VOLUME 5, ISSUE 4, APRIL 2016
Hybrid Email Spam Detection Method Using Negative Selection and Genetic Algorithms
Mohammad Reza Abdolahnezhad, Touraj Banirostam
Antismuggling System for Trees in Forest using Flex Sensor with GSM & Zigbee Network
Prof. Mhaske D.A, Bhabad Vishnu S, Pathare Sagar A
Palm Print Feature Extraction and Authentication Using 2-D Gabor Filter
Prof. Arjun Nichal, Ms. Supriya Jadhav, Ms. Karishma Shikalgar, Ms. Poonam Maharnur
Iris Database Compression Using Haar Wavelet Decomposition and Huffman Coding
Alphones Maria, Amlu Anna Joshy, Aneeta Christopher, Anjali B, Ranjitha Rajan
Moving Circular Range Queries on The Static Data Objects in Location Based Advertising Application
Yogita V. Salvi, Dr. V.R. Ghorpade
Novel Approach for Surface Simulation -Virtual Reality
Kiran Kulkarni, Aditya Parvathi, Manoj Manvi
Fake Currency Detection Using LabVIEW
Ajay Antoney, Ann Merin Georgi, Ashish Roy, Aswani M, Mathew George
A Review: Implementation of Intelligent Features in Vehicle using CAN Protocol
Nilesh Gaikwad, Dr. S.D. Markande
Intelligent Bus Information System and Blind Assistance
Dennis Dcruz, Josna Joseph, Jobin Chacko Jacob, Delvin C Varghese, Adharsh Kumar C, Shinto Sebastian
Efficient Binarization of Degraded Document Image
Prof. Kiran Patil, Ms. Surya Pushparajan, Ms. Joshi Amruta, Ms. Suryavanshi Purnima, Ms. Shaikh Afrin
Financial Stock Price Forecast Using Classification
Dr. Swapna Borde, Austrin F. Dabre, Harsh M. Kamdar, Rahul Y. Purohit
Log analytics using ELK stack on Cloud platform
Sunny Advani, Meghna Mridul, Prof. S. R. Vij, Manil Agarwal, Loya Palak A, Kasturkar Sanketa S
En Route Ambulance
Deepthi S, Irene Mathew, Irene Sara Jose, Jacinta Jose, R S Divya
A Survey on MANET Attacks and Prevention Schemes
Archie Goel, Vimlesh Kumar
A Review on Types of DC Motors and the Necessity of Starter for Its Speed Regulation
Kriti Shrivastava, Prof M.D Pawar
Chaos Based Image Encryption and Decryption
Apeksha Waghmare, Abhishek Bhagat, Abhishek Surve, Sanuj Kalgutkar
Real-Time Vehicle Cabinet Monitoring and Alarming System Using Switch Case and Step Sequence Algorithm
Makarand Sonawane, Rahul Mandwale, Ganesh Jadhav, Vikas Sanap, Prof. J.Y. Kapadnis
Designing of Real Time Travel Guide
Poonam Sawant, Shweta Pawar, Madhuri Ghuge
Brain Tumor Segmentation and Classification Using Modified FCM and SVM Classifier
Aparna M. Nichat, S. A. Ladhake
Multi-authority ABE over Cloud System
Asmita A. Jagtap, Prof. Sonali Mhatre
Multi Platform Application for Parent and School using GPS tracking
Pranali Kothawade, Savita Tompe, Manasi Walavalkar, Radhika Mirgunde
Detection of diseases on Cotton Leaves in Rural India Using CBIR
Bhagya Shri Mhetre, Reshma Bhosale, Priyanka Kalme, Komal Lodhe, R.M. Samant
QR code Authentication System for confidential (digital Mark sheet) Encrypted data hiding and retrieval (Decryption)
Supriya Chavan, Sujata Gadakh, Gholap Kanchan, Sorte Surabhi , Prof. D. V. Shinkar
Prediction of Facial Key points in Images Using Neural Networks
Manish Bhelande, Aadharsh Krishnan, Akhilesh Bharadwaj, Niraj Palecha, Yash Tawade
V Editor: Online Collaborative IDE
Ritupurna Meha Shahi, Branden Counder , Sowmya Poojary, Yogesh Doulatramani
Detection Mechanism for Black hole attacks in MANET
Anjali P.Rathod, Nekita A. Chavhan
Performance Analysis of Wireless link in Rician Fading Channel
Suryakant Pathak, Himanshu Katiyar
Cloud Data Access with Multi-authorities
Aniket Salunke, Arjun Vekariya, Siddhesh Vartak, Sachin Sonawane
Design of SPI to I2C Bridge for High Speed Data Interfacing in Digital System
Sidra Anam, Vinod Kapse
A Comparative Evaluation of Various MANET Routing Protocols based on Performance Matrices
Vinod Kumar, Sameer Srivastava, Jagdeep Singh
Home Automation and Laptop Control for Quadriplegics
Tigin Varghese, Sachin K John, Santo Simon, Aloshi C Binny, Mr. Agi Joseph George
Personalized Web Search using Machine Learning Technique
Pratiba D, Shobha G, Samrudh J
Research Hotspots in Big Data Technology
Manas Kumar Yogi, K. Chandrasekhar, D. Uma
An Aid for the Hearing Impaired
Nagarjun T R M, Abhilash V Pattan, Akshay Kumar H C, Apoorva Prabhudeva, Veena Karjigi
Study and Literature Survey for Safety Applications: Intelligent Transport System (ITS)
Miss. Pratibha L. Yadav, Prof. Sanjay S. Badhe, Prof. Santosh G. Bari
Pitch and Yaw Angle Control in Under Water Vehicle Using P/PI/PD/PID and LQR Controllers
Bhupendra Kumar, Mrs. Ekta Tamrakar
Study and Literature Survey for Low-Cost Tightly Coupled GPS/INS Integrated system based on Sigma Point Kalman Filter
Mr. Amol M. Kendre, Prof. Dr. Vilas N. Nitnaware, Mrs. Vaishali V. Thorat
Analysis and High Security Data Hiding Technique in Encrypted Image
Umesh M. Umate, Dr. V.N. Nitnaware
Study and Literature Survey for Evidence Collection System for Car
Miss. Ashwini B. Patil, Dr. Suresh D. Shirbahadurkar, Mrs. Vaishali V. Thorat
Design and Fabrication of Low Cost Optical Test Bench for Verification Applications
Lismy Lukose, Sumi Varghese, Tibin Thomas, Ms Indu Reena Varughese
Genetic Algorithm Based Confidential Data Protection in Privacy Preserving Data Mining
Dr. S. Vijayarani, M. Janakiram
An Improved Multipath Routing in Vehicular Environment through Dynamic Node Density
Komal Babbar, Dr. Dinesh Chaudhary
A Survey on Co-extracting Opinion Words and Opinion Reviews Based on the Word Alignment Model
Spoorthy R, Natesh M
Smart Crawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Melisa Vidiera, Janhavi V
A Survey on Cloud-Based Remote Venue Recommendation System
Ms. K. C. Sonawane, Mrs. S. S. Ponde
Review on Energy Efficient Routing Protocol in MANET
Sushant Kumar Choudhary, Vimlesh Kumar
An Authentication Protocol for Managing Dynamic Resources in a Massive Cloud Platform
Suganya .D, Sowmya .S, Ragini .S, Harikrishna Pillutla
A Review on Data Extraction using Web Mining Techniques
Vidya Shree S I, Pooja M R
A Literature Survey of Phishing Attack Technique
Pratik Patil, Prof. P.R. Devale
Fitness Advisor System Using Data Mining
Christy Samuel Raju, Sanchit V Chavan, Karan Pithadia, Shraddha Sankhe, Prof. Sachin Gavhane
Wireless Aptitude Answer PAD
Paresh Joshi, Akshay Gaikwad, Ameya Hirve, Mitali Rane, Mayur Ingale
Diversity Based Genetic Algorithm for Efficient Test Case Selection
S. Usha, A. Ramarajan
Automated Voice Recognized Wheelchair
Sidharth S, Saptha Surendran, Nimmu Ann George, Jose J. Edathala
An Algorithm for Intrusion Detection and Prevention in MANET
Mrunal Gavhale, Pranay D. Saraf
Advanced Hospital Database Management System
Gunjan Yadav, Parth Lad, Parul Pandey, Tejaswi Kolla
Review of 6T SRAM Technique for Reducing Power Consumption and Cost
Manish Shrivastava and Vimal Kishore Yadav
Electronic Hand Glove for Speech Impaired using MATLAB
Nikita Ratnani, Mrs. Manisha Sharma
Ranking and Mapping of Hotels & Restaurants efficient keywords prediction
Prof. Reena mahe, Abhijeet Javlekar, Pratik Dabholakar, Madhav Kantak, Jayesh Dhawase
Synthesis and Simulation of FPGA Based RC4 Encryption Method
Renu M. Sharma, Pallavi Choudhary
Expert System on Coconut Disease Management and Variety Selection
Ani Dath, M.Balakrishnan
A literature review on content based musical instrument recognition
Ms. Vaishali S. Nandedkar
Technique for Fault Identification and Auto Retrieving to Healthy Condition for Transmission Line Network
Ankita gupta, R.M. Potdar
A Survey on Collaborative Privacy Management of Online Photo Sharing
K C Shashwathi, M Natesh
Secured Data Transmission in Cloud Using Trapdoor Encryption
Mrs.M.Anandhi, S.Karthi
An Integrative Approach for Multipurpose USID Framework Using Radio Frequency Identification: Securities and Challenges
Yogesh Pal, Dr. Neeraj Kumar Tiwari, Sujeet N. Mishra
Animatronic
Prof.Mrs.Y.D.Kapse, Miss. Pooja R. Sarangpure, Miss.Jayashree Mohurle
Energy Savings and Improvement Opportunities by Energy Efficient Motors in India
Devangi Jain, Jigar Jain
Wireless Arduino Based Weather Station
Amber Katyal, Ravi Yadav, Manoj Pandey
Interpreting the Public Sentiment Variations on Twitter using a open Source Framework
Adithya Aithal, Varun Pai M, Sriram K L, Ramesh, Sandeep B L
A Graph Data Summarization and Data Visualization Technique
Stibu Stephen, Dr. R. Manicka Chezian
Smart Home Control by using Raspberry Pi & Arduino UNO
Hamid Hussain Hadwan, Y. P. Reddy
Image Processing Segmentation Based Verification of Secured Fingerprint Using Computational Geometry Algorithms
S. Mohan Kumar, A. Saran Kumar, S. Selvaraj, M.G. Sezhiyarasan, Mr. K. Sridharan
A Survey of Peer- to-Peer Networks
Rajesh Kumar Maurya, Prof. Suman Pandey, Vinod Kumar
iTwin Technology
Gole Akshay B, Shaikh Asif M, Assistant Prof. Y.V. Kadam
Color, Shape and Texture feature extraction for Content Based Image Retrieval System: A Study
Miss. Dhanashree S. Kalel, Miss. Pooja M. Pisal, Mr. Ramdas P. Bagawade
Speed Control of DC Motor by using PWM
Khan Masoom Raza, Mohd. Kamil, Pushpendra Kumar
A Brief Study in Noise and Filtering for Dermoscopic Images
D. Saranya, Dr. V. Radha
E&I Connect A Java Application with Database Connectivity
Vikash Kumar, Ronak Kumar, Siwasis Patro
A Survey on Ring Authentication in Multi-Cloud Environment
Harshitha K, Poornima B G
A Combined Approach for Effective Text Mining using Node Clustering
Yogendra Singh Rajput, Priya Saxena
Bus Bunching Avoidance System
Mrityunjaya D H, Pankaj Walvekar, Manoj Awaji
A Survey on Image Embedding In QR Code
Sarita H. Yadav, Prof. N.A. Dawande
Analysis of Secure Data Aggregation Technique for Wireless Sensor Network in the Presence of Adversary Environment based on IF algorithm
Uma Angadi, Dr. G.F Ali Ahammed
Data Mining and Visualization Techniques
Priti Vilasrao Bhagat, Rina Kisanrao Gadge
Rendering Dis-Occlusion by Modified Exemplar Based Inpainting Technique
Surya Pushpakaran, Flower Abraham Mundackal
Automatic Protection of Clothes from Rain
Prabhakar Hegade, Sunil Nayak, Parashuram Alagundi, Kiran M R
Trainable Intelligent Autonomous Vehicular System for Real Time Applications
Pavan Gupta, Prof. P.D Saraf
Pre-Indication of Battery Life for UPS
Nikita Biradar, Trupti Kate, Manisha Kawade, Mrs. S.V. Patil
Design Approach to Realise SoC to Generate Time Stamping Signal from Satellites and Updating on Ethernet for Synchronization
K. Padmanabham, Prabhakar Kanugo, K. Nagabhushan Raju
Color Grid Based Authentication Session Using Hash Technique
Prof. Renuka Nagpure, Harsh Desai, NinaadSuvarna, Dipen Desai, Simranjeet Singh Chawla
Study on Systemization of Fuzzy Logic and Engine using Mining Concept
Harish.R, Gowtham Prassanaa.N, Harshal Golcha, Harikrishna Pillutla
Augmenting QoS in Cloud by Utilizing load balancing algorithm
Prabhu.B , Rohit.V, Vengatesh.R, Vignesh.J, Harikrishna Pillutla
A Survey on Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability
Shruthi L, D Khasim Vali
Comparison of Ontology Ranking Algorithms on Semantic Web
S.Sudha, Lakshmi.S
A Review on MRI Brain segmentation and classification techniques
Shrikrishna A. Gade, Prof. S. D. Sawant
Enhancing Lifetime of Nodes in Wireless Ad Hoc Sensor Network by Preventing Vampire Attack
Sapna Yadav, Nilesh Sambhe, Vikas Palekar
Study and Literature Survey for Brain Tumor Detection and its Area Measurement using Genetic Algorithm Based on K-Means Clustering
Arnavi Patil , Prof. Sanjay S. Badhe, Prof.Ashish Mulajkar
Enhanced Security as a Service to Protect Data in Public Cloud Storage
S. Balamurugan, Dr. S. Sathyanarayana
Asynchronous Checkpointing Algorithms for Wireless Ad-hoc Network: A Simulated Analysis
Jawahar Thakur, Arvind Kalia, L. K. Awasthi
Analysis for Image Quality Improvement using Denoise Filtering Techniques
Pranali Turkhade, Prof. U.W. Hore
Fundamentals of Aerial Robotics & Applications
Utkarsh Sahu, Akshay Chakole, Rajat Vidhate, Pranoy Singh Bandwal, Akshay Dube, Umesh Bobde
Coin Based Solar Mobile Charger Using MATLAB
Ovanalil Jerry Mathews, Praise K James, K G Satheesh Kumar
Android Based LAN Monitoring System
Avinash Sasidharan K, Tushar Nerkar, Kartik Purohit, Harsh Devani, Prof. Amruta Pokhare
Analysis and Comparison of Various Sense Amplifier Topologies for SRAM
Vipul Bhatnagar, Sonali Shrotriya
A Statistical Approach for 3D Hand Gesture Recognition
Venkat Raman B, S Gupta and Mohmmad Akram Pasha
Design and Implementation of FM0/Manchester Encoder using VHDL
D.Durga Prasad, Ch.V.V.S.Srinivas, K.Kiran, A.K.Chaitanya Varma
A Study on Data Mining Approaches for Agricultural Intelligence
V.Kaleeswaran, Dr.R.Rathipriya
The Security Schemes Implemented In Mobile Ad Hoc Networks
D. Sudha, Dr. A. Kathirvel
Cloud Data Security on Cloud Using Geo-Social Attributes
Laxmikant Ashok Bhole, Pratik Kumar Vikas Patil, Rahul Subhash Salve, Pratik Datta Warade, Mrs. M. Shaikh
A Novel Technique for Modification of Images for Deuteranopic Viewers
Jyoti D. Badlani, Prof. C.N. Deshmukh
Vehicle Radiation Monitor
Nilesh Kunte, Shashank Khandve, Tejas Mundhe, P.V. Sontakke
Design and Comparison of Multiplexer using Different Methodologies
Pragati Upadhyay, Vishal Moyal
Detailed Review on Sybil Attack in Vehicular City Environment
Shilpa Goyal, Ms. Nisha Pandey
Comparison and Analysis of Combinational Circuit Using Different Logic Styles
Poonam Dhruwe, Chandrahas Sahu
Digital Watermarking Techniques
Ritu Rawat, Nikita Kaushik, Soumya Tiwari
Secure Unique Identification using Encrypted Storage in NoSQL Database
Anand Shende, Omkar Gurav, Swapnil Shirode, Piyush Govekar, S.N.Zaware
A Prototype of Automated Attendance System Using Image Processing
Prof. Sumita Chandak, Mansi Patange, Himani Deshpande, Saifina Maredia, Prathmesh Bagwe
A Brief Study of Different Feature Detector and Descriptor
Nikita Kaushik, Ritu Rawat, Anshika Bhalla
Efficient Framework for Secure Data Sharing With Key Aggregate Cryptosystem
Pallavi Mathur, Nachiket Mahamuni, Nikhil Gondane, Kaushal Singh
Integrity Constraints for Cloud Auditing Services Using Third Party Services
M. Anantha Lakshmi, Shaik Mahammad Rasheed
Enhanced Approach for Disease Detection and its Prescription
Seema S. Lavhate
Automated Oxygen Level and Blood Pressure Sensing Using Embedded System
Atharva Bhujbal, Archana Chorge, Priyanka Choure, Prof. A. B. Vitekar
Study and Literature Survey for Classification of Cardiac Arrhythmia With Respect to ECG and HRV Signal
Mr. Vyankatesh S. Thorat, Dr. Suresh D. Shirbahadurkar, Mrs. Vaishali V. Thorat
Water pollution detection system using pH and turbidity sensors
Miss. Swati V. Birje, Miss. Trupti Bedkyale, Miss. Chaitali Alwe, Mr. Vivek Adiwarekar
Emergency Service using GPS Tracking
Pavan Wadhe, Rutuja Pandharkar, Rohan Raut, Devansh Modi
Design Wireless Sensor Network System to Power Management and Protect Electrical Pole Transformers by using Zigbee Model and Microcontroller
Muthanna Ali Saihood, K. Lakshmi Bhavani
Smart Load Balancing Algorithm towards Effective Cloud Computing
Vibha M B, Dr.R.RajuGondkar
Application of Association Rule Mining in Risk Analysis for Diabetes Mellitus
Umang Soni, Sushma Behara, Karthik Unni Krishnan, Ramniwas Kumar
A Survey on Machine Learning Algorithms in Data Mining for Prediction of Heart Disease
V.A. Kanimozhi, Dr. T. Karthikeyan
A Voltage-Controlled DSTATCOM for Power-Quality Improvement
N.Rajesh Kumar Gowd, C.Mohankrishna, M.MD.Sayeedi Baig
Typed Character Recognition using ANN
Arindam Saha, Nitupon Talukdar
Penetration Testing: Attacking Oneself to Enhance Security
Gurline Kaur, Gurpreet Kaur
Image forgery localization using fine grained analysis of CFA artifacts
Biju V G, Anu S Nair, Chandni S, Ijas Ahammad M, Sravya N, Vivek T D
A survey on Image Processing Techniques used for Detection of leukemic Cells
N.Poornima, Dr.T.Karthikeyan
An Effective Review on Relaying In LTE-Advanced and WiMAX Networks
Priyanka Rani, Ms. Renu Singla
Image compression Based on Uniform Thresholding and Fixed Point Binary Scaling
D. Gowri Sankar Reddy, V.C. Veera Reddy
Real Time Monitoring and Control of Multi Sensor Using GSM Techniques in Embedded System
T. Murugan, Azha. Periasamy
Secret Sharing Scheme using Cryptographic Techniques
Pratiksha Patil, Nilesh Javre, Priyanka Patil, Sarang Deshpande
Construction of FIR Filter Using Modified Genetic Algorithm
Shashank Srivastava, Ashish Gupta
Android Blood Bank
Prof. Snigdha, Varsha Anabhavane, Pratiksha lokhande, Siddhi Kasar, Pranita More
Biometric Techniques Using Neural Networks
Divya Pirale, Manisha Nirgude
Bandwidth Aware Vm Migration Policy in Cloud Data Centers
Hetal Bhadja, Jigneshkumar Lakhani
Adaptive Spectrum Sensing for Very Low SNR in Cognitive Radio Networks
Dudekula Gireesh, Prashant K Shah
E-Notifier: Transport Information Services in Colleges and Exploring Mobile Notification
Chaugule Varsha Dattatray, Chavan Prajkta Pandurang, Deshmukh Akanksha Kishor, Pandore Yogesh Bandopant
Approaches for Securing Email Authentication Process – A Review
Shananda Dey, Ms. Jharna Chopra
Coplanar Capacitive Coupled Probe Fed Microstrip Antenna For C and X band
Ms. Yogita Shirdale, Mr. K. S. Kazi
Smart Ration Card System Using Raspberry-pi
Kumbhar Aakanksha, Kumavat Sukanya, Lonkar Madhuri, Mrs. A.S. Pawar
Assistive clothing Pattern Recognition for Impaired people
Thogaricheti Ashwini, Mrs. Anuradha.S.G
Rapidity and authenticity augmentation using adaptive beamforming procedure for smart antenna systems
Mr.A.Suban, Mr.V.Karthick, D.Nagasuganthi, N.R.Sakila
A Framework for Sharing Computations and Data Stores for Big Data Applications within and Across Organizations
Amandeep Gupta, Pritish Mukherjee, Anuj Mahajan, Vishal Pandey
Two Server Authentication using Shared Key Cryptography
Arati Sonawane, Ashwini Patil, Kuntal Bhangale
New Generations Smart Health Care System
Nupoor Awsarmol, S.A. Shaikh
ICA: Internal Control and Audit
Shubham Shashikant Shinde, Amit Sarjerao Ugale, Sanket Dilip Dayama,Vishal Ashok Thube
Fully Automated Artifact Removal for BCI
Mr.Veeresh Patil, Mrs. Chetana Srinivas
Analyzing Multipath Routing Protocol in Ad Hoc Networks
Sangeeta Singh, Swati Atri
Two Way Security Mechanism for Sybil Attack in Social Network
Rucha Patil, Tejashree Wani, Gunjan Bonde, Chetana Chopde
Ubiquitous Car Monitoring System
Sneha Pisey, Kalpita Kunte, Akash Sangle, Aditya Rathor, Vrushabh Sonigara
SGR Protocol Implementation for Detection and Prevention of Black hole Attack in MANET
Nithya J, Shabana Sultana
A Review: Histogram Equalization Algorithms for Image Enhancement using FPGA
Miss. Sukanya V. Aher, Mrs. S. S. Vasekar
Image Dehazing Techniques: A Review of Research Trends
Ms. Titiksha N. Bhusari, Mrs. S. S. Vasekar
Augmented Reality: Analysis and Challenges in Interaction Techniques
R. Kugan, M. Balachandar, R.S. Ram Priya
MIA-My Intelligent Assistant
Er. Sheeba Babu, Akhil S Nair, Akhil S R, Allan Abraham and Ashish Anil Abraham
Low cost language recognition system
Prachi Pise, Prof Sunita Deshmukh
Design and Analysis of a tuned circular patch antenna for satellite communication application in C band
Anurima Majumdar, Antara Ghosal, Sisir k Das, Annapurna Das
Speech and Palm Recognitions: A Review
Er. Akanksha Sambyal, Shailza Thakur
Efficient Packet Matching for Packet Filtering Firewall
Prof. Pragati M. Choudhari
FRAppE: Identifying Malicious Facebook Application
Urvashi Yadav, Khushi Kumari, Rohini Lokare, Suhasini Borge, Prof. D.V. Shinkar
A Clustering Based System for Diversifying WSRec Results
Ms. Apurwa Atre, Ms. Nayan Kamble, Ms. Vineeta Bisht, Mr. Tejas Mamarde
ICA: Concept and Implementation of Internal Control and Audit
Shubham Shashikant Shinde, Amit Sarjerao Ugale, Sanket Dilip Dayama,Vishal Ashok Thube
A Comparative Study of Stability of Fixed Point State – Space Digital Filters using Saturation Arithmetic
Shiva Jaiswal, Pritee Verma
Cluster Analysis of Satellite (LISS-III) Images of Earth surface
Anita Dixit, Nagaratna Hegde, P.S. Hiremath
Vehicular Ad-Hoc Network and Wireless Power Transfer for Vehicles
Manish Kumar, Nidhi Prakash, Prachi, Sarim Qais, Anitha Suresh
MINDEX_IB: A Feature Selection method for Imbalanced Dataset
Hemlata Pant, Dr. Reena Srivastava
Comparison of ARIMA and Artificial Neural Network Models for Forecasting Indian Gold Prices
Parminder Kaur
Document Clustering Analysis Based on Hybrid Clustering Algorithm
Neha Garg, R.K. Gupta
A Review on Weight Based Clustering Algorithms in Wireless Sensor Networks
Pooja Mishra, Sanjiv Sharma
Transfer of NOR Flash Instructions through Serial Peripheral Interface Bus
Laxmi, Dr. Yogish H K
An Outsourced Key Revocation Technique for Secret key Management in Decentralized Identity Based Encryption Scheme
Sahana Govindappa, K.R. Shylaja
Automatic SnailPest Detection and Soil Parameter Measurement Using Zigbee Network
Haresh D Karangia, Prof. Nilesh Desai
Cell Phone Accident Preventer to Eliminate the Risk of Accidents during Driving
S. Kanakaraj, C. Kamalanathan, S. Valarmathy
Automation of Interventional Analysis in Physiological Variability Using Data Mining: A Review
Sunila Godara, Shagun Goyal
Survey on Content Based Image Retrieval Techniques
Payal dhiman, Yamini sood
Biomedical Image brightness preservation and segmentation technique using CLAHE and Wiener filtering
Miss. Priya S. Patil, Prof. P. P. Pawade
Train to Train Communication using Wireless Network
Sandhya . A, Sajal Mandal, Rajat Chandak and Mounik Patel
Remote HealthCare Monitoring System Using Arduino Board over Distributed Ubiquitous Environment
Sowmya G, Sandeep B L
Efficient Single/Concurrent Failure Detection for Mapreduce Application in Heterogeneous Node
Akshya Ramesh, Akshaya S, Beaula K.A, M P Geetha
Reduction of Migration Cost in Cloud Applications
Korimani Radha, Vasudev S Shahapur
BLE (Bluetooth Low Energy)-based Safety System for School Bus Network
Akkhilaysh Kushal Shetty, Harshad Shinde, Ashwath Kumar Salimath, Ankit Verma
Effect of Four Wave Mixing at different Channel Allocation Schemes for DWDM Communication System
Prithipal Singh, Satbir Singh
Number Plate Detection of Moving Vehicle by Image Processing
Prof. C. P. Shinde, Prof. P. V. Lokhande, Prof. Harsha C. J, Prof. S. S. Matsager
Cell Phone Operated Mobile Bug Using Microcontroller
Sarvar Begum, Ramya Shree G. R., Swetha T. S., Vasanthi. K
Plagiar: Plagiarism Detection using Tool for Text Document and Source Code
Teja I, Smitha Shekar B
Reconfigurable Finite Impulse Response Interpolation Filter Using BCSE Algorithm
Bagadi Madhavi, A.Nagamalli
An Enhanced Approach of Encrypting Audio Segments Using OFDM
Miss. Ashwini A. Varhekar, Prof. A. B. Gadicha
Voice Browser
Aishwarya Chitanvis, Ankita Joshi, Bhumik Dedhia , Prof. Grishma Sharma
A Methodology for Detecting/Identifying Fruit Infection with Grading System
Miss. Neha D. Ghatole, Prof. A.B.Gadicha
Application of Secure Multiparty Computation in Privacy Preserving Data Mining
Karan Saxena, Saurabh Satpute, Aditya Gupta, Varun G
Knowledge Discovery from Social Media Data for Education Enhancement
Ms. Neelam Borde, Ms. Neha Dubey, Ms. Aakankshi
Underwater Image Denoising and Enhancement using Multiscale Product Thresholding and Weber’s Law
Miss. Rutika S. Ingole, Prof. C. J. Shelke
The complex and choosing countermeasure in virtual Network Systems
Vijay Kumar, Sata Nand, Lekh Raj
Digital Image Defogging Using Dark Channel Prior and Histogram Stretching Method
Miss. Radhika P.Yawale , Prof. A. S. Kapse
Computer Based-Medical Decision Support System for Prediction of Heart Attack Using Data Mining Techniques
Priyanka N, Dr.Pushpa RaviKumar
Review Paper on Object Analyzer and its Application
Mr. Bagade Pratik Ramkrishna, Prof. S.N. Jain
A Review on Channel Estimator With Leakage Nulling
Ms. Deepali S.Pawar, Prof. Pallavi H. Patil, Prof. C.S. Patil
Survey on Blocking Probability and Load Balancing Over WDM Networks in MPLS System
Shivani Sharma, Chandni Thakur
Comparison of Colour Image Discriminant and Fisher Linear Discriminant Algorithms
Mrs.Dipti Pratik Pandit
XMQAS – An Ontology Based Medical Question Answering System
Midhunlal M, Gopika Mangalassery
Data Storage and Retrieval using Multiple Cloud Interfaces
Ms. Prathyakshini, Mrs. Ankitha K
Enhancement Process for Detection of Infected Region
Radhika M. Kokate, Prof Vijaya K. Shandilya, Dr. S. A. Ladhake
A Review of Adaptive Thresholding Techniques for Vehicle Number Plate Recognition
Sakhare Varsha Dnyandeo, Prof. Mrs. R.S. Nipanikar
Gateway Discovery and Gateway Selection Schemes for Connecting MANET and Internet: A Review
Jay Prakash, Ritu Verma
Question Answer Based Software Recommender System
Ankit A. Haware, Apurva A. Jadhav, Maithily S. Pande
Systematic Review of Security Issues for Cloud Computing
Sangeetha G, Divya V K
Maintainability Evaluation of Object Oriented Software: A Systematic Review
Nidhi Goyal, Dr. Reena Srivastava
Detection of Lung Cancer Using Backpropagation Neural Networks and Genetic Algorithm
Mr. Akshay Jadhav, Ms. Jennifer D’Cruz, Mr. Virendra Chavan, Ms. Ashvini Dighe, Prof. Jayashree Chaudhari
Rapid Revision Software Development Life Cycle Model (RR-SDLC Model 2016) Based on Concept of Reusability of Software
Mukesh Chauhan, Jawahar Thakur
Effective Architecture of Packet Classification on FPGA
Ms. Kranti M.Hande, Prof.V.R.Wadhankar, Prof.D.S.Dabhade
Offers to Grasp –Android Application to Compare Local Stores
Veena A Kumar, Ananthu B, Midhun R Kurup, Nakendra Kumar, Sandra Susan Shaji, Teddy Zachariah
Railway Track Monitoring and Accident Avoidance Using Smart Sensor Network
Prof. Anap S.D, Ronge Prasanna L, Bhalerao Lalit P, Dharme Sandip P
A Fast 16×16 Vedic Multiplier Using Carry Select Adder on FPGA
Shiksha Pandey, Deepak Kumar
Visible Light Communication Based Data Transfer System
Pious Joseph, Sangeeth Shajan, Sharon Paul, Binu Mathew
Efficient Energy and Data security in Wireless Sensor Networks
R. Jegan, Mr. S. Venkatesh ME (CSE)
Real Time Tomato Ripening Stage Identification System
Manasi G. Bharambe, Jigar J. Lodha, Pratiksha P. Kor
Dual Band Microstrip Antenna for Mobile Hand Set
Antara Ghosal, Anurima Majumdar, Sisir Kumar Das and Annapurna Das
Intelligent Autonomous Farming Robot with Plant Disease Detection using Image Processing
D. A. Shaikh, Ghorale Akshay G., Chaudhari Prashant A., Kale Parmeshwar L.
Development of Wireless Sensor Network as an Application in Aerostats
Vimal Kishore Yadav
Big Data and Big Data Analytics using Knowledge Discovery Framework in Healthcare System
Sunita Kanadikar, Hemanth Kumar N P
Spectrum Handoff in Cognitive Radio Network
Kumud Tiwari, Ashutosh Rastogi
Software Testability in Requirement Phase: A Review
Mohammad Zunnun Khan, M.Akheela Khanam, M.H.Khan
Analytical Study of Multipliers for High Speed Applications
Amit A. Bhutada, Prof. Sanjay L. Haridas, Prof. Sanjay Tembhurne
A New Approach of Cryptographic Technique using RSA & ECC
Vaibhav V. Bhujade, Deepak Chaudhary
A Review on Integration of Cloud Computing and Internet of Things
Isna khan, Prof S.D. Sawant
An Exploration on Existing Methods for Data Aggregation in Wireless Sensor Network
Ajmer Singh Dhakad, Sanjiv Sharma
Speech Recognition for Vietnamese: A Literature Review
Le Minh Tri, Do Dinh Thanh
Design of Multiband Microstrip Antenna for Bluetooth, UWB, X-band and Ku band Applications
Jyoti Kapil, Ruchi
A Review: Strategies to Control Collision in Vehicular System
Swati Jambhulkar, Abhijit Titarmare
A Survey – Cloud Computing
Ms. Shubhangi Ashok Kolte, Prof. P E Ajmire
A Survey on Sentimental Analysis in Different Indian Dialects
Shankar R, Shilpa K.M, Sridhar Patil, Suma Swamy
A Pull Based Method for Maintaining Cache Consistency in Wireless Mobile Networks
T.Jeevanantham, C. Suresh Kumar
Efficient Resource Provisioning for Online Gaming Applications in Cloud Computing Environment
Mrs. C. Usharani, Mr. M. Praveen Kumar
A Comparative Study of Different Neural Networks Learning Algorithms for Forecasting Indian Gold Prices
Parminder Kaur
A Critical Review of Data Mining Techniques in Weather Forecasting
Sara khan, Mohd Muqeem, Nashra Javed
Review on Green Computing: The next movement in computing
Navjot Kaur, Gagandeep Singh
Cost Effective Knowledge Based Quality And Value Data Extraction From linical Healthcare Data
Mr.Vishnu S Basuthkar, Mrs. Chetana Srinivas
A Review on Mining Students’ Data for Performance Prediction
Ms. Kavyashree K R, Mrs. Lakshmi Durga
Fusion Based Strategies to Combine Hazy Images into Single Image
Prof. Sonali A. Patil, Anuradha Badgujar, Nikita Borade, Shikha Yadav
A Comprehensive Study and Review on Wireless Sensor Networks, Based on Heterogeneous Energy Distribution & Multizone Algorithm
Amita Singh, Archana Yadav, Saima Beg, S. Hasan Saeed
Storing & Retrieval of Encrypted Binary Data to &From Cloud Storage with Android Application
Gunjan Pathekar, Dr. Kalyani.A.Akant
Data Mining with Big Data and Privacy Preservation
Akshaya Tupe, Amrit Priyadarshi
A Comparative Analysis of Variable Partitioned Adder
Nidhi J. Chandak, Prof. G.A. Morankar
Super Resolution-Based Inpainting
Vaishnavi Pawar, Shubhada Patrawaley, Ashwini Dolare and T.R.Patil
Comparative Analysis of Various Techniques Based on Leukemia Detection
Inderjeet kaur, Jyoti Rani
An Efficient & Sclable Framework to Reduce Cost of Operation using Vitality Utilization Improvement in Cloud Computing
Banashankari, Mr. Chandan Raj. B. R
A Privacy Preserving K-Nearest Neighbor Classification Protocol Over Secure Encrypted Data
Dr. V. Selvi, K. Rajalakshmi
Multi Owner Data Sharing and Outsourced Revocation Using Identity Based Encryption on Cloud
K. Kowsalya, M. Jose Ramya, V. Ramesh
Iris Recognition Based on Extreme Point Identification using Feature Extraction
Pournima Ghanmode, Snehal Mahajan, Pragati Ghodake, Babita Sonare
Authorship Attribution of Messages
Aneri R. Oza, Kajal K. Ladkat, Mrunalini V. Bhosale, Pranjali M. Marne, Dr. Rajesh S. Prasad
Machine Learning Techniques for Fake Profiles Classification in Online Social Network
Latha P, Dr. M.V. Vijaykumar
A Survey on Intrusion Detection System for DDoS Attack in MANET
Nshunguye Justin, Nitin. R. Gavai
A Framework for Evaluating the Best Achievable Performance by Distributed Lifetime-Efficient Routing Schemes in Wireless Sensor Networks
Divyashree K S, K.R Rekha
Abstract
Hybrid Email Spam Detection Method Using Negative Selection and Genetic Algorithms
Mohammad Reza Abdolahnezhad, Touraj Banirostam
DOI: 10.17148/IJARCCE.2016.5401
Abstract: In this paper, a new model was proposed to cope with the trend of email spam that improves the generation of a detector in the improved and standard negative selection algorithm (NSA) with the use of stochastic distribution to model the data point using genetic algorithms. The theoretical analysis and the experimental result show that the performance of proposed method is higher than the improved and standard NSA, which the accuracy of the proposed model is 91.90%, while the improved NSA model is 85.27%, and the standard NSA model is 62.75%.
Keywords: Negative selection algorithm, genetic algorithm, spam email, spam detectors generation.
Abstract
Antismuggling System for Trees in Forest using Flex Sensor with GSM & Zigbee Network
Prof. Mhaske D.A, Bhabad Vishnu S, Pathare Sagar A
DOI: 10.17148/IJARCCE.2016.5402
Abstract: From many years we are getting news about smuggling of the trees such as sandal, Sagwan etc. These trees are very expensive and less obtainable in the market. To avoid such type of smuggling and to save the forests around the globe some preventive systems need to be developed. We are forming a system which can be used to restrict this smuggling. The suggested system will consist of two modules which are described below, 1) Tree Unit 2) Main Server Unit (base station). ]Every tree having one small electronics division which consists of ARM 7, 3 Sensors and Zigbee module. There will be one area selected. The data of different tree units can be collected by this units. The each tree unit will give the information to base station using GSM module. At main server GUI using one authorized person whom received the message and he will taking action to provide security. This data can be used by concern forest authorities to take preventive action.
Keywords: ARM 7 Processor, Flex sensor, Temperature sensor, Accelerometer sensor, ZIGBEE and GSM Module.
