands, E-Commerce, Micro Blogging Services.
Abstract
Graph Database: A Contemporary Storage Mechanism for Connected Data
N.M.A. Mohamed Ali, Dr. T. Padma
DOI: 10.17148/IJARCCE.2016.53220
Abstract: The Relational databases have been used for several decades as the database technology for most traditional data-centric storage applications. Recently there has been much attention in graph data stores as an effective technology for highly connected data. This paper reports the basic concepts and technologies relating to NoSQL graph data stores and compares graph database with common relational database system. It also describes different types of NoSQL data stores and its applications.
Keywords: Graph Database, Relational Database, Data Model, No SQL.
Abstract
A Study on Different Part of Speech (POS) Tagging Approaches in Assamese Language
Bipul Roy, Bipul Syam Purkayastha
DOI: 10.17148/IJARCCE.2016.53221
Abstract: Syntactic parsing is a necessary task which is required for Natural Language Processing (NLP) applications including Part of Speech (POS) tagger. For the development and enrichment of languages, part of speech tagging plays a very crucial role. Part of speech tagging, especially for the regional Indian languages can give an international and world-wide approach. For a regional language like Assamese which is Assam�s official language, part of speech tagging has become very much essential for the overall flourishment of the language. The linguistic experts have developed different types of POS tagging approaches like Rule based, Stochastic based, Neural Network based approaches, etc. Here in this paper our aim is to briefly overview the computational works that has been done till date by the linguists in the field of POS tagging of Assamese language.
Keywords: Syntatic Parsing, POS Tagging, Assamese, Stochastic.
Abstract
Computer Aided Diagnosis Tool for Identification of Tumors in Brain MRI Images and Performance Evaluation
Gopi Karnam, Ramashri Thirumala
DOI: 10.17148/IJARCCE.2016.53222
Abstract: In recent years, technical advances and enhancements in Magnetic resonance imaging (MRI) have aggravated increasing interest in the clinical role. The Computer Aided Diagnosis (CAD) framework helps the radiologists in researching the irregularities and helps radiologists to distinguish inconspicuous variations from the normal to the more critically, potential brain diseases at the prior stages. The CAD tool acts like a checker for therapeutic image and helps radiologists by highlighting regions that warrant a second examination. The development of computer aided detection technology which laid foundation for solving early diagnosis of brain tumor. The CAD tool for medical image processing is proposed in this paper. The tool is developed in MATLAB to read images of different formats like tif, jpg, DICOM etc. The tool fits for showing data about the loaded image of selected format, read and spare images form and to work space. This paper also aims at extracting the meaningful objects lying in the image and goes for extricating significant objects in the image In this paper, K-Region based Clustering and watershed segmentation has been proposed. K-means is one of the prominent methods of its simplicity and computational efficiency, whereas watershed segmentation is one such dependable way to deal with homogeneous regions in the image. It is simple, can be parallelized and dependably produces a complete division of the image. The four parameters, such as Probabilistic Rand Index (PRI), Variation of Information (VOI), Global Consistency Error (GCE), Peak signal to noise ratio (PSNR), and Structural similarity (SSIM) have been utilized to evaluate the performance. The performance is evaluated by taking the Brain MRI images as the input and GUI based CAD tool has been used to evaluate the performance.
Keywords: Brain MRI image, computer Aided Diagnosis, Image segmentation, k-means, Watershed segmentation.
Abstract
Clock Related Flip-Flop with Sleepy Transistor Merging For Power Saving
K. Shilpa, D. Ganesh Kumar
DOI: 10.17148/IJARCCE.2016.53223
Abstract: The need for low-power design is also becoming a major issue in high-performance digital systems such as microprocessors, digital signal processors (DSPs) and other applications. The dominant factor of power dissipation is caused by switching activity. As low power circuits are most popular now days as the scaling increase the leakage power in the circuit also increases rapidly and so for removing these kinds of leakages and to provide a better power efficiency different types of power gating techniques are used. The different types of power gated circuits using low power VLSI design techniques are analysed and comparison results are displayed. As compared with conventional flip-flops, the flip-flop reduces power dissipation by 75% at 0% data activity and the power reduction ratio is the highest among flip-flops that have been reported so far. The simulations were done using Microwind Layout Editor and DSCH software.
Keywords: Flip-flops, Low-power, VLSI, Transistor.
Abstract
Outliers Analysis of Real-time Metereological data using Elastic Search repositories for a proposed Natural Disaster Prediction System (NDPS)
Manoj Sakhala, Yogesh Dasgaonkar, Ajay Kumar, Jignasa Patil
DOI: 10.17148/IJARCCE.2016.53224
Abstract: Weather forecasts are made by collecting quantitative data about the current state of the atmosphere at a given place and using scientific understanding of atmospheric processes to project how the atmosphere will change. But in order to make quick and exact forecasting decisions we will need to have a critical observation points to give alerts about the fluctuations in the weather conditions. Quick prediction of natural calamities or other environment fluctuations on a real time data can be implemented with the help of using and analyzing Outliers within the data inside elastic search repositories. Our proposed system will consist of five major components: 1) Weather data collecting agent: Weather live feed/Historic data. 2) Processing agent: Coverts the data in JSON format for storing in elastic search repository. 3) Repository: Using Elastic Search technology. 4) Outlier Analyzer: Contains the logic to perform analysis of the disaster prediction. To improve the accuracy of prediction the outlier rules have been mapped to a Bayesian network model. 5) Display agent: Provides a display in the form of alerts, alarms or graphical for warnings based on what outlier was activated.
Keywords: Weather Forcasting,Outlier,ElasticSearch,JSON,Bayesian Network,Natural Calamity.
Abstract
A Survey on Node Scheduling Methods for Wireless Sensor Networks
Neha Patel, Shweta Singh
DOI: 10.17148/IJARCCE.2016.53225
Abstract: The wireless sensor networks (WSN) is a combination of a large number of low-power, short-lived, unreliable sensors. The main challenge of wireless sensor network is to obtain long system lifetime. Many node scheduling algorithms are used to solve this problem. This methods can be divided into the following two major categories: first is round-based node scheduling and second is group-based node scheduling. In this paper many node scheduling algorithm like AFAP, RSGC, Tree-Based distributed wake-up scheduling and Clique based node scheduling Algorithm are analysed.
Keywords: WSN(The wireless sensor networks); AFAP(As-Fast-As Possible); RSGC(A randomized node scheduling); Clique;
Abstract
Internet of Things (IoT) : Challenges and Future Directions
Ms. Yogita Pundir, Ms. Nancy Sharma, Dr. Yaduvir Singh
DOI: 10.17148/IJARCCE.2016.53226
Abstract: The growth potential for the embedded industry is enormous. And the path forward is becoming clearer every day. It�s time that we start building IOT systems, and provide value to our customers.[1]. The IoT is expected to connect 28 billion �things� to the internet by 2020, ranging from wearable devices such as smart watches to automobiles, appliances, and industrial equipment [3]. In this paper , we will take a look at different IOT solutions developed so far, their functionalities and technology used and thus conclude the various challenges to be focused on to give way to better solutions that will help the community.
Keywords: Internet of things ,RFID , IPv6,Wireless Sensor Network ,Smart home.
Abstract
Analysis of the Effective Advanced Encryption Standard Algorithm
Umalaxmi Sawant, Prof. Kishor Wane
DOI: 10.17148/IJARCCE.2016.53227
Abstract: Now aday�s civilization is hugely dependent upon electronic and communication system. In this electronic world, increasing need of data protection in computer networks is necessaryfor the development of several cryptographic algorithms and tosend data securely over a transmission link from one person to another person.AES is one of the better algorithms for secured transmission than the traditionalalgorithm. In this AES algorithm, various steps are required toencrypt and decrypt. The AES algorithm uses cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data on block size of 128 bits. The algorithm is synthesized and simulated using Xilinx ISE and Model Simsoftware and results are comparedwith previous work.AES algorithm is implemented on hardware as well as software which provide higher security.
Keywords: AES (Advanced Encryption Standard), DES (Data Encryption Standard), Encryption, Decryption, Cryptography, FPGA, cipher text.
Abstract
Elaborated Glimpse of Furniture Outline
Prof. P. S. Toke, Aditya Limaye, Susmit Mane, Vishal Metri, Aniket Paste
DOI: 10.17148/IJARCCE.2016.53228
Abstract: In our day today life we need to mastermind our work and also the hardware or devices which are required for certain operation. So also we need to clean our rooms, make them clean and perfectly masterminded in order to give an outfitted, alluring look to our rooms and houses. We organize our furniture in such a style, to the point that the room looks appealing and in addition we get a sufficient measure of space for agreeable development of the relatives and the visitors. Here we are going to propose a methodology which will improve increased perspective of our rooms, we will superimpose the 3-D objects or the furniture pictures in our room essentially. This will give us a reasonable thought of how the room will look like when the furniture is put truly.
Keywords: Procedural Modelling, Object Layout, Data-Driven Modelling, Augmented Reality, Interaction Techniques, Tangible User Interfaces, Multi modal Input.
Abstract
Authentication Using Graphical Password
Komal Patil, Pranita Khape , Swapnali Pawar, Chaitrali Kamble, Prof.B.L.Sutar
DOI: 10.17148/IJARCCE.2016.53229
Abstract: The conventional password systems are vulnerable to shoulder surfing, many shoulder surfing graphical password systems have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password systems have been proposed. Unfortunately, none of the existing text-based shoulder surfing resistant graphical password systems is both secure and efficient enough. In this paper, we propose an improved text-based shoulder surfing resistant graphical password system by using colors. In the proposed system, the user can easily and efficiently login system. Next we analyze the security and usability of the proposed system, and show the resistance of the proposed system to shoulder surfing and accidental login[6].
Keywords: pass-colour, pass-character, graphical, shoulder surfing resistant.
Abstract
Android Based LAN Monitoring System
R.V.Kurkute, B.M.Jadhav, A.S.Walunj, Prof.S.B.Bhosale
DOI: 10.17148/IJARCCE.2016.53230
Abstract: The increasing demands and use of computers in universities and research labs generated the need to provide High speed interconnections between computer systems. This paper represents how a computer or multiple computers connected in a network i.e. LAN can be monitored from remote place with smart phone device i.e. Android phone with the help of Internet (Wi-Fi). It is basically an Android based Mobile Application for keeping an eye on a Targeted PC. All the applications running on the computers will be monitored by the handheld device. Also admin can see the log files of targeted PC from anywhere provided that the Wi-Fi is enabled. This paper describes how the application can be used in various sectors such as colleges, government sectors, industries etc. and also gives the overview of client server architecture.
Keywords: LAN, Android, WIFI, GPRS, Admin, handheld device.
Abstract
Android Based Mini ERP System for College Institutions
R.Raheema Nilofar, K.Sigappi, R.Soundarya, SP.Valliammai, AT.Barani Vijaya Kumar
DOI: 10.17148/IJARCCE.2016.53231
Abstract: Mobile technology has introduced a new environment among upcoming generations that can be used to improve the management process. The proposed system will improve interactivity, accessibility, and convenience in the college management process. It is a simple yet powerful integrated platform that connects the various entities. It is a handy application that can be used by the parents and the administrator to facilitate communication. The application is portable as it is used on a mobile device and improves connectivity between the parents and the institution, thus helping the institution to provide a more transparent system altogether. The application also reduces a substantial amount of paperwork that is otherwise needed for the daily tasks in an institution.
Keywords: Android , Enterprise Resourse Planning , Mobile technology SmartPhone.
Abstract
An Application of Image Processing to Detect the Defects of Industrial Pipes
Mayuri Dharma Shinde, Prof. Kishor Wane
DOI: 10.17148/IJARCCE.2016.53232
Abstract: In many industries, conventional defects detection methods are performed by experienced human inspectors who sketch defect patterns manually and then resolve them. However, such detection methods are much expensive, inaccurate, complicated as well as time consuming. To overcome these problems, a new method has been introduced to detect and identify the defects in industrial pipes, automatically and effectively which is based on image processing. The proposed method works in three steps. In the first step, it converts the RGB image of the pipe into a grayscale image. Secondly, it extracts the pipe and finally it detects and identifies the defect.