Abstract
Palm Print Feature Extraction and Authentication Using 2-D Gabor Filter
Prof. Arjun Nichal, Ms. Supriya Jadhav, Ms. Karishma Shikalgar, Ms. Poonam Maharnur
DOI: 10.17148/IJARCCE.2016.5403
Abstract: A new technique of biometric technology is palm print identification which is based on feature extraction from palm used for personal identification. In this paper the feature extraction are carried out by using technique of texture based feature extraction. For low quality images powerful feature extraction method is necessary. So, 2D Gabor filter used to get texture information. This is very useful and advantageous technique for security purpose.
Keywords: Palm print, Authentication, Gabor, Feature Extraction.
Abstract
Iris Database Compression Using Haar Wavelet Decomposition and Huffman Coding
Alphones Maria, Amlu Anna Joshy, Aneeta Christopher, Anjali B, Ranjitha Rajan
DOI: 10.17148/IJARCCE.2016.5404
Abstract: Iris recognition system for identity authentication and verification is one of the most precise and accepted biometrics in the world. The need for portable iris system has been increasing more rapidly which demands efficient compression techniques for its transmission through a narrow-bandwidth communication channel. In spite of rapid progress in mass storage density and processor speeds, this demand continues. This paper has investigated the effects of iris image compression based on Haar Wavelet Decomposition and subsequent Huffman Coding. The results have been examined in terms of Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Compression Ratio (CR). It has been found that Huffman Coding transform is an effective lossless image compression technique, as recognition performance is minimally affected and the use of Haar transform is well suited. The matching stage is implemented using Euclidean distance calculation and CASIA iris database has been used for the study.
Keywords: Iris recognition; Image compression and decomposition; Haar wavelet transform; Huffman coding; Peak signal to noise ratio
Abstract
Moving Circular Range Queries on The Static Data Objects in Location Based Advertising Application
Yogita V. Salvi, Dr. V.R. Ghorpade
DOI: 10.17148/IJARCCE.2016.5405
Abstract: As the number of mobile devices is growing tremendously, mobile query processing has become a challenging application. One of the important type of mobile queries is range query, is to retrieve surrounding objects of interest. The range queries considered here are moving range queries, as the mobile is changing its location continuously. Due to change in location the moving range queries are difficult for processing and the former results become irrelevant. The concept of safe region is introduced which is an area where the results of range query on the mobile device do not change. Whenever the query leaves the safe region then only the query is re-evaluated. Moving range queries are used in different applications like friend finder, alerts of traffic congestion etc. Mobile advertising is one of the applications that allow an advertiser to promote products or services to targeted customer efficiently. In the proposed location based advertising application, the mobile client gets offers or coupons from the merchants which are in radius of its GPS location. Using concept of safe region, it will reduce the cost of communication and of data transfer as recomputation is not required. This application is based on the continuous monitoring of moving circular range queries over static data objects, where the queries are constantly moving and the data objects do not move.
Keywords: GPS, location based services, mobile advertising, moving range query, safe region.
Abstract
Novel Approach for Surface Simulation -Virtual Reality
Kiran Kulkarni, Aditya Parvathi, Manoj Manvi
DOI: 10.17148/IJARCCE.2016.5406
Abstract: Haptics is one of the most trending technologies in the world as per the famous GARTNER 2014-15 predictions. This makes it one of the leading technologies to be focused on in the field Engineering and Research studies and robotic applications. It Deals with the simulation of real-world experience using concepts such as augmented reality, virtual reality and mixed reality. This technology provides the user a force, sense and touch feedback. The proposed work aims at perceiving and simulating different surfaces or textures and further providing real-time experience of virtual objects or surfaces allowing the blind users to visualize and sense their surroundings much like bats or dolphins. The proposed work involves building of two devices namely Hand module and Puck scanner, one measures the response of surface with respect to the human interaction, different amount of pressures are applied and wide ranging responses are obtained which are stored in the database and later produces the virtual feel of the same using object recognition involving feature extraction and feature matching process, the module is programmed such that typical frequencies are generated for different pixel values of the matched image and thus giving different vibrations through actuators creating virtual effect of the captured surface.
Keywords: FSR, Augmented reality, Haptics, Feature extraction, Virtual reality.
Abstract
Fake Currency Detection Using LabVIEW
Ajay Antoney, Ann Merin Georgi, Ashish Roy, Aswani M, Mathew George
DOI: 10.17148/IJARCCE.2016.5407
Abstract: The growing menace of counterfeit currency is very evident from newspaper reports of fake currency notes being seized appear every day. The advancements in the field of computers, photocopiers and scanners have made the process of duplicating currency note a simple task. The unsuspecting masses have no mechanism of differentiating the fake note from the genuine. The main objective of this project is fake currency detection using LabVIEW. This process can be automated in a computer using NI-IMAQ. The basic logic is developed using Image Acquisition-Laboratory Virtual Instrument Engineering Workbench (IMAQ-LabVIEW). The images of the original currencies are fed to the IMAQ database. Finally the features of the note to be tested are compared with the dataset formed from the original image and finds out whether it is fake or original. In terms of accuracy, reliability and automation, the above mentioned method of counterfeit detection is far more superior to those which already exist.
Keywords: NI-IMAQ, LabVIEW, Edge detection and ROI.
Abstract
A Review: Implementation of Intelligent Features in Vehicle using CAN Protocol
Nilesh Gaikwad, Dr. S.D. Markande
DOI: 10.17148/IJARCCE.2016.5408
Abstract: Automotive electronics sector is dominant in vehicle automation. To automate different features in vehicle, there are several Electronic Control Units (ECUs). To link up these ECUs there are traditionally used point to point communication which causes to increase in wiring harness. So data transmission is not efficient. To overcome this drawback, Controller Area Network protocol widely used. This CAN protocol implemented through CAN integrated PIC controller ICs. The propose system aims to develop board which contain multiple interface facility which become compact in size and cost. In the proposed system, two UART and CAN bus interface on single board. This reduces the drawback of traditionally used approaches for vehicle automation.
Keywords: CAN (Controller Area Network), ECU, PIC Controller, Point to point communication, Rain sensor.
Abstract
Intelligent Bus Information System and Blind Assistance
Dennis Dcruz, Josna Joseph, Jobin Chacko Jacob, Delvin C Varghese, Adharsh Kumar C, Shinto Sebastian
DOI: 10.17148/IJARCCE.2016.5409
Abstract: Due to the non-availability of prior information about the bus arrival schedule, people have to wait for longer periods at the bus stops, especially during office hours in order to reach on time. Also, bus station follows fixed schedules and routines, and don�t make use of intelligent systems for vehicle tracking and control. Administrators deployed at the station prepare the trip sheets containing the schedules and announce it manually which are time consuming, tedious and inaccurate. This Paper is to make transport much convenient for individuals who commute daily using the public bus transport of the city, for effective time management and making it trouble-free, not just for the commuters but the Transport Department to create an efficient public transport system. Our system using GSM and RFID technology provides a cost effective, simple solution and help people in getting the arrival time of the bus. Automatic announcement system in the bus stand announces the name of the bus and destination, while the bus enters the stand. At the same time the arrival time of that bus in the next stand send via GSM and displayed there. A bus detection mechanism for the blind in travelling from one place to another is also incorporated, in order to get their transportation independently. The blind can hear the name and destination using headphone, when the bus comes nearby.
Keywords: GSM, RFID, Announcement system, Bus detection mechanism.
Abstract
Survey of Security of ATM Machine
Prachi More, Dr. S.D. Markande
DOI: 10.17148/IJARCCE.2016.5410
Abstract: Nowadays banking sector is one of the most important parts of a human day to day life. Banking facilities are widely used by people for their economies activities. Automatic Teller Machine (ATM) is an electronic machine which is used for accessing a bank account from anywhere without the help of bank staff. The user can perform several banking activities like cash withdrawal, money transfer with the help of ATM. It is observed that the numbers of crime related to ATM increased hence need to provide better security to ATM machine. There are different technologies which are used to provide security to ATM machine which include � Biometric technology, RFID technology etc. Biometric technology includes fingerprint and face recognition system. In this paper survey of different technologies for ATM security is presented. In these technologies, there are some limitations. By comparing various technologies which are used for ATM security it observes that fingerprint technology appears better and more secure than other technologies.
Keywords: ATM system, RFID technology, GSM technology, Biometric technology.
Abstract
Efficient Binarization of Degraded Document Image
Prof. Kiran Patil, Ms. Surya Pushparajan, Ms. Joshi Amruta, Ms. Suryavanshi Purnima, Ms. Shaikh Afrin
DOI: 10.17148/IJARCCE.2016.5411
Abstract: Image binarization is the method of separation of pixel values into dual collections, black as background and white as foreground. Thresholding has found to be a well-known technique used for binarization of document images. Thresholding is further divide into the global and local thresholding technique. In document with uniform contrast delivery of background and foreground, global thresholding is has found to be best technique. In degraded documents, where extensive background noise or difference in contrast and brightness exists i.e. there exists many pixels that cannot be effortlessly categorized as foreground or background. In such cases, local thresholding has significant over available techniques. The main objective of this paper is to evaluate the different image binarization techniques to find the gaps in existing techniques.
Keywords: Binarization; local thresholding; global thresholding; binary image.
Abstract
Financial Stock Price Forecast Using Classification
Dr. Swapna Borde, Austrin F. Dabre, Harsh M. Kamdar, Rahul Y. Purohit
DOI: 10.17148/IJARCCE.2016.5412
Abstract: Data mining and predictive technologies developed using computer automated programs do a fair amount of trade in the market. Historic data holds the essential memory for predicting the future direction, is a well-founded theory about data mining. One way of predicting if future stocks prices will increase or decrease is Data Analysis. This technology is designed to help investors discover hidden patterns from the historic data that have probable predictive capability in their investment decisions. A challenging task of financial time series prediction is the prediction of the pricess of financial stock markets. Five methods of analyzing stocks were combined to predict if the day�s closing price would increase or decrease. These methods were Typical Price (TP), Bollinger Bands, Relative Strength Index (RSI), CMI and Moving Average (MA). This paper discussed various techniques which are able to predict with future closing stock price will increase or decrease better than level of significance. Also, it investigated various global events and their issues predicting on stock markets. It supports numerically and graphically.
Keywords: Data mining, Data analysis, TP, RSI, CMI, MA.
Abstract
Log analytics using ELK stack on Cloud platform
Sunny Advani, Meghna Mridul, Prof. S. R. Vij, Manil Agarwal, Loya Palak A, Kasturkar Sanketa S
DOI: 10.17148/IJARCCE.2016.5413
Abstract: Log analytics using ELK stack is an implementation of Logstash for extracting and indexing, Elasticsearch for searching and kibana for visualizing which are combined together to perform operation on logs. Elasticsearch is a Lucene based search server. Elasticsearch provides a distributed, multitenant-capable full-text search engine. Logstash tool to collect, index, and forward events and log messages. Kibana is used to represent the data in a graphical and statistical way. In this system we use the logs from Elastic Load Balancer, a service of Amazon Web Servers with the help of Logstash. Then these logs are indexed via logstash and represented through Kibana.These logs are properly formatted and ready for information retrieval. Thus,a system admin can check the behaviour of the whole server or a particular component by going through the logs and analyzing the system status. This will help in identifying the fallback of the server and the system administrator can take necessary actions to resolve the problems if any.
Keywords: Lucene, Amazon Web Servers, Elastic search, logstash, kibana.
Abstract
En Route Ambulance
Deepthi S, Irene Mathew, Irene Sara Jose, Jacinta Jose, R S Divya
DOI: 10.17148/IJARCCE.2016.5414
Abstract: Due to the enormous growth in the number of vehicles, traffic density in cities is increasing day by day. So when it comes to the case of an ambulance, the chances for it to get stuck in traffic blocks are very high. Such situations can even cause death if the victim is in a critical stage. The delay in reaching of the ambulance to the accident location and the traffic blocks in between accident location and hospital increases the chance of death of the victim. This calls for the need of introducing a system to reduce the loss of life due to the delay in reaching the hospital. Our project considers optimal transport routes of ambulances which minimize the transport duration to a hospital. PIC microcontroller, GPS, GSM, RF ID, ZIGBEE are the major components used. Our project is mainly concerned in that area where, when an ambulance approaches the traffic signal, it will be cleared automatically, that is the signal will turn green with respect to the arrival of the ambulance. Here we are using an RF ID for detecting the ambulance. The project mainly consists of two sections; an ambulance section and traffic section. GPS module is used to determine the current location of the ambulance. GSM is used for sending message to the hospital informing that the ambulance is on the way.
Keywords: Global Positioning System (GPS), Global System for Mobile Communication (GSM), Radio Frequency ID (RF ID), ZIGBEE, Traffic section, Ambulance section.
Abstract
A Survey on MANET Attacks and Prevention Schemes
Archie Goel, Vimlesh Kumar
DOI: 10.17148/IJARCCE.2016.5415
Abstract: Mobile Ad hoc Network (MANET), a wireless network is mainly deployed over a restricted or remote area. The decentralized, self-organized & infrastructure-less design make them more susceptible to various security hazards. One of them is malignant node or selfish node attack. In this paper, a survey is done on several techniques to lessen these attacks by making network more secure and enhancing the overall performance of the network.
Keywords: MANET, survey, security services, attacks, defense mechanisms.
Abstract
A Review on Types of DC Motors and the Necessity of Starter for Its Speed Regulation
Kriti Shrivastava, Prof M.D Pawar
DOI: 10.17148/IJARCCE.2016.5416
Abstract: The speed of any motor has to be increased from zero and should be brought to the operating speed, this is called as starting of a motor. DC motors speed can be controlled over wide range either by changing the voltage or by changing strength of current in its winding. Initially DC motors were powered by existing direct current power distribution system so these motors were the first to be widely used. A DC motor is a self starting motor, yet certain external methods are used for starting DC motor. This paper gives the study of different types of DC motors and the need of an external starter for these DC motors.
Keywords: DC Motors, Speed Regulation, Armature, Field winding.
Abstract
Chaos Based Image Encryption and Decryption
Apeksha Waghmare, Abhishek Bhagat, Abhishek Surve, Sanuj Kalgutkar
DOI: 10.17148/IJARCCE.2016.5417
Abstract: In recent years, owing to frequent flow of digital images across the world over the transmission media, it has become essential to secure them from leakages. Due to the exceptionally desirable properties of mixing, sensitivity to initial conditions and parameters of chaotic maps; chaos-based encryption has recommended a new and efficient way to deal with the problem of fast and highly secure image encryption. The implemented image encryption scheme consists of an 80-bit secret key and uses chaotic map like Arnold Cat-Map and Logistic Map. The initial conditions for the chaotic maps are derived using the 80-bit secret key. In this cryptosystem, permutation-diffusion architecture followed by an efficient diffusion scheme is implemented. This scheme consists of two diffusion procedures, with a supplementary diffusion procedure padded after the normal diffusion. In the supplementary diffusion module, the control parameter of the selected chaotic map is altered by the resultant image produced after the normal diffusion operation. As a result, a slight difference in the plain image can be transferred to the chaotic iteration and bring about distinct key streams, and hence totally different cipher images will be produced. Therefore, this scheme can remarkably accelerate the diffusion effect of the cryptosystem and effectively resist differential attacks. Our project objective is to provide high level of security and satisfactory encryption speed for practical secure image applications.
Keywords: Arnold Cat- Map, Logistic Map, Chaotic map, Cipher, Permutation, Diffusion.
Abstract
Real-Time Vehicle Cabinet Monitoring and Alarming System Using Switch Case and Step Sequence Algorithm
Makarand Sonawane, Rahul Mandwale, Ganesh Jadhav, Vikas Sanap, Prof. J.Y. Kapadnis
DOI: 10.17148/IJARCCE.2016.5418
Abstract: Millions of people worldwide do it. Many say �What�s the harm, they got home safely and no one was hurt?� Just because they made it home safely that does not mean that they're making a right decision. When putting those keys in the ignition and driving away after drinking people are not only putting their life at risk but they are risking the lives of all those they come across while driving. In this paper we are presenting the solution to avoid drink and drive situation by using the embedded system for early detection smoke and alcohol in driver�s breath, and providing mechanism to report the driving under the intoxication.
Keywords: cabinet monitoring, step sequence.
Abstract
Designing of Real Time Travel Guide
Poonam Sawant, Shweta Pawar, Madhuri Ghuge
DOI: 10.17148/IJARCCE.2016.5419
Abstract: As a navigation tool, GPS can be used to guide a person towards the desired location. The trick is to combine data obtained from the GPS coordinates with a digital map. Real-Time Travel Guide provides temporal guidance according to the schedule. The internet is more and more emerging as a handy tool of traveling for the tourist industry. It presents a perfect platform that brings products and services to the customer. In most cases, it is not satisfying to find a nice hotel without a reference to restaurants, sights or event locations located nearby. The study presented in this paper starts from the user needs, to present the tourism object in geographic context on interactive tourist maps supports planning for tourism, focusing on the analysis, decisions making and management using GIS technique and presenting the results on the internet.
Keywords: GPS, Real-Time Travel Guide, GCM, GIS Technique,
Abstract
Brain Tumor Segmentation and Classification Using Modified FCM and SVM Classifier
Aparna M. Nichat, S. A. Ladhake
DOI: 10.17148/IJARCCE.2016.5420
Abstract: The field of medical imaging gains its importance with increase in the need of automated and efficient diagnosis in a short period of time. MRI is the most important technique, in detecting the brain tumor. In this paper data mining methods are used for classification of MRI images. A new hybrid technique based on the support vector machine (SVM) and modified fuzzy c-means for brain tumor classification is used. The purposed algorithm is a combination of support vector machine (SVM) and modified fuzzy c-means, a hybrid technique for prediction of brain tumor. In this algorithm the first stage is noise reduction using Median Filtering. Modified fuzzy c-means (FCM) clustering is used for the segmentation of the image to detect the suspicious region in brain MRI image. Texture based features such as GLCM(Gray Level Co-occurrence Matrix)features is used for extraction of feature from the brain image, after which SVM technique is applied to classify the brain MRI images, which provide accurate and more effective result for classification of brain MRI images.
Keywords: Data Mining, MRI, Modified Fuzzy C-means clustering, Gray level co-occurrence matrix (GLCM), Support Vector Machine (SVM).
Abstract
Multi-authority ABE over Cloud System
Asmita A. Jagtap, Prof. Sonali Mhatre
DOI: 10.17148/IJARCCE.2016.5421
Abstract: Cloud computing, is an emerging computing paradigm, enabling users to remotely store their data in a server and provide services on-demand. In cloud computing cloud users and cloud service providers are almost certain to be from different trust domains. Data security and privacy are the critical issues for remote data storage. A secure user enforced data access control mechanism must be provided before cloud users have the liberty to outsource sensitive data to the cloud for storage. With the emergence of sharing confidential corporate data on cloud servers, it is important to adopt an efficient encryption system with a fine-grained access control to encrypt outsourced data. Attribute-based encryption is a public key based encryption that enables access control over encrypted data using access policies and specified attributes. Cipher text-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable scheme for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem. The system proposed is, to design an efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities co-exist and each authority is able to issue attributes independently. More specifically, it�s a revocable multi-authority CP-ABE scheme, to ensure the data access control.
Keywords: Cloud Storage, Access Control, Attribute Revocation, Multi-authority.
Abstract
Multi Platform Application for Parent and School using GPS tracking
Pranali Kothawade, Savita Tompe, Manasi Walavalkar, Radhika Mirgunde
DOI: 10.17148/IJARCCE.2016.5422
Abstract: In today�s era everyone is using mobile phones for communication. At the same time Mobile Providers are also providing the variety of services to users. In attempt to expand on this, we propose a GPS based school bus tracking system for an organization and parents to help to find addresses of their children and locate their positions on mobile devices. The organizations are investing money in monitoring and tracking school buses aiming at improving services and ensuring the safety. The proposed technology allows organizations and parents to track real-time information about the school bus during travel. Today for transportation most schools use Bus as a medium. But due to various problems like not reaching on time, bus failure, no proper schedule etc. By this scenario author has created an application which provides the exact location of all organizational vehicles. The system contains single smart phone that is equipped with GPS. During vehicle motion its location update can be continuously reported to a server. This location information will be plotted using Google maps on monitoring device.
Keywords: Bus Tracking System, Global Positioning System (GPS), Mobile Application, Geo-location sensor.
Abstract
Detection of diseases on Cotton Leaves in Rural India Using CBIR
Bhagya Shri Mhetre, Reshma Bhosale, Priyanka Kalme, Komal Lodhe, R.M. Samant
DOI: 10.17148/IJARCCE.2016.5423
Abstract: The main source for the disease is the leaf of the cotton plant. About 80 to 90 % of disease on the cotton plant is on its leaves. So for that our study of interest is the leaf of the cotton tree rather than whole cotton plant the cotton leaf is mainly suffered from diseases like fungus, foliar leaf spot of cotton, Alternaria leaf spot of cotton. The machine vision system now a day is normally consists of computer, digital camera and application software. We wanted to propose this project is to produce a working system that is capable of image retrieval through the use of content analysis and associated metadata in the form of supplied cotton leaf images. Existing system based on fuzzy feature selection approach using fuzzy curves (FC) and surface (FS). The reported accuracy in the literature is around 60%. We are using two approaches to image retrieval: Text-Based approach and Content-Based approach. Our approach is more effective and raises the accuracy rate to 80%.CBIR systems search collection of images based on features that can be extracted from the image Files themselves without manual descriptive. Our propose system will have android application for farmer which will allow farmer to take snapshot of cotton leaf and show the diagnosis.
Keywords: Fuzzy curves(FC),Fuzzy Surface(FS),Contain Based Image Retrieval(CBIR),Colour Co-occurrence Matrix(CCM),Gray Level Co-occurrence Matrix(GLCM),Histogram(HSV).
Abstract
QR code Authentication System for confidential (digital Mark sheet) Encrypted data hiding and retrieval (Decryption)
Supriya Chavan, Sujata Gadakh, Gholap Kanchan, Sorte Surabhi , Prof. D. V. Shinkar
DOI: 10.17148/IJARCCE.2016.5424
Abstract: Nowadays, we hear news about fake mark sheets, fake transcripts, fake degree certificates etc. With latest printing and scanning technologies convenient and reasonable available, creating simulated documents have become an easy affair, making it tough to understand between original and the artificial. So it is a very big challenge to provide security and authenticity of digital data. This paper proposes an innovative method to authenticate the digital documents. A advanced method of QR code is introducing here, which grant multiple encryption and decryption of digital data. In this paper, we introduced a new technique, where the resume of a candidate will be encoded in QR [Quick Response] Code in encrypted form, so that if an hacker tries to change the data in the resume then he cannot do that. This is because; the encryption key is unknown to him. Encrypted QR codes are QR codes that everyone cannot scan and access. They are not very typical, since maximum QR codes are used in marketing, and the developers of those codes want them to be accessible by everybody. Protect QR codes can be built that make the scanner enter a password to be able to access the content. We are using TTJSA algorithm method for encryption and decryption purpose. TTJSA is very effective method; we encrypt the mark sheet information using the TTJSA encryption algorithm. The encrypted marks are entered inside QR code and that QR code is also printed with the initial information of the mark sheet. The marks can then be retrieved from the QR code and can be decode using TTJSA decryption algorithm and then it can be verified with marks already there in the mark sheet.
Keywords: QR Barcode, Information Hiding, Encryption Decryption, TTJSA.
Abstract
Prediction of Facial Key points in Images Using Neural Networks
Manish Bhelande, Aadharsh Krishnan, Akhilesh Bharadwaj, Niraj Palecha, Yash Tawade
DOI: 10.17148/IJARCCE.2016.5425
Abstract: Detecting facial key point positions on images is a challenging task since facial features differ significantly from one individual to another. Even for a certain individual, there is an occurrence of wide variations due to factors such as size, position, viewing angle, and illumination effects. In this paper, we present a system that trains and compares multiple neural networks and try to optimize their learning rate constantly. This juxtaposes the different levels of accuracy obtained in predicting the facial key points in images even with a wide array of significantly varying facial features. Our method uses a simple three-layer neural network and distinct variations of convolutional neural networks.
Keywords: facial key points, neural networks, hyper-parameter optimization, deep learning, convolution networks.
Abstract
V Editor: Online Collaborative IDE
Ritupurna Meha Shahi, Branden Counder , Sowmya Poojary, Yogesh Doulatramani
DOI: 10.17148/IJARCCE.2016.5426
Abstract: We live in an era of IT world and there are lots of projects going around all over. While working on projects small or large, every team of software engineer sometimes faces problem in adding or reverting changes in code/project. There are many existing editors/workspace which fail to facilitate viewing and editing of files prone to deadlocks and race condition. To solve these problems and make a better environment, we have proposed a system, V Editor which is a PHP based web application and IDE that facilitates real time collaborative editing of files and programming which will help in collaboration in real time for any organization or software development environment to work efficiently to make necessary contribution in source code, avoid wasting time and speed more time collaborating and success of project or team.
Keywords: Real time collaborative editor, collaborative IDE, web based IDE.
Abstract
Detection Mechanism for Black hole attacks in MANET
Anjali P.Rathod, Nekita A. Chavhan
DOI: 10.17148/IJARCCE.2016.5427
Abstract: Security is a key feature in mobile ad hoc networks (MANET) but they are prone to various types of attacks such as network layer attacks. Black hole attack comes under the category of network layer attacks. In Black hole attack, malicious node falsely claims that having shortest path to destination and eventually captures all data packets from source which are intended to forward further to destination. This results into the performance degradation of network and also causes battery problem. In this paper, some of the detection techniques are discussed which are put forward by various researchers. By studying those techniques, new detection mechanism is proposed in this paper.
Keywords: AODV, Black hole attack, Malicious node, Mobile Ad hoc network, Routing protocols etc.
Abstract
Performance Analysis of Wireless link in Rician Fading Channel
Suryakant Pathak, Himanshu Katiyar
DOI: 10.17148/IJARCCE.2016.5428
Abstract: In wireless communication fading is a phenomenon which degrades the performance of the link it includes Rayleigh, Nakagami-q, Nakagami-m, Rician fading. In this paper the performance of wireless link over Rician fading channel have been analysed. A closed form expressions of outage probabilities, bit error rate (BER), end to end average received signal to noise ratio (SNR) and channel capacity are derived for Rician fading channel. Outcome of this paper will be helpful for establishing wireless link in Rician fading channel.
Keywords: Bit error rate, channel capacity, outage probability, Rician fading channel, signal to noise ratio.
Abstract
Cloud Data Access with Multi-authorities
Aniket Salunke, Arjun Vekariya, Siddhesh Vartak, Sachin Sonawane
DOI: 10.17148/IJARCCE.2016.5429
No abstract available.
Abstract
Design of SPI to I2C Bridge for High Speed Data Interfacing in Digital System
Sidra Anam, Vinod Kapse
DOI: 10.17148/IJARCCE.2016.5430
Abstract: The purpose of this paper is to design and simulate the serial communication environment between SPI and I2C protocol with the help of the Bridge. By using the I2C as a slave side we can increase the number of I2C peripheral devices, it is not possible with SPI because it requires separate SS_n line for different slave devices which increase the board complexity. Most of the embedded systems having only SPI interface to connect with I2C peripherals. But it is not possible to directly connect SPI with I2C peripherals. The better option to deal with this problem is to build an SPI to I2C interface with the help of the Bridge. Bridge is commonly used for transforming or converting commands and data from one device to another to perform various applications. This effort mainly focuses on protocol conversion from SPI to I2C bridge, to interface with high speed digital system.
Keywords: SPI (Serial Peripheral Interface), I2C (Inter Integrated Circuit), Bridge, SCL (Serial Clock Line), SDA (Serial Data Line), Channel Selector.
Abstract
A Comparative Evaluation of Various MANET Routing Protocols based on Performance Matrices
Vinod Kumar, Sameer Srivastava, Jagdeep Singh
DOI: 10.17148/IJARCCE.2016.5431
Abstract: Emerging technologies need network connection every time and everywhere. MANET can be created anywhere and anytime and well suited for these technologies. Mobile Ad Hoc Networks are the flexible and low cost of deployment. The properties of MANET are attracting the attention of developers for the future applications. Routing protocol design is the important issue of Mobile Ad Hoc Network. Dynamic network feature of MANET is creating a major technical challenge. MANET has been the attention of research area in the network. Many MANET protocols having their some specific property have been modified to enhance their performance. The performance of these protocols depends on network size and pattern of node mobility thus designing of these protocols varies. This paper presents the survey of modified MANET routing protocols. The aim of this paper is to provide the performance comparison in modified protocols. Here we will compare only those properties which are common among routing protocols.
Keywords: MANET, Destination Sequence Distance Vector (DSDV), Fisheye State Routing (FSR), Wireless Routing Protocol (WRP), Dynamic Source Routing (DSR), Zone Routing Protocol (ZRP).
Abstract
Home Automation and Laptop Control for Quadriplegics
Tigin Varghese, Sachin K John, Santo Simon, Aloshi C Binny, Mr. Agi Joseph George
DOI: 10.17148/IJARCCE.2016.5432
Abstract: The person affected with paraplegia normally has malfunctioning of limbs. Some of these patients can only move their head. Establishing a new channel without speaking and hand/arm motions makes life easier for patients and therefore improves their life quality. The objective of our project is to present the design and application of an accelerometer based efficient human computer interface (HCI). A head mounted accelerometer device is used to detect acceleration caused by head movements of the user in three axes and the provided data are collected by software on the target computer. The movement of the eye is detected by an eye blink sensor. Through this facility, the disabled person is able to control laptop, fan, lamps and other house hold equipment�s in his room. Our main aim is to make computer easily accessible by everyone including disabled people.
Keywords: Accelerometer, eye blink sensor, software, HCI, mouse cursor.
Abstract
Personalized Web Search using Machine Learning Technique
Pratiba D, Shobha G, Samrudh J
DOI: 10.17148/IJARCCE.2016.5433
Abstract: Machine learning is a field which deals with the creation and analysis of algorithms that can follow a reinforced methodology of learning. Such algorithms work on the basis of predictions made based on inputs, rather than following programmed instructions. In the existing search engines, if the user wants to know his likeness based on his previous searches, nothing except the history is present in the browser. In the proposed system, a framework has been designed to get a user specific re-ranking for the various websites and pages from an already present search engine and to implement Support Vector Machine Algorithm to find out the weightage of each concept. The main objective of the proposed system is to provide personalized results to the users based on their individual interests. It re- ranks the results for a given query obtained from existing search engine based on the user need. Profile database is got from a search engine for a given user query. Topical preferences are symbolized by words that occur regularly, referred as concepts. Weights are assigned to these concepts and this shows the user�s degree of interest in that concept. To show the relations among the different concepts, required information is saved along with its strength. For every query�s outcome, a score is given to each snippet based on weights of different concepts that they have and new ranking is done based on the scores. Currently web search personalization is used by social networking sites, search engines, banking services and online shopping sites.
Keywords: Machine Learning, Personalized Web Search Engine, Webpage Re-ranking, Supervised and Unsupervised Machine Learning, Support Vector Mechanism.
Abstract
Research Hotspots in Big Data Technology
Manas Kumar Yogi, K. Chandrasekhar, D. Uma
DOI: 10.17148/IJARCCE.2016.5434
Abstract: Throughout the history of human society, the demands and willingness of human beings are always the source powers to promote scientific and technological progress. In this paper, we present the research hot spots and indicate possible research directions of big data. We also discuss potential development trends in this broad research and application area. This paper will serve as a readymade reference for researchers working in Big data for identifying the possible research areas in this field.
Keywords: Big Data, BDAaaS, Analysis, Mining, Parallel Computing.
Abstract
An Aid for the Hearing Impaired
Nagarjun T R M, Abhilash V Pattan, Akshay Kumar H C, Apoorva Prabhudeva, Veena Karjigi
DOI: 10.17148/IJARCCE.2016.5435
Abstract: Sign language is a language which is used for communication between the hearing/speech impaired people along with others who understands it. Sign language relies on sign patterns, i.e., body language, orientation and movements of the arm to facilitate understanding between people. This paper is aimed at reducing the communication gap between the normal people and hearing/speech impaired people by converting sign language into English speech or text. The system will convert the data into speech/text. The whole system will be implemented on a MATLAB and Simulink.
Keywords: Sign language, Image Processing, Colour Models, Segmentation, Morphology, Otsu�s algorithm, Gaussian PDF, Simulink.
Abstract
Study and Literature Survey for Safety Applications: Intelligent Transport System (ITS)
Miss. Pratibha L. Yadav, Prof. Sanjay S. Badhe, Prof. Santosh G. Bari
DOI: 10.17148/IJARCCE.2016.5436
Abstract: Connected vehicle technology aim to solve some of the biggest challenges in the transportation in the areas of safety, mobility and environment. The safety application for Intelligent Transport System (ITS) is one of the main objectives in this Paper we focus on V2V communication, once cars are connected which is able to share data with other cars on the road and which help to reduce Highway accidents. Ultimately, vehicles are connect via multiple complementary technologies of vehicle to-vehicle (V2V) and vehicle-to-infrastructure (V2I) connectivity based on Wi-Fi, Dedicated Short Range Communication (DSRC)/WAVE wireless media to periodically broadcast their position information along with the driving intentions as they approach intersections. We provide a realistic analysis of the VANET topology characteristics over time and space (Collision Detection) for a highway and intersection scenario to integrate real-world road topology and real-time data extracted from the freeway Performance Measurement System (PeMS) database into a microscopic mobility model to generate realistic traffic flows along the highway. Also provides Collision Detection Algorithm, SSM/TEM/TEMA model to improve throughput at crossing points. In this paper we investigate the use of vehicle-to-vehicle (V2V) communications by using above mentioned algorithms and models.
Keywords: ITS, V2V, DSRC WAVE wireless media, VANET, Collision Detection Algorithm, SSM/TEM/TEMA model, NS2, AVR Microcontroller, Sensor.
Abstract
Pitch and Yaw Angle Control in Under Water Vehicle Using P/PI/PD/PID and LQR Controllers
Bhupendra Kumar, Mrs. Ekta Tamrakar
DOI: 10.17148/IJARCCE.2016.5437
Abstract: In various research and experimental areas under ocean without human intervention we need a vehicle which can accomplish the required task is known as �UNMANNED UNDER WATERVEHICLE�. In this project we will efficiently model the system and perform the various simulation tasks for pitch angle and yaw angle control by using classical control techniques i.e. P,PI,PD,PID and linear quadratic controller(LQR). By using these control techniques we will obtain the best possible performance technique to control the pitch angle and yaw angle and also here we will close compare the various parameters of different controllers.
Keywords: MATLAB, P, PI, PD, PID, LQR controllers.
Abstract
Study and Literature Survey for Low-Cost Tightly Coupled GPS/INS Integrated system based on Sigma Point Kalman Filter
Mr. Amol M. Kendre, Prof. Dr. Vilas N. Nitnaware, Mrs. Vaishali V. Thorat
DOI: 10.17148/IJARCCE.2016.5438
Abstract: In this paper, describes the literature review for design of a �tightly coupled GPS/INS integration system based on nonlinear Kalman filtering methods�. The traditional methods include linearization of the system around a nominal trajectory, and the extended Kalman filtering (EKF) method which linearizes the system around the previous estimate, or the predication, whichever is available. The recently proposed sigma-point Kalman filtering (SPKF) method uses a set of weighted samples (sigma points) to completely capture the first and second order moments of the prior random variable. The project aims to develop a generic hardware/software platform for positioning and imaging sensor integration. In the current development phase, a tightly coupled GPS/INS integration system based on a linearization around the INS solution has been designed and implemented. The system uses the GPS pseudo range and Doppler measurements to estimate the INS errors. This paper describes further developments of the integration filter design based on the EKF and SPKF methodologies, in order to compare the performance of nonlinear filtering approaches.
Keywords: Global positioning system (GPS), inertial navigation system (INS), Non-linear Kalman filter (KF), Computer with latest configuration, Latest version of MATLAB with GPS & INS tool kit.
Abstract
Analysis and High Security Data Hiding Technique in Encrypted Image
Umesh M. Umate, Dr. V.N. Nitnaware
DOI: 10.17148/IJARCCE.2016.5439
Abstract: In this paper introduces analysis of previous steganographyand introduction of proposed method, and also how to hide secrete message in carrier image with help of LSB method. In previous days there are lots paper introduces on data hide in a carrier image. Steganography is very old approach to hide data into a some object. Steganography comes from Greek word that means covered or secrete writing; stegan means covered and graphy means writing. In this day there is lots of security thread over internet through carrying some information. There are lots disadvantages while handling this type embedding system like capacity, accuracy and robustness. Transmission of image over the internet is vulnerable to verity attacks from untrustworthy system administrators. So it should be stored and processed in an encrypted format to maintain security and privacy. It is necessary to implement secrete message in these encrypted image. In this paper, We proposing data hiding is to performed by the encryption of a text data using twelve square substitution cipher, and then embed the cipher text in the carrier image depending on plane separation of the image and select any plane R,G,B or all for embed. We will be finding LSB algorithm on the basis of Mean Square Error, Peak Signal to Noise Ratio, Relative Payload and Rate of Embedding. The system is therefore, recommended to be used by the internet users for establishing a more secure communication.
Keywords: encryption; decryption; LSB; steganography; 12 square algorithms.
Abstract
Study and Literature Survey for Evidence Collection System for Car
Miss. Ashwini B. Patil, Dr. Suresh D. Shirbahadurkar, Mrs. Vaishali V. Thorat
DOI: 10.17148/IJARCCE.2016.5440
Abstract: The collection of the real time data after the detection of collision around the vehicle environment and analyze the collected data to have the conclusion regarding the collision and simultaneously transmitting the data over the wireless network. The Evidence Collection System is vehicle based device which is use to collect the data like speed, engine temperature, Brake status, LPG sensor, Alcohol content, acceleration, GPS position, wiper movement, and time etc. This data can be used to investigate the crime, rescue operation and insurance claims. This data then transmitted to the database server so that web application can be able to access this information at different places like police station, Insurance Company. In this paper, I am going to investigate the use of evidence collection system by using different sensors and wireless communication.
Keywords: Evidence Collection System, Car Black Box, Xbee module, Sensors.