Keywords: Defect detection; defect identification; image processing; pipe industry.
Abstract
Enabling Public Auditability and Data Dynamics for Storage Security and Data Integrity in Cloud Computing
Adith .A. Varghese, M.M. Ashwin, R. Harsshath Prabu, T. Praveen, Mr. B. Karthikeyan
DOI: 10.17148/IJARCCE.2016.53233
Abstract: In the Present Scenario, all the software processes use web based application which enables multiple clients to request access to the same file simultaneously. This might lead to server overload or even trigger a deadlock occurrence. Keeping this in mind, the concept of dynamic proof through captcha or OTP has been introduced here with other features including the likes of Key Generation and Cryptography. There are three major actors namely Admin, Audit and Client each with respective roles. The Client performs registration; log-in activities and also the file upload operations. The Admin monitors and controls the user registration approval whereas the Audit analyses and approves the content of the file being uploaded. The data owners can provide file access to clients requesting it by means of transferring a key through mail. The clients can perform editing and updating processes in the respective file with the help of the key and await verification cum uploading of the file by the data owner. The maintenance and storage of these files in a cloud computing server and the usage of key generation and captcha helps reduce server overload and improve data security.
Keywords: File-Upload, Cloud Storage, Audit Verification, File Request, File Access Block, Recovery Stage.
Abstract
Detection and Recognition of Outdoor Objects based on SIFT Features
R. Arun Kumar, Dr. M. Balasubramanian, C. Arul Selvi
DOI: 10.17148/IJARCCE.2016.53234
Abstract: Object detection and recognition is very essential for visually impaired to survive at indoor and outdoor environments. The objective of this paper is to detect and recognize the outdoor objects. In an effective method is proposed and implemented for the extraction of the objects from the outdoor environment automatically. The outdoor objects are detected from the real-time outdoor images. The outdoor objects are detected using Haar-like features and AdaBoost classifier. SIFT features are extracted from the detected objects and classified using Support Vector Machine. The experimental results reveals that the detection and recognition rate for real-time outdoor object using SIFT with SVM is 91.10%.
Keywords: object detection, AdaBoost Classifier, Haar-like feature, Support Vector Machine (SVM) classifier, Scale Invariant Feature Transform (SIFT).
Abstract
SQL Query Formation Using Natural Language Processing (NLP)
Prof. Debarati Ghosal, Tejas Waghmare, Vivek Satam, Chinmay Hajirnis
DOI: 10.17148/IJARCCE.2016.53235
Abstract: While working on normal database system, to retrieve data from database we have to know about the SQL Query language to retrieve exact data from the database. But everyone doesn�t have exact knowledge about the SQL Query language. For retrieving data from the database they have to enter the correct SQL Query. But without having any knowledge about SQL Query, they are unable to retrieve the data of their choice. To overcome this, we are doing our project on SQL Query formation using Natural Language Processing (NLP). This project aims at developing a system which will accept English query from user and convert it into SQL. This helps novice user who can easily get required contents without knowing any complex details of SQL languages. We can store huge amount of data in databases, but casual users who don�t have any technical background are not able to access the data. Hence, there was a requirement for personnel with knowledge of SQL to retrieve data from the databases. So this paper proposes system that will convert English statement given by user to all possible intermediate queries so that user can select appropriate intermediate query and then system will generate SQL query from intermediate one. Finally system will fire SQL query on database and gives output to user. When an interpretation error occurs, users often get stuck and cannot recover due to a lack of guidance from the system. To solve this problem, we present a natural language query processing framework.
Keywords: NLP, SQL, Morphological, Lexical, Syntactic, Semantic.
Abstract
Visual and Textual Content based Anti-Phishing
Mr.Digambar Pawar, Mr.Anuraj Jagdale, Mr.Rohit Hinge, Mr.Rupesh Gangtire
DOI: 10.17148/IJARCCE.2016.53236
Abstract: Increasing the number of internet usage over the world, rapidly increases the number of phishing attacks and attacker acquires credential information of user. There are various techniques available to defend phishing attacks such as Microsoft blacklisted database and Google blacklisted database it contains only list of phishing websites URL which is previously detected. The study is to search on the internet utility which is mainly used for detecting phishing attacks and monitoring the authentication through pop-up�s on every fraud web site and use images containing institution's corporate logos and artwork. Using such type of internet utility we can prevent the phisher�s which use such criteria to fool the user and cause the economical disturbance or waste the money, using such types of tools like CANTINA we can secure our system from the fraud people and we can use the internet facility free without fear of phishers.
Keywords: URL (Uniform Resource Locator), CANTINA(Carnegie Mellon Anti-Phishing and Network Analysis Tool).
Abstract
Quality Enhancement and Reduction in Hand-off Latency in Cognitive Radio Network
Kalyani Gokhale, Kaustubh Apte
DOI: 10.17148/IJARCCE.2016.53237
Abstract: Cognitive Radio (CR) has immerged as the solution for spectrum inefficiency and spectrum scarcity. In many research papers so far, various frameworks and infrastructures have been proposed for deployment of CR network. In this paper, we have come up with an approach to further enhance the quality of CR communications. In the proposed method, we employ the concepts of extended area accompanied by need-based usage of unlicensed spectrum. We concentrate more on explaining the framework concept than its mathematical modelling. The simulation results show improvement in switching latency during hand-offs and overall quality enhancement of the CR communication.
Keywords: Cognitive radio, handoff, extended area, spectrum pool, unlicensed spectrum.
Abstract
Smart Traffic App Using Android Phone
Mehra Varsha, Kodgire Nikita, Mehetre Komal
DOI: 10.17148/IJARCCE.2016.53238
Abstract: There are turns out to be more major issues of activity offense and congestion in city because of the issues of traffic accident as the increment of the city vehicles. Notwithstanding, there are restricted traffic police, so activity watch and working at normal spots are the previous methods for working that can't viably take care of the issues over any more. We composed and understood the mobile office framework through the portability normal for the activity police working and the examination of the substantial working scale, which could successfully tackle the jam issue by taking in the road turned parking lot Situation. The data of the traffics which manage the auto collisions and activity offense can viably gather by the framework which could significantly supportive for enhancing the work productivity of the traffic police.
Keywords: Android, Mobile office system, Traffic jam situation, Vehicle information.
Abstract
Effective Crawling In Web Forum
D. Dhivya , R. Venkadeshan , D. Vidhya
DOI: 10.17148/IJARCCE.2016.53239
Abstract: The Main Objective of EC web is to crawl relevant forum content from the web with minimal overhead. Forum threads contain information content that is the target of forum crawlers. Each forum have different layouts or styles and are powered by different forum software packages, they always have similar implicit navigation paths connected by specific URL types to lead users from entry pages to thread pages. We reduce the web forum crawling problem to a URL-type recognition problem. Training sets are created by learning accurate and effective regular expression patterns. We have applied this knowledge on unseen URL�s and identified the type of that URL. After the classification all crawled URL�s are stored in a log. URL log is used to identify strong and weak URL�s by eliminating the duplicate URL�s from the URL log. Effectiveness of the strong URL will be measured finally.
Keywords: Effective Crawling, Web Forum, URL Type Recognition Module, Crawling Module.
Abstract
Digital Video Watermarking for Copyright Protection
Soumya Naik, Shyamali Patil, Shweta Salgaonkar, Prof. Nagmani
DOI: 10.17148/IJARCCE.2016.53240
Abstract: Today the world is so fast as the digital multimedia applications are increased. Spatial domain and transform domain can be divided in digital watermarking. The spatial domain method is the simple form of watermarking technique but it has lowest robustness against the attacks whereas the transform domains have highest robustness and are more complex. The important and most common methods of watermarking are DWT (discrete wavelet transform) and DCT (Discrete cosine transform). Our project is digital video watermarking scheme which is based on DWT (discrete wavelet transform) and PCA (principle component analysis). The PSNR (peak signal to noise ratio) plays most vital role which is used to calculate efficiency of all methods. And this value must increase upto level.
Keywords: DWT, DCT, PCA, PSNR, binary watermark.
Abstract
Smart Trolly
Swapnil Patil, Avdhoot Mahale, Avinash Landge, Ankush Mahajan
DOI: 10.17148/IJARCCE.2016.53241
Abstract: An innovative product with societal acceptance is the one that aids the comfort, convenience and efficiency in everyday life. Purchasing and shopping at big malls is becoming daily activity in metro cities. We can see big rush at these malls on holidays and weekends. At billing counter the cashier prepare the bill using bar code reader which is very time consuming process and results in long queue at billing counter. In this paper, we discuss a product �SMART TROLLEY IN MEGA MALL� being developed to assist a person in everyday shopping in terms of reduced time spent while purchasing. The main objective of proposed system is to provide a technology oriented, low-cost, easily scalable, and rugged system for assisting shopping in person. In modern era, for automation of mall we are developing a microcontroller based TROLLEY which is totally automatic. When the customer want to purchase an items then customer has to hold the QR code side of the product wrapper in front of QR code scanner. Then corresponding data regarding product will be displayed on display. By using this trolley, customer can buy large number of product in very less time with less effort. At the billing counter, computer can be easily interfaced for verification and bill print out.
Keywords: Trolley, Purchasing, Billing, Microcontroller, QR code Scanner
Abstract
Building Ecommerce Framework for Online Shopping using Semantic Web and Web 3.0
Pranita Barpute, Dhananjay Solankar, Ravi Hanwate, Puja Kurwade, Kiran Avhad
DOI: 10.17148/IJARCCE.2016.53242
Abstract: E-commerce is one of the popular areas. In Online Shopping we can perform add, remove, edit, and update the product as per dealers and end users requirement. With the use of semantic web and web 3.0 the system performance will increase. The system should have proper user interface. The customers who visit online shopping system, they will have easy implementation of search item. This will increase the participation of various dealers for their product to get them online. For each Dealer have separate login and they also insert product, tracking products delivery for their products. The proposed system will use semantic web and web 3.0 Therefore, for Customer and also for Dealer it is useful. For both Customer and Dealers it shows own interface.
Keywords: Framework, Semantic Web, Ontologies, Web 3.0, Resources Description Framework (RDF), Owl, E-commerce.
Abstract
Sun Tracking Solar Panel System
Adithi Reddy, Sudeep Chandra V
DOI: 10.17148/IJARCCE.2016.53243
Abstract: This paper basically presents the sun tracking solar system. The working of the solar panel in this paper is similar to that of the solar energy consumption module available, but in a cheaper form. It basically works on the process of solar energy consumption and the usage of that energy in some efficient format for reducing heavy dependence on the natural resources, which will further reduce the depletion of natural resources which is a major concern and the major reason for global warming as well.
Keywords: Solar Panel, Arduino, Servo motor.
Abstract
Mobile Based Event Initiator
Nirmita Shah, Antara Dighe, Indu Anoop
DOI: 10.17148/IJARCCE.2016.53244
Abstract: Mobile based event initiator is an android application used for sending alarm remotely. This application utilizes the Short Message Service of the portable device. The SMS event will trigger an alarm on phone irrespective of volume settings. It is an alarm or event forwarding service with added feature of location based time scheduler. This application allows third party to remotely trigger an alarm on phone depending on individual location. This application can propagate the information of location to the right users at right time and right place by using alarm. It reminds the user about important event in the future. It allows the user to send reminder text along with alarm. This mobile application focuses on improving usability for users.
Keywords: Alarm, Remotely send, Event, Location, Android.
Abstract
Application of Educational Data mining Techniques in E-Learning Systems with its Security Issues: A Case Study
Ms. Ankita Chopra, Ms. Aakanksha Chopra
DOI: 10.17148/IJARCCE.2016.53245
Abstract: Recently, Educational Data Mining has become an emerging research field used to extract knowledge and discover patterns from E-Learning systems. This work is a survey of the specific application of data mining in learning management systems and a case study with university database.E-learning systems is an information superhighway where large scale communication network is provided with variety of interactive services are provided as text- database, e-mail, audio, video etc. Cyberspace is the indefinite areafamously known as Internet. Cyber security is the frame of protocols framed in one place for safeguarding this cyberspace.This paper explains how data mining tasks like clustering can be applied to the data taken from an e-learning system and also deals with E-threats and E-risks associated with it.This paper will also focus upon ubiquity of internal cyber-attack as well as lack of proper IT policies and procedures in e-Learning systems. The performance of students on online course in digital electronics is taken for the analysis and results are achieved with WEKA tool.