Abstract
Design and Fabrication of Low Cost Optical Test Bench for Verification Applications
Lismy Lukose, Sumi Varghese, Tibin Thomas, Ms Indu Reena Varughese
DOI: 10.17148/IJARCCE.2016.5441
Abstract: With the increasing popularity of solid state lighting devices, Visible Light Communication (VLC) is globally recognized as an advanced and promising technology to realize short-range, high speed as well as large capacity wireless data transmission. Before using visible light communication to a large extend, it is important that one should have the basic knowledge about parameters of visible light and how the parameters are different from IR. The low cost optical test bench contains systems for measuring parameters of light such as intensity and dispersion. Also the test bench includes a practical audio transmitter system which uses visible light as the transmission medium.
Keywords: Optical Test bench; Photo goniometer; VLC; Intensity; Dispersion.
Abstract
Genetic Algorithm Based Confidential Data Protection in Privacy Preserving Data Mining
Dr. S. Vijayarani, M. Janakiram
DOI: 10.17148/IJARCCE.2016.5442
Abstract: Nowadays data sharing becomes obvious for successful completion of several tasks. In many places, data sharing has created lot of problems i.e. data modification, data mishandling and data misinterpretation. If we wish to share the datasets to others, first we have to verify whether the dataset has any sensitive or confidential data, if yes, then it is necessary and essential to protect that confidential data and then it can be shared to others. Privacy preserving data mining helps to perform the data mining tasks in a secured manner. Many privacy techniques and algorithms have been proposed by many researchers. This research work Genetic Algorithm based Masking Technique (GAMT) mainly concentrated on protecting confidential numerical attributes in a dataset using the genetic algorithm. Genetic algorithm concept is used for modifying the data items of the confidential attribute and to generate new data values for those attributes. The performance of Genetic Algorithm based Masking Technique is compared with the existing technique, named as additive noise. Results showed that GAMT has produced better results.
Keywords: Data mining, Privacy, Genetic algorithms, Additive noise, X-means, Filtered and Simple EM Clustering.
Abstract
An Improved Multipath Routing in Vehicular Environment through Dynamic Node Density
Komal Babbar, Dr. Dinesh Chaudhary
DOI: 10.17148/IJARCCE.2016.5443
Abstract: Vehicular Ad-hoc network (VANET) is a group of vehicular nodes making a temporary network without the help of any centralized infrastructure or administration. VANETs have no static configuration because of its dynamic feature of nodes. So, efficient and reliable routing is one of the significant issues in VANETs. Hence, so many routing protocols and algorithms have been improved and developed for fulfilling this objective. Thus, it�s very complicated to find which protocol performance is best in various network scenarios. This paper introduce improved Multicast AODV (IMAODV) routing protocol with restricted source routing that confirms providing reliable, on-time and accurate data in V2V communication in comparison of Improved AODV (IAODV). In result analysis, introduced IMAODV protocol performance is compared with AODV, IAODV and MAODV protocol with respect to Average End-to-End Delay (Avg. E-to-E Delay), Packet Delivery Ratio (PDR), Packet Loss Ratio (PLR), and Normalized Routing Load (NRL). Simulation analysis results illustrate that the performance of IMAODV protocol is better as compared to IAODV protocol in VANETs.
Keywords: VANET, AODV, IMAODV, MATLAB.
Abstract
A Survey on Co-extracting Opinion Words and Opinion Reviews Based on the Word Alignment Model
Spoorthy R, Natesh M
DOI: 10.17148/IJARCCE.2016.5444
Abstract: In today�s e-commerce world or in competitive market structure, lots of analyzed data is required for betterment of services, probability calculations, predictions, business decisions and summary of market reputation etc. This analysis is obtained through the detail summary of customer feedbacks and product reviews etc. To analyze this kind of data, opinion mining techniques are used. Hence for fine grained output from opinion mining, word alignment model and patterns of sentences are discussed in this project. Getting opinion words and opinion targets is the important and significant tasks. After detecting the opinion target and opinion word one important task is to determine relation between them. From the review it is clear that it is achieved using word alignment technique. Word alignment model is heavy tasks hence to balance the load and gear up the execution process partial supervised technique is used and syntactic patterns are used for it. Opinion relation graph is also formed to get proper analysis using Hill-Climbing algorithm. This opinion mining concept is also merged in web based application that recommends merchandise on the basis of analysis of product reviews. This web based system will be having feedback facility to analyse the web based facility. The product will be recommended as per the user requirement. Regular expression will reduce tasks of sentence comparison and analysis of other unnecessary data process.
Keywords: Opinion mining, opinion target, opinion word, WAM, co-ranking.
Abstract
Smart Crawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Melisa Vidiera, Janhavi V
DOI: 10.17148/IJARCCE.2016.5445
Abstract: Due to extensive usage of Internet, substantial amount of data has extended widely over web, which serve access to particular data or to fetch more relevant data. It would be challenging to the search engine to provide quick results that is most relevant to the users. To search the relevant data and to reduce amount of time in fetching data, here propose the �Smart Crawler�. This returns most relevant data from the popular and most specific websites. It uses multiple search engines that processes the query provided by the user, cluster the results collected in a single platform and performs two stage crawling on data and URLs. In which in-site map generation is done to obtain relevant site with techniques such as reverse searching and page ranking.
Keywords: Deep Web, two stage crawler, ranking, in-site exploring, adaptive learning.
Abstract
A Survey on Cloud-Based Remote Venue Recommendation System
Ms. K. C. Sonawane, Mrs. S. S. Ponde
DOI: 10.17148/IJARCCE.2016.5446
Abstract: Now a days, recommendation systems have seen significant evolution in the field of knowledge engineering. The models of most of the existing recommendation systems based on collaborative filtering approaches that make them simple to implement. The challenges that affect the performance of most of the existing collaborative filtering- based recommendation system are (a) cold start, (b) data sparseness, and (c) scalability. In this paper, introduced Cloud-based Bi-Objective Recommendation Framework for mobile social networks. Multi-objective optimization techniques are used to generate personalized recommendations. Hub-Average (HA) inference model is used to address the issues pertaining to cold start. The Weighted Sum Approach (WSA) is implemented for CF-BORF and greedy-BORF Algorithm is applied for vector optimization to provide optimal suggestions to the users about a venue.
Keywords: Context-Aware Web Services, Multi-objective Optimization, Collaborative Filtering.
Abstract
Review on Energy Efficient Routing Protocol in MANET
Sushant Kumar Choudhary, Vimlesh Kumar
DOI: 10.17148/IJARCCE.2016.5447
Abstract: Mobile ad hoc networks are infrastructure-fewer networks required for establishing communication between two or more nodes without creating a common access point. There are so many routing protocols introduced in the recent scenario. In the case of On-Demand routing algorithms like AODV and DSR were taken as one of the effective scheme for achieving good Quality of service parameters compared to Table Driven method. Establishing correct and efficient routes is a main design problem in MANETs along with Energy Efficiency. Energy based papers proposed in the recent years consider the on-demand routing of AODV and DSR and some modifications have been done in order to find out a better energy efficient routing algorithm. This paper is a review of new and improved energy based routing methods used in Mobile Ad hoc networks.
Keywords: MANET; Clustering; Energy consumption; AODV; DSR; Qualty of Service; Routing protocol.
Abstract
An Authentication Protocol for Managing Dynamic Resources in a Massive Cloud Platform
Suganya .D, Sowmya .S, Ragini .S, Harikrishna Pillutla
DOI: 10.17148/IJARCCE.2016.5448
Abstract: Cloud Computing is designed as an event to anticipate the applications supported by the new paradigm and validate the mechanisms and the techniques .We address the complication of dynamic resource management for a massive cloud environment. We incorporate outlining distributed middleware architecture and performing one of its key elements: a gossip protocol that (a) establishes a generous resource allocation among sites/application, (b) dynamically adapts the allocation to load changes, and (c) rates both in number of physical machine sites/application. We exemplify the resource allocation problem as that of dynamically augmenting the cloud service under CPU and memory constraint. We present a protocol that figure out a solution without considering memory constraint and prove correctness and convergence properties. Hence we extent that protocol to provide an analytical solution for the entire problem that contains reducing the cost for accommodating an allocation. This protocol continuously executes on dynamic, local input and does not need global synchronization, as all other gossip protocol do. This paper also includes a Remote Authentication Dial-in User Service Protocol. RADIUS is a protocol that facilitates Network Access Server to utilize shared authentication server for authorization and authentication. We appraise the heuristic protocol through simulation and find its conduct to be well coordinated with our design goals.
Keywords: Cloud Computing, RADIUS Protocol, Dial-in User Service Protocol, Remote Authentication.
Abstract
A Review on Data Extraction using Web Mining Techniques
Vidya Shree S I, Pooja M R
DOI: 10.17148/IJARCCE.2016.5449
Abstract: Today internet is full of structured or unstructured information and this information influences people or society directly or indirectly. With the rapid growth of internet technologies, the web is considered as a world�s largest repository of knowledge. Web data processing is the method of handling high volume of data which is not so easy. Therefore, for the user benefits, web mining is used to identify the patterns by understanding the customer behaviour and evaluating a particular website based on the information stored in web log files. Web Mining is evaluated by using data mining techniques, like classification, clustering, and association rules. In this paper, we have given complete review on how to extract the useful data by using web mining techniques.
Keywords: Web mining, Classification, Clustering, Association rule.
Abstract
A Literature Survey of Phishing Attack Technique
Pratik Patil, Prof. P.R. Devale
DOI: 10.17148/IJARCCE.2016.5450
Abstract: It is a crime to practice phishing by employing technical tricks and social engineering to exploit the innocence of unaware users. This methodology usually covers up a trustworthy entity so as to influence a consumer to execute an action if asked by the imitated entity. Most of the times, phishing attacks are being noticed by the practiced users but security is a main motive for the basic users as they are not aware of such circumstances. However, some methodologies are limited to look after the phishing attacks only and the delay in detection is mandatory. In this paper we emphasize the various techniques used for the detection of phishing attacks. We have also discovered various techniques for detection and prevention of phishing. Apart from that, we have introduced a new model for detection and prevention of phishing attacks.
Keywords: Detection, Phishing email, Filtering, Classifiers, Machine learning, Authentication.
Abstract
Fitness Advisor System Using Data Mining
Christy Samuel Raju, Sanchit V Chavan, Karan Pithadia, Shraddha Sankhe, Prof. Sachin Gavhane
DOI: 10.17148/IJARCCE.2016.5451
Abstract: There are a lot of health related problems today that have a direct or an indirect connection to the respective person's body weight. Efficient diagnosis of the same and spreading proper awareness about the health hazards associated with body weight is the need of the hour. �Fitness Advisor� is a desktop application that advises the user according to his/her problem. The system uses data mining as a tool to bridge the gap between the diagnosis/solution and the user. The system uses a combination of clustering and association algorithms to efficiently direct the respective user to the best possible solution.
Keywords: Fitness, Advice, Clustering, Association, Data Mining, Health.
Abstract
Wireless Aptitude Answer PAD
Paresh Joshi, Akshay Gaikwad, Ameya Hirve, Mitali Rane, Mayur Ingale
DOI: 10.17148/IJARCCE.2016.5452
Abstract: This project represents Wireless Answer pad for aptitude test which is the cost efficient along with time saving test. Because simplify the examination management and performance assessment. This study emphasized on developing answer pad to reduce complexity of computer. This project work focuses on the aspects on the master-slave device and platform oriented design. For fast and convenient question navigation and performance assessment of the wide application of the handheld devices we developed this system. In this project we have attempted to approach taking examination and implementing digital answer pad into tests and other examination too.
Keywords: Aptitude, Wireless Answer pad.
Abstract
Diversity Based Genetic Algorithm for Efficient Test Case Selection
S. Usha, A. Ramarajan
DOI: 10.17148/IJARCCE.2016.5453
Abstract: The testing is a very important innovate the event of the software system cycle. The test cases are generated multiple test suite. The regression testing is done to reduce the effort of testing by selecting a subset of test cases from the test suite with respect to some testing criteria. Combination of Greedy and multi-objective genetic algorithms (MOGAs) does not produce better results. The greedy algorithm which is used to find optimal solution reduces the time but increases cost. Genetic also find next generation of test case selection from the test suite. Hence by injecting the new diversity based genetic algorithm (DIV-GA) during the search process a better solution is provided for the detection of test cases. A way to reduce the cost of regression testing consists of selection or prioritizing subset of test cases. Therefore by selecting and prioritizing the subset of test cases and given as input to DIV-GA reduce the time & cost estimation of efficient test cases.
Keywords: Regression Testing; Greedy Algorithm; Multi-Objective genetic algorithm (MOGA); Diversity Based Genetic Algorithm (DIV-GA); Test case selection.
Abstract
Automated Voice Recognized Wheelchair
Sidharth S, Saptha Surendran, Nimmu Ann George, Jose J. Edathala
DOI: 10.17148/IJARCCE.2016.5454
Abstract: This paper presents an automated voice recognized wheelchair (AVRW) based on speech recognition. It�s common that physically challenged people find it hard to move the wheelchair without external aid so this AVRW can be used by them to move around without any difficulty. The voice of the person is detected by voice capture module which will be compared by the voice recognition module with predefined voices loaded into the system. Vector Quantization technique is used to recognize the command. A microphone is used for taking code words from the patient to the PC. The signals from the PC are processed into code words. These code words cannot be directly sent to the PIC Microcontroller, so a ZigBee module is used for transmission and reception. According to the codes, the motors are rotated. These codes are compared with the MATLAB codes, if they match with each other, then the movement of motor occurs. There is also a motor driver for the control of the motor. It is also equipped with obstacle avoidance technique to help when the person may not be able to provide proper voices at the right time.
Keywords: Speech recognition, MATLAB, Vector Quantization, ZigBee, PIC Microcontroller.
Abstract
An Algorithm for Intrusion Detection and Prevention in MANET
Mrunal Gavhale, Pranay D. Saraf
DOI: 10.17148/IJARCCE.2016.5455
Abstract: A Mobile Ad-hoc Network (MANET) is self-configured and dynamic network that formed by collecting number of mobile nodes. One cluster consists of group of nodes. It is necessary to have a good and efficient cluster formation and cluster head selection algorithm which will connect other neighbouring node. Their communication should do in very less time. In MANET security is another prime concern. The open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. To prevent from such intrusions need a system which will detects as well as prevent. This system detects and prevents the intrusion in the network on the basis of parameter (such as packet loss ratio, energy consumption, packet delivery delay), once detected restricts that intrusion to enter in the network by blocking the system information of that intrusion and broadcast this information to other cluster head to save energy and protects against Intrusion.
Keywords: Wireless Sensor Network, Cluster, Cluster Head, Intrusion Detection and prevention, Mobile Ad-hoc network (MANET).
Abstract
Advanced Hospital Database Management System
Gunjan Yadav, Parth Lad, Parul Pandey, Tejaswi Kolla
DOI: 10.17148/IJARCCE.2016.5456
Abstract: An advance concept of database that includes the database of hospital as well as patient. It is a kind of database that includes the maintenance of patient's record. This concept avoids the process of manipulation with record. There are chances that the important data can be lost but by using this concept we can keep a backup of each and every data. Also the data are secured in each and every manner. Data will be in distributed manner thus making it available for everyone .Each and every patient will be having its own individual ID and PASSWORD. Patient's registration form is also maintained which will include his/her name, address, contact number, DOB. The distributed data will be transferred from hospital to hospital and every patient will have the access to its own personal data.
Keywords: Easy access to data, reduced paper work, past medical record.
Abstract
Review of 6T SRAM Technique for Reducing Power Consumption and Cost
Manish Shrivastava and Vimal Kishore Yadav
DOI: 10.17148/IJARCCE.2016.5457
Abstract: With growing memory and processing needs of high performance systems, it is becoming important to have low power and efficient memory circuits as it constitutes more than 70% of circuit in a general purpose processor. Low static leakage current and higher noise immunity is major requirement of memory circuits in such systems. In this work we have conducted a regressive study of different FinFet based SRAM cells and compared the performance parameters of the selected cells. On the basis of study and comparison we have concluded a scope of work on which further research will be conducted.
Keywords: 6T SRAM, TMIG FinFet, IG FinFet, HSPICE, 7T SRAM.
Abstract
Electronic Hand Glove for Speech Impaired using MATLAB
Nikita Ratnani, Mrs. Manisha Sharma
DOI: 10.17148/IJARCCE.2016.5458
Abstract: Sign language is the principle means of communication for many deaf people. But most of the normal people faces difficulty in communication in this way with the speech impaired people. Thus, we proposed a system in which piezoelectric vibration sensors are installed on the hand gloves and the data obtained from the sensors are calibrated accordingly using MATLAB programming language. On tapping the vibration sensor, the data is send to the vibration sensor module. This sensor module sends the analog data to the Arduino board. Then this microcontroller board sends the analog output to the MATLAB via USB which is converted into predefined words in the MATLAB. The predefined words can be hello, good morning, welcome etc. In this way, we will understand what the user wants to say.
Keywords: Speech impaired, Piezoelectric , Vibration , Arduino , MATLAB.
Abstract
Text Mining Methodology
Prajakta R. Pagar, Dr. M. U. Kharat
DOI: 10.17148/IJARCCE.2016.5459
Abstract: D-matrix is a systematic diagnostic model which is used to catch the fault system data and its causal relationship at the hierarchical system-level. Developing a D-matrix from first standards and updating it using the domain information is a labor intensive and time consuming task. Further, in-time augmentation of D-matrix through the discovery of new symptoms and failure modes observed for the first time is a challenging task. Is describes construction and updation of D-Matrix by automatically mining the unstructured repair verbatim ( written in unstructured text) data collected during fault diagnosis using document annotation, term extraction and phrase merging. The system construct the fault diagnosis ontology consisting of concepts and relationships commonly observed in the fault diagnosis domain. Next, employ the text mining algorithms make use of ontology concept to identify the necessary artifacts, such as parts, symptoms, failure modes, and their dependencies from the unstructured repair verbatim text. The method is implemented as a prototype tool and validated by using real-life data collected from the automobile domain.
Keywords: Data Mining, fault analysis, fault diagnosis, information retrieval, text processing.
Abstract
Ranking and Mapping of Hotels & Restaurants efficient keywords prediction
Prof. Reena mahe, Abhijeet Javlekar, Pratik Dabholakar, Madhav Kantak, Jayesh Dhawase
DOI: 10.17148/IJARCCE.2016.5460
Abstract: Keyword queries on databases provide easy access to data, but often suffer from low ranking quality, i.e., low precision and/or recall, as shown in recent benchmarks. It would be useful to identify queries that are likely to have low ranking quality to improve the user satisfaction. For instance, the system may suggest to the user alternative queries for such hard queries. In this paper, we analyze the characteristics of hard queries and propose a novel framework to measure the degree of difficulty for a keyword query over a database, considering both the structure and the content of the database and the query results. We evaluate our query difficulty prediction model against one effectiveness benchmarks for popular keyword search ranking methods. Our empirical results show that our model predicts the hard queries with high accuracy. Further, we present a suite of optimizations to minimize the incurred time overhead. We also provide mapping methodology for hotels and restaurants which will be used for getting directions with the help of Google Maps.
Keywords: Query performance, query effectiveness, keyword query, robustness, databases,Google Maps.
Abstract
Synthesis and Simulation of FPGA Based RC4 Encryption Method
Renu M. Sharma, Pallavi Choudhary
DOI: 10.17148/IJARCCE.2016.5461
Abstract: RC4 has been the most famous stream cipher in the history of symmetric key cryptography. RC4 has been designed by Ron Rivets in 1987; it is the most widely deployed commercial stream cipher. The applications of RC4 are in network protocols such as WPA, WEP, SSL and in Secure SQL, Microsoft Windows, Apple OCE, etc. In this project, it has been focus on the synthesis and simulation of hardware of RC4 algorithm which can be implemented further.. The cipher was a trade secret but in 1994 it was leaked out. RC4 is extremely fast and its design is simple. This project deals with RC4 key stream generator, within the scope of the model of an exchange shuffle, in order to achieve better security. The main factors in RC4's success over such an extensive range of applications are its speed and simplicity. For Efficient implementations can be easily modification/editing can be performed either in software or / and hardware as per necessity. The RC4 code is written in Verilog language and based on synthesis result it can be further downloaded on FPGA for its hardware realization.
Abstract
Expert System on Coconut Disease Management and Variety Selection
Ani Dath, M.Balakrishnan
DOI: 10.17148/IJARCCE.2016.5462
Abstract: Knowledge and information on all aspects of coconut disease management and variety selection are the foundations on which integrated disease management and variety selection decisions are made. To improve productivity and overall profitability, the expert system on Coconut disease management was developed to provide the management practices to be followed for getting maximum returns by detecting the disease at an early stage.The practical identification of the suitable varieties for getting high yield of copra or the varieties which are suitable for tender nut purpose, commercial cultivation and to further enhance the productivity and adaptability are the important basis for selection of varieties for getting higher yield. Most of the varieties are documented for their distinct characteristics. An extensive variety selection module is available in the system with a scientific knowledge base in the background. It is concluded that the expert system on variety selection can be used to select the suitable varieties based on the characteristics required by the end user for getting the maximum returns.
Abstract
A literature review on content based musical instrument recognition
Ms. Vaishali S. Nandedkar
DOI: 10.17148/IJARCCE.2016.5463
Abstract: Recently the types of information are changed from text based to the various multimedia data such as audio, image, and video. Also, our life is very influenced by various multimedia data due to the spread of the internet. In this state, it is necessary to study about efficient search method for multimedia data. In this paper, a review of literature on content based musical instrument recognition is described. The ever-increasing amount of digital audio media in recent years, led to the demand of content based retrieval of multimedia. There is in fact a growing interest for content based instrument reorganization most of the works are related to musical instrument classification, pitch estimation, music.
Keywords: Pitch estimation, musical instrument recognition systems, and multiple instruments in polyphonic music.
Abstract
Technique for Fault Identification and Auto Retrieving to Healthy Condition for Transmission Line Network
Ankita gupta, R.M. Potdar
DOI: 10.17148/IJARCCE.2016.5464
Abstract: Transmission line protection has become a very vital issue in power system as the transmission line connects the generating station to the end users(loads), the generating station are far away from the load end thus, runs several kilometers and hence the chances of fault occurring in the line is maximum. More than 75 percent of power system faults are occurring in transmission lines. Amongst the other electrical power system component, this transmission lines detriments more from unexpected potentially catastrophes. Due to which the reliability of the operating system degrades earlier to its worst condition. Thus, in this project our task is to make a protective system based on adaptive technique to prevent the propagation of these faults and safeguard the system against the abnormal conditions faced. The role of the protective system will be to detect and classify the type of fault also send a tripping signal to reset it back to the healthy condition after a preset value of timer. Determination of different types of faults on the transmission line is achieved by application of evolutionary programming tools of MATLAB software and Arduino mega 2560(microcontroller).
Keywords: transmission line, Adaptive technique, MATLAB version6, Arduino Mega2560.
Abstract
A Survey on Collaborative Privacy Management of Online Photo Sharing
K C Shashwathi, M Natesh
DOI: 10.17148/IJARCCE.2016.5465
Abstract: Online Social Networks (OSNs) are popular because of its attractive photo sharing feature among the users. The protection of a person�s private information in online social networking sites like Facebook poses a new challenge. OSNs allow users to restrict access to shared data, but they do not provide any mechanism to enforce privacy over images with multiple users. So, establishing effective method to control personal data and maintain privacy is of great importance within these OSNs. To prevent possible leakage of photo privacy, we enable each individual in a photo to be aware of photo posting activity and participate in decision making of photo posting. This paper reports, a tool called Collaborative Privacy Management (CoPE) which involves content stake-holders in managing privacy policies and ensuring protection of shared photos. Thus OSNs will protect the privacy of true user and provide secure way of sharing a photo. Hence OSNs will be safe and secure.
Keywords: Online Social Network, Photo Privacy, Photo Sharing, Collaborative Privacy Management.
Abstract
Secured Data Transmission in Cloud Using Trapdoor Encryption
Mrs.M.Anandhi, S.Karthi
DOI: 10.17148/IJARCCE.2016.5466
Abstract: The relevance a lot of keywords will change a lot of precise came results, and therefore the preference factors of keywords represent the importance of keywords within the search keyword set nominative by search users and correspondingly permits personalized search to cater to specific user preferences. Individual will remotely store her knowledge on the cloud server, specifically knowledge outsourcing, and so create the cloud knowledge open for public access through the cloud server. It contain sensitive privacy info, they're usually encrypted before uploaded to the cloud. However, considerably limits the usability of outsourced knowledge thanks to the issue of looking out over the encrypted knowledge. during this paper, we tend to address this issue by developing the fine-grained multi-keyword search schemes over encrypted cloud knowledge. The cloud server then uses the cipher text to match the outsourced encrypted keywords, and in conclusion returns the matching results to the search user. to attain the similar search potency and exactitude over encrypted knowledge as that of plaintext keyword search, an in depth body of analysis has been developed in literature. an exploration user queries the outsourced documents from the cloud server with following 3 steps. First, the search user receives each the key key and symmetrical key from the information owner. Second, in line with the search keywords, the search user uses the key key to come up with trapdoor and sends it to the cloud server. Last, she receives the matching document assortment from the cloud server and decrypts them with the symmetrical key.
Abstract
An Integrative Approach for Multipurpose USID Framework Using Radio Frequency Identification: Securities and Challenges
Yogesh Pal, Dr. Neeraj Kumar Tiwari, Sujeet N. Mishra
DOI: 10.17148/IJARCCE.2016.5467
Abstract: Every single soul in this world has its own identity, whether they are of any religion or any motherland. The Unique System ID card for humans currently revolves around textual, image and biometric information. People across globe possess multiple identification cards for their uniqueness to vote, travel, economic activity, driving vehicles etc. But there are problems such as multiple cards issued to single person for same purpose burdens government work. Our proposed model reduces all the conflict issues like Forgery, Privacy, Security, Theft, and Loss of Cards.
Keywords: National ID, Smart card, RFID Tags, Biometric, DNA, API.
Abstract
Animatronic
Prof.Mrs.Y.D.Kapse, Miss. Pooja R. Sarangpure, Miss.Jayashree Mohurle
DOI: 10.17148/IJARCCE.2016.5468
Abstract: Animatronics is a cross between animation and electronics. Basically, an animatronic is a mechanized puppet. It may be pre-programmed or remotely controlled. An abbreviated term originally coined by Walt Disney as �Audio-Animatronics� (used to describe his mechanized characters), can actually be seen in various forms as far back as Leonardo-Da-Vinci�s Automata Lion, (theoretically built to present lilies to the King of France during one of his Visits), and has now developed as a career which may require combined talent in Mechanical Engineering, Sculpting / Casting, Control Technologies, Electrical / Electronic, Airbrushing, Radio-Control. Long before digital effects appeared, animatronics were making cinematic history. The scare generated by the Great White coming out of the water in �Jaws� and the tender otherworldliness of �E.T.� were its outcomes.The Jurassic Park series combined digital effects with animatronics. It is possible for us to build our own animatronics by making use of ready-made animatronic kits provided by companies such as Mister Computers where no programming skills are required.Only knowledge of Windows is required.
Keywords: DMX 512, MIDI protocols, PWM signals.
Abstract
Energy Savings and Improvement Opportunities by Energy Efficient Motors in India
Devangi Jain, Jigar Jain
DOI: 10.17148/IJARCCE.2016.5469
Abstract: In the future, the cost of energy will increase due to environmental problem and limited sources. The electric motors consume a significant amount of electricity in the industrial and in the tertiary sector of the India. Because of its simplicity and robustness the three phase squirrel cage induction motor is the prime mover of the modern industry. The electric motor manufacturers are seeking methods for improving the motor efficiencies, which resulted in a new generation of electric motors that are known as energy efficient motors. This paper deals with energy conservation by installing energy efficient motor (EEM) instead of standard efficiency motor. and One case study. This transition becomes a necessity as a direct result of limitation in energy sources and escalating energy prices. In the end of this analysis there are different practical cases in where EEM is compared with standard motor and rewound motor, In all these cases energy savings can be achieved and the simple payback is less of five years. The energy consumption of electric motors is broken into two categories. Direct energy consumption which is the energy consumed while performing work and indirect consumption the fixed energy consumed regardless of the operational state. So, it is very interesting the implementation of EEM in the industry.
Keywords: EEM, Standard efficient motor, Improvement Opportunities, Energy Saving.
Abstract
Wireless Arduino Based Weather Station
Amber Katyal, Ravi Yadav, Manoj Pandey
DOI: 10.17148/IJARCCE.2016.5470
Abstract: The monitoring of weather is really helpful in various applications like in critical scientific systems or for simulation purposes. In other fields like agriculture, disaster management and medical suited environments. Weather sensing is one of the major functions in aerospace applications to check suited weather environments of other planets too. For example, NASA Mars REMS(Rover Environmental Monitoring Station) for providing daily and seasonal reports. The need for this project came from the support of a fact of very low popular devices and instruments are available that can provide you live weather results. On top of that requirement of accessing it anywhere.
Keywords: Arduino, cc3000, weather station, thingspeak, wireless, portable, weather monitoring.
Abstract
Interpreting the Public Sentiment Variations on Twitter using a open Source Framework
Adithya Aithal, Varun Pai M, Sriram K L, Ramesh, Sandeep B L
DOI: 10.17148/IJARCCE.2016.5471
Abstract: Social Networking sites provide tremendous impetus for Big Data in mining people�s opinion. Public API�s catered by sites such as Twitter provides us with useful data for perusing writer�s attitude with reference to a particular topic, product etc. To discern people�s opinion, tweets are tagged into positive, negative or neutral indicators. This project provides an effective mechanism to perform opinion mining by designing a end to end pipeline with the help of Apache Flume, Apache HDFS, Apache Oozie and Apache Hive. To make this process near real time we study the workaround of ignoring Flume tmp files and removing default wait condition from Oozie job configuration. The underlying architecture employed here is not restricted only to opinion mining but also has a gamut of applications. This paper explores few of the use cases that can be developed into actual working models.
Keywords: Opinion mining, Big data, Hadoop.
Abstract
A Graph Data Summarization and Data Visualization Technique
Stibu Stephen, Dr. R. Manicka Chezian
DOI: 10.17148/IJARCCE.2016.5472
Abstract: A data Analysis and visualization technique poses challenges too many areas of the data mining research. There are several visualization techniques and tools have been proposed for almost all domains. But there is a necessity to summarize and visualize a large citation network data according to the user customization. While performing the visualization, influence data should be identified using the summarization technique. The summarization and visualization of graph structured data is a tedious part in research. The existing state of the art influence maximization algorithms can detect the most influential node in a citation network for all structured data, except graph structured data. Clustering techniques are widely used to fold large graph structured data in existing graphs summarization methods. In this paper, first formally define the problem of data summarization and visualization process with three segments, which are effective summarization, localized summarization and handling high, influenced rich information in citation networks. In general, research filed contains lots of interrelated datas, which has multi associations among the data. To handle the above Graph data visualization and summarization problem, here propose a new prototype named as (GSV) Graph Summarization and GSV algorithm for large scale citation networks. Finally present a theoretical analysis on GSV, which is equivalent to the existing kernel k mean clustering algorithm.
Keywords: Data summarization, visual data mining, Graph mining, GSV.
Abstract
Smart Home Control by using Raspberry Pi & Arduino UNO
Hamid Hussain Hadwan, Y. P. Reddy
DOI: 10.17148/IJARCCE.2016.5473
Abstract: This paper presents a flexible and an inexpensive home control and monitoring system by utilizing network based on Raspberry Pi and using Arduino Microcontroller. The interface between the Access Point and switches with IP connectivity for accessing devices and appliances and controlling it remotely will be made by using Android based Smartphone application or server computer. This switch node connected to electrical devices that can be controlled using sensor and remotely controlled through an access point, the Smart Switch system for Smart Home development consists of two major parts that are smart switch device and the access point. The main hardware for this system contain: Raspberry Pi, Arduino Microcontroller, nRF24L0+ Wireless Transceiver, Relay Modules, Gang Switches, Lamps, Plugs, Sensors and Wire Set. Expected outcomes from this system: programming by using Python that comes built-in with Raspbian, Wireless module adapter to make connections between the Arduino Microcontroller and nRF24L0+ Wireless Transceiver.
Keywords: Smart Home, Raspberry Pi, Arduino UNO R3, wireless sensor network, Android, Home Automation.
Abstract
Image Processing Segmentation Based Verification of Secured Fingerprint Using Computational Geometry Algorithms
S. Mohan Kumar, A. Saran Kumar, S. Selvaraj, M.G. Sezhiyarasan, Mr. K. Sridharan
DOI: 10.17148/IJARCCE.2016.5474
Abstract: In Our Project Presents fusion of three biometric traits, i.e., iris, palm print and fingerprint, at matching score level architecture using weighted sum of score technique. The features are extracted from the pre-processed images of iris, palm print and fingerprint. These features of a query image are compared with those of a database image to obtain matching scores. The individual scores generated after matching are passed to the fusion module. This module consists of three major steps i.e., normalization, generation of similarity score and fusion of weighted scores. The final score is then used to declare the person as Authenticate or Un-Authenticate with Secret Key Analysis.
Keywords: Multimodal, multi-resolution, curvelet tranform, ridgelet transform, score combination, weighted similarity.
Abstract
A Survey of Peer- to-Peer Networks
Rajesh Kumar Maurya, Prof. Suman Pandey, Vinod Kumar
DOI: 10.17148/IJARCCE.2016.5475
Abstract: Peer-to-peer (P2P) networks are used to the consideration ofa worldwide with their excessive success in the file sharing in the networks (such as Napster, Gnutella, Kazaa, BitTorrent, JXTA and Freenet). Increase the popularity of (Peer to Peer) P2P networks has been witnessed by millions of Internet users. In this paper, an analysis of network architectures evolution, from client to server Peer to Peer (P2P) networking, will be given, underlining the benefits and the probable problems of existing approaches, which provides essential theoretical base to drive future generation of distributed systems. Peer to Peer (P2P) are important improvements on large scale DS (distributed systems) design and evolution of the Internet architectures. Widely used applications have a great pact of thepractical result has been followed in the research area for improvement. (P2P) Peer-to-Peer content/file sharing, mediastreaming, and telephony applications. There are a large range of other applications under improvement or being proposed. The underlying architecture shares the feature such as decentralization, sharing of system resources, virtualization, autonomy and self-organization. These features constitute the P2P paradigm. [1].
Keywords: Peer-to-peer (P2P), DS (distributed systems), decentralization, telephony applications.
Abstract
iTwin Technology
Gole Akshay B, Shaikh Asif M, Assistant Prof. Y.V. Kadam
DOI: 10.17148/IJARCCE.2016.5476
Abstract: USB flash drive is device that is used to store the data. Cloud storage is also used to store the data on the middle server. But the USB flash drive has the drawback that it is too small in size, because of that it can be easily misplaced or lost. In case of cloud storage data can be misused if the username and password is hacked by someone else. To overcome all these problems, iTwin is the best solution. It is the secure USB device that can be used to access, share & edit all the files and media between any two online computers anywhere in the world. It allows remote file access without any security and privacy risks.
Keywords: AES (Advanced Encryption Standard), PC (Personal Computer), USB (Universal Serial Bus), VPN (Virtual Private Network
Abstract
Color, Shape and Texture feature extraction for Content Based Image Retrieval System: A Study
Miss. Dhanashree S. Kalel, Miss. Pooja M. Pisal, Mr. Ramdas P. Bagawade
DOI: 10.17148/IJARCCE.2016.5477
Abstract: Content based image retrieval system is the most interested topic for researchers in these the three visual features are considered as color, shape and texture, these terms are refers as content in a content based image retrieval system. Although the visual features are not give accurate result but colour, shape and texture are used because they are easier to assimilate into mathematical calculation. Color, shape and texture are most widely used contents for content based image retrieval system. The goal of content based image retrieval system is that to retrieve query image from large database. Color shape and texture extracted feature for given query image and measure the similarity from database image and retrieve the similar images as a query image extraction features.
Keywords: Content Based Image Retrieval System.
Abstract
Speed Control of DC Motor by using PWM
Khan Masoom Raza, Mohd. Kamil, Pushpendra Kumar
DOI: 10.17148/IJARCCE.2016.5478
Abstract: In industry DC motor is widely uses for speed control and load characteristics, it's easy controllability provide effective and precise output so application of DC motor is large for commercial purpose. Speed control of DC motor is very crucial in application where required speed is precision and correcting signal representing and to operate motor at constant speed, so we used PWM method which are fulfill all requirements to speed control of DC motor. PWM based speed control system consists of electronic components (integrated circuits, Sensors etc.). In this paper, to control the speed of DC motor using Pulse Width Modulation (PWM) method. Microcontroller AT89S52 is used to generate PWM. L293D IC is used to drive the motor which is made up of two H-Bridge. 555 IC is used with opto coupler to sense the speed of DC motor. Rectifier circuit is used for power supply to circuit and motor. This paper shows that precise and accurate control of small DC motors can be done efficiently without using costly components and complicated circuit.
Keywords: DC motor, H-bridge, Pulse Width Modulation, IR sensor.
Abstract
A Brief Study in Noise and Filtering for Dermoscopic Images
D. Saranya, Dr. V. Radha
DOI: 10.17148/IJARCCE.2016.5479
Abstract: Noise is one of the main problems of digital image processing. The noise in an image is a disturbance while performing operations in the image processing. Medical images plays vital role in digital image processing. In dermoscopic images, the unwanted hairs on skin lesion, air bublles etc., are considered as noise. Noise can be removed in the preprocessing stage through filtering. Filtering is the technique used in preprocessing to make the image a clear and eligible manner so that other process can be further continued without any disturbances. This paper mainly focuses on the noise in an image and filtering used to remove the noise.
Keywords: Noise, Filtering, Images, Pixels, Preprocessing.
Abstract
A Study on Artificial Intelligence and Its Applications
D. Saranya
DOI: 10.17148/IJARCCE.2016.5480
Abstract: In the current scenario AI plays in vital role in various fields such as medicine, robotics, etc. This paper discuss about the artificial intelligence, its functions, advantages, disadvantages and its applications. In future, the intelligent machines will be replaced to improve the capability of a human in many areas. The intelligence of AI is revealed by machines or software. It also the subfield of computer science, now a day�s becoming popular in power station.