Keywords: EDM, Classification, Clustering, WEKA, E- Threats and E-Risk.
Abstract
The detection of Urea, Sugar, Sodium Chloride, and Measurement of PH Parameter in the Milk
Prof. Santosh M. Tambe, Prof. Mahindra R.Gaikar, Prof. Snehal S. Somwanshi
DOI: 10.17148/IJARCCE.2016.53246
Abstract: Milk contains all types of macro and micro nutrients. The common adulterants found in milk are urea; starch/blotting paper, glucose/sugar, caustic soda, ammonia refined vegetable oil (cheap cooking oil), white paint and common detergent or shampoo. These not only reduce the nutritious value of the milk but also such milk pose risk to health. Concentrations of mixing other components (Milk blend) detection system is use to detect the blend added in the milk such as urea or sugar. It is having content such as glucose & PH in the milk sample. Also the sodium chloride is detected. All parameters are monitored and it will be display in the percentage form. The advantage of this system is that the all parameters are detected by the sensors, so there is no requirement of any chemical reaction.
Keywords: Urea, Sugar, Sodium Chloride, PH Parameter, Milk, pH Scale.
Abstract
Visual Based Image Search using Perceptual Hash Codes for Online Shopping
Shradha kadam, Priyanka Gupta, Charul Veer, Akshay Loke
DOI: 10.17148/IJARCCE.2016.53247
Abstract: Visual based search aims at identifying a product, or retrieving similar products from a database based on a photo captured from a mobile phone camera or browsed from computer. Today, Keywords are used to find products on online shopping site. The fast and easy search has motivated the development of Visual based search which is the type of search that puts images at the centre of user�s attention. Visual basedimage search works like traditional (key-word) search but without having to type any text or go through complicated menus to initiate the search process. We focus on a visual shopping system. To be more specific, we want to use visual information to find corresponding products in a precise and easy fashion. This is useful when people do not know how to describe the visual object in terms of text. In this paper we discuss the new hash technique called as perceptual hash which calculates the hash code for input image provided by user and then hamming distance is calculated with the images stored in the databases having their respective perceptual hash value and based on highest percentage of visual similarity, products are displayed to user.
Keywords: visual based image search, perceptual hash codes, hamming distance, visual similarity.
Abstract
Human Identification using Major and Minor Finger Knuckle Pattern
Ms. Aditi S. Pekhale, Ms. Prachi D. Thakur, Ms. Kavita D. Thorat, Ms. Ashwini V. Waje, Prof.Satish.N.Bhadane
DOI: 10.17148/IJARCCE.2016.53248
Abstract: This paper investigates the possible use of minor finger knuckle patterns The minorand minor finger knuckle patterns can either be used as independent biometric patterns or employed to improve the performance from the major finger knuckle patterns. A completely automated approach for the minor finger knuckle identification is developed with key steps for region of interest segmentation, image normalization, enhancement, and robust matching to accommodate image variations. This paper also introduces a new or first publicly available database for minor (also major) finger knuckle images from 503 different subjects. By using major and minor fingur knuckle we can accurateliy find out human The efforts to develop an automated minor finger knuckle pattern matching scheme achieve promising results and illustrate its simultaneous use to significantly improve the performance over the conventional finger knuckle identification. Several open questions on the stability and uniqueness of finger knuckle patterns should be addressed before knuckle pattern/image evidence can be admissible as supportive evidence in a court of law. Therefore, this paper also presents a study on the stability of finger knuckle patterns from images acquired with an interval of 4�7 years. The experimental results and the images presented in this paper provide new insights on themajor and minor finger knuckle pattern and identify the need for further work to exploit finger knuckle patterns in forensics and biometrics applications.
Keywords: major finger knuckle, minor finger knuckle, finger dorsal biometrics, knuckle segmentation, local binary patterns.
Abstract
A Review on Parallel Data Acquisition for Industrial WSN in IoT Environment
G.H.Bhise, S.S.Thorat
DOI: 10.17148/IJARCCE.2016.53249
Abstract: IoT is Internet of Things in which all physical things are organized with each other. For the expansion of IoT the interface device is crucial which will have high capability to connect sensors. The network of sensor is used for IoT as wireless sensor network and to collect the data from remote areas ZigBee module is used. The data collected through ZigBee is sent for further processing to another ZigBee at central data acquisition point. Here data is coming from different ZigBee, so to process it for further transferring through HTTP high speed controller is required. Initially single core controller was used, which have limited data rate. Now to boost data rate Zybo development board is used, which has dual core processor, so data can be acquired and processed in parallel. In addition to this programming is simpler and embedded Linux can be used as an operating system, which is free of licence.
Keywords: WSN, IoT, Embedded Linux, ZigBee, Zybo.
Abstract
Implementation of efficient FFT Algorithm for WiMAX applications
K.SandhyaRani, Kishore Sonti
DOI: 10.17148/IJARCCE.2016.53250
Abstract: The advancements in VLSI technologies for Digital signal processing have opened many windows in past few years for designing real time applications, using efficient algorithms with custom chips. Multicarrier modulation techniques (OFDM) are rapidly moving in modern communication systems. Mobile WIMAX (Worldwide Interoperability for Microwave Access) or 802.16e standards uses this OFDM Technology. The FFT and IFFT pairs are most important blocks used to modulate and demodulate the data constellation on the subcarriers in the OFDM (Orthogonal Frequency-Division Multiple Access) system. In this paper we presented high level implementation of a FFT /IFFT to increase the speed and performance of OFDM Modulator and Demodulator. This paper presents the 256-point Radix-4 FFT algorithm. The design has been coded in VHDL and simulated in MODELSIM, targeted into Xilinx Spartan3 FPGAs.
Keywords: WiMAX, OFDM, FFT, IFFT, FPGA
Abstract
Automatic Electricity Billing
Markose Babu, Meera Antony, N. Pranav Ashok, Niranjana. K. R, Darsana. P
DOI: 10.17148/IJARCCE.2016.53251
Abstract: Every system around us is becoming automatic and making our lives more comfortable. Our idea is to develop an automatic electricity billing which is very essential in our daily life. At present, an employee from the electricity board visits regularly once in a month, takes the meter reading and submits these readings to the office. The office generates a bill on the basis of meter reading. The accuracy of this method is less due to human interventions. As a result, Automatic Electricity Bill concept is developed in which the collection of meter reading, processing of the reading and sending the bill to customer is done automatically. This method employs a camera which is fixed in front of the meter is used to take the snapshot. The captured image is then processed and the meter reading is extracted. The bill amount is calculated and is send to customer as SMS via GSM module. A copy of SMS is sent to the electricity board for documentation purpose.
Keywords: Character recognition, GSM, Image processing, MATLAB.
Abstract
Advanced Optimized Next Hop Routing Link State Routing In Wireless Sensor Network
Sonatte .A.A, Mrs. N. Gomathi M.E
DOI: 10.17148/IJARCCE.2016.53252
Abstract: A hybrid routing protocol named AOHR (AODV and OLSR hybrid routing) for wireless ad hoc networks is proposed in this paper. In AOHR, each node maintains topology information of a zone with radius not larger than a set value. By the proactive property of OLSR, when a node wants to communicate with another node within its zone, packets can be transmitted directly. Otherwise, a routing request procedure will be invoked by the reactive property of AODV. In addition, AOHR utilizes MPRs (multipoint relays) to reduce overheads of route requests. This paper also proposes dynamic zone radius maintenance for AOHR to dynamically adapt to various scenarios. Analysis and simulation results show that AOHR combines the characters of high data delivery fraction, low overheads, and short delay in AODV with the characters of optimized routing length in OLSR, which means that AOHR is immune from topological structures.
Keywords: Advanced Optimized Next Hop Routing (AOHR), Hybrid Routing Protocol, AODV, OLSR, MPRs.
Abstract
A Comparative Study of Chatbots and Humans
Amit Mittal, Ayushi Agrawal, Ayushi Chouksey, Rachna Shriwas, Saloni Agrawal
DOI: 10.17148/IJARCCE.2016.53253
Abstract: A chatbot is a software that interacts with humans using natural language processing and pattern matching techniques to understand questions and give relevant answers. In this paper, we evaluate the performance of chatbots ALICE, Jabberwacky and Rose on various criteria. We compare their performance with that of humans. Our general conclusion is that chatbots perform equally well as humans but they cannot replace humans completely.
Keywords: Chatbot, natural language processing, human computer interaction, pattern matching.
Abstract
A Novel Design of Electrostatic Actuation Based on Comb Drive MEMS Resonator Using Vibrating Energy Storage Application
K.Vinotha, S.Muruganand, S.Sathya, V.SenthilKumar
DOI: 10.17148/IJARCCE.2016.53254
Abstract: In this paper, investigates the comb drive based microelectromechanical systems MEMS resonator device has coupled interaction between the electrical and mechanical systems of the transducer. The parametric resonator is the sense and it is electrostatic force driven in lateral direction. However, the mechanical domain was vibrates of modes an along with flexural folded beam. The Polyvinyl Alcohol (PVA) material based on the structures are analyzed for different number of combs with stiffness using Finite Element Methods (FEM) techniques. In addition this dynamic Multiphysics model is developed for the Arbitrary Lagrangian-Eulerian (ALE) formulation. Here, results shown the electrostatic actuation verses number of combs and displacement is related to change in the capacitance due to the comb fingers and calculated the capacitance in overlapping combs. This simulation work done by two dimensional (2D) IDC MEMS resonator structure using COMSOL Multiphysics 4.4 and also theoretical shown on the resonance frequency with the high quality factor.
Keywords: MEMS resonator, interdigitated comb-drive, electrostatic actuators, flexural beam and FEM.
Abstract
Dust Bin Monitoring System
Ann Mary Thomas, Annu Reji Philip, Tessy Elsa Peter, Er. Nishanth P R
DOI: 10.17148/IJARCCE.2016.53255
Abstract: As the second most populous country in the world India face a major problem in waste management. As of now there are traditional waste management systems like periodic and routine clearing by the various civic bodies like the municipal corporation. But even though these routine maintenances is carried out we often come across overflowing garbage bins from which the garbage spills on to the streets. This happens because as of now there is no system in place that can monitor the garbage bins and indicate the same to the corporation. In this project, we aim at an automatic garbage level detecting system informing the concerned authorities timely and also classification among the wastes aiding efficient waste management.
Keywords: GSM, IR Module, PIC Microcontroller.
Abstract
Analysis of Public Sentiment on Twitter
Ms. Ashwini Patil, Mr. Chandrakant Jadhav, Ms. Tejaswini Patil
DOI: 10.17148/IJARCCE.2016.53256
Abstract: In this paper, investigates the comb drive based microelectromechanical systems MEMS resonator device has coupled interaction between the electrical and mechanical systems of the transducer. The parametric resonator is the sense and it is electrostatic force driven in lateral direction. However, the mechanical domain was vibrates of modes an along with flexural folded beam. The Polyvinyl Alcohol (PVA) material based on the structures are analyzed for different number of combs with stiffness using Finite Element Methods (FEM) techniques. In addition this dynamic Multiphysics model is developed for the Arbitrary Lagrangian-Eulerian (ALE) formulation. Here, results shown the electrostatic actuation verses number of combs and displacement is related to change in the capacitance due to the comb fingers and calculated the capacitance in overlapping combs. This simulation work done by two dimensional (2D) IDC MEMS resonator structure using COMSOL Multiphysics 4.4 and also theoretical shown on the resonance frequency with the high quality factor.
Keywords: MEMS resonator, interdigitated comb-drive, electrostatic actuators, flexural beam and FEM.