Keywords: Artificial Intelligence, Medicine, Robotics, Human Intelligence.
Abstract
E&I Connect A Java Application with Database Connectivity
Vikash Kumar, Ronak Kumar, Siwasis Patro
DOI: 10.17148/IJARCCE.2016.5481
Abstract: Recent Status: This project provides an interface to break the gaps between: 1. Student � Teacher 2.Student � Alumni 3.Teacher-Parent 4.Student-Student. Among many other reasons, the main reason for creating the project is to reduce the communication gap and information gap between student and teacher. Mostly, it is seen that the students are unable to communicate with the teachers and hence there is a communication gap that creates disability in creating a bond between the student and the teacher, which is very much essential. There is no common interface for student-teacher communication and in case if any student is unable to communicate face to face like for any problem to sort out. There are many students who want to share their views regarding their self-development or mutual development. It consists of an area where the students can share their point of view and also provides an area called �Grievance Cell�, where the HOD (head Of Department), and teachers can give their suggestion and advise for students for improving or polishing their skills. Here, the students will be benefited as they get an option for a path to choose, what they are going to do further. Most of the student is unable to go through the notice board. It consists of an area where the users (student and teachers) get each and every details like: 1. Result 2. Attendance 3. Noticeboard 4. Notes 5. Grievance cell 6. Fun time 7. Ask me please 8. Update account 9. Chat 10. Support
Keywords: Software Interface; attendance, result and notice; Queries; Proctor.
Abstract
A Survey on Ring Authentication in Multi-Cloud Environment
Harshitha K, Poornima B G
DOI: 10.17148/IJARCCE.2016.5482
Abstract: The follow of using remote servers massed on internet to store and manage data is known as cloud computing. Both the hardware and systems software in the data centre provides the application services on the internet. Integrity of data storage in cloud has become a major confront. Hence, facilitating public auditability for cloud is important with intension that users can route to a Third party Auditor (TPA) to check integrity. TPA executes audit for multiple users all together efficiently. This paper brings out a survey on different auditing mechanisms.
Keywords: Cloud Computing, Integrity, Public Auditing, Third Party Auditor (TPA).
Abstract
A Combined Approach for Effective Text Mining using Node Clustering
Yogendra Singh Rajput, Priya Saxena
DOI: 10.17148/IJARCCE.2016.5483
Abstract: Text Mining is an important step of knowledge discovery process. Text mining extracts hidden information from not-structured to semi-structured data. It is the discovery by automatically extracting information from different written resources. There is a two basic methods used in text mining which is term based and phrased based approach; both methods have their merits and demerits. We proposed a combined approached to mine effective text form text documents using advantageous of methods, term based and phrases based simultaneously. The experiment results show the efficiency of the work.
Keywords: Text mining, pattern mining, pattern evolving, information filtering.
Abstract
Bus Bunching Avoidance System
Mrityunjaya D H, Pankaj Walvekar, Manoj Awaji
DOI: 10.17148/IJARCCE.2016.5484
Abstract: In the era of ever increasing demand for vehicles brings forth various inherent problems with the large vehicle populous such as traffic congestion, fatal accidents, vehicle bunching etc. One of the problems caused by buses specifically is bus bunching. It is the tendency of buses to converge at a bus stop which is majorly due to traffic conditions, where buses tend to clump. Another reason is due to communication gap between buses drivers due to which multiple buses converge at the same bus stop. In this paper an idea to overcome this problem is presented.
Keywords: Microcontrollers, RF signals, GSM, Protocols, Antennas.
Abstract
Pill Camera
Miss. Anchal Khadse, Prof. S.O. Dahad
DOI: 10.17148/IJARCCE.2016.5485
Abstract: The aim of technology is to make products in a large scale for cheaper price and increased quality. As the current manufacturing technology is at macro level but the future lies in manufacturing product at molecular level. On the basis & advent of nanotechnology one such product manufactured is pill camera. �Camera Pill� or Capsule endoscopy is a new diagnostic tool that permits a direct visual examination of the small intestine, an area of the body not previously accessible using upper endoscopy from above or colonoscopy from below. The pill, known as the Capsule Endoscopy, is about the size of a multivitamin and is swallowed with a sip of water. The pill is made of specially sealed biocompatible material that is resistant to stomach acid and powerful digestive enzymes and thus every care is taken such that the caps will not rupture or burst. Its non-invasive diagnostic alternative that is relatively quick, easy, office based test that will encourage people to see their doctors to get checked for diseases, Capsule endoscopy helps your doctor evaluate the small intestine. This part of the bowel cannot be reached by traditional upper endoscopy or by colonoscopy. The most common reason for doing capsule endoscopy is to search for a cause of bleeding from the small intestine. It may also be useful for detecting polyps, inflammatory bowel disease (Crohn�s disease), ulcers, cancers, andanemia and tumors of the small intestine. It takes picture of our intestine and transmits the same to the receiver of the computer for analysis of our digestive system. This process can help in tracking any kind of disease related to digestive system.
Keywords: colonoscopy, endoscopy, polyps, crohn�s disease.
Abstract
A Survey on Image Embedding In QR Code
Sarita H. Yadav, Prof. N.A. Dawande
DOI: 10.17148/IJARCCE.2016.5486
Abstract: Quick response (QR) code is a barcode widely used in many applications such as manufacturing, marketing, product tracking etc. The appearance of QR code can be improved by embedding image in to code. This paper explains the basic concept of QR images, a various exist methods to embed QR codes in to images. These embedding are suitable with standard decoding applications and can be applied to any color images with full area coverage. This insertion takes benefits of the support of QR readers against interruption of image luminance, the important information in QR code bits are transformed in to luminance values of the aimed image which is to be aimed. To minimize the visual distortion of the QR image, the algorithm uses half toning masks for the selection of modified pixels and techniques to locally optimize luminance levels of the QR image. In order to minimize processing time, the optimization technique consider the mechanics of a common binarization method, genetic algorithm etc.
Keywords: QR code, Image embedding, Multi resolution Half toning, half toning, genetic algorithm, DWT.
Abstract
Machine Learning: Applications in Indian Agriculture
Karandeep Kaur
DOI: 10.17148/IJARCCE.2016.5487
Abstract: Agriculture is the mainstay of a developing economy like India. Majority of its population depends on agriculture for their income. With depleting resources, reducing land sizes and increase in input and labor costs, combined with the uncertainty of various factors like weather, market prices etc, agriculture in India has become a profession which is full of risks. The advancements in technology must be worked upon across various disciplines and it has already shown dramatic improvements in many fields. However, agriculture has not benefitted much from such advancements. Smart farming is the need of the hour of the Indian economy. Machine learning is an imminent field of computer science which can be applied to the farming sector quite effectively. It can facilitate the up-gradation of conventional farming techniques in the most cost-friendly approach. The purpose of this paper is to broaden the farming horizon by listing and evaluating the different applications of machine learning in Indian agriculture and to help the farmers advance their work up by many notches.
Keywords: Indian Agriculture, Farming, Machine Learning, Applications.
Abstract
Cervical Cancer stage prediction using Decision Tree approach of Machine Learning
Sunny Sharma
DOI: 10.17148/IJARCCE.2016.5488
Abstract: Cervical cancer is the largest common cause of cancer deaths in women around the world. It affects the cervix in the female reproductive system which leads to death. To identify the stages of cervical cancer the decision trees are very helpful. They classify the stages of the cervical cancer and help the oncologist to detect the cancer. The proposed way use the data set obtained from (http://www.igcs.org) & predict the stages of cervical cancer using See5 tool.
Keywords: Cervical Cancer prediction; Machine Learning; See5, Decision Tree; C5.
Abstract
Analysis of Secure Data Aggregation Technique for Wireless Sensor Network in the Presence of Adversary Environment based on IF algorithm
Uma Angadi, Dr. G.F Ali Ahammed
DOI: 10.17148/IJARCCE.2016.5489
Abstract: As we have limited energy resources and computational power, data aggregation from multiple sensor nodes is done using simple methods such as averaging. WSN�s are usually unattended, they are highly vulnerable to node compromising attacks. Thus making it necessary to ascertain trustworthiness of data and reputation of sensor nodes is crucial for WSN. Iterative Filtering algorithms were found out to be very helpful in this purpose. Such algorithms perform data aggregation and provide trustworthiness assessment to the nodes in the form of weight factors.These algorithms simultaneously aggregate data from multiple sources and provide a trust estimation of these sources, usually in a form of corresponding weight factors assigned to data provided by each source. In this paper we analyzed some secure data aggregation mechanisms and introduced a new complicated collision attack with its impact on wireless sensor networks.
Keywords: Collusion Attacks,data aggregation,Iterative Filtering Algorithm,wireless sensor network.
Abstract
Data Mining and Visualization Techniques
Priti Vilasrao Bhagat, Rina Kisanrao Gadge
DOI: 10.17148/IJARCCE.2016.5490
Abstract: Visual Data Mining is a new approach for exploring very large data sets, combining traditional mining methods and information visualization techniques. The advantage of visual data exploration is that the user is directly involved in the data mining process, through analysis the results of the information visualization, user can integrate the specialist knowledge with the data mining algorithm. This paper presents current visualization methods applied in data mining.
Keywords: Visualization Techniques; Visual Data Mining; Data Mining.
Abstract
Rendering Dis-Occlusion by Modified Exemplar Based Inpainting Technique
Surya Pushpakaran, Flower Abraham Mundackal
DOI: 10.17148/IJARCCE.2016.5491
Abstract: Inpainting is a technique of rendering an image in an undetectable form. Inpainting technique is applicable for restoration of scratched photograph, removal of undesirable objects , reconstruction of 3D surfaces etc. Here we are using a modified exemplar based inpainting [1] to remove occlusion from an image. Here we are using a modified data term from gradient based data term. Here in this paper we remove object(s) from digital photographs, and then fill the hole with information extracted from the surrounding area. The modifications we introduced are, changing the window size after each iteration and a modified data term is used.
Keywords: Confidence Term, Data Term, Priority Term, Source region, Target region.
Abstract
Automatic Protection of Clothes from Rain
Prabhakar Hegade, Sunil Nayak, Parashuram Alagundi, Kiran M R
DOI: 10.17148/IJARCCE.2016.5492
Abstract: As the advancement in science & technology is developing, the human comfort & needs are also increasing proportionally. As all the branches of engineering are working on fulfil these needs and among all those the �ELECTRONICS� is one of the most important branches to respond to these needs. This paper entitled �AUTOMATIC PROTECTION OF CLOTHES FROM RAIN� is small step towards the comfort ability and save our time. By considering above views, which encourage us to choose such a project. Though this project is low cost, easy to understand & simple in construction, this project helps for next generation.
Keywords: Microcontroller, Driver circuits, Sensor system, Power supply.
Abstract
Trainable Intelligent Autonomous Vehicular System for Real Time Applications
Pavan Gupta, Prof. P.D Saraf
DOI: 10.17148/IJARCCE.2016.5493
Abstract: In this project our main aim is to develop a system wherein an individual can train robots and teach them how to perform a task by showing them how it is done by actually performing the task once. This type of system would reflect on the human methods of teaching wherein a teacher teaches a student how to perform a task by showing them how it is done by actually performing it once himself. As a child observes and learns the teacher�s methods and actions and tries to repeat the same when he tries it himself, our system will install the same characteristic into our robot as well. For the purpose of presentation of such a system, we will implement an algorithm or a procedure via which the robot will record and learn the actions when performed by the user or the trainer in the learning phase which is nothing but when the user is performing and teaching the action to the robot for the first time. We will derive a technique or a mechanism via which these actions can be stored, altered and replayed. Also, filters, acceleration, slow motion replays are also be included. We are going to create the dummy model of a vehicular robot to demonstrate the system. The user will guide or train the robot to run on certain track or paths by manually driving it once, after which the robot will record, learn and execute the task itself.
Keywords: Real-time control, Experience replay (ER), reinforcement learning (RL), Q-learning, robotics.
Abstract
Pre-Indication of Battery Life for UPS
Nikita Biradar, Trupti Kate, Manisha Kawade, Mrs. S.V. Patil
DOI: 10.17148/IJARCCE.2016.5494
Abstract: The main objective of this project is to provide uninterrupted power supply to a load, by switching automatically battery. The demand for electricity is increasing every day and frequent power cuts is causing many problems in various areas like industries, hospitals and houses. An alternative arrangement for power source is a must. In this project uses four switches to demonstrate the respective failure of that battery .When any of the auto switches is pressed it shows the absence of that particular source, switches are connected to system. The output of switches is given to the relay driver IC, which auto switches appropriate relay to maintain uninterrupted supply to the load. The output shall be observed using a LED drawing power supply from first battery initially. On failure of the first battery load is shift to another battery.
Keywords: Uninterrupted power supply (UPS),Liquid Crystal Display(LCD), Threshold voltage(Vth).
Abstract
Design Approach to Realise SoC to Generate Time Stamping Signal from Satellites and Updating on Ethernet for Synchronization
K. Padmanabham, Prabhakar Kanugo, K. Nagabhushan Raju
DOI: 10.17148/IJARCCE.2016.5495
Abstract: The objective of this research paper is to design a �System-On-Chip (SoC)� having required modules/functional blocks in a single chip to generate accurate timing signal, derived from the satellites (GPS) signals, these are called �Timing Systems�. The timing signal is distributed over Ethernet network using protocols like Serial, IRIG, NTP etc for time stamping, time updation & to use for synchronization of systems. The satellites (GPS) signals are generally from GPS / GLONASS / GALILEO satellites constellation. The satellite signals are received and through the process of triangulation precise position of the receiver and thereby accurate time information is derived. In the absence of signals from the GPS satellites, the time updation process continues with a local clock source built with in the SoC.
Keywords: SoC, FPGA, GPS, NTP, IRIGB, Ethernet, TGL, PTP, IP Core, Acquisition, Tracking.
Abstract
Color Grid Based Authentication Session Using Hash Technique
Prof. Renuka Nagpure, Harsh Desai, NinaadSuvarna, Dipen Desai, Simranjeet Singh Chawla
DOI: 10.17148/IJARCCE.2016.5496
Abstract: Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, we proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.
Keywords: Authentication, cryptographic hash function, graphical password schemes, session passwords.
Abstract
Study on Systemization of Fuzzy Logic and Engine using Mining Concept
Harish.R, Gowtham Prassanaa.N, Harshal Golcha, Harikrishna Pillutla
DOI: 10.17148/IJARCCE.2016.5497
Abstract: In big data on measuring relationships between number of objects in Wikipedia whose pages can be considered as separate objects. Most of the users does not know searching using Google and don�t know about Wikipedia website. Previously searched data is used in reducing the real time traffic; thereby it changes traffic situations automatically. In our proposed system we included the distributed scenarios with the global traffic prediction. Using the maximum generalized flow technique [8], the three concepts such as distance, connectivity, and clustering is used in our method. External and internal relationship methods are targeted [5], [4].Mining elucidatory objects would open a novel way to deeply understand a relationship.
Keywords: Mining Of Wikipedia, separate objects relationship on Mining, Analysis on link, Maximum Generalized Flow.
Abstract
Augmenting QoS in Cloud by Utilizing load balancing algorithm
Prabhu.B , Rohit.V, Vengatesh.R, Vignesh.J, Harikrishna Pillutla
DOI: 10.17148/IJARCCE.2016.5498
Abstract: Cloud is combination of server and computer that are interconnected together to provide resources to clients. It expose as a new brand computing prototype that aims to supply reliable, custom-made and QoS (Quality of Service) and dynamic environments for end customers. In cloud environment the resource allocation plays a major role in the performance of entire system and also the customer satisfaction provided by the system. In the proposed system, the main goal is to provide equal and distributed load over all the processors. Various strategy algorithm and policy has proposed and implementing Load balancing in Cloud environment. The paper, we represent a WRR algorithm combined with queuing algorithm applied to expeditiously order computation jobs among the processors onto the cloud datacenters with less communication overhead.
Keywords: Cloud Computing, QoS, WRR algorithm, Load Balancing.
Abstract
L-slotted Microstrip Patch Antenna for WiMAX and WLAN Applications
Danish Hayat
DOI: 10.17148/IJARCCE.2016.5499
Abstract: This paper is based on design and simulation of rectangular Microstrip Patch Antenna with double L slots which covers the frequency range of WiMAX and WLAN applications. The basics and fundamentals of Microstrip patch antenna is also covered in this paper. The various parameters of the antenna are the dimensions of the patch and ground planes and the separation between them and this antenna is fabricated using an h=1.6mm thick FR4 substrate (?r=4.4). The design and simulation of the antenna is carried out using CST microwave Studio suite. The design is a double L shaped Microstrip Patch Antenna that uses defected ground plane which covers the entire WiMAX and WLAN range. Return loss curve, E-field, H-field, Voltage standing wave ratio (VSWR) for designed antenna are shown. The proposed antenna has return loss of -20 dB at 3.5 GHz and -14db at 10.2 GHz This shows that the proposed antenna covers WLAN and WiMAX range. This design results in a reduction in size and weight and allows easy integration in hand-held devices.
Keywords: Flame Retardant 4(FR4), worldwide interoperability for microwave access (WiMAX) and wireless local area network (WLAN), Computer Simulation Technology (CST), Voltage standing wave ratio (VSWR).
Abstract
A Survey on Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability
Shruthi L, D Khasim Vali
DOI: 10.17148/IJARCCE.2016.54100
Abstract: Cloud computing has been envisioned as the de-facto solution to the increasing storage cost of IT enterprises. The cloud vendors, customers and different pricing policies are confused to choose suitable cloud(s) for storing their data and to choose the cheaper methodology Apart from the reduction in storage moves the user�s data outsourcing to the cloud also helps in reducing the maintenance .This paper provides a scheme which gives a proof of data integrity in the cloud which the customer has employ to check the correctness of his data in the cloud. This strategy ensures that the storage at the client side is minimal which will be beneficial for thin clients.
Keywords: CHARM, multi-cloud, efficient, suitable cloud data hosting.
Abstract
Comparison of Ontology Ranking Algorithms on Semantic Web
S.Sudha, Lakshmi.S
DOI: 10.17148/IJARCCE.2016.54101
Abstract: Semantic Web is the representation of knowledge which consists of a huge amount of ontologies. Ontologies provide an efficient way to reduce the amount of information overload by defining the structure of a specific domain and enabling easier access to the information. Ontology search can prove its excellence only when the retrieval involves highly relevant information based on the user�s query. The ranking method increases the scope of knowledge searching in ontology-driven searches. This paper reviews most of the ontology ranking methods used, which will help researchers to proceed further.
Keywords: Semantic web, Semantic search, ontology, ontology ranking.
Abstract
A Review on MRI Brain segmentation and classification techniques
Shrikrishna A. Gade, Prof. S. D. Sawant
DOI: 10.17148/IJARCCE.2016.54102
Abstract: MRI images plays important role in auxiliary radiologists approaches for diagnosis and treatment. It is an inventive classification technique to notice normal and abnormal MRI brain image. Medical image like ECG, MRI and CT-scan images are important way to diagnose disease of human being efficiently. The standard analysis of tumor based on visual check up by radiologist is the conjugative method, which may lead to wrong classification when a large number of MRIs are to be analysed. The prospect of endurance can be expanded if the tumor is observed perfectly at its recent stage. Magnetic resonance imaging (MRI) technique is used for the study of the human brain. Segmentation techniques locate tumor location. In this review, classification techniques based on Support Vector Machines (SVM) are suggested and tested to brain image classification with the help of segmentation. The main objective of this paper is to provide a magnificent result of MRI brain tumor classification using SVM. The different segmentation and classification techniques are described here. An efficient techniques are used for segmentation and classifications.
Keywords: Brain tumor, magnetic resonance imaging, support vector machine, ANN.
Abstract
Enhancing Lifetime of Nodes in Wireless Ad Hoc Sensor Network by Preventing Vampire Attack
Sapna Yadav, Nilesh Sambhe, Vikas Palekar
DOI: 10.17148/IJARCCE.2016.54103
Abstract: Network survivability is the ability of a network getting connected under failures and attacks, which is the most important topic in the design and performance of wireless ad hoc sensor networks. The motivation of a large portion of research efforts has been to increase the network lifetime, where the lifetime of network is measured from the instant of deployment to the environment when one of the nodes has exhausted its limited power source and becomes in-operational which is commonly referred as first node failure. But there is a class of resource consumption attack called vampire attack whose work is to permanently disable the whole network by quickly draining nodes battery. The paper projects its focus on the way in which the attack should be overcome in the best possible manner. The security work in the wireless sensor network area which is priority and primarily focusing on denial of communication at the routing or mac levels. In this paper, the attack which is mainly focusing on the routing protocol layer that type of attacker is known as the resource depletion attacks. This attack causes the impact of disabling the networks by drastically draining the nodes battery power. This paper presents the detecting and preventing the lifetime of node by vampire attack and also the data security using the secret sharing algorithm.
Keywords: wireless sensor network, AODV, secrete sharing algorithm, DOS, MAC.
Abstract
Study and Literature Survey for Brain Tumor Detection and its Area Measurement using Genetic Algorithm Based on K-Means Clustering
Arnavi Patil , Prof. Sanjay S. Badhe, Prof.Ashish Mulajkar
DOI: 10.17148/IJARCCE.2016.54104
Abstract: The brain is the main processing unit of the central nervous system and its structure is very complicated. Tumor is nothing but an unstoppable growth of tissues in any part of the body. Tumors are of different types and characteristics and also have different treatments. Brain tumor extraction and its analysis are challenging tasks in medical image processing because brain image and its complex structure. Segmentation is applied in medical images is an essential process in analyzing and curing an illness. Thus, it is obvious that the purpose of clustering in medical images is the recognition of damaged areas in tissues. Here a brief review of different segmentation techniques has been discussed for detection of tumor from Magnetic Resonance Imaging (MRI) of brain. Finally we propose an automatic tumor detection system using image segmentation method.
Keywords: MRI ,brain tumor, image segmentation, k- means clustering, Genetic Algorithm.
Abstract
Enhanced Security as a Service to Protect Data in Public Cloud Storage
S. Balamurugan, Dr. S. Sathyanarayana
DOI: 10.17148/IJARCCE.2016.54105
Abstract: Cloud provides computing resources as an on-demand service. The main service of cloud is data storage. It has different data centre to maintain and monitor user data. It is more reliable storage but it has many security related issues. To address this security issues in the cloud, this paper proposes a security framework comprises of three main services for security, key and storage. Security is provided as a service to users. This framework consists of two security services for different types of data. Users have to choose any one security service based on their choice. Key generation is another service in the framework which provides key for security service by the way of sending the key directly to the users. Keys used for security service are not known to other cloud service in the framework. The framework protects attacks from inside and outside the cloud. It enhances the security in the public cloud environment.
Keywords: Cloud Storage; Security Service; SECaaS; KaaS; STRaaS;
Abstract
Asynchronous Checkpointing Algorithms for Wireless Ad-hoc Network: A Simulated Analysis
Jawahar Thakur, Arvind Kalia, L. K. Awasthi
DOI: 10.17148/IJARCCE.2016.54106
Abstract: To add high availability and reliability to mobile networks, checkpoint based rollback recovery techniques are widely applicable. Checkpointing methods for traditional distributed systems cannot be applied directly to the mobile networks. The main focus in a single process checkpointing protocol is on ?nding optimal checkpoint interval to minimize the loss due to any fault, but in a distributed environment the main focus is on ?nding out and saving a global consistent state of the system. The challenge in ?nding a global consistent state is that interprocess communication creates dependencies that must be factored, otherwise the global checkpoint becomes useless. Mobile ad hoc networks throw up a plethora of challenges in tracking interprocess dependences including how to reliably save checkpoints in face of transience and node failures, where to save the checkpoints and how to reconstruct the stable global state from the nodes which are available after the fault. This paper present the simulated performance analysis of couple of uncoordinated checkpointing protocols for wireless ad-hoc networks on the basis of different size clusters, different number of recovery messages, different numbers of failures, and different recovery time.
Keywords: checkpointing, uncoordinated, recovery, simulation, algorithm, cluster.
Abstract
Building Distributed Database Application in Training Management
Nguyen Le
DOI: 10.17148/IJARCCE.2016.54107
Abstract: Currently, the majority of the training management systems of the University and the College are built in the centralized database model, database is stored in a server and all operations as module registration, imported scores from the Training Department or course management of teachers, etc. are accessed directly to the same server and they can cause overload processor for the server, and have reduced performance and sometimes affected the safety of system. So in this paper, we research and build the distributed database model as well as proposal of the distributed database model in training management and synchronization solution
Keywords: training management, distributed database, synchronization, replication, training department.
Abstract
Analysis for Image Quality Improvement using Denoise Filtering Techniques
Pranali Turkhade, Prof. U.W. Hore
DOI: 10.17148/IJARCCE.2016.54108
Abstract: This paper work describes the different denoise techniques for the removal of impulse noise. The Image denoising is the manipulation of the image data to produce a visually high quality image. Image Enhancement is one of the most important and difficult techniques in image research. The aim of image enhancement is to improve the visual appearance of an image or to provide a better transform representation for future image processes. At present there are a variety of methods to remove noise from digital images. Filter techniques are mainly used for de-noising, smoothness and sharpening of images. We are designing a new modified decision based un symmetric and Symmetric trimmed median filter for removal of these different noises by using median filter, Adaptive median filter, and Decision based Adaptive median filter. Most of the previously known techniques are applicable for the denoising of images corrupted with less noise density. Here a new decision based technique has been presented which shows better performances than those already being used and the new proposed algorithm will definitely protect the image from noise and distortion. In this paper we present different denoise filtering techniques for image quality improvement and this concept is applied to the different images and compares their performance parameters such as MSE, PSNR, correlation etc.
Keywords: Impulse Noise, Non Linear Filters, MSE, PSNR, Correlation.
Abstract
Fundamentals of Aerial Robotics & Applications
Utkarsh Sahu, Akshay Chakole, Rajat Vidhate, Pranoy Singh Bandwal, Akshay Dube, Umesh Bobde
DOI: 10.17148/IJARCCE.2016.54109
Abstract: Aerial robotics can be used in the application of research and research operation in which it will automatically and accurately detect the disaster places such as collapsed buildings, fire, forest fire etc. And provide the guidance to the ground reserve team and could save the time. Aerial Robot is the only solution to reach to inaccessible places to take images and collect the information in natural disaster and environment protection. AERIAL ROBOT is used in various fields and it can contribute a lot in development and enhancement.
Keywords: Aerial robotics, Drone, Agriculture, Medical, Motor, Sensor.
Abstract
Coin Based Solar Mobile Charger Using MATLAB
Ovanalil Jerry Mathews, Praise K James, K G Satheesh Kumar
DOI: 10.17148/IJARCCE.2016.54110
Abstract: This paper describes coin based solar mobile charger using MATLAB. Mobile phone�s become a major source of business/personal communication in this era; the mobile phone business is currently worth billions of dollars, and supports millions of phones. The need to provide a public charging service is essential. Many critics argued that a public mobile phone charging service is not a lucrative business because most users can charge their phones at home, in their office or in their cars. Coin operated mobile phone charger is new business milestone because many are attending business conventions and forgetting their charger at home or work place. Students and many people use the public transportation that don�t know that their level of their battery is low are prospective customers for coin operated mobile phone charger service. Recommended locations include: Hotels, Conference centres, Exhibition halls, Serviced offices, Exchange halls, Motels, Leisure centres, Health clubs, Training centres, Golf clubs, Retail outlets, Shopping malls, Internet cafes, Universities, Colleges, Hall of residence, Airports, Train terminals, etc., so that the mobile phone users can reactivate a low or dead battery by simply plugging in and charging for one, two or five rupee. This is designed based on PIC16F877A a 40-pin micro controller which works on the basis of the coin detection MATLAB codes.
Keywords: Webcam, LDR, LCD Display, Solar Panel, Relay, Microcontroller, Motor Driver, USART, Mobile Phone, Solar panel.
Abstract
Android Based LAN Monitoring System
Avinash Sasidharan K, Tushar Nerkar, Kartik Purohit, Harsh Devani, Prof. Amruta Pokhare
DOI: 10.17148/IJARCCE.2016.54111
Abstract: Nowadays android phones are used for various purposes that are used in our daily life[1]. Similarly android phones can be used for supervising and regulating computers over a LAN network. We used Wi-Fi network to make a connection between a mobile phone and a personal Computer through servlet socket programming in java. The Wi-Fi network acts as a platform for sending and receiving commands and messages between the server and the client. Here the android phone is used as a server and the computer as a client. The server program sends some data as a command to computer�s communication port. There is a client program in computer which read�s the data from the communication port and executes the commands present in the data. Using Android SDK we have created an interface to monitor process on Android Device. The communication between Android Device and Computer is done by using PHP with Wamp Server in Backend. When the user/admin start�s the Android interface he/she can fetch all the process information from the server and display it on the android device. The user can perform various operations using the Android device, the user/admin can perform various actions on the computers connected in a LAN network.
Keywords: Android application, LAN supervising, Wi-Fi Network, Tomcat Apache, mobile, Servlet.
Abstract
Analysis and Comparison of Various Sense Amplifier Topologies for SRAM
Vipul Bhatnagar, Sonali Shrotriya
DOI: 10.17148/IJARCCE.2016.54112
Abstract: Sense Amplifier are one of the most crucial circuits in the field of CMOS memories. Memory access time and overall memory power dissipation both are resultant by their performances. The existing Current Mode Sense Amplifier has ability to quickly to amplify a small differential signal Bit Lines (BLs) and Data Lines (DLs) to the full CMOS logic level without requiring a large input voltage swing. Here Analysis and Comparison done using 45nm CMOS technology shows Sensing Speed, Reliability, Power Consumption can be improved to a considerable extent. Power dissipation is improved.
Keywords: Current Controlled SA, Cache Memory, Low Power, Sense Amplifier.
Abstract
A Statistical Approach for 3D Hand Gesture Recognition
Venkat Raman B, S Gupta and Mohmmad Akram Pasha
DOI: 10.17148/IJARCCE.2016.54113
Abstract: In our daily life, gesture plays most important role and in order to convey data and motions of human being. The process of main aim is Hand gesture recognition can be seen as a way for computers to begin understand human body language , thus building a richer bridge between machines and humans. Current focuses in the field is recognition the hand in whole object and which can be used as a command by user. Many approaches have been made using cameras and computer vision algorithms to interpret sign language . This paper presents a some works on 3D hand gestures motion without using sensors. We first review the how to recognize the hand gesture by using HAAR features . Then, we review the research for 3d hand gesture recognition.
Keywords: Hand detection, hand identification ,motion detection, input image, training data base.
Abstract
Design and Implementation of FM0/Manchester Encoder using VHDL
D.Durga Prasad, Ch.V.V.S.Srinivas, K.Kiran, A.K.Chaitanya Varma
DOI: 10.17148/IJARCCE.2016.54114
Abstract: The dedicated short range communication (DSRC) is an important technique to push the intelligent transportation system (ITS) into our daily life. The transmitted signal is anticipated to have zero mean for vigor issue and this is also referred as dc-balance. The FM0 and Manchester codes are used to reach the dc-balance in DSRC. The FM0 encoder and Manchester encoder structures are different, so that limited to reuse the VLSI architecture for generating both the codes. In this work, the similarity oriented logic simplification (SOLS) scheme is used to conquer this limitation. The hardware utilization rate (HUR) of FM0 and Manchester encoders are raised from 57.14% to 100% with SOLS technique. The SOLS technique based FM0 and Manchester encoder structure has better performance compared with existing structure.
Keywords: The dedicated short range communication, Manchester, FM0, VLSI Design.
Abstract
A Study on Data Mining Approaches for Agricultural Intelligence
V.Kaleeswaran, Dr.R.Rathipriya
DOI: 10.17148/IJARCCE.2016.54115
Abstract: Agricultural intelligence is a specific and emerging field of intelligence dedicated to an enhanced understanding of cultivation, productivity of crop, and minimized risk associated agriculture. Crop prediction is an important agricultural problem. To address this problem, crop prediction technique is used. It is the one of the most commonly used intelligent technique based on Data Mining (DM) concepts to predict the crop yield for maximizing the crop productivity. This paper studies and records the various data mining techniques available in the literature for better crop productivity.
Keywords: Data mining, Crop prediction, k-means, k-nearest neibour, Fuzzy sets, Regression, Classification, Neural network Association Rule.
Abstract
The Security Schemes Implemented In Mobile Ad Hoc Networks
D. Sudha, Dr. A. Kathirvel
DOI: 10.17148/IJARCCE.2016.54116
Abstract: Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.
Keywords: MANET, Security Aspects, watchdog, IDS, Clusters, Agents, PathRater.
Abstract
Cloud Data Security on Cloud Using Geo-Social Attributes
Laxmikant Ashok Bhole, Pratik Kumar Vikas Patil, Rahul Subhash Salve, Pratik Datta Warade, Mrs. M. Shaikh
DOI: 10.17148/IJARCCE.2016.54117
Abstract: Cloud storage system empowers storing of data in cloud server effectually and allows the user to work with the data without any trouble of the resources. In existing system, mainly data damage occurred due to attacks by unauthorized user, attacker or hacker. High security technique is required in cloud to protect user�s data from unwanted resources and unauthorized user. In the proposed system, for improving optimal performance and security some key techniques are wont such as Encryption Replication Fragmentation and Geo-Parameter. Fragmentation is used for divide the file into multiple slices. Fragmented slices are used as input for Replication to replicate these slices. Replication will improve availability of proposed system. Geo-Parameter is impressive way for file transaction in system as it provides security parameter like Time, Date, and Location. In propose system Division and Replication of Data in the Cloud for Optimal Performance and Security that collectively approaches the security and performance issues. In this methodology, we divide a file into fragments, and replicate the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker. Moreover, the nodes storing the fragments are separated with certain distance by means of graph T-coloring to prohibit an attacker of guessing the locations of the fragments. Furthermore, the proposed methodology does not rely on the traditional cryptographic techniques for the data security; thereby relieving the system of computationally expensive methodologies.
Keywords: Fragmentation, Replication, Cloud Security, Data Integrity, Location Privacy.
Abstract
A Novel Technique for Modification of Images for Deuteranopic Viewers
Jyoti D. Badlani, Prof. C.N. Deshmukh
DOI: 10.17148/IJARCCE.2016.54118
Abstract: About 8% of men and 0.5% women in world are affected by the Colour Vision Deficiency. As per the statistics, there are nearly 200 million colour blind people in the world. Color vision deficient people are liable to missing some information that is taken by color. People with complete color blindness can only view things in white, gray and black. Insufficiency of color acuity creates many problems for the color blind people, from daily actions to education. Color vision deficiency, is a condition in which the affected individual cannot differentiate between colors as well as individuals without CVD. Colour vision deficiency, predominantly caused by hereditary reasons, while, in some rare cases, is believed to be acquired by neurological injuries. A colour vision deficient will miss out certain critical information present in the image or video. But with the aid of Image processing, many methods have been developed that can modify the image and thus making it suitable for viewing by the person suffering from CVD. Color adaptation tools modify the colors used in an image to improve the discrimination of colors for individuals with CVD. This paper enlightens some previous research studies in this field and follows the advancement that has occurred over the time. It also approaches different methods of modifying and adjusting images so that the persons suffering from dichromacy are able to better perceive image detail and color dynamics. This paper includes three algorithms; they are LMS daltonization, color contrast enhancement, and LAB color adjustment. Two separate technique are also used for evaluation of the effectiveness of these techniques. First; the simulation of deuteranopia is done on both the original and processed images to observe the algorithm�s effects from the perspective of a color blind viewer. Second; delta E image is obtained between the two images in order to assess the extent to which the image changes from the perspective of a non-color blind viewer and also, the Elapsed time is calculated for the algorithms. A brief comparison is also done between Color contrast enhancement, LAB color adjustment and LMS daltonization.
Keywords: Deuteranopia, Dichromacy, CVD, LMS Daltonization, RGB Color Constrasting, LAB Color Correction, Elapsed time.
Abstract
Vehicle Radiation Monitor
Nilesh Kunte, Shashank Khandve, Tejas Mundhe, P.V. Sontakke
DOI: 10.17148/IJARCCE.2016.54119
Abstract: The primary objects of the present project to provide a novel means for safely detecting any malfunction of a pressurized Radiation system in order to prevent accumulation of combustible radiation so that damage or explosion due to such an accumulation of Radiation is prevented. Another object of the present invention is to provide a novel safety means for detecting the Radiation of rays into the area of an appliance when the appliance is in a shutdown condition and not in operation. The main objective of VRM is Vehicle radiation monitor (VRM) is a wall mountable unit which measures the Gamma field at the detector (Plastic-Scintillator). The Vehicle Radiation Monitor is intended to measure the radioactivity that may be present in the vehicles entering /leaving the nuclear installation. An Alarm is to be generated when the detected activity is higher than a set permissible value.
Keywords: Gama radiation; Plastic Scintillator; AluminiumIP-67 protection; Vehicle Radiation Monitor (VRM); Signal Processing Unit (SPU); Remote Display & Alarm indication Panel (RDAP).
Abstract
Design and Comparison of Multiplexer using Different Methodologies
Pragati Upadhyay, Vishal Moyal
DOI: 10.17148/IJARCCE.2016.54120
Abstract: Multiplexer can be designed using Adiabatic array logic, CMOS logic, pass transistor logic. This paper describes a multiplexer using adiabatic logic. The Adiabatic logic are low power circuits which are reversible logic to conserve energy, it brings about a great deal of power minimization in digital circuits. The proposed circuits show lesser power dissipation then the conventional static CMOS logic style. All the designs were simulated using Tanner EDA tool v15.0. Simulations were done at 90nm technologies.
Keywords: Adiabatic logic, power dissipation, power saving, Tanner EDA tool v15.0.