Abstract
Recognition of Paddy Plant Diseases Based on Histogram Oriented Gradient Features
K. Jagan Mohan, M. Balasubramanian
DOI: 10.17148/IJARCCE.2016.53257
Abstract: In the field of agriculture, paddy cultivation plays a very important role. But the growth of paddy plants is affected by various diseases. There will be a decline in the production, if the diseases are not recognized at an early stage. The main goal of this work is to build up an image recognition system that can classify the paddy plant diseases affecting the cultivation of paddy plant namely brown spot, bacterial blight and leaf blast. The features from the disease affected portion are extracted using Histogram Oriented Gradient (HOG) features. Then these features are given as input to the Support Vector Machine (SVM) in order to recognize their category. By this approach one can detect the disease at an early stage and thus can take necessary steps in time to minimize the loss of production. The disease recognition accuracy rate is 97.73%.
Keywords: Agriculture, Accuracy Rate, Computer Vision, HOG, Pattern Classification, SVM Classifier.
Abstract
Novel Approach to Infer User Search Goal for Query by Clustering Its Feedback Session
Ku. Sushama K. Deotale, Prof. M. S. Khandare
DOI: 10.17148/IJARCCE.2016.53258
Abstract: For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. In this paper, we propose a novel approach to infer user search goals by analyzing search engine query logs. First, we propose a framework to discover different user search goals for a query by clustering the proposed feedback sessions. Feedback sessions are constructed from user click-through logs and can efficiently reflect the information needs of users. Second, we propose a novel approach to generate pseudo-documents to better represent the feedback sessions for clustering. Finally, we propose a new criterion �Classified Average Precision (CAP)� to evaluate the performance of inferring user search goals. Experimental results are presented using user click-through logs from a commercial search engine to validate the effectiveness of our proposed methods.
Keywords: User search goals, feedback sessions, pseudo-documents, restructuring search result, clustering, classified average precision (CAP).
Abstract
A Survey: Wireless Sensor Networks for Personal Health and Structural Health Monitoring
Prof. Prashant S Bibave, Prof. Liladhar P. Bhamare
DOI: 10.17148/IJARCCE.2016.53259
Abstract: A wireless Sensor Network system is having potential to monitor the Human Health, Structural health monitoring for building, bridges. In this paper a survey on Human health monitoring & Structural health monitoring is shown by using wireless sensors network. Different applications by wireless sensors for healthcare system are discussed. Technical challenges regarding health care system is explained. Application of ubiquitous for structural monitoring also explained. The advantages & applications of wireless Sensor Network system also discussed. This paper is purely a survey of earlier work of different Authors.
Keywords: Wireless Sensor Networks, Ambient Health Monitoring, Structural Health Monitoring, Personal Health Monitoring, Technical Challenges.
Abstract
Digital India – Challenges Faced by IT Sector
Ashok Patel, Sheetal Thakkar, Viren Parmar
DOI: 10.17148/IJARCCE.2016.53260
Abstract: Digital India programme is an initiative by the government of India to bring about a transformation in the nation and restructure all the government services, making them accessible by all, over the Internet. Its 9 pillars cover various facilities provided by the government under various schemes to the masses, and make them available over the cloud. However, the campaign as a whole faces various challenges, especially in the IT sector. The vision of Digital India, its 9 pillars and the challenges that can hinder the progress of the campaign are worth studying.
Keywords: Digital India, 9 Pillars, NDLP, IT, Internet, e-Kranti, e-governance.
Abstract
Secured Hadoop as A Service Based on Infrastructure Cloud Computing Environment
Atul U. Patil, A.P.Pande, R.U.Patil, B.S.Patil
DOI: 10.17148/IJARCCE.2016.53261
Abstract: This paper propose system that gives out requirement based allocation of Hadoop as a service with infrastructure cloud environments. Hadoop is effective big data analysing and processing platform these days. But in instead of its promising nature, researchers or professional organizations are not technically sound or having capacity to implement and maintain a working Hadoop environment. That�s, we are providing the secured Hadoop as a service. For cloud services to use computing services or analytics services by the cloud users is truly problematic. It's a big issue to complete user�s needs. Hence. On-Demand Hadoop service through cloud infrastructure provides a way to handle big data on the go. Potentially strengthening in security problems and achieves equal Job scheduling and quick process of huge information in less quantity of time and resources by computing the scientific or any high performance computing jobs. Hadoop and Cloud taken the apps and software systems and also different databases to cloud data centres, wherever the handling of the sensitive data and processes is not safe. Its security loophole. Solution is given by processing and securing the information using ciphering deciphering and storing them into the cloud servers.
Keywords: Hadoop as a Service, Encryption/decryption algorithm, Storage utilization.
Abstract
Novel Method to Improve ACO Performance on the GPU Using CUDA for Nurse Roster Scheduling Problem
Mr. A. P. Pande, Mr. B. S. Patil, Mr. A.U. Patil
DOI: 10.17148/IJARCCE.2016.53262
Abstract: This paper shows the accomplishment of parallel Ant Colony Optimization algorithm on the Graphics Processing Unit (GPU) to solve nurse roster scheduling problem (NRSP).We put on the Schedule formation and pheromone update phases of Ant colony Optimization using a data parallel method. We applied roulette wheel selection method for schedule formation and pheromone update. The parallel accomplishment of roulette wheel selection method considerably cuts the execution time of Schedule formation. Our new parallel accomplishment executes up to 8-12x faster than sequential execution at the same time as preserving the quality of the Schedules formation.
Keywords: CUDA, GPU, NRSP, NVDIA, ACO.
Abstract
Secure auditing and De-Duplicating data in cloud
Mohammed AhasanNafis Rizvi, Rohit Singh Sawan, B.W Balkhande
DOI: 10.17148/IJARCCE.2016.53263
Abstract: The cloud computing technology came into existence during the21st century; outsourcing data to cloud service for storage becomes a useful yet efficient trend, which benefits in sparing efforts on data maintenance and management. Nevertheless, since the outsourced cloud storage service is not fully trustworthy, it raises security concerns on how to realize data de-duplication in cloud while achieving integrity auditing. In this work, we study the problem of secure de-duplication on cloud data, also ensuring integrity. Specifically, aiming at achieving both data integrity and de-duplication in cloud, we propose a system, namely D-cloud. D-cloud introduces an auditing entity with maintenance of the cloud, which helps generate hash value before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in D-Cloud is greatly reduced during the file uploading and auditing phases. D-cloud is designed realizing the fact that users always want to encrypt their data being uploaded, and enables integrity auditing and secure de-duplication on encrypted data.