Abstract
Detailed Review on Sybil Attack in Vehicular City Environment
Shilpa Goyal, Ms. Nisha Pandey
DOI: 10.17148/IJARCCE.2016.54121
Abstract: The vision of whole cities covered with dynamic networks of �talking cars� is gradually becoming a reality. The network thus formed is Vehicular Ad hoc Networks (VANETs). Vehicular Ad Hoc Networks (VANET) has become cynosure in the current decade. In the modern era the invention of smart vehicles have made VANET utmost important application to be implemented. But every boon has a curse hidden in it so is the case with the VANET. As VANET is an emerging research area so are its security issues. There are various attacks that can occur on VANET but the most vital is the Sybil Attack. In Sybil attack the attacking node creates multiple forge identities in order to gain a disproportionately large influence. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
Keywords: VANET, MANET, Sybil Attack, Genetic Algorithm.
Abstract
Comparison and Analysis of Combinational Circuit Using Different Logic Styles
Poonam Dhruwe, Chandrahas Sahu
DOI: 10.17148/IJARCCE.2016.54122
Abstract: This paper discusses a comparative study of combinational circuits with different logic style of designing. Logic style affects the switching capacitance, transition activity, power, delay. Various logic styles have been compared and taking AND, OR, XOR and FA as reference circuit. Different logic styles are compared with respect to transistor count, power dissipation and delay in 250nm technology. It is observed that less power is consumed in the m-GDI than the other logic styles.
Keywords: Complementary CMOS, GDI, M-GDI technique, low power, high speed, transistor count.
Abstract
Digital Watermarking Techniques
Ritu Rawat, Nikita Kaushik, Soumya Tiwari
DOI: 10.17148/IJARCCE.2016.54123
Abstract: Watermarking is hiding digital information in a carrier signal. Digital Watermark verifies the Authenticity or Integrity of the Carrier Signals or shows Identity of its owners. Watermark works as Tag or Ownership Identifier. Basically watermark is a secondary image that is imposed on the original image for protecting that image. Today in the emerging world of internet digital watermarking is becoming very important. Digital watermarking is used in various applications like-copyright protection, tamper detection, broadcast monitoring, authentication, integrity, and verification. Image processing use voluminous methods for digital watermarking. This following paper is a survey of various watermarking techniques and presents a brief introduction to these methods used for watermarking.
Keywords: Digital watermarking, Spatial Domain Techniques, Frequency Domain Techniques, Least significant Bit, SSM Modulation, Discrete Cosine Transform, Discrete Wavelet Transformation, Discrete fourier Transform .
Abstract
Secure Unique Identification using Encrypted Storage in NoSQL Database
Anand Shende, Omkar Gurav, Swapnil Shirode, Piyush Govekar, S.N.Zaware
DOI: 10.17148/IJARCCE.2016.54124
Abstract: Database helps us to collect, retrieve, organise and manage the data. The database used in the project is used to associate user�s personal documents together and keep it available for the user anytime he requires. The requirement of the project were to have a unique identity. To satisfy the requirement Adhar Card was used. This is used because there is only one card per person. The database is going to record all sensitive information of the user, so there is a need to provide security to it. This is done using encryption. Various algorithms were studied in the paper, the one suitable out of them was ETSFS (Extended Transpose Substitute Folding Shifting). NoSQL is chosen because it satisfies the need of storing images as well as text efficiently, compared to SQL database. There has been a study as to where all an encryption process should take place. The encryption/decryption here is provided on the Client Application end. This project should provide a unique identity for the database which is secured using encryption. This will help the user to keep the personal information online and not carry it around everywhere physically.
Keywords: NoSQL database, ETSFS algorithm, Application side Encryption.
Abstract
A Prototype of Automated Attendance System Using Image Processing
Prof. Sumita Chandak, Mansi Patange, Himani Deshpande, Saifina Maredia, Prathmesh Bagwe
DOI: 10.17148/IJARCCE.2016.54125
Abstract: Conventionally, student record keeping is done manually by teachers through roll calling or by passing an attendance sheet in the class. These methods are time consuming, prone to errors and proxy attendance. Moreover, digital assimilation of records is tedious since teachers need to fill in the details in the database by themselves to generate reports. Consistency in manual and digital records also needs to be maintained. In the recent years, automated systems that have evolved use standard biometrics like fingerprint and iris recognition. These systems are intrusive in nature and require expensive gadgetry. Also deploying them on a large scale is detrimental to the project budget. Thus our project design makes use of facial detection and recognition algorithms like Viola Jones and PCA to identify the student and mark their attendance using a dynamic web camera. As the student stands in from of the system detects the face and compares it to the student image database for recognition phase. Daily attendance automatically gets updated in the database thereafter. This system solves the problem of redundancy in manual records and makes attendance keeping a convenient task.[8]
Keywords: Automated Attendance System, Face Detection, Face Recognition, PCA (Principal Component Analysis), Viola Jones, Camera, OpenCV.
Abstract
A Brief Study of Different Feature Detector and Descriptor
Nikita Kaushik, Ritu Rawat, Anshika Bhalla
DOI: 10.17148/IJARCCE.2016.54126
Abstract: Robust, accurate and automatic registration of image is complex task in various applications. To achieve image alignment/registration, required steps are: detection of features, Feature matching, source of transformation function. Extraction of different consistent features from image is very useful and that may be used to gain reliable matching between various views of a scene or object. In addition of deciding where and to what range a feature occur in an image, there is a distinctive body of research to decide how to represent the neighbourhood of pixels near a localized region, called feature descriptor. The easiest technique is scaled for the size of the region, use of pixel intensity values, or representation of eigen space. This survey contains various descriptors like SIFT( Scale-invariant feature transformation), SURF( Speeded up robust features), HOG( histogram of gradient), MSER.
Keywords: Key point, SIFT, Feature description, Feature extraction.
Abstract
Efficient Framework for Secure Data Sharing With Key Aggregate Cryptosystem
Pallavi Mathur, Nachiket Mahamuni, Nikhil Gondane, Kaushal Singh
DOI: 10.17148/IJARCCE.2016.54127
Abstract: Cloud storage in simple terms is nothing but storing data on-line in cloud that can be accessed from multiple and connected resources. Using cloud to store the data is a very practical thought as we can share our information in trustworthy domain, with great efficiency, Besides that it provides some other functionalities in terms of disaster recovery, smart accessibility etc. New public�key cryptography is presented that came out to be Key aggregate cryptosystem (KAC), in which constant size ciphertexts are produced in order to make the task of rendering the decryption rights feasible for produced mass of ciphertexts. KAC comprises the thought of integrating different keys generated for different sets of ciphertext which yields a single aggregate key accommodating power of all the keys. After which a single key can be released to someone in trusted domain through a secure channel and using this key one can decrypt set of allowed files only, others remaining unaddressed.
Keywords: Cloud storage, Data sharing, Ciphertext, Key-aggregate, Encryption.
Abstract
Integrity Constraints for Cloud Auditing Services Using Third Party Services
M. Anantha Lakshmi, Shaik Mahammad Rasheed
DOI: 10.17148/IJARCCE.2016.54128
Abstract: Cloud data storage is the main important feature in present dynamic software cloud applications. Thus, enabling public audit ability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. The TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Keywords: Data integrity, dependable distributed storage, error localization, data dynamics, cryptographic protocols, cloud computing.
Abstract
Enhanced Approach for Disease Detection and its Prescription
Seema S. Lavhate
DOI: 10.17148/IJARCCE.2016.54129
Abstract: According to the world health organization there should be a minimum ratio between doctors and patients which is one as to one thousand respectively. In India this ratio is one as to one thousand and seven hundred so there are seven hundred citizens in India who do not get a proper medication. Union health ministry of India claims that India would need four lakh more doctors up to 2020. To fill up this deficiency I proposed a prototype which will detect the disease and prescribe a proper medication for that particular detected disease. Medical professionals detect most of diseases on the basis of symptoms and signs of that disease. So collecting the symptoms of various diseases from an experienced doctor we can easily detect the disease. We cannot use only one method foe detection. To pinpoint the exact disease which is acquired by the patient we have to use multiple methods.
Keywords: ANN, Feature extraction, Image processing, LPC2148.
Abstract
Automated Oxygen Level and Blood Pressure Sensing Using Embedded System
Atharva Bhujbal, Archana Chorge, Priyanka Choure, Prof. A. B. Vitekar
DOI: 10.17148/IJARCCE.2016.54130
Abstract: Blood pressure and the oxygen related problem has become more critical. So we are implementing an automated oxygen and blood pressure sensing system. The blood pressure sensing system will give the diastolic and systolic pressure reading on the display. In the oxygen sensing system the concentration of oxygen is evaluated in both breath in and breath out air in non-invasive manner in which the luminescence is generated by the oxygen sensitive luminophore. It directly depends on the concentration of the surrounding oxygen. The output of the two systems is received on the smart phone via Bluetooth. The system can prove to be quite handy for the doctor as it will help in minimizing their work. This is a wearable and an easy device. It is a combination of software and hardware. This android app is developed for the data visualisation. It is useful in the diseases like Asthma, Hypoxia, Brain hypoxia hyper tension etc.
Keywords: Blood pressure, Oxygen, Android App, Blood pressure sensor, Oxygen sensor, Bluetooth, Asthma, Hypertension, Brain Hypoxia etc.
Abstract
Study and Literature Survey for Classification of Cardiac Arrhythmia With Respect to ECG and HRV Signal
Mr. Vyankatesh S. Thorat, Dr. Suresh D. Shirbahadurkar, Mrs. Vaishali V. Thorat
DOI: 10.17148/IJARCCE.2016.54131
Abstract: Consistent or periodical heart rhythm disorders may result cardiac arrhythmias. presence of recurring arrhythmic events (also known as cardiac dysrhythmia or irregular heartbeats), as well as erroneous beat detection due to low signal quality, significantly affects estimation of both time and frequency domain indices of heart rate variability (HRV). A reliable, real-time classification and correction of ECG-derived heartbeats is a necessary prerequisite for an accurate online monitoring of HRV and cardiovascular control. In this, Heart Rate Variability (HRV) signals are analyzed and various features including time domain, frequency domain and nonlinear parameters are extracted. The additional nonlinear features are extracted from electrocardiogram (ECG) signals. These features are helpful in classifying cardiac Arrhythmias. In this, we are going to use genetic programming which is applied to classify heart Arrhythmias using both HRV and ECG features. Genetic programming selects effective features, and then finds the most suitable trees to distinguish between different types of Arrhythmia. By considering the variety of extracted parameters from ECG and HRV signals, genetic programming can be used precisely to differentiate various arrhythmias. The performance of used algorithm is evaluated on MIT�BIH Database. Here we are going to see seven different types of arrhythmia classes which includes normal beat, left bundle branch block beat, right bundle branch beat, premature ventricular contraction, fusion of ventricular and normal beat, atrial premature contraction and paced beat are classified with an accuracy of 98.75%, 98.93% , 99.10%, 99.46%, 99.82%, 99.46% and 99.82% respectively In this paper, we are going to classify arrhythmias by using genetic algorithm.
Keywords: Arrhythmia, Electrocardiogram (ECG), Heart Rate Variability (HRV), Genetic Programming (GP), Feature Selection.
Abstract
Water pollution detection system using pH and turbidity sensors
Miss. Swati V. Birje, Miss. Trupti Bedkyale, Miss. Chaitali Alwe, Mr. Vivek Adiwarekar
DOI: 10.17148/IJARCCE.2016.54132
Abstract: Water pollution is one of the key threats which affect the life of citizens residing in a country as well as plants and organisms living inside water bodies. As we know water covers 70 percent of the earth�s surface it is our responsibility to keep water clean. The main cause of water pollution is due to disposal of industrial waste into the river. The same water is utilized by citizens of that area. Since it is polluted it causes adverse effect on a citizen�s life. So polluted water needs to be detected. The parameters involved in the water pollution detection like pH value and turbidity are measured in real time with the help of sensors. pH is an important parameter to determine the nature of water , whereas turbidity is also an equally important parameter since it causes adverse effects on aquatic ecosystems. Here we propose a water pollution detection system by taking into consideration various aspects like cost, easy setup and easy handling. In this paper we propose design and implementation of water pollution detection system using pH and turbidity sensors.
Keywords: Water pollution, pH, turbidity, sensors, ecosystems.
Abstract
Emergency Service using GPS Tracking
Pavan Wadhe, Rutuja Pandharkar, Rohan Raut, Devansh Modi
DOI: 10.17148/IJARCCE.2016.54133
Abstract: About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you. The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress. The GPS device continuously move with the ambulance and will calculate the the co-ordinate of each position and can be obtained whenever required by the server. Hence it can track the nearest ambulance and bring it to the person in distress.
Keywords: GPS, ambulance, mobile application, tracking.
Abstract
Design Wireless Sensor Network System to Power Management and Protect Electrical Pole Transformers by using Zigbee Model and Microcontroller
Muthanna Ali Saihood, K. Lakshmi Bhavani
DOI: 10.17148/IJARCCE.2016.54134
Abstract: This paper discuss design and implementation wireless sensor network system is used for tow purposes , power management system and protection system. The power management system (PMS) is very important factor to manage and control the electrical power, This system consider important tools to safe the power consumption then due to this system can reduce the power consumption to minimum point, and also its charge of coordinate between power consumption capacity and power production capacity to avoid switch off the street lighting and emergency places such as hospitals. And automatic switch on and switch off the consumers diesel generators, by using successful management power can get to stable and efficient distribution power system. And in this paper discuss how can provide protection to remote terminal units (pole power transformers) and safe the money. The powerful devices that use in this system is ZigBee and microcontroller.
Keywords: WSN , Zigbee , Microcontroller , CT , VT , PMS.
Abstract
Smart Load Balancing Algorithm towards Effective Cloud Computing
Vibha M B, Dr.R.RajuGondkar
DOI: 10.17148/IJARCCE.2016.54135
Abstract: Cloud Computing has dominated the current era. Ithas been associated with varied areas and has grown tremendously. Resource sharing and effective utilisation of resources is the key to its success. In its journey, cloud has faced several challenges and has overcome many. Load balancing is one such challenge still faced by cloud.The work here depicts methods to achieve load balancing. The objective of this paper is to highlight the role of Hadoop and MapReduce to attain load balancing. The partition strategy is used to achieve load balancing. Hadoop, a Java based open source frame work is capable of storing and processing large data. MapReduce programming model is used to obtain parallel processing.
Keywords: Load Balancing, Partitioning, Hadoop, MapReduce, Scheduling.
Abstract
Application of Association Rule Mining in Risk Analysis for Diabetes Mellitus
Umang Soni, Sushma Behara, Karthik Unni Krishnan, Ramniwas Kumar
DOI: 10.17148/IJARCCE.2016.54136
Abstract: Diabetes is a growing epidemic and non communicable disease that affects a major portion of the population in the developing countries. Prevention and overall clinical management of patients with elevated risk of developing diabetes mellitus can be aided greatly by early detection of risk of getting diabetes among patients. This is done by using Association Rule Mining of the data present in the medical records of patients. Association rule is used to discover sets of risk factors for patients at particularly high risk of developing diabetes, which are called item sets of all the interacting conditions. Association rule mining generates a very large set of rules which needs to be summarized for easy clinical use. A comparative evaluation is performed to provide guidance regarding their applicability, strengths and weaknesses.
Keywords: diabetes mellitus, association rule mining, apriori algorithm, discretization.
Abstract
A Survey on Machine Learning Algorithms in Data Mining for Prediction of Heart Disease
V.A. Kanimozhi, Dr. T. Karthikeyan
DOI: 10.17148/IJARCCE.2016.54137
Abstract: Data mining can be viewed as a result of the natural evolution of information technology. Data mining is the process of discovering interesting patterns and knowledge from large amounts of data. The data sources can include databases, data warehouses, the Web, other information repositories, or data that are streamed into the system dynamically. Data mining brings a set of tools and techniques that can be applied to processed medical data to discover hidden patterns that provide healthcare professionals an additional source of knowledge for making decisions. This survey analyzed different papers in which one or more machine learning algorithms of data mining used for the prediction of heart disease. Applying data mining techniques in medical field especially in heart disease treatment can give reliable performance.
Keywords: Data mining, Medical Data Mining, Data mining tools, Heart Disease prediction, Data mining techniques.
Abstract
A Voltage-Controlled DSTATCOM for Power-Quality Improvement
N.Rajesh Kumar Gowd, C.Mohankrishna, M.MD.Sayeedi Baig
DOI: 10.17148/IJARCCE.2016.54138
Abstract: Because of increasing complexity in the power system, voltage sag is getting to be a standout amongst the most critical power quality issues. Voltage sag is a short decrease voltage from nominal voltage, happens in a brief timeframe. On the off chance that the voltage sags surpass a few cycles, and then manufacturing systems making utilization of delicate electronic types of equipments are prone to be influenced prompting real issues. It at last prompts wastage of assets (both material and human) and in addition money related misfortunes. This is conceivable just by guaranteeing that continuous stream of power is kept up at legitimate voltage levels. This project tends take a solution at the using so as to take care of the sag issues custom power gadgets, for example, Distribution Static compensator (D-STATCOM).Proposed plan takes after another calculation to create reference voltage for a distributed static compensator (DSTATCOM) working in voltage-control mode. The proposed plan guarantees that unity power factor (UPF) is accomplished at the heap terminal amid ostensible operation, which is unrealistic in the conventional technique. Likewise, the compensator infuses lower streams in this manner, diminishes misfortunes in the feeder and voltage-source inverter. Further, a sparing in the rating of DSTATCOM is accomplished which expands its ability to alleviate voltage sag. About UPF is kept up, while directing voltage at the heap terminal, amid burden change. The state-space model of DSTATCOM is joined with the miscreant prescient controller for quick load voltage regulation amid voltage unsettling influences. With these elements, this plan permits DSTATCOM to handle power-quality issues by giving power factor redress, consonant end, load adjusting, and voltage regulation in light of the heap necessity. The performance of the proposed system can be improved by adding Dynamic Voltage Restorer(DVR).
Keywords: DSTATCOM, Dynamic Voltage Restorer(DVR), Voltage Source Converter (VSC).
Abstract
Typed Character Recognition using ANN
Arindam Saha, Nitupon Talukdar
DOI: 10.17148/IJARCCE.2016.54139
Abstract: In this paper, a Character Recognition system is designed using Multilayer Feed forward Artificial Neural Networks. For the training of neural network Backpropagation Learning algorithm is preferred. Input is typed English alphabets with a space between the individual characters, which are input to the segmentation algorithm and then fed as input to the neural network. A neural network is trained onto the dataset containing 6 different samples for each 26 alphabets for recognition. We set the size of our training images as 40x40 gray scale image. From such training images we create image profile. Each element of the profile vector is connected with one input to the neural network. An implicit approach for character recognition is implemented in this paper for its recognition, which improves the accuracy significantly.
Keywords: Character recognition, ANN, Segmentation, Recognition.
Abstract
A Novel Way to Understand DES
Gurline Kaur, Manjit Kaur
DOI: 10.17148/IJARCCE.2016.54140
Abstract: We are living in a world where there is a danger every fraction of second. With the world becoming a global village, we live in an e-society where everyone is vulnerable to numerous possible cyber attacks. But there is also a way to pay hide to such unforeseen situations. Cryptography is one field which was developed with a sole aim to secure every entity. There are various types of techniques and algorithms available. This paper is aimed at explaining DES in an innovative way. DES algorithm or symmetric block cipher consists of 16rounds. There are various other algorithms which are based on DES�s Fiestel structure. Hence, there is always a need to explain the actual working of DES. Therefore, through his papers the authors have tried to solve round 1 of DES, thereby explaining in detail how the round 1 key and cipher text is obtained with the help of an example and various tables. This paper will help not only in understanding the DES algorithm, but also the various other following algorithms. Also the cyber attacks and their corresponding counter measures can be understood more clearly if the working of DES is clear.
Keywords: Cryptography, Fiestel structure, Block cipher, permutation, substitution, left circular shift.
Abstract
Penetration Testing: Attacking Oneself to Enhance Security
Gurline Kaur, Gurpreet Kaur
DOI: 10.17148/IJARCCE.2016.54141
Abstract: Penetration Testing is one tool of cyber security which is very common. This is a type of testing where in any organization attacks itself to know its own vulnerabilities. But this attack is stopped when any vulnerability or security loophole is encountered. Generally to have such a penetration testing or pen test a team of penetration testers or pen testers are hired. This testing is also bounded through various legal agreements as it deals with any organization�s confidentiality and privacy. Thus, this paper is aimed at studying penetration testing from various topics thereby explaining the major types of penetration testing. There is a line of difference between hacking and penetration testing. This paper will also explain that demarcation.
Keywords: Penetration testing, vulnerability, intrusion, router, firewall, pentest.
Abstract
Sixth Sense – A Wearable Gestural Interface
Kiran Parte
DOI: 10.17148/IJARCCE.2016.54142
Abstract: The Sixth Sense is a wearable gestural interface that augments the physical world with digital information and lets us use natural hand gestures to interact with that information. The Sixth Sense technology bridges the gap between the physical world and the world of data. This paper provides a simple yet analytical approach towards the sixth sense technology which was originally introduced at MIT Media Lab by Steve Mann in 1994 and 1997 (head worn gestural interface), and 1998 (neck worn version), and further developed by Pranav Mistry (also at MIT Media Lab) by the name of a gadget called �WUW� (Wear yoUr World), in 2009.
Keywords: Sixth Sense, gestural interface, MIT, augment.
Abstract
Image forgery localization using fine grained analysis of CFA artifacts
Biju V G, Anu S Nair, Chandni S, Ijas Ahammad M, Sravya N, Vivek T D
DOI: 10.17148/IJARCCE.2016.54143
Abstract: The usage of low-cost and high-resolution digital cameras and sophisticated photo editing software, digital images can be easily manipulated and altered. This project Image Forgery Localization using Fine-Grained Analysis of CFA Artifacts, a forensic tool, which able to discriminate between original and forged regions in an image captured by a digital camera. Most digital cameras employ a single sensor in conjunction with a color filter array (CFA). The assumption that the image is acquired using a Color Filter Array, and that tampering removes the artifacts due to the demosaicking algorithm. Then interpolate the missing color samples to obtain a three channel color image. This interpolation introduces specific correlations which are likely to be destroyed during tampering. This method is based on a new feature measuring the presence of demosaicking artifacts at a local level and on a new statistical model allowing deriving the tampering probability of each 2X2 image block without requiring a priori knowledge about the position of the forged region. Proposed method reduces error lavel to 19% and gives the Structural similarity of 98%.
Keywords: CFA artifacts, demosaicking, probability map, image tampering detection.
Abstract
A survey on Image Processing Techniques used for Detection of leukemic Cells
N.Poornima, Dr.T.Karthikeyan
DOI: 10.17148/IJARCCE.2016.54144
Abstract: In medical diagnosis systems, classification of blood cell is most important to evaluate and diagnosis the disease. The diseases that are related to blood can be classified only after the classification of blood cell. Leukemia is a blood cancer that begins with bone marrow. It should be treated at earlier stage, and leads to death if left untreated. This paper describes a study of detecting leukemia from blood microscopic image using different image processing algorithms.
Keywords: Leukemia, blood cell, classification, image processing algorithms, Detection.
Abstract
An Effective Review on Relaying In LTE-Advanced and WiMAX Networks
Priyanka Rani, Ms. Renu Singla
DOI: 10.17148/IJARCCE.2016.54145
Abstract: LTE is a latest cellular system, it is standardized by 3rd Generation partnership project (3GPP), and it is employed to satisfy increasing customer demand for high speed services also to fulfil demand for user experience with full mobility. With the ever growing demand of data applications, traditional cellular networks face the challenges of providing enhanced system capacity, extended cell coverage, and improved minimum throughput in a cost-effective manner. Wireless relay stations, especially when operating in a half duplex operation; make it possible without incurring high site acquisition. Design of wireless relay stations faces the many challenges of providing backward compatibility, minimizing complexity, and maximizing efficiency. In this review paper we provide an overview of relaying mechanism in LTE-Advanced and WiMAX and than explain relaying handover mechanism over LTE-Advanced and WiMAX.
Keywords: E-UTRAN, LTE, UMTS, WiMAX.
Abstract
Image compression Based on Uniform Thresholding and Fixed Point Binary Scaling
D. Gowri Sankar Reddy, V.C. Veera Reddy
DOI: 10.17148/IJARCCE.2016.54146
Abstract: Image compression is one of the main task in saving storage requirements and conserving transmission bandwidth. In this paper, a image compression based on uniform thresholding and fixed point binary scaling is proposed to reduce the computational complexity for compressing satellite Images. The variable bit rate is obtained using fixed point binary scaling and adjusting slope factor. Some images from LANDSAT 8 are compressed and the image quality metrics bits per pixel(bpp), peak signal to noise ratio(PSNR) and computational time are used for comparison. The proposed method from medium to high bitrates performs better than the discrete cosine transform(DCT) based method in terms of PSNR and computational time.
Keywords: bpp, PSNR, fixed Point, Computational time.
Abstract
Real Time Monitoring and Control of Multi Sensor Using GSM Techniques in Embedded System
T. Murugan, Azha. Periasamy
DOI: 10.17148/IJARCCE.2016.54147
Abstract: This paper describes the design of a simple low cost microcontroller based real time monitoring and control of multi sensor using gsm techniques in embedded system. GSM modem using AT comments for sending and receiving message. The LM35 is an integrated circuit sensor that can be used to measure temperature with electrical output proportional to the temperature. The temperature sensor, Gas sensor and vibration sensor are connected to PIC 16F877A microcontroller. The sensors output are send message to concern person through serial communication and displayed in LCD. The GSM modem performs the operation of sending message to a particular SIM number.GSM technology provides users with high quality signal and giving them access to high quality digital communication at very affordable rates. GSM network operators can provide their customers with cheaper calling and text messing options.
Keywords: PIC Micro Controller1, Temperature sensor2, Vibration sensor3, Gas sensor4, GSM modem5.
Abstract
Secret Sharing Scheme using Cryptographic Techniques
Pratiksha Patil, Nilesh Javre, Priyanka Patil, Sarang Deshpande
DOI: 10.17148/IJARCCE.2016.54148
Abstract: From many years, people were concerned about the secure transmission of data. Among the various cryptography techniques, the Adi Shamir's secret sharing scheme based on La-grange's polynomial is considered as the most secured one. But, it faces the man in middle attack in which an adversary can retrieve the secret even without any valid share. To over-come this drawback, the token generation mechanism is proposed in which each valid share is binded with the public information of all the nodes. The proposed system consists of Adi Shamir's secret sharing scheme based on Lagrange's polynomial along with the concept of Token Generation. Token Generation mechanism involves binding of shares with their respective shareholders. Due to this the intruder will not be able to retrieve the secret if he does not have a valid share. Thus, one can conclude that the proposed system provides better security than the traditional one.
Keywords: Security, secret sharing scheme, public information, token.
Abstract
Construction of FIR Filter Using Modified Genetic Algorithm
Shashank Srivastava, Ashish Gupta
DOI: 10.17148/IJARCCE.2016.54149
Abstract: A method for the design of non recursive digital low pass FIR filter is proposed using GA. The main focus of the paper is to describe the developed and dynamic method of designing finite impulse response filter with automatic rapid and less error by an efficient genetic approach. GA is a powerful global optimization algorithm introduced in combinational optimization problems. Here, FIR filter is designed using Genetic approach by an efficient Genetic Algorithm (GA) coding scheme. The response is studied and implemented by keeping values of fixed order, crossover probability and mutation probability. GA offers a quick, simple and automatic method of designing low pass FIR filters that are very close to optimum in terms of magnitude response, frequency response and in terms of phase.
Keywords: Genetic Algorithm, FIR Filter, Optimization, DSP.
Abstract
Android Blood Bank
Prof. Snigdha, Varsha Anabhavane, Pratiksha lokhande, Siddhi Kasar, Pranita More
DOI: 10.17148/IJARCCE.2016.54150
Abstract: Blood is a saver of all existing lives in case of emergency needs. The task of blood bank is to receive blood from various donors, to monitor the blood groups database and to send the required blood during the need to the hospital in case of emergencies. The problem is not insufficient number of donors, but finding a willing donor at the right time. We want to build a network of people who can help each other during an emergency. This application timely updates the information regarding the donors where the administrator accesses the whole information about blood bank management system. Donor will be prompted to enter an individual's details, like name, phone number, and blood group. In the urgent time of a blood requirement, you can quickly check for blood banks or hospitals matching a particular or related blood group and reach out to them through the App. Blood bank App provides list of blood banks in your area. A large number of blood donors are attracted using an Android application. Since almost everyone carries a mobile phone with him, it ensures instant location tracking and communication. Only a registered person, with willingness to donate blood, will be able to access the service. In this application we are using the GPS technology that will be used to trace the way to the blood bank. The user will get the route to reach the desired location and he won't have to ask manually, therefore time can be saved.
Keywords: Blood bank, Android, Blood transfusion, Database, Donors, Acceptors, Administrator, Geographic information System.
Abstract
Biometric Techniques Using Neural Networks
Divya Pirale, Manisha Nirgude
DOI: 10.17148/IJARCCE.2016.54151
Abstract: Biometrics is the science and technology of measuring and analysing biological data. The standard method used for personal authentication is password, which is known to a user only. There is no security in the use of password if it is known to an imposter. Hence to overcome these problem passwords replaced with biometric authentication. Biometrics is the most secure and convenient authentication tool till today. Commonly used biometric is fingerprints, iris, retina, face, hand geometry, palm, etc. Identity verification in computer systems has been classically based on something what you are or what you already have. The guideline to be considered for user authentication system is recognition of the authorized user and rejection of the imposter. The aim of the biometrics is to decide whether the characteristics belong to the same person or not. So a better classifier is necessary to classify the patterns correctly. The survey presents various biometric techniques based on neural network.
Keywords: Neural network, authentication system, biometric & key authentication.
Abstract
Impedance and Power Loss Characteristics of LPDA 160MHz-1300MHz Range
Vijay S. Kale
DOI: 10.17148/IJARCCE.2016.54152
Abstract: Antennas are a fundamental component of modern communications systems. It forms the interface between the free space and the transmitter or receiver. The transmission line (cable) is terminated by antenna that does not match the characteristic impedance of the transmission line, not all of the power is absorbed by the termination. Part of the power is reflected back to the transmission line. The forward (or incident) signal mixes with the reverse (or reflected) signal to cause a voltage standing wave pattern on the transmission line. The voltage standing wave ratio (VSWR) can also be represented by Return Loss, Mismatch Loss and Reflection Coefficient. This paper represents the details VSWR, impedance and power loss of Log Periodic Dipole Array (LPDA) of frequency range of 160MHz to 1900MHz with 24 elements. Using antenna trainer kit (Transmitter, Receiver) frequency range up to 1300MHz, LPDA impedance variation is about 50 � 15 O and power loss in % is within 0 to 10 are reported. The VSWR values are within 1 to 2. The results indicate that the constructed LPDA is of good quality to use it for different high frequencies applications.
Keywords: Transmitter, Receiver, LPDA, Impedance matching, VSWR, Power loss.
Abstract
Bandwidth Aware Vm Migration Policy in Cloud Data Centers
Hetal Bhadja, Jigneshkumar Lakhani
DOI: 10.17148/IJARCCE.2016.54153
Abstract: cloud computing is a new paradigm for enterprise that can effective facilitate the execution of tasks.task scheduling is an important issue which is greatly degrade performance of cloud computing environment.cloud service provide and clients have different requirements and objectives in cloud environment resource availability and load on resources is day by day changed time to time .so scheduling resources in cloud is complicated problem.BATS algorithm is proposed for multiple data centers to overcome the time overhead and cost when replacement between two datacenters. after that Compare result with existing algorithms using cloud simulator. Observe the parameter performance.
Keywords: task scheduling; data center;virtual machine;
Abstract
Optimization of Bandwidth for IoT
Roopa M, Nandini B M
DOI: 10.17148/IJARCCE.2016.54154
Abstract: Smart phones are most fascinating technology that everyone uses in today�s life. Mobile phones are bundled with lot of features. Smart phone users are using internet in large volume. These devices using the wireless network consumes huge bandwidth when uploading or downloading data whereas performing the same operations using the desktop computer would be in the acceptable range. The service providers need to cater to the present growing need of bandwidth requirement without investing on new technology and also without negotiating on users expectations in order to survive in the market. Providing such huge bandwidth to each user is a terrible task. Hence, we propose bandwidth optimization algorithm using cache coherence which enables the service provider to cater to the growing needs of bandwidth requirement.
Keywords: Smart phones, Git, Version controlling systems, Mobile Networks.
Abstract
Adaptive Spectrum Sensing for Very Low SNR in Cognitive Radio Networks
Dudekula Gireesh, Prashant K Shah
DOI: 10.17148/IJARCCE.2016.54155
Abstract: Cognitive Radio (CR) is a self-adaptive wireless technology that can detect available channels automatically in a wireless spectrum and configured dynamically. Spectrum sensing in CR is the fundamental activity to detect unused spectrum holes in an opportunistic manner. In Spectrum sensing, various methods have been proposed and studied exhaustively by the CR researchers. Blind spectrum sensing methods such as an Eigenvalue based Detection (EVD) and Energy Detection (ED) does not require any information of the transmitted signal characteristics, the channel or the noise-power, which are unknown at the receiver. The main aim of this work is to sense the spectrum at very low Signal to Noise Ratio (SNR) under frequently changing wireless environment. A combined blind spectrum sensing is proposed based on an adaptive SNR threshold calculation which achieves better sensing accuracy than the two individual detectors. In this paper spectrum sensing is done for DVB-T signals in the VHF band which has been declared as an operating band for Cognitive users.
Keywords: Cognitive Radio, Eigenvalue based detection, Energy detector, low SNR, Spectrum sensing.
Abstract
E-Notifier: Transport Information Services in Colleges and Exploring Mobile Notification
Chaugule Varsha Dattatray, Chavan Prajkta Pandurang, Deshmukh Akanksha Kishor, Pandore Yogesh Bandopant
DOI: 10.17148/IJARCCE.2016.54156
Abstract: In this paper we introduced E-notifier application in which students can view daily timetable through a widget & get important notices send by the server. The widget displays current lectures & by clicking on the widget, one can view entire days timetable. The important notices are displayed on the notification panel as soon as the user is connected to the internet. The basic architecture of this paper depends on two main areas client side & server side. Client: 1. As the user downloads the application he selects his branch & year to proceed.2 .The client side has mobile application that fetches the required time table details of particular branch &it�s correspond year using My SQL.3. The entire client side Application design using Java, android and SQLite. Server:-On the server side, the admin can log in to add new notifications & update timetable that is to be broadcasted. The admin will have the authority to access, add and edit any information on the server. The server side coding is done in PHP language.
Keywords: E-notifier, SQLite, widget, notification panel.
Abstract
Characterization Methods for Polymer Systems
Mashal Alenazi
DOI: 10.17148/IJARCCE.2016.54157
Abstract: In this paper, new method for determining Rigidity temperature applying cooling curve analysis. The determined values of Rigidity temperatures for three AlSi8Cu3 alloys with different contents of Strontium using thermal analysis technique have been compared with Rigidity temperatures obtained using mechanical technique (viscosity measurement). It was established that there is good correlation between measured values of Rigidity temperatures determined using both above mentioned techniques. Thermal analysis is a useful tool for investigating the properties of polymer/clay nanocomposites and mechanisms of improvement of thermal properties. This review work presents examples of applications of differential scanning calorimetry (DSC), modulated temperature differential scanning calorimetry (MT-DSC), dynamic mechanical thermal analysis (DMA), thermal mechanical analysis (TMA), thermogravimeric analysis (TG) and thermoanalytical methods.
Keywords: Polymer, Characterization , Rigidity, Thermal
Abstract
Efficient Resource Management in Cloud Computing Using Virtualization
Priyesh Kanungo
DOI: 10.17148/IJARCCE.2016.54158
Abstract: In the past decade, there has been a paradigm shift from traditional network computing environment to cloud computing. The reason is increase in the size of data to be stored, transferred and processed from several Megabytes to Terabytes, Petabytes and Exabytes. This paper describes the role of virtualization as technique for improving resource utilization and energy efficient computing in conventional client server environment as well as in modern cloud computing environments.
Keywords: Cloud Computing, Virtualization, Virtual Machine, Cloud Operating Systems, Service Oriented Architecture.
Abstract
Approaches for Securing Email Authentication Process – A Review
Shananda Dey, Ms. Jharna Chopra
DOI: 10.17148/IJARCCE.2016.54159
Abstract: Email, sometimes written as e mail, is simply the reduced form of "electronic mail� a system for receiving, sending, and holding electronic messages. It has gained practically universal acceptance around the world with the spread of the World Wide Web. In many cases, email has become the preferred method for both personal and business communication. Consequently, improve the security provision in necessary to maintain integrity and confidentiality of data. Passwords are by far the most used and the most conveniently subverted method of personal authentication. If a business institutes policies to guarantee secure passwords (such since frequently changed alphanumeric upper/lower case combo of by least 10 characters) the inconvenience is so high that such an plan will probably be broken in an overwhelming amount of instances.
Keywords: Handshaking Protocol, OTP, Captcha, Visual Cryptography.
Abstract
Intelligent Spectrum Sensing Techniques for Cognitive Radio Network
Smriti Bajpai
DOI: 10.17148/IJARCCE.2016.54160
Abstract: The growing demand of wireless applications has put a lot of constraints on the usage of available radio spectrum which is limited and precious resource. Cognitive radio is a promising technology which provides a novel way to improve utilization efficiency of available electromagnetic spectrum. Reliable spectrum sensing is one of the most crucial aspects for the successful deployment of cognitive radio (CR) technology. Spectrum sensing in CR is challenged by a number of uncertainties, which degrade the sensing performance and in turn require much more time to achieve the targeted sensing efficiency. Cognitive radio technology promises a solution to the problem by allowing unlicensed users, access to the licensed bands opportunistically. A prime component of the cognitive radio technology is spectrum sensing. Many spectrum sensing techniques have been developed to sense the presence or not of a licensed user.
Keywords: Cognitive radio networks, Spectrum sensing, Energy detection, Cyclostationary detection, Matched filter.
Abstract
Coplanar Capacitive Coupled Probe Fed Microstrip Antenna For C and X band
Ms. Yogita Shirdale, Mr. K. S. Kazi
DOI: 10.17148/IJARCCE.2016.54161
Abstract: The design and simulation of a coplanar capacitive fed mirostrip antenna suspended above the ground plane is presented. The proposed antenna is excited by a single probe feed. This antenna operates in two different bands C band having frequency range 4-8 GHz and X band having frequency range 8-12GHz .IE3Dsoftware is used for simulation. It is demonstrated that the proposed antenna can be used for wideband applications with impedance bandwidth of 53.74% at center frequency 7.015 GHz with good gain in microwave bands. Capacitive coupling is used to improve the results. Polyolefin is used as a dielectric material having dielectric constant 2.3.2.