Keywords: Secure Auditing, De-Duplicating Data, D-cloud, Integrity, Encrypted Data.
Abstract
IOT-An Overview
Anupama Kaushik
DOI: 10.17148/IJARCCE.2016.53264
Abstract: The Internet of Things (IOT) refers to the environment where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers. These items are then capable to generate, exchange and consume data with minimal human intervention. This paper gives an overview of Internet of Things (IOT).
Keywords: Internet of Things (IOT);
Abstract
Congestion Avoidance in WSN Clusters using Token Bucket Algorithm
Prabhdeep kaur, Jaswinder singh
DOI: 10.17148/IJARCCE.2016.53265
Abstract: Wireless sensor network is a widely emerging field due to its wide range of applications in different areas. There are many issues in this field like energy efficiency, routing, lifetime, battery power etc. To address these issues there are some approaches like congestion, clustering etc. This paper works on congestion avoidance in clusters of wireless sensor networks and presents an improved version of PASCCC (Priority Based Application Specific Congestion Control Clustering Protocol).
Keywords: WSNs, PASCCC, Congestion, Clustering, Token bucket algorithm.
Abstract
A Review of Various Protocols for WSNs in Search of Most Efficient Congestion Control and Clustering Techniques
Prabhdeep Kaur, Jaswinder Singh
DOI: 10.17148/IJARCCE.2016.53266
Abstract: Wireless Sensor Networks consists of sensor nodes which are scattered to sense the environment, gather some relevant data, as per the requirements, and transmit it to a base station for processing. There are many issues in wireless sensor networks like lifetime, security, privacy, energy efficiency; mobility etc .Energy conservation in the Wireless Sensor Networks is a very important task because of their limited battery power. The related work so far has tried to solve the issues in this context, keeping in mind the constraints of WSNs like battery power, capacity, size etc. In this study, many protocols related to WSNs have been studied like routing protocols, communication protocols, clustering protocols, congestion control protocols etc. The most recent work which has been done in this field has presented a priority based application specific congestion control clustering (PASCCC) protocol, which integrates the mobility and heterogeneity of the nodes to detect congestion in a network. The review has shown that the PASCCC suffers from certain limitations so this paper ends up with suitable future directions.
Keywords: WSNs, PASCCC, LEACH, Congestion, Clustering.
Abstract
Multi-Level Priority Based Packet Scheduling Scheme For Wireless Sensor Network
P.Palanisamy, V.S.Sathish kumar
DOI: 10.17148/IJARCCE.2016.53267
Abstract: Scheduling different types of packets, such as real-time and non-real-time data packets, at sensor nodes with resource constraints in Wireless Sensor Networks (WSN) is of vital importance to reduce sensors energy consumptions and end-to-end data transmission delays. The main objective of packet scheduling scheme in wireless sensor network is to minimize the average end to end delay and waiting time of all real-time data packets and also non-real time data packets. Due to the minimization of these factors, we can get the minimum energy consumption. Then, the life time of battery will be increased. So here we were considering these factors for multiple levels and multiple zones. Scheduling different types of packets, such as real-time and non-real-time data packets, at sensor nodes with resource constraints in Wireless Sensor Networks is of vital importance to reduce sensors� energy consumptions and end-to-end data transmission delays.
Keywords: Wireless sensor network, packet scheduling, preemptive priority scheduling, non-preemptive priority scheduling, Dynamic Multilevel Priority scheduling, real-time, non-real-time, data waiting time, FCFS.
Abstract
Beacon Based Vehicle Tracking and Vehicle Monitoring System
G. Kumaresan, J. Gokulnath
DOI: 10.17148/IJARCCE.2016.53268
Abstract: In this paper ibeacon is used for notifying vehicle to the Smartphone or tablet devices and to find out current location of vehicle passed on the road and maintain the record in details of the vehicle for find the location and pointed the vehicle, so many applications and methods ibeacon is used such as patient monitoring and store navigation, disaster recovery the Ibeacon will be used in this paper, we propose monitoring the vehicle crossing on the road or passed on the road purpose ibeacon used to express more details about the vehicle passing on the road. Evidence of the vehicle obtainable to the authorized user who all using the application with authorization and permission it will be transmitting the information about the vehicle and transmitting in partial range ibeacon transmitting to the user can only access with the major and minor of the Ibeacon notification. Future where location evaluation is performed by calculating times and speed of the vehicle crossed on the road. Positioned of Bluetooth transmitters' signal levels at certain point data will be stored is known base stations. All that information will be used for store about vehicle information in the nearest base station. When it comes to using more evidence of Ibeacon further it broadcast the information with low frequency.
Keywords: I beacon, beacon tracking architecture, beacon notification.
Abstract
Design of Efficient Backup with Security
Kadam Shweta A, Khot Swapnali B, Katkole Pooja P, Sargade Pradnya P, Nalwade Snehal S
DOI: 10.17148/IJARCCE.2016.53269
Abstract: Day by days the workload in organizations is increasing rapidly. There is large amount of data is to be handled. In case of important data, their regular backup is important. Many organizations follow manual techniques for backing up the data. If the data is important and large size. In such cases, we provide advanced software approaches for backing up the data. So we have a concept of regular data backup through advance software approaches. Manually, it is very hard to backup only that data which is modified on any particular date or any particular date range. This concept of regular data backup for any organization on periodic basis. It means the software will take backup of any specified location and will generate logs, error logs, size trends and many more. This concept can raise many new trends in data backup. As backup remains as problematic as ever, but there are several emerging trends in technology and functional convergence that should address some of the biggest challenges: increasing capacities, shrinking backup windows, increasing recovery point requirements, and limited budgets etc. We are trying to tackle such issues through our backup system by using advanced technology approaches.
Keywords: Backup, Security, Efficiency, Recovery.