Keywords: Microstrip antennas, Capacitive fed, Wideband, Absolute gain, Efficiency.
Abstract
Smart Ration Card System Using Raspberry-pi
Kumbhar Aakanksha, Kumavat Sukanya, Lonkar Madhuri, Mrs. A.S. Pawar
DOI: 10.17148/IJARCCE.2016.54162
Abstract: Ration Card is one of the important documents for every Indian family. Every family is given facility by government to receive food grains against a card. But there is lot of corruption involved in TPDS such as black marketing of the subsidized food grains as many families do not claim their quota of food grains and many families claim the quota of other families. As a solution to above problems this paper proposes a system which is highly scalable Ration Distribution System based on embedded system. The main target of this project was to bring transparency between government and customer, and this transparency is provided by webpage. Here the conventional paper ration book is replaced with RFID based smart card. When any transaction is done by customer he/she will receive a message on his mobile through GSM technology.
Keywords: Raspberry-pi, RFID module, GSM technology, RFID smart card, Embedded Web Server, GUI Screen
Abstract
Assistive clothing Pattern Recognition for Impaired people
Thogaricheti Ashwini, Mrs. Anuradha.S.G
DOI: 10.17148/IJARCCE.2016.54163
Abstract: Human�computer interaction (HCI) researches the design and use of computer technology, focusing particularly on the interfaces between people (users) and computers. HCI is one of the ongoing researches especially for visually impaired people. They introduce the special thematic session �blind and visually impaired people Human computer interaction and access to graphics� represents current research towards solutions for visually impaired and brings together researchers and practitioners. Choosing clothes with complex patterns and colors is a challenging task for visually impaired people. We have matured a camera-based model system that notice clothing patterns in four categories (plaid, striped, pattern less, vertical and irregular etc) and identifies 11 clothing colors. To recognize clothing patterns, we propose a Hough line Transformation for the detection of pattern and canny detection for detection of edges in the clothing pattern. we proposed the CCNY Clothing Pattern dataset and other different pattern datasets to our method. Using various other performances our method is under the study.
Keywords: Human computer interaction, cloth patterns, visually impaired people.
Abstract
Rapidity and authenticity augmentation using adaptive beamforming procedure for smart antenna systems
Mr.A.Suban, Mr.V.Karthick, D.Nagasuganthi, N.R.Sakila
DOI: 10.17148/IJARCCE.2016.54164
Abstract: In this paper, a modular adaptive beamforming algorithm has been proposed which is used for smart antenna users tracking purpose in a wide angle environment. It can be used for adaptation of subjective variations in eigen vectors. It can also be used for the autocorrelation matrix which consists of eigen values of the signal vector which is received is mostly useful for the case of moving subscriber situation. Furthermore, it uses one adaptive module which is better than previous works where two adaptive modules have been used and will lead to a high speed twice more than the previous works.
Keywords: adaptive beamforming,smart antenna, non blind algorithms,optimal weight vector.
Abstract
A Framework for Sharing Computations and Data Stores for Big Data Applications within and Across Organizations
Amandeep Gupta, Pritish Mukherjee, Anuj Mahajan, Vishal Pandey
DOI: 10.17148/IJARCCE.2016.54165
Abstract: Current business practices use separate systems to perform computations on data sets which may be from various sources; however, individuals or small organizations may lack this ability. The reuse of intermediate results across further computations is an important class of emerging applications. This paper aims to tackle this issue regarding sharing data between different organizations/applications and thereby optimizing their computations. In addition to sharing large amounts of data, we can share the intermediary/preliminary results from the data pipeline to various organizations. Any organization when handling data involves ETL steps for collecting data, pre-processing and then perform computations on it. If another organization wishes to work with the same data set, it has to repeat the collection, pre-processing and computation process. The proposed system can help organizations/end-users by providing intermediate computation results after performing ETL steps and basic processing on our end. These computation results are available for use by other organizations/individuals for further application specific processing using REST APIs or some other way.
Keywords: shared data store, shared computation, big data, sentiment analysis, image tagging, healthcare.
Abstract
Two Server Authentication using Shared Key Cryptography
Arati Sonawane, Ashwini Patil, Kuntal Bhangale
DOI: 10.17148/IJARCCE.2016.54166
Abstract: For many years peoples were used to send the message using the post office and other media which is not that secure. Passwords are commonly used by people during log in process to access such as computer, ATM, network, etc. Earlier password based authentication strategy are used with assume single server stored all password to authenticate the client during authentication. In earlier system the passwords necessary which is stored in a single server while authenticate client. The attacker can easily hack on single server, contain all data regarding password are easily available to attacker. In proposed system, where a client and a server, who share a password to authenticate each other and meanwhile establish a cryptographic key by share of messages. Propose system two server authentications, where a password is split into two parts, which are securely share on to the two servers during authentication using the PAKE protocol. The Protocol runs in parallel and is more efficient than existing.
Keywords: Security, shared key, password authentication, public key authentication.
Abstract
New Generations Smart Health Care System
Nupoor Awsarmol, S.A. Shaikh
DOI: 10.17148/IJARCCE.2016.54167
Abstract: This paper describes portable Bio-medical kit for monitoring health parameters such as Electrocardiogram signal, Blood Pressure and heart rate of the person. Bio-medical is the area which detects the harmful substances present in human body. From last few years this type of system has gaining more popularity because of its ease of use and accuracy. This paper presents such type of system which consists of wrist type sensor and electrodes for measurement of blood pressure and Electrocardiogram signal. Smart electronic unit is used for signal processing. This unit stores the data in the memory and makes the necessary conversions. Then measured data is transmitted wirelessly to smart phone or pc. We can see the output on Laptop or Pc with the help of MATLAB software.
Keywords: Electrocardiogram, Bio-Medical, Blood Pressure, Heart Rate.
Abstract
ICA: Internal Control and Audit
Shubham Shashikant Shinde, Amit Sarjerao Ugale, Sanket Dilip Dayama,Vishal Ashok Thube
DOI: 10.17148/IJARCCE.2016.54168
Abstract: Auditing is a process of acting accordingly and self-reliant examination of books , accounts and documents of a certain company or an organization to review and verify the genuineness of records. Auditing is now an event which is mobile or dynamic. Internal control can be defined as a promising process to successfully bring about the objectives in how efficient the operations are done , reliability of financial report and rules , regulations and their policies . It is very important measure taken as it plays a crucial role in detecting and stop from doing the fraud which includes both that is the machinery belongings and the things which are not having any physical presence such as character or status property such as trademarks, computerization has a massive impact on the control of an organization , the document information which is to be circulated and so on. Auditing introduced in the CIS has given rise to various changes in the procedure of collecting the evidence.
Keywords: cis, auditing, internal control, organization, computerized information system.
Abstract
Fully Automated Artifact Removal for BCI
Mr.Veeresh Patil, Mrs. Chetana Srinivas
DOI: 10.17148/IJARCCE.2016.54169
Abstract: A common problem faced by any of the devices concerning BCI applications (Brain Computer Interface) is that of the Artifacts. The undesired electrical signal interfering with the neurological activities of the brain as a consequence, misinterpreting the actual signal. The artifact may be generated internally or externally. The proposed method aims to reduce some of the predominant artifacts generated through the Electroencephalogram (EEG) such as eye blinks or artifacts generated from other devices such as Electroocculogram (EOG) or Electromyogram (EMG) . It is based on a novel combination of wavelet decomposition, Independent component analysis and thresholding. The factors for identifying the artifacts are estimated which differentiates the clean from affected EEG signal. We also intend to calculate the computational time of our proposed method for an EEG signal of 1s time frame.
Keywords: Brain Computer Interface, Artifacts, Electroencephalogram (EEG), wavelet decomposition, Independent component analysis.
Abstract
Analyzing Multipath Routing Protocol in Ad Hoc Networks
Sangeeta Singh, Swati Atri
DOI: 10.17148/IJARCCE.2016.54170
Abstract: A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that create a dynamic infrastructure-less communication network and an extremely challenging network. The design of robust routing algorithm for ad hoc networks is a big challenge, because network topology changes dynamically. In order to deal with the challenges such as fault tolerance, load balancing, minimizing end-to-end delay multipath routing strategy has been exploited. AOMDV is one of the multipath routing protocols. AOMDV is an extension to the unipath routing protocol i.e. AODV. This paper discusses routing strategies in mobile ad hoc networks, giving stress on multipath routing and compares the two protocols namely AODV (a unipath routing protocol) and AOMDV (a multipath routing protocol).
Keywords: Mobile Ad hoc Networks, Unipath Routing, AODV, Multipath Routing, AOMDV.
Abstract
Two Way Security Mechanism for Sybil Attack in Social Network
Rucha Patil, Tejashree Wani, Gunjan Bonde, Chetana Chopde
DOI: 10.17148/IJARCCE.2016.54171
Abstract: From many years, people were concerned about the security of social area network. In this social area network people create multiple bogus identities. To overcome this drawback, Sybil Defender mechanism is used along with the two way security technique is use. The proposed system involve sybil identification technique along with the concept of the two way security mechanism .This two way security mechanism divide the password in two server and according to fake clustering , ip differentiation ,ip log technique is use to identify where the user is sybil or genuine user. Due to this we can easily identify the sybil user. Thus we conclude that the proposed system provide better security than the traditional one.
Keywords: sybil attack, Sybil Defender, ip log.
Abstract
Ubiquitous Car Monitoring System
Sneha Pisey, Kalpita Kunte, Akash Sangle, Aditya Rathor, Vrushabh Sonigara
DOI: 10.17148/IJARCCE.2016.54172
Abstract: In today�s world road accident is the main cause of many deaths. There is no such application developed which can detect the accident and notify it to the driver�s relatives or to the hospital to provide the emergency services. Smart phones are being used for developing such smart applications for smart cities. The smart phone senses the parameters, computes the results and communicates with the server. This paper proposes a system which aims to provide cost effective means of determining the performance of the vehicle and tracking the vehicle by transferring the obtained data to an android device by using a Bluetooth controller. An electronic hardware unit is developed to carry out the transfer of the information between the vehicle�s on board system and the mobile phone which in this case is an android device. The results are then analyzed on the basis of the communicated data and viewed by the user or the owner to monitor the fuel consumption and the other important electromechanical parameters of a vehicle. The alarm alert systems i.e. A Buzzer is used to notify the driver or the admin about the results. This is done by using the interface sensors, grab sensors ADC values and applying the threshold conditions on those values. Alerts are generated if the threshold values are crossed. A message can be sent from an android device to the nearby hospital for providing emergency services in case of severe accidents. The sensors used are the Temperature sensor, Seat Belt detection sensor, Alcohol detection sensor, Fuel level detection sensor, Accident detection sensor, Drowsiness detection sensor (IR).The roads with bumps and pits are indicated to the driver by using an accelerometer present in the android device. The mobile device is capable of transmitting data to the server using cellular internetwork connection-WIFI.
Keywords: Android device, Threshold values, WIFI, Bluetooth, Accelerometer, Sensors, electromechanical parameters, Alarm alerts, Server.
Abstract
SGR Protocol Implementation for Detection and Prevention of Black hole Attack in MANET
Nithya J, Shabana Sultana
DOI: 10.17148/IJARCCE.2016.54173
Abstract: In MANET communication plays a vital role in situations like natural calamities etc. It is more vulnerable to security issues since it does have fixed infrastructure. MANET is a collection of mobile nodes that forms a temporary network. One of the security issues is packet dropping. The dropping of packet may be caused due to link failure or malicious node present in the network. The most common attack in MANET is the black-hole attack. Ad-Hoc on demand distance vector (AODV) is prone to packet dropping attack. This paper presents a new protocol implementation named as Secure Geographic Routing (SGR) which deals with packet dropping in network layer. It also detects and prevents packet dropping.
Keywords: MANET, AODV, black hole attack, SGR.
Abstract
A Review: Histogram Equalization Algorithms for Image Enhancement using FPGA
Miss. Sukanya V. Aher, Mrs. S. S. Vasekar
DOI: 10.17148/IJARCCE.2016.54174
Abstract: Degradation in the captured image quality is a common problem. There are various techniques to enhance the image quality. Some of the techniques used are Contrast Stretching (CS) and Histogram Equalization (HE). These are the basic techniques which don�t provide a significant improvement in enhancing image details. So this arises the need of advancement in these basic algorithms. The papers give a review of the several histogram equalization approaches. The paper also gives a comparative study on the results of implementation of the Adaptive histogram equalization (AHE) and Contrast Limited histogram equalization (CLAHE) and Dynamic histogram equalization (DHE) for gray scale images on FPGA. The proposed system describes Contrast Stretching and Dynamic histogram equalization based algorithms for hardware implementation on FPGA for color images.To validate the algorithms on FPGA, the simulation results are given based on visual analysis of the color input and output image.
Keywords: Histogram Equalization (HE), Dynamic Histogram Equalization (DHE), Adaptive histogram equalization (AHE), Contrast Limited histogram equalization (CLAHE) and Field Programmable Gate Array (FPGA).
Abstract
Image Dehazing Techniques: A Review of Research Trends
Ms. Titiksha N. Bhusari, Mrs. S. S. Vasekar
DOI: 10.17148/IJARCCE.2016.54175
Abstract: Haziness is a huge obstacle in the visibility applications, it is very important to remove efficiently. Outdoor scenes and images lose the quality, degrade under the bad weather conditions, and provide the Hazy images. Many researchers have worked on various proposed techniques to enhance the clarity, visibility of the hazy image, mostly worked on saturation and brightness. For an image, the process of haze removal is not a simple task so it plays a vital role in image processing. Due to haziness, an image generally lost color and edges, so dehazing/ haze removal technique restores edge losses and color impacts badly. By using polarization, RETINEX based approach etc. dehazing has been simpler. To enhance the quality of an image (hazy) the various parameters are required for processing to get the superior computer vision applications and haze free images. And contrast enhancement is also important step for more clear applications.
Keywords: dehaze, polarization, edge preservation, dark channel prior, color preserving, contrast enhancement.
Abstract
Augmented Reality: Analysis and Challenges in Interaction Techniques
R. Kugan, M. Balachandar, R.S. Ram Priya
DOI: 10.17148/IJARCCE.2016.54176
Abstract: Augmented Reality is a trending technology which has applications in many areas such as education, entertainment, advertisement, designing, military etc., Due to the advances in Image Processing and Mobile Computing, the application and access of augmented reality is increasing seamlessly. This paper analyses various Interaction techniques being used in the augmented reality on different platforms and discusses their advantages and limitations. It also includes future possibilities that can be expected in Interaction techniques in augmented reality.
Keywords: Augmented reality, Interactive techniques, Dimension gap, Virtual object.
Abstract
MIA-My Intelligent Assistant
Er. Sheeba Babu, Akhil S Nair, Akhil S R, Allan Abraham and Ashish Anil Abraham
DOI: 10.17148/IJARCCE.2016.54177
Abstract: In these days if we have any general doubts on solution for any arithmetic, it is our tendency either goggling or refer the books and solving it out. Here is the solution for it. We can just ask our doubts, if it is a general or arithmetic, no problem Mia will talk to you by replying the answer. Mia is an automatic answering machine. You can ask any logically correct questions and the Mia will answer you to that question. It is a smart machine which is working using a smart low cost SBC called Raspberry Pi. Raspberry Pi is an ARM based board. This board make us possible to work out this genius answering machine. The raspberry pi will be connected to internet using Wi-Fi or through Ethernet. We can speak to this machine which will be recording our speech. And based on what we asked to the machine, it will convert it to text and will search in internet and find the result regarding the query. Using a text to speech converter we can make the machine to answer the query back in speech. This makes the project smarter. We may be using sound card, Google API�s, Python, Wolfram Alpha Engine and Shell Scripting for work outing this project.
Keywords: Mia, SBC, ARM, Raspberry Pi, Wolfram.
Abstract
Low cost language recognition system
Prachi Pise, Prof Sunita Deshmukh
DOI: 10.17148/IJARCCE.2016.54178
Abstract: This paper presents a brief review of speaker & language recognition system using Hidden Markov Model (HMM).For accurate personal identification systems the use of biometric is preferred over the security system implemented by password and pin number. Speech recognition was biometric feature of voice of the speaker. Different speaker have different voice characteristics, these different characteristics are achieved by extracting feature vectors as MFCC from speech. The brief history of the hidden Markov Model explain about voice signal and the evolution of the HMM is done in Google Web API & this is implemented using low cost raspberry Pi. With the help of these techniques the performance has increased. The outputs of system are through speaker.
Keywords: Speech recognition (SR), MFCC, Hidden markov model (HMM), and Raspberry pi, Google Web API, Microsoft Web API.
Abstract
Design and Analysis of a tuned circular patch antenna for satellite communication application in C band
Anurima Majumdar, Antara Ghosal, Sisir k Das, Annapurna Das
DOI: 10.17148/IJARCCE.2016.54179
Abstract: In this paper a novel design approach of a probe feed circular microstrip patch antenna with four tuning arms on the radiation element for the dual-frequency operation is proposed. The cavity model is used for the parameter computation of the antenna. The circular antenna resonates at 4 GHz and 5.8 GHz which enables it to operate in standard C band which is used by communication satellites. TM110 is the dominant mode for this proposed antenna. The designed antenna provides 11 % bandwidth at 5.8 GHz (200 MHz) and the S[1 1] value is -42 dB whereas it provides 5.75 % bandwidth at 4 GHz (700 MHz) and the S[1 1] value is -16 dB. The absolute values of VSWR at 4 GHz is reported as 1.06 and at 5.8 Ghz is 0.08. A further modification is done on the proposed patch and a comparison of the designs are reported.
Keywords: Coaxial feed , circular microstrip patch antenna, C band , tuning arms, satellite communication.
Abstract
Speech and Palm Recognitions: A Review
Er. Akanksha Sambyal, Shailza Thakur
DOI: 10.17148/IJARCCE.2016.54180
Abstract: After years of research and development the accuracy remains one of the most important research challenges .In this paper multimodal biometric system for identify verification using two traits i.e. speech signal and palm, which increase the level of security the multimodal biometric systems, are used. In spite of many research efforts spent in trying to create an intelligent machine that can recognise spoken word and palm image and also it�s meaning. Our aim in this paper is to provide an overview of basic concept, types, and approaches and also presents what research has been done around for dealing with the problem of palm and speech recognition so as to provide a framework to understand the concept of palm and speech recognition.
Keywords: Biometrics, Speech recognition, Techniques of Speech recognition, Palm recognition, Techniques of Palm recognition.
Abstract
Efficient Packet Matching for Packet Filtering Firewall
Prof. Pragati M. Choudhari
DOI: 10.17148/IJARCCE.2016.54181
Abstract: An optimization algorithm which optimizes the sequence of firewall rules to reduce packet matching time is presented. It has been observed that some incoming packet can match with more than one rule. Such type of rules called as dependent rules and if their action differs then it is called as conflict. Our main focus in the paper is on dependent rules. This paper proposes an algorithm that is designed for conflict resolution and gives good network performance by reducing the packet matching time of the firewall.The algorithm uses the method of hashing for dividing the rule list into many equal sized sub-rule lists and resolve the conflict by the method of indexing which creates separate list for dependent rules. The performance of the packet matching algorithm which uses log file has improved performance over other alternative algorithm in terms of packet matching time.
Keywords: Dependent rules, firewall, network performance, packet matching, conflict resolution, hashing, indexing, log file.
Abstract
FRAppE: Identifying Malicious Facebook Application
Urvashi Yadav, Khushi Kumari, Rohini Lokare, Suhasini Borge, Prof. D.V. Shinkar
DOI: 10.17148/IJARCCE.2016.54182
Abstract: Nowadays use of social networking site like Facebook, Twitter, Google+ for communication and maintaining relationship among various user is increased due to its popularity on network. Each user that uses the social networking sites are making profiles and uploading their private information. These social networks users are not aware of numerous security risk included in this networks like privacy, identity theft and sexual harassment and so on. The third party apps on social sites have main role to make the site more attractive and incredible. The hackers are using these third party apps to get the private information and get unauthorized access to their accounts. As we aware that not most but least of the applications on sites are malicious. As research goes on the research community has focused on detecting malicious wall-posts and campaigns. In this paper, we are going to find that applications are malicious or not? In earlier system, It is important to note that mypagekeeper that is our base data, cannot detect malicious apps; it only detects malicious posts on Facebook. Those malicious apps contain the bunch of malicious posts. In contrast, frappe Lite and frappe are designed to detect malicious apps. Therefore the frappe or frappe Lite that is being developed is more powerful than mypagekeeper to develop frappe, we use information gathered by observing the posting behavior of basic Facebook apps that are running on it. So, first we try to find out the features of malicious apps and other characteristics of malicious apps that are harmful to users.
Keywords: Profiling Apps, Online Social Networks, Facebook Apps, Malicious Apps.
Abstract
A Clustering Based System for Diversifying WSRec Results
Ms. Apurwa Atre, Ms. Nayan Kamble, Ms. Vineeta Bisht, Mr. Tejas Mamarde
DOI: 10.17148/IJARCCE.2016.54183
Abstract: The use of Web services for various applications has led to the growth of web services on a large scale. Due to the increase in usage of web services, it has become of prime importance to design systems for effective web service recommendation. In our project, we propose a system for effective web service recommendations incorporating users� preferences regarding quality and diversities amongst web services. Users� requirements are considered and mined from his usage history. Then we find functional similarities using clustering techniques followed by applying a ranking algorithm to list top-k services. To discover high quality Web services, a number of QoS models for Web services and QoS-driven service selection approaches have been proposed in the service computing field. In this system user explicitly specifies his/her interests and QoS requirements, and submits them to the service discovery system. Then the service discovery system matches the user�s interests and QoS requirements with corresponding attributes of Web services, and returns those with the best matching degrees to the user.
Keywords: Web Service Recommendation, ANN, feature evaluation, ranking, top-services.
Abstract
ICA: Concept and Implementation of Internal Control and Audit
Shubham Shashikant Shinde, Amit Sarjerao Ugale, Sanket Dilip Dayama,Vishal Ashok Thube
DOI: 10.17148/IJARCCE.2016.54184
Abstract: Auditing is the process of examination of books, accounts and documents of an organization to review and verify trueness records. It also gives us a belief that the books of accounts are properly maintained and are used according to law. Internal Controls is a topic that has been implemented by most organisations to better separation of duties, low clerical errors, fraud, etc. The manner of conducting businesses have been changed but not substantially, CIS brings functionalities that revolutionizes the way of reducing work and the work load found in the process of auditing an organization which can have records that cannot be analysed a single personal. In this paper we have defined how we have implemented an application that justifies the points put up earlier.
Keywords: misstatements, books, accounts.
Abstract
A Comparative Study of Stability of Fixed Point State – Space Digital Filters using Saturation Arithmetic
Shiva Jaiswal, Pritee Verma
DOI: 10.17148/IJARCCE.2016.54185
Abstract: The problem concerning the elimination of overflow oscillation in fixed-point state-space digital filter employing saturation arithmetic is considered by various researchers. In this paper a comparative study of the stability of digital filters under saturation arithmetic is done.
Keywords: Digital filters, Finite word length, asymptotic stability, nonlinear system.
Abstract
Cluster Analysis of Satellite (LISS-III) Images of Earth surface
Anita Dixit, Nagaratna Hegde, P.S. Hiremath
DOI: 10.17148/IJARCCE.2016.54186
Abstract: In this paper, the objective is the digital image analysis of satellite images using clustering technique for identifying Vegetation, Water and Land area segments. The experimentation has been done using Linear Imaging Self Scanning (LISS-III) multispectral images of Dharwad area of Karnataka state in India acquired by IRS satellite. The KNN classifier is used. The experimental results are obtained from band-wise information and validated by using ground truth, which demonstrate the effectiveness of the method.
Keywords: KNN Classifier, LISS multispectral image, Satellite image, IRS Satellite.
Abstract
Vehicular Ad-Hoc Network and Wireless Power Transfer for Vehicles
Manish Kumar, Nidhi Prakash, Prachi, Sarim Qais, Anitha Suresh
DOI: 10.17148/IJARCCE.2016.54187
Abstract: Vehicular Ad Hoc network (VANETS) uses the principle of mobile Ad Hoc network (MANET). It is an approach for the intelligent transportation system (ITS). It provides communication between vehicles and also between vehicles and roadside base station. A vehicle in VANET is considered to be an intelligent mobile node capable of communicating with its neighbour and other vehicles in the network. In this paper the concept of wireless power transmission is also explained using the inductive coupling. Its future application is charging of the electric vehicles without any direct conductive wire. Using the inductive coupling electrical energy is transmitted between source (i.e. transmitter coil) and electrical load (i.e. receiver coil). This paper provides focus on the various applications of VANET like Horn control, real time traffic update and WPT for charging electric vehicles.
Keywords: Vehicular Ad hoc Network, Intelligent transportation system (ITS), Wireless Power Transfer (WPT), applications, Electrical Vehicle (EV) , Horn Control System, Traffic management system.
Abstract
MINDEX_IB: A Feature Selection method for Imbalanced Dataset
Hemlata Pant, Dr. Reena Srivastava
DOI: 10.17148/IJARCCE.2016.54188
Abstract: It is common to have an unbalanced class distribution in many classification problems. The class imbalance problem is even more severe when the dimensionality is high. One commonly used strategy to improve the classification performance is feature selection. Feature selection is a technique to select a subset of relevant features that allow a classifier to reach optimal performance. Most of the approaches for feature selection methods for imbalanced datasets mainly focus on an imbalanced dataset with two classes and does not work significantly well with a multiclass imbalanced dataset. In this paper, we propose a filter feature selection algorithm called MINDEX_IB, for unbalanced data sets. MINDEX_IB is a filter approach based measure. The proposed measure focuses on efficient partitioning of the attribute domain. Here, partitioning is done via micro-clustering i.e. the process of making micro-clusters. MINDEX_IB outperforms other feature selection algorithms in terms of number of features selected, accuracy and also in terms of performance measures for the imbalanced dataset such as F-measure and AUC evaluation measure.
Keywords: Feature selection, Imbalanced dataset, Classification, Filter based approach.
Abstract
Comparison of ARIMA and Artificial Neural Network Models for Forecasting Indian Gold Prices
Parminder Kaur
DOI: 10.17148/IJARCCE.2016.54189
Abstract: Gold has always been considered to be the safest haven for investment by the Indians. In fact gold is widely regarded as a hedge against adverse financial and economic conditions by the Indians. Thus prior prediction of gold prices assumes great importance as it can aid both the investors and the traders in making intelligent investment decisions in the Gold market. Time Series forecasting has found wide spread applications in varied spheres of business, economics, commerce, production and many others. On the other hand, the past few years have also witnessed rising popularity of Artificial Neural networks for forecasting purposes. This paper compares and analyses the forecasting of the Indian Gold prices using the linear Autoregressive Integrated Moving Average (ARIMA) model and the non linear Artificial Neural Network (ANN) model by developing two models based on these approaches. The relative forecasting efficiencies of the two proposed models is then compared using the statistical measures of performance.
Keywords: Artificial Neural Networks, Autoregressive Integrated Moving Average (ARIMA), Indian Gold Prices, Time Series Forecasting.
Abstract
Document Clustering Analysis Based on Hybrid Clustering Algorithm
Neha Garg, R.K. Gupta
DOI: 10.17148/IJARCCE.2016.54190
Abstract: In today�s era of World Wide Web, there is a tremendous proliferation in the amount of digitized text documents. As there is huge collection of documents on the web, there is a need of grouping the set of documents into clusters. Document clustering plays an important role in effectively navigating and organizing the documents. The k-means clustering algorithm is the most commonly document clustering algorithm, it takes less computation time than a matrix-based clustering algorithm. The major problem with this algorithm is that it is quite sensitive to selection of initial cluster centroids. This article proposed a hybrid Genetic K-means clustering algorithm that improves the quality of clusters. Further, author has also performs a comparisons of hybrid algorithm and k-means algorithm on two different text document dataset. The experimental results show that the proposed method is more effective and converge to more accurate clusters than previous method.
Keywords: Document Clustering, Cosine Similarity, k-means, Genetic Algorithm, Purity measure.
Abstract
A Review on Weight Based Clustering Algorithms in Wireless Sensor Networks
Pooja Mishra, Sanjiv Sharma
DOI: 10.17148/IJARCCE.2016.54191
Abstract: In past few years, Wireless sensor networks (WSNs) is growing enormously in order to achieve aforementioned WSN related purpose such as improved network lifetime and energy efficient network. This is challenging task in WSNs due to its resource restriction. The objective of this paper is to present some modified weight based clustering algorithms (WBCAs) those are initiated from mobile ad-hoc network (MANET). WBCAs consider several different parameters such as transmission power, number of neighbour�s nodes and remaining energy etc. to select a cluster head (CH), which is more beneficial compared to other clustering algorithms that consider one or two parameters into account.
Keywords: Wireless Sensor Networks, Combined Weight Function, Network Lifetime, Cluster Head.
Abstract
Transfer of NOR Flash Instructions through Serial Peripheral Interface Bus
Laxmi, Dr. Yogish H K
DOI: 10.17148/IJARCCE.2016.54192
Abstract: This paper focuses on the analysis of NOR flash and Serial Peripheral Interface (SPI) bus. In this paper we are dealing with the testing feature of the NOR flash memory and developing the architecture of validation suite. The communication is achieved via SPI bus between host and target. Host and Target are microcontroller and FPGA. In between these two SPI bus acts as an interface. NOR flash is a kind of permanent technology that stores the data or information even though the power is off. There are two types of Flash memory, such as NOR flash memory and NAND flash memory. NOR flash is used because it has execute in place feature and read operation is faster than NAND flash memory. Also comparison in done in between three approaches like Extended SPI approach, Quad approach and Octal approach.
Keywords: NOR Flash, SPI bus, Host, Target, execute in place, NAND Flash, communication.
Abstract
An Outsourced Key Revocation Technique for Secret key Management in Decentralized Identity Based Encryption Scheme
Sahana Govindappa, K.R. Shylaja
DOI: 10.17148/IJARCCE.2016.54193
Abstract: Identity Based Encryption (IBE) which disentangles general key and authentication administration at Public Key Infrastructure (PKI) is a vital distinct option for open key encryption. In any case, one of the fundamental productivity disadvantages of IBE is the overhead calculation at Private Key Generator (PKG) amid client repudiation. Productive renouncement has been all around examined in conventional PKI setting, yet the bulky administration of testaments is absolutely the weight that Attribute based encryption (ABE)endeavours to lighten. In this anticipate, going for handling the basic issue of character repudiation, we bring outsourcing calculation into ABE interestingly and propose a revocable ABE plan in the server-helped setting. Our plan offloads the greater part of the key era related operations amid key-issuing and key-overhaul procedures to a Key Update Cloud Service Provider, leaving just a consistent number of straightforward operations for PKG and clients to perform locally. This objective is accomplished by using a novel conspiracy safe procedure: we utilize a half and half private key for every client, in which an AND door is included to interface and bound the character part and the time segment. Moreover, this project propose another development which is provable secure under the as of late formulized Refereed Delegation of Computation model.
Keywords: Identity based encryption (IBE), revocation, outsourcing, cloud computing, Cryptography.
Abstract
Automatic SnailPest Detection and Soil Parameter Measurement Using Zigbee Network
Haresh D Karangia, Prof. Nilesh Desai
DOI: 10.17148/IJARCCE.2016.54194
No abstract available.
Abstract
Cell Phone Accident Preventer to Eliminate the Risk of Accidents during Driving
S. Kanakaraj, C. Kamalanathan, S. Valarmathy
DOI: 10.17148/IJARCCE.2016.54195
Abstract: Conversing on cell phones while driving is as calamitous as driving our car after drinking which can lead to various disastrous major miss incidents. Do you know that using a mobile phone while driving can influence the cognitive functions of persons, amuse his or her visual concentration and also the speed of processing message. It has been also confirm that use of cell phones while driving puts a driver at an extremely higher risk of collision by distracting their mind. It matters even if the person makes use of hands free or hand-held phones, which has no escape to it. This deadly combo has crunch increased the risk of accidents in range numbers. The theme of this project is to make the driver to attend only the emergency calls. Initially driver should enable call forward to system number. When a call is made to driver, the caller will receive a message intimating that he is in driving. If once again he calls the driver then it is understood that it is crunch. So the driver will get an intimation regarding the emergency call through LCD display. If he wants to make a call, he must stop the car. Unless the system will recognize in such a way that the driver is speaking in mobile phone while driving. It automatically reduces the car fuel supply by variable Solenoid so that the driver will have time to park the car. Thus the system prevents accidents due to phone calls.
Keywords: GSM Module, Mobile Phone Sniffer ,DC Motor, Solenoid valve, Flow sensor, RPM Sensor.
Abstract
Automation of Interventional Analysis in Physiological Variability Using Data Mining: A Review
Sunila Godara, Shagun Goyal
DOI: 10.17148/IJARCCE.2016.54196
Abstract: The changes or variations that occur in physiological parameters of the body when a person is in state of rest, which means he/she is still, lying down, not talking, not under any pressure not even thinking, if possible, is termed as physiological variability (PV). The importance of physiological variability was realised thousands years ago by Indian Medical System, AYURVEDA. It was then referred as �NAADI PARIKSHA�. Today, the Interventional analysis of physiological variability had become crucial for the assessment of Autonomic Nervous System(ANS) activities. ANSis further divided into Sympathetic and Para-Sympathetic Systems which have opposite impact on any of the organ systems of an individual. Increase in the heart rate, the secretions of the glands of alimentary track etc. are some physiological factors controlled by ANS. This paper discusses various research papers and articles, analysing how the factors determining the physiological ari ability can be easily calculated by intervening with the body only non-invasively in order to determine the individual�s health index. Emphasis have also been laid on increasing number of softwares used for analysis of such data; where the developers use various Data Mining Techniques for developing such medically relevant softwares. Heart Rate Variability (HRV), Peripheral Blood Flow Variability (PBFRV) and Morphological Index Variability (MIV) are the main highlights as these are key parameters in PV.
Keywords: Physiological Variability, Automatic Nervous System, Para-Sympathetic Changes, Data Mining.
Abstract
Survey on Content Based Image Retrieval Techniques
Payal dhiman, Yamini sood
DOI: 10.17148/IJARCCE.2016.54197
Abstract: In the present state image retrieval plays a dynamic character. The turf of image retrieval has been a dynamic research zone for numerous eras and has been rewarded more and more devotion in current years as a outcome of the theatrical and wild increase in the tome of digital images. CBIR purposes at verdict image database for exact images that are alike to a given query image based on its features. Users can question sample images based on these features such as texture, color, region, shape and others. Mark or nearby Images can be regained in a slight fast if it is clustered in a correct way. For gathering, we use fuzzy- c mean clustering. In this system related images will be retrieved from database.
Keywords: Content based image retrieval, Auto-correlation, RGB components, Query, retrieval design, image mining.
Abstract
Biomedical Image brightness preservation and segmentation technique using CLAHE and Wiener filtering
Miss. Priya S. Patil, Prof. P. P. Pawade
DOI: 10.17148/IJARCCE.2016.54198
Abstract: In biomedical image processing, low contrast image analysis is a challenging problem. Low contrast digital images reduce the ability of observer in analyzing the image. Image enhancement and information extraction are two important components of biomedical image processing. Image enhancement techniques help in improving the visibility of any portion or feature of the image. The most effective method used for contrast enhancement is Histogram Equalization (HE). Here propose a new method named �Biomedical Image brightness preservation and segmentation technique using CLAHE and Wiener filtering�. Here use CLAHE and Wiener filtering based techniques to enhance contrast of biomedical images. The contrast of an image is enhanced by applying CLAHE on small data regions called tiles rather than the entire image. Wiener filtering reduces the content of noise in histogram equalized image.
Keywords: Biomedical Image Enhancement, CLAHE, Wiener filtering, Contrast Enhancement.
Abstract
Train to Train Communication using Wireless Network
Sandhya . A, Sajal Mandal, Rajat Chandak and Mounik Patel
DOI: 10.17148/IJARCCE.2016.54199
Abstract: Today�s progressive railroads find themselves compelled to consider a CBTC upgrade because of its promises of increased safety, reliability, availability and associated reduction of maintenance costs; increased system capacity using the same civil infrastructure and its ability to reduce downtime during an upgrade. The urban rail transit systems has rapidly developed around the world, and due to increasing traffic pressure, there is a high demand to improve the efficiency of rail transit system. Communication based train control (CBTC) network is an automated control network for railways that ensures the safe and efficient operation of rail vehicles using data communications.
Keywords: CBTC, Minimum Turn-Back Interval Time, Turn-Back Capacity, ATO.
Abstract
Remote HealthCare Monitoring System Using Arduino Board over Distributed Ubiquitous Environment
Sowmya G, Sandeep B L
DOI: 10.17148/IJARCCE.2016.54200
Abstract: Sensors are hardware devices which are used to tracking various parameters of environmental and body. In growing technology sensor plays major role due their low cost and heterogeneous applications. In healthcare industry, sensors are the key area of interest due to increased cost of healthcare. In this project proposed efficient architecture for monitoring patient pulse rate and temperature over distributed ubiquitous environment using Arduino Board. The system uses pulse sensor for tracking pulse rate of patient body. Using sensors we can only obtain the various parameters of environment or body, but taking decision based on obtained value is necessary. Therefore, the proposed system embeds message passing framework to the device based the sensor data variation.
Keywords: GSM, Arduino Uno, pulse oximetry sensor, server, AT commands.
Abstract
Efficient Single/Concurrent Failure Detection for Mapreduce Application in Heterogeneous Node
Akshya Ramesh, Akshaya S, Beaula K.A, M P Geetha
DOI: 10.17148/IJARCCE.2016.54201
Abstract: Data availability is critical in distributed storage systems especially when node failures are prevalent in real life. A key requirement is to minimize the effort of recovering the lost or unavailable data of failed nodes. To ensure data availability, a storage system often introduces data redundancy via replication or erasure coding. The erasure coding is adopted in large scale storage system which achieves less redundancy overhead than normal replication under the same fault tolerance. Erasure Coded Storage system supports both single and concurrent failure recovery and aims to minimize the band width of recovering the failures. The performance of degraded reads is boosted by addressing both I/O parallelism and node heterogeneity. The temporarily unavailable data is quickly retrieved with the support of Raid Node, which retrieves the unavailable block from the surviving nodes. The performance is evaluated by Word Count Job to compare which computes the occurrences of each word in a document.
Keywords: Erasure-coded storage system, degraded reads, RAID Node.
Abstract
Reduction of Migration Cost in Cloud Applications
Korimani Radha, Vasudev S Shahapur
DOI: 10.17148/IJARCCE.2016.54202
Abstract: Enabled by virtualization technologies, various multi-tier applications are hosted by virtual machines (VMs) in cloud data centers. Live migration of multi-tier applications across geographically distributed data centers is important for load management, power saving, routine server maintenance and quality-of-service. Different from a single-VM migration, VMs in a multi-tier application are closely correlated, which results in a correlated VM migrations problem. In this paper, we explore performance of multi-tier applications during the virtual machine migration in cloud as well as issues and solutions during VMs migration.
Keywords: Cloud, live migration, multi-tier application, virtual machine.
Abstract
Image Steganography: A Review
Er. Munish Katoch, Reenu Jaswal
DOI: 10.17148/IJARCCE.2016.54203
Abstract: In the recent years, the security related to data over the internet has become a major issue. In order to solve the problem, two main techniques are used, first is cryptography and second is Steganography. Both are used for data security purpose. Cryptography changes the form of the data and Steganography completely Conceals its presence from the users, except the intended receiver. In this paper, a technique is used which combines these two methods to provide a more efficient and effective result. Therefore different cryptographic algorithms are compared on the basis of Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR)
Keywords: Steganography, Visual Cryptography, Steganography Techniques, Stego Image.
Abstract
BLE (Bluetooth Low Energy)-based Safety System for School Bus Network
Akkhilaysh Kushal Shetty, Harshad Shinde, Ashwath Kumar Salimath, Ankit Verma
DOI: 10.17148/IJARCCE.2016.54204
Abstract: The advent of Internet of Things(IoT) has provided boundless opportunities in solving real world problems in practical as well as robust approaches. We propose a system, using BLE, to build a safety scheme for concerned parents regarding their respective children to ensure safe to-and-fro commute from home to school and back. Using an Android app, the bus unit will be used to detect when a child boards or leaves the bus. These events trigger a notification messages with relevant information communicated to the parent app as and when the tag interacts with the bus unit. The system is a mobile-based and web-based database-driven application that facilitates status reporting of children to authorized personnel.
Keywords: Bluetooth Low Energy, BLE, Internet of Things, Android, Transportation Safety System, Child Safety, School Bus.
Abstract
Effect of Four Wave Mixing at different Channel Allocation Schemes for DWDM Communication System
Prithipal Singh, Satbir Singh
DOI: 10.17148/IJARCCE.2016.54205
Abstract: In this research paper, the effect of four wave mixing (FWM) has been analyzed and compared for different channel allocation schemes such as equal space channel allocation (ESCA) and unequal space channel allocation (USCA) schemes for a Dense Wavelength Division Multiplexing (DWDM) system. The simulated results have been analyzed for fixed numbers of channels (N=8). We have evaluated the Quality-factor (Q-factor) of the DWDM system for different parameters such as optical fiber length, laser power, channel spacing and data rates. In the ESCA and USCA schemes, the Q-factor varies from 27.72 dB to 5.95 dB and from 40.47 dB to 6.25 dB respectively as the distance increases from 25Km to 125 Km at a bit rate of 8�10 Gbps. The results of simulative observation revealed that the unequal channel spacing provided better Q-factor for DWDM system than equal space channel allocation scheme Further, it has been observed that on decreasing the channel spacing between input channels, their mutual interference increases and thus, the effect of four wave mixing also increases. Similarly, as the channel spacing increases, the FWM effect decreases for the DWDM system.
Keywords: FWM, ESCA, USCA, DWDM system, Channel spacing, Q-factor.
Abstract
Number Plate Detection of Moving Vehicle by Image Processing
Prof. C. P. Shinde, Prof. P. V. Lokhande, Prof. Harsha C. J, Prof. S. S. Matsager
DOI: 10.17148/IJARCCE.2016.54206
Abstract: Given the advancement of technology into the new age of electronic and communication, it is no wonder we would expect ourselves to use Digital Image Processing to capture and transform data images within the shortest and most accurate period of time. In this project, MATLAB software � Image Processing Toolbox will be adopted for the development of algorithms for image processing on a moving base vehicle. The task will be studied based on several data abstraction levels: image restoration, image segmentation and two-dimensional object recognition. Generally, the first approach will be applied for noisy and degraded images whereas the second approach will be applied for low and segmentation-level analysis of infinite image sequences. The last approach is suitable for two-dimension tracking.
Keywords: Image restoration, Restoration Methodology, median filter, Image Segmentation, Representation.
Abstract
Cell Phone Operated Mobile Bug Using Microcontroller
Sarvar Begum, Ramya Shree G. R., Swetha T. S., Vasanthi. K
DOI: 10.17148/IJARCCE.2016.54207
Abstract: Now a days the most problem of world is unauthorized use of mobile phones in prohibited areas like confidential rooms, prisons, colleges, schools, hospitals, petrol bunks etc. There is great need to limit the use of cell phone at particular places and at particular times. Hence, the use of intelligent mobile phone detector is guaranteed. The main scope of this project is to develop an embedded system, which is used to detect the use of mobile in our surrounding using microcontroller and sends information to monitor section using zigbees. The objectives of the system are- To develop an embedded system, which is used to detect the mobile in our surrounding using microcontroller and sends information to monitor section using zigbees. To prevent use of mobile phones in confidential rooms, etc.
Keywords: Signal Comparator, AT89S52 Microcontroller, Zigbees, Buzzer, LED.
Abstract
Plagiar: Plagiarism Detection using Tool for Text Document and Source Code
Teja I, Smitha Shekar B
DOI: 10.17148/IJARCCE.2016.54208
Abstract: Source code written falsification has been a sympathy toward numerous instructors in software engineering field, given to the simplicity of accessibility of substance in this period of web. The tool built up is an instrument for identifying written falsification in source codes of understudies learning programming dialects, to take into account the requirements of educators and help them screen understudies source codes. Right now the instrument underpins Java Programming Language. The instrument works in three stages. Tokenization took after by N-Gram representation of source codes and afterward examination utilizing Greedy String Tiling calculation. Reaction time of the device is one moment for 50 source code records of length 75 lines of code (LOC). According to the exploration, results given by the instrument are ninety-nine percent right. The goal of this anticipate is to build up a device for distinguishing written falsification in both the source code and non-specific printed information documents for conquering the downsides of the current methodologies.
Keywords: Plagiarism, Source Code, Text Document, Tokens, Detection Tool.
Abstract
Reconfigurable Finite Impulse Response Interpolation Filter Using BCSE Algorithm
Bagadi Madhavi, A.Nagamalli
DOI: 10.17148/IJARCCE.2016.54209
Abstract: Many wireless communication standards like IS-95, UMTS and WCDMA adopt root raised cosine filter as the channel filter for its ability to reduce BER by disallowing timing jitter at the sampling instant. However, different standards involve different oversampling rate and roll-off factor for the RRC filter. To support all of these standards in a single device, a reconfigurable RRC filter is needed. This has motivated us to propose a new architecture for a reconfigurable RRC filter in this paper and implement it on FPGA platform. This paper proposes new low-power, high-speed architecture and synthesized result of a multi-tap reconfigurable RRC FIR filter, one of the major components in DUC. The proposed RRC filter can support three different interpolation factors along with two different roll-off factors mostly used in the present days wireless communication standards. The design presented in this paper can be reconfigured at any time by selecting the proper value of the two parameters, interpolation control and roll-off factor control parameter. The design is fully multiplexer based, by which controllable switching activity has been made and reduction in the area has also been achieved.
Keywords: RRC FIR Interpolation Filter, Software Defined Radio, FPGA, Reconfigurable Architecture, Digital Up Converter, BCSE Algorithm.
Abstract
An Enhanced Approach of Encrypting Audio Segments Using OFDM
Miss. Ashwini A. Varhekar, Prof. A. B. Gadicha
DOI: 10.17148/IJARCCE.2016.54210
Abstract: The encrypted techniques present knowledge of encryption. A study of a new secure audio encryption and decryption technique is proposed here. A multidimensional key is generated then the selected audio samples are converted to binary format then in this technique, audio is sampled using orthogonal frequency division multiplexing (OFDM). Then the sample bits are swapped and the regenerated samples are filled into the orthogonal matrix. Thus a resultant encrypted audio wave is created. At the receiver and the same procedure is used to perform the decryption. The new technique is employing more security to the audio data file. Therefore, a more encrypted audio wave is obtained using this proposed technique.
Keywords: OFDM, encryption, orthogonal matrix, multidimensional key etc.
Abstract
Review on Implementation of ACO technique for leukaemia detection
Jeenu Garg
DOI: 10.17148/IJARCCE.2016.54211
Abstract: Automatic advance of leukaemia detection is planned. A physical technique of LEUKAEMIA DETECTION, specialist checks microscopic images. Leukaemia detection is generates in the bone marrow. Lengthy and time taking process which depends on human�s ability and not having accuracy. Each bone contains a thin material inside is known bone marrow. The components of erythrocytes and leucocytes and platelets. Basically Leukaemia is detected only by analysing the white blood cells. Focused only on WBC, Leukaemia Detection system analyses the microscopic image and conquer these Drawbacks. It extracts the necessary parts of images and direct applies some techniques. K-mean clustering is used only WBC (WHITE BLOOD CELL) detection. In this paper we describe a system for medical data processing that mainly uses ACO (Ant Colony Optimization) technique that provides the consequences for leukaemia detection and classification through multi-layer neural network (BPNN).
Keywords: Data Mining, ACO (Ant Colony Optimization, BPNN (Back Propagation Neural Network), K-mean clustering.
Abstract
Voice Browser
Aishwarya Chitanvis, Ankita Joshi, Bhumik Dedhia , Prof. Grishma Sharma
DOI: 10.17148/IJARCCE.2016.54212
Abstract: A web browser is used to display web pages, navigate from one web page to another with the use of hyperlinks, and download any type of data right from PDF files, Presentations, Word files to music, videos and images. Browsing is using the mouse, keyboard and touch (in case of smartphone applications. But what about the handicapped and the visually impaired users? How would they use the search engine? We have tried to come up with a solution by creating a Voice Based Browser that is a completely hands-free search.
Keywords: Speech Recognition, Text to Speech, Web Browsing, Speech Synthesis, web crawler.
Abstract
A Methodology for Detecting/Identifying Fruit Infection with Grading System
Miss. Neha D. Ghatole, Prof. A.B.Gadicha
DOI: 10.17148/IJARCCE.2016.54213
Abstract: Computer vision techniques have applied for detecting a measuring the food quality as well as grading. Sorting of fruits and vegetables is one of the most important process in fruits production, while this process is typically performed manually in most countries. Learning methods are detected for the task of classifying infected/uninfected fruits from images for outer surface. A series of color and texture features are extracted from the captured images and principal components analysis performed to reduce the dimensionality of the resulting feature vectors.
Keywords: Fruit quality, Fruit images, Color, Texture, PCA, Pattern classification.
Abstract
Application of Secure Multiparty Computation in Privacy Preserving Data Mining
Karan Saxena, Saurabh Satpute, Aditya Gupta, Varun G
DOI: 10.17148/IJARCCE.2016.54214
Abstract: Privacy preserving data mining is an area of research concerned with the issues of privacy thus providing a solution to minimize privacy threats in data mining. PPDM also helps in maximizing analysis outcome and also helps in minimizing the disclosure of individual or organizational private data. The existing system comprises of several privacy preserving techniques but all these techniques lacked in the parameters of Input privacy and correctness. With the use of Secure Multiparty Computation (SMC) more focus is given on the parameters of Input privacy and correctness with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private. SMC helps in performing global computations on the private data with the help of several trusted third parties (TTP) so that there is no loss on data and privacy is maintained. The main aim is to implement this technique of SMC in the online transaction processes so as to make the transactions happening across the world as safe and secure as possible. The overall online transaction system developed must be user friendly and the privacy or confidentiality of the users have to be preserved so that in the near future the users taking part in the process do not hesitate in providing their details and the confidentiality for each user detail is maintained.
Keywords: Secure Multiparty Computation(SMC), trusted third party (TTP), PPDM.
Abstract
Knowledge Discovery from Social Media Data for Education Enhancement
Ms. Neelam Borde, Ms. Neha Dubey, Ms. Aakankshi
DOI: 10.17148/IJARCCE.2016.54215
Abstract: Social media has gained a lot of popularity amongst the students. Students share their feelings and their day to day experiences on it in a very informal and casual manner. Experiences and problems of students revealed through social media need human interaction or human analysis. Knowledge from such uninstrumented environments can present valuable data to report student problem. But mining knowledge from such data can be a very challenging task. The huge amount of data requires automated data analysis techniques. In this paper, a work-flow is developed which combines both qualitative investigation and large-scale data mining scheme. The data posted by students are collected and analyzed. It is found that certain issues like heavy study load, hectic schedule and lack of sleep are encountered by the students. Hence these issues are classified using Naive Bayes Multi-label Classifier algorithm. Here we are also using the clustering algorithm i.e. K-means. This both techniques classification and clustering can help in understanding the student�s problem in a very efficient way.
Keywords: Data mining, social media, text mining, social network analysis.
Abstract
Underwater Image Denoising and Enhancement using Multiscale Product Thresholding and Weber’s Law
Miss. Rutika S. Ingole, Prof. C. J. Shelke
DOI: 10.17148/IJARCCE.2016.54216
Abstract: In a recent year, it is difficult for the researchers to remove noise from the original signal as well as to enhance the quality of the image. However light scattering and color change problems still exist in the underwater image. Scattering problem is affected due to the large suspended particles, which generally leads to the degradation of the image. Color change problem is affected due to the different wavelengths are attenuated to different degrees in water, causing ambient underwater environments to be dominated by a bluish tone. This paper implements a novel method based on multiscale product thresholding and weber�s law in order to denoise and enhance the underwater image quality. In this, the proposed scheme is applied to RGB color and grayscale underwater images. The complete image processing is done using MATLAB simulation model.
Keywords: Noise, Weber�s law, Multiscale product thresholding etc.
Abstract
The complex and choosing countermeasure in virtual Network Systems
Vijay Kumar, Sata Nand, Lekh Raj
DOI: 10.17148/IJARCCE.2016.54
Abstract: Network Intrusion Detection System (NIDS) is an intrusion detection system that attempts to discover unauthorized access to a computer network by analyzing traffic on the network for signs of malicious activity. In traditional data centers, where system administrators have full control over the host machines, vulnerabilities can be detected and informed by the system administrator in a centralized manner. But in case of cloud data centers, where the cloud users are having the independence to install and control the desired software, they can install vulnerable software�s on their managed VM�s and contravene the Service Level Agreement (SLA) and as a result loophole in cloud security are created.
Keywords: NIDS, signs, vulnerabilities, cloud data centers, Service Level Agreement.
Abstract
Digital Image Defogging Using Dark Channel Prior and Histogram Stretching Method
Miss. Radhika P.Yawale , Prof. A. S. Kapse
DOI: 10.17148/IJARCCE.2016.54218
Abstract: In recent world scenario digital image processing is the most widely used application. Digital image processing is the method to perform some operations on the image, in order to get an enhanced image and extract some useful information from that image. Mostly in winter season the visibility of outdoor images captured in bad weather is often degraded due to the presence of fog. Because of this problem clear images are not obtained. In this paper, the proposed method uses the dark channel prior and histogram stretching methods for removing a fog from the images and obtaining a more clear images. Whereas dark channel prior is used to improve the quality of foggy images by removing a fog and histogram stretching method is used to improve the contrast of the image.
Keywords: Image processing, defogging, dark channel prior, histogram stretching etc.
Abstract
Computer Based-Medical Decision Support System for Prediction of Heart Attack Using Data Mining Techniques
Priyanka N, Dr.Pushpa RaviKumar
DOI: 10.17148/IJARCCE.2016.54219
Abstract: Medical field is fast growing with adoption of technology tools. Technology has reduced the burden on medical staff with various software which has made the works quick and easy. Medical software when properly planned and utilized has benefits of minimizing the cost and time of the medical professionals. In this regard Data mining is an effective tool that can prove useful to utilize the information in the database in diagnosing a disease or its appropriate treatment. This aids to provide quality care to the patients. In order to achieve this above objective this paper has been designed to develop Computer Based-Medical Decision Support System for Prediction of Heart Attack using Data Mining technique namely Na�ve Bayes. It is a web based questionnaire application. It helps to diagnose the heart disease through the answer given by the user. Thus it assists the practitioner in even assessing complex conditions & arriving at accurate medical decision/diagnosis.
Keywords: Na�ve Bayes, decision support, data mining, heart disease.
Abstract
Review Paper on Object Analyzer and its Application
Mr. Bagade Pratik Ramkrishna, Prof. S.N. Jain
DOI: 10.17148/IJARCCE.2016.54220
Abstract: Background minimization methods are largely oppressed for to detect moving commodity in videos in many applications, such as traffic auditing, human behaviour catching, and video surveillance. This yields a stable, real-time outdoor sleuth that reliably pact with lighting differences, monotonous motions from clutter, and long-term scene changes. This new background maintenance technique makes the system to be able to work under varying environments. The large effective depository limit using coagulated video bulges to the essence of fast storage and retrieval functions, to enable quick user-friendly probing for an avenue to peculiar parts of the video data.
Keywords: consumer video surveillance, intelligent analyzer, unattended object, multiple background model.
Abstract
A Review on Channel Estimator With Leakage Nulling
Ms. Deepali S.Pawar, Prof. Pallavi H. Patil, Prof. C.S. Patil
DOI: 10.17148/IJARCCE.2016.54221
Abstract: Although tremendous progress has been made on the past years on channel estimation in of dm systems still it is considered as area of concern in wireless communication. A novel channel estimation technique with virtual sub carriers is proposed in this work namely a low-complexity but near-optimal DFT-based channel estimator with leakage nulling is proposed for OFDM systems using virtual subcarriers. The flow of the proposed approach is initially starts with time-domain (TD) index set estimation considering the leakage effect then followed by low-complexity TD post-processing to suppress the leakage. The proposed channel estimator approach outperforms the existing channel estimators in terms of efficiency and performance. Finally the performance and complexity of the proposed algorithm are analysed by simulation results.
Keywords: OFDM, Channel estimation, Time domain, Wireless communications.
Abstract
Survey on Blocking Probability and Load Balancing Over WDM Networks in MPLS System
Shivani Sharma, Chandni Thakur
DOI: 10.17148/IJARCCE.2016.54222
Abstract: Multi-protocol label switching is a great solution for problems like scalability, quality-of-service, bandwidth-management, and traffic engineering faced by networks. It is believed that MPLS make an internet environment more efficient for more customer satisfaction. In this paper, our main focus is on the load congestion and blocking probability when traffic is overloaded. In the network load congestion occur. When network resources are too short to accommodate the offered load. It means that the system is completely occupied and the new incoming call undergoes in blocking state. In this paper survey on load congestion and blocking probability is done. This paper also represents MPLS contributing high scalability in computer networks.
Keywords: Blocking Probability, Traffic Congestion, Erlang, Traffic Engineering, Load Balancing.
Abstract
Survey on Web Prediction Techniques
Rubab Sharma, Akanksha Sambya
DOI: 10.17148/IJARCCE.2016.54223
Abstract: As we know web usage mining is one of the application of data mining techniques which is used to find out user patterns from web log data. So for this, it contacts the log files for extracting the useful information from the internet. When the user interacts with any websites, then the user�s activities are automatically stored in web log server. Various researches had been proposed in this field but this paper shows the prediction of user browsing behaviour using web log data. This paper provides both the overview of current and past techniques used by different authors to reduce the searching time of user and also provide their research work limitations.
Keywords: Web Usage Mining, Web Log, User Browsing Behaviour.
Abstract
M-Commerce in India
Archana M. Naware
DOI: 10.17148/IJARCCE.2016.54224
Abstract: M-Commerce and E-Commerce made people to transfer funds, shopping, bidding without going to shops within a moment. E-commerce is conducted on laptops, desktop computers using internet whereas M-Commerce is conducted on mobile phones using internet. M-Commerce is E-commerce on mobile phones. E-Commerce introduced Anytime online transactions and M-Commerce introduced Anytime Anywhere online transactions. The ubiquity, reachability, mobility and flexibility features of M-Commerce have increased the mobile users and mobile internet subscribers in India. M-Commerce is implemented through mobile applications. People are using mobile applications instead of web application for utility bill payment, ticket booking, fund transfer, email and so on. Thus M-Commerce is replacing E-commerce. With these advantages M-Commerce have disadvantages such as tiny screen of device, weak processors, limited memory, poor resolutions, poor data entry, and lack of WAP-enabled devices, expensive data speed, and shortage of bandwidth . This paper sheds light on the M-Commerce, its applications, advantages, disadvantages and the growth of M-Commerce in India.
Keywords: M-Commerce, E-Commerce, Ubiquity, Mobile applications.
Abstract
MANET-A REVIEW
Gurpreet Singh, Nishan Singh
DOI: 10.17148/IJARCCE.2016.54225
Abstract: MANET (Mobile Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. It has some unique characteristics which make it different from other ad hoc network as well as difficult to define any exact mobility model and routing protocols because of their high mobility and changing mobility pattern. This paper covers functionality, characteristics, applications, advantages, types and various routing protocol of mobile ad-hoc network.
Keywords: MANET, AODV, DSR, ZRP.
Abstract
Comparison of Colour Image Discriminant and Fisher Linear Discriminant Algorithms
Mrs.Dipti Pratik Pandit
DOI: 10.17148/IJARCCE.2016.54226
Abstract: Recognition by face is one of the biometric methods used commonly for identification. The Colour Image Discriminant (CID) model tries to combine the colour image exemplification and recognition tasks into one framework. Basic CID colour space, extracts multiple features in the colour image, where three new colour component images D1, D2 and D3 are derived using an iterative algorithm.The classical FLD method involves only one set of variables: one or multiple discriminant projection basis vectors, for image discrimination. Experimental results using two face databases, namely, Face96 and Indian Face dataset of IIT Kanpur and then with live still images succeeds in gender recognition. The method achieves the recognition rate of 88.43% with ROC of 0.903 showing the effectiveness of CID algorithm.
Keywords: Colour component images, colour image discriminant (CID) colour space, gender recognition, Fisher linear discriminant analysis (FLD or LDA).
Abstract
Unmanned Fuel Station
Prof. BangalSwapnil. P.
DOI: 10.17148/IJARCCE.2016.54227
Abstract: The petroleum items are one of the significant and uncommon manifestations of the nature. The best possible use and circulation is imperative assignment to survive these items. Our framework might be the main methodology towards security of petroleum items appropriation, for example, petrol, diesel, and lamp oil and others. "The basic and authorized utilization of GSM and RFID advances can give add up to security to appropriation of petroleum items!" this is our proposed. Basic pursuit framework and direct PC interface for the framework which encourages the record keeping of the appropriated fuel. Additionally the convenient and vigorous VB system will help to approved organization to control the dispersion of fuel entire over the locale or nation. In our framework the control unit and tanker unit are two main parts. The two frameworks which might far from each other can without much of a stretch correspond with each other. The security code in RFID label gave to the petrol pump get read by the per user and transmission of it to the control unit will organizations to make the correct database of different petrol pumps circulated over wide range. Additionally the circulation of the fuel is impractical until control unit gives the correct summon to the valve in tanker unit. In short the undertaking we have created is the fundamental connection of every above gadget; which will use to give security to the fuel dispersion and helps the information keeping of the conveyed fuel. The headway of the venture to expansive scale can help monetarily to the business in a roundabout way. The primary reason for our task fulfils every one of the requirements identified with secure circulation of the mechanical items.
Keywords: AT COMMANDS, GSM, GUI, LCD.
Abstract
XMQAS – An Ontology Based Medical Question Answering System
Midhunlal M, Gopika Mangalassery
DOI: 10.17148/IJARCCE.2016.54228
Abstract: Designing question answering systems requires efficient and deep analysis of natural language questions. A key process for this task is to translate the semantic relations expressed in the question into a machine-readable representation. This work tackles question analysis in the medical field using an approach based on Ontology. The main computing methods of the question answering system are based on the application of natural language processing technique to infer the focus of the question and process the question based on the meaning inferred from the question. The efficiency of the outcome is mainly depended on extraction of the correct characteristic of the question and the accuracy of the medical documents are using.
Keywords: Medical Question Analysis, Information Extraction, Document Retrieval, Natural Language Processing.
Abstract
RF based Indoor Asset Tracking
Sagar Patil, Brijesh Kamani
DOI: 10.17148/IJARCCE.2016.54229
Abstract: Real time location system is used to track object in real time. Here real time mean little near to live location of object. GPS is used for location tracking, but is useful at outdoor location and difficult to track at indoor environment. In GPS GPS-module work as receiver which receive signal from satellite, satellites location are known to GPS module after receiving signal GPS-module calculate distance from satellite and determine location. It only useful for outdoor environment. Indoor asset tracking is a unique specialty of many types of RTLS, as Global Positioning Systems (GPS) have difficulty to provide asset localization within buildings. RTLS deployments generally address the problems of determining the location of equipment and products in a warehouse or even tracking employees and files in an office. The most common RTLS uses a Wi-Fi infrastructure to determine the location of tagged assets. These systems employ Received Signal Strength Indication (RSSI) techniques to wirelessly determine asset location. In this report RF Based indoor asset tracking system is describe. In which sub 1 Ghz RF chip is used.
Keywords: Radio Frequency (RF),Location based service (LSB), (Radio Frequency Identification(RFID),Real Time Location System (RTLS),Non-Line of Sight (NLOS), Angle of arrival (AoA), Time of Arrival (ToA),(Time Difference of Arrival (TDoA),Receive signal strenght (RSS)Real Time Localization (RTL),Texas Instrument(TI).
Abstract
Data Storage and Retrieval using Multiple Cloud Interfaces
Ms. Prathyakshini, Mrs. Ankitha K
DOI: 10.17148/IJARCCE.2016.54230
Abstract: In this growing world there is enormous demand for cloud computing which is popular technology with huge benefits. As the data is increasing in business as well as in personal perspective there is demand for storing large amount of data. Cloud computing is a platform for storing the data and hence there should be some care taken towards the disaster that happens in the cloud. A simple recovery service from disaster is proposed using multiple cloud service providers. These multiple cloud service providers are set aside at different locations so that if any of the cloud fails the data could be retrieved from the remaining cloud interfaces. The proposed technique has greater availability as the data can be recovered from disaster.
Keywords: Recovery, cloud computing, Disaster, Cloud service provider
Abstract
Enhancement Process for Detection of Infected Region
Radhika M. Kokate, Prof Vijaya K. Shandilya, Dr. S. A. Ladhake
DOI: 10.17148/IJARCCE.2016.54231
Abstract: Medical images are contaminated with noise and blur which are some of the major sources of image quality degradation during acquisition or transmission. In this we propose an improved technique to reduce blur and noise in medical images (MRI and CT) images by using Gabor wavelet filter finding the infected region with enhance image. Experimental results shows that our method gives comparatively higher Entropy and standard deviation.
Keywords: MRI, CT, infected region.
Abstract
A Review of Adaptive Thresholding Techniques for Vehicle Number Plate Recognition
Sakhare Varsha Dnyandeo, Prof. Mrs. R.S. Nipanikar
DOI: 10.17148/IJARCCE.2016.54232
Abstract: Automatic vehicle number plate recognition is a challenging task and becoming important area of research due to its difficult applications such as Traffic data collection, toll collection, crime prevention and security control of restricted areas. Therefore in the last few decades many efforts were taken by researchers to develop different techniques for thresholding and segmentation of the vehicle number plate. This review presents many basic and advanced adaptive thresholding techniques for automatic vehicle number plate recognition.
Keywords: Adaptive thresholding, Integral image, mean, median, Gaussian filter.
Abstract
Gateway Discovery and Gateway Selection Schemes for Connecting MANET and Internet: A Review
Jay Prakash, Ritu Verma
DOI: 10.17148/IJARCCE.2016.54233
Abstract: Mobile ad hoc networks are emerging as one of the most popular network used in many applications and deploy easily. Since these networks are infrastructure free, therefore no fixed mechanism for communication between mobile node to mobile node and mobile node to gateways. Researchers proposed many solutions to provide internet connectivity in MANET. The two main challenges in MANET-Internet connectivity are gateway discovery and gateway selection. Many researchers work in this field and given a number of solutions to discover the gateway and select the most effective one. This paper presents the mechanism of gateway discovery and selection schemes by describing the previous and present work.
Keywords: MANET, Gateway Discovery, Gateway Selection, Advertisement, Hop Count.
Abstract
Question Answer Based Software Recommender System
Ankit A. Haware, Apurva A. Jadhav, Maithily S. Pande
DOI: 10.17148/IJARCCE.2016.54234
Abstract: The Idea behind the system is to focus on the need for a robust domain speci?c recommender system. The goal of this system is to help users get recommendation about the required software. This application is based on the principles of natural language processing and intention mining. There isn�t any application available that recommends software, as of now. Thus we focus on developing a system which processes unstructured data that is obtained from the question answer database that will be built through question answer portal and recommends required software among all existing software. The significant feature of the system is that, as the mining part depends on the QA, a huge database is not required, i.e. no domain specific knowledge is need. Database is built by the users, and hence this approach is applicable to any kind of domain, other than software recommendation.
Keywords: QA, Recommender, Software.
Abstract
Systematic Review of Security Issues for Cloud Computing
Sangeetha G, Divya V K
DOI: 10.17148/IJARCCE.2016.54235
Abstract: Cloud computing, undoubtedly, has become the buzzword in the IT industry today. Looking at the potential impact it has on numerous business applications as well as in our everyday life, it can certainly be said that this disruptive technology is here to stay. Many of the features that make cloud computing attractive, have not just challenged the existing security system, but have also revealed new security issues. This paper provides an insightful analysis of the existing status on cloud computing security issues based on a detailed survey carried by the author. It also makes an attempt to describe the security challenges in cloud computing and also endeavours to provide future security research directions.
Keywords: Computing, Cloud Computing Security, Trusted Third Party, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS).
Abstract
Maintainability Evaluation of Object Oriented Software: A Systematic Review
Nidhi Goyal, Dr. Reena Srivastava
DOI: 10.17148/IJARCCE.2016.54236
Abstract: Maintainability has always been an elusive concept. Its correct measurement or evaluation is a difficult exercise because of the various potential factors affecting software maintainability. Software maintainability involves external software quality attributes that evaluate the design complexity and effort required for maintaining software. The support provided by software maintainability is significant during development life cycle and quality assurance. The key focus of this review paper is an organized study of maintainability taking into consideration the view provided by its sub factors along with metrics implementation of software maintainability. The aim is to support the maintenance process and facilitate the formation of improved quality software. This paper accomplishes a systematic literature review to study widespread facts of maintainability research, its feature factors and related measurements. A comparative analysis on software maintainability models developed by various researchers/area experts including their contribution and limitation is also presented. In the end our effort is to find the known wide ranging and complete model or framework for quantifying the maintainability of software at an early stage of software development life cycle.
Keywords: Software Maintainability, Maintainability Evaluation, Object Oriented Design, Software Quality, Software testing.
Abstract
Detection of Lung Cancer Using Backpropagation Neural Networks and Genetic Algorithm
Mr. Akshay Jadhav, Ms. Jennifer D’Cruz, Mr. Virendra Chavan, Ms. Ashvini Dighe, Prof. Jayashree Chaudhari
DOI: 10.17148/IJARCCE.2016.54237
Abstract: Carcinoma also known as Cancer is the commonly growing and most dangerous disease occurred in human species. Lung Carcinoma is one of them. It is a disease that occurs due to uncontrolled growth of cancerous cells in the tissues of the lungs. Prior diagnosis of the disease saves huge number of lives, failing in which may lead to other severe problems causing sudden fatal death. Motive of this system is to automate the detection process so as to perform advanced detection of the disease in its early stage. A measure for early diagnosis mainly includes X-rays, CT images etc. In this system firstly we use techniques such as Data Preprocessing, Training and testing of samples that are necessary for the task of medical image mining. A powerful learning model i.e (BPNN) is used for classification which would classify the digital X-ray, CT-images, MRI�s, etc as cancerous or non-cancerous. Further Genetic Algorithm will be used that would extract feature on the basis of the fitness function. The selected feature will help to detect the stage of cancer by measuring the size of the feature and using this measurement the stage of cancer will be decided. This system will support to make an relevant decision about a patient�s state.
Keywords: Backpropagation, Neural Networks, Classification, Genetic Algorithm, Medical Image Mining.
Abstract
Rapid Revision Software Development Life Cycle Model (RR-SDLC Model 2016) Based on Concept of Reusability of Software
Mukesh Chauhan, Jawahar Thakur
DOI: 10.17148/IJARCCE.2016.54238
Abstract: Large open source Software applications based organization like mozila , facebook, google, and AOL are migrating their product towards rapid revision based SDLC Model to release their product as update new revision. The same techniques can be applied to semi automation based software application or developing new application based on existing similar software application using re-usability concept. The newly developed application passes through three processes in parallel development mode to bring better product in shorter time at the lower cost as compared to following any traditional Software development life cycle (SDLC) model. This research investigates the changes in SDLC models after moving to Rapid Revision based software development life cycle model.
Keywords: RR- Rapid Revision, Software Testing, SDLC software development life cycle, AOL American online.
Abstract
TREM: A New Cloud Security Algorithm
V.Poongodi, Dr.K.Thangadurai
DOI: 10.17148/IJARCCE.2016.54239
Abstract: Cloud computing brings out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the cloud data security. To address these challenges, it is necessary to tune the security measures developed for traditional computing systems and proposing a new security algorithms. In this paper a new cloud security algorithm is proposed by combining different cryptographic techniques in a hybrid manner.
Keywords: Cloud Computing, Cloud Computing Architecture, Data Security and issues in cloud computing, TERM.
Abstract
Effective Architecture of Packet Classification on FPGA
Ms. Kranti M.Hande, Prof.V.R.Wadhankar, Prof.D.S.Dabhade
DOI: 10.17148/IJARCCE.2016.54240
Abstract: For providing different quality services, router needs packet classification.Rules are frequently changing and due to multidimensional field it is difficult to maintain high speed and scalabilty in packet classification.In this work we use pipeline architecture with logic gates on FPGA.Due to use of logic gates and incorporate range search in architecture speed,memoryefficiency,power efficiency of packet classification increases as compare to any previous method used for packet classification. This method is rule set independent.
Keywords: FPGA, packet classification, pipeline architecture, router, header field.
Abstract
Offers to Grasp –Android Application to Compare Local Stores
Veena A Kumar, Ananthu B, Midhun R Kurup, Nakendra Kumar, Sandra Susan Shaji, Teddy Zachariah
DOI: 10.17148/IJARCCE.2016.54241
Abstract: Today, when people want to buy high value commodities like dress, electronics, grocery, etc., the first thing which comes into their mind is to find the shop which provides that commodity in a lower price; for that they may make time to explore through all the shops to find an appropriate one. Also there are many who are unaware of the location of a particular shop. In today�s busy life, time & money are the two leading factors which most our society looks at. As the amount of working class people is increasing year by year, there is a need to develop a common platform where all the above mentioned issues are solved. Offers to Grasp (OTG) is an android application that provides customers with better deals across their locality facilitating smarter saving options and hence an easy shopping experience, all on-the-go.
Keywords: commodity, smart saving, easy shopping.
Abstract
Railway Track Monitoring and Accident Avoidance Using Smart Sensor Network
Prof. Anap S.D, Ronge Prasanna L, Bhalerao Lalit P, Dharme Sandip P
DOI: 10.17148/IJARCCE.2016.54242
Abstract: The expanded development in the railroad area has brought about an expansion in the train activity thickness over the world. This has brought about the expansion in the quantity of mischances including trains. In this paper, the proposed framework incorporates a few elements which forestall train mishaps. It incorporates flame recognition, water level identification, Railway track split discovery, This framework makes utilization of IR sensors, fire sensor, GSM and other inserted frameworks Rail mischances have been expanded because of the surge streaming over the Railway tracks. We are proposing a surge identification framework to overcome such mischances. Here, at whatever point we distinguish that there is a flood over tracks, we will send a sign to the train through GSM which will stop the train furthermore send messages to higher powers of south focal railroad.
Keywords: ARM7 Microcontroller, Display, GSM Module, Sensors.
Abstract
A Fast 16×16 Vedic Multiplier Using Carry Select Adder on FPGA
Shiksha Pandey, Deepak Kumar
DOI: 10.17148/IJARCCE.2016.54243
Abstract: Vedic mathematics is one of the ancient Indian system of mathematics that was rediscovered in the early twentieth century This paper proposes the design of high speed Vedic Multiplier using the techniques of Vedic Mathematics that have been modified to improve performance using Carry select adders. A high speed processor depends greatly on the multiplier as it is one of the key hardware blocks in most digital signal processing systems as well as in general processors. In Vedic Mathematics calculation based on 16 sutras is a unique technique of calculations . This paper presents design and implementation of high speed 16x16 bit Vedic multiplier architecture which is quite different from the Conventional method of multiplication like addition and shifting . Further, the Verilog HDL coding of Urdhva tiryakbhyam Sutra for 16x16 bits multiplication and carry select adder is simulated and implemented on XilinxISE9.2i.
Keywords: Ripple Carry (RC) Adder, Vedic Mathematics, Vedic Multiplier (VM), Urdhava Tiryakbhyam Sutra, Carry select adder, Verilog HDL.
Abstract
Visible Light Communication Based Data Transfer System
Pious Joseph, Sangeeth Shajan, Sharon Paul, Binu Mathew
DOI: 10.17148/IJARCCE.2016.54244
Abstract: Exploiting the increasingly wide use of Light Emitting Diode (LED) lighting, in this project, we present the phenomenon of using visible LED lights for data transfer and position determination. We have implemented the Visible Light Communication (VLC) system and evaluated it with a small-scale hardware. The basic idea is to use the existing lighting infrastructure and apply it for data transfer. Through the design of transmission and reception mechanism,we identify and tackle several technical challenges. We adopt the simple On-Off keying (OOK)for modulation in the transmitter section. The receiver section comprises of phototransistor and its amplification unit followed by Bluetooth module to ensure its connectivity to a smart phone. We believe that visible light based data transferis promising to significantly improve the positioning accuracy,despite few open problems in practice.
Keywords: LED, OOK, VLC.
Abstract
Efficient Energy and Data security in Wireless Sensor Networks
R. Jegan, Mr. S. Venkatesh ME (CSE)
DOI: 10.17148/IJARCCE.2016.54245
Abstract: The basic architecture of Wireless Sensor Networks are usually a Hybrid type where it is a combination of Infrastructure Oriented and Infrastructure less Networks. The Communication from sensor to sensor head takes place through p2p Architecture (Infrastructure less) and the communication from Cluster Head to Base Station involves Broadcast Based(Infrastructure Oriented).This Hybrid Architecture is to reduce the Energy Consumption of Sensor nodes as it will be depleted soon when each sensor broadcasts sensed data to Base station as and when senses. Hence a Cluster Head will be elected for each cluster by considering the battery, Memory and processing ability. All the Sensors will be sending their sensed data to the Cluster Head in a p2p manner. this is process we can improve the energy of wireless sensor and secure method of deal. The Elagamal algorithm has three main parts: 1.secure data transaction, 2.Encryption, deception 3.Signature based secure.
Keywords: Energy efficient in wireless sensor, data security, reduces overlape, data aggregation.
Abstract
Real Time Tomato Ripening Stage Identification System
Manasi G. Bharambe, Jigar J. Lodha, Pratiksha P. Kor
DOI: 10.17148/IJARCCE.2016.54246
Abstract: Tomatoes are the best-known grown fruit in greenhouses. Tomato is a plant which its fruit does not ripe simultaneously, therefore it is necessary to develop an algorithm to distinguish between green, pink, light red and red tomatoes. This experimental work aimed to develop an efficient approach for identifying the ripening stages of tomato. Using the acquired image, the RGB values of the tomato were processed by the MATLAB and used to identify the stage of the tomato. The MATLAB processing will be done by the AVR Microcontroller. The stage of captured image is communicated with the processor and finally the farmer is informed via massage through GSM technology as well as the captured image will be sent to the specific mail-id.
Keywords: MATLAB, USB camera, AVR Microcontroller, GSM module.
Abstract
Dual Band Microstrip Antenna for Mobile Hand Set
Antara Ghosal, Anurima Majumdar, Sisir Kumar Das and Annapurna Das
DOI: 10.17148/IJARCCE.2016.54247
Abstract: This paper describes the analysis and design of a class of slotted rectangular microstrip antennas for dual band operations. Slots are cut to tune the patch at suitable dual frequency operations..The simulation and modeling of these configurations have been done using Ansoft HFSS software. The resonant frequencies and dimensions are computed from the cavity model of rectangular patch. The parameters of antenna such as return loss, VSWR, radiation patterns and gain have been found and design is optimized for best results. The results are experimentally verified and the results are found in good agreement with those of theory.
Keywords: Coaxial feed, slotted rectangular microstrip patch antenna, dual band antenna.
Abstract
Intelligent Autonomous Farming Robot with Plant Disease Detection using Image Processing
D. A. Shaikh, Ghorale Akshay G., Chaudhari Prashant A., Kale Parmeshwar L.
DOI: 10.17148/IJARCCE.2016.54248
Abstract: Even though India is agricultural country lot of challenges are faced by farmer. Every year farmer experiences large losses due to pest infestation in crop & this in turn affect his lifestyle. These losses are basically due to discontinuous monitoring of farm, various diseases on crop and improper management of pesticides. Plant disease reduces product of farmer both in quality and quantity. So quick detection and identification of disease plant are of more importance. It also needs continuous monitoring of farm. To overcome above problem it is necessary to develop such system which continuously monitor the farm and detect the disease as quick as possible. In this paper we gave brief idea to solve this problem by continuously monitoring crops using �Agri-Robo� and techniques called Image Processing. Image Processing give the good solution to above crisis. Image processing gives fast, automatic and accurate solution to user. We developed an agri-robo system to monitor crops and for identifications and monitoring of diseases & pesticides. This agri-robo not only detects disease but also spray pesticides to protect them from disease. The robot helps the farmer to take informed decision locally or allows connecting with other existing services. This agri-robo find diseases on various infected leafs. This system result in detection of cotton diseases and spray the pesticides of disease in proper amount when needed.
Keywords: Agri-robo, image processing for disease detection, pesticides spraying techniques.
Abstract
Development of Wireless Sensor Network as an Application in Aerostats
Vimal Kishore Yadav
DOI: 10.17148/IJARCCE.2016.54249
Abstract: This paper presents wireless sensor network (WSN) for health monitoring system of Aerostats. The paper discusses Aerostat and its health monitoring system; requirements and significance of wireless sensor network for the purpose of data monitoring and control. It also discusses the implementation methodology of such a network. System has been designed using Zigbee based transceiver with various types of sensors. Detailed description of the design & the components used for system implementation is presented in the paper.
Keywords: Aerostat, Ballonet, WSN, Zigbee.
Abstract
Big Data and Big Data Analytics using Knowledge Discovery Framework in Healthcare System
Sunita Kanadikar, Hemanth Kumar N P
DOI: 10.17148/IJARCCE.2016.54250
Abstract: Now a days in foreign countries, old age people are adapting the assisted healthcare. An ambient assisted living system (AAL) allows the elderly population to achieve the independency. In this paper we are going to take the use of ambient assisted living system with context aware monitoring to make the context aware decisions for the patient. The Big data collected from the AAL system is analysed in the cloud environment, analysing the trends and pattern with associated probability for individual patient and utilizing this knowledge abnormal condition of the patient can detected and context aware decisions can be made.
Keywords: Cloud, Big data, Assisted HealthCare, Ambient Assisted Living System, Context Aware Decisions, Data Mining.
Abstract
Spectrum Handoff in Cognitive Radio Network
Kumud Tiwari, Ashutosh Rastogi
DOI: 10.17148/IJARCCE.2016.54251
Abstract: Rapid development of wireless networking technology has raised a large demand for spectrum band. Cognitive radio networks (CRNs) offer a solution for spectrum scarcity problem by means of dynamic spectrum access. Cognitive radio technology is an emerging technology which would enable a set of secondary users (SU) to opportunistically use the spectrum allocated to a primary user (PU) and has potential to serve as a solution to spectrum inefficiency and spectrum shortage problems. However, SUs face number of challenges based on the fluctuating nature of the available spectrum. When PU arrives on a specific frequency band, any SU occupying this band should free the channel for PUs which is referred as Spectrum handoff. It is an important but unexplored event in cognitive radio network. This paper is a brief overview on the reason, mechanism, challenges and their solutions in spectrum handoff.
Keywords: cognitive radio, spectrum handoff, spectrum mobility queuing theory, PRP M/G/1 queueing model.
Abstract
Software Testability in Requirement Phase: A Review
Mohammad Zunnun Khan, M.Akheela Khanam, M.H.Khan
DOI: 10.17148/IJARCCE.2016.54252
Abstract: Testability can be used as a high impact quality indicator in the modern era of software development process. The complete process of testability always helps the developer by its correct measurement or evaluation. But its correct evaluation is not an easy task for the practitioners. Practitioners as well as researchers have always suggested that testability should be considered as a primary attribute towards achievement of quality software process. Software quality�s accurate measure depends on testability measurement, and as an outcome estimating efforts in measuring testability is a complex problem that requires considerable attention of researchers. Primary objective of this review report is to raise the testability issues with the limitation and to investigate the general testability factor and minimal set of commonly accepted testability factors, and proposing a conceptual comparative evolution. Here we review the literature to gain wide knowledge of testability and its quality factors and measurement presented by various researchers in different perspective.
Keywords: Software Development, Software Testability, Software Requirement, Software Quality
Abstract
Analytical Study of Multipliers for High Speed Applications
Amit A. Bhutada, Prof. Sanjay L. Haridas, Prof. Sanjay Tembhurne
DOI: 10.17148/IJARCCE.2016.54253
Abstract: Convolution is having wide area of application in Digital Signal Processing. Convolution helps to estimate the output of a system with arbitrary input, with knowledge of impulse response of the system. Linear systems characteristics are completely specified by the systems impulse response, as governed by the mathematics of convolution. Convolution and deconvolution is central to many applications of Digital Signal Processing and Image Processing. Primary requirement of any application to work fast is that increase the speed of their basic building block. Multiplier is the heart of convolution. It is most important but, slowest unit of the system and consumes much time in the system. Many methods are invented to improve the speed of the multiplier, amongst all vedic multiplier is under focus because of faster working and low power consumption. In this project we have implemented the high speed convolution system using vedic mathematics.
Keywords: Convolution, Vedic Mathematics, VHDL.
Abstract
A New Approach of Cryptographic Technique using RSA & ECC
Vaibhav V. Bhujade, Deepak Chaudhary
DOI: 10.17148/IJARCCE.2016.54254
Abstract: Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this transmission file of unreadable format is send, after receiving this file receiver used the same algorithm and key to get the original file data. In this procedure various algorithms are used as a processing function and depending on that algorithm we used the key. The strength of any algorithm is depending on the key used in sender and receiver side. For this secure transmission we traditionally used RSA algorithm which is more secure for use so most of the system used the same algorithm for secure communication. Even most of the financial transaction is done by the use of this algorithm as it used the strong key while encryption and decryption. But In today�s digital world there is a tremendous growth in the usage of the Internet. Behind one software generator there are hundreds of hackers. So, a fraction of second will be enough to destroy the security. Hence we require more strong algorithms, which secure the Internet work of sending and receiving. So this proposed system enhanced the security of existing RSA algorithm by using elliptical curve cryptography (ECC) algorithm. This algorithm is also stronger and has less key length as compared to RSA. The resultant system will be more secure than the previous system by enhancing the security of existing algorithm. Also proposed system provide good authentication for the user.
Keywords: Cryptography, Authentication, Plain Text, cipher text, RSA, ECC
Abstract
A Review on Integration of Cloud Computing and Internet of Things
Isna khan, Prof S.D. Sawant
DOI: 10.17148/IJARCCE.2016.54255
Abstract: Internet of things (IOT) is an abstract idea that visualizes all objects that present around us as the part of internet. IOT scope is very wide and includes sensing, communicating and networking of devices deployed that has potential to grow on large scale in future. As processing, storage, and communication capabilities of individual IOT device are limited, the assistance from the current cloud computing technology will help to release the burden, reduce the energy consumption, and prolong battery life. Cloud computing is a model for on-demand access to shared pool of configurable resources that can be easily provisioned for as Infrastructure (IaaS), software and applications (SaaS). The integration of the sensor network with the cloud provides storage and computational resources .This way the scalable network will be reliable and secured.
Keywords: Internet of things (IOT), Cloud Computing, Integration, networking.
Abstract
An Exploration on Existing Methods for Data Aggregation in Wireless Sensor Network
Ajmer Singh Dhakad, Sanjiv Sharma
DOI: 10.17148/IJARCCE.2016.54256
No abstract available.
Abstract
Control in Power Electronics
Esam Alansari
DOI: 10.17148/IJARCCE.2016.54257
No abstract available.
Abstract
Speech Recognition for Vietnamese: A Literature Review
Le Minh Tri, Do Dinh Thanh
DOI: 10.17148/IJARCCE.2016.54258
No abstract available.
Abstract
Design of Multiband Microstrip Antenna for Bluetooth, UWB, X-band and Ku band Applications
Jyoti Kapil, Ruchi
DOI: 10.17148/IJARCCE.2016.54259
Abstract: A compact microstrip fed multiband monopole antenna for Bluetooth (2.4-2.48 GHz), Ultra Wide Band (UWB) (3.1-10.6GHz), X-band (8-12 GHz) and Ku band (12-18 GHz) applications is proposed. The proposed antenna consists of a rectangular patch having central slot with lower edges beveled on one side and rectangular partial ground with central slot having lesser width as compared to substrate on the other side of substrate. The idea of edge beveling is also introduced in this partial ground to increase the impedance bandwidth. This antenna has operating frequency from 2.33-2.58 GHz and resonates at 2.44 GHz for Bluetooth application and 2.98-18 GHz for UWB, X-band and Ku-band applications. In this paper, the shape of ground is proposed so as to improve impedance bandwidth over entire UWB, X-band and Ku-band range. A rectangular quarter wavelength strip is optimized so as to resonate at 2.44 GHz. The proposed antenna is simulated using CST- Microwave Studio. With adjusted parameters the proposed antenna exhibits a broad impedance bandwidth with VSWR = 2.
Keywords: Monopole antenna, Multiband, Ultra Wide Band, X-band, Ku Band.
Abstract
A Review: Strategies to Control Collision in Vehicular System
Swati Jambhulkar, Abhijit Titarmare
DOI: 10.17148/IJARCCE.2016.54260
Abstract: In our day today life the word accidents are very common and which means indirectly that accidents are frequently takes place now days. Form last few years the number of accidents has been increasing which due to which losses takes place. Losses may be in terms of heavy injuries and to the vehicles. Apart from these losses the loss of money as well. The basic idea of this paper is avoid collision in vehicular system using different control strategies both in hardware and software. We are implementing sensors like ultrasonic sensors, camera using ARM 7. We are also using CAN protocol so that the response time for communication within the system is minimized. Since the vehicle will run on road so practical scenarios must be keep in mind for that purpose, we have done programming in MATLAB so the vehicle can follow lane. There are various types of collision like front end, back end, rare end etc. From different types rare end collision is very common. Hence, more concentration is given to rare end collision. Most of the programming is done in MATLAB. We provide experimental setup on a system so our basic ideas can be clear.
Keywords: Rare end collision, Front end collision, ARM 7, ITS, ADAS, CAN, Obstacle detection, collision avoidance.
Abstract
A Survey – Cloud Computing
Ms. Shubhangi Ashok Kolte, Prof. P E Ajmire
DOI: 10.17148/IJARCCE.2016.54261
Abstract: Now a day cloud computing plays an important role in internet era due to the a successive mobile applications cloud computing becomes more important it is the ultimate solutions for this mobile application cloud computing opens a new era for computing technology presently there are various web services through the different clouds some notable services are, Amazon web services, elastic compute cloud, Google cloud (dope box). The cloud computing offers huge opportunities of various web services to the internet users and mobile users; though there are many issues still to be covered in this paper represent survey of various cloud computing models.
Keywords: Cloud Computing, Cloud Service models, Cloud Deployment models.
Abstract
A Survey on Sentimental Analysis in Different Indian Dialects
Shankar R, Shilpa K.M, Sridhar Patil, Suma Swamy
DOI: 10.17148/IJARCCE.2016.54262
Abstract: Sentimental Analysis analyses the emotion present behind the speaker/writers reviews or comments. This emotion indeed helps in categorizing a review as positive or negative.In our day-to-day life we are involved in Podcasting, Blogging, Tagging, and Social Network (facebook, twitter, whatsapp etc) where numerous dataset gets generated. In other words, user�s feelings are expressed in the form of comments/reviews/feedback. This opinion mining is quite a challenging task and basically everything in this regard is done in English language. If we think of other Indian languages as the resources like reviews and opinions are huge, study on these have not been done. In this paper, we are considering a survey on Sentiment Analysis and Opinion Mining in different languages like Kannada, Hindiand Malayalam. The speaker would be more comfortable in expressing his/her opinions using the native language as it would be more easy and precise.
Keywords: Opinion, Bag of words, Na�ve Bayesian, corpus, POS tagging.
Abstract
A Pull Based Method for Maintaining Cache Consistency in Wireless Mobile Networks
T.Jeevanantham, C. Suresh Kumar
DOI: 10.17148/IJARCCE.2016.54263
Abstract: Distributed Cache Invalidation Method (DCIM) proposed a customer based reserve unwavering quality plan. It is executed on the top of a formerly proposed structural planning for reserving information things in portable impromptu systems (MANETs). In particular COACS, unique hubs store the inquiries and the locations of the hubs that store the reactions to these questions. Even though SSUM is proposed in order to provide a server-based consistency plan, DCIM provides service that is absolutely customer based. DCIM is a force based calculation that actualizes versatile time to live (TTL), piggybacking, and prefetching, and gives close solid consistency capacities. Reserved information things are relegated versatile TTL values that compare to their redesign rates at the information source. The things with lapsed TTL qualities are gathered in approval solicitations to the information source. In order to invigorate them, while unexpired ones however with high demand rates are pre-fetched from the server. In this paper, DCIM is broke down to evaluate the postponement and transfer speed picks up (or costs) when contrasted with surveying each time and push-based plans. DCIM was likewise executed utilizing ns2, and thought about against customer based and server-based plans to evaluate its execution tentatively. The consistency proportion, deferral, and overhead activity are accounted for versus a few variables, where DCIM appeared to be better when analyzed than alternate frameworks.
Keywords: pre-fetch, cache memory, piggy-backing, TTL, DCIM, query direction.
Abstract
Efficient Resource Provisioning for Online Gaming Applications in Cloud Computing Environment
Mrs. C. Usharani, Mr. M. Praveen Kumar
DOI: 10.17148/IJARCCE.2016.54264
Abstract: Modern Massively Multiplayer on-line Games (MMOGs) is a web games which can be contend by an awfully sizable quantity of people at the same time in an passing dynamic virtual world. Implementing a scalable MMOG service is tough as a results of the system is subject to high work variability, and but ought to operate below very strict Quality of Service (QoS) wants. Traditionally, MMOG services square measure implemented as large dedicated IT infrastructures with aggressive over-provisioning of resources thus on take care of the worst-case work situation. Throughout this paper we've got a bent to deal with the matter of building a large-scale, multi-tier MMOG service victimization resources provided by a Cloud computing infrastructure. we have a tendency to harness cloud paradigm by proposing a dynamic provisioning rule which can size the resource pool of a MMOG service to adapt to employment variability and maintain a quantity below a given threshold. we have a tendency to conjointly offer assurance for resume-playback on on-line vice once the unexpected termination of power happens. we've got a bent to use a Queuing Network performance model to quickly estimate the system quantity for varied configurations. The performance model is employed within a greedy rule to cipher the minimum style of servers to be assigned on each tier so as to satisfy the system quantity constraint. Numerical experiments square measure accustomed validate the effectiveness of the planned approach.
Keywords: trendy Massively Multiplayer on-line Games (MMOGs), Dynamic provisioning Algorithms, Greedy algorithmic rule, Reconfiguration algorithmic rule, Performance Modeling.
Abstract
A Comparative Study of Different Neural Networks Learning Algorithms for Forecasting Indian Gold Prices
Parminder Kaur
DOI: 10.17148/IJARCCE.2016.54265
Abstract: Artificial Neural Networks (ANN) have been widely used for forecasting purposes in various fields of science and engineering, economics, finance etc. This paper studies the Artificial Neural Networks based forecasting of Indian gold prices using three learning algorithms, namely, Standard Back Propagation (SBP), Back Propagation with Bayesian Regularization (BPR) and Levenberg-Marquardt (LM) algorithm. The performance of these three learning algorithms is compared using the statistical measures. The study found that the Levenberg-Marquardt learning algorithm based Artificial Neural Network model outperforms the other two learning algorithms based Artificial Neural Network Models in forecasting the Indian Gold prices.
Keywords: Artificial Neural Networks, Standard Back Propagation, Back Propagation with Bayesian Regularization, Lavenberg-Marquardt algorithm.
Abstract
A Critical Review of Data Mining Techniques in Weather Forecasting
Sara khan, Mohd Muqeem, Nashra Javed
DOI: 10.17148/IJARCCE.2016.54266
Abstract: Analyzing large amounts of data has become an urgent need. Data could be scientific, medical, demographic, financial or marketing. Main objective is to identify hidden information from the data sets. Data Mining is a technique that helps in extracting relevant and meaningful information from the set of data. It can be further described as knowledge discovery process that can be applied on any set of data. Data mining techniques when applied on relational databases can be used to search certain trends or patterns. Weather forecasting is an area of meteorology that is done by collecting dynamic data related to current state of weather like fog, rainfall, temperature, wind etc. It is one of the most challenging problems to analyze this set of data to predict the behavior of weather. This paper provides a survey of different data mining techniques being used in weather prediction or forecasting. It also reviews and compares various techniques being used in a tabular format.
Keywords: Data Mining, demographic, Weather Forecasting, Meteorology.
Abstract
Review on Green Computing: The next movement in computing
Navjot Kaur, Gagandeep Singh
DOI: 10.17148/IJARCCE.2016.54267
Abstract: Now days, computer is being used by almost every person or organization in our society. But sometimes they get so lost in the excitement of using new technologies that they are not aware of its effects on the world around us. Green computing is a global effort which aims at manufacturing, implementing, using and disposing the computer systems in an efficient way to minimize its impact on the surroundings. Going green is very helpful to make our atmosphere and globe healthy. This paper aims at providing better understanding of importance of green computing in the modern world. This paper also provides a review of the literature on green computing and various preventive measures that we should follow to save our atmosphere.
Keywords: Green Computing, Green-IT, Green Technology, Environment, E-waste, Energy Efficiency, Eco-Friendly.
Abstract
Cost Effective Knowledge Based Quality And Value Data Extraction From linical Healthcare Data
Mr.Vishnu S Basuthkar, Mrs. Chetana Srinivas
DOI: 10.17148/IJARCCE.2016.54268
Abstract: At present Data Innovation has obtained huge changes in various locales including therapeutic consideration organizations .Utilization of Electronic Wellbeing Records (EHR) to keep up and analyzing social insurance administration information online has lead the medicinal division in way of fast changes. Digitalized human services documents are somewhat Huge Information as they are gigantic, dynamic and in addition heterogeneous. It is valuable to separate vital data's from EHRs and offer medicinal services recommendations to patients or distinctive partners of the therapeutic division. This study presents a versatile and novel model to guarantee the nature of social insurance enormous information which further can be reutilized for pressing determination in medicinal services.
Keywords: Big Data, Healthcare, EHR,Missing Data,Quality Data.
Abstract
A Review on Mining Students’ Data for Performance Prediction
Ms. Kavyashree K R, Mrs. Lakshmi Durga
DOI: 10.17148/IJARCCE.2016.54269
Abstract: A country�s growth is strongly measured by the quality of its education system. Education sector has witnessed sea change in its functioning. Today it is recognized as an industry and as an industry it is facing challenges. The challenges of higher education being decrease in students� success rate and their leaving the course without completion. An early prediction of students� failure may help the management provide timely counselling as well as coaching to increase the success rate and student retention. Data mining are widely used in educational field to find new hidden patterns from student�s data which are used to understand the problem. Classification is one of the prediction type classifiers that classifies data based on the training set and uses the pattern to classify a new data. Aim of the project is to develop an internetworking application that uses data mining technique to predict the students� performance based on their behaviour. This paper explores the link between emotional skills of the students along with the socio economic and previous academic performance parameters using Naive Bayes Classifier technique.
Keywords: Educational Data Mining (EDM), Classification, Data Mining, Prediction.
Abstract
Fusion Based Strategies to Combine Hazy Images into Single Image
Prof. Sonali A. Patil, Anuradha Badgujar, Nikita Borade, Shikha Yadav
DOI: 10.17148/IJARCCE.2016.54270
Abstract: Haze is a physical phenomenon that considerably degrades the visibility of outside scenes. This is often in the main because of the atmosphere particles that absorb and scatter the sunshine. This paper introduces a unique single image approach that enhances the visibility of such degraded pictures. Our methodology may be a fusion-based strategy that derives from 2 original hazy image inputs by applying a white balance and a distinction enhancing procedure. To mix effectively the knowledge of the derived inputs to preserve the regions with sensible visibility, we tend to filter their vital options by computing 3 measures (weight maps): brightness level, colour property, and strikingness. To reduce artefacts introduced by the burden maps, our approach is intended in an exceedingly multiscale fashion, employing a Laplacian pyramid illustration. We tend to square measure the primary to demonstrate the utility and effectiveness of a fusion-based technique for dehazing supported one degraded image. the strategy performs in an exceedingly per-pixel fashion, that is easy to implement. The experimental results demonstrate that the strategy yields results comparative to and even higher than the additional complicated progressive techniques, having the advantage of being applicable for period applications.
Keywords: Dehazing, Strikingness,Fusion based, single image, Weight maps.
Abstract
A Comprehensive Study and Review on Wireless Sensor Networks, Based on Heterogeneous Energy Distribution & Multizone Algorithm
Amita Singh, Archana Yadav, Saima Beg, S. Hasan Saeed
DOI: 10.17148/IJARCCE.2016.54271
Abstract: Wireless Sensor Networks(WSNs) is built of �nodes� �from a few to several hundreds or even thousands where each node is node is connected to one ( or sometimes several ) sensors. Sensors nodes having limited power resource which describe sensed data to the base station that requires high energy usage. There are several routing protocols have been proposed in recent years, achieving energy efficiency in heterogeneous scenarios. Still, every protocol is not desirable for heterogeneous wireless sensor networks (WSNs) .In this paper there are algorithms- Distributed energy efficient clustering (DEEC), Developed distributed energy efficient clustering (DDEEC), Enhanced distributed energy efficient clustering (EDEEC) and Threshold distributed energy efficient clustering (TDEEC) which is designed for heterogeneous wireless sensor Networks. In this paper we first discuss performance of heterogeneous wireless sensor networks, which is prolonging the lifetime and stability of the network and throughput .we compare performance of DEEC, DDEC, EDEEC, and TDEEC, for different scenarios of three and multilevel heterogeneous wireless sensor networks.
Keywords: Cluster, Head, Residual, Energy, Heterogeneous, Efficient, Wireless, Sensor, Networks.
Abstract
Storing & Retrieval of Encrypted Binary Data to &From Cloud Storage with Android Application
Gunjan Pathekar, Dr. Kalyani.A.Akant
DOI: 10.17148/IJARCCE.2016.54272
Abstract: This paper describes the implementation of a secure cloud storage application. Cloud service providers often have access to the files of their customers. To prevent this and other security risks, a novel variant of the RSA encryption algorithm is employed. The application is web-based and therefore platform-independent. It is possible to create, open and edit text files directly in the browser. The files are encrypted and decrypted only locally on the computer of the user. A special role in the implementation plays the user�s Smartphone which is used as a security token. The project comprises an Android application that basically generates and holds the decryption key. To open and decrypt a file, the user has to scan a QR code which is shown on the computer screen.
Keywords: Cloud Platform, Android Application, Security, AES, RSA, Token Generation.
Abstract
Hydrogels for Biomedical Applications
Ahmed Sabr
DOI: 10.17148/IJARCCE.2016.54273
Abstract: In this paper, a facile way has been proposed to prepare transparent, tough and flexible polyacrylamide (PAM) hydrogels which is composed of a dually crosslinked single network by chemical crosslinking of N,N'-methylenebisacrylamide (BIS) and physical crosslinking of hydrophilic hexagonal boron nitride (h-BN) nanosheets. invasion of VSMC into MMP-14 selective peptide crosslinked hydrogels was diametrically opposite in nature to that of fibroblasts whereby VSMC showed a two-fold increase into these hydrogels relative to that observed in permissive hydrogels whilst fibroblasts had a relative two-fold decrease.
Keywords: Hydrogels, Applications, polymeric, configuration
Abstract
Data Mining with Big Data and Privacy Preservation
Akshaya Tupe, Amrit Priyadarshi
DOI: 10.17148/IJARCCE.2016.54274
Abstract: Big data is large volume, heterogeneous, decentralized distributed data with different dimensions. In Big data applications data collection has grown continuously, due to this it is difficult to manage, capture or extract and process data using existing software tools. Performing data analysis is becoming expensive with large volume of data in data warehouse. Data privacy is one of the challenge in data mining with big data. To preserving the privacy of the user we need to use some method so that data privacy is preserve and at the same time increase the data utility. In existing centralized algorithms it assumes that the all data should be at centralized location for anonymization which is not possible for large scale dataset,and there was distributed algorithms which mainly focus on privacy preservation of large dataset rather than the scalability issue. In the proposed system we focus to maintain the privacy for distributed data, and also overcome the problems of M-privacy and secrecy approach with new anonymization and slicing technique. Our main goal is to publish an Genuine or Anonymized view of integrated data, which will be immune to attacks. We use MR-Cube approach which addresses the challenges of large scale cube computation with holistic measure.Slicing contains tuple partition, generalization, slicing and anonymization. Once slicing is done the anonymized data can freely access by user with more data availability.
Keywords: Big Data, Hadoop, Map-Reduce, HDFS, MR-Cube, Data Security, slicing.
Abstract
A Comparative Analysis of Variable Partitioned Adder
Nidhi J. Chandak, Prof. G.A. Morankar
DOI: 10.17148/IJARCCE.2016.54275
Abstract: In high speed VLSI applications adders play important role. According to conventional studies much research is done on various parameters like delay, area, and power. Considering recent scenario optimization of all parameters is needed, this gives rise to idea of hybrid systems. Thus two new hybrid carry select adders are studied involving the Carry Select and Section Carry based Carry Lookahead sub adders. In this paper comparative study of 32bit Hybrid carry select adder is proposed involving variable input bit partitioning resulting in optimized delay. Performance of proposed designs is studied under Verilog HDL and subsequently implemented in a FPGA (Spartan-3E). The results obtained show that the carry select adder utilizing section-carry based carry lookahead logic with (8-8-8-8) input bit partitioning encounters minimum data path delay.
Keywords: Carry select adder, input partitioning, Verilog, FPGA.
Abstract
Super Resolution-Based Inpainting
Vaishnavi Pawar, Shubhada Patrawaley, Ashwini Dolare and T.R.Patil
DOI: 10.17148/IJARCCE.2016.54276
Abstract: Inpainting is the process of reconstructing lost or deteriorated part of images based on the background information. i. e. image Inpainting fills the missing or damaged region in an image utilizing spatial information of its neighbouring region. Inpainting algorithm have numerous applications. It is helpfully used for restoration of old films and object removal in digital photographs. Super resolution reconstruction produces high resolution image from sequence of low resolution images. The main aim of super resolution is to improve visual quality of available low resolution image. Also existing Low Resolution (LR) imaging can be utilized with help of super resolution reconstruction. Super resolution based inpainting consists in performing first the inpainting on a coarse version of the input image. A hierarchical super-resolution algorithm is then used to recover details on the missing areas. The advantage of this approach is that it is easier to inpaint low-resolution pictures than high-resolution ones. The gain is both in terms of computational complexity and visual quality.
Keywords: Super resolution(SR) images, Exemplar based inpainting, Texture synthesis, Down Sampling, Inplanting.
Abstract
Comparative Analysis of Various Techniques Based on Leukemia Detection
Inderjeet kaur, Jyoti Rani
DOI: 10.17148/IJARCCE.2016.54277
Abstract: Leukemia can be cured if it is detected and treated at the early stage. The need for automation of leukemia detection arises since current methods involve manual examination of the blood smear as the first step toward diagnosis. This consumes more time and also its accuracy is greatly dependent on operator's ability. So this paper has reviewed commonly used techniques in the prevention of leukemia detection with good accuracy rate. In addition to this various metrics has also been presented to measure the working model capability for leukemia detection.
Keywords: Leukemia, Medical Imaging, Classification, Image Processing, Metrics, Survival Rate.
Abstract
An Efficient & Sclable Framework to Reduce Cost of Operation using Vitality Utilization Improvement in Cloud Computing
Banashankari, Mr. Chandan Raj. B. R
DOI: 10.17148/IJARCCE.2016.54278
Abstract: Cloud Computing paradigm has become one of the most popular platforms for sharing of various remote computing resources in a distributed manner. The existing research trends shows that achieving cost effectiveness considering energy optimization, efficient performance analysis and low computation associated with internal operations turned out to be very challenging for cloud providers which gained a lot of attention from researchers. This project aims to develop a two power saving strategies which can be utilized further to achieve cost effectiveness in terms of energy optimization and low computation time. The proposed study adopts the conventional N-policy strategy for optimizing the operational cost associated with the cloud client-server architecture. The performance evaluation of the proposed prototype ensures further reusability and reutilization to simplify the future research direction.
Keywords: Cloud computing, Cost of operation, Energy optimization, N-policy strategy.
Abstract
A Privacy Preserving K-Nearest Neighbor Classification Protocol Over Secure Encrypted Data
Dr. V. Selvi, K. Rajalakshmi
DOI: 10.17148/IJARCCE.2016.54279
Abstract: Data mining has wide variety of real time application in many fields such as financial, telecommunication, biological, and among government agencies. Classification is the one of the main tasks in data mining. For the past few years, due to the increment in various privacy problems, many conceptual and feasible solutions to the classification problem have been proposed under different certainty prototype. With the increment of distributed computing users have an opportunity to offload the data and processing in the cloud, in an encrypted form. The data in the distributed are in encrypted form, existing privacy preserving classification systems are not relevant. To perform privacy preserving k-NN classification over encrypted data. The recommended protocol preserves the privacy of data, protect the user query, and hide the access mode.
Keywords: Security, K-NN Classifier, Outsourced databases, Encrypted,Privacy Preserving classification.
Abstract
Multi Owner Data Sharing and Outsourced Revocation Using Identity Based Encryption on Cloud
K. Kowsalya, M. Jose Ramya, V. Ramesh
DOI: 10.17148/IJARCCE.2016.54280
Abstract: cloud computing is an economical and effective solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted cloud is still a challenging issue, due to the recurrent change of the membership. The major aims of this method a secure multi-owner data sharing scheme. That is any user in the group can securely share data with others by un trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the remaining users. The drawback of IBE is computation over head. To overcome the drawback introduces outsourcing computation.
Keywords: Cloud Computing; Revocation; Multi owner data sharing; Identity based encryption.
Abstract
Iris Recognition Based on Extreme Point Identification using Feature Extraction
Pournima Ghanmode, Snehal Mahajan, Pragati Ghodake, Babita Sonare
DOI: 10.17148/IJARCCE.2016.54281
Abstract: The use of human identification has become increasingly in demand in today�s society. The human iris is one of the most unique biometrics available to use in the identification of an individual. A biometric is characteristic of human body that can be used to uniquely identify a person.The common iris biometric algorithm represents the texture of an iris using a binary iris code. This paper proposes, Iris recognition consist of pre-processing by eyelash occlusion based on extreme point identification, feature extraction by mean thresholding and mean by median thresholding and matching of iris code by fusion of hamming distance and fragile bit distance. Proposed method will achieve good recognition rate.
Keywords: occlusion, extreme point, feature extraction, mean thresholding, mean by median thresholding.
Abstract
Authorship Attribution of Messages
Aneri R. Oza, Kajal K. Ladkat, Mrunalini V. Bhosale, Pranjali M. Marne, Dr. Rajesh S. Prasad
DOI: 10.17148/IJARCCE.2016.54282
Abstract: Author identification can be implemented using n-gram method which exhibits a unique way of identification of any author of an anonymous document. It is indeed one of the important parts of the Computer System and author can be uniquely identified by its different textual features like punctuations, phrases, length of the sentence and others. To prevent plagiarism and verifying an individual�s identity Author identification has played a crucial role. In this paper focus is on Author identification and verification for a set of provided text using n-gram method. Our future vision is to identify and verify an author with high performance and solution for feature extraction from various text documents.
Keywords: Author verification, author identification, n-gram method, false acceptance rate, false rejection rate.
Abstract
Machine Learning Techniques for Fake Profiles Classification in Online Social Network
Latha P, Dr. M.V. Vijaykumar
DOI: 10.17148/IJARCCE.2016.54283
Abstract: Online social networks (OSN�s) such as facebook, twitter, linked in, weibo have become important aspect of users in daily life. Social network have changed the way people interact, it fulfils user needs by information sharing and appreciation. OSNs suffer from fake profiles creation. An OSN user faces security problems like identity theft, privacy violation, leakage of personal information, identity theft. Fake users may inject spam, modify the online ratings and extract knowledge of genuine user. It is very difficult to detect, verify fake profiles manual. There is a need of automation of this fake profile user�s identification process. This paper explores different machine learning techniques which can be used for classification of fake profiles and real users.
Keywords: online social networks, fake profiles, classification, machine learning algorithms.
Abstract
A Survey on Intrusion Detection System for DDoS Attack in MANET
Nshunguye Justin, Nitin. R. Gavai
DOI: 10.17148/IJARCCE.2016.54284
Abstract: Mobile ad-hoc network (MANET) is one of the most important fields for development of wireless network. A mobile ad hoc network is an autonomous collection of mobile devices like laptops, mobiles, sensors, etc. MANET is an emerging technology]and has great strength to be applied in critical situations in military battlefields and commercial applications such as building traffic system, MANET is infrastructure less, with no any centralized controller exist. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. There are many security attacks in MANET and DDOS ((Distributed denial of service) is one important attack in MANET.
Keywords: security, mobile ad-hoc network, intrusion detection system, DDOS, Attack.
Abstract
A Framework for Evaluating the Best Achievable Performance by Distributed Lifetime-Efficient Routing Schemes in Wireless Sensor Networks
Divyashree K S, K.R Rekha
DOI: 10.17148/IJARCCE.2016.54285
Abstract: An energy-efficient routing is implemented in this paper for wireless sensor networks. Most of the existing routing schemes assign energy-related costs to network links. The main objective in this paper is to reduce the energy consumed by the network links and to obtain the shortest paths for the nodes to balance the flowing traffic within the network and increase its lifetime. Most of the existing schemes are not known the optimal link cost values and the maximum achievable lifetime, So framework is provided in this work to analytically derive the best achievable performance that can be obtained by Lifetime efficient routing algorithm based on the shortest-path approach. Given a network configuration and an energy consumption model, the framework provides the optimal link cost assignment which yields the maximum lifetime in a distributed shortest-path routing strategy.
Keywords: Node deployment, Routing table formation, Flood Routing Algorithm, Distributed Lifetime Efficient Routing Algorithm, wireless sensor netwoks.
